Corrupted trabalhos

Filtro

Minhas pesquisas recentes
Filtrar por:
Orçamento
para
para
para
Tipo
Habilidades
Idiomas
    Estado do Trabalho
    1,970 corrupted trabalhos encontrados, preços em USD
    PHP session problem Encerrado left

    ...permission) and it also didn'T solved the problem. So i beleive the problem is related to php itself and not the permissions. Note it was working fine before a server crash which corrupted part of a database and created that bug. What i need is someone to fix that problem. Either by explaining me how to fix it or doing it yourself. Though i admit i would prefer

    $22 (Avg Bid)
    $22 Média
    4 ofertas
    Data Recovery Encerrado left

    Good day, I need software to recover lost data from a Windows system. The software should salvage data from damaged, deleted, or corrupted volumes, and even from reformatted disks. It should performs an exhaustive scan of the volume to locate lost volumes. All available data in the lost volume should then be presented in an explorer-like view of files

    $1402 (Avg Bid)
    $1402 Média
    2 ofertas
    78728 script repair Encerrado left

    ...now receiveing internal server error on scripts related to my site! I checked permissions, and reuploaded a fresh set of files (in ascii) to ensure that they did not get corrupted in the move. I also checked the path to perl, but all seems in order. It is important that this get handled quickly, and I will need to know please, step by step the corrections

    $15 (Avg Bid)
    $15 Média
    1 ofertas
    Dialer software Encerrado left

    See attached word document and image (attached zip file was corrupted, I attached a new one) New information in new ZIP file (extra information) ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Installation package that will install the software (in ready-to-run

    $551 (Avg Bid)
    $551 Média
    22 ofertas

    I have a database (see attached) that has some primary keys and referential integrity setup. This, though, has led to some problems when data gets corrupted. I therefore want to change the way these databases are setup, though they currently have data in them that can't be damaged. I want to do the following (unless you have a better recommendation)

    $34 (Avg Bid)
    $34 Média
    9 ofertas
    Palm alarms / Midi Encerrado left

    ...handheld. The alarms should be able to be transferred to the palm as part of its usual sync, and we need to ensure the existing alarm database on the palm is not destroyed or corrupted, and can be backed up and restored if we need to alter it at all. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete

    PHP
    $77 (Avg Bid)
    $77 Média
    3 ofertas
    Screen shot Module Encerrado left

    ...bitmap to the jpg... And the jpg wiill be big enought that on a 56k modem, it's very laggy...We also have problem with the file transfer such that it will sometimes provide corrupted file... So we would like to outsource this module and get a third party to come out with a better solution like the sending of the data that has only been changed.. We are

    PHP
    $118 (Avg Bid)
    $118 Média
    16 ofertas

    We attempted to repair a [fazer login para ver a URL] file using eseutil /p and isinteg -patch (and the usual heroic measures). Data loss was catastrophic. Only two minor subfolders were recovered out of some 4000 contacts. It is Exchange 5.5. We run it on NT 4 6A The original file was about 56MEG and the "repaired" file turned out to be only 2MEG. The original records were all addresses...

    PHP
    $148 (Avg Bid)
    $148 Média
    3 ofertas
    VB Custom Dialer Encerrado left

    ...There are a few bugs in the program that need fixing. If the called modem does not answer, the program crashes, instead of skipping to the next boxid. If the data becomes corrupted and doesn't match parity, the existing system doesn't redial the box to attempt to retreive the missing data. We have the full source code and currently own full rights to

    $181 (Avg Bid)
    $181 Média
    21 ofertas
    Blowback software Encerrado left

    ...Format all*.xls spread sheets- make it fit to a page left to right; meaning when opening an xls sheet: • go to view and view page break you will see only horizontal blue corrupted lines and no vertical (each page formatted to individual pages ??" instead of multiple pages printed concurrently; and • print it on the appropriate paper (we use 8.5 x 11(LTR)

    $919 (Avg Bid)
    $919 Média
    17 ofertas
    CD emulator Encerrado left

    ...for a component that does three things. First, a method that copies all files from a CD Rom to a specific path on the hard drive. This must be able to even copy slightly corrupted files so CD's with Copy protection will still work. The parameters would be CD Drive, and path on hard drive. The second method would be to accept the path on the hard drive

    $395 (Avg Bid)
    $395 Média
    4 ofertas
    Fix code Encerrado left

    ...timeframe posted here. You will need to create a new access 2000 database and import the tables and fields into the new database. I believe that the current database might be corrupted. I will provide the source code to the chosen bidder only . You will receive all the project files, but remember you only need to correct what I stated above. I want this

    $7 (Avg Bid)
    $7 Média
    17 ofertas

    This project models an electrical communication system. The purpose of this project is to write a program to detect the transmitted signal in a signal corrupted with noise. By using dot products, array and pointer manipulation, you will locate the position of the signal. Additionally you will calculate the variance and the standard deviation of the

    $44 (Avg Bid)
    $44 Média
    5 ofertas

    ...in part I and part II. 1) You have to measure the loss rate of the forwarding agent. To make this measurement, you must send “long?? files and count the number of packet corrupted. These measurements must be performed using only the stop and wait protocol. 2) You have to measure the throughput of both protocols. For that, you must send a long file and

    $58 (Avg Bid)
    $58 Média
    5 ofertas

    Will be a VB application using Access Database which will hold about 2100 customers. Must re-index each time the program starts to not get Access Database Corrupted. Will need the followig fields in a VB form1 Account Number _________ Created On _________ - Need Date account was created on Last Name _____________ First Name _____________ Address #1

    $156 (Avg Bid)
    $156 Média
    33 ofertas

    ...Access 2000 db on a 6 computer peer-to-peer network. First off, sometimes when 2 folks simultaneously try to connect to the same table, there is an error and the database gets corrupted and I get an error stating the database is in an unrecognizable format. If I disconnect all users and repair the database, it then works again, until the next data crash (I

    $84 (Avg Bid)
    $84 Média
    15 ofertas
    i/o files simple!! Encerrado left

    ...Agamemnon Minerva Corrupted name: Dave Lister Rimmer Kryton A very general description of what you need to do is: [fazer login para ver a URL] the user to enter the input file name and an output file name. [fazer login para ver a URL] the corrupted Illiad file of the users choosing. [fazer login para ver a URL] in a line of text. [fazer login para ver a URL] the line of text for t...

    $19 (Avg Bid)
    $19 Média
    6 ofertas
    i/o files Encerrado left

    ...Agamemnon Minerva Corrupted name: Dave Lister Rimmer Kryton A very general description of what you need to do is: [fazer login para ver a URL] the user to enter the input file name and an output file name. [fazer login para ver a URL] the corrupted Illiad file of the users choosing. [fazer login para ver a URL] in a line of text. [fazer login para ver a URL] the line of text for t...

    $7 (Avg Bid)
    $7 Média
    2 ofertas
    project files Encerrado left

    ...Agamemnon Minerva Corrupted name: Dave Lister Rimmer Kryton A very general description of what you need to do is: [fazer login para ver a URL] the user to enter the input file name and an output file name. [fazer login para ver a URL] the corrupted Illiad file of the users choosing. [fazer login para ver a URL] in a line of text. [fazer login para ver a URL] the line of text for t...

    $4 (Avg Bid)
    $4 Média
    2 ofertas
    Help with files Encerrado left

    ...name: corrupted Achilles Dave Lister Agamemnon Rimmer Minerva Kryton A very general description of what you need to do is: Prompt the user to enter the input file name and an output file name. Open the corrupted Illiad file of the users choosing. Read in a line of text. Search the line of text for the three corrupted names. As you find a corrupted name

    $4 (Avg Bid)
    $4 Média
    2 ofertas

    Artigos da Comunidade dos Principais corrupted