...communication. It can be both command line apps. Server app will be running and listening Client will create xml file or xml document and send it to the server (encrypted) Server decrypt the xml document, edit it and send back to the client (encrypted) Server should be able to deal with more clients at one time That is all. Thank you for proposals
Hi, I want get from directv the links, iam able to get this link but is with token and some other limitation, I need a clean line, I can provide you an account to you can try get other links and clean: [login to view URL],kabc,_fw_ae,,auth,1,_fw_nielsen_app_id,TF98B5EB1-E7FE-51D1-E040-070AAD31558A&ad._v=2&ad.flex=0&ad.access_level=1&ddp=1&v=3&ad.pingf=2&expand=drmOff...
...game (see screen shots below). We've been using a tool called FFDec aka JPEXS Flash Decompiler to edit the Actionscript files in order to get the game to even see our server setup, but we've been stuck for awhile on the XML Sockets with Actionscript 2 and don't understand how that works, so we're turning to freelancer. Sum Up: -- Edit the game client
...encryption with a user selected key. Then the files would be uploaded to a offlite drive – Icloud, Google Drive, Dropbox, etc. The app will have an option to download a backup decrypt and decompress it to a selected file path. The app will also have an option to overwrite the last backup on every backup interval or keep the last x backups in the drive
...use, transmitting information as quick as light. We have to show both uses, military one and spacial one. The system is very fast (Light speed), secure and impossible to decrypt, so very useful for military confidential communication, for secret services, governmental agencies. On one side;, we have to show that present confidential communications
...Secure messaging program that will register user & hash pwd in sqlite3 db. Users can login, send encrypted msg using refined key, see number of messages, select message, and decrypt using predefined key. Using crypto++ or similar library is req. Program must be run via command line....
...Features - a. Restrict / allow printing b. Restrict / allow copying data of specified volume c. Restrict / allow adding new data to specified volume d. On-fly Encrypt / decrypt file contents of volume. e. Facility to restrict data access I. Duration based i.e. within specified dates. II. Count based i.e. allow only 'n' times. f. Multi volume support
...Support about your username account, you should use the instagram App , When you want to contact technical support, your user name must be associated with your device. I want to decrypt this code by creating an application that can associate any username I want to contact technical support , I need make the app can i Contacting with Instagram Support about
I have a video file encrypted using [login to view URL] with the method SAMPLE-AES. Here is the info #EXT-X-SESSION-KEY:METHOD=SAMPLE-AES,URI="skd://4caba1e9-ff99-41c0-9d3a-b741d0a67ba5",KEYFORMAT="[login to view URL]",KEYFORMATVERSIONS="1" Please bid only if you can perform the task. If you get awarded and complete the task you will also get to work on my other pr...
Hi, this is a simple socket programming project. We already have the connection and everything set up, you just have to help us send a HMAC to the server, the server would decrypt it if it is correct or else it would reject it. Text me up, if you wanna talk in detail!
We have a -JTL*shop*system and wanna move to WooCommerce s...system. The existing customers can log in as usual in their account. But the problem is: J T L encrypt the data for field "password" with a blowfishkey. your Job is: decrypt the customer data (password) with from us provided blowfishkey and send us all data as a csv file or sql-file.
Unique Advertisement We want to hire...experience 11) Location tracker advertising data show experience & exp. in local host 12) Fast data processing from backend to frontend with syncronization and decrypt data 13) Real time chatting service 14) User activity track report management 15) Extra work allowance
...Requirements: 1. GOOD C# KNOWLEDGE 2. GREAT ENGLISH SKILLS PROJECT INFO: 1. ACCOUNT CHECKER 2. IMPORT COMBO 3. IMPORT PROXIES 4. BE ABLE TO CONVERT BYTE TO BINARY AND DECRYPT THE RESPONSE 5. CAPTURE INFORMATION. I will provide you with a .saz file from a fiddler captured request so you can have some understanding of the project. You must
Don't show me other apps in cover letter. I need to list all installed apps on iPhone. You should very familiar with encrypt/decrypt process regarding the image file. I will share more details via private interview.
...user identifies it; the public key plays the role of the user's address. Each message is encrypted with the public key (address) of the addressee, so only the addressee can decrypt it. The mini-server can receive messages in two ways: -either directly from a customer, -by synchronizing with a peer, that is, another instance of the same server of