...destination. My client wants to hire someone to handle this part of the reports and this project is to find that person. The path/image should be dynamic because hops do change. There should be a snapshot function which allows saving the current view as a blob is db. Need completed work to be easily re-created in order to show the client what yo...
...doing Im looking for someone experienced to follow a youtube and instructables tutorial [url removed, login to view] Basics of project is to control a motor with HomeKit You must be able to complete the project Have the required equipment to test such as iOS Device All Payments are
...No Server involvement project doesn’t need internet connection. project communicate through voice channel. Won’t save or transfer log/key by 3rd party. Less exposure and higher security. Provide unlimited encrypted phone call minutes. No licenese limitation. Secure phone call forever. This video is only to explain and understand the idea well
I need a Spring boot project, using latest stable version of all componentes. Must implement mvc, hibernate, multitenancy, security (using a login form), and all connected to a MySQL database. Deliver and IntelliJ Idea project. For Multitenancy, I need the single database, multiple schemas approach. So I need a master schema that has relation between
Hi ! I just need some small fixes on a Wordpress website. 1/I want the menu fixed. No disapear when you scroll. (For now there is a sticky menu effect but it's not totally a fixed menu. 2/When you click on "Home" link (Accueil in French) The page scroll up to the top but not totally. (we don't see the menu totally. Please fix it for mobile and
I am looking for someone to help me get money locked up on blockchain that I can't access. I think its secured with a private key and needs to be decrypted? I'm trying to help out a friend so I don't know if this is even possible?
...allow printing b. Restrict / allow copying data of specified volume c. Restrict / allow adding new data to specified volume d. On-fly Encrypt / decrypt file contents of volume. e. Facility to restrict data access I. Duration based i.e. within specified dates. II. Count based i.e. allow
PLEASE READ BEFORE BIDDING! This is the website portion of this project up for bid. I need accurate bids. I've provided the scope of most pages, modules, and database. In todays information-age, we are facing technological censorship of advances in any industry that would affect the current macro-economic status. VISION: An open-source intelligence
...Add Password screen with wipe after 5 incorrect attempts After the passwordscreen you will see these maps: INBOX ( we will call this Encrypted Messages) Saved Messages Settings Contacts After pressing on Encrypted Messages: You only see messages you received and sent. All messages will not show preview lines or subject. ( All subject must be secret
...Mail for android. We have soucre code. K9 Open Source mail Customisation: Change Icon Change All logos Add Password screen with wipe after 5 incorrect attempts After the passwordscreen you will see these maps: INBOX ( we will call this Encrypted Messages) Saved Messages Settings Contacts After pressing on Encrypted Messages: You only see messages
...not exist and discuss about the website. The history of the chat is stored inside the mobile phone (the text is encrypted). In another file, the replies of the user are stored (also encrypted). The chat is decrypted and analyzed in order to find keywords regarding possible malfunctions of the website, as well as its positive aspects. Compute the score
Unlock a PD...that has a number of security features on it and it is encrypted. When I open it on free Adobe Acrobat it has a plug-in that “locks” the PDF file to the computer on which it was first opened. Once a PDF file has been locked to a computer, it can be opened only from that computer. I need this file to be viewed in different computers.
Develop a neural network using C# language that will perform operations on homomorphic encrypted data. What I need: - program to encrypt data (the whole solution/ project); - neural network that will perform operations over the encrypted data - documentation on how everything was implemented - well-documented code - comparison between same neural