Decryption software online jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    1,789 decryption software online jobs found, pricing in NZD

    ...included: Auto Ban System: [login to view URL] Change Password: [login to view URL] MySQL Information: [login to view URL] Change Password when Forgot: [login to view URL] Global Functions(Encryption, Decryption and more): [login to view URL] License Generation: [login to view URL] License Vaildation: [login to view URL] Login: [login to view URL] Register: [login to view URL] C# Class...

    $39 (Avg Bid)
    $39 Avg Bid
    4 bids

    A Class re...report should have around 20 pages with the following information. o Algorithm specification o Encryption Procedure: step by step as algorithm (NOT programming Language) o Decryption procedure: step by step as algorithm (NOT programming Language) o Security analysis o Example: Step by Step Note: The report should be free from plagiarism.

    $85 (Avg Bid)
    $85 Avg Bid
    14 bids

    I have a plain Text with me, and I need that to be converted to a ciphertext and that cipher text has to be converted back to plain text. All this should be done by using AES encryption. All the process should be explained clearly on a document for every round. I need this ASAP.

    $42 (Avg Bid)
    $42 Avg Bid
    13 bids

    ...Trace, Wind, Beach, Surfing, Surf, Beach, Vacation, spying, security, decryption Domain: [login to view URL] Possible Business uses: A solution provider, consulting company, Math Coaching company, Security company Keywords: Swift, solve, fast, solution, consulting, math, security, decryption Domain: [login to view URL] Possible Business uses: An office productivity

    $172 (Avg Bid)
    $172 Avg Bid
    26 bids

    ...skilled programmer that is experienced with: - Programming in a strong language such as C++ - Kernel-level programming - Process injection - Code reversal (including some decryption) - Direct Memory Access - Stealth techniques to secure your own application's process from tampering - Experience with multiplayer games - Coding from scratch, no copy/paste

    $4891 (Avg Bid)
    $4891 Avg Bid
    31 bids

    I need an email encryption and decryption app. Bid only if you are an encryption expert and know android inside out. ABSOLUTELY NO BIDS FROM INDIA PLEASE. Need design and code. In app payments required. screen 1: login/signup/ recover password screen 2: signup : email, password, first name, last name screen 3: email confirmation screen 4: main screen:

    $600 (Avg Bid)
    $600 Avg Bid
    6 bids

    I have an encrypted string for which I know the value of the first 200 will be after decryption. I will pay for the decryption method. To not waste my time, include the first character of the decrypted string in your bid (I know what it is) Here is the first 200 characters of the encrypted string for which I need the method to decrypt: cd0ee7c3

    $65 (Avg Bid)
    $65 Avg Bid
    4 bids

    Image encryptio and decryption aes

    $224 (Avg Bid)
    $224 Avg Bid
    12 bids

    I need an email encryption and decryption app. Bid only if you are an encryption expert and know android inside out. ABSOLUTELY NO BIDS FROM INDIA PLEASE. Need design and code. In app payments required. Budget 300 max

    $632 (Avg Bid)
    $632 Avg Bid
    6 bids

    I want to encrypt and decrypt Videos,Images,Audio,Pdf etc files. I want to make this type if app! [login to view URL] [login to view URL] [login to view URL] [login to view URL] [login to view URL] [login to view URL] [login to view URL]

    $180 (Avg Bid)
    $180 Avg Bid
    4 bids

    I want to encrypt and decrypt Videos,Images,Audio,Pdf etc files. I want to make this type if app! [login to view URL] [login to view URL] [login to view URL] [login to view URL] [login to view URL] [login to view URL] [login to view URL]

    $153 (Avg Bid)
    $153 Avg Bid
    7 bids

    -a node authentication program for iot so i can run on raspberry pi/desktop -the protocol is using ECC encryption/decryption -the protocol consists of 2 phases -have sender, receiver and a third party

    $192 (Avg Bid)
    $192 Avg Bid
    4 bids

    I need someone to create a cheat/hack for pubg and pubg mobile game. It's a packet-based radar which sniffing PUBG game's UDP packets, decrypt them, find the l...projects on github, but all are outdated since they can't decrypt packets. This project requires knowledge about pubg radar and experience about network , reverse engineering, decryption.

    $822 (Avg Bid)
    $822 Avg Bid
    5 bids

    John description : 1. encryption and decryption of an output 2. file Executioner injector to a word doc ==> which run through a powershell or vbscript 3. window 7 to 10 compatible 4. Microsoft version up to date 5 The executional file must run silently and automatically install the exe/dll/bat/pif file in the background after clicking of enable content

    $326 (Avg Bid)
    $326 Avg Bid
    2 bids

    ...that will allow individuals and large companies the ability to security store data and files without fear of data breach. It does this through three levels of encryption and decryption. The idea is similar to Cryto Stripe; however, this platform would also allow for server storage through FTP. For more info about Crypto Stripe to get a better idea of the

    $1132 (Avg Bid)
    $1132 Avg Bid
    29 bids

    1. Check given keys if valid 2. determine the decryption formula 3. implement c++ program to do decryption and encryption that can detect invalaid keys and display error message (to be run in windows)

    $57 (Avg Bid)
    $57 Avg Bid
    4 bids

    I want a person who is comfortable in cryptography concepts and using them in c++ code. My requirement is two small tasks where each needs to do encryption/decryption or hashing using openssl library in c++ coding. I can give the steps to install openssl in a linux environment. The exact task to be done is available in the attached file. I want each

    $60 (Avg Bid)
    $60 Avg Bid
    8 bids

    ...<[login to view URL]> <[login to view URL]> where -e option is encryption and -d option is decryption 3. Program must cope with special inputs (e.g. replacing 'i' with 'j') during encryption and decryption 4. Program must be able to remove additional characters during decryption when a user inserts those additional characters. 5. Generate r...

    $175 (Avg Bid)
    $175 Avg Bid
    15 bids

    I need an email encryption and decryption app. Bid only if you are an encryption expert and know android inside out. ABSOLUTELY NO BIDS FROM INDIA PLEASE. Need design and code. In app payments required. Budget 300 max

    $601 (Avg Bid)
    $601 Avg Bid
    11 bids

    column level encryption/decryption in python 3.6 using pycryptodome. The code should take input from adls( azure datalake) and saving into adls. All the optional parameters are should pass from command line.

    $30 / hr (Avg Bid)
    $30 / hr Avg Bid
    11 bids

    Hello I have created a program which decrypts tracks using bento4 but I am stuck at writing file to disk. The program crashes when writing decrypted tracks, because the size of the encrypted and decrypted samples are not the same. The problem is in [login to view URL] in FragmentedSampleReader::ReadSample() after this comment : // Write initialisation & data into decrypted file. I have a off...

    $42 (Avg Bid)
    $42 Avg Bid
    3 bids

    ...sender Part of the receiver Where the sender - sends the encrypted voice by phone to the other party The receiver part decrypts the voice and hears it normally Encryption and decryption are in real time One piece works as a sender and recipient at the same time This video is only to explain and understand the idea well [login to view URL]

    $1964 (Avg Bid)
    $1964 Avg Bid
    7 bids

    Hi Muhammad Aadil B., I noticed your profile and would like to offer you my project of xmzx decryption . We can discuss any details over chat.

    $201 (Avg Bid)
    $201 Avg Bid
    1 bids

    Hi Lokesh B., I noticed your profile and would like to offer you my project of xmzx decryption . We can discuss any details over chat.

    $378 (Avg Bid)
    $378 Avg Bid
    1 bids

    ******** Please read the description carefully ******* GSM is the most wide spread mobile communications system in the world. However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters ...

    $538 (Avg Bid)
    $538 Avg Bid
    6 bids

    I have a few videos with me which can be played only with a particular 3rd party software(decryption software). This 3rd party program prevents any screen recording. Also it prevents me from giving access through Teamviewer or other Remote desktop software. Cam you help me with this?

    $35 (Avg Bid)
    $35 Avg Bid
    7 bids

    Hi, I would like to talk with you about your file decryption services

    $151 - $151
    $151 - $151
    0 bids

    The broad aims of this project are as follows: 1. Reducing theft by providing an secure offline cryptocurrency application and store...this project are as follows: 1. Reducing theft by providing an secure offline cryptocurrency application and store the keys of the cryptocurrency system. 2. Encryption and decryption techniques for securing the key.

    $228 (Avg Bid)
    $228 Avg Bid
    6 bids

    implementation of AES encryption /decryption in matlab with user interface

    $666 (Avg Bid)
    $666 Avg Bid
    37 bids

    We need an iOS developer to work on a medical project which includes integration of a hardware component and also includes data encryption and decryption.

    $35 (Avg Bid)
    $35 Avg Bid
    4 bids

    i already have my application but what i need is i want to calculate the encryption and decryption time

    $30 (Avg Bid)
    $30 Avg Bid
    10 bids

    find out Encryption Time and Decryption Time?

    $36 (Avg Bid)
    $36 Avg Bid
    13 bids

    The aim of this software is to retrieve files from an IT system and parse the information into a different format with some conditions. Files are placed in an ftp folder for each pharmacy ( in this case 1 pharmacy but in future multiple pharmacies) we have username and password to connect to server and retrieve new files and place in n local folder

    $1059 (Avg Bid)
    $1059 Avg Bid
    34 bids

    We need some Android developers. we need who has knowledge of Hiding the file/folder using Encryption/Decryption. we need a serious and hard working person at LOW budget

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    9 bids

    Hello everybody! We developed a C program for an IoT device that uses strings generated by our No...strings generated by our Node JS REST Api. To improve security, we encrypt the strings generated on server side and need to decrypt them with the C program. Hence, we need a decryption function compatible with the library we are using on Node "crypto".

    $228 (Avg Bid)
    $228 Avg Bid
    5 bids

    While usi...opencv GUI application which detects face from camera ( reading the above rtsp Url ) and save it as an image. This time the stream is encrypted. I can provide u the key for decryption used at the time of setting encrypted stream. IMP: BID ONLY IF YOU KNOW HOW TO DECRYPT AN ENCRYPTED STREAM. JUST READING FACE FROM VIDEO IS NOT ENOUGH.

    $293 (Avg Bid)
    $293 Avg Bid
    4 bids

    GSM is the most wide spread mobile communications system in the world. However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters the GSM network . Project requirements: No JB, Do not...

    $11 - $112
    $11 - $112
    0 bids

    GSM is the most wide spread mobile communications system in the world. However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters the GSM network . Project requirements: No JB, Do not...

    $604 (Avg Bid)
    $604 Avg Bid
    6 bids

    GSM is the most wide spread mobile communications system in the world. However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters the GSM network . Project requirements: No JB, Do not...

    $199 (Avg Bid)
    $199 Avg Bid
    5 bids

    ...security features - Payment gateway security, to keep transaction data safe. File upload security, to ensure only correct file upload. One way hash code to prevent password decryption. Two step verification for admin access. Prevention of SQL injection. CAPTCHA validation on all forms Access level and branch level security....

    $1604 (Avg Bid)
    $1604 Avg Bid
    32 bids

    While using OpenCV to capture Faces from Video from IPCamera , we can use the RTSP URL to read the stream like below ...opencv GUI application which detects face from camera ( reading the above rtsp Url ) and save it as an image. This time the stream is encrypted. I can provide u the key for decryption used at the time of setting encrypted stream.

    $156 (Avg Bid)
    $156 Avg Bid
    3 bids

    ...encrypts the file with your encryption algorithm and saves the processed file to an encrypted file with same file name but with an extension of ".enc". When you run the decryption program, it reads the encrypted file and decrypts (or reverses) it and saves it to same filename but with an extension of ".dec" which stands for decrypted file. For example:

    $60 (Avg Bid)
    $60 Avg Bid
    3 bids

    I need you to develop some software for me. I would like this software to be developed for Windows . I need someone to check my Dropbox activity log for suspicions of malware, worms and any other suspicious activity

    $230 (Avg Bid)
    $230 Avg Bid
    2 bids

    ...the intrinsic authentication configurations, decryption techniques and counter measures. The report you develop must be in IEEE format(4k words) an indicative list of sections for the report are:-. • Title • Abstract • Introduction • Protocol Scope • Protocol Standards • Toolset/Attack Software • Toolset/Attack Effects • Counter M...

    $146 (Avg Bid)
    $146 Avg Bid
    27 bids
    $45 Avg Bid
    18 bids

    c language using devc about encryption/decryption. should be than 150 line. need it as soon as possible

    $45 (Avg Bid)
    $45 Avg Bid
    1 bids

    I need you to develop a script for me. Iimplement a python 3 code that decrypts the the encryoted [login to view URL] shall take the cipher text as input and output would be in plain text.

    $36 (Avg Bid)
    $36 Avg Bid
    20 bids

    ...done: File Recovery Evidence verification Image file properties File carving Does it have Filters to aid the examiner like Encase/FTK? Hex Value interpreter usage Decryption/Encryption of a file What encryption does it support? File search in unallocated space Internet artefacts (Browser history) Emails analysis Registry files analysis

    $381 (Avg Bid)
    $381 Avg Bid
    12 bids