...the plugin monthly, i prefer to use WHMCS Addon Licensing Manager 6- encrypt the plugin, with ioncube as an example so no one can crack the plugin! 7- you will deliver the encrypted and unencrypted scripts to me, and in the next 2 months i'll contact the chosen developer again in order to help me with updating the plugin so we can keep updating the plugin
My social media, email and other accounts are constantly being hacked, despite taking all precautions I can possibly think of - 2 factor, encrypted emails, using burner phones, etc. I would like a review of my computer/account in order to determine how this is constantly being done.
I have a C++ code that needs to be converted into Python. The code should give exactly the same output as C++ code. Automated tools maybe used. The files have an AES implementation and are in charge of facilitate the connection with a network device. Manuals will be given with confidentiality . My budget is 30 euros so please dont bid more than that
I need a Cloud computing expert who may help me in implementation of cloud computing using AES Algorithm and Demo of the its using in form of APP
Need an expert from the filed assiting with securities of CSS, CTR mode, CBC mode, ECB mode, AES-128, hash function with 256-bit
Hi Do N., I noticed your profile and would like to ... i want a game c-h-e-a-t for an online game. You know online game communicate with server through packet, game data are stored in packet. If you sniffer the game traffic, decrypt packets, you can find the data you want, like enemy locations in a fps game. if you are interested, we can discuss more.
...contains an encrypted Linux LUKS partition whose password I have forgotten. However, I have a list of possible passwords as a text file. One password candidate per line. There are about 100 password candidates in this file. I need you to write a script I can run in Linux that will try to open the USB hard drive, which is at /dev/sde1, using each of the
The input for the algorithm contains three ciphertext/plaintext (C1,M1) (C2,M2)(C3,M3) and the public parameter (P) of the encryption scheme. The output...ciphertext/plaintext (C1,M1) (C2,M2)(C3,M3) and the public parameter (P) of the encryption scheme. The output of the algorithm is the secret key SK = (s, q) which can be used to decrypt ciphertexts.
Windows server was compromised due to due to SynAck ransomware attack We need to Decrypt a MS SQL Server 2008 database .mdf & .ldf file (2files)
Hello. We are looking VOIP Tunnel software solutions to bypass voip calls in blockage area . It is encrypts/decrypt SIP and RTP packets and send voip traffic between soft switches without blockage . We are looking experienced guy who already developed or worked on this .
...we got affected by Ransomware in one of our PC's. There are some documents that we want to retrieve back. Have Windows Server 2008 R2, no backup image, need to remove and decrypt ransomware with extension .combo. Dharma ransomware that appends the .id-C67B68E4 Need my system back. Are you able to sort it out? I attached some sample data file for your
We are UK accountants. We send accounts, tax returns etc and other confidential documents via email. I need a Microsoft Outlook add in that will send secure encrypted emails without needing the recipient to install any software. I would also like the add in to have the option of requesting an e-signature. We work on a terminal server. This system
...into DBM file. h) Redirect the User to the Application URL at the 2ndSubDomain Step 3: At the 2nd SubDomain a) Receive the Cookie "User". Decrypt it to obtain the GUID. b) Retrieve from the Database all record details. c) Display the record details in the page. d) If the
I need a graphic App icon design
I need you to develop some software for me. I would like this software to be developed using Python to enable encrypted voice connection over serial connection.
...possible is to be rectified to comply. seeking highest level of encryption and security of all data and users logged in must be anonymous traffic which only the server can decrypt and understand. ONLY people with serious knowledge of EU data protection and security laws & regulations should bid on this project. I ASK THAT YOU OPEN A CHAT WITH ME TO
...Requirement: Need the script modified to handle files greater than 1MB and add a few optional checkboxes where user can choose other encryption methods (right now its default is AES ) by including other .js libraries (possibly if you know of another more secure open source encryption library) Note: Please read the whole article and comments on that page
C# export and import RSA Keys and use the imported ones to encrypt and decrypt
it important that freelancer familiar wih AES, Zigbee and such topic in IoT working software: AVISPA , Omnet++ deadline limited budget negotiated
...profit take to be variable, I need SL that is variable % based on entry. If you could give me a quote for that and then give me a second quote for how to have it encrypted with 256 bit AES and a plain and pretty simple GUI. Below I have linked the API doc of the exchange and attached the GMMA script I need it to run off. also if you can let me know
Python 2.7 script conversion to Python 3.6 I am having problem running a script. I am ok Python 3.6 however the script is on Python 2.7. Would need t...running a script. I am ok Python 3.6 however the script is on Python 2.7. Would need the script to be compatible on Python 3.6 I think the problem is the value being returned. AES requires bytes.
no backup image, need to remove and decrypt ransomware with extension .combo. Dharma ransomware that appends the .id-..combo Need my system back.
1. Formula (if necessary using vba) to show difference between 2 text strings in Excel table. 2. pls check attached file where formula should be put, and all instruction over there in a text box (column xcheck) - pls follow strictly all instructions mentioned there. Simples job, expected delivery in the next few hours. 3. ***THERE`S ALREADY A CODE WRITTEN
I have ~20 powerpoint and excel files which were put onto a usb drive and when i transferred them to my computer they seem to have become encrypted and cannot open. I believe McAfee Encryption - Files and Folders is on them. Any methods to assess the files? If so, am willing to pay to remove encryption.
The application will be about Dormitories in Turkey. Users will be able to register in this application using their mobile number, a confirmation code will be sent to them. After Successful registration, users will be able to select their 1- Dormitory Name ( Dormitory Names will be provided in an Excel file), 2- Block number 3- Room number 4- University
...(Add/Edit/Delete Customer) Add functions encrypt/decrypt the key Add functions management license (Set active, renew,...) Creating domain webservice for checking, active trial the current license for users (For this I will code the web service by PHP web server. No .Net because Cpanel does not support .net) Creating function for checking license from web
...enter his regular acces codes for onlinebanking in a secure page without ever leaving the merchant or provider site. In the background the system connects over a secure, encrypted connection to the banking account of the buyer. In the Gateway page then the buyer can choose the account from which he wish to pay (for example: savings account, current
...in a word file and with 2 lag (EN/AR) but it's very important that you get the Adobe settings to support AR because it glitching by default, and I want the PDF file to be encrypted so no one can edit it or see the codes, and I want access to edit the file? further information will be given after. budget is 45~60$ but in editing conditions, typing with
We are creating app for encrypted communication. We will route the messages wITH PFS encryption. Need server admin expert to HIDE server location from hackers Secure and add more security Train local sustem admin. Example : google phantom secure (no long existing) but had only uncrackable phoned and couldnt locate servers.
...developed for Raspberry pi3 using Python. This will make raspberry pi take input of number from keyboard and make a encrypted call using dial up modem. At the reciever end it will have a modem in auto answer mode and recieve the call over reciever raspberry pi. This way i can make encrypted call over landline without using my phone but raspberry pi.