Sha 256 decryptionlavori

Filtro

Le mie ultime ricerche
Filtra per:
Budget
a
a
a
Tipo
Competenze
Lingue
    Stato del lavoro
    2,000 sha 256 decryption lavori trovati, prezzi in EUR

    Il progetto consiste nella realizzazione di una grafica con un tema tipo che comprende uno sfondo da impostare, una serie di icone/immagini che rappresentino, Home, Luce, Acqua, Temperatura, segni più - meno, frecce, tapparella, finestra, scuri, tende interne, tende esterne avvolgibili, elettrodomestici tipo lavatrice asciugatrice forno, Radiatore, portone scorrevole, portone a ante, tasti per...privi di testo che verranno utilizzati per funzioni particolari. Di tutte queste icone dovrà essere realizzata due stati esempio per lampadina accesa e spenta, per forno acceso e spento, per portone aperto e chiuso, per allarme inserito e disinserito, presa di corrente attiva e non attiva. Tutte le immagini dovranno essere realizzate e fornite vettorialmente ed esportate in PNG for...

    €405 (Avg Bid)
    €405 Offerta media
    20 offerte
    Trophy icon Humorous T-shirt Design 6 giorni left

    I'm seeking a skilled graphic designer to create a funny, brightly colored T-shirt design that features humans. The aim is to create an engaging, humorous design that is sure to catch the attention. Key Requirements: - Excellent skills and experience in gra...particularly with T-shirt design. - Ability to create eye-catching, humorous designs. - Proficiency in handling bright colors and human figures in design. - Good sense of humor to incorporate wit in the design. The ideal candidate will have a keen eye for detail and ability to translate ideas into creative graphics. It needs to have my company name and phone number, Custom Pro Services llc 256-399-7140. I want it to say something like, i got plastered by Custom Pro Services. We are a swimming pool plastering and ...

    €94 (Avg Bid)
    Garantito
    €94
    76 proposte

    I'm looking for a professional translator to convert an English written content to Italian. The timeline for this project is extremely tight and I need a freelancer who can deliver quality results promptly. Key Requirements: - Translate English content into Italian: You must have excellent command of both languages with experience in content translation. - Experience with Pagination: The conten...Skills and Experience: - Proven experience in English to Italian translation, specifically in the context of pagination. - Ability to work under tight deadlines without compromising on quality. - Strong communication skills to provide regular updates on the progress of the project. Please provide a portfolio of your previous translation work and any relevant experience with pagination. P...

    €343 (Avg Bid)
    €343 Offerta media
    54 offerte

    As the owner of a web-based platform, I'...posing the problem remains unclear due to lack of further information. Therefore, I need an expert who possesses a deep understanding of payment processing systems, particularly Google Pay, and who is proficient with cryptographic systems on the web platform. Your tasks will include the following, depending on the discovered problem: - Debugging and resolving encryption problems - Sorting out decryption issues - Overcoming challenges related to key generation and management Despite the puzzle-like nature of the job, a meticulous and patient troubleshooter with strong experience in the field will find this task enjoyable and well within their capabilities. I look forward to hearing from you if you are up for this challenging yet ...

    €70 (Avg Bid)
    €70 Offerta media
    11 offerte

    I'm looking for a skilled developer to implement DTLS in C for secure communication within a tight deadline of two weeks. Key project requirements: - Implement DTLS in C: The primary goal of this project is to intro...Security Background: Strong understanding of encryption protocols and data integrity is necessary. - Time Management: Ability to work under strict deadlines and deliver high-quality results promptly. Required Skills: Proficiency in C programming language Experience with UDP socket programming Knowledge of DTLS (Datagram Transport Layer Security) protocol Ability to implement encryption and decryption mechanisms Familiarity with video streaming or live feed protocols and techniques" Please include examples of similar projects you have successfully complet...

    €484 (Avg Bid)
    €484 Offerta media
    8 offerte

    I require a competent programmer to create a RSA (South African) drivers license decryption class library in C#. The library needs to take encoded strings (Barcode scan) as input and generate a decoded file as output. Key requirements: - Extensive experience with C# - Capability to handle encoded strings - Generate a decoded file as required output as a C# model class that is easy to use and contain all required data. - The library need to work within a .NET Core 3.1 API. - A detailed explanation of how to use use this library needs to be provided. PLEASE NOTE: The focus is on creating a reliable and efficient library, hence a solid understanding of performance optimization is necessary. A strong grasp

    €133 (Avg Bid)
    €133 Offerta media
    25 offerte

    I’m in need of an intermediate-level C++ coder for a bitcoin mining initiative. The successful applicant must be comfortable with coding for solo mining. This project doesn't require expertise in multi-threading or pool mining, but a firm grasp on the creation and development of bitcoin mining algorithms is essential. An understanding of SHA-256 algorithm implementation is a plus, though not mandatory. Looking forward to your bids, and to our potential collaboration.

    €121 (Avg Bid)
    €121 Offerta media
    18 offerte

    ...developing encryption, decryption, and key generation functionalities. Key Project Requirements: - Extensive knowledge and application of Cryptography - Proficiency in the C programming language - Experience in generating SHA keys The Cryptographer will perform the following tasks: 1. Encryption and Decryption: You will write code that facilitates both encryption and decryption processes using the AES (Advanced Encryption Standard) algorithm. 2. Key Generation: Involves the creation of a safe and secure key generation mechanism utilizing SHA. You should prioritize key security to guarantee the confidentiality and integrity of the encrypted contents. 3. File Support: The coded software should accept file inputs only, handling and processing encry...

    €16 (Avg Bid)
    €16 Offerta media
    3 offerte

    ...both a 3D and flat icon for brand consistency. I need an icon to use in some cases since my logo is so big. The requirements include: - Creating a 3D icon version utilizing the original logo colors - Designing a flat icon version using the same color scheme - Delivering the final icons in PNG, AI, SVG, and JPG formats Here's an example of the flat icon - Here's the 3D icon - Here's my actual logo files - The ideal freelancer for this

    €72 (Avg Bid)
    €72 Offerta media
    171 offerte

    I need a modern architectural design for a house with a plot size of 32x72, covering 256 square yards. The ground floor should include a double-height living area, three bedrooms, a kitchen, dining area, and a drawing room. The first floor should feature three additional bedrooms. The project should envelop both interior and exterior designs, along with 3D visualizations. Specifications: - Style: Modern Architecture - Theme: Modern Interior - Color Palette: Latest Trending Styles Ideal skills and experience for the job: - Bidders should have proficiency in modern architecture and interior design - Experience in creative space utilization in residential layouts - Expertise in 3D visualization of plans and designs - Awareness of latest color trends in interior design This is a fa...

    €133 (Avg Bid)
    €133 Offerta media
    46 offerte

    As an expert in Google Cloud services and security configurations, you'll be tasked to: - Set up a Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen sharing....Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen sharing. - The main goal is to increase the security of the site. - You're expected to disable TLS 1.0 and 1.1 protocols, and enable both TLS 1.2 and TLS 1.3 versions in the project for optimal security. - Also, certain encryption algorithms, specifically RSA, AES 128, AES 256, CBC and GCM need to be disabled. The ideal candidate must have extensive experience with GCE and advanced understanding of TLS protocols and en...

    €49 (Avg Bid)
    €49 Offerta media
    4 offerte

    I'm looking to integrate C# code for RSA encryption within the framework of the Ayushman Bharat Digital Mission. Key specifications include: - The encryption is needed for text data - It requires RSA Encryption - Key size requirement for the encryption is not provided, but guidance can be found at this helpful link: The ideal candidate for this project has a strong knowledge of C# and experience in implementing RSA encryption. They should be able to handle sensitive data and ensure maximum security standards.

    €70 (Avg Bid)
    €70 Offerta media
    14 offerte

    More details: What is the primary reason for encrypting the Raspberry Pi 4 OS and inside files? Protect sensitive data What encryption level do you require for your sensitive data? 256-bit encryption Are there specific files or data types that need to be prioritized in the encryption process? Program and System Files

    €145 (Avg Bid)
    €145 Offerta media
    8 offerte

    I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior...- The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption...

    €153 (Avg Bid)
    €153 Offerta media
    39 offerte
    pixel art de escudo Terminato left

    hacer el escudo en 256 y otro de 128 pixel

    €40 (Avg Bid)
    €40 Offerta media
    1 offerte

    I am looking for a Flutter developer to create a comprehensive PDF package (not APP). - The package should include functionality for: 1.) PDF encryption and decryption 2.) PDF compression 3.) Splitting PDF into multiple PDFs 4.) Merging multiple PDFs 5.) Watermarking PDF 6.) PDF validity and protection info 7.) Add page no. to the PDF 8.) Change PDF page size IMPORTANT: Do not use any underlying technology which requires AGPL-3.0 license or any other license which asks for fees for commercial use. Platform Support: - The Flutter package should be able to work seamlessly across both iOS and Android platforms. Exhaustive documentation will be required for the package. Example flutter package (for reference only): Payments will be done in phases

    €675 (Avg Bid)
    €675 Offerta media
    59 offerte

    I need help recovering encrypted documents from my partially operational server. The server is currently inaccessible, but I have a complete backup of the affecte...recovering encrypted documents from my partially operational server. The server is currently inaccessible, but I have a complete backup of the affected files. The files are encrypted, and I need them recovered in their original format. Key Requirements: - Specialized in encrypted file recovery - Proficiency in data recovery from partially operational servers - Experience with document recovery and decryption It's important that the freelancer has the necessary skills and tools to recover the encrypted documents from my server without causing any further damage. The recovered files should be in their original, unco...

    €112 (Avg Bid)
    €112 Offerta media
    5 offerte

    ...Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this task is for you to implement the validation logic manually. - Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. - Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the task of finding a hash be...

    €10 (Avg Bid)
    €10 Offerta media
    3 offerte

    I am in need of a professional who can assist me in unlocking and editing the text content of my PDF document. My project requirements in detail are: 1. **PDF Unlocking**: - Remove the password from my PDF to grant access for editing. 2. **Text Editing**: - Modify the existing text in the document. The changes to be made will be provided.Sw...PDF to grant access for editing. 2. **Text Editing**: - Modify the existing text in the document. The changes to be made will be daviradu with someone with a score of 220 The ideal freelancer for this project should be experienced with PDF editing tools, have a strong attention to detail and excellent command of the English language. Knowledge of various encryption and decryption techniques would be highly beneficial.

    €18 (Avg Bid)
    €18 Offerta media
    48 offerte
    Log FIle Decryption Terminato left

    I need to decrypt a crypted client-side log file (.txt) of a desktop application The goal is to understand the logic behind encryption and write a simple script that translates data in human-readable text. I have no idea on how encryption is made. The application has a client-server architecture, and could have restrictions based on user location. So, you will likely need to use a vpn or vps to test. Source code must be delivered at the end of contract, better if logic behind script is directly explained via call (not mandatory). Preferred language for scripts is p1ton (volutanry wrong to not received automated answers), but I am open to other language if there are clear benefits.

    €125 (Avg Bid)
    €125 Offerta media
    61 offerte

    I am in urgent need of a decryptor tool to recover my files that have been encrypted by a virus. My all files are encrypted with ".mkp" Unfo...all files are encrypted with ".mkp" Unfortunately, I do not have any backups of these files, so the tool needs to be able to decrypt them directly. Key Requirements: - The tool must be compatible with Windows OS - It should be able to quickly and effectively decrypt files with the .mkp extension Experience Needed: - Proficiency in software development and security - Experience in creating decryption tools is highly preferred - Ability to work quickly and effectively to meet the immediate deadline Please only bid on this project if you are confident in your ability to meet these requirements and can deliver the tool w...

    €11 (Avg Bid)
    €11 Offerta media
    1 offerte

    I'm seeking an expert who can decrypt an AES encrypted .cap file. The file contains encrypted data I need to access for educational purposes. Key requirements include: - Expertise in decrypting AES encrypted files - Ability to efficiently and securely recover the data from the .cap file - Strong commitment to data privacy and confidentiality Please provide examples of similar work you have done in the past, and outline your proposed approach to this task.

    €17 / hr (Avg Bid)
    €17 / hr Offerta media
    15 offerte

    I am seeking an expert who can reverse engineer an APK file. the main idea is to know how to call the API from Postman as the API request has signature and the response is encrypted. the signature and the decryption happen inside the APK APK Link: This APK is coded in Java and your primary task will be to decipher the APK's code structure for a comprehensive understanding. Note that documentation is not required after reverse engineering. Experience in Java and advanced reverse engineering techniques are primary skills that you should possess. Good communication will be an important advantage because I might need to understand complex operations during the process. Thanks for considering this project.

    €441 (Avg Bid)
    €441 Offerta media
    64 offerte

    I need someone to calculate and show me simply the difference between different computer systems: 1) standard 32 bit computer 2) standard 64 bit computer 3) 32 qubit quantum computer 4) standard 256 bit super computer 5) standard 1024 bit super computer 6) a hypothetical system that uses hex instead of bits I will give 2 simple calculations and i simply need to understand how many combinations ie how long it would take to perform simple calculations for each of the 6 systems. Will lead to more work

    €89 (Avg Bid)
    €89 Offerta media
    30 offerte

    ...and project development process. • A graphical interface for file encryption and decryption. • Important Implementation Tips: In your implementation, please adhere to the following guidelines: 1. Your program should accept any file type as input (e.g., .docx, .jpg, .xlsx, etc.). 2. Depending on your chosen encryption algorithm, the program must split the input file into appropriate blocks for encryption. 3. Encrypt the file's extension and append it to the last block of encrypted data. 4. Add a new, algorithm-specific extension to the encrypted file. For example, if you use an algorithm named "X", you might append ".bwf" or another unique extension to the encrypted files. 5. Ensure that your decryption process accurately recovers t...

    €107 (Avg Bid)
    €107 Offerta media
    44 offerte

    ...algorithm and project development process. • A graphical interface for file encryption and decryption. • Important Implementation Tips: In your implementation, please adhere to the following guidelines: 1. Your program should accept any file type as input (e.g., .docx, .jpg, .xlsx, etc.). 2. Depending on your chosen encryption algorithm, the program must split the input file into appropriate blocks for encryption. 3. Encrypt the file's extension and append it to the last block of encrypted data. 4. Add a new, algorithm-specific extension to the encrypted file. For example, if you use an algorithm named "X", you might append ".bwf" or another unique extension to the encrypted files. 5. Ensure that your decryption process accurately recover...

    €123 (Avg Bid)
    €123 Offerta media
    49 offerte

    I'm seeking an expert in Python to develop a decryption utility tool. The purpose of this tool is to decode encrypted messages, binary files, and encoded data, helping me simplify and expedite data analysis tasks. The ideal candidate will: • Have substantial experience with Python programming. • Be familiar with various encryption algorithms, notably AES, RSA and DES. Your expertise in these will be key to the successful creation of this utility. • Be committed and focused, as the tool must be completed ASAP. Looking forward to receiving bids from suitable and interested freelancers. Please, when bidding, include any relevant experience and examples of similar projects.

    €20 (Avg Bid)
    €20 Offerta media
    77 offerte

    I need an ETL developer to streamline and automate an existing manual process. This includes: - Transferring two encrypted *. files from a source server to a local machine. - Decrypting these files into *.csv format. - Running SQL on one file and a PowerShell command on the other file to create a staging table. - Setting up a Microsoft SQL Server...- Setting up a Microsoft SQL Server database into read-write mode from read-only. - Reverting the database back to read-only upon task completion. - Sending a report to the user upon task completion. Ideal skills for this job include advanced SQL, PowerShell, and ETL development. Familiarity with read/write permissions on Microsoft SQL Server and experience with data transfer and encryption/decryption processes are also highly benefici...

    €32 (Avg Bid)
    €32 Offerta media
    17 offerte

    I am looking for a specialist to make a custom encryption for my laptop's UEFI firmware at runtime and decr...addressing security vulnerabilities. Here's what I am looking for: - A comprehensive understanding of kali linux as that is the targeted operating system for this project. - Proficiency in dealing with UEFI firmware. Specifically, if you have experience working with the firmware on the Lenovo Ideapad Slim 3 15IIL05, that would be preferable. - Prior experience with firmware encryption and decryption. - An in-depth understanding of mitigating potential security vulnerabilities. With your help to boost my system's security, I look forward to granting only legitimate parties necessary access to my laptop. Please apply if you have the skills and experience to ...

    €1189 (Avg Bid)
    In primo piano
    €1189 Offerta media
    6 offerte

    I need an expert cryptographer capable of working with custom encryption used for game client files. Specifically, your task will involve the following: - Decrypting game configuration files and game asset files. These two types of files are crucial to the completion of the project. - Explain what is the method used for encrypting the files Ideal candidates for this job would have proven experience in decrypting custom game client files, asset extraction, and game behavior analysis. Please provide a detailed explanation of how you plan to approach this task in your bid.

    €187 (Avg Bid)
    €187 Offerta media
    42 offerte

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security and confidentiality given its sensitive nature.

    €12 (Avg Bid)
    €12 Offerta media
    26 offerte

    ...for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this challenge is for you to understand and implement the validation logic manually. Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the challenge of finding a hash...

    €12 / hr (Avg Bid)
    €12 / hr Offerta media
    7 offerte

    ...Authentication methods, Secret management, and Encryption/Decryption. Key tasks include: To use and operate Vault, we should create a document that shows: -Are there circumstances that would require the Vault master key, and its derived keys to be regenerated? Is there control over the encryption algorithm / primitives selected and used by Vault? How, when and why a secret stored by vault should have its encryption key regenerated? How can vault policies be created? What is the minimum standard for a policy we should be aiming for, e.g. TTL? - Documenting LDAP and token-based authentication methods. - Detailing the process of managing Database credentials, API keys, and Certificates using Vault. - Understanding and writing about the encryption/decryption fundamentals ...

    €16 / hr (Avg Bid)
    €16 / hr Offerta media
    12 offerte

    ...developer to create a decryption application compatible with Linux, specialized in handling Ioncube-encrypted files. The ideal candidate will leverage their robust coding skills and experience to develop a system capable of decrypting multiple files simultaneously. Key functionalities should include: - Compatibility with Linux OS - A user-friendly interface that supports drag-and-drop functionality - Incorporating a progress bar to track the decryption process Proficient experience with Linux platform, a strong understanding of Ioncube encryption, and the ability to create interactive user experiences are required for this project. Your proficient command in innovative coding methods and problem-solving skills should be geared towards achieving an efficient and reliable...

    €102 (Avg Bid)
    €102 Offerta media
    24 offerte

    For this task, I require a skilled developer with solid background in Docker and Kafka. The task at hand is to work on an existing Docker Compose script for a Kafka application centered around authorization. Key Requirements: - Incorporating SASL/SCRAM authentication mechanism. - Focusing on the SCRAM-SHA-256 version for Kafka authentication. A deep understanding of the listed technologies and profound experience in adding security features to Kafka applications will be a significant advantage. Secure, reliable streaming is the goal. Therefore, the freelancer needs to be knowledgeable about how SASL/SCRAM authentication enhances Kafka application's security. Only bid if you are highly confident you can deliver my exact requirement.

    €25 (Avg Bid)
    €25 Offerta media
    4 offerte

    Here is a NodeJs package that is used to decrypt media files received on WhatsApp messages for our clients. This works we...disk. This takes a lot of memory for large files. We need to modify this script so as to return stream instead of data. We should be able to use the stream in a pipeline/pipe. I have a small NodeJS script with above code, that you should take a look at and let me know if you can do it. To accomplish this, you should definitely have: - Experience with advanced NodeJS development and general decryption algorithm - Try not using other external packages, if possible - Ask me for the nodejs project in private message - Should be easy task for someone experienced Thank you in advance for your interest in my project and your bids.

    €44 (Avg Bid)
    €44 Offerta media
    7 offerte

    I am looking to enhance the security level and add features to my current Payten payment gateway through PHP. This gateway is functionally intact yet bordering obsolescence. Our ideal candidate should have substantial experience with Payten, PHP, and secure payment gateways. The scope of work involves: -Up...our payment gateway. The amount you bid is what I will accept! after bidding I will not sit down with you to discuss the amount to be paid. READ THE REQUIREMENTS AND BID ACCORDINGLY! DO NOT WASTE MY TIME! I will provide the latest php samples provided by my payment gateway the current scripts are working but they use SHA1 algorithm and soon they will stop working. The new samples work with SHA You are required to modify the current files to make them work with the latest...

    €164 (Avg Bid)
    €164 Offerta media
    61 offerte

    Hello i need to creare a script on nodeJS for create a wallet eth , the screept need to work on autoincrement and need to have a range page , the script on parameter need to have page start and page stop for generate , every page need to have 128 / 256 result the user need to choise , the result need to be stored on sql server text me for more info

    €24 (Avg Bid)
    €24 Offerta media
    10 offerte

    ...is an author and speaker with strong focus on China. Therefore, red should be the main color. See my substack here: Needs: - Logo for a Homepage (together with set of fonts to use in the homepage) - Logo for Business Cards (together with set of fonts to use on the business card) - Youtube: for channel and watermark Substack: - minimum 256×256 Pixel (square logo) - brand name: minimum 1344×256 aspect ratio: 21:4 - title picture: minimum: 600x600px square LinkedIn: - Round profile picture - rectangle profile background...

    €86 (Avg Bid)
    €86 Offerta media
    92 offerte

    ...an expert to implement advanced AES-256 bit security encryption for an SQLite database in a Windows application using VB.Net. This task requires specific expertise in working with encryption to secure private data. Key Requirements: - Proficiency in VB.Net - Deep understanding of AES-256 bit encryption - Familiarity with SQLite databases - Prior experience in data encryption The encrypted SQLite database will become a storage unit for personal identifiable information. This sensitive data demands high security measures, thus professional handling is crucial for the success of this project. The completed task should ensure maximum protection against unauthorized access and reliably shield the stored personal data. Main Task: - Implement advanced AES-256 bit enc...

    €56 (Avg Bid)
    €56 Offerta media
    2 offerte

    Necessito que as descrições sejam traduzidas de forma correta e com gramática. Quem se candidatar deverá perceber do produto e não fazer tradução literal mas sim dar os nomes corretos em português Necessito de amostra de tradução da linha 142, linha 256, linha 413, linha 1076, linha 1150, linha 1204, linha1229.

    €129 (Avg Bid)
    €129 Offerta media
    32 offerte
    Trophy icon Lawn Care company logo Terminato left

    Looking for a skilled graphic designer who can help me out in creating a professional logo. My company provides lawn care services. The name of the company is Crabtree Lawn Solutions LLC. I like the idea of having a leaf or a blade of grass somewhere on the logo. The "T" in the word Crabtree could even be a tree. The logo will go on a company vehicle. I also want to add the phone number (256-473-9580) to the bottom of the logo. I really like the example logo that I have attached called "Evergreen". Key requirements for this job are as follows: - Color Palette: The dominant color scheme for the logo needs to be a harmony of green, white, and black. These colors should exude a playful and bold character. - Design Style: The designed logo needs to strike a ba...

    €47 (Avg Bid)
    Garantito
    €47
    657 proposte

    I'm in need of an expert in cryptography, specifically proficient in SHA256, to assist with a custom implementation of a decryption algorithm for data retrieval. The primary responsibilities for this role will include: - Decrypting the SHA256 algorithm with a specific iv and key. - Developing a capability for retrieving transactional data post decryption. - Ensuring the preservation of data integrity during the entire process. Ideal candidates should have experience in data decryption, knowledge of SHA256, and a proven history of successful implementation. The ability to handle confidential transactional data safely and comply with all data security standards is also necessary. This project demands attention to detail, precision, and robust understanding of ...

    €44 (Avg Bid)
    €44 Offerta media
    4 offerte

    I'm currently running Hashicorp Vault with a public SSL/TLS certificate that has expired. I'm seeking an expert that can help to: - Update the expired SSL/TLS certi...with a public SSL/TLS certificate that has expired. I'm seeking an expert that can help to: - Update the expired SSL/TLS certificate - Manage the process securely to prevent any unwarranted access The ideal candidate should have: - Proven practical experience with Hashicorp Vault - Deep understanding of SSL/TLS certificate renewal process - Strong grasp of secret management, data encryption/decryption, and access control - Sound knowledge of cybersecurity best practices. Note: It's okay if you are familiar with any operating system as the specific system Hashicorp Vault is running on won...

    €38 / hr (Avg Bid)
    €38 / hr Offerta media
    5 offerte

    Essentially we convert a string to ASCII. Then find a reversible algorithmn to summate/multiply the keys together. Then with the final variable and other variables such as key length and pigeonholer; We deduce the keys.

    €67 (Avg Bid)
    €67 Offerta media
    1 offerte

    ...vault in my Wildfly 26. The goal is bolstering the security of my data transmission, shielding sensitive data in transit. Features required: - Configure SSL/TLS to desire a 256-bit encryption standard, providing a high level of security, for secure data transmission. - Support for both TLS 1.2 and 1.3 protocols in the SSL/TLS configuration to enable both secure and reliable communication. - Implement Vault setup for effective protection of sensitive data. The ideal freelancer would have: - Extensive experience in handling Wildfly servers. - Detailed knowledge of SSL/TLS configuration and the ability to implement 256-bit encryption. - Familiarity with different TLS protocols and how to support multiple versions. - Proven record of setting up and managing Vaults. Your a...

    €19 (Avg Bid)
    Garantito
    €19
    1 proposte

    I am on the lookout for a CryptoJS expert who is proficient in using IV and keys to decrypt text data. Your task will be: - Decrypting text data with the keys and IV that I will supply. Skills and Experience Needed: To complete this project successfully, you should possess: - Profound understanding of CryptoJS - Experience in decrypting data, specifically text - Skill in using provided IV and keys to decode encrypted data - Incredible problem-solving and communication skills This is a forward-thinking task that requires a professional who is attentive to detail, delivers promptly and comprehends the prime role of data safety and confidentiality. I await your bids.

    €38 (Avg Bid)
    €38 Offerta media
    6 offerte