Elliptic curve cryptography encryption and decryption trabalhos
Pessoal, Preciso aplicar a encriptação no banco Mysql. Alguém que tenha experiência e já aplicou a encriptação na base sem gerar problemas futuros? Aguardo contato.
I need to encrypt a tibia client so that the graphics files can not be stolen. version : 8.60
Ola, Tenho um estudo de caso para realizar. Vou te passar o pedido, se te interessar entre em contato por favor. Seria p criar um dossier segundo o estudo de caso, segue abaixo : Você é um arquiteto de sistemas de informação (especialista em análise, sistemas, redes e segurança de TI). Você é solicitado a projetar a arquitetura de um sistema de inf...diferentes atualizados bidirecionalmente? Como desenvolver a interface WEB, com quais bases de dados de suporte? Como atualizar os bancos de dados? 3 / Propor um esquema Extranet para permitir informações dentro da empresa (por padrão, um funcionário se conecta à Extranet, interface diferente da interface do cliente). 4 / Propor um plano de...
I would like a system that would have the following characteristics a back-up system (where the products would be registered the electronic invoice issuer series only control of financial inventory of customer and user / staff register among some other functions and a point-of-sale system (pdv) where I would be able to perform all the necessary functions of a box with the support of nfc-e working normally in it below I will provide all the features of the rear and front of box (pdv) Gostaria de um sistema que tivesse as seguintes características um sistema de retaguarda ( onde seria cadastrado os produtos funcionaria o emissor de nota fiscal eletronica serie unica controle de estoque financeiro cadastro de cliente e usuarios/funcionarios dentre algumas outras...
Requisitos: • Licenciatura em Engenharia Informática ou equivalente; • Experiência mínima 3 anos; • Instalação e configuração; • Administração e monitorização de SQL Server 2008/2008R2/2012/2014/2016; • Alta disponibilidade com SQL Cluster, SQL AlwaysOn, Replicações e Log Shipping; • Migração de ...de dados; • Backup e restore; • manutenção de base de dados; • Análise de performance e troubleshooting; • Proatividade e disposição para aprendizagem continua; Valorizamos os conhecimentos em: • Desenvolvimento em TSQL (scripting, automação de processos, stored procedures, fun...
Cartão EMV / EMV ISO-7816 & amp; Smart card Java Software Engineer n & amp; Programação & amp;<br />Engenheiros & amp eletrônico; Microcontrolador & amp; Cryptography.<br /><br />Olha o que eu preciso:<br /><br />PIN Projeto Eu preciso de um software com wich eu posso simplesmente ler o PIN de um wich de smart card (um cartão Bank) pode ser uma SDA ou cartão de DDA. Como todos sabem, o Chip & amp; Cartões EMV PIN ou chamada Bank Card<br />O PIN é o chip, como extrair o PIN, eu realmente não fazer & amp; acirc; & euro; & Comércio ;! nt sei que eu tenho dois cartões inteligentes leitores / escritores e eu tenho um software (Java EMV Reader...
I need assistance in setting up an EoIP tunnel between two remote networks,...the two remote networks - The current equipment being used at both ends of the tunnel are MikroTik routers - Encryption needs were skipped, hence, this tunnel may or may not require encryption depending on your expertise I'm looking for a professional who is well-versed in MikroTik routers and has experience in configuring and setting up EoIP tunnels. The ideal candidate will have: - Proficiency in configuring MikroTik routers - Experience with EoIP tunnel setup - Strong understanding of network protocols and remote network connections - Ability to troubleshoot and resolve connectivity issues If you have the necessary expertise and can help me set up this E...
I need a professional programmer to help me fix a specific issue I am ...authentication process, specifically with reading the chip data of ID cards. The ideal candidate should have: - Proficiency in Java and experience with the jmrtd program - Prior experience dealing with document authentication, especially with ID cards - Strong problem-solving skills and ability to troubleshoot complex issues - Good understanding of cryptography and secure communication The main tasks in this project include: - Diagnosing the root cause of the issue when reading the chip data - Implementing a solution that ensures successful document authentication for ID cards - Testing the updated program to ensure it works as expected Your expertise and efficiency in resolving ...
I am looking for a Flutt...The package should include functionality for: 1.) PDF encryption and decryption 2.) PDF compression 3.) Splitting PDF into multiple PDFs 4.) Merging multiple PDFs 5.) Watermarking PDF 6.) PDF validity and protection info 7.) Add page no. to the PDF 8.) Change PDF page size IMPORTANT: Do not use any underlying technology which requires AGPL-3.0 license or any other license which asks for fees for commercial use. Platform Support: - The Flutter package should be able to work seamlessly across both iOS and Android platforms. Exhaustive documentation will be required for the package. Example flutter package (for reference only): Payments will be done in phases after completion of each feature and it's related docu...
I need a dynamic and interactive WordPress website developed using Laravel as the backend framework. The website will revolve around the concept of comparing fare estimates between ride-sharing services, specifically Uber and Lyft. Here are the detailed requirements: Fare Comparison: Implement a user-friendly interface with a search box that includes auto-suggestions for addresses. Users should be able to enter their pickup and drop-off locations effortlessly. Utilize the Uber and Lyft APIs to fetch real-time fare estimates for the specified route. Display the results in a clear and informative manner, allowing users to compare the fares side by side. Ensure that the API integration is secure and adheres to the respective API guidelines and...
...Android, and the Web that promotes seamless conversation amongst its users. Key Features: - Messaging: As a core component of this app, users should be able to easily and effectively communicate with one another. - User Profiles: Users should have the ability to create, customize, and manage their profiles. - Notifications: Users should receive updates and notifications relevant to their interactions on the app. User Registration: The app will require secure user registration and login features. This will require a deep understanding of data protection and encryption. Share some of your work. Ideal Candidate: The ideal candidate or team for the job will have experience in full-stack deve...
...distribution, and analysis of various types of questionnaires. Key Requirements: - The platform needs to ensure the security of user data via encryption and secure storage. - The questionnaires to be designed will include both surveys and assessments. - The questionnaires will contain both multiple-choice and open-ended questions. -Reports need to be automated in PDF format -i want to know what software you plan to use fir the user interface and the back end data collection Ideal Skills: - Proficiency in web development, especially in creating secure platforms. - Experience in designing and developing survey and assessment tools. - Familiarity with encryption and secure data storage practices. - Ability to creat...
I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption methods
I am in need of a professional that can set up a Site-to-Site EoIP tunnel using Mikrotik dev...goal is to extend the current office network to another location. This will involve creating a secure, Site-to-Site connection. - High-level encryption is a crucial requirement for this project to ensure the security of data passing through the tunnel. Key Skills and Experience: - Profound understanding and experience in setting up network connections, especially Site-to-Site connections. - Expertise in Mikrotik devices and a proven track record in configuring EoIP tunnels. - In-depth knowledge of encryption protocols and practices, with an emphasis on high-level encryption. Note: Experience in handling similar projects will be a significant adv...
I'm looking for an experienced graphic designer to create a minimalist YouTube thumbnail for me. The design should be sophisticated and appealing, aimed at attracting the attention of an adult demographic (25-54 years). The thumbnail design needs to be predominantly text-based. Your creativity in converting my video subject into an intriguing text thumbnail is central to this task. Ideal qualifications: • Proven experience in graphics design • Portfolio with relevant designs • Knowledge of YouTube's curve and standards • Ability to design minimalist, text-only images that engage adults Your proposal should include a rough design approach and estimation of the time required. Let's ensure my YouTube thumbnail stands out i...
...construct a centralized cryptocurrency exchange with a comprehensive inclusion of Bitcoin, Ethereum, and Ripple. Key requirements for the task are: - Efficient Development: You should have a strong background in creating crypto exchanges and understand the specific mechanics involved with centralized platforms. - Advanced Trading Features: The platform needs to include extensive trading options to cater to users of all cryptocurrency trading levels. - Solid Security Measures: Given the onset of cyber threats, you'll need to harness your end-to-end cryptographic knowledge to ensure top-notch security measures. - Engaging User Interface: The ability to build an intuitive, easily navigable and engaging user interface is crucial. Proven experience designing u...
...of expanding my software testing skills and keen on polishing my understanding of Software Testing. My main areas of ambiguity involve Test automation, Manual testing techniques, and Bug tracking and reporting. I have a preference for live video sessions as a means of instruction. It would be invaluable to virtually discuss & iron out the doubts in real-time with an expert. i dont mind via chat as well. An important aspect of my self-growth is getting hands-on experience in writing test scenarios and test cases for UI. I have experience with API testing but no so much with UI manual test case creation and writing case tests. My work is around automation. i see the test steps and execute them via automation. But i am weak in manual testing...
...management, and distribution of BTC funds, allowing users to connect their wallets, initiate automatic payments, and convert funds into USDT or other cryptocurrencies. **Project Details:** - Develop a Crypto Host platform with robust support for Bitcoin (BTC) transactions, including wallet integration, automatic payment setup, and currency conversion functionalities. - Implement advanced security measures to protect users' BTC funds and personal information, ensuring compliance with industry best practices and regulatory requirements. - Design a user-friendly interface that enables seamless navigation, account management, and transaction tracking for users of all experience levels. - Integrate with external APIs and services for rea...
I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ong...security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will ...
...website called with functionalities similar to , incorporating an integrated database where vendors can list their car parts and customers can search for parts using their vehicle's VIN number. Requirements: 1. **Vendor Listing System**: - Implement a user-friendly interface for vendors to register and list their car parts. - Allow vendors to upload images, specify details, and set prices for each listed part. - Ensure secure login and registration functionalities for vendors. 2. **Vehicle Identification via VIN**: - Develop a VIN lookup feature enabling customers to input their vehicle's VIN number and retrieve a list of parts compatible with their vehicle. - Utilize VIN decoding APIs or databases to accurately ...
I'm in need of someone who can create a small college project based on blockchain technology. I'll provide the codes and other stuffs required. The person just needs to debug some errors and do some front end and back end work. Key Requirements: - Capable of using Remix, CSS, and Java Script for the project. - Understanding of blockchain fundamentals, including user authentication, data encryption, and smart contracts. Please feel free to share your past work and experience related to blockchain, along with any detailed project proposals you might have.
...in: - Data Encryption: The creation of a secure encoded version of our business data that can only be accessed with a key. - Firewall Protection: Setting up reliable prevention systems that filter network traffic and block unauthorized access. - Two-Factor Authentication: Integration of this additional layer of security that requires a second verification step before data access is granted. To accomplish this task, the specialist should have structured problem-solving skills, a keen eye for detail, and a deep understanding of modern data protection measures. Proven experience in successfully securing business data is a plus. This project is the perfect fit for a professional who is up-to-date with data security trends and is highly skilled in data protec...
Por favor, Cadastre-se ou Faça Login para ver os detalhes.
...memory, cryptographic primitives, and TCP/IP networking. I need a tutor who can help me understand difficult concepts and prepare for exams. Key Requirements: - Should be knowledgeable in all the topics listed. - Ability to explain past exam solutions. - Experience tutoring in computer organization or related subjects. - Able to communicate via instant messaging for convenience. - help in exam preparation Here is a list of all the topics covered in this course Building and Introduction - Basics of .o, .a, .so files, dynamic/static linking, and makefiles. Accounts and Permissions - POSIX permissions, user IDs, and sudo functionalities. Privilege and Exceptions - Kernel mode, system calls, and exceptions. Signals and Proces...
I'm seeking a highly skilled app developer who can me...app developer who can meticulously create an Android-based Telegraph wallet with key features and security measures. Features: - It should be capable of initiating fund transfers and receiving them, functioning seamlessly. Security: - To ensure superior protection against potentially harmful breaches, it must incorporate a reliable two-factor authentication and biometric authentication. To succeed in this project, you need prior experience in Android app development, specifically with financial apps, and an understand of encryption systems for enhanced app security. Proven expertise in integrating two-factor and biometric authentication is expected. Let's take Telegraph wallet...
I am in need of a professional with experience in setting...other chat messaging services. I want a private, cloud based instant messaging service with end to end encryption. This will include you setting up the cloud service on Building the services, and providing instructions on how to add users. I will provide accounts and give access. Key Responsibilities: - Building a cloud-based Rocket Chat server - Ensuring the server supports Real-time messaging feature Ideal Skills: - Familiarity with Rocket Chat or similar messaging platforms - Experience in server setup and management - Knowledge in cloud-based systems I hope to see this project completed within a month, and I'm looking forward to working with a committed and knowledgeable prof...
...who can create a federated learning system with two clients and a server. The purpose of the system is to both train and update a machine learning model. The clients will provide textual data for the learning process, and the system should ensure utmost data privacy and security without the need for data encryption. Key requirements: - Development of a federated learning system with a server-client architecture - Incorporating tools for machine learning model training and update - Handling of textual data from the clients for the learning process Ideal skills and experience for this job: - Proficiency in machine learning model development - Previous experience with federated learning systems - Strong understanding of data privacy and...
I'm seeking a talented academic writer to craft a research article/thesis in the field of cybersecurity and digital forensics. The project encompasses: - Research Article Focus: The article will delve into the nuances of any one of the following topics; 1. Methods for Improving Industrial Control System Security OR 2. An enhanced encryption-compression method for digital image security OR 3. Green cybersecurity OR 4. Resilience using UAVs - Research Gap: The aim is to identify and address a critical research gap. The content must be fresh, engaging, supported by existing research articles or journals and must contribute significantly to the existing body of knowledge in the field. - Emphasis: The focus should be on presenting a concise yet comprehensive v...
...range of physical goods for buying and selling. Our focus is on implementing the necessary security measures to safeguard transactions and customers' information. Key Project Requirements: - Encryptions for secure transactions: Deploy strong encryption mechanisms to ensure transaction security. - User verification process: Develop a robust system for verifying users to enhance trust and safety. - Escrow service: Implement a reliable escrow service to facilitate secure transactions. - Whole marketplace source: Provide the complete source code for the marketplace. Ideal skills and experience for this project include: - Prior experience in developing darkweb marketplaces with a focus on secure transactions. - A deep understanding of encryption...
I am in need of a seasoned security expert, with particular skills in the realm of data and web security. My custom-coded website needs an upgrade in the following areas: - Network Security: I need a professional who can take care of safeguarding the usability and integrity of my network and data. - Application Security: Involving the measures taken to prevent exceptions in the security policy of an application or the underlying system. - Data Encryption: I need protection of my data, particularly data at rest, with a strong encryption method. As I'm unsure of whether a security audit has been conducted before, the freelancer will need to start from scratch and assess the current strengths and weaknesses of my system. Strong kno...
...provide how to create Art brushes in Paperjs. Developer should know: Paperjs,path, compoundpath and segment concept. Problem statement: How to make custom "Art" brushes in Paperjs like Illustrator. Apply these brushes to paths. Success Metrics: Test case 1 1. Create html page with canvas with paperjs. Should able to draw a path using Mouse click and drag or like a pencil. 2. There should be a brush stroke panel and it shuold have a brushes like crayon texture or others. 3. When user click on that path and apply brush stroke on that path(breizer curve). Test Case 2. Create a custom art brush. 1. User can upload an svg of grunged brush or crayon brush pattern in the canvas. 2. Click on that path and add to brush panel. 3. User can ad...
...dongle licensing system. The primary goal of this software will be to manage and verify the licensing of our software. Essential Features: - Compatibility: The software must be Windows-compatible. - Licensing System: The software should implement a hardware-based activation system to ensure the protection of our software. Ideal Skills and Experience: - Proficient in software development for Windows environments. - Experience in developing hardware-based activation systems. - Knowledge of software licensing systems. - Strong understanding of encryption and security protocols. - Ability to create a user-friendly interface for license management. I'm looking for someone who has experience in creating similar systems and can provide a robust, ...
I'm looking for an experienced developer who can help me set up a secure and efficient hosting solution for my crypto-related project. The hosting will be used for storing cryptocurrencies securely, running a blockchain node and potentially hosting a crypto-related website. As such, I need a professional who can deliver top-notch security measures for this hosting project. Skills and experience required: - Experience in crypto hosting, blockchain technology and cryptocurrencies - Ability to set up secure hosting solutions with advanced encryption and authentication. Please include any relevant experience in your application. Read article to get a better understanding No time wasters I need it
...retrieval, and storage, as well as API documentation. Key Requirements: - User Authentication: Design a secure authentication mechanism, implementing basic encryption to ensure user data safety. - Data Retrieval and Storage: The API must handle both user information and product details. - API Documentation: Provide comprehensive documentation to facilitate ease of use and understanding by other developers. Ideal Skills: - Proficient in Node.js: Strong expertise in Node.js is a must. - Angular Experience: Experience with Angular is a significant advantage. - Security Conscious: Understanding of security protocols and a commitment to implementing basic encryption for user information. The successful freelancer will have a track record o...
...Network Security: I am in the pursuit of a specialized professional who understands the principles of network security and can help me gain access to a system in an ethical manner. This requires a deep understanding of network infrastructure and protocols, as well as the skills to spot and mitigate vulnerabilities. 2. Data Encryption and Secure Coding: You will need to exercise knowledge of data encryption standards and secure coding practices to ensure that the integrity of the system is maintained, while the necessary tasks are performed. Skills and Experience: - Proficient in ethical hacking - Solid experience with network security - Robust knowledge of data encryption - Expertise in secure coding Please note, there ...
I'm looking for a skilled developer who can create a call application for iOS, focusing on video and audio calls. The application should be user-friendly and robust, supporting seamless and high-quality communication. Key Features: - The primary goal of this application is to facilitate video and audio calls. The calls should be clear, stable, and have a high frame rate for video calls. - Security is a priority. The application must ensure end-to-end encryption on all calls. ( peer to peer ) - create link for call , ( not need to register, just download the application ) Skills: - Proficiency in iOS app development, including experience with video and audio call features. - Strong understanding of creating user-friendly interfaces. -...
I'm struggling with a problem - I've installed SSL on my server and it seems to be running smoothly with Apache. However, the issue arises with my DNS, where the SSL isn't working. Precisely, HTTPS isn't functioning as expected. What I need is someone experienced with server setup, particularly SSL encryption, Apache, DNS configurations, and fault-finding to step in and sort this out. IDEAL CANDIDATE: • Proven experience with SSL and DNS. • Knowledge of server configurations. • Proficient in troubleshooting and resolving technical issues. • Attention to detail for fault-finding. Please include your previous experience dealing with similar issues, your approach to problem-solving and why you'...
I'm on the lookout for an experienced professional who can set up a MQTT server and client to establish secure IoT communication for my device, a SoundBox Notification Speaker. Key requirements include: - The setup of an MQTT server and client from the ground up. - Utilisation of SSL/TLS encryption to secure the connection and ensure data integrity. - Experience in working with similar type of devices i.e., IoT communication devices. The ideal freelancer should have a proven track record in IoT-based projects, particularly those demanding real-time communication. Experience with data logging could be a bonus. Knowledge of encryption techniques and the ability to implement them on MQTT communication is crucial. Willingness to provide post-s...
...through the content you create and share on our social media platforms - Facebook, Instagram, Google My Business, Pinterest, and LinkedIn. Your main tasks will include: - Crafting engaging posts and banners: I need someone who can create visually appealing and informative content that will resonate with our target audience - homeowners in Italy. - Monitoring and analyzing competition: You will be required to keep an eye on our competitors in the industry and help us stay ahead of the curve. - Crafting compelling copy: You should have a way with words and be able to make our posts stand out with the right messaging. - Enhancing post quality: The ability to add a creative touch to our posts and make them shine would be a key...
...Grenada. • Customer Reviews: A feature where customers can review our services and products and the reviews are listed below the items listed or a slide-over section that says reviews and a star rating out of 5 verified reviews only. Unique Pricing Setup: Unlike traditional pricing structures, this site requires a customizable pricing model based on customer's requests. After a customer submits a request via the special request form, I'd like to manually provide them with a customized price, tailor-made for their specific needs, for exmaple lets say an item is listed for £1800 if a customer only has £1700 they can make a offer similar to ebays make an offer system and i can decline to accept etc. Ideal Skills and Expe...
...talented and experienced developer to join our team and help build a cutting-edge cryptocurrency platform. As a Cryptocurrency Platform Developer, you will be responsible for designing, developing, and maintaining our platform, which allows users to seamlessly receive, convert, and manage various cryptocurrencies. Responsibilities: - Design and implement secure and scalable systems for handling cryptocurrency transactions. - Integrate with external networks and APIs to facilitate seamless fund transfers. - Develop algorithms for automatic currency conversion and deposit crediting. - Ensure compliance with relevant regulations and security best practices. - Collaborate with cross-functional teams to define requirements an...
...Automation (RPA) RPA tools like UiPath, Blue Prism, and Automation Anywhere are designed for automating repetitive tasks on desktop and web applications. They can interact with applications at the UI level, mimicking human actions. You can use these tools to automate the login process by recording and replaying login sequences. 2. AutoHotkey (Windows) AutoHotkey is a powerful and flexible scripting language for Windows that allows you to create scripts for automating keystrokes and mouse clicks. You can write a script to focus the application window, enter login credentials, and press the login button, effectively automating the login process. 3. SikuliX SikuliX is a scripting/automation technology that uses image recognition to identify an...
...the field of cryptography, specifically focused on Oblivious Transfer (OT). Find all OT extension implementations and compare them for efficiency and security (sometimes the security assumptions are different hence the security levels are also different. Efficiency can be compared in terms of average memory usage and average time required to complete one OT/OTe of same size in different libraries). Key Requirements: - Strong background in cryptography - Proven experience in conducting research within this field - Ability to evaluate security and efficiency of cryptographic libraries - Familiarity with the implementation of OT in different environments, particularly within OT libraries. The primary goal of this project is to provide an in-dept...
...facilitating efficient data management and analysis. **Objectives:** 1. Develop a structured database architecture suitable for the organization's requirements. 2. Utilize GPT to automate data entry, validation, and enhancement processes. 3. Ensure data integrity, accuracy, and consistency throughout the database. 4. Enable seamless data retrieval and reporting functionalities. 5. Facilitate collaboration and knowledge sharing among team members involved in the database development process. **Key Features:** 1. **GPT-assisted Data Entry:** Leverage GPT to assist in populating the database with relevant information, reducing manual effort and potential errors. 2. **Data Validation Rules:** Establish predefined rules and constraints ...
## **Project Description:** We are seeking an experienced freelance web and mobile developer to create a comprehensive time tracking system, which includes a web application and native mobile apps for both Apple (iOS) and Android platforms. This system will enable businesses to efficiently record and manage their employees' work hours. ## **Objectives:** 1. **Launch a fully functional landing page** with user authentication including options for account creation, login, and password recovery. 2. **Develop an intuitive dashboard interface** for various user levels (admin, staff, superadmin) accessible via web, iOS, and Android devices. 3. **Implement an approval process for time submissions** where hours submitted by employees must be approved...
...medium-sized SQL database, my aim is to enhance data interpretation and decision making by utilizing Microsoft Power BI for data visualization, interactive dashboards, and comprehensive reporting. Key Requirements: - Expertise in Microsoft Power BI to analyze database. - Experience with SQL and understanding of data volume (1GB - 10GB). - Ability to visualize data through charts and graphs, create interactive dashboards, and generate comprehensive reports using Power BI. - Familiarity with implementing security measures, including data encryption, user authentication, and permission-based access control. Please bid if you have the ideal skills and proven experience. Your bid will be evaluated based on your expertise, client feed...
...database. Your primary role will entail implementing encryption on our data. Key Responsibilities: - Generate an encryption key. You’ll be responsible for creating a robust and secure encryption key. - Implement Database Encryption. Utilise your Django expertise to seamlessly integrate encryption without compromising the performance or accessibility of our database. - Maintain Data Format. It is critical that the encrypted data retains its original format. Ensure that no distortions occur during this process. Ideal Skills: - Proficient in Django - Knowledgeable in database structures and encryption - Proven ability to generate secure encryption keys - Experience in ensuring data integrity during encryption I...
...remote interactions for testing and validation. (not in simulation, not with unit tests - end-to-end tests). This is NOT a high-feature app for public use. It is really an on-device utility tool that I need. That is all. This will be an exercise in good programming and solid iOS system knowledge. This app must be able to: 1) Use an on-device proxy/VPN server and proxy/VPN configuration to intercept HTTP traffic live ("capture" apps like this already exist) 2) Must be able to apply a domain filter on which traffic to watch for 3) Record all relevant HTTP data - headers, body, and response 4) Captured data will then be immediately sent to a configurable HTTP endpoint 5) Optionally: MQTT endpoint for sending captured data 6) App must run in the backg...
...website hosting account Key Requirements: - Implementation of Video Encryption: I need the videos on my WPLMS website to be encrypted to prevent unauthorized downloads. This is a crucial aspect of the project and must be handled with the utmost care and expertise. - Domain-Level Access Restrictions: I am also considering implementing domain-level access restrictions as an additional layer of security. This, combined with video encryption, will help in preventing unauthorized access and downloads. Specifics: - The project involves enhancing the existing security measures on the videos hosted on my WPLMS website. - The successful freelancer is expected to recommend and implement the best practices in video encryption and domain-le...
...Exploring data encryption methods and their application in IoT - Reviewing current practices in IoT security awareness training The goal of this research is to enhance the security of IoT devices, with a particular focus on smart home devices. Expected Deliverables: - A comprehensive research document outlining the above aspects - Recommendations for improving IoT security in the context of smart home devices Ideal Skills: - Proven experience in cybersecurity research - Experience with IoT devices, particularly smart home devices - Knowledge of network security and data encryption - Understanding of security awareness training - Strong analytical and writing skills I'm looking for a freelancer who can not only conduct in-depth research but al...