Asprotect stolen bytespekerjaan

Tapis

Carian terbaru saya
Tapis mengikut:
Bajet
hingga
hingga
hingga
Jenis
Kemahiran
Bahasa
    Status Pekerjaan
    2,000 asprotect stolen bytes tugasan ditemui, harga dalam USD

    We have had our kids motorbikes stolen and I want assistance in searching for possible for sale ads which fit the models of our bikes. Would like to know if there is a way to narrow down the search but still cover all data bases such as gumtree, fb market place etc

    $103 (Avg Bid)
    $103 Avg Bida
    4 bida

    ...efficiently without compromising quality. My task is: Create a library that implements a stack via a linked list. Only positive numbers in the range of the number of bytes that will be entered when creating the stack will be able to be stored in the stack. The stack will be able to be saved to and loaded from a binary file. The binary will be in the given format - the first byte will be the range of numbers to store, followed by the numbers themselves stored on the stack. Save and load the file according to convert_number_to_bytes(x, count_byte), write_number(file, count_byte, number), convert_bytes_to_number(bytes), precision_number(file). It will be possible to create any number of stacks. It will be possible to freely add and obtain elements to the stacks. Attempting ...

    $183 (Avg Bid)
    $183 Avg Bida
    15 bida
    Trophy icon Logo Designers Needed Immediately 6 hari left

    IMPORTANT!!!!!!!! ***DO NOT SUBMIT ORIGINAL IDEAS - I NEED EXACT REPLICAS OF INCLUDED FILES*** I need a well-experienced graphic designer to replicate a logo with the exact same graphics and colors as I lost the artwork files when my hard drive was stolen. It is not a terribly creative job, I simply need someone with the technical ability to copy the two main logos I have provided. - Camp Logo will be printed on tshirts, shorts and other clothing - I have included the visuals that I need replicated - Camp Vega - or the camp spot and type in Vega -

    $50 (Avg Bid)
    Dijamin
    $50
    177 penyertaan

    ...its compatibility with the latest Android standards. Requirements: 1) Textbox Input: Include a textbox for users to enter the size and filename. 2) Byte Stream Generation: Generate a byte stream from /dev/qrandom based on the entered size. 3) Display Byte Stream: Upon clicking the 'Generate' button, display the byte stream in a scrollable textbox below the button. The display should format the bytes in lines across the screen, removing any null characters. 4) File Writing: Save the byte stream to a file in the /sdcard/ directory, ensuring compliance with the permission requirements of the latest Android version (version 13). 5) App Icon Design: Design a new app icon that adopts a contemporary, minimalistic style. Dashboard Redesign: Revise the dashboard layout to enha...

    $147 (Avg Bid)
    $147 Avg Bida
    76 bida

    I'm on the hunt for an experienced developer who can construct a BLE transport layer on an ESP32. Ideally, you should have proficiency in C to execute this project. Required Functionalities: - Reading from a BLE device - Writing to a BLE device - Connecting and disconnecting to a BLE device The TP should be able to handle 5K bytes in one go. The project entails observing conformity with the following Bluetooth protocols and standards: - Bluetooth 4.0 - Bluetooth 4.2 - Bluetooth 5.0 If you are confident with your skills and have experience with BLE protocols and ESP32, please bid on this project. Your expertise will be greatly appreciated!

    $109 (Avg Bid)
    $109 Avg Bida
    6 bida

    I am building the backend in NodeJs, and I have deployed the nodeJs app on AWS ec2 and using Ubuntu. The issue is, that sometimes (Once in a day or twice in a day) I get the "Reached heap limit Allocation failed" error in my PM2 log and then app stops working. The App is hosted on AWS EC2. I check the AWS EC2 monitoring tab I get a sudden spike in Network in (bytes) and CPU utilization (%), and then the app got crash. Just FYI: I am using and some webhooks in my application. I need a person who has done the memory detection work before. Please note, since the application is in production so I will not be able to provide you the codebase and you will need to work by Remote. Please mention: Memory in your proposal beginning to consider your bid.

    $105 (Avg Bid)
    $105 Avg Bida
    4 bida

    ...DBC files, which is a standardized database file format used within our industry. You can read about DBC files here: The editor both enables the creation of the DBC file itself, but it also allows users to view the logic of how signals are encoded in the DBC file via the Signal Preview section. Further, users can test how raw data bytes are going to be decoded via the DBC file using the payload decoding section. You can find the latest source code for the editor below: The current version of the editor has some bugs and we are looking for a person to fix these, as well as help with future development projects. This project requires good Javascript coding skills

    $179 (Avg Bid)
    $179 Avg Bida
    37 bida

    Someone stole some btc from my wallet late last year, and I need a bitcoin blockchain analysis forensic expert to help track it down, or identify any clues that will lead to the perpetrators. I think the btc was stolen via anydesk I have the anydesk target machine ID, and the transaction One of the transactions was The funds ended up in this wallet: Can you connect this to a kyc wallet? Or identify next steps? Please bid if you have experience recovering bitcoin or blockchain analysis. because of scams, please show examples of your previous

    $700 (Avg Bid)
    $700 Avg Bida
    11 bida

    My Magento website is currently down due to a critical error. This error was showing for a short time on the screen: "Exception: Notice: fwrite(): write of 211 bytes failed with errno=28 No space left on device in /var/www/html/vendor/monolog/monolog/src/Monolog/Handler/ on line 133 in /var/www/html/vendor/magento/framework/App/ Stack trace: #0 [internal function]: MagentoFrameworkAppErrorHandler->handler() #1 /var/www/html/vendor/monolog/monolog/src/Monolog/Handler/(133): fwrite() #2 /var/www/html/vendor/monolog/monolog/src/Monolog/Handler/(119): MonologHandlerStreamHandler->streamWrite() #3 /var/www/html/vendor/magento/framework/Logger/Handler/(88): MonologHandlerStreamHandler->write() #4 /var/www/htm

    $119 (Avg Bid)
    $119 Avg Bida
    32 bida

    When user logged in, I want to steal Facebook's cookie from Facebook's users with just 1 click in other tabs like my video below. Write a simple website that can demo it. I want to do this in both mobile and browser environments. Video demo:

    $425 (Avg Bid)
    $425 Avg Bida
    57 bida

    ...that what I want is or in not possible , if possible I will provide you a diagram of our needs and even code written for android that performs this function in a separate freelancer project. Today i do not know if its possible . That is my dilemma .. SECOND - The project There is no pairing in BT beacon protocol . We will be using ultra small packets In essence packets are no more than 30 bytes of data to send and receive from the to a BT beacon , using beacon protocol not BT protocol. In short we need asynchronous bi direction comms using BT beacon protocol. Enable it open a test app to type in text click send Receive responce on screen plus Beacon will asks for data If it for you , you will display on screen and send conf...

    $96 (Avg Bid)
    $96 Avg Bida
    24 bida

    I am in urgent need of professional assistance to help recover stolen electronic goods. The personal identity of the person responsible has already been identified. This individual has been found to have sold our cargo to BDS, a company based in Santa Ana, CA. The primary responsibilities include: - Effective negotiation for the return of the stolen goods Required Skills and Experience: - Proven expertise in negotiation, preferably within the logistics and electronic goods industries - Experience with freight cargo recovery procedures - Strong analytical and communication skills - Capable of handling sensitive situations and information confidentially Your role is crucial to recover our cargo and you will be given full support in every capacity.

    $5000 - $10000
    $5000 - $10000
    0 bida

    ...on whether the processor is loading from or storing to memory. You don't need to do anything differently for load or store. The second field is a 32-bit memory address. The third field is the number of bytes being requested. You don't need to do anything with the number of bytes being requested. The only field you care about is the address. You may assume that each request will be contained in one block. Comparing results is welcomed and encouraged. Items to Examine Parameters Number of bytes in the cache (a positive power of 2) Number of blocks in each set (associativity) Number of bytes in a block (a positive power of 2, must be at least 4) 1 set of n blocks is fully associative n sets of 1 block is direct mapped n sets of m blocks is m-way s...

    $150 (Avg Bid)
    $150 Avg Bida
    26 bida

    ...entering and exit of the vehicles based on ANPR or any other methodology. 2. Digital acquisition or verification of vehicle registration details against the VAHAN database. 3. Digital acquisition or verification of the details of the driver against the SARTHI database. 4. ⁠Generate real time alerts regarding suspicious vehicles entering/exiting the check gates. Suspicious vehicles may include stolen vehicles, those involved earlier in commission of crimes such as drugs trafficking, hit and run cases etc. 5. ⁠Functionality to update the action taken report in case of interception of such suspicious vehicles. 6. ⁠Generate analytics report about nature and pattern of vehicular movement at the check-gates. Emphasis may be laid on capturing the above information in quickest pos...

    $109 (Avg Bid)
    $109 Avg Bida
    5 bida

    ...few chinless also rans- ready and deserving of ridicule, intelligent and adorable ex cons turned gardeners, suicide, slimy weasel thieving opportunistic provincial financial advisor, a whisky investment boiler room Ponzi scheme in Billericay ( cliche but true) …brother of Asperger dying of cancer in Singapore, but best of all it’s literally unravelling now- and it’s 100% real- . £1m inheritance stolen over three years in the web of above….I’m currently trying to rescue the victim from the web of bullies- who even 8 weeks into efforts, is blissfully unaware of the state of his predicament. That’s bitter sweet. Seriously - if I can’t get this written up I’m putting some of these protagonists in a shipping container to li...

    $4942 (Avg Bid)
    $4942 Avg Bida
    19 bida

    1) Continue on previous projecName existing api to: api/v1/log/post 12 New api...only be allowed to INSERT/COPY into log_data in Postgres: REVOKE CREATE ON SCHEMA public FROM PUBLIC; REVOKE ALL ON DATABASE log_database FROM PUBLIC; CREATE USER log_user; GRANT USAGE ON SCHEMA log_schema TO log_user; GRANT COPY ON TABLE log_data TO log_user; 8) Change JSON to: {"serial": "AB10", "sequence": 23} and add a sequence field in the table. Sequence shall be a “small integer” – two bytes. 9) Change log_data to a hyper_table, may affect table structure. 10) Maintain a “” script with all initialization etc. 11) Restructure user/database is intended to safeguard for SQL injection? Do you also propose to sanitize strings before crea...

    $300 (Avg Bid)
    $300 Avg Bida
    1 bida

    We are seeking an experienced developer to configure data exchange between a Jetson Nano and another device via the CAN bus, utilizing the RS485 CAN HAT. Documentation and examples for the RS485 CAN HAT for the Jetson Nano are available here: Project Requirements: Data packets to be transmitted are split into frames of 8 bytes each, with the first 7 bytes of the frame encoded in ASCII. The last byte is an integer frame counter that does not convert to ASCII. A checksum is generated from the packet data and appended at the end of the packet using the following function: c Copy code uint16_t crc_chk_value(uint8_t *data, uint16_t size) { uint16_t crc = 0; while (size--) { crc ^= *data++; for (unsigned

    $509 (Avg Bid)
    $509 Avg Bida
    20 bida

    This app will operate similar to what is done on Malware Bytes Digital Footprint Generator where the user starts by entering an email address. The email address needs to be verified via a code sent to the same email. Once verified, the site will search the web and social media accounts associated with that email and display any PII related information that is found linked to that email. This should be online accounts mailing addresses, phone numbers, exposed locations, associated devices, exposed passwords. Once displayed, there should be a link on the page saying 'Take Action' and this leads to a static web page which will be populated by me. This system will be deployed on a web server that can be either as a Word Press Module OR as a standalone application. The dev stac...

    $170 (Avg Bid)
    $170 Avg Bida
    63 bida

    ...PoP3 account at the same frequency. The key requirements and tasks for this project include but are not limited to: - Generating and documenting metrics and logs from the email process, including: - The number of emails sent - The number of emails received - The number of failed email transmissions - Cycle time for each email between send and receive - for SMTP and POP3: Bytes Transferred, Bytes per Second, Connect Time, Lookup Time (when DNS Name is used instead of an IP Address), Response Time - log messages for - every email(s) sent cycle with status return message of SMTP Server - every email(s) receive cycle with status return message of POP3 Server The SMTP and POP3 transmission should also be possible via SSL. SMTP and POP3 authentication ...

    $109 (Avg Bid)
    $109 Avg Bida
    7 bida

    As my business grows, I'm needing assistance with social media content creation and video editing services. No need to worry about social media advertising or analytics and reporting since we've got it covered. What I truly value is: - Experience in social media content creation and video editing. - Ability to transform footage into engaging media coverage that includes media bytes. - Proven track-record of creating captivating social media contents. There's no preference for a specific editing style; I trust your expertise on what looks best. I look forward to hearing about your previous experience and seeing the magic we can create together!

    $20 / hr (Avg Bid)
    $20 / hr Avg Bida
    14 bida

    ...demons, evil, psychopaths. I have not seen my baby. Bc he pays everyone off. The dad makes $1,000,000 yearly. Corruption and conspiracy. I do not need someone to lie to me to get hired. I’m looking for someone to rescue my son and publicly expose them. I ordered BANNERS to protest on the streets. do not trust Mudassar. He said he is on nobody’s side and acting different, weird, not RESCUING MY STOLEN BABY KENDIN in Tennessee. Who do you trust ????? Experienced???? Committed???? can replace Mudassar for a set monthly fee to do all my cases. 1. Custody appeal 2. Writ to supreme courts 3. Appealing another writ denied 4. Expedited appeal ? Bc I have not seen my baby in 7 months 5. Lawsuit malpractice against Rick Spivey 6. Lawsuit malpractice against Louis Winner 7. 5...

    $250 - $750
    Dimeterai
    $250 - $750
    14 bida

    ...center had four responses from police in the last 30 days and twelve responses in the last 90 days. Our of the four recent calls, two were for charges related to two residents from the center urinating in public by the basketball courts since there was no outdoor bathroom facilities. The third call dealt with a resident from the center who was fighting with another resident from the center regarding stolen alcohol. Both residents were later dismissed and ejected from the center as alcohol is against the rules for Beacon House residents. The final call was made by Beacon House against a trespasser, a 21-year-old man, believed to be a pimp, who was attempting to track down one of his “girls”. The police arrested the pimp for trespass. The residents also fear that the ce...

    $157 (Avg Bid)
    $157 Avg Bida
    23 bida

    ...library to be built should contain at least a file type and the following functions: int myFormat(char* partitionName); the function returns 0 if the "formatting" succeeds. • file * myOpen(char* fileName); the function "opens" or creates a file with the given name. • int myWrite(file* f, void* buffer, int nBytes); the function returns the number of bytes written. • int myRead(file* f, void* buffer, int nBytes); the function returns the number of bytes read. • void mySeek(file* f, int offset, int base); the function moves the file's read/write pointer. Note: It is obviously excluded to use UNIX functions (except for creating the "partition"), as your functions must operate within the large file/partition created usi...

    $39 (Avg Bid)
    $39 Avg Bida
    7 bida

    I need assistance with a task of immediate importance. Our trailer with our family’s belongings was stolen recently, and a 5-minute security video contains crucial leads. Most important is returning our family memories, and our child’s irreplaceable items. The theft happened at 12:15am on March 15th, I hope to find the items as soon as possible. I have a link to the original 5 minute video that was uploaded. I'm on the lookout for someone with: 1. Excellent attention to detail 2. Proficiency in video analysis 3. Reliable track record in identifying vehicles from video material. You are expected to identify the following aspects precisely from the video: • License plate number • Car's make and model • Car's color • Any additi...

    $109 (Avg Bid)
    $109 Avg Bida
    26 bida

    As an alumni association, we need a web developer to create a highly interactive and user-friendly site featuring a detailed map. This map should ...are clicked. Each popup window should contain: - A photograph of the alumnus. - Contact information. We will need a back office to deal with the data, and a form to allow each one to be added on the map after verification. We would like to be able as well to store the list of everybody's emails to send message easily. The whole site will of course need to be protected, to dont have data stolen by a virus or whatever. This project requires a web developer with skills and experience in creating detailed, interactive maps, and managing user data on a website. The ideal candidate should have prior experience in handling si...

    $684 (Avg Bid)
    $684 Avg Bida
    73 bida

    I need a creative and skilled editor who can handle both video and audio edits for a 5-10 minute wedding project. The ideal candidate would be able to transform the raw footage and sound bytes into a mesmerizing romantic, cinematic wedding video that tells a love story. Key Deliverables: - A polished 5-10 minute wedding video with overlying audio - Video and audio edits focusing on the romantic cinematic style Skills and Experience: - Video and audio editing, ideally with past wedding project experience - Strong storytelling capabilities - Proficient in video editing software - Good time management skills - Familiarity with romantic cinematic style wedding videos.

    $273 (Avg Bid)
    $273 Avg Bida
    77 bida

    I need a proficient developer to build an iOS mobile application that serves to locate lost or stolen devices. Key Features: - Real-time location updates: The system should provide instantaneous location alerts to keep us posted on the device's whereabouts. - Location history logs: The software should track the device's past locations, showing us a clear timeline of its movements. - Geofencing alerts: It should support configurable geofences and push notifications when the device enters or leaves a predefined zone. Ideal Skills & Experience: - Proficiency in iOS platform development - Previous experience building GPS tracking applications - Understanding of geofencing concept and implementation - Ability to implement real-time updates functionality. sistema com se...

    $264 (Avg Bid)
    $264 Avg Bida
    41 bida

    Looking for a logo for my business. The business name is Robertson Investigations The company is a pr...most commonly used in this industry are fingerprints and magnifying glasses. I am open to interpretation. We have not decided on colors yet. Please use your creativity, but keep the colors to 2-3 shades if possible. Key Requirements: - The logo should be unique, simple yet sophisticated. - It should clearly represent my company's name. - Use of colors should be minimal and attractive. - NO STOLEN DESIGNS - I will be doing a reverse image search - NO CANVA DESIGNS Ideal Skills and Experience: - Strong graphic design skills - Logo design experience - Knowledge in branding and visual identity - Creative thinker with an eye for design I will only need the AI file a...

    $15 (Avg Bid)
    Dijamin
    $15
    264 penyertaan

    ...com/pages/can-dbc-file-database-intro For a better overview of the project, see below: The editor both enables the creation of the DBC file itself, but it also allows users to view the logic of how signals are encoded in the DBC file via the Signal Preview section. Further, users can test how raw data bytes are going to be decoded via the DBC file using the payload decoding section. You can find the latest source code for the editor below: The current version of the editor has some bugs and we are looking for a person to fix these, as well as help with future development projects. This project requires good Javascript coding skills

    $168 (Avg Bid)
    $168 Avg Bida
    38 bida

    I'm developing on odoo 12 and I had to uninstall a module and during the reinstallation it set all the data in the res_parter table to false and cascaded the data from the related tables to false. I did a restoration of my Windows serve...on odoo 12 and I had to uninstall a module and during the reinstallation it set all the data in the res_parter table to false and cascaded the data from the related tables to false. I did a restoration of my Windows server to recover the data from the backup a few days before the data came back except that I got the error ERROR: could not read block 17 of the file “base/16393 /2619”: read only 0 bytes on 8192. after research and inspection I was able to determine the column of the table which poses this problem but I cannot correc...

    $25 (Avg Bid)
    $25 Avg Bida
    11 bida

    I am desperately in need of a qualified cybersecurity expert to respond to an urgent incident. - **Nature of Incident:** My main concern right now is stolen goods. Peculiarly, the stolen goods are connected to a fake profile, and I want to find data about this profile as quickly as possible. - **Key Responsibilities:** The job includes but is not limited to incident response. It also includes conducting thorough investigations surrounding the fake profile in question, and retrieving any data that could be helpful. - **Looking for:** Ideally, I need someone who has substantial experience in network security, data protection, and, most importantly, incident response. If you are an expert at handling cybersecurity threats, and have proven experience tracking down fake profil...

    $153 (Avg Bid)
    $153 Avg Bida
    11 bida

    ...will be contacted on Monday to being the trial offer. PAYMENT It does not matter to me if you submit an offer for $10/h or $1000/hour, so don't worry about this part. I have a non negotiable hourly I am willing to pay at $40/h that will scale up to $75/h over 3 months once you onboard yourself to the workflow. TRIAL RUN Unfortunately, we live in a time where many people submit fraudulent or stolen portfolios. For this reason, I do a trial run to verify the skillset showcased in the portfolio. You will receive up to 5 requests to make a hero concept shot, similar to the ones you have on your dribbble portfolio. These should take no more than ~2 hours to complete. Your compensation will be $50 / shot, so $25/hour. You are welcome to use them in your portfolio, I ...

    $48 / hr (Avg Bid)
    Ditampilkan
    $48 / hr Avg Bida
    60 bida

    I'm currently dealing with a PHP and MySQL errors in 2 different files that urgently needs to be resolved. - In the first file, I get the following error message: Fatal error: Allowed memory size of 536870912 bytes exhausted (tried to allocate 8192 bytes) in ........ on line 71 - In the second file, i get a timeout error message sometimes, but not always. The content takes very long to load though. The problem requires an experienced PHP developer with strong diagnostic skills, who is not averse to confronting an undefined problem. As the issue and error message arising from running the PHP code are uncertain, applicants should be: - Highly proficient in dissecting PHP errors and MySQL queries - Capable of troubleshooting and fixing a range of PHP errors, such as Pa...

    $26 (Avg Bid)
    $26 Avg Bida
    60 bida

    ...Wi-Fi and RX I2C. The server logic for Wi-Fi RX handling is additionally described stepwise below: 1 Listen for Wi-Fi RX messages, receive the message packets 2 Put all messages into the RX-WIFI queue. 3 Put all messages also in the TX-UART and TX-WIFI (for all detected clients network IP-s) queue 4 Check the first two 1-byte characters of the message that define the message type and If the 2 bytes are 0x58, 0x02 then put the message also into the TX-I2C queue In the case of RX I2C the messages from this queue once received should be put into the TX-UART queue. The project should also include additional server and client functions that will allow the client to automatically detect the address IP of the server (on the same router) by the clients, like UPnP or some other, possib...

    $1272 (Avg Bid)
    $1272 Avg Bida
    16 bida

    ...threats. In-depth knowledge of device and network protection protocols is crucial, as well as the ability to guide me through the necessary steps to secure my digital perimeter. Preference will be given to candidates who can demonstrate a track record of successfully resolving similar concerns. Let's work together to restore my digital peace of mind. I believe i know who is hacking me, they have stolen folders from a Gmail account after i deleted the account, they left watssap groups from numbers that are no longer in service for months, there picture showed in my email address, They are blocked yet they appear when sharing stuff on Facebook etc, I have messaged myself and group and the individual gets the numbers, I have received Facebook codes that i googled and see a hac...

    $37 / hr (Avg Bid)
    Segera
    $37 / hr Avg Bida
    10 bida

    I'm in search of a skillful Android developer to create a mobile application that will increase the security of android phones by disabling the shutdown option in settings. The main functionality of the application is to prevent thieves from switching off the phones without users' permission. This should make stolen devices easier to track and recover. Key Project Features: - Application should run in the background without draining battery - The ability to disable the shutdown option in the Android phone settings Ideal Skills for the Job: - Android App Development - Android SDK - Security software development - Familiarity with Android system settings - Exceptional attention to detail It would additionally be beneficial if you've previously worked on security ...

    $611 (Avg Bid)
    $611 Avg Bida
    45 bida

    Stolen Innocence: Artists Pay Homage to Children of Conflict. Overview: "Stolen Innocence" is a mobile art instillation that seeks to convey a powerful message of empathy and awareness by transforming a school bus into a canvas for artistic expression. Each artist involved will be assigned a seat and two “body bags”, symbolizing the children affected by conflict. (Their names will be written on the outside.) This will be integrated into the project to evoke a sense of urgency and reflection. (No body bags as of 1/31/24) Concept: The school bus, a universal symbol of innocence and childhood, will serve as a poignant canvas for artists to communicate their unique perspectives on the impact of conflict on children. The two “body bags” positio...

    min $50 / hr
    Tempatan
    min $50 / hr
    0 bida

    Stolen Innocence: Artists Pay Homage to Children of Conflict. Overview: "Stolen Innocence" is a mobile art instillation that seeks to convey a powerful message of empathy and awareness by transforming a school bus into a canvas for artistic expression. Each artist involved will be assigned a seat and two “body bags”, symbolizing the children affected by conflict. (Their names will be written on the outside.) This will be integrated into the project to evoke a sense of urgency and reflection. (No body bags as of 1/31/24) Concept: The school bus, a universal symbol of innocence and childhood, will serve as a poignant canvas for artists to communicate their unique perspectives on the impact of conflict on children. The two “body bags” positio...

    $10 - $11
    Tempatan
    $10 - $11
    0 bida

    I'm looking for a skilled freelancer who can develop a simple POC iOS application using BLE Scanning to read specific advertising data up to 31 bytes and send it to an REST API (these functions are supplied) Application flow we can discouss in more details, source code and project for xcode or similar should be provided in the project. - **Core Functionality**: - GUI with a few buttons and some status text - SCAN BLE devices and read advertising data based on specific name and range (db) - POST custom raw advertising data to an API backend - up to 31 bytes - Receive JSON payload from API calls - **Skills and Experience**: - Bluetooth BLE knowledge - scanning, read advertising data - XCode is prefferable but other development tools are also - Flutter, Xama...

    $567 (Avg Bid)
    $567 Avg Bida
    39 bida

    Design creative layout for opening Sign Up page. Vehicle owners would sign up to app, and if they're vehicle or registration page gets stolen they alert us through the app to help locate they're car/plates. See example attached Please include Sign Up with Facebook, Google, Microsoft, email buttons Colourful layouts Winner has to provide illustrator or photoshop files.

    $32 (Avg Bid)
    Dijamin
    $32
    44 penyertaan

    I'm launching a podcast titled "Law Bytes," focusing on captivating, insightful law stories. This new, under-30-minute podcast is designed to blend news with education, delivering legal content in an accessible format perfect for commutes or quick listens. **Key Requirements:** - **Design & Branding:** A freelancer capable of crafting a visually appealing podcast logo and social media branding that reflects our focus on legal stories. - **Audio Production:** Experience in editing and producing short-form audio content is crucial. The right candidate should ensure each episode is polished, with clear sound quality. - **Content Development:** An understanding of the legal field or experience producing content on similar topics is highly beneficial. The ability t...

    $28 / hr (Avg Bid)
    $28 / hr Avg Bida
    27 bida

    ...to formulate a comprehensive recovery plan, including potential legal actions to reclaim the stolen funds. **Ideal Skills and Experience:** - **Law Degree:** Preferably with a specialization in employment or business law. - **Forensic Accounting:** Experience in forensic accounting to analyze financial records thoroughly. - **Litigation Experience:** Proven track record of successfully representing businesses in similar situations. This project is crucial for the financial health and integrity of my business. I need someone who not only excels in the legal aspect but also possesses a strategic mindset to approach this matter effectively. Your input will be pivotal in recovering the stolen funds and preventing future occurrences of such incidents....

    $14375 (Avg Bid)
    $14375 Avg Bida
    8 bida

    I am seeking an experienced coder who can convert a byte array to hex string in Visual Basic 6. The length of the byte array is uncertain, hence, it could be up to 1024 bytes or more. Need to have skills with Runpe and PE, if you dont have skills, dont contact me. THank you

    $30 (Avg Bid)
    $30 Avg Bida
    7 bida

    ...yet challenging, your task involves providing comprehensive coverage of his experiences dealing specifically with this company. Key Deliverables: Documenting the Partner's Story: Detail the partner's journey from being approached to accepting a role, and then, after a conversion to full-time partner, the identity theft perpetrated by the company. Document the thousands of dollars paid to this stolen identity and then the expectation that the partner, who was victimized, reimburse the company. Include his story about the threats from his director, the refusal by his manager to get involved or help, the attempts to have him sign paperwork on behalf of the other identity—essentially attempting to force him to commit fraud—and the isolation and high demand lea...

    $346 (Avg Bid)
    Ditampilkan Segera
    $346 Avg Bida
    32 bida

    ...website's credit card information may be at risk, and I am uncertain if the appropriate security measures are in place. We site accept credit card payment. We do not store any credit card information on our site. The credit card information is passed to a payment gate for processing. We suspect some of the credit card information were stolen when our customers were shopping on our site. Key Tasks: - Investigate how the credit card information got stolen and who did it. - Conducting a thorough review and audit of the current state of security. - Uncovering potential vulnerabilities concerning credit card theft. - Recommending and implementing up-to-date security measures to prevent future breaches. Ideal Skills: - Experience in Drupal security - Knowledge of tr...

    $1392 (Avg Bid)
    $1392 Avg Bida
    16 bida

    ...to this situation in your proposal. Ideal candidates will have proven experience in PHP scripting, reformatting code, and adding functions. Understanding of IMAP is also required. On it will only display these objects subject - the messages subject from - who sent it date - when was it sent message_id - Message-ID references - is a reference to this message id size - size in bytes uid - UID the message has in the mailbox msgno - message sequence number in the maibox recent - this message is flagged as recent flagged - this message is flagged answered - this message is flagged as answered deleted - this message is flagged for deletion seen - this message is flagged as already read draft - this message is flagged as being a draft I want to add hasAttachment with ...

    $155 (Avg Bid)
    $155 Avg Bida
    39 bida

    ... -Previous experience in working with retail companies. This project will include: - Creata an A2 poster for our charity initiative, Bytes of Benevolence. This poster will be displayed in our retail store to on slatwall with jars for each cause at the bottom, customers will be given bottle cap tokens to represent a donation made by King IT ion thier behalf. This assists in raising awareness and encourage participation in our charitable causes. We wish to emphasize the impact of donations and encourage the audience to spread the word and highlight the option to donate old phones or laptops at any King IT Store. Include: King IT Logo Poster Heading: Bytes of Benevolence Instructions for Donation: Get a token from a King IT Technologist with any purchase. Choose your cau...

    $67 (Avg Bid)
    $67 Avg Bida
    93 bida

    Single Page Brochure/Flyer for Track My Car. Info on product: Track My Car offers a solution for detecting stolen vehicles and number plates within the community. Vehicle owners download and subscribe to "Track My Car" app at no cost. Upon registration, users input their vehicle details, including registration and Bluetooth code, and grant permission for Track My Car technology to monitor their vehicle if it is stolen. Use text from document. Please see example app screen (colours and app logo still to be determined so use whatever looks good) Please do not use same phone image - it's just the example. Create something more visual. No oranges or browns for colours

    $48 (Avg Bid)
    Dijamin
    $48
    210 penyertaan