Decryption software for android jobs

Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Evner
Sprog
    Job-status
    1,789 decryption software for android jobs fundet, i prisklassen EUR

    ...making PHP licensing system for C# client. But I can't check all errors myself. Because my PHP skill is just normal T_T In this script included: Auto Ban System: [log ind for at se URL] Change Password: [log ind for at se URL] MySQL Information: [log ind for at se URL] Change Password when Forgot: [log ind for at se URL] Global Functions(Encryption, Decryption and more): [l...

    €23 (Avg Bid)
    €23 Gns Bud
    4 bud

    A Class re...report should have around 20 pages with the following information. o Algorithm specification o Encryption Procedure: step by step as algorithm (NOT programming Language) o Decryption procedure: step by step as algorithm (NOT programming Language) o Security analysis o Example: Step by Step Note: The report should be free from plagiarism.

    €52 (Avg Bid)
    €52 Gns Bud
    15 bud

    I have a plain Text with me, and I need that to be converted to a ciphertext and that cipher text has to be converted back to plain text....ciphertext and that cipher text has to be converted back to plain text. All this should be done by using AES encryption. All the process should be explained clearly on a document for every round. I need this ASAP.

    €24 (Avg Bid)
    €24 Gns Bud
    13 bud

    We are a domain marketplace at http://www.lysted.com. We regularly get Domain names for listing from domains sellers. We are looking for someone who can suggest keywords for the domain names. It does not require knowledge of domain industry, but it requires extensive general knowledge, creativity, broader thinking, and good command over English. Given

    €100 (Avg Bid)
    €100 Gns Bud
    26 bud

    ...skilled programmer that is experienced with: - Programming in a strong language such as C++ - Kernel-level programming - Process injection - Code reversal (including some decryption) - Direct Memory Access - Stealth techniques to secure your own application's process from tampering - Experience with multiplayer games - Coding from scratch, no copy/paste

    €2827 (Avg Bid)
    €2827 Gns Bud
    31 bud

    I need an email encryption and decryption app. Bid only if you are an encryption expert and know android inside out. ABSOLUTELY NO BIDS FROM INDIA PLEASE. Need design and code. In app payments required. screen 1: login/signup/ recover password screen 2: signup : email, password, first name, last name screen 3: email confirmation screen 4: main screen:

    €347 (Avg Bid)
    €347 Gns Bud
    6 bud

    I have an encrypted string for which I know the value of the first 200 will be after decryption. I will pay for the decryption method. To not waste my time, include the first character of the decrypted string in your bid (I know what it is) Here is the first 200 characters of the encrypted string for which I need the method to decrypt: cd0ee7c3

    €38 (Avg Bid)
    €38 Gns Bud
    4 bud

    Image encryptio and decryption aes

    €129 (Avg Bid)
    €129 Gns Bud
    12 bud

    I need an email encryption and decryption app. Bid only if you are an encryption expert and know android inside out. ABSOLUTELY NO BIDS FROM INDIA PLEASE. Need design and code. In app payments required. Budget 300 max

    €365 (Avg Bid)
    €365 Gns Bud
    6 bud

    I want to encrypt and decrypt Videos,Images,Audio,Pdf etc files. I want to make this type if app! [log ind for at se URL] [log ind for at se URL] [log ind for at se URL] [log ind for at se URL] [log ind for at se URL] [log ind for at se URL] [log ind for at se URL]

    €104 (Avg Bid)
    €104 Gns Bud
    4 bud

    I want to encrypt and decrypt Videos,Images,Audio,Pdf etc files. I want to make this type if app! [log ind for at se URL] [log ind for at se URL] [log ind for at se URL] [log ind for at se URL] [log ind for at se URL] [log ind for at se URL] [log ind for at se URL]

    €88 (Avg Bid)
    €88 Gns Bud
    7 bud

    -a node authentication program for iot so i can run on raspberry pi/desktop -the protocol is using ECC encryption/decryption -the protocol consists of 2 phases -have sender, receiver and a third party

    €111 (Avg Bid)
    €111 Gns Bud
    4 bud

    I need someone to create a cheat/hack for pubg and pubg mobile game. It's a packet-based radar which sniffing PUBG game's UDP packets, decrypt them, find the location of players and other infos, show them on browser. It runs externally, sniffer packets only and doesn't modify memory. There are many pubg radar projects on github, but all are outdated

    €475 (Avg Bid)
    €475 Gns Bud
    5 bud
    Expert Coders Udløbet left

    John description : 1. encryption and decryption of an output 2. file Executioner injector to a word doc ==> which run through a powershell or vbscript 3. window 7 to 10 compatible 4. Microsoft version up to date 5 The executional file must run silently and automatically install the exe/dll/bat/pif file in the background after clicking of enable content

    €189 (Avg Bid)
    €189 Gns Bud
    2 bud

    ...project is for an advanced security application that will allow individuals and large companies the ability to security store data and files without fear of data breach. It does this through three levels of encryption and decryption. The idea is similar to Cryto Stripe; however, this platform would also allow for server storage through FTP. For more info

    €428 (Avg Bid)
    €428 Gns Bud
    6 bud

    ...project is for an advanced security application that will allow individuals and large companies the ability to security store data and files without fear of data breach. It does this through three levels of encryption and decryption. The idea is similar to Cryto Stripe; however, this platform would also allow for server storage through FTP. For more info

    €654 (Avg Bid)
    €654 Gns Bud
    29 bud

    1. Check given keys if valid 2. determine the decryption formula 3. implement c++ program to do decryption and encryption that can detect invalaid keys and display error message (to be run in windows)

    €33 (Avg Bid)
    €33 Gns Bud
    4 bud

    I want a person who is comfortable in cryptography concepts and using them in c++ code. My requirement is two small tasks where each needs to do encryption/decryption or hashing using openssl library in c++ coding. I can give the steps to install openssl in a linux environment. The exact task to be done is available in the attached file. I want each

    €35 (Avg Bid)
    €35 Gns Bud
    8 bud

    ...<[log ind for at se URL]> <[log ind for at se URL]> where -e option is encryption and -d option is decryption 3. Program must cope with special inputs (e.g. replacing 'i' with 'j') during encryption and decryption 4. Program must be able to remove additional characters during decryption when a user inserts those additional characters. 5. Ge...

    €101 (Avg Bid)
    €101 Gns Bud
    15 bud

    I need an email encryption and decryption app. Bid only if you are an encryption expert and know android inside out. ABSOLUTELY NO BIDS FROM INDIA PLEASE. Need design and code. In app payments required. Budget 300 max

    €348 (Avg Bid)
    €348 Gns Bud
    11 bud

    column level encryption/decryption in python 3.6 using pycryptodome. The code should take input from adls( azure datalake) and saving into adls. All the optional parameters are should pass from command line.

    €17 / hr (Avg Bid)
    €17 / hr Gns Bud
    11 bud

    Hello I have created a program which decrypts tracks using bento4 but I am stuck at writing file to disk. The program crashes when writing decrypted tracks, because the size of the encrypted and decrypted samples are not the same. The problem is in [log ind for at se URL] in FragmentedSampleReader::ReadSample() after this comment : // Write initialisation & data into decrypted file. I have a...

    €24 (Avg Bid)
    €24 Gns Bud
    3 bud

    ...sender Part of the receiver Where the sender - sends the encrypted voice by phone to the other party The receiver part decrypts the voice and hears it normally Encryption and decryption are in real time One piece works as a sender and recipient at the same time This video is only to explain and understand the idea well [log ind for at se URL]

    €1136 (Avg Bid)
    €1136 Gns Bud
    7 bud

    Hi Muhammad Aadil B., I noticed your profile and would like to offer you my project of xmzx decryption . We can discuss any details over chat.

    €116 (Avg Bid)
    €116 Gns Bud
    1 bud

    Hi Lokesh B., I noticed your profile and would like to offer you my project of xmzx decryption . We can discuss any details over chat.

    €218 (Avg Bid)
    €218 Gns Bud
    1 bud

    ******** Please read the description carefully ******* GSM is the most wide spread mobile communications system in the world. However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters ...

    €311 (Avg Bid)
    €311 Gns Bud
    6 bud

    I have a few videos with me which can be played only with a particular 3rd party software(decryption software). This 3rd party program prevents any screen recording. Also it prevents me from giving access through Teamviewer or other Remote desktop software. Cam you help me with this?

    €20 (Avg Bid)
    €20 Gns Bud
    7 bud

    Hi, I would like to talk with you about your file decryption services

    €87 - €87
    €87 - €87
    0 bud

    The broad aims of this project are as follows: 1. Reducing theft by providing an secure offline cryptocurrency application and store the ...project are as follows: 1. Reducing theft by providing an secure offline cryptocurrency application and store the keys of the cryptocurrency system. 2. Encryption and decryption techniques for securing the key.

    €132 (Avg Bid)
    €132 Gns Bud
    6 bud

    implementation of AES encryption /decryption in matlab with user interface

    €385 (Avg Bid)
    €385 Gns Bud
    37 bud

    We need an iOS developer to work on a medical project which includes integration of a hardware component and also includes data encryption and decryption.

    €20 (Avg Bid)
    €20 Gns Bud
    4 bud

    i already have my application but what i need is i want to calculate the encryption and decryption time

    €17 (Avg Bid)
    €17 Gns Bud
    10 bud

    find out Encryption Time and Decryption Time?

    €21 (Avg Bid)
    €21 Gns Bud
    13 bud
    XML parser Udløbet left

    The aim of this software is to retrieve files from an IT system and parse the information into a different format with some conditions. Files are placed in an ftp folder for each pharmacy ( in this case 1 pharmacy but in future multiple pharmacies) we have username and password to connect to server and retrieve new files and place in n local folder

    €612 (Avg Bid)
    €612 Gns Bud
    34 bud

    We need some Android developers. we need who has knowledge of Hiding the file/folder using Encryption/Decryption. we need a serious and hard working person at LOW budget

    €6 / hr (Avg Bid)
    €6 / hr Gns Bud
    9 bud

    Hello everybody! We developed a C program for an IoT device that uses strings generated by our Node JS REST Api. To improve security, we encrypt the strings generated on server side and need to decrypt them with the C program. Hence, we need a decryption function compatible with the library we are using on Node "crypto".

    €132 (Avg Bid)
    €132 Gns Bud
    5 bud

    ...camera console and the key is entered for decrypting the video stream. I need a fix to read the encrypted stream and a small opencv GUI application which detects face from camera ( reading the above rtsp Url ) and save it as an image. This time the stream is encrypted. I can provide u the key for decryption used at the time of setting encrypted

    €169 (Avg Bid)
    €169 Gns Bud
    4 bud

    GSM is the most wide spread mobile communications system in the world. However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters the GSM network . Project requirements: No JB, Do not...

    €6 - €65
    €6 - €65
    0 bud

    GSM is the most wide spread mobile communications system in the world. However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters the GSM network . Project requirements: No JB, Do not...

    €349 (Avg Bid)
    €349 Gns Bud
    6 bud

    GSM is the most wide spread mobile communications system in the world. However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters the GSM network . Project requirements: No JB, Do not...

    €115 (Avg Bid)
    €115 Gns Bud
    5 bud

    ...number of passengers Merging multiple supplier results in a single list Filter of hotels by location Filter of hotels by price range 3D street view for the hotels Preferred hotels on top Quotation module for agents Create sub-agents & sub-users Modify search from the hotel list page Display contracted hotels of the system Facility to block on-request hotel

    €928 (Avg Bid)
    €928 Gns Bud
    32 bud

    ...entered for decrypting the video stream. What is the best way to read encrypted stream using RTSP or any other protocol using Opencv or any other technology. I want a small opencv GUI application which detects face from camera ( reading the above rtsp Url ) and save it as an image. This time the stream is encrypted. I can provide u the key for decryption

    €90 (Avg Bid)
    €90 Gns Bud
    3 bud

    ...encrypted file with same file name but with an extension of ".enc". When you run the decryption program, it reads the encrypted file and decrypts (or reverses) it and saves it to same filename but with an extension of ".dec" which stands for decrypted file. For example: The given input file is [log ind for at se URL] To run the encryption program: ...

    €35 (Avg Bid)
    €35 Gns Bud
    3 bud

    I need you to develop some software for me. I would like this software to be developed for Windows . I need someone to check my Dropbox activity log for suspicions of malware, worms and any other suspicious activity

    €133 (Avg Bid)
    €133 Gns Bud
    2 bud
    Write an Article Udløbet left

    ...the intrinsic authentication configurations, decryption techniques and counter measures. The report you develop must be in IEEE format(4k words) an indicative list of sections for the report are:-. • Title • Abstract • Introduction • Protocol Scope • Protocol Standards • Toolset/Attack Software • Toolset/Attack Effects • Co...

    €85 (Avg Bid)
    €85 Gns Bud
    27 bud

    encryption/decryption require urgent work

    €26 (Avg Bid)
    €26 Gns Bud
    18 bud
    simple c programme Udløbet left

    c language using devc about encryption/decryption. should be than 150 line. need it as soon as possible

    €26 (Avg Bid)
    €26 Gns Bud
    1 bud

    I need you to develop a script for me. Iimplement a python 3 code that decrypts the the encryoted [log ind for at se URL] shall take the cipher text as input and output would be in plain text.

    €21 (Avg Bid)
    €21 Gns Bud
    20 bud