Sip encryption jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 sip encryption jobs found, pricing in USD

    ...platforms commonly used in embedded systems. Responsibilities: Study the project requirements and provide technical recommendations for the integration process. Develop firmware and drivers for the NRF52 microcontroller to establish communication with the ATEcc608A Crypto Chip. Implement secure storage mechanisms for cryptographic keys and certificates on the Crypto Chip. Ensure proper data encryption, decryption, and authentication protocols between the NRF52 and ATEcc608A. Conduct thorough testing and debugging to ensure the integration is robust, efficient, and secure. If you possess the necessary skills and expertise in NRF52 and ATEcc608A integration, we would love to hear from you. Please provide examples of relevant past projects and highlight your relevant experience in ...

    $44 / hr (Avg Bid)
    $44 / hr Avg Bid
    6 bids

    I have a client who has a .Net desktop app developed in 2008. The app fires off email to customers via the configured email provider settings. (I.e. username or mail app code/password, imap and smtp settings).The app seems to be coded to use TLS1.0 only. As of 4/17/2023, the email provider (Comcast in this case) will only allow TLS1.2 (or higher) encryption. I might not have access to the source code. Can you help? Also, the same app is currently stand-alone using SQL compact version. It was connecting to a shared SQL database server at one time. Can you help with getting the app configured to point to a shared database server and database?

    $3940 (Avg Bid)
    $3940 Avg Bid
    32 bids

    I am looking for a developer who can create a digital signature solution that can authenticate signatures. The project will be written in Python and there is no preference for a specific library or framework. The main features required for this project include signature authentication. Ideal Skills and Experience: - Strong knowledge of Python - Experience with digital signature...digital signature solution that can authenticate signatures. The project will be written in Python and there is no preference for a specific library or framework. The main features required for this project include signature authentication. Ideal Skills and Experience: - Strong knowledge of Python - Experience with digital signature solutions - Familiarity with authentication protocols and encryption te...

    $144 (Avg Bid)
    $144 Avg Bid
    6 bids

    ...Information Protection for Office 365 to help me with setting up classifications and labeling for my organization. I have already set up some information protection policies, but I need help with this specific aspect. The ideal candidate should have experience with: - Microsoft Information Protection for Office 365 - Setting up classifications and labeling - Knowledge of data loss prevention and encryption and rights management would be a plus. The result of the task should be an example in C# showing : * Labeling a document * Upgrading the classification of a document * Downgrading the classification of a document. The example should be programmed in C# using and CAN NOT

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    10 bids

    Hi, looking for someone with a tech background that can build out a pitch deck. High level, this is an encryption play. I would like a one slide summary based on a patent pending application along with a 10-12 deck. Thanks!

    $365 (Avg Bid)
    $365 Avg Bid
    79 bids

    I'm looking to develop a property investment software system that will run as a Desktop Application. The system will require some data collection from various public online sources data filtering and basic encryption of data, to ensure security of data. The main purpose of this system is to provide users with the ability to analyze and filter their property investment data. It should be equipped with features to allow users to filter their data according to different criteria, such as property type, location or financial performance, to enable them to make informed investment decisions. The system should include automated alert features to help users stay updated on their investments. The program should be easy to use and powerful enough to handle large databases without exper...

    $15 / hr (Avg Bid)
    NDA
    $15 / hr Avg Bid
    46 bids

    I am looking for a skilled software developer to create a password protection software for my internal Hard Drive. The software should be compatible with windows and Linux operating system and can be either open-source or proprietary. However, I do require military-grade encryption to ensure maximum security for my data. The ideal candidate should have experience in developing software with high-level encryption capabilities.

    $173 (Avg Bid)
    $173 Avg Bid
    16 bids

    I need help resolving an issue where my LetsEncrypt SSL certificate is not trusted on iOS iPhones. The specific error message I am receiving is "Not Trusted". Ideal skills and experience: - Experience with SSL certificates and encryption - Familiarity with iOS devices and their security protocols - Knowledge of LetsEncrypt and its implementation on various devices - Ability to troubleshoot and resolve certificate errors - Strong communication skills to explain the solution to me in a clear and concise manner.

    $24 / hr (Avg Bid)
    $24 / hr Avg Bid
    16 bids

    ...Users should be able to chat with their matches in-app, with the option to send pictures and videos. User Verification: It's important to have some form of user verification to ensure that all users are real and not bots. This could include phone number verification or email verification. Privacy and Security: The app should prioritize user privacy and security, with measures such as end-to-end encryption for messages and profile settings that allow users to control who sees their information. Location-Based Matching: The app could include location-based matching to suggest matches who are nearby. Premium Features: Consider offering premium features for users who want to get more out of the app, such as the ability to see who has viewed their profile or the option to und...

    $218 (Avg Bid)
    $218 Avg Bid
    13 bids

    I want an excel file with two columns and 1500 rows The first column is an explicit text consisting of one, two or three words The second column is the ciphertext of the first column using the Blowfish encryption algorithm Note / I can give you a website that you use to encrypt the ciphertext Duration of work / one or two days only

    $22 (Avg Bid)
    $22 Avg Bid
    47 bids

    I am looking for a Python developer who can create a Streamlit Realtime Chat, Group Chat Application that will be used for buying and selling purposes. The most important feature for this application will be buyer to able to chat with one and/or multiple suppliers at one time, group chat, one to one chat, file sharing, with message encryption as a secondary feature. I anticipate that more than 50 users will be using the chat application at one time, so experience in developing scalable applications will be ideal. User authentication will also be necessary to ensure the security of the chat. My main application is running on python, streamlit and mongo db database. The chat application needs to integrate with whatsapp also.

    $542 (Avg Bid)
    $542 Avg Bid
    7 bids

    My current project involves Mallox Ransomware decryption and I'm in need of experienced help. This project requires intense security knowledge and the use of advanced encryption methods - AES, Triple DES, and RSA. I believe the project to be of a hard difficulty level and am not specifying a language preference. If you think you're up for the challenge and want to join the fight against cybercrime, I'd love for you to help me out on this project.

    $525 (Avg Bid)
    $525 Avg Bid
    8 bids

    I need someone to connect my Twilio account to my Yeastar Cloud PBX via Sip Trunk. The main purpose of this project is to make and receive calls. Currently, I have a Twilio account, but I require guidance on best practices for the SIP Trunk configuration. The ideal candidate should have experience with Twilio, Yeastar Cloud PBX, and SIP Trunking. The project is urgent, and I need someone who can complete the task quickly and efficiently.

    $51 (Avg Bid)
    $51 Avg Bid
    6 bids

    ...panels of different sizes (draft design available) that contain text, image, like/dislike buttons (with like/unlike counters). Each panel has objects with price and "expiry date": it stays empty until the expiry date. (Auction principle). A slim banner has the login/register buttons, switching to username welcome after login (the login/registration window appears on a popup window). Credentials encryption in the database after registration. Admin account is needed to operate (via website or outside, separate admin panel). Payment integrations with Stripe basic functions like: pay, confirm, hold payment, release money back... ...

    $1271 (Avg Bid)
    $1271 Avg Bid
    113 bids

    Looking for a cyber security specialist to complete the following for our web app. The ideal candidate will have the necessary tools to deliver. 1. Vulnerability assessment 2. Code Review (ASP .NET) 3. Database Security (MS-SQL) 4. API Security 5. Penetratio...for our web app. The ideal candidate will have the necessary tools to deliver. 1. Vulnerability assessment 2. Code Review (ASP .NET) 3. Database Security (MS-SQL) 4. API Security 5. Penetration testing 6. Threat modelling 7. Vulnerability management 8. Firewall - configuration base management (in future) 9. Summary Report of findings with gaps identified and details of how they were closed 10. Encryption Protocols (Preferably the candidate should be located in Pune so we can potentially absorb into a permanent role at a lat...

    $100 (Avg Bid)
    $100 Avg Bid
    8 bids

    ...Expired Domains Bulk Domain Rating Checker Index Pages Checker Meta Tags Tools Create new meta tags or analyze the existing ones to get an in-depth analysis of your meta tags and web pages. Meta Tags Analyzer Meta Tag Generator Password Management Tools Create a secure password, check password strength or encrypt a password; all tools related to password management are readily available. Password Encryption Utility Password Strength Checker Password Generator Online PDF Tools All the tools you need to work with PDF files, at your fingertips. Merge, rotate, unlock, lock, watermark and convert PDFs with just a few clicks. Merge PDF Rotate PDF Unlock PDF Lock PDF Watermark PDF To Word Word To PDF PDF To JPG JPG To PDF PowerPoint To PDF Compress PDF Excel To PDF Split PDF Compress...

    $443 (Avg Bid)
    $443 Avg Bid
    11 bids

    I'm looking to create a custom form that will organize and gather information from its users. I need the form to be able to collect contact details, and background health information. The user data I receive needs to be sent in the format of an email notification. Lastly, the form needs to be backed up with a very secure SSL encryption in order to keep the data safe from any malicious intent. -- All of this can be done with software readily available online. What I need additionally is to program a given statement back to the form receiver based on the answers given. --

    $464 (Avg Bid)
    $464 Avg Bid
    73 bids

    Function seal: Declaration: bool seal(const char * inFile, const char * outFile, const char * publicKeyFile, const char * symmetricCipher) Description: The function accepts four parameters, the first three parameters define the names of files. In the file inFile, you will find binary data intended for encryption, outFile is the output file where you save all the necessary data for decryption, and publicKeyFile is the public key that will be used to encrypt the symmetric key. The parameter symmetricCipher is the name of the symmetric cipher. The function generates a symmetric (shared) key and an initialization vector (IV), which will be the input to the symmetric cipher symmetricCipher. You will encrypt the data in inFile with this cipher, key, and IV. Also, you encrypt the symmetr...

    $37 (Avg Bid)
    $37 Avg Bid
    5 bids

    ...commercial Purposes. List of features: File transfer Convert Audio to Text Voice & Text Message One to One Messaging Alerts & Notification Sending and receiving messages, photos, videos, and files of any type along with intergration Creating groups with up to 200,000 members Admin can search through any keywords and it will show all chats containing those key words Secret chats with end-to-end encryption Cloud-based storage, allowing for easy access to your messages and media from any device Automatic deletion of messages with a timer Self-destructing messages Two-factor authentication Media compression for faster sending Multi-platform support for iOS, Android, Windows, Mac, and Linux Feature like Copy, Forward,Reply, Edit,Pin,Select,Save As, Show in Folder Scheduled ...

    $1071 (Avg Bid)
    $1071 Avg Bid
    62 bids

    I am in need of a payment gateway for my website, QueR. The payment methods I require to be integrated include Credit Card. Additionally, I need recurring payment functionality and specific security features in place, including SSL/TLS Encryption and Fraud Detection. For this project, I am looking for a freelancer who has experience in payment gateway integration and is skilled in web security. Ideal skills and experience include: - Payment gateway integration - Web security - Knowledge of SSL/TLS Encryption and Fraud Detection - Ability to implement recurring payment functionality Please provide a portfolio or relevant experience in your proposal. Thank you.

    $115 (Avg Bid)
    $115 Avg Bid
    16 bids

    I am seeking an experienced ethical hacker with advanced skills in the field to assist me in learning about wireless security. The ideal candidate should be able to create video lessons that cover the following topics: - Wireless network vulnerabilities - WEP, WPA, and WPA2 encryption - Wireless network penetration testing - Wireless intrusion detection and prevention The video lessons should be comprehensive, covering all the necessary technical details and providing practical examples. The ideal candidate should have experience in creating educational content, and be able to deliver the material in an engaging and easy-to-understand manner. Skills and experience required: - Advanced expertise in ethical hacking - Strong knowledge of wireless security - Experience in creating e...

    $374 (Avg Bid)
    $374 Avg Bid
    22 bids

    Programming languages: Android developers should be proficient in Java or Kotlin, while iOS developers should be proficient in Objective-C or Swift. VoIP development: Developers should have knowledge and experience in VoIP development, including SIP, RTP, and other relevant protocols. Linphone SDK: Developers should be familiar with the Linphone SDK and its features, including audio and video codecs, encryption, and network management. Audio and video processing: Developers should have experience in audio and video processing, including noise reduction, echo cancellation, and video codecs. Network programming: Developers should be familiar with network programming, including TCP/IP and UDP protocols, and be able to troubleshoot network issues. Debugging and testing: Deve...

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    50 bids

    Programming languages: Android developers should be proficient in Java or Kotlin, while iOS developers should be proficient in Objective-C or Swift. VoIP development: Developers should have knowledge and experience in VoIP development, including SIP, RTP, and other relevant protocols. Linphone SDK: Developers should be familiar with the Linphone SDK and its features, including audio and video codecs, encryption, and network management. Audio and video processing: Developers should have experience in audio and video processing, including noise reduction, echo cancellation, and video codecs. Network programming: Developers should be familiar with network programming, including TCP/IP and UDP protocols, and be able to troubleshoot network issues. Debugging and testing: Deve...

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    43 bids

    ...Office documents such as Word, Excel, and PowerPoint. The information protection should include encryption, access control, and authentication. Remove information protection from Office documents: The tool should be able to remove information protection from Office documents that have been previously protected using the tool. This will allow users with the appropriate access credentials to access the document's content. Update information protection settings for Office documents: The tool should be able to update the information protection settings for Office documents that have been previously protected using the tool. This will allow administrators to modify the access control rules or encryption algorithm used to protect the document. The tool should be develope...

    $25 / hr (Avg Bid)
    $25 / hr Avg Bid
    20 bids

    I am looking for an experienced person to promote a feature-rich Netsapiens platform for my business, with a timeline of less than one month. I am seeking a qualified partner who can deliver a high-quality changes in a timely manner. Dial plan skills, API, SIP trunking, SIP, VoIP, zero touch platforms

    $25 / hr (Avg Bid)
    $25 / hr Avg Bid
    8 bids

    ⭐️⭐️⭐️PHOTOSHOP ⭐️⭐️⭐️I AM SELLING 1 item I need the website designed ! PHOTOSHOP SOME WORK I WILL PICK AN WINNER We need an experienced website designer to create a one-page Shopify ecommerce site for Slim Sip Co. Our focus is on selling a 28-day detox tea product targeted specifically to women, priced at $34.95. The website should have a visually appealing and user-friendly design that caters to our female target audience. It should highlight the product's benefits and unique selling points, optimized for maximum sales conversion. Essential ecommerce features, such as a streamlined checkout process and integration with popular payment gateways, are required. ( I dont have the official text for the website so just use dummy text for the section that you create . ) This is a...

    $100 (Avg Bid)
    Guaranteed
    $100
    70 entries

    I'm looking for professional support with Issabel PBX set up, and am open to either a one-time job or an ongoing relationship. In addition, I have specific requirements for the job that I am looking for someone experienced to...In addition, I have specific requirements for the job that I am looking for someone experienced to manage. This is a remote support job opportunity that requires expertise in PBX setup and customization of configurations to fit the needs of our organization. If you have experience in this field, I want to hear from you. We have a clear setup requirements total of 12 Sip trunks with 4 different providers. We will supply the sip credentials. we want inbound calls and outbound calls to be direct on to the PBX with IVR defined. we have already made...

    $255 (Avg Bid)
    $255 Avg Bid
    14 bids

    I need a coding expert to encrypt my files with advanced encryption. The files that need to be encrypted include text, image, and video files. The ideal candidate should have experience in PHP. The deadline for completing the encryption process is flexible.

    $20 (Avg Bid)
    $20 Avg Bid
    8 bids

    I am looking for a skilled developer to help me encrypt my chat a...skilled developer to help me encrypt my chat app database using MySQL. The ideal candidate should have experience with encryption methods, particularly AES, and be able to implement a 256-bit encryption strength. Once you open the app the db has to be decrypted in a safe manner and once the app is closed the db has to encrypted again. The project requires the following skills and experience: - Familiarity with MySQL database - Proficiency in AES encryption method - Experience implementing 256-bit encryption strength The main objective of this project is to ensure the security of the chat app database, and the ideal candidate should be able to provide a seamless encryption process with...

    $172 (Avg Bid)
    $172 Avg Bid
    25 bids

    ...Range Wireless Signals 2. Support high-speed video data - live video streaming and recording over the wireless network 3. Port to connect to internet or other network with or without internet connection 4. Ability to scan available channels programmatically with signal strength 5. Ability to switch channel programmatically based on signal strength from the channel 6. Other security features - Encryption and FIPS 7. Supports port forwarding Deliverables: 1. We are not looking to build a brand new router. Recommend an existing router in the market from any of the major vendors. 2. Ensure the router supports all the above features 3. Deliver .NET C# source code to scan all channels with strength and switch to a particular channel 4. Deliver .NET C# source code to find the streng...

    $1245 (Avg Bid)
    $1245 Avg Bid
    26 bids

    ...the status of leads in real-time, while lead scoring will enable them to prioritize leads based on their potential value. Lead routing will ensure that leads are distributed to the most appropriate buyers based on specific criteria, such as geographic location, industry, and company size. To ensure the security of sensitive data, the system will incorporate robust security measures, including encryption and access controls. The system will also be scalable, allowing for the addition of new features and functionality as needed. Overall, the Lead Distribution System development project will provide marketing agencies and lead generation companies with a powerful tool for managing and distributing leads to potential buyers, helping to streamline the lead generation and sales proce...

    $3114 (Avg Bid)
    $3114 Avg Bid
    124 bids

    ...can either purchase a domain name or use a subdomain of an existing domain. Configure DNS settings: Once you have a domain name, you will need to configure the DNS (Domain Name System) settings for your domain to point to your server's IP address. This involves creating a DNS A record for your domain that maps to your server's IP address. Set up SSL/TLS encryption: To secure your email communication, you should enable SSL/TLS encryption. You can obtain a free SSL/TLS certificate from Let's Encrypt or purchase one from a certificate authority. Configure firewall settings: You will need to configure your server's firewall to allow incoming and outgoing traffic on the SMTP port (usually port 25). Configure SMTP settings: Finally, you will need to confi...

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    13 bids

    The title of my project is Enhancing Safety and Security in Controller Area Network (CAN) for Anti-braking Lock System (ABS) in Vehicle Network System and I would like to add security features of encrypts the data using AES encryption, HMAC authentication code and helper function that calculates the CRC error detection code. I have all the scripts for the additional security features and even the algorithms. I just need someone to build the simulink blocks that can run and test the features on a simulation of a car. Will be able to provide more information needed.

    $150 (Avg Bid)
    $150 Avg Bid
    3 bids

    Looking for a skilled developer who can customize EspoCRM to meet my specific needs. I require many customizable features such as adding new fields and modules, customizing existing modules, and integrating with other software. Specifically, I need encryption and decryption features to ensure the security of my data. The timeline for completion is flexible. The ideal candidate should have experience in EspoCRM customization, and be proficient in custom fields and modules, workflow automation, and user interface design.

    $26 / hr (Avg Bid)
    $26 / hr Avg Bid
    3 bids

    Hi Danil K., why did the task close and it showed something else. Can you check?? The title of my project is Enhancing Safety and Security in Controller Area Network (CAN) for Anti-braking Lock System (ABS) in Vehicle Network System and I would like to add security features of encrypts the data using AES encryption, HMAC authentication code and helper function that calculates the CRC error detection code. I have all the scripts for the additional security features and even the algorithms. I just need someone to build the simulink blocks that can run and test the features on a simulation of a car. Will be able to provide more information needed.

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    I am looking for a developer to create a Flexisip SIP server for our IP-based intercom system. We also need the server to integrate with our existing mobile app, which is available on both iOS and Android platforms. The following solution should be implemented: SIP server for intercom and mobile application (iOS / Android). The goal is that when you ring up, the extensions for that apartment ring at the same time or, based on a setting, are forwarded to mobile clients after X seconds of no answer. An apartment can have more than one mobile client, but only 1 indoor intercom - SIP server: Flexisip - Support for VoIP Push solution for iOS and Android (mobile clients should ring even when the application is not in the foreground) (I have Apple and Android developer ac...

    $309 (Avg Bid)
    $309 Avg Bid
    7 bids

    ...This would make it easier for them to arrange for the return of the car. 5. Volunteer network: The app would have a feature that would allow people to sign up as volunteers. These volunteers could help in verifying ownership, coordinating the return of the car, and providing support to the owners. 6. Security features: The app would have security features such as two-factor authentication and encryption to ensure the safety and privacy of users' data. 7. User ratings: The app would allow users to rate each other based on their experiences. This would help build trust and encourage responsible behavior. Monetization: The app could be monetized through ads or by charging a small fee for some premium features, such as faster verification or priority messaging. Conclusion: A mob...

    $721 (Avg Bid)
    $721 Avg Bid
    33 bids

    ...Layer 8 is to be a collection of protocols that jointly implement VPN functionality running transparently in the browser. The ultimate goal is to dissociate a client’s true identity from their content choices through the Layer 8 system. The Layer 8 system is actually a suite of protocols being developed one at a time -- this is the first of those protocols. SPECIFIC TASK: Implement a symmetric encryption protocol across an HTTPs connection. No cryptographic research and development required. You will only be implementing known, vetted, cryptographic primitives using known vetted libraries. TIMELINE: Project to be completed in four to six weeks. MILESTONES: 1) Symmetric encrypted communication achieved 2) “Stop-n-wait, Hail Marry,” windowing protocol implement...

    $900 (Avg Bid)
    $900 Avg Bid
    30 bids

    I would like a multi-class SIP (Session Initiation Protocol) tutorial, at first with the most basic concepts (from zero) and increasing the level with each class, starting to beginners and finishing with a professional mastering of the subject, to learn and understand completely how to use SIP and become proficient of the subject. The minimum total duration of the course with all classes must at least 8 hours. I need good quality on the recording and the edition of the course. Also, the content has to be original, to be able to use it without restrictions. We will sign a contract of copyrighting cession before ending the project.

    $208 (Avg Bid)
    $208 Avg Bid
    2 bids

    I am looking for a skilled developer who can create a zero-knowledge proof smart contract using Solidity. The purpose of this contract is for authentication, authorization, and verification. The contract will be handling sensitive data, so a high level of security is required. Ideal skills and experience for this job include: - Expertise in Solidity pro...contract is for authentication, authorization, and verification. The contract will be handling sensitive data, so a high level of security is required. Ideal skills and experience for this job include: - Expertise in Solidity programming language - Experience with zero-knowledge proof technology - Knowledge of blockchain and smart contract development - Strong understanding of security protocols and encryption techniques. check at...

    $498 (Avg Bid)
    $498 Avg Bid
    13 bids

    I am looking for a developer to create a readymade Flash BTC . If someone has ready code then it will be advantageous. Key Requirements: - Development of a web-based platform for Flash BTC investment - Implementation of basic security features such as SSL encryption and login authentication - Integration with popular payment gateways - User-friendly interface for easy navigation and investment tracking If you have a strong portfolio and experience working with investment platforms, please apply for this project.

    $115 (Avg Bid)
    $115 Avg Bid
    3 bids

    ...server using AWS Transfer Family. The identity provider will be a custom lambda that will read the user accounts in DynamoDB, and returns a dynamically built policy to allow the user to read/write in his bucket. Both the CreateUser and AuthenticateUser lambda functions should be provided (ideally written in NodeJS 18, but I can be flexible on this point). The Lambda functions will take the encryption SALT, DynamoDB table name, and S3 Bucket name as environment variables. The template shall create the following resources, (and others if I miss some that are required) : - the AWS::Transfer::Server with FTP, sFTP, and FTPs protocols enabled, using a custom Hostname - the S3 bucket, that will contain per user sub-folders - the VPC, subnet(s), Elastic IP address, Internet Gatewa...

    $188 (Avg Bid)
    $188 Avg Bid
    23 bids

    I am looking for a Matlab expert to fix my code for image decryption. Currently, the code is producing incorrect output. The encryption algorithm being used is custom or unknown, and I can provide documentation and reference materials for it. Ideal skills and experience for this job include: - Proficiency in Matlab programming - Experience with image decryption - Familiarity with custom encryption algorithms - Attention to detail and ability to troubleshoot code - Strong communication skills to work with me on providing documentation and resolving issues.

    $47 (Avg Bid)
    $47 Avg Bid
    5 bids

    DES (Data Encryption Standard) and AES (Advanced Encryption Standard) and AES Architecture

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    9 bids

    I am looking for a freelancer who can assist me with a Ubuntu Asterisk SIP problem. My current setup involves Ubuntu 20.04 and Asterisk 18. I am experiencing a general issue with outgoing calls being masked, as the number in Zoiper is not being recognized. Ideal Skills and Experience: - Strong knowledge of Ubuntu and Asterisk - Experience with SIP configurations and troubleshooting - Familiarity with Zoiper and other SIP clients - Ability to identify and resolve connectivity issues - Experience with implementing advanced features such as call recording and IVR systems Overall, I am seeking a skilled freelancer who can help me identify and resolve the issue with my outgoing calls, and ensure that my SIP configuration is optimized for call quality and reliabi...

    $40 (Avg Bid)
    $40 Avg Bid
    9 bids

    Hi, looking for someone with a tech background that can build out a pitch deck. High level this is an encryption play.

    $324 (Avg Bid)
    NDA
    $324 Avg Bid
    87 bids

    My name is Ashish and I am looking to have an Android application built using Flutter. This application should be primarily accessible on the iOS platform, but accessible on other platforms as well. I will require an authentication s...should be primarily accessible on the iOS platform, but accessible on other platforms as well. I will require an authentication system, and the application should not require any external services or integrations. The application should be designed with a functional and user-friendly interface, suited to a mobile device. The application should also be secure, using strong authentication systems, encryption, and other security measures. I expect professional quality work, timely status updates and a full working version of the application before paymen...

    $4 / hr (Avg Bid)
    $4 / hr Avg Bid
    32 bids

    Hi, I am looking for a freelancer to help me with a secure email encryption set up. I need to encrypt all of my emails to make sure they are secure. Currently, I need to encrypt emails that are sent through Exchange, and Outlook. More specifically, I am looking for encryption only solution. The software I have is called Zix to do email encryption. Are you experienced in setting up email encryption solutions for any of these platforms? If so, please feel free to get in touch and let me know how you can help. Thank you! need someone to assist with email encryption using a tool called Zix

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    5 bids

    I am looking for someone to create a subscription website for ebooks for personal use. It should include a secure monthly subscription payment system and a customer login system to view catalogs of books and interact with reading communities. The website must have all the necessary features needed for personal use and must be designed to provide a safe, secure and appealing platform for ...adding, deleting, and disabling. User Login: Discuss the importance of user login and security, including the fact that only one user can be logged in at a time and that users cannot log in from two different systems simultaneously. Flipbook Security: Explain the security measures that will be put in place to protect flipbooks and other content in the system, including password protection and encryp...

    $345 (Avg Bid)
    $345 Avg Bid
    28 bids