Tapis

Carian terbaru saya
Tapis melalui:
Bajet
hingga
hingga
hingga
Jenis
Kemahiran
Bahasa
    Status Pekerjaan
    1,295 decrypted tugasan ditemui, harga dalam USD

    ...Key signed DFU over USB. So the sequence will be as follows. A binary file on a PC is encrypted using a Private Key to create a DFU The DFU will be loaded on the MCU and decrypted using Public Key. (Probably using the STM example DFU tool) The Bootloader is re-flashed with the contents of the DFU (It can be the same code but with a different version

    $3166 (Avg Bid)
    $3166 Avg Bida
    16 bida

    I need a good cracker who can decrypt the hash that i decrypted from my data file, its bitcoin wallet by bitcoin core. Please no time wasters. I would see your portofolio first, skills and ability to the work. If you can't do please don't waste your time to bidding. Note : i wont give you the [log masuk untuk melihat URL] ONLY hash that i crypted frorm [log masuk untuk melihat UR...

    $534 (Avg Bid)
    $534 Avg Bida
    5 bida

    Hi I need someone to reverse engineer a specific game's requests to its server. The end goal is to be able to...like. PS: This is an android game, so you should have experience reverse engineering parts of android games. PPS: This is not HTTPS/SSL encryption - that part is already decrypted. you have to drag a jigsaw in a hole to complete the picture

    $273 (Avg Bid)
    $273 Avg Bida
    6 bida

    Here is the deal : 1) Please follow the link to find two excel files: [log masuk untuk melihat URL] 2) Find the password of the excel file or Decrypt the excel files 3) PM me once you have decrypted the file, the job will be assigned to you 4) Provide me with the password or decrypted file 5) Payment completed

    $28 (Avg Bid)
    $28 Avg Bida
    16 bida

    I require an encrypted eSignal EFS file to be decrypted please. The password has been misplaced.

    $155 (Avg Bid)
    $155 Avg Bida
    1 bida

    ...the basic functionality works, no errors. But there is a problem with decryption. We encrypted the text file in 2 bytes with two additional rounds. And it's encrypted and decrypted. Then we started encryption-decrypting a small file in a loop. 10 thousand iterations. up to 2000-3000 iteration everything works fine. Then the BadPaddingException error

    $544 (Avg Bid)
    $544 Avg Bida
    13 bida

    ...accounts, multiple cases along with Nodes, Links and attachments. It will require a monthly subscription for users and all data needs to be encrypted when stored in the DB and decrypted on retrieval. Users will need to have varying permissions and an owner of a case will need to be able to invite others to share the case and collaborate. The app will make

    $4 / hr (Avg Bid)
    $4 / hr Avg Bida
    7 bida

    Hi sudhanlogics, please advise if you can decrypt .combo ransomware files. I have some files that I need decrypted.

    $87 (Avg Bid)
    $87 Avg Bida
    1 bida

    I have the public key but not the rest. Will be needed twice a month but i need a quick turn around of 12-24 hours. Basically, im computer illiterate and need help.

    $21 / hr (Avg Bid)
    $21 / hr Avg Bida
    8 bida

    Wordpress Plugin Custom Work We have a need for some small changes on a Wordpress plugin. I have id...parts of his assigned task, but want him to see the first/last name of other customers simply as “customer”. - setup the storage of one database field to be encrypted (and decrypted upon export) -setup Wordpress and SendinBlue transactional email

    $363 (Avg Bid)
    $363 Avg Bida
    58 bida

    ...in cloud [log masuk untuk melihat URL] a video is uploaded in the cloud via AWS then it needs to be compressed and encrypted before storing it and a unique key needs to be generated to be decrypted by the [log masuk untuk melihat URL] another user stores a video then that compressed video needs to be matched with all existing videos in the [log masuk untuk melihat URL] that matches then ...

    $430 (Avg Bid)
    $430 Avg Bida
    7 bida

    ...recover password screen 2: signup : email, password, first name, last name screen 3: email confirmation screen 4: main screen: has inbox, when user clicks an email, it is decrypted and displayed in message area. He can click reply and compose, and when SEND is clicked, first encryption happens and then message goes. Compose new email button creates new

    $417 (Avg Bid)
    $417 Avg Bida
    5 bida

    ...string for which I know the value of the first 200 will be after decryption. I will pay for the decryption method. To not waste my time, include the first character of the decrypted string in your bid (I know what it is) Here is the first 200 characters of the encrypted string for which I need the method to decrypt: cd0ee7c3fa920f74cbe3104ab02e5bee

    $43 (Avg Bid)
    $43 Avg Bida
    4 bida
    Trophy icon Logo Design Contest Tamat left

    ...any proof of stake blockchain system. We use the word Zeta because it is huge (like Google is 10^100, Zeta is 10^21) and hash refers to an encrypted text that needs to be decrypted, and you have to process billions of these each second to get the solution right to make a block. So, tremendous processing power. Hence, ZetaHash. We want to convey: security;

    $260 (Avg Bid)
    Dijamin Peraduan Teratas
    $260
    311 penyertaan

    ...for the key. We need to use some of the 80 bits available from the key to use as a customer number. So we want to remove 8 bits from the Checksum for any key generated or decrypted after today's date. The Date is included as part of the License key generation. Hence if ([log masuk untuk melihat URL] > August 7th 2018) use_24_bit_checksum(); else { use_32_bit_checksum();

    $33 (Avg Bid)
    $33 Avg Bida
    7 bida

    ...Decrypt the key: ➢ System should allow customer to be able to see existing keys. ➢ Once the key has been selected and decrypted, system should be able to purge it from the database. ➢ System should let user copy and save the decrypted key. 6. System should not allow to login if connected to internet and display message to user that they need to go offline

    $698 (Avg Bid)
    $698 Avg Bida
    48 bida

    This project is for an a...Dropbox, Google Drive, and iCloud for data storage - Splits data in uneven portions - Assemble data that can only be viewed within the application - Track data encrypted and decrypted through Application - Store application on server or locally - Password protect and two factor authentication to access application Thank you

    $466 (Avg Bid)
    $466 Avg Bida
    6 bida

    This project is for an a...Dropbox, Google Drive, and iCloud for data storage - Splits data in uneven portions - Assemble data that can only be viewed within the application - Track data encrypted and decrypted through Application - Store application on server or locally - Password protect and two factor authentication to access application Thank you

    $749 (Avg Bid)
    $749 Avg Bida
    29 bida

    ...simple: if you can decrypt the attached sample files then I will reward you the project and forward the full list of files within the project. once all the files are fully decrypted and the project is compiling then I will pay the agreed fees Attachment 1 - is a list of few encrypted files Attachment 2 - is 2 encrypted files and the original working

    $351 (Avg Bid)
    $351 Avg Bida
    8 bida

    ...stuck at writing file to disk. The program crashes when writing decrypted tracks, because the size of the encrypted and decrypted samples are not the same. The problem is in [log masuk untuk melihat URL] in FragmentedSampleReader::ReadSample() after this comment : // Write initialisation & data into decrypted file. I have a official git repo : [log masuk untuk melihat...

    $28 (Avg Bid)
    $28 Avg Bida
    3 bida

    ...sequence counter value of receiver by the SC value of the packet plus 1. B also needs to calculate the hash value according to the decrypted data (SC and data segment) and then compare it with the one directly get from decrypted packet (comparison is required, but assume it always match). I need a program written in C++ Programming with two interfaces (one

    $45 (Avg Bid)
    $45 Avg Bida
    5 bida

    Functionality is needed for an existing ASP.NET web forms application to upload/download files that are encrypted/decrypted in the browser with JavaScript prior to uploading to the server. A form should be built that includes a file upload component that allows multiple files, unlimited file size, and has a progress bar. The component should use AES

    $525 (Avg Bid)
    $525 Avg Bida
    18 bida

    Per discussion, Use the open source email app called K9 as the main app, and then allow the user to Encrypt email messages and attachments using...email and attachments from the Inbox c) To read the email, open the Encrypted folder (enter a password) and then select the email to read. The email and attachments will be Decrypted so they can be read.

    $50 (Avg Bid)
    $50 Avg Bida
    1 bida

    ...description 1. Print a certain code on large format paper/canvas/etc… 2. Take a snap shot of the printed code 3. Send the snap shot (photograph) to an encoder to encrypt the decrypted message in the code and display it Challenges: 1. Our coding is done based on a specific color value which is encrypted in RGB (256^3 possibilities). When printed, photographed

    $198 (Avg Bid)
    $198 Avg Bida
    7 bida
    .net 3 project Tamat left

    ...a neat list of all derived Media objects (no Summary displayed) Search All Media by Title - a neat list of all objects with the search key anywhere in the Title (display decrypted Summary where available) Exit Program Continues to prompt until the user selects the exit option Error checking for user input The Main( ) method should be highly modularized

    $23 (Avg Bid)
    $23 Avg Bida
    3 bida

    We need whatsApp messages to be decrypted into .txt format for each user message in an instance of 10 minutes to export the data to our backend for storage purpose.

    $20 (Avg Bid)
    $20 Avg Bida
    4 bida
    cyber security Tamat left

    Part 1 • Input – A given text file for plaintext or ciphertext (a...5 letters – cycling pattern • n=3: M1,M3,M2,M3; M1,M3,M2,M3; • Output – Encrypted ciphertext or decrypted plaintext Part 2 • Input – A given text file for plaintext or ciphertext – A given depth of rail fence • Output – Encrypted ciphertext or decrypted...

    $40 (Avg Bid)
    $40 Avg Bida
    14 bida

    ...11.1 would it be possible to share audio?? without any lags or errors? 12 Window also needs a basic live chat feature for all participants in a classroom..(encrypted and decrypted using AES or any other fast way if possible). 13. Needs to be made in c#,uses webservices, and hosted on a web platform and other options as mentioned in the list above

    $163 (Avg Bid)
    $163 Avg Bida
    4 bida

    ...ioncube software and code igniter. Freelancer need to have knowledge in plesk linux. Freelancer need to decrypted ioncube software from our website www.musicfreelancer.net. We need all the file in [log masuk untuk melihat URL] that are encrypted to be decrypted and able to work on the file from other server. We don't know how many file is encrypted, but I would

    $105 (Avg Bid)
    $105 Avg Bida
    2 bida

    Hi, please, if you did not read everything, d...modify, you must create the client part for android, with similar graphics, optimized for mobile, if necessary I can send you the graphic files of the " client "for computers, decrypted, so you can adapt many of them, I mean characters, monsters, items, etc. If you need more information, please write me.

    $1658 (Avg Bid)
    $1658 Avg Bida
    12 bida

    ...more than X number of transactions. -Can customize the Merchant receipt and customer receipt on your own -Data is 3DES encrypted, only with a valid key can able to decrypted it (ON/OFF feature available) -All the passwords, approval codes, MID, TID all can be changed from settings menu. -All currency's are accepted on pos. -All POS's

    $538 (Avg Bid)
    $538 Avg Bida
    5 bida

    ...more than X number of transactions. -Can customize the Merchant receipt and customer receipt on your own -Data is 3DES encrypted, only with a valid key can able to decrypted it (ON/OFF feature available) -All the passwords, approval codes, MID, TID all can be changed from settings menu. -All currency's are accepted on pos. -All POS's

    $627 (Avg Bid)
    $627 Avg Bida
    5 bida

    Hi, what I am after is a PCB and software to be designed for an audio p...files with encryption. Idea is we have a PCB that is easy to load encrypted files to, and that has outputs for a range of amplifier and speaker options. The files are decrypted and then played, with software such as on an android app to control volume and files played etc.

    $350 (Avg Bid)
    $350 Avg Bida
    9 bida

    ...837A7E0D4400EBA2F0F7AF677F76ED83CA7D0013C58E4C636D9775C2E49DF14D5B956BE053AB12B44B7 only make rsa function decrypt for this values crypted in [log masuk untuk melihat URL] and re-insert decrypted value to source code boxkey and rsa crypted here R boxkey = 9FCBC6D445A99D0AE808F992F9091C8C1665D495AAEA1FAA736A041DF016D56A31386729A0BB32A02A3C61E6D5827586B216B43DBD

    $127 (Avg Bid)
    $127 Avg Bida
    3 bida

    ...When you run the decryption program, it reads the encrypted file and decrypts (or reverses) it and saves it to same filename but with an extension of ".dec" which stands for decrypted file. For example: The given input file is [log masuk untuk melihat URL] To run the encryption program: ./[log masuk untuk melihat URL] [log masuk untuk melihat URL] Its output will be: [lo...

    $40 (Avg Bid)
    $40 Avg Bida
    3 bida

    I am receiving Encrypted Data in an xml file. I need to pass that data and a key to Capicom on a Windows Server and receive the Decrypted Data on the Iseries.

    $1264 (Avg Bid)
    $1264 Avg Bida
    8 bida
    PhP Ecryption Tamat left

    I have a form and I want that one it is submitted data...submitted data from form to be saved encrypted in the mysql database. When a read information from database (on page X for example) (inserted through the form) they should be decrypted. I want to be able to change data on page X. I will provide more details on the chat. Maximum budget $60

    $82 (Avg Bid)
    $82 Avg Bida
    27 bida

    ...encrypted file, and then check if available in my server side by sending request to a PHP file with Header request, if exist then password will be returned and the file will be decrypted. The script is ready and have all things working well, need ony to add this changes on it. If you are good for this and you know what you have to do, bid forthis project

    $151 (Avg Bid)
    $151 Avg Bida
    9 bida

    i want a java program to hide text in an image using LSB and decrypt the text using MD5 the program WITHOUT interface the program w...program works as follows: encrypt function takes a string and encrypted using MD5 and hiding it in an image. decrypt function takes an image and return the hidden text that decrypted using MD5 and decrypt it.

    $22 (Avg Bid)
    $22 Avg Bida
    5 bida

    ...security algorithm(s). Your application should abide to the following specifications: 1. A GUI application where a user can write a message (String) to be encrypted/decrypted, and perform other relevant security functions. 2. The interface should allow the user to generate a symmetric-key, and then encrypt, and decrypt the messages. 3. The user

    $191 (Avg Bid)
    $191 Avg Bida
    20 bida

    Hi dimkazakos, I have two small php files encrypted with Ioncube, I want you to decrypted. i think encrypted with php version 5.4

    $15 (Avg Bid)
    $15 Avg Bida
    1 bida

    ...key is IvKVlyODk8I4VPhWosQtLw== I know the IV/Nounce is included in the chipher I want you to show me how I can decrypt the data. To know that you have successfully decrypted the data, some cipher text should contain "Game" when decryted, though most part of the actual message will not be in ASCII. Please bid only when you have solved the issue

    $548 (Avg Bid)
    $548 Avg Bida
    11 bida

    ...the same. Also the cipher blocks are all in different sizes and not in multiple of 16. I want you to show me how I can decrypt the data. To know that you have successfully decrypted the data, some cipher text should contain "Game" when decryted, though most part of the actual message will not be in ASCII. Please bid only when you have solved the issue

    $154 (Avg Bid)
    $154 Avg Bida
    7 bida

    Need help convert C++ function to kotlin The source is here [log masuk untuk melihat URL] I need to convert the function of ...DecryptStream to Kotlin function, In kotlin, I have a mutableList of Byte or Int and a Base64 string for key that i will put into that function and the function should return decrypted data. Need to work on it immediately.

    $147 (Avg Bid)
    $147 Avg Bida
    4 bida

    ...algorithm(s). Your application should abide to the following specifications: 1. A GUI application where a user can write a message (String) to be encrypted/decrypted, and perform other relevant security functions. 2. The interface should allow the user to generate a symmetric-key, and then encrypt, and decrypt the messages. 3. The

    $122 (Avg Bid)
    $122 Avg Bida
    6 bida

    ...algorithm(s). Your application should abide to the following specifications: 1. A GUI application where a user can write a message (String) to be encrypted/decrypted, and perform other relevant security functions. 2. The interface should allow the user to generate a symmetric-key, and then encrypt, and decrypt the messages. 3. The

    $38 / hr (Avg Bid)
    $38 / hr Avg Bida
    12 bida
    Edit RT.jar Tamat left

    I have a program with java inside and this program have encrypted classes... Need to edit [log masuk untuk melihat URL] and when this encrypted classes load dump this classes and decrypted classes in new file...

    $26 (Avg Bid)
    $26 Avg Bida
    4 bida

    I need to build a simple windows application that can read an encrypted ...java source code used to encrypt and decrypt the attachments. I have sample files that are encrypted which need to be decrypted. I have the key used to decrypt the files. File name: a140ab43950a0ae... is a zip file when decrypted Java files attached are original code.

    $467 (Avg Bid)
    $467 Avg Bida
    13 bida

    ...files File 1: multiline text file: needs to be encrypted/decrypted with a simple XOR cipher using the key-file given. File 2: Key text file: will be a file of size ranging anywhere from 10 bytes to 10 Petabytes, containing random bytes. Output: A new text file containing the encrypted/decrypted data from File 1 above. Caveats / Catches / Rules:

    $46 (Avg Bid)
    $46 Avg Bida
    9 bida

    ...IAT, EAT etc... ) - All functions which are virtualized with VM macros must be transformed to real x86 code which can be later analyzed - All encrypted strings should be decrypted This 3 conditions are obligatory. Please bid only if you have experiencewith Reverse Engineering. Message me and i will provide a download link for these files. Project

    $333 (Avg Bid)
    $333 Avg Bida
    4 bida