I need cipher text search on cloud...using hierarchical clustering algo in this project for doc and index outsourcing on cloud. It need a cloud platform.
...PHP dev, i have project and i would like to hire someone to do it. Only experts please. Main things you must be aware of : 1- PHP (Core). 2- Integrates encryption such as RSA pgp. 3- integrate obfuscation. 4- Yubikey Integration. 5- Dealing with OpenVPN in PHP. 6- expert in linux. 7- YOU MUST CODE IN SECURE( no sql injection or xss or csrf or xpath issues
While using OpenCV to capture...rtsp://user:passxx@[login to view URL] The problem is that , we can set the stream as Encrypted from IP camera console and the key is entered for decrypting the video stream. What is the best way to read encrypted stream using RTSP or any other protocol using Opencv or any other technology.
...stateful inspection NAT, VPNs, Tunnels Confidentiality, Integrity, Availability, Authenticity, Non-repudiation Hashing Symmetric vs asymmetric encryption Public/private keys PGP/TLS/SSL HTTPS IPSec DNS security (amplification attacks) Access control (MAC, DAC) Multifactor authentication Network Reconnaissance Whois, nslookup, traceroute, nmap
...announcements. They can manage members and change their rank. They will be required to use PGP to login. Merchants will be able to post shop items. I want a star rating for each merchant where people can review them after a purchase. They will also be required to use PGP to login. To become a merchant you deposit $100 into your wallet then click a button
it is an encrypted excel file. i have googled and downloaded software. no luck so far. thought i would ask freelancer. after a workable excel file thanks. thanks.
we are looking for an experienced pgp/mysql developer to develop a php web application that generate multiple choices questions from an admin side (admi insert questions and right answers etc...) and the users connect to answer the mcq within tve timong fixed by admin. admin should then get detailed reports wity option to export to excel format of
Requirements: 1. We have a webapp that needs the ability to send a temporary link to someone that enables the person who has the link to open it and fill out a basic webform and submit it. 2. Require fully working and commented C# code that will be used in another mvc webapp. 3. A basic MSSQL database used for testing with 2 tables. a. Client table with id, name b. Form table with id, formDa...
Need help to solve a PGP signature validation issue and fast. our counter partner can not validate our signature. Need someone really understand the PGP framework and in&outs. Need to be good at c++, C# to help build the code.
Without extracting and preferably w/o passing in the key (if possible) I need a way of using java to generate two text files. 1 an extension list, and a count of those extensions to look like .txt = 10 .pdf = 3 .docx = 5 and 2 a folder hierarchy list to look like C: C:Test C:Test[login to view URL] etc etc
I have a pgp file that is rather large, and I only need a list of extensions contained inside this .pgp file. Is JAVA capable of generating a file list from the .pgp without decrypting and extracting the pgp?
...requirements with regards to the use of open source Trident tool. The product link for this tool is : [login to view URL] Traditionally, we knew a little about using PGP and keys. The use of PGP would typically allow one-to-one secure communications and whereby both parties would need to generate a key pair set , and start exchanging their public keys. Their
...blJEMyUSLwITJppmbh1WdK1jbktDctFmJ4IDNERzN1gzQBhTQzEkN3EDNycjN1EEOBRTR2QEOCNUMwcTO2cTR3oDapRnY64mc11Dd49jO0VmbnFWb) - The protector must be in php. - Need to have a files to add the protector automatically in all url of the download site. - You must have a time cookie for 1 day and then leave the protector blank. - Ads will be from google adsense
...windows application that can read an encrypted blob file, decrypt the file and save it to a specific file location. I will provide the original java source code used to encrypt and decrypt the attachments. I have sample files that are encrypted which need to be decrypted. I have the key used to decrypt the files. File name: a140ab43950a0ae...