Perl encrypt decrypt example jobs
"I am actively seeking a designer who possesses a profound understanding of branding. Proficiency in Maya, Adobe Suite, 3D Studio Max, and general image editing skills are prerequisites for this role. The brand in question is already well-established; however, it requires a sophisticated refinement while maintaining its appeal. Specifically, this project involves the design of a spirit label. If you lack the aforementioned skills, I kindly request that you refrain from applying or if you are trying to give the work to someone else. When I'm available online, I can provide further clarification. Please understand and NDA will be required to sign.
If you are familiar with AWS programming, this should be a simple task for you. I have included an example C# solution using AWS Transcribe that I need to be working. Example Program: AWS Transcribe documentation: Requirements: • I will create a new AWS free account and will supply credentials. • In my AWS account, configure any IAM role/policy/user/credentials needed to run the example program. • Change the example program to accept credentials (accessKey/secretKey) as arguments passed to the executable. • Ensure that the corrected code successfully converts the speech in the audio file to text using the AWS Transcribe service. Deliverables: • All source code • Instructions
I'm facing an issue with my StrongSwan tunnel. I would appreciate a talented freelancer to assist in troubleshooting and resolving the problem. Key Details: - The error message I'm encountering is 'invalid HASH_V1 payload length, decryption failed?' - The error seems to be related to not being able to decrypt payloads - Additionally, I'm getting 'No matching CHILD_SA config found for IP/IP. received DELETE for IKE_SA' on the responder side Your Role: - The primary task is to address and rectify the issues causing the tunnel failure - As of now, the problem seems to be primarily on the responder side Ideal Skills for the Job: - Proficient in StrongSwan VPN - Strong troubleshooting skills - Experienced in resolving encryption-related issues - Fam...
I would need a script written in nodejs where a USB NFC reader (specifically the ACR122U or the ACR125U) wait for a NTAG424 DNA tag. Once an NFC tag is tapped write a URL data into the tag as well as encryption keys. Make sure the URL contains query parameters which are mirrored uid, counter, and cmac that are all encrypted. Part of this i...written in nodejs where a USB NFC reader (specifically the ACR122U or the ACR125U) wait for a NTAG424 DNA tag. Once an NFC tag is tapped write a URL data into the tag as well as encryption keys. Make sure the URL contains query parameters which are mirrored uid, counter, and cmac that are all encrypted. Part of this is to write a nodejs script to validate the above parameters from the URL and decrypt the uid/counter (or some Rust that can do...
I'm looking for an expert to set up Redis in a Rocky Linux podman container. The aim is to ensure that it communicates over TLS using a Let's Encrypt certificate. Key Tasks: - Configure Redis to communicate over TLS - Integrate a Let's Encrypt certificate Ideal Candidate: - Proven experience with Rocky Linux and podman - Strong understanding of TLS and Let's Encrypt - Excellent problem-solving skills The successful candidate will make sure the Redis instance is optimally secured and can communicate over an encrypted channel. I can provide the certificates and build process. podman run --name rediscontainer -it rockylinux:9.3-minimal bash microdnf -y update microdnf -y install redis
I need a minimal working example of PPPOS in IDF framework v4.4.7. The requeriments are: - Minimal example with SIM800L modem. - Create and configure esp_netif for PPP (create the driver, and task to receive data from modem and send to esp_netif) - Configure the modem via AT commands (PPP conection ATD*99#) - After succesfull connection, make a http request for testing. The most important thing: DO NOT USE esp_modem component. The example must do not use any component, simply the esp_netif API.
Seeking Application Developer for Consultation We want to develope a cross-platform mobile application (iOS and Android) with website integration that allows users to upload audio files with an attached encrypted key. These files can be securely sent to another user who can download and decrypt the file using the same application. The app will integrate with our existing Shopify website for seamless user experience and functionality. Consultation Scope: - Secure File Upload: Enabling users to upload audio files with embedded encrypted keys. - Encryption & Decryption: Implementing robust encryption methods to ensure the secure attachment of keys to audio files. - File Sharing Facilitating the secure transfer of files between users within the app. - **Bluetooth Key Sharing:*...
...someone who can connect to AWS (build a server). We are looking for someone who can perform AWS-related tasks such as SSL, server management, backup settings, cost optimization, etc. My current budget is around $10-$20. Please write "awsp" in chat or in the proposal to help determine whether bots are verified. ————requirements -Install SSL/TSL certificates -Set up automatic backups (once a day) -Encrypt data ->Database, disk, backup data, email, file system....., etc. ->Use LUKS, etc... -Transport layer security -Connecting domains -Setting up and activating servers -Installing the control panel -Installing the Server Management Panel -Setting Up a Firewall -Harden SSH security -Install fail2ban and -Install log monitoring and analysis ...
I'm seeking an expert in website migration, preferably proficient with Wordpress and Ubuntu server installations, creation of V-host, installation of LET's encrypt certificate and Test. The project in focus involves the migration of 3 Wordpress websites currently hosted on a VPS. Advance knowledge of eCommerce plugins, which are in use on these websites, is essential as these need to be properly migrated without loss of data or functionality. Specific Requirements include: 1. Migration Expertise: Proven experience in migrating Wordpress websites from VPS hosting to an Ubuntu server. 2. Plugin Knowledge: Must be well-acquainted with handling eCommerce plugins during the migration process. 3. Backup & Recovery: Unfortunately, there are no existing backups of the w...
I'm looking for someone who has experience in AES encryption and is also familiar with ASP.Net MVC database connection string, I need a person who can encrypt my connection string and show me the right way to complete the function.
I need a minimal flutter example app for android. The app must scan Bluetooth Ibeacons. I do not need a complete UI, simply a button to start scan and another to stop scan. The information obtained from beacons can be showed in a textbox. The monitoring of beacons mut be "Ranging" (each transmition of beacon must be received and showed) Is very important the scan continue in background. When the app is minimized or out of focus, the app must launch a foreground service (or the foregrounn service can be allways active on all the life of app) when te foreground service is running, a permanent notification must be showed (android policy to allow foreground service). The app must request all permitions required to user on start. When the app is minimized, and the foreground...
...radius locality using an ad hoc, node to node, wireless system. The app must therefore have no reliance on WiFi, mobile data or any use of a WAP or a WiFi router. It can maybe use a technology similar to Z Wave or Zigbee wireless technology, and maybe use a method like PairAsync for pairing or connecting. The app must have a high level of security using HTTP, SSL, TLS or similar, and must encrypt and decrypt all data during transit and at rest with advanced security features like LESC, and using systems such as, or similar to, FIPS 140-2 and AES-SHA256 cryptography. I would like to have copies of any written source code that is created by you or any details on the tech stack, SDK and APIs used. As the app could be using Bluetooth or BLE, I want users to be able to send and...
I'm looking for someone that works with network and understands how to create robust scripts that can encrypt the traffic properly causing even some ISPs not to sniff the connection that I will mention in the chat.
I am looking for an experienced Flutter developer to create a minimal example that can effectively scan iBeacons for Android. This should be a simple, text-based UI that can display the UUID, major & minor values, as well as signal strength of iBeacons. Furthermore, it's important that the scanner remains functional in the background via a foreground service, providing a simple text notification when interacted with. The detection process must be constant (ranging). Key requirements for the project: - Develop a minimal Flutter app for Android - Ability to scan iBeacons and display UUID, major and minor values, and signal strength - The app should continue to work in the background - Use a foreground service for background function - Provide a simple text notification from...
I have already designed a fitness app and need a developer to bring it to life. The app needs to be compatible with both iOS and Android. Key Points: - The primary function of this app is to advise workouts based on weather - I need the app to encrypt user information to ensure privacy and security. - The app should be user-friendly and intuitive. Ease of use is a top priority.
i will be creating a website like the given hellman example
I'm seeking a skilled software developer to join our dynamic IT team. The ideal candidate will possess expertise in Perl, Python, and XML/XSLT, and should be familiar with MySQL. Responsibilities: Develop And Maintain Software Applications Using Perl, Python, XML, XSLT, And Database Technologies. Design And Implement Data Transformation Processes Using XML And XSLT. Write Efficient, Clean, And Reusable Code That Complies With Company Standards And Best Practices. Collaborate With Project Managers, Business Analysts, And Other Team Members To Understand The Requirements And Provide Technical Solutions. Perform Database Management Tasks, Including Design, Modifications, And Performance Tuning. Assist In The Integration Of New Software And Systems Into Existing Environmen...
The request is to convert this website https://demo.templat...user to be able to write a WhatsApp message. In addition to the conversion, we need to add a JavaScript script that will be provided to you, that contain GDPR regulations. All materials (images, videos, graphic templates) will be sent to you after the selection phase. The site should be set up in Italian, but we will change the texts ourselves at a later stage. I need to associate a Let's Encrypt certificate with the domain, which I haven't prepared yet, so I need something that automates the process to update it automatically. It's important that the colors, fonts, and structure are identical to the site present in the template. If you are unable to replicate it or to complete the requests above, p...
We are looking for some small animations to be used to highlight the various stages a print job will go through when submitted to our system. We would like these animations to make use of our logo and to highlight the following stages: 1. Upload the print job 2. Compress the print job 3. Analyse the print job (count colour and mono pages) 4. Encrypt the print job The animations will be separate files and we will then use them in our application. I have included a screenshot showing where the animations will be used on our print ticket, as well as our company logo. *** TO BE CLEAR, WE ARE LOOKING FOR ANIMATIONS TO SHOW PRINT JOB BEING UPLOADED PRINT JOB BEING COMPRESSED PRINT JOB BEING ENCRYPTED PRINT JOB BEING ANALYSED IF THESE ANIMATIONS CAN USE OUR LOGO THEN THATS PREFE...
I need a skilled programmer who is also familiar with VMware, Windows, and Autopsy to help me with a project where I need to encrypt a file to demonstrate encryption techniques. Key Requirements: - Programming for file encryption - Report writing for evidence - Experience with VMware, Windows, and Autopsy The primary goal of the project is to demonstrate encryption techniques. The job entails programming a method for encrypting a file using a language of your choice - I have no preference on the language - and then carefully documenting the process in a written report which will be used as evidence. As the report will be used for evidence, it needs to be detailed and written in a clear and professional manner. Please only apply if you have experience in both programming for en...
I need a compact and efficient RFID decoding device that can effectively handle access control duties. We have multiple RFID 1k cards which are encrypted. We want to decrypt the card and should be able to edit the data in it Key Requirements: - **RFID Support**: The device should be able to work seamlessly with Low Frequency (LF) RFID tags. Such as mifare 1k. RFID 1k card - **Wi-Fi Connectivity**: if required it should have Wi-Fi capabilities to enable remote access and data management. Ideal Freelancer: - Proficient in RFID technology. - Experienced with access control systems. - Skilled in hardware development and connectivity. - Ability to create a compact and user-friendly device.
Example style: We - LigoWave provide easy-to-use wireless networking solutions for businesses and communities, ensuring reliable connectivity with advanced technology. We will be releasing new product and we want video showing the highlight features with "Mike" as our older videos had. We no longer have the contacts of older team who did those videos. I am looking for a talented animator to produce a high-quality 2D video that is under two minutes long. Key requirements are: • Skilled in 2D animation. This is a must as it is the style we have chosen for this video. • An ability to produce engaging and captivating content within a short span of time. The video is less than a 1.30min . • An understanding and ability to work
Hi I need to very basic example on how to call a rest api from Aveva using a put command. It should be build importing .net libs.
I'm looking for a qualified programmer who can create a peer-to-peer VPN Chrome extension. The expert will need to incorporate specific features and functionalities: - Ability to encrypt the user's data for secure browsing - IP masking capabilities to hide the user's original IP - Bypass geo-restrictions to access content from any location globally In terms of user authentication, Google/Facebook login integration is essential. This extension would need to be easy and straightforward for users to sign in using their Google or Facebook accounts. Also, the extension should include a user-friendly interface that allows users to select desired locations. Specifically, including a dropdown list with a comprehensive selection of countries. To take on this project, you&...
Hi, we need help compiling and running SDK example C code.
...Experience with container platforms like Docker or Kubernetes since I'm yet to determine my preference. Operating System: You can use Ubuntu Server, CentOS, or any other Linux distribution of your choice. Web Server: Nginx or Apache HTTP Server. Git: Version control system to manage your website's source code. Node.js: If you're hosting static sites or using JavaScript-based build tools. Let's Encrypt: For SSL/TLS certificates to secure your websites. CI/CD Tools: Jenkins, GitLab CI, or GitHub Actions for automating deployments. Monitoring Tools: Prometheus, Grafana, or similar for monitoring server health and performance. Deployment Automation: Ansible: Ansible is a powerful automation tool that allows you to automate deployment tasks, such as provisioning ...
I need a skilled professional who can generate an SSL Certificate for my website using Let's Encrypt. Although the system is Windows-based, I'm uncertain about the web server software currently in use, hence some investigation may be required. Ideal skills and experiences for this project: - Experience in SSL certificate generation - Familiarity with Windows OS - Knowledgeable in using Certbot command line tool or comparable interface - Ability to investigate and identify the appropriate web server software.
...am looking for a PERL, HTMX, MYSQL programmer who can help me with an intermediate level project. The ideal candidate should have experience in these areas and be comfortable starting a project from scratch. I will give you a dump from my MySQL table. From which I need an interactive HTML interface, based on Perl, HTML, HTMX to this table. I need to be able to search, add, edit and delete entries as well as combine two entries into one, all via one HTML::Template file with a single perl script as interface to the MySQL table. I do want an active submit button for all changes, as well as a single interactive upload button for each field of the MySQL table. also each field needs to be validated via a given specification. All code needs to be well documented and commen...
I'm experiencing a critical issue with the Let's Encrypt SSL on my WHM server; it's not performing accurately on my website. I'm running Alma Linux and WHM Cpanel on my current server. It was working a few days ago but suddenly stopped working so I think the autorenew wasn't set up correctly. Note we are NOT using for SSL installation This is an immediate need and bidding freelancers should be prepared to start work as soon as possible. Necessary skills and experience: - Proven experience with Let's Encrypt SSL - Proficiency in WHM server management - Strong knowledge of Alma Linux - Ability to troubleshoot and resolve this issue promptly I'm looking for an experienced system admin who can swiftly diagnose and resolve this SSL issue....
I'm looking for a professional who can help me encrypt the information on an SD card securely. The purpose of this encryption is to ensure that if someone tries to read the content outside of the Raspberry Pi, it'll be unreadable. Key Requirements: - Encryption Purpose: The primary use of this encryption is to secure data storage. - Data Access Method: The encrypted data should be accessible automatically on boot, without requiring additional steps like entering a password or using a physical key. - Data Sensitivity: The data to be stored on the SD card is highly sensitive, hence the need for robust encryption. The perfect candidate for this project should be highly skilled and experienced in: - Raspberry Pi projects - Data encryption techniques - Software and hardware ...
...automation algorithms to streamline repetitive tasks such as campaign scheduling, audience segmentation, and content personalization. Continuously optimize marketing strategies based on real-time feedback and performance metrics. Security and Compliance: Ensure data privacy and regulatory compliance by implementing robust security measures and adhering to relevant regulations such as GDPR, CCPA, etc. Encrypt sensitive data, enforce access controls, and conduct regular audits to mitigate security risks. Benefits: Enhanced Customer Engagement: By delivering personalized experiences and targeted messaging, the system fosters deeper engagement and loyalty among customers. Improved Marketing ROI: By focusing resources on high-value segments and optimizing campaign performance, the sy...
I have a Perl script that searches a CVS file and generates HTML. When this script has zero results, it currently displays a page stating "SORRY there are no RESULTS". I need this behaviour to change: instead of generating a custom error message, I want the script to send a 404 call to the Apache server. Key Requirements: - Modify the Perl script to send a 404 call to the server when no results are found. - Implement a custom error message to be displayed on the 404 error page. Additional Details: - No logging of details of 404 errors is required for monitoring or debugging purposes. - The script should still function as normal when results are found, only altering its behaviour when no matches are found. - The ideal candidate for this project should have experien...
I'm looking for a talented and innovative graphics designer to create a logo from existing example.
I'm looking for a skilled Perl expert to help me remove duplicates in an Excel dataset. The removal process should be based on multiple columns, ensuring a thorough cleanup. Ideal Skills & Experience: - Strong proficiency in Perl programming - Proficiency in data analysis - Expertise in Excel and handling large datasets - Prior experience in removing duplicates from Excel based on multiple columns Communication: I prefer to have project updates through video calls, so please be comfortable with this form of communication. Your ability to walk me through the process will be highly appreciated.
I'm having issues with a specific user function in my Pgsql ( postgresql 8.4) database that needs fixing. After transferring server and DB from real PC to the VM, ... 1365 | 1365 32645239 | ADMIN | _util_update_stat | 27 | 37511 | 37511 calls And new doesn't have any calls of _util_update_stat at all which makes Stats table empty You need to track why is this happening & fix it. Server is a bunch of scripts, but seems it doesn't matter cause all scripts just READ this stats table (i guess) Pgsql expirience is a must Perl expirience is a plus. Plz no "manager" bids, don't waste your time, will talk with developers only. (if you are a "manager" it will be seen after the 2nd tech question Plz don't wa...
Hello, i need someone good programmer who is able to modify ASF CDC echo example for atsamd11d14 mcu. When receive '1' by CDC -> set 2 pins of mcu When receive '0' by CDC -> reset these 2 pins of mcu And i would like device to be visible in Device Manager or Linux like 'USB CDC'
This is a Yii2 that has 90,000 screens as each page is 3 screens. We need a stable platform to use the processes coded in Html and java to update the databases. We need to keep the PHP version current. We need the new database documented page by page and process by process. There are 2 sites An individuals site. It has these services Member Services Act as an Agent for WebPicID Family-Protection-Service Identity theft fraud loss reduction Membership Merchant Membership Notification Payment Options Refer an organisation to sign up with WebPicID Safe Purchase Secure Message Merchant Services Identity Theft Fraud Loss Reduction WebPicID can Reduce ID Theft Fraud Losses and associated operating costs by at least 50%. WebPicID detects the ID Theft after the sale is paid for; before shipp...
Hello, I have a file with the ending .algo and I would like to encrypt it and possibly equip it with a software license so that it works with a key. The file has already been written by me and I need precise instructions from you on how to do everything myself using the following software:
Develop an app which resides and runs of a usb thumb drive. The app needs to launch automatically when the usb is inserted into the W...the overall project development cost, the tools/language/SDKs to be used, and an OPTIONAL add on quote if encryption is required. More details on Encryption below: OPTIONAL QUOTE: Encryption has to be on the entire thumb drive level. As soon as thumb drive is inserted the first time, it has to ask user whether encryption is needed, if yes, it has to ask user to setup a strong key/password and encrypt the disk according to any standard FIPS approved encryption standards (AES preferred). Whenever the thumb drive is used subsequently, it has to prompt user to enter the password to unlock the drive and the app before continuing with backup/restor...
Our company has been active in the field of solar photovoltaics connected to the network for 15 years. We have created an IoT device that sends data using MQTT and pub/sub. Our infrastructure is on AWS and GCP. Our device is able to communicate with a few different devices/...protocols themselves are very similar. We need to be compatible with more products and to make everything work in sync with our current set up. The data is sent to GCP. It consists in frames that need to be decrypted and stored in a mongoDB database. It also sends some information so that the system can understand what kind of frame was sent and how it should be decrypted. Most of the code used to decrypt and store the data is written in GO. We need help implementing these new "protocols" in ...
I'm seeking urgent improvements for my MailEnable (v.10.48) email server. Mail server installation exists and works fine without SSL/TLS. Server is Windows 2019, access allowed via AnyDesk (or Teamviewer) Main task: - install certificate into mailserver, - allow mail-client to use it which all protocols (POP/IMAP/SMTP) Optional task (no need much time): - help me to set "timeout" of webmail access (it seems that now a session is unlimited) - help me to understand how I can customize webmail access if the mail server is configured to answer to more than one domain. Low budget available.
Need after effect animation exactly same like that ribbon style with new text See animation and then placed the bid write " RIBBON " in the bid
...&sd=true We followed the instructions provided and implemented the following code using server-side Node.js. We utilized ngrok to enable HTTPS connections. We have successfully initiated a transaction using this code in the uploaded file. However, we encountered an issue retrieving the transaction, which should have been provided but is not available. We were advised to handle callbacks and decrypt the response, but we're facing difficulties in doing so. Handling callbacks and post-success payment URLs did not resolve the issue. We now need the transaction ID, which we are unable to obtain. We need someone who can do the final step here and complete the integration on the website. The website is in React Js and Node Js. The solution should be configurable for other we...
More details: What is the primary reason for encrypting the Raspberry Pi 4 OS and inside files? Protect sensitive data What encryption level do you require for your sensitive data? 256-bit encryption Are there specific files or data types that need to be prioritized in the encryption process? Program and System Files
I am seeking a developer with intermediate level experience IOS Swift. The task will be to help me get the example code working from the documentation at This is my first time working with IOS and the docs leave out some of the implementation. For example, in this code there is not map function, only "..." Bids under £70 only please. ``` var totalUsageByCategory: [ActivityCategory:TimeInterval] totalUsageByCategory = (…) ```
...menu=5&menu-item=UCFDocs We followed the instructions provided and implemented the following code using server-side Node.js. We utilized ngrok to enable HTTPS connections. We have successfully initiated a transaction using this code in the uploaded file. However, we encountered an issue retrieving the transaction, which should have been provided but is not available. We were advised to handle callbacks and decrypt the response, but we're facing difficulties in doing so. Handling callbacks and post-success payment URLs did not resolve the issue. We now need the transaction ID, which we are unable to obtain. We need someone who can do the final step here and complete the integration on the website. The website is in React Js and Node Js. The solution should be conf...
I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption methods
I need a professional to install an SSL certificate from Punch Salad website. The primary purpose is to improve the security of the site and to encrypt user data. Key requirements include: - Assisting in obtaining a suitable SSL certificate, as I do not possess one at the moment - Expertise in SSL installation for blog/personal websites Ideal candidates would have prior experience in SSL installation, especially in the context of personal or blog websites. Excellent communication skills and the ability to explain the installation process in plain terms would be greatly appreciated.
I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be determined as part of this process.
I need an experienced freelancer to replicate the design, layout & structure from an existing website to serve as a starting point for our own site. Key tasks involve: - Implementing the structure or an an existing example website on Wordpress. This includes the pages, placeholders for posts, menu structure, etc. - Utilizing Spectra blocks/Kadence theme, contact form 7 Ideal candidate should have strong skills in Wordpress and Spectra/Kadence theme implementation. Please include examples of past work in your application. You will be working from a clean Wordpress install.