Abap encrypt aes jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 abap encrypt aes jobs found, pricing in USD

    I'm looking for an expert to set up Redis in a Rocky Linux podman container. The aim is to ensure that it communicates over TLS using a Let's Encrypt certificate. Key Tasks: - Configure Redis to communicate over TLS - Integrate a Let's Encrypt certificate Ideal Candidate: - Proven experience with Rocky Linux and podman - Strong understanding of TLS and Let's Encrypt - Excellent problem-solving skills The successful candidate will make sure the Redis instance is optimally secured and can communicate over an encrypted channel. I can provide the certificates and build process. podman run --name rediscontainer -it rockylinux:9.3-minimal bash microdnf -y update microdnf -y install redis

    $22 (Avg Bid)
    $22 Avg Bid
    5 bids

    I'm seeking expert to assist in configuring a Site-to-Site VPN on my Zyxel USG Flex 50, ensuring secure and reliable communication between our networks. Key Tasks: - connect to a already existing site - configure usg flex to not use dhcp and other option. just need vpn. i have a box behind Ideal Skills and Experience: - Proficient with Zyxel USG series - experience in VPN connection

    $146 (Avg Bid)
    $146 Avg Bid
    3 bids

    I am seeking an accomplished ABAP developer to provide support for our SAP BW module. Your focus will be on two main areas: - Debugging and Error Fixing: I require comprehensive debugging of my existing system to identify any potential issues, errors, or bugs that may be hampering system performance or functionality. Your expertise in this area should allow for efficient and effective fixes, ensuring optimal system performance. - Code Enhancements and Modifications: Additionally, I need assistance with enhancing and modifying the core ABAP code to cater to business-specific requirements better. This will involve potentially expanding existing capabilities and making any necessary amendments to facilitate smoother business processes. The ideal candidate is an experienced AB...

    $18 (Avg Bid)
    $18 Avg Bid
    3 bids

    Hey you! Do you have more than 6 years as a Laravel Developer? Can you prove it? Can you prove/provide evidence of what you have personally done as a developer? Does compliance to high security standards, encyption at rest, encryption in transit, AES 256, SHA 256 mean something to you? Are you willing to join an existing project? Are you willing to work for a flat monthly salary? Then this job may be for you. Our team is hard at work building a web application. We currently need an additional developer to assist with some key activities. You will be assigned duties by our Application Team Leader. Shoot us a quick message if interested. No agencies or middle men please.

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    77 bids

    ...primary task is to implement encryption and decryption, along with compression and decompression, in the existing project. - Data: The encryption and decryption will primarily focus on text data. - Implementation: I specifically require the use of AES, Huffman, Inflate and Deflate, and GZIP mechanisms for the encryption and decryption process. Ideal Skills and Experience: - Extensive Experience: Strong experience with VB6, particularly in encryption, decryption, compression, and decompression. - Specific Knowledge: Proficiency in implementing AES, Huffman, Inflate and Deflate, and GZIP in VB6. - Industry Best Practices: Knowledge of encryption best practices and data protection standards. If you have expertise in VB6 and encryption/compression techniques, your bid will b...

    $55 (Avg Bid)
    $55 Avg Bid
    10 bids

    ...someone who can connect to AWS (build a server). We are looking for someone who can perform AWS-related tasks such as SSL, server management, backup settings, cost optimization, etc. My current budget is around $10-$20. Please write "awsp" in chat or in the proposal to help determine whether bots are verified. ————requirements -Install SSL/TSL certificates -Set up automatic backups (once a day) -Encrypt data ->Database, disk, backup data, email, file system....., etc. ->Use LUKS, etc... -Transport layer security -Connecting domains -Setting up and activating servers -Installing the control panel -Installing the Server Management Panel -Setting Up a Firewall -Harden SSH security -Install fail2ban and -Install log monitoring and analysis ...

    $23 (Avg Bid)
    $23 Avg Bid
    34 bids

    I'm seeking an expert in website migration, preferably proficient with Wordpress and Ubuntu server installations, creation of V-host, installation of LET's encrypt certificate and Test. The project in focus involves the migration of 3 Wordpress websites currently hosted on a VPS. Advance knowledge of eCommerce plugins, which are in use on these websites, is essential as these need to be properly migrated without loss of data or functionality. Specific Requirements include: 1. Migration Expertise: Proven experience in migrating Wordpress websites from VPS hosting to an Ubuntu server. 2. Plugin Knowledge: Must be well-acquainted with handling eCommerce plugins during the migration process. 3. Backup & Recovery: Unfortunately, there are no existing backups of the w...

    $152 (Avg Bid)
    $152 Avg Bid
    62 bids

    I'm looking for someone who has experience in AES encryption and is also familiar with ASP.Net MVC database connection string, I need a person who can encrypt my connection string and show me the right way to complete the function.

    $8 / hr (Avg Bid)
    $8 / hr Avg Bid
    22 bids

    ...must therefore have no reliance on WiFi, mobile data or any use of a WAP or a WiFi router. It can maybe use a technology similar to Z Wave or Zigbee wireless technology, and maybe use a method like PairAsync for pairing or connecting. The app must have a high level of security using HTTP, SSL, TLS or similar, and must encrypt and decrypt all data during transit and at rest with advanced security features like LESC, and using systems such as, or similar to, FIPS 140-2 and AES-SHA256 cryptography. I would like to have copies of any written source code that is created by you or any details on the tech stack, SDK and APIs used. As the app could be using Bluetooth or BLE, I want users to be able to send and receive data without the requirement of having to prompt for, or give p...

    $892 (Avg Bid)
    $892 Avg Bid
    50 bids

    I'm looking for someone that works with network and understands how to create robust scripts that can encrypt the traffic properly causing even some ISPs not to sniff the connection that I will mention in the chat.

    $151 (Avg Bid)
    $151 Avg Bid
    30 bids

    I have already designed a fitness app and need a developer to bring it to life. The app needs to be compatible with both iOS and Android. Key Points: - The primary function of this app is to advise workouts based on weather - I need the app to encrypt user information to ensure privacy and security. - The app should be user-friendly and intuitive. Ease of use is a top priority.

    $1455 (Avg Bid)
    $1455 Avg Bid
    163 bids

    The request is to convert this website https://demo.templat...user to be able to write a WhatsApp message. In addition to the conversion, we need to add a JavaScript script that will be provided to you, that contain GDPR regulations. All materials (images, videos, graphic templates) will be sent to you after the selection phase. The site should be set up in Italian, but we will change the texts ourselves at a later stage. I need to associate a Let's Encrypt certificate with the domain, which I haven't prepared yet, so I need something that automates the process to update it automatically. It's important that the colors, fonts, and structure are identical to the site present in the template. If you are unable to replicate it or to complete the requests above, p...

    $164 (Avg Bid)
    $164 Avg Bid
    161 bids
    Trophy icon Webpage icon animations Ended

    We are looking for some small animations to be used to highlight the various stages a print job will go through when submitted to our system. We would like these animations to make use of our logo and to highlight the following stages: 1. Upload the print job 2. Compress the print job 3. Analyse the print job (count colour and mono pages) 4. Encrypt the print job The animations will be separate files and we will then use them in our application. I have included a screenshot showing where the animations will be used on our print ticket, as well as our company logo. *** TO BE CLEAR, WE ARE LOOKING FOR ANIMATIONS TO SHOW PRINT JOB BEING UPLOADED PRINT JOB BEING COMPRESSED PRINT JOB BEING ENCRYPTED PRINT JOB BEING ANALYSED IF THESE ANIMATIONS CAN USE OUR LOGO THEN THATS PREFE...

    $250 (Avg Bid)
    Guaranteed Sealed
    $250
    50 entries

    I need a skilled programmer who is also familiar with VMware, Windows, and Autopsy to help me with a project where I need to encrypt a file to demonstrate encryption techniques. Key Requirements: - Programming for file encryption - Report writing for evidence - Experience with VMware, Windows, and Autopsy The primary goal of the project is to demonstrate encryption techniques. The job entails programming a method for encrypting a file using a language of your choice - I have no preference on the language - and then carefully documenting the process in a written report which will be used as evidence. As the report will be used for evidence, it needs to be detailed and written in a clear and professional manner. Please only apply if you have experience in both programming for en...

    $133 (Avg Bid)
    $133 Avg Bid
    27 bids

    SAPUI5 Expert Required on an ad-hoc basis Must have the following skillset -Binding Complex Structures -List Report creation -OData Service Expert -ABAP and BAPI understanding and knowlegde -SAP Plant Maintenance Module SAP PM SAP ABAP DPC Class and retrieving data from PM PM Transactions, Work Orders and Notifications and knowlege of tables SAP Gateway Services SAPUI5 SAP Fiori Elements MVC Framework Bootstrapping SEGW Project Working arrangement: Via Teamviewer/Teams ONLY English Communication Ad Hoc , Remote Position Must be available in SAST (GMT+2) Timezone

    $19 / hr (Avg Bid)
    $19 / hr Avg Bid
    29 bids

    I'm looking for a qualified programmer who can create a peer-to-peer VPN Chrome extension. The expert will need to incorporate specific features and functionalities: - Ability to encrypt the user's data for secure browsing - IP masking capabilities to hide the user's original IP - Bypass geo-restrictions to access content from any location globally In terms of user authentication, Google/Facebook login integration is essential. This extension would need to be easy and straightforward for users to sign in using their Google or Facebook accounts. Also, the extension should include a user-friendly interface that allows users to select desired locations. Specifically, including a dropdown list with a comprehensive selection of countries. To take on this project, you&...

    $196 (Avg Bid)
    $196 Avg Bid
    7 bids

    ...Experience with container platforms like Docker or Kubernetes since I'm yet to determine my preference. Operating System: You can use Ubuntu Server, CentOS, or any other Linux distribution of your choice. Web Server: Nginx or Apache HTTP Server. Git: Version control system to manage your website's source code. Node.js: If you're hosting static sites or using JavaScript-based build tools. Let's Encrypt: For SSL/TLS certificates to secure your websites. CI/CD Tools: Jenkins, GitLab CI, or GitHub Actions for automating deployments. Monitoring Tools: Prometheus, Grafana, or similar for monitoring server health and performance. Deployment Automation: Ansible: Ansible is a powerful automation tool that allows you to automate deployment tasks, such as provisioning ...

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    20 bids

    I need a skilled professional who can generate an SSL Certificate for my website using Let's Encrypt. Although the system is Windows-based, I'm uncertain about the web server software currently in use, hence some investigation may be required. Ideal skills and experiences for this project: - Experience in SSL certificate generation - Familiarity with Windows OS - Knowledgeable in using Certbot command line tool or comparable interface - Ability to investigate and identify the appropriate web server software.

    $16 (Avg Bid)
    $16 Avg Bid
    20 bids

    I'm experiencing a critical issue with the Let's Encrypt SSL on my WHM server; it's not performing accurately on my website. I'm running Alma Linux and WHM Cpanel on my current server. It was working a few days ago but suddenly stopped working so I think the autorenew wasn't set up correctly. Note we are NOT using for SSL installation This is an immediate need and bidding freelancers should be prepared to start work as soon as possible. Necessary skills and experience: - Proven experience with Let's Encrypt SSL - Proficiency in WHM server management - Strong knowledge of Alma Linux - Ability to troubleshoot and resolve this issue promptly I'm looking for an experienced system admin who can swiftly diagnose and resolve this SSL issue....

    $17 (Avg Bid)
    $17 Avg Bid
    23 bids

    I'm looking for a professional who can help me encrypt the information on an SD card securely. The purpose of this encryption is to ensure that if someone tries to read the content outside of the Raspberry Pi, it'll be unreadable. Key Requirements: - Encryption Purpose: The primary use of this encryption is to secure data storage. - Data Access Method: The encrypted data should be accessible automatically on boot, without requiring additional steps like entering a password or using a physical key. - Data Sensitivity: The data to be stored on the SD card is highly sensitive, hence the need for robust encryption. The perfect candidate for this project should be highly skilled and experienced in: - Raspberry Pi projects - Data encryption techniques - Software and hardware ...

    $176 (Avg Bid)
    $176 Avg Bid
    11 bids

    ...automation algorithms to streamline repetitive tasks such as campaign scheduling, audience segmentation, and content personalization. Continuously optimize marketing strategies based on real-time feedback and performance metrics. Security and Compliance: Ensure data privacy and regulatory compliance by implementing robust security measures and adhering to relevant regulations such as GDPR, CCPA, etc. Encrypt sensitive data, enforce access controls, and conduct regular audits to mitigate security risks. Benefits: Enhanced Customer Engagement: By delivering personalized experiences and targeted messaging, the system fosters deeper engagement and loyalty among customers. Improved Marketing ROI: By focusing resources on high-value segments and optimizing campaign performance, the sy...

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    11 bids

    I'm in search of 3 SAP ABAP trainers, with a minimum of 5 years industry experience, interested in conducting in-person training sessions in Mumbai, Pune, and Bangalore. The training is expected to run for 40 days and focus solely on Basic ABAP programming. Key Requirements: - 3 SAP ABAP trainers with at least 5 years of experience - Proficiency in Basic ABAP programming - Previous experience in teaching or training is a plus Ideal Skills and Experience: - Strong understanding of ABAP and its programming concepts - Excellent communication skills and ability to engage with trainees - Prior experience in conducting in-person training sessions Freelancers with the right blend of technical expertise and training experience are encouraged to apply. A d...

    $5987 (Avg Bid)
    $5987 Avg Bid
    1 bids

    ...and Social Security Numbers. - File Saving: After the blurring process, I don't want to affect original data. Therefore, the solution must create a separate PDF that hosts the redacted information. - Encryption: For even further data protection, the blurred PDF file has to be encrypted using the AES (Advanced Encryption Standard) method, ensuring optimal security. To be considered for this task, you should have: - Proven experience with data redaction or similar projects - Robust knowledge of AES encryption - A strong background in software development, specifically for privacy and security applications. The ultimate goal is to generate a tool that is user-friendly and efficient, delivering maximum data protection. An ideal freelancer for this job is rigorous, fam...

    $35 (Avg Bid)
    $35 Avg Bid
    13 bids

    I'm searching for a SAP ABAP Developer specializing in the SD (Sales and Distribution) module. Your main role will be in the development of reports. Task will be divided in phases. Your tasks include: - Creation of two module pool programs, one for SO and another for STO. - Use of BAPI to fetch all details and based on data some calculations needs to be peformed and displayed in output. - Dymanic data to be called based on user input. The perfect candidate should possess the following skills: - Extensive knowledge and experience in SAP SD module - Proficiency in reports development and potentially in Module Pool programming - Strong understanding and technical skills in SAP ABAP development environment Expect a medium level of complexity in this role, so only appl...

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    5 bids

    This is a Yii2 that has 90,000 screens as each page is 3 screens. We need a stable platform to use the processes coded in Html and java to update the databases. We need to keep the PHP version current. We need the new database documented page by page and process by process. There are 2 sites An individuals site. It has these services Member Services Act as an Agent for WebPicID Family-Protection-Service Identity theft fraud loss reduction Membership Merchant Membership Notification Payment Options Refer an organisation to sign up with WebPicID Safe Purchase Secure Message Merchant Services Identity Theft Fraud Loss Reduction WebPicID can Reduce ID Theft Fraud Losses and associated operating costs by at least 50%. WebPicID detects the ID Theft after the sale is paid for; before shipp...

    $398 (Avg Bid)
    $398 Avg Bid
    76 bids

    Hello, I have a file with the ending .algo and I would like to encrypt it and possibly equip it with a software license so that it works with a key. The file has already been written by me and I need precise instructions from you on how to do everything myself using the following software:

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    10 bids

    Develop an app which resides and runs of a usb thumb drive. The app needs to launch automatically when the usb is inserted into the Windows computer. App should give a se...the tools/language/SDKs to be used, and an OPTIONAL add on quote if encryption is required. More details on Encryption below: OPTIONAL QUOTE: Encryption has to be on the entire thumb drive level. As soon as thumb drive is inserted the first time, it has to ask user whether encryption is needed, if yes, it has to ask user to setup a strong key/password and encrypt the disk according to any standard FIPS approved encryption standards (AES preferred). Whenever the thumb drive is used subsequently, it has to prompt user to enter the password to unlock the drive and the app before continuing with backup...

    $774 (Avg Bid)
    $774 Avg Bid
    13 bids

    ...developing encryption, decryption, and key generation functionalities. Key Project Requirements: - Extensive knowledge and application of Cryptography - Proficiency in the C programming language - Experience in generating SHA keys The Cryptographer will perform the following tasks: 1. Encryption and Decryption: You will write code that facilitates both encryption and decryption processes using the AES (Advanced Encryption Standard) algorithm. 2. Key Generation: Involves the creation of a safe and secure key generation mechanism utilizing SHA. You should prioritize key security to guarantee the confidentiality and integrity of the encrypted contents. 3. File Support: The coded software should accept file inputs only, handling and processing encryption and decryption request...

    $17 (Avg Bid)
    $17 Avg Bid
    3 bids

    I'm seeking urgent improvements for my MailEnable (v.10.48) email server. Mail server installation exists and works fine without SSL/TLS. Server is Windows 2019, access allowed via AnyDesk (or Teamviewer) Main task: - install certificate into mailserver, - allow mail-client to use it which all protocols (POP/IMAP/SMTP) Optional task (no need much time): - help me to set "timeout" of webmail access (it seems that now a session is unlimited) - help me to understand how I can customize webmail access if the mail server is configured to answer to more than one domain. Low budget available.

    $134 (Avg Bid)
    $134 Avg Bid
    14 bids

    As an expert in Google Cloud services and security configurations, you'll be tasked to: - Set up a Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen...Set up a Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen sharing. - The main goal is to increase the security of the site. - You're expected to disable TLS 1.0 and 1.1 protocols, and enable both TLS 1.2 and TLS 1.3 versions in the project for optimal security. - Also, certain encryption algorithms, specifically RSA, AES 128, AES 256, CBC and GCM need to be disabled. The ideal candidate must have extensive experience with GCE and advanced understanding of TLS protocols...

    $53 (Avg Bid)
    $53 Avg Bid
    4 bids

    More details: What is the primary reason for encrypting the Raspberry Pi 4 OS and inside files? Protect sensitive data What encryption level do you require for your sensitive data? 256-bit encryption Are there specific files or data types that need to be prioritized in the encryption process? Program and System Files

    $156 (Avg Bid)
    $156 Avg Bid
    8 bids

    I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption methods

    $164 (Avg Bid)
    $164 Avg Bid
    39 bids

    I need a professional to install an SSL certificate from Punch Salad website. The primary purpose is to improve the security of the site and to encrypt user data. Key requirements include: - Assisting in obtaining a suitable SSL certificate, as I do not possess one at the moment - Expertise in SSL installation for blog/personal websites Ideal candidates would have prior experience in SSL installation, especially in the context of personal or blog websites. Excellent communication skills and the ability to explain the installation process in plain terms would be greatly appreciated.

    $27 (Avg Bid)
    $27 Avg Bid
    37 bids

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be determined as part of this process.

    $355 (Avg Bid)
    $355 Avg Bid
    13 bids

    ...rXXBrtQaPUmTFFagUsOyVsKdgLKy6NuF6qy4qbdaeiPq64uWJM3GEfo+VOXfwrc4 r6O5f6PL8TP1INrayhgU45RpeUbdJIdgwXP7iif2GrHiQaAHP+ADFSO2ormIKktw SE0QvdGNDSMEciP8iEYw4MidrcrjSGULDSTjqeMWMwy1G7WbHZ2cn/sp+sGmbPNJ 2JxS3w65mwTuBx1+phK7ugPuD7F+5rkRyYw32MfqPhtfuwza84o5hslCNDo3N7jW NQIDAQAB -----END PUBLIC KEY----- `; function encrypt(plaintext) { var crypt = new JSEncrypt(); (PUB_KEY); return (plaintext); } """) # Execs the function "encrypt" with texto as parameter encripted_text = ("encrypt", texto) return encripted_text #### Here the MAIN script try: stringpassword = 'here the password' result= encriptar(stringpassword) print(result) except Exception as e: print(e) ### END OF CODE ######### ...

    $45 (Avg Bid)
    $45 Avg Bid
    29 bids

    I'm in need of a thorough encryption of my entire website to protect sensitive user data, ensure secure user communication and align with industry regulations...industry regulations. I am open to using the necessary encryption technologies that will meet these needs such as SSL/TLS, HTTPS, IPSec, or others as recommended. Specifically, I want to encrypt: - User login credentials - Payment information - Personal user data The perfect candidate would have strong experience in various encryption technologies and a keen understanding of strict security protocols for user data. Knowledge of industry regulations regarding encryption and user data security is crucial. Please demonstrate your experience with similar past projects, highlighting your strategy to encrypt various...

    $149 (Avg Bid)
    $149 Avg Bid
    57 bids

    I'm in need of a seasoned SAP ABAP Consultant with expertise in various aspects of custom development, system integration, and performance optimization. I'm also in search of someone with hands-on experience with S4 HANA. The ideal candidate should be well-versed in SAP modules like Finance and Controlling, Sales and Distribution, and Material Management. Key objectives of this project include: - The main thing was the candidate should attend project call on behalf of other. And this call should be around 10-15 minutes. - The candidate should 3+ years of experience in SAP ABAP and S4 HANA. - Candidate should be from Hyderabad, India. If you've got a proven track record of success in these areas and a clear understanding of how to best leverage SAP techno...

    $117 (Avg Bid)
    $117 Avg Bid
    12 bids

    I'm in need of an experienced ABAP consultant to spearhead a new development project. The ideal candidate would have extensive experience in ABAP programming, debugging, and performance tuning. Advanced knowledge of HANA implementation is also crucial for this role. Key Responsibilities: - Leading the ABAP programming for a new development project - Implementing best practices in ABAP debugging and performance tuning - Ensuring seamless integration of HANA elements into our development -Implementation of Watsap Business through SAP, for sending invoices to customers automatically through watsap. Ideal Skills and Experience: - Proven track record of ABAP programming, debugging, and performance tuning - Advanced knowledge and hands-on experience with...

    $15 (Avg Bid)
    $15 Avg Bid
    14 bids

    This is a project to convert a complex file encryption/deencryption write in C++ to VB.NET (Framework 4.0)

    $24 (Avg Bid)
    $24 Avg Bid
    3 bids

    ...experienced freelancer to install Odoo 17. The installation should operate under a pre-existing domain in AWS Route 53, and needs to be SSL-protected using Let's Encrypt SSL. Your key tasks will include: - Installing Odoo 17 on Ubuntu server - Domain setup on AWS - SSL protection via Let's Encrypt - Installation of specific Odoo 17 modules: Sales Management, Inventory Management, Customer Relationship Management and Point of Sale. Relevant skills and experience include: - Expertise in Odoo 17 installation, with a deep understanding of Odoo module architecture - AWS and Ubuntu server knowledge - Experience with Let's Encrypt SSL certification - Familiarity with AWS Route 53 for domain setup With these capabilities, you're the reliabl...

    $190 (Avg Bid)
    $190 Avg Bid
    39 bids

    ...data transmission. - Integrating the Qiskit library to leverage its capabilities for quantum computing. - Developing cutting-edge algorithms to enhance the project's efficiency and security. requirements are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and reso...

    $293 (Avg Bid)
    $293 Avg Bid
    27 bids

    I require a qualified professional to install Odoo 13 on my Ubuntu server. The installation must operate under secure Let's Encrypt SSL protection and be associated with a currently active domain on our AWS Route 53. Features: - Complete installation of Odoo 13 - Configuration for public access - Configuration of chosen modules - Sales and Invoicing, Inventory Management, and Point of Sale Ideal Skills and Experience: - Proficiency in server management, specifically Ubuntu - Extensive understanding of AWS Route 53 - Expertise in securing domains with SSL Certificates - Solid experience with Odoo 13, focusing on the Sales and Invoicing, Inventory Management, and Point of Sale modules. Above all, the successful candidate should demonstrate a proven track record installing a...

    $141 (Avg Bid)
    $141 Avg Bid
    46 bids

    The module "Pubkey encrypt" was developed for Drupal 8 during google summer code 2016. Php advanced, so did Drupal and as a consequence the code is not compatible with Drupal 10 at this moment. I seek a seasoned Drupal developer who can go through the code, update it to be compatible with the latest php 8.3 and Drupal 10.2. Since this module depends on encrypt_seclib, which appears to be a wrapper for , you need to update that too. Also ensure, that this module still works with the updated versions of the Encrypt and the Key module. Please note that pubkey_encrypt did not work on a test installation of drupal 8.9 with php 7.4. This was

    $147 (Avg Bid)
    $147 Avg Bid
    25 bids

    ...URL (what would you name them). Complete the following <Sender Email> <Subject> Dear (Name), Email body that would make the recipient click the attachment or a URL (choose one) and list within your email. Why did you choose this approach? Project 2: Using a secure email feature Description: Basic email lacks many privacy features. However, settings are available that allow users to encrypt and control emails. In this project, you will configure Google Gmail to send and open confidential emails. Launch your Gmail email account. Click Compose to open the New Message screen to create a new email message. In the To field enter the address of someone who also has a Gmail account. In the row of icons at the bottom of the New Message screen, click the icon th...

    $16 (Avg Bid)
    $16 Avg Bid
    6 bids

    I'm currently looking for an experienced and full-time Senior DotNet Core Developer for a position that requires expertise in API encryption and system integrity checking. Since this is a web-based system, having solid experience in this area will provide a substantial advantage. Key Responsibilities: - Develop using DotNet Core - API's Development - Encrypt existing APIs - Perform regular checks to ensure system integrity The ideal candidate should have: - Extensive experience in API encryption - Proficiency in DotNet Core development - Proven experience in maintaining web-based systems Given the sensitive nature of the project, having a strong background and understanding in data encryption and security is absolutely critical. You will be handling confidential i...

    $1188 (Avg Bid)
    $1188 Avg Bid
    99 bids

    I'm seeking an expert who can decrypt an AES encrypted .cap file. The file contains encrypted data I need to access for educational purposes. Key requirements include: - Expertise in decrypting AES encrypted files - Ability to efficiently and securely recover the data from the .cap file - Strong commitment to data privacy and confidentiality Please provide examples of similar work you have done in the past, and outline your proposed approach to this task.

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    15 bids

    ...to pilots - Add Finals rounds / Heats and update format on website - Add Series standings - Add filter to pilot and channel drop downs - Modify round/heat view and update status - Make Leader board sorting dynamic, add profile pictures - Add Team profiles, leader boards, and functionality - Add Race Event functionality, race type and leaderboard tracking - update contact us to email address - ENCRYPT database schema for storing user data, event information, and voting records. - Implement the admin panel for basic CRUD (Create, Read, Update, Delete) operations on events and heats. - Build the front-end views for user profile creation and event browsing. **Milestone 3: Dev Testing** **Milestone 4: Prod Testing and Refinement** - Perform thorough testing of all MVP features, incl...

    $549 (Avg Bid)
    $549 Avg Bid
    54 bids

    SAP ABAP PM Developer Required (Traditional ERP - Not S/4HANA and CDS Views) Skills Required: Utilize BAPI's to pull data from SAP PM -Functional Locations -Plants -Operations -Dates SEGW Gateway Service Development ABAP Development - DPC Class to provide data to Fiori App Develop Value Helps and Search Helps Must have good knowlege of SAPUI5 This is an Ad-Hoc, Remote position You MUST be comfortable to work in a screen sharing environment More work will be provided if the candidate is successful We are urgently seeking for an expert level SAP ABAP Developer with a strong focus on Plant Maintenance (PM) functionalities. Key responsibilities: - To implement new functionalities utilizing OData Services, ABAP Development, and BAPI Integration in SAP PM ...

    $30 / hr (Avg Bid)
    $30 / hr Avg Bid
    14 bids

    ...encryption algorithm, the program must split the input file into appropriate blocks for encryption. 3. Encrypt the file's extension and append it to the last block of encrypted data. 4. Add a new, algorithm-specific extension to the encrypted file. For example, if you use an algorithm named "X", you might append ".bwf" or another unique extension to the encrypted files. 5. Ensure that your decryption process accurately recovers the original file, including its correct extension. The decrypted file should be identical to the original input file in every aspect. Topics for Approach 1: Implementation of one of the below algorithms Implementation of DES (Data Encryption Standard) AES (Advanced Encryption Standard) Camellia Blowfish Twofish ...

    $117 (Avg Bid)
    $117 Avg Bid
    43 bids