Hi there, please read details carefully. In this project I need an high skilled cryptograph, to find an encoding key between 2 chains of characters. I will provide samples, from them you will have to find the relation between them. Big reward will be given. Only expert and serious person, no time wasters, if you're trying to be sneaky, you will be reported, if you know you're not up ...
I need someone who could develop quickly a basic voip program who will have additional voice packet encryption. You can take any open source program without it and set it up for me and tweak it. This should be done on Android platform. I will prefer someone who already had worked on it and preferably someone who understands how packet security works
...No JB, Do not install APP, No Internet Connection Analog Voice Encryption Encrypting voice of mobile calls (GSM, CDMA, LTE, APP ... calls) directly. Encrypt voice contents before sending into cell phone. Prevent intercept at phone, base station and Telecom server site. Analog encryption guard against crack and hack. Secure your voice contents extremely
I will share the details after reviewing your proposal. So put something Awesome in proposal. Also answer this question in proposal. What is 2+two?
We are a looking for an experienced Perl programmer in Linux environment to develop a solution to grab incoming video, possibly join them (with ‘dissolve’ effect between them if possible) if it is a series of files going and place watermarks (logo + text) as well as subtitles based on timeline (from sec to sec and text in Unicode) and then upload the
I need you to develop some software for me. I would like this software to be developed.
...behind client Routes. when we will creat user Keys and OVPN fill will be created with respective user. We will have openvpn,PPTP, L2TP, SSTP protocol we need strong encryption both udp and tcp we can change port anytime for single server or multiple server from central system. We need API for backend server and front end for website and
AES for school written in Python for backend security. Must have file available for students to view. 3 web pages front end to imitate Facebook. Functionality as well. Not going on the website. It is only a simulation for a classroom case study.
...user is intending to watch. We will provide self-signed certificates that can be downloaded from our server through the developer's app for use with the proxy to do the encryption/decryption. We want to approach this app in three phases - a phase will only be paid if (a) the entire phase is completed as described and (b) the result stays strictly
...different codec like G.711 (I only used G.726) and 3 encryption algorithms (RC4, AES, and Blowfish)(done need some improvement). the needed output: is to plot or measure end-to-end delay, jitter, throughput and MOS. for non-encrypted traffic and the encrypted traffic for all the encryption algorithms, and for all 3 different codec. (only throughput
I have a video file encrypted using [url removed, login to view] with the method SAMPLE-AES. Here is the info #EXT-X-SESSION-KEY:METHOD=SAMPLE-AES,URI="skd://4caba1e9-ff99-41c0-9d3a-b741d0a67ba5",KEYFORMAT="[url removed, login to view]",KEYFORMATVERSIONS="1" Please bid only if you can perform the task. If you get awarded and complete the task
...magnetic cards. How can a SW developer support me to develop SW to write on the Card and develop as well the back end server SW for verification and acknowledgment? No encryption required at this stage....