Decrypt aes trabalhos

Filtro

Minhas pesquisas recentes
Filtrar por:
Orçamento
para
para
para
Tipo
Habilidades
Idiomas
    Estado do Trabalho
    2,000 decrypt aes trabalhos encontrados, preços em USD

    ...funções matemáticas; a ideia é trazer o recurso de multithreading e ser capaz de executar consultas como esses dois projetos fazem: e This project consist in improve and be able to use C++ in React Native to run task like multithreading, encrypt decrypt, process in general. I already have a POC that I'm able to run some tests like encrypt, decrypt, math functions, the ideia is bring the multthreading feature and be able to run querys like this two projects does: and

    $17 / hr (Avg Bid)
    $17 / hr Média
    8 ofertas

    Freelance para realizar uma certificação, entre servidor Equinix e B3 (Mercado Bovespa). O projeto é, s...Equinix e B3 (Mercado Bovespa). O projeto é, somos clientes da B3, e para finalizar a parceria com eles, temos que configurar nosso servidor e link dedicado de internet junto as Apis deles. Temos todos os manuais e suporte da B3 para o complemente de informação e execução do job. Requisitos de conhecimento em Linux e Redes. - Suporte a IPSec. - Suporte à NAT (se necessário). - Suporte à criptografia AES-128 e 3DES. - Suporte ao algoritmo SHA-1. - Suporte ao GRE (Generic Routing Encapsulation). - Suporte à PIM-SM (Protocol-Independent Multicast Sparse mode). Contato: Luis Granado [Removed by Fr...

    $5 / hr (Avg Bid)
    $5 / hr Média
    2 ofertas

    ...mensagem codificado com AES para um dispositivo ESP32, porém não estou conseguindo fazer a rotina de decodificação. Segue a mensagem: cZhQI2vvcqKO9YWwFPCEYyL/2DuNdafHuUYJ5LJuSFghC8CQkjyLbFL5RM+nb58QAX2x1JW0GvO3sBXEhixa8nPIhvkFevftUvhEt8+flRCA0444xataKcnRIYxMcpQiPay9tTTk2Mwqs27UnzPa9ZGTFV2HQAVoAygm1F51N6DWYX5hI8LeyKICukJSFbyTmSpdDyFuygQm712vK1Q3Wod0uYRXDZMaMTEvb9lp1hAS8ssjqpbbNHdXwo0t8mphmY/vvEZZetcEMl2sJa6Wutnb8qZ/HCFevsCmxC56SRk0/dZNQlm4sFJSoWiEgeOIVzER03CDYO7AHJZOLIkBqg== Segue o código feito para ESP32 que precisa ser finalizado: void decrypt(String value, char* output) { int length = () + 1; char decoded[length]; decode_base64((unsigned char*)value.c_str(), (unsigned char*)decoded); strcpy(output, decoded); // Adicionar ...

    $77 (Avg Bid)
    $77 Média
    1 ofertas

    Criar em GOLANG e em JAVASCRIPT um pequeno app com função criptográfica GPG da seguinte forma: func GPG_Generate_Keys() { ... return PrivateKey and PublicKey } func encrypt(text, PublicKey) { ... return encryptedcontent } func decrypt(encryptedcontent, PrivateKey) { ... return text } é um app com versão de código fonte em GoLang e em Javascript, com as mesmas funções

    $280 (Avg Bid)
    $280 Média
    2 ofertas
    Write some Software Encerrado left

    Tenho um jogo que contem uns arquivos .kom compactados com zlib. esta tool, compacta e descompacta eles. na pasta KOM ZLIB tem o tool que compacta e descompacta somente com ZLIB na pasta KOM ZLIB+AES tem o tool modificado para usar aes+zlib A função do c++ que le os kom zlib esta em anexo então seria adicionar o AES com as chave decrypt no codigo c++ O nome da função é Komfile::Open no arquivo que está em anexo

    $14 / hr (Avg Bid)
    $14 / hr Média
    2 ofertas

    Projeto player de vídeo que possa ler arquivos criptografados em um ficheiro (exemplos: AES, Triple DES, Rijandel, Blowfish, DESX, Cast 128, Gost, Serpent) O objetivo é que ao chamar o arquivo para o player ele faça o decode e exiba o vídeo

    $56 (Avg Bid)
    $56 Média
    1 ofertas

    Um projeto de entrada de energia no padrão AES Eletropaulo. entrada trifásica para coméão leste, bairro do belem, próximo á Avenida Celso Garcia, sendo cabo de 240mm, local próximo ao hopital municipal

    $243 (Avg Bid)
    $243 Média
    12 ofertas

    Desenvolvimento de API para aplicações em Delphi, para interação com o webservice Followzup.<br />As funcionalidades da API deverão ser as mesmas das APIs já disponíveis em PHP e Java (métodos e parâmetros).<br />A API deverá implementar protocolos de criptografia AES e RSA.<br />Exemplos das APIs em PHP e Java poderão ser obtidas no site "".<br />A rotina deverá ser testada em aplicação real e código fonte será disponibilizado no projeto Followzup, sob licença GPL.<br />Aguardo propostas.

    $251 (Avg Bid)
    $251 Média
    4 ofertas
    Panfleto Encerrado left

    O trabalho consiste em criar um panfleto para vendas de materiais e serviços .Os produtos são caixas de entrada de energia padrão AES Eletropaulo , Bandeirantes .Então pretendo vender os produtos e vender também mão de obra .Publico alvo mais periferia pois são bairros em formação aonde se consome e se usa muito estes produtos

    $48 (Avg Bid)
    $48 Média
    13 ofertas
    Desenvolvedor de App Encerrado left

    Um aplicativo para leitores de tarjas magnéticas, adaptado em celular, e criptografados em TDES e AES. Quero um aplicativo mobile para integrar ao leitor de tarja adaptado ao celular para coleta de dados. Para uso no ato em que o cliente for fazer a compra, usar o cartão e o vendedor apresentara um celular com o leitor no ato da venda. Mais informações com os profissionais interessados.

    $0 (Avg Bid)
    $0 Média
    8 ofertas

    Desenvolver rotina em PHP, para buscar dados de contas em atraso na AES Eletropaulo.

    $432 (Avg Bid)
    $432 Média
    6 ofertas

    ...therefore have no reliance on WiFi, mobile data or any use of a WAP or a WiFi router. It can maybe use a technology similar to Z Wave or Zigbee wireless technology, and maybe use a method like PairAsync for pairing or connecting. The app must have a high level of security using HTTP, SSL, TLS or similar, and must encrypt and decrypt all data during transit and at rest with advanced security features like LESC, and using systems such as, or similar to, FIPS 140-2 and AES-SHA256 cryptography. I would like to have copies of any written source code that is created by you or any details on the tech stack, SDK and APIs used. As the app could be using Bluetooth or BLE, I want users to be able to send and receive data without the requirement of having to prompt for, or give permis...

    $889 (Avg Bid)
    $889 Média
    51 ofertas

    In need of a programmer who can create a software to decrypt Mifare 1k RFID cards. The main purpose is to retrieve data and get keys and edit the data Key Requirements: - Expertise in encryption and decryption programming. - Experience with RFID technologies. - Ability to integrate the deciphered data with subsequent software development as we currently do not possess the software to process the decrypted information. Your role will be highly valued, as it will foster smooth and secure data retrieval for our operations. Refrence @lp1/how-to-hack-mifare-classic-nfc-cards-69c8edcbe1e7

    $322 (Avg Bid)
    $322 Média
    3 ofertas
    RFID Access Control Development 1 dia left
    VERIFICADO

    I need a compact and efficient RFID decoding device that can effectively handle access control duties. We have multiple RFID 1k cards which are encrypted. We want to decrypt the card and should be able to edit the data in it Key Requirements: - **RFID Support**: The device should be able to work seamlessly with Low Frequency (LF) RFID tags. Such as mifare 1k. RFID 1k card - **Wi-Fi Connectivity**: if required it should have Wi-Fi capabilities to enable remote access and data management. Ideal Freelancer: - Proficient in RFID technology. - Experienced with access control systems. - Skilled in hardware development and connectivity. - Ability to create a compact and user-friendly device.

    $292 (Avg Bid)
    $292 Média
    4 ofertas

    ...and Social Security Numbers. - File Saving: After the blurring process, I don't want to affect original data. Therefore, the solution must create a separate PDF that hosts the redacted information. - Encryption: For even further data protection, the blurred PDF file has to be encrypted using the AES (Advanced Encryption Standard) method, ensuring optimal security. To be considered for this task, you should have: - Proven experience with data redaction or similar projects - Robust knowledge of AES encryption - A strong background in software development, specifically for privacy and security applications. The ultimate goal is to generate a tool that is user-friendly and efficient, delivering maximum data protection. An ideal freelancer for this job is rigorous, fam...

    $35 (Avg Bid)
    $35 Média
    13 ofertas

    Develop an app which resides and runs of a usb thumb drive. The app needs to launch automatically when the usb is inserted into the Windows computer. App should give a selection of Backup or Restore to the user...an OPTIONAL add on quote if encryption is required. More details on Encryption below: OPTIONAL QUOTE: Encryption has to be on the entire thumb drive level. As soon as thumb drive is inserted the first time, it has to ask user whether encryption is needed, if yes, it has to ask user to setup a strong key/password and encrypt the disk according to any standard FIPS approved encryption standards (AES preferred). Whenever the thumb drive is used subsequently, it has to prompt user to enter the password to unlock the drive and the app before continuing with backup/restor...

    $774 (Avg Bid)
    $774 Média
    13 ofertas

    ...developing encryption, decryption, and key generation functionalities. Key Project Requirements: - Extensive knowledge and application of Cryptography - Proficiency in the C programming language - Experience in generating SHA keys The Cryptographer will perform the following tasks: 1. Encryption and Decryption: You will write code that facilitates both encryption and decryption processes using the AES (Advanced Encryption Standard) algorithm. 2. Key Generation: Involves the creation of a safe and secure key generation mechanism utilizing SHA. You should prioritize key security to guarantee the confidentiality and integrity of the encrypted contents. 3. File Support: The coded software should accept file inputs only, handling and processing encryption and decryption request...

    $17 (Avg Bid)
    $17 Média
    3 ofertas

    Our company has been active in the field of solar photovoltaics connected to the network for 15 years. We have created an IoT device that sends data using MQTT and pub/sub. Our infrastructure is on AWS and GCP. Our device is able to communicate with a few different devices/...protocols themselves are very similar. We need to be compatible with more products and to make everything work in sync with our current set up. The data is sent to GCP. It consists in frames that need to be decrypted and stored in a mongoDB database. It also sends some information so that the system can understand what kind of frame was sent and how it should be decrypted. Most of the code used to decrypt and store the data is written in GO. We need help implementing these new "protocols" in ...

    $615 (Avg Bid)
    ADC
    $615 Média
    29 ofertas

    As an expert in Google Cloud services and security configurations, you'll be tasked to: - Set up a Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen...Set up a Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen sharing. - The main goal is to increase the security of the site. - You're expected to disable TLS 1.0 and 1.1 protocols, and enable both TLS 1.2 and TLS 1.3 versions in the project for optimal security. - Also, certain encryption algorithms, specifically RSA, AES 128, AES 256, CBC and GCM need to be disabled. The ideal candidate must have extensive experience with GCE and advanced understanding of TLS protocols...

    $53 (Avg Bid)
    $53 Média
    4 ofertas

    ...&sd=true We followed the instructions provided and implemented the following code using server-side Node.js. We utilized ngrok to enable HTTPS connections. We have successfully initiated a transaction using this code in the uploaded file. However, we encountered an issue retrieving the transaction, which should have been provided but is not available. We were advised to handle callbacks and decrypt the response, but we're facing difficulties in doing so. Handling callbacks and post-success payment URLs did not resolve the issue. We now need the transaction ID, which we are unable to obtain. We need someone who can do the final step here and complete the integration on the website. The website is in React Js and Node Js. The solution should be configurable for other we...

    $96 (Avg Bid)
    $96 Média
    26 ofertas

    ...menu=5&menu-item=UCFDocs We followed the instructions provided and implemented the following code using server-side Node.js. We utilized ngrok to enable HTTPS connections. We have successfully initiated a transaction using this code in the uploaded file. However, we encountered an issue retrieving the transaction, which should have been provided but is not available. We were advised to handle callbacks and decrypt the response, but we're facing difficulties in doing so. Handling callbacks and post-success payment URLs did not resolve the issue. We now need the transaction ID, which we are unable to obtain. We need someone who can do the final step here and complete the integration on the website. The website is in React Js and Node Js. The solution should be conf...

    $12 / hr (Avg Bid)
    $12 / hr Média
    51 ofertas

    I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption methods

    $164 (Avg Bid)
    $164 Média
    39 ofertas

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support...my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be det...

    $355 (Avg Bid)
    $355 Média
    13 ofertas

    ...deployed to a single device, so I will likely need help setting up LaunchPad, or bringing up the code in my own developer environment for self-install. The traffic capture going on is literally equivalent to what is already being done in published and approved App Store applications. I will only be capturing my traffic, so it is not confidential. No, this app will not be able to break encryption and decrypt securely encrypted data. (Freelancer requires me to make this statement explicitly in the project description because they have genuinely no idea how encryption actually works on a technical level.) Required skills: - Knowledge of an iOS app implementation language (ObjC or Swift) - Experience developing robust, well-functioning apps (buffering and saving data, stable withou...

    $508 (Avg Bid)
    $508 Média
    43 ofertas

    This is a project to convert a complex file encryption/deencryption write in C++ to VB.NET (Framework 4.0)

    $24 (Avg Bid)
    $24 Média
    3 ofertas
    Log FIle Decryption Encerrado left

    I need to decrypt a crypted client-side log file (.txt) of a desktop application The goal is to understand the logic behind encryption and write a simple script that translates data in human-readable text. I have no idea on how encryption is made. The application has a client-server architecture, and could have restrictions based on user location. So, you will likely need to use a vpn or vps to test. Source code must be delivered at the end of contract, better if logic behind script is directly explained via call (not mandatory). Preferred language for scripts is p1ton (volutanry wrong to not received automated answers), but I am open to other language if there are clear benefits.

    $135 (Avg Bid)
    $135 Média
    60 ofertas

    ...cutting-edge algorithms to enhance the project's efficiency and security. requirements are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you shou...

    $293 (Avg Bid)
    $293 Média
    27 ofertas

    I am in urgent need of a decryptor tool to recover my files that have been encrypted by a virus. My all files are encrypted with ".mkp" Unfortunately, I do not have any backups of these files, so the tool needs to be able to decrypt them directly. Key Requirements: - The tool must be compatible with Windows OS - It should be able to quickly and effectively decrypt files with the .mkp extension Experience Needed: - Proficiency in software development and security - Experience in creating decryption tools is highly preferred - Ability to work quickly and effectively to meet the immediate deadline Please only bid on this project if you are confident in your ability to meet these requirements and can deliver the tool within the specified timeframe.

    $12 (Avg Bid)
    $12 Média
    1 ofertas

    I'm seeking an expert who can decrypt an AES encrypted .cap file. The file contains encrypted data I need to access for educational purposes. Key requirements include: - Expertise in decrypting AES encrypted files - Ability to efficiently and securely recover the data from the .cap file - Strong commitment to data privacy and confidentiality Please provide examples of similar work you have done in the past, and outline your proposed approach to this task.

    $18 / hr (Avg Bid)
    $18 / hr Média
    15 ofertas

    ..."X", you might append ".bwf" or another unique extension to the encrypted files. 5. Ensure that your decryption process accurately recovers the original file, including its correct extension. The decrypted file should be identical to the original input file in every aspect. Topics for Approach 1: Implementation of one of the below algorithms Implementation of DES (Data Encryption Standard) AES (Advanced Encryption Standard) Camellia Blowfish Twofish RC4 (Rivest Cipher 4) Serpent CAST-128/CAST-256 Project Guidelines: 1. Proposal Submission: o ● Submit a proposal outlining the chosen approach and topic. o ● Include a brief description of the methodology for Approach 1 or the selected 2. Research Phase: o ● Approach 1: Conduct research on t...

    $117 (Avg Bid)
    $117 Média
    43 ofertas

    I am currently seeking an experienced AES cyber security professional. Project Summary: - Implementation of Encryption Algorithm: a) Develop an implementation scenario for one encryption algorithm. b) Provide a detailed description of the chosen algorithm, including its functioning. c) Apply software engineering approaches, starting from requirements gathering to design and implementation phases. d) Submit a complete project package containing: • The implemented encryption algorithm. • Detailed documentation of the algorithm and project development process. • A graphical interface for file encryption and decryption. • Important Implementation Tips: In your implementation, please adhere to the following guidelines: 1. Your program should accept any file type as ...

    $132 (Avg Bid)
    $132 Média
    49 ofertas

    I'm seeking an expert in Python to develop a decryption utility tool. The purpose of this tool is to decode encrypted messages, binary files, and encoded data, helping me simplify and expedite data analysis tasks. The ideal candidate will: • Have substantial experience with Python programming. • Be familiar with various encryption algorithms, notably AES, RSA and DES. Your expertise in these will be key to the successful creation of this utility. • Be committed and focused, as the tool must be completed ASAP. Looking forward to receiving bids from suitable and interested freelancers. Please, when bidding, include any relevant experience and examples of similar projects.

    $21 (Avg Bid)
    $21 Média
    77 ofertas

    ...different products, then put his address files in etc. and finally the bot needs to create a crypto invoice for the cryptocurrency of choice at current price and wait for payment confirmation from the crypto pay gate. Finally, once the order is confirmed, the bot needs to process all order information into a .txt or .csv file and save it locally on the machine. The script should also be able to decrypt PGP encrypted address information automatically. 2) Some sort of APIs between the bot script and all the messengers desktop sessions listed above that allow the bot script to communicate with each messenger. The purpose of this is to allow running regular non-business, non-shop affiliated messenger accounts as effective bot shops. I do NOT want to use shop-affiliated infrastructur...

    $2722 (Avg Bid)
    Destacado
    $2722 Média
    37 ofertas

    ...users on HIPAA regulations and compliance requirements and ensure ongoing compliance through regular audits and monitoring. Technologies: - Frontend: HTML5, CSS3, JavaScript (React.js for web, React Native for mobile) - Backend: Node.js, , MongoDB (or other suitable database) - Authentication: JWT (JSON Web Tokens) with secure storage and handling of authentication tokens - Encryption: AES encryption for data at rest and TLS encryption for data in transit - Audit Trails: Implement logging mechanisms to capture user activities and system events for audit purposes - Compliance Tools: Utilize HIPAA compliance management tools for risk assessment, policy management, and compliance monitoring Deliverables: - Fully functional web-based LMS accessible via web browsers and a mobile app...

    $15433 (Avg Bid)
    Urgente
    $15433 Média
    143 ofertas

    I am looking for a specialist to make a custom encryption for my laptop's UEFI firmware at runtime and decrypt at output. At no point will the firmware itself be decrypted. This will enhance security and protect the firmware from potential tampering or unauthorized access. I am keen on improving the overall safety of my system, and thus value someone who understands the essence of addressing security vulnerabilities. Here's what I am looking for: - A comprehensive understanding of kali linux as that is the targeted operating system for this project. - Proficiency in dealing with UEFI firmware. Specifically, if you have experience working with the firmware on the Lenovo Ideapad Slim 3 15IIL05, that would be preferable. - Prior experience with firmware encryption and decr...

    $1276 (Avg Bid)
    Destacado
    $1276 Média
    6 ofertas

    Do NOT bid if you are not clear on the project. Do Not bid if you did not read the entire project. Bids which come in under 3 minutes from posting will be reported to freelancer as fake bids because it is not possible to read all the documentations in under 3 minutes. Receive data many gps devices. Decrypt data Upload to Mysql ( about 10 fields) Create the ability to to send instructions to gps even from a remote device by api Protocol is JT808

    $272 (Avg Bid)
    $272 Média
    13 ofertas

    Here is a NodeJs package that is used to decrypt media files received on WhatsApp messages for our clients. This works well, however, it decrypts file into binary data which is saved on hard disk. This takes a lot of memory for large files. We need to modify this script so as to return stream instead of data. We should be able to use the stream in a pipeline/pipe. I have a small NodeJS script with above code, that you should take a look at and let me know if you can do it. To accomplish this, you should definitely have: - Experience with advanced NodeJS development and general decryption algorithm - Try not using other external packages, if possible - Ask me for the nodejs project in private message - Should be easy task for someone experienced

    $47 (Avg Bid)
    $47 Média
    7 ofertas

    ...pace of development. Key requirements include: - Proficient in the use of NTAG 424 DNA for mutual authentication -' SUN, AES,CMAC, dynamic authentication, mutual authentication' How they work. - Proficient in making native app on NFCs. - Familiar with programming and product authentication methods - Comprehensive knowledge in front-end, backend and database so, in short, i want to make a cross-platform anti-counterfeiting app using NFC (ntag424 dna) . which the user is going to scan the tag with the app it's going to verify it with the database. then show them the UI as per you familiar with these kinds of platforms and the ntag 424 DNA (SUN, AES,CMAC)? i will welcome any suggestion or recommendation from your side too. Better ideas are also welcome...

    $443 (Avg Bid)
    $443 Média
    5 ofertas

    ...need an expert to implement advanced AES-256 bit security encryption for an SQLite database in a Windows application using VB.Net. This task requires specific expertise in working with encryption to secure private data. Key Requirements: - Proficiency in VB.Net - Deep understanding of AES-256 bit encryption - Familiarity with SQLite databases - Prior experience in data encryption The encrypted SQLite database will become a storage unit for personal identifiable information. This sensitive data demands high security measures, thus professional handling is crucial for the success of this project. The completed task should ensure maximum protection against unauthorized access and reliably shield the stored personal data. Main Task: - Implement advanced AES-256 bi...

    $60 (Avg Bid)
    $60 Média
    2 ofertas

    I am in need of a compelling sales pitch for our IT services, specifically targeting large corporations. The sales pitch should prominently feature two of my main services: Active Directory Migrations, Consolidations, and On-prem migration to Azure AD. Key Benefits to Highlight: - Significant cost savings - Over 14 years of experience in providing top-tier IT services to some ...- Over 14 years of experience in providing top-tier IT services to some of America's largest companies Ideal Skills and Experience: - Significant knowledge in IT sector - Proven experience in sales pitch creation - Understanding of large business requirements - Familiarity with Azure AD and Active Directory. Previous Projects: Ascension Health domain Community Health Hospital Rockwest Bedrock AES P...

    $156 (Avg Bid)
    $156 Média
    8 ofertas

    CREAR UNA BIBLIOTECA ENCRIPTACION AES PARA TARJETA MIFARE PLUS PARA ARDUINO ESP32

    $528 (Avg Bid)
    $528 Média
    7 ofertas

    I am on the lookout for a CryptoJS expert who is proficient in using IV and keys to decrypt text data. Your task will be: - Decrypting text data with the keys and IV that I will supply. Skills and Experience Needed: To complete this project successfully, you should possess: - Profound understanding of CryptoJS - Experience in decrypting data, specifically text - Skill in using provided IV and keys to decode encrypted data - Incredible problem-solving and communication skills This is a forward-thinking task that requires a professional who is attentive to detail, delivers promptly and comprehends the prime role of data safety and confidentiality. I await your bids.

    $41 (Avg Bid)
    $41 Média
    6 ofertas

    I need an expert who's able to decrypt an old .accdb MS Access database for which the encryption key was lost. The database contains precious client information and business transaction data that I want to incorporate into our current database. Here are more specifics of the task: • Database Conversion: The old database structure and relationships are somewhat important, so would ideally be maintained during the conversion process. However, some changes can be considered if necessary for integration. • Data Integration: Both client information and business transaction data from the old database should be incorporated into the current one. As a preference, if the data can comfortably fit, have it provided in an Excel spreadsheet. • Data Cleaning: There's ...

    $161 (Avg Bid)
    $161 Média
    27 ofertas

    I want to decrypt a single Java File (.jar)

    $22 (Avg Bid)
    $22 Média
    10 ofertas

    ... Opcje Płatności i Fakturacja: Integracja z systemem Stripe do obsługi płatności i generowania faktur. System Ocen i Recenzji: Możliwość oceniania i recenzji wynajmowanych samochodów oraz wynajmujących. Bezpieczeństwo: Autentykacja i Autoryzacja: Wykorzystanie OAuth 2.0 i JWT do zarządzania dostępem. Szyfrowanie Danych: Zastosowanie TLS dla bezpiecznego przesyłania danych i AES dla ochrony danych przechowywanych. Backup i Odzyskiwanie Danych: Regularne tworzenie kopii zapasowych danych i zapewnienie mechanizmów ich odzyskiwania. Dodatkowe Uwagi: Moduł Zarządzania Ogłoszeniami: Rozbudowa backendu o funkcje zarządzania ogłoszeniami, w tym API do dodawania, edytowania, usuwania i przeglądania przez użytkowników. Integracj...

    $4342 (Avg Bid)
    ADC
    $4342 Média
    14 ofertas

    Need a cyber security specialist to decrypt an AES-CTR encryption for a CTF flag. provided information : pcapng file for wireshark and the encryption method written in python

    $24 (Avg Bid)
    $24 Média
    6 ofertas

    ...The design of the client should be user-friendly, making it easy to traverse and understand. - High performance and stability: Despite its ease of use and setup, the client should not compromise on performance or stability. - The client interface needs the following features: "Connect", "Disconnect", and "Import Config" buttons. Clicking "Import Config" imports a configuration file encrypted with AES-256. The configuration file contains the server IP address, port number, virtual HUB name, username, and password. After importing the configuration file, VPN connections can be made by clicking connect and disconnect. Use direct TCP/IP connections, with an automatic reconnection interval of 15 seconds, always keeping the VPN online. The offici...

    $142 (Avg Bid)
    $142 Média
    4 ofertas

    im looking for Android Java class that does the following 1. generate public and private encryption keys 2. get a base-64 versi...generate public and private keys } public String getPublicKey() { // return base-64 version of the public key } public void setPublicKey(String base64PublicKey) { // set the public key from the server } public String encrypt(String plainText) { // use my private key to encryopt the data } public String decrypt(String encryptedText) { // use the servers public key to decrypt the data } } Need the corresponding class in C# .NET 4.5.2 that works with this java class. The android java code should use java 8, gradle plugin version 4.2.2 and gradle version 6.7.1 in android studio pr...

    $35 (Avg Bid)
    $35 Média
    12 ofertas