Asprotect stolen bytes Jobs

Filter

Meine letzten Suchanfragen
Filtern nach:
Budget
bis
bis
bis
Typ
Fähigkeiten
Sprachen
    Jobstatus
    2,000 asprotect stolen bytes Gefundene Jobs, Preise in EUR

    ...Dringlichkeit an, alles ab 1000 Suchabfragen muss in dem Titel oder Bulletpoints 1 - 5 vorkommen. Hier der aktuelle Text: %A4nger-Schnullerkette/dp/B01N4E9Y2L/ref=sr_1_3?dchild=1&keywords=i-mondi+holzperlen&qid=1614074862&sr=8-3 Der Titel darf MAXIMAL 200 Bytes haben, NICHT ZEICHEN –> Bytes. Wie viele Bytes Ihr Text hat können Sie hier prüfen: Die fünft Bulletpoints dürfen je max. 100 Bytes haben. Mir ist klar, dass wenn der Text noch lesbar sein soll nicht alle Phrasen in die Beschreibung können. Es ist daher wichtig, dass Sie mir die nicht benutzen Phrasen zurückmailen, damit ich daraus die Keywords im Backend erstellen kann. Phrase - Suchanfragen Bastelperlen zum Fädeln - 1000 holzperlen zum

    €51 (Avg Bid)
    €51 Gebot i.D.
    2 Angebote

    ...payment method and the delivery method, as well as the delivery date are stored in the cookie. This leads to the fact that the browser limit for cookies of 4096 bytes per cookie is quickly reached. It seems that in the original plugin everything is stored in a session and only when you delete items from the cart or you are not logged in as a user, then the cookie is created. Unfortunately, in the original plugin the payment and delivery method is also not stored. The other developer has solved this, that I think immediately a cookie is created even for "logged in users". In fact, he did not observe the browser limit for cookies of 4096 bytes. The following problems occur therefore: 1. it comes to the problem that you can not add items to the shopping cart, if ...

    €19 / hr (Avg Bid)
    €19 / hr Gebot i.D.
    1 Angebote

    ...DeviceName und der Name der Topics eingegeben werden. Durch speichern wir ein Restart initiiert und der ESP verbindet sich mit dem ausgewählten WLAN-AP und dem Broker. Dazu wird eine erste Anmelde Message geschickt. Der ESP wartet bis der Broker eine Start Senden Nachricht sendet. Daraufhin werden die Pakete vom Device (UART 100Byte) als MQTT Message zum Broker gesendet. Über den Broker können 3 Bytes direkt an das Device gesendet werden. Durch ein Byte aus dem Device oder aus dem Broker kann der ESP wieder auf Werkseinstellungen gesetzt werden. DEVICE --> UART --> ESP01 -----> MQTT ----> BROKER...

    €686 (Avg Bid)
    €686 Gebot i.D.
    1 Angebote

    Search websites design Good day looking for a new website design for the page (All images should be free images so no license and not stolen) Thank you for your offers ----------- Suche Webseiten Design Guten tag suche eine Neues Webseiten Design für die seite ( Alle bilder sollen eine Free Bilder sein also ohne lizenz und nicht geklaut ) Bitte um angebote danke

    €192 (Avg Bid)
    €192 Gebot i.D.
    2 Angebote

    ...e=3 zum signieren. Dokumente werden vor dem signieren mit SHA1 gehasht, ein Padding erfolgt nicht. Wir betrachten jetzt 2 Spezialfälle: • Die prüfende Implementierung berechnet t = se mod n, und prüft dann nur ob t mit dem gesuchten Hash beginnt. Folgen in t noch weitere Bytes nach dem Hash, so werden diese ignoriert. 
 • Hier wird ebenfalls t = se mod n bei der Signaturprüfung berechnet. Eventuell vor dem Hash stehende Bytes werden ignoriert, es werden lediglich die letzten 20 Bytes (SHA1 hat eine Ausgabelänge von 20 Bytes) verglichen. 
Erstellen sie für beide F ̈alle ein Dokument ihrer Wahl sowie eine Signatur zu diesem Dokument, die von so einer Implementierung als korrekt angesehen würde. Watermarking Au...

    €224 (Avg Bid)
    €224 Gebot i.D.
    1 Angebote

    ...angeschlossen). Meine ursprüngliche Idee war, einfach die Audioausgabe mit einem Verdoppler oder Vervielfacher in hohe Bereiche zu transformieren (ZB 100 Hz > Doppler = 200 Hz). Das klappt jedoch nicht, so glaube ich. Mein aktueller Ansatz ist, mein Audioausgang in einen High/Low generator zu wandeln (High = 250Hz, Low = 2500Hz) was man mittels Mikroprozessor erkennen müsste um daraus Daten (Bytes) zu interpretieren. Der Mikroprozessor muss 100Hz bis 1Mhz generieren können. Optional aber nicht zwingend, könnte man dann auch gleich die Amplitude, Wellenform, Ein/Aus Daten mitschicken. Eine weitere Idee wäre, einen Audiosampler vom Microprozessor ansteuern zu lassen um vorgefertigte Wellenformen abspielen zu lassen. Darin sehe ...

    €510 (Avg Bid)
    €510 Gebot i.D.
    1 Angebote

    Hallo, ich brauche diese 10 Songs korrekt ins Deutsche übersetzt. Wenn man danach sucht, findet man bereits einige Übersetzungen, die aber meist von sehr schlechter Qualität sind. Ich suche hochwertige exklusiv für mich angefertigte Übersetzungen, die auch Umgangssprache oder Sp...die aber meist von sehr schlechter Qualität sind. Ich suche hochwertige exklusiv für mich angefertigte Übersetzungen, die auch Umgangssprache oder Sprichwörter korrekt übersetzt haben. Es werden nur deutschsprachige Muttersprachler akzeptiert. Die Übersetzung muss 100 % korrekt sein! Coldplay - Magic Imagine Dragons - Demons Katy Perry - Dark Horse Jason Derulo - Trumpets Milky Chance - Stolen Dance Pharell Wiliams - Happy Lorde - Team Mr. Pr...

    €143 (Avg Bid)
    €143 Gebot i.D.
    8 Angebote

    I urgently require a professional with highly commendable skills in tracking and locating a car thief using various information sources. Key reasons for this project are to aid law enforcement in apprehending the person involved and ensuring the safe recovery of the stolen car. I will provide the thief's phone number, IMEI number, known previous locations, and potential acquaintances. A comprehensive knowledge of professional tracking methods, experience in law enforcement collaboration, and proficiency in social media investigation is crucial. Please note, timely completion is necessary for successful project evaluation.

    €72 (Avg Bid)
    €72 Gebot i.D.
    7 Angebote

    I require professional assistance in two primary areas to rectify an unexpected issue with a stolen phone and compromised Gmail account. - Bypass Google's second verification: My Gmail account is currently secure with two-step SMS verification. However, the difficulty is that I don't possess access to the phone where the verification code is sent via SMS. Thus, I need assistance in circumventing this verification to recover my Gmail account. - Remote data wipe: Since my phone has been stolen, I wish to delete all data stored on it remotely. I'm looking for a professional with understanding in Google’s verification systems and proficient knowledge in remotely wiping data from an Android device. Privacy and accuracy are paramount in this task along with a...

    €23 (Avg Bid)
    Garantiert
    €23
    3 Einträge

    ...optimize my server's performance. I have a NodeJs app hosted on EC2 / Ubuntu server, it is working fine but sometime I see the sudden increase in Network in (bytes), Network out (bytes), CPU utilization (%), And memory. So my CPU goes from 2% to more then >60% Memory goes from 10% to more then >70% which triggered my server hang and then I will have to reboot my server to fix that issue. Since I am just alunching my web app, hence I dont have any traffic yet, hence I want to identify how my server resources utilization got increased. I need a person who can check and fix it, I am not really sure what is triggering this, and this Network in (bytes) increases for less then a minute. Since this is the production environment, hence in the beginnign I can g...

    €83 (Avg Bid)
    €83 Gebot i.D.
    20 Angebote

    I'm seeking a skilled writer who can bring to life the true story of a wealthy woman who fell victim to theft. Your aim is to not only share her story with the public but also to inspire and seek justice. Key points to focus on in your depiction: - Primarily, portray the theft incident. - Detail the process regarding how the theft occurred. - Convey the emotional impact it had on her. - Describe the ensuing legal procedures. Expertise in writing biographies and understanding of legal processes will be beneficial. Experience with radio-compliant scripts is essential to present this story effectively to a broad audience.

    €341 (Avg Bid)
    €341 Gebot i.D.
    62 Angebote

    ...homers and 1 single. He had 3 RBIs. Statistics will be retained that will show cumulative data of an ongoing season so once a player is entered into the data base he can then be pulled up for additional record entry for each game he plays. Categories to be tracked for batters are # of at bats, singles, doubles, triples, home runs, RBIs, walks, hit by pitcher, strikeouts, runs scored, sacrifices, stolen bases, etc. The number of total hits versus at bats less sacrifices should calculate on the fly a batting average which is also a needed category. Categories to be tracked for pitchers are games played, innings pitched, win loss record, home runs allowed, strikeouts, walks, complete games, saves, hits allowed, runs allowed, wild pitches, complete games, shutouts, etc. You will n...

    €606 (Avg Bid)
    €606 Gebot i.D.
    28 Angebote

    ...my kids will get some fun with it. I am flexible but was hoping to get this completed for $250.00 or so. I am much more comfortable with Windows but if it simply won't work with Windows I am ok with Linux. I also heard a rumor that people are able to do something similar to this using TikTok and OBS but I could be totally off on that. Thanks for reading this far :) Sincerely, David PS - Stolen from Freelancer AI - !!!!! Your ability to translate these requirements into a smooth and interactive user experience will be key to the success of this project !!!!! ==================================================== FREELANCERS AI DESCRIPTION - WAY BETTER THAN MINE. I require a proficient Python developer to build a desktop application that features a functional, intera...

    €554 (Avg Bid)
    Featured
    €554 Gebot i.D.
    67 Angebote

    ...2024-05-09T03:47:59.261592+00:00 heroku[router]: at=error code=H10 desc="App crashed" method=GET path="/" host= request_id=b0da96d1-687e-42ca-bc8f-20a9cce116f4 fwd="" dyno= connect= service= status=503 bytes= protocol=https 2024-05-09T03:47:59.341125+00:00 heroku[router]: at=error code=H10 desc="App crashed" method=GET path="/" host= request_id=b1d1c4f8-39b7-4c90-9e61-a400a9bd0534 fwd="" dyno= connect= service= status=503 bytes= protocol=https 2024-05-09T03:57:03.975592+00:00 app[api]: Starting process with command `bash` by user <redacted> 2024-05-09T03:57:10.529113+00:00 heroku[run.9527]: State changed from starting to up 2024-05-09T03:58:36.548892+00:00 heroku[run.9527]:

    €32 (Avg Bid)
    €32 Gebot i.D.
    15 Angebote

    We have had our kids motorbikes stolen and I want assistance in searching for possible for sale ads which fit the models of our bikes. Would like to know if there is a way to narrow down the search but still cover all data bases such as gumtree, fb market place etc

    €99 (Avg Bid)
    €99 Gebot i.D.
    6 Angebote

    ...efficiently without compromising quality. My task is: Create a library that implements a stack via a linked list. Only positive numbers in the range of the number of bytes that will be entered when creating the stack will be able to be stored in the stack. The stack will be able to be saved to and loaded from a binary file. The binary will be in the given format - the first byte will be the range of numbers to store, followed by the numbers themselves stored on the stack. Save and load the file according to convert_number_to_bytes(x, count_byte), write_number(file, count_byte, number), convert_bytes_to_number(bytes), precision_number(file). It will be possible to create any number of stacks. It will be possible to freely add and obtain elements to the stacks. Attempting ...

    €168 (Avg Bid)
    €168 Gebot i.D.
    15 Angebote

    ...its compatibility with the latest Android standards. Requirements: 1) Textbox Input: Include a textbox for users to enter the size and filename. 2) Byte Stream Generation: Generate a byte stream from /dev/qrandom based on the entered size. 3) Display Byte Stream: Upon clicking the 'Generate' button, display the byte stream in a scrollable textbox below the button. The display should format the bytes in lines across the screen, removing any null characters. 4) File Writing: Save the byte stream to a file in the /sdcard/ directory, ensuring compliance with the permission requirements of the latest Android version (version 13). 5) App Icon Design: Design a new app icon that adopts a contemporary, minimalistic style. Dashboard Redesign: Revise the dashboard layout to enha...

    €135 (Avg Bid)
    €135 Gebot i.D.
    76 Angebote

    I am building the backend in NodeJs, and I have deployed the nodeJs app on AWS ec2 and using Ubuntu. The issue is, that sometimes (Once in a day or twice in a day) I get the "Reached heap limit Allocation failed" error in my PM2 log and then app stops working. The App is hosted on AWS EC2. I check the AWS EC2 monitoring tab I get a sudden spike in Network in (bytes) and CPU utilization (%), and then the app got crash. Just FYI: I am using and some webhooks in my application. I need a person who has done the memory detection work before. Please note, since the application is in production so I will not be able to provide you the codebase and you will need to work by Remote. Please mention: Memory in your proposal beginning to consider your bid.

    €96 (Avg Bid)
    €96 Gebot i.D.
    4 Angebote

    ...DBC files, which is a standardized database file format used within our industry. You can read about DBC files here: The editor both enables the creation of the DBC file itself, but it also allows users to view the logic of how signals are encoded in the DBC file via the Signal Preview section. Further, users can test how raw data bytes are going to be decoded via the DBC file using the payload decoding section. You can find the latest source code for the editor below: The current version of the editor has some bugs and we are looking for a person to fix these, as well as help with future development projects. This project requires good Javascript coding skills

    €165 (Avg Bid)
    €165 Gebot i.D.
    37 Angebote

    Someone stole some btc from my wallet late last year, and I need a bitcoin blockchain analysis forensic expert to help track it down, or identify any clues that will lead to the perpetrators. I think the btc was stolen via anydesk I have the anydesk target machine ID, and the transaction One of the transactions was The funds ended up in this wallet: Can you connect this to a kyc wallet? Or identify next steps? Please bid if you have experience recovering bitcoin or blockchain analysis. because of scams, please show examples of your previous

    €644 (Avg Bid)
    €644 Gebot i.D.
    11 Angebote

    My Magento website is currently down due to a critical error. This error was showing for a short time on the screen: "Exception: Notice: fwrite(): write of 211 bytes failed with errno=28 No space left on device in /var/www/html/vendor/monolog/monolog/src/Monolog/Handler/ on line 133 in /var/www/html/vendor/magento/framework/App/ Stack trace: #0 [internal function]: MagentoFrameworkAppErrorHandler->handler() #1 /var/www/html/vendor/monolog/monolog/src/Monolog/Handler/(133): fwrite() #2 /var/www/html/vendor/monolog/monolog/src/Monolog/Handler/(119): MonologHandlerStreamHandler->streamWrite() #3 /var/www/html/vendor/magento/framework/Logger/Handler/(88): MonologHandlerStreamHandler->write() #4 /var/www/htm

    €110 (Avg Bid)
    €110 Gebot i.D.
    32 Angebote

    When user logged in, I want to steal Facebook's cookie from Facebook's users with just 1 click in other tabs like my video below. Write a simple website that can demo it. I want to do this in both mobile and browser environments. Video demo:

    €391 (Avg Bid)
    €391 Gebot i.D.
    57 Angebote

    ...that what I want is or in not possible , if possible I will provide you a diagram of our needs and even code written for android that performs this function in a separate freelancer project. Today i do not know if its possible . That is my dilemma .. SECOND - The project There is no pairing in BT beacon protocol . We will be using ultra small packets In essence packets are no more than 30 bytes of data to send and receive from the to a BT beacon , using beacon protocol not BT protocol. In short we need asynchronous bi direction comms using BT beacon protocol. Enable it open a test app to type in text click send Receive responce on screen plus Beacon will asks for data If it for you , you will display on screen and send conf...

    €92 (Avg Bid)
    €92 Gebot i.D.
    24 Angebote

    I am in urgent need of professional assistance to help recover stolen electronic goods. The personal identity of the person responsible has already been identified. This individual has been found to have sold our cargo to BDS, a company based in Santa Ana, CA. The primary responsibilities include: - Effective negotiation for the return of the stolen goods Required Skills and Experience: - Proven expertise in negotiation, preferably within the logistics and electronic goods industries - Experience with freight cargo recovery procedures - Strong analytical and communication skills - Capable of handling sensitive situations and information confidentially Your role is crucial to recover our cargo and you will be given full support in every capacity.

    €4598 - €9196
    €4598 - €9196
    0 Angebote

    ...on whether the processor is loading from or storing to memory. You don't need to do anything differently for load or store. The second field is a 32-bit memory address. The third field is the number of bytes being requested. You don't need to do anything with the number of bytes being requested. The only field you care about is the address. You may assume that each request will be contained in one block. Comparing results is welcomed and encouraged. Items to Examine Parameters Number of bytes in the cache (a positive power of 2) Number of blocks in each set (associativity) Number of bytes in a block (a positive power of 2, must be at least 4) 1 set of n blocks is fully associative n sets of 1 block is direct mapped n sets of m blocks is m-way s...

    €138 (Avg Bid)
    €138 Gebot i.D.
    26 Angebote

    ...entering and exit of the vehicles based on ANPR or any other methodology. 2. Digital acquisition or verification of vehicle registration details against the VAHAN database. 3. Digital acquisition or verification of the details of the driver against the SARTHI database. 4. ⁠Generate real time alerts regarding suspicious vehicles entering/exiting the check gates. Suspicious vehicles may include stolen vehicles, those involved earlier in commission of crimes such as drugs trafficking, hit and run cases etc. 5. ⁠Functionality to update the action taken report in case of interception of such suspicious vehicles. 6. ⁠Generate analytics report about nature and pattern of vehicular movement at the check-gates. Emphasis may be laid on capturing the above information in quickest pos...

    €99 (Avg Bid)
    €99 Gebot i.D.
    5 Angebote

    ...few chinless also rans- ready and deserving of ridicule, intelligent and adorable ex cons turned gardeners, suicide, slimy weasel thieving opportunistic provincial financial advisor, a whisky investment boiler room Ponzi scheme in Billericay ( cliche but true) …brother of Asperger dying of cancer in Singapore, but best of all it’s literally unravelling now- and it’s 100% real- . £1m inheritance stolen over three years in the web of above….I’m currently trying to rescue the victim from the web of bullies- who even 8 weeks into efforts, is blissfully unaware of the state of his predicament. That’s bitter sweet. Seriously - if I can’t get this written up I’m putting some of these protagonists in a shipping container to li...

    €4545 (Avg Bid)
    €4545 Gebot i.D.
    19 Angebote

    1) Continue on previous projecName existing api to: api/v1/log/post 12 New api...only be allowed to INSERT/COPY into log_data in Postgres: REVOKE CREATE ON SCHEMA public FROM PUBLIC; REVOKE ALL ON DATABASE log_database FROM PUBLIC; CREATE USER log_user; GRANT USAGE ON SCHEMA log_schema TO log_user; GRANT COPY ON TABLE log_data TO log_user; 8) Change JSON to: {"serial": "AB10", "sequence": 23} and add a sequence field in the table. Sequence shall be a “small integer” – two bytes. 9) Change log_data to a hyper_table, may affect table structure. 10) Maintain a “” script with all initialization etc. 11) Restructure user/database is intended to safeguard for SQL injection? Do you also propose to sanitize strings before crea...

    €276 (Avg Bid)
    €276 Gebot i.D.
    1 Angebote

    We are seeking an experienced developer to configure data exchange between a Jetson Nano and another device via the CAN bus, utilizing the RS485 CAN HAT. Documentation and examples for the RS485 CAN HAT for the Jetson Nano are available here: Project Requirements: Data packets to be transmitted are split into frames of 8 bytes each, with the first 7 bytes of the frame encoded in ASCII. The last byte is an integer frame counter that does not convert to ASCII. A checksum is generated from the packet data and appended at the end of the packet using the following function: c Copy code uint16_t crc_chk_value(uint8_t *data, uint16_t size) { uint16_t crc = 0; while (size--) { crc ^= *data++; for (unsigned

    €468 (Avg Bid)
    €468 Gebot i.D.
    20 Angebote

    This app will operate similar to what is done on Malware Bytes Digital Footprint Generator where the user starts by entering an email address. The email address needs to be verified via a code sent to the same email. Once verified, the site will search the web and social media accounts associated with that email and display any PII related information that is found linked to that email. This should be online accounts mailing addresses, phone numbers, exposed locations, associated devices, exposed passwords. Once displayed, there should be a link on the page saying 'Take Action' and this leads to a static web page which will be populated by me. This system will be deployed on a web server that can be either as a Word Press Module OR as a standalone application. The dev stac...

    €156 (Avg Bid)
    €156 Gebot i.D.
    63 Angebote

    ...PoP3 account at the same frequency. The key requirements and tasks for this project include but are not limited to: - Generating and documenting metrics and logs from the email process, including: - The number of emails sent - The number of emails received - The number of failed email transmissions - Cycle time for each email between send and receive - for SMTP and POP3: Bytes Transferred, Bytes per Second, Connect Time, Lookup Time (when DNS Name is used instead of an IP Address), Response Time - log messages for - every email(s) sent cycle with status return message of SMTP Server - every email(s) receive cycle with status return message of POP3 Server The SMTP and POP3 transmission should also be possible via SSL. SMTP and POP3 authentication ...

    €100 (Avg Bid)
    €100 Gebot i.D.
    7 Angebote

    As my business grows, I'm needing assistance with social media content creation and video editing services. No need to worry about social media advertising or analytics and reporting since we've got it covered. What I truly value is: - Experience in social media content creation and video editing. - Ability to transform footage into engaging media coverage that includes media bytes. - Proven track-record of creating captivating social media contents. There's no preference for a specific editing style; I trust your expertise on what looks best. I look forward to hearing about your previous experience and seeing the magic we can create together!

    €18 / hr (Avg Bid)
    €18 / hr Gebot i.D.
    14 Angebote

    ...demons, evil, psychopaths. I have not seen my baby. Bc he pays everyone off. The dad makes $1,000,000 yearly. Corruption and conspiracy. I do not need someone to lie to me to get hired. I’m looking for someone to rescue my son and publicly expose them. I ordered BANNERS to protest on the streets. do not trust Mudassar. He said he is on nobody’s side and acting different, weird, not RESCUING MY STOLEN BABY KENDIN in Tennessee. Who do you trust ????? Experienced???? Committed???? can replace Mudassar for a set monthly fee to do all my cases. 1. Custody appeal 2. Writ to supreme courts 3. Appealing another writ denied 4. Expedited appeal ? Bc I have not seen my baby in 7 months 5. Lawsuit malpractice against Rick Spivey 6. Lawsuit malpractice against Louis Winner 7. 5...

    €230 - €690
    Versiegelt
    €230 - €690
    14 Angebote

    ...center had four responses from police in the last 30 days and twelve responses in the last 90 days. Our of the four recent calls, two were for charges related to two residents from the center urinating in public by the basketball courts since there was no outdoor bathroom facilities. The third call dealt with a resident from the center who was fighting with another resident from the center regarding stolen alcohol. Both residents were later dismissed and ejected from the center as alcohol is against the rules for Beacon House residents. The final call was made by Beacon House against a trespasser, a 21-year-old man, believed to be a pimp, who was attempting to track down one of his “girls”. The police arrested the pimp for trespass. The residents also fear that the ce...

    €144 (Avg Bid)
    €144 Gebot i.D.
    23 Angebote

    ...library to be built should contain at least a file type and the following functions: int myFormat(char* partitionName); the function returns 0 if the "formatting" succeeds. • file * myOpen(char* fileName); the function "opens" or creates a file with the given name. • int myWrite(file* f, void* buffer, int nBytes); the function returns the number of bytes written. • int myRead(file* f, void* buffer, int nBytes); the function returns the number of bytes read. • void mySeek(file* f, int offset, int base); the function moves the file's read/write pointer. Note: It is obviously excluded to use UNIX functions (except for creating the "partition"), as your functions must operate within the large file/partition created usi...

    €36 (Avg Bid)
    €36 Gebot i.D.
    7 Angebote

    I need assistance with a task of immediate importance. Our trailer with our family’s belongings was stolen recently, and a 5-minute security video contains crucial leads. Most important is returning our family memories, and our child’s irreplaceable items. The theft happened at 12:15am on March 15th, I hope to find the items as soon as possible. I have a link to the original 5 minute video that was uploaded. I'm on the lookout for someone with: 1. Excellent attention to detail 2. Proficiency in video analysis 3. Reliable track record in identifying vehicles from video material. You are expected to identify the following aspects precisely from the video: • License plate number • Car's make and model • Car's color • Any additi...

    €100 (Avg Bid)
    €100 Gebot i.D.
    26 Angebote

    As an alumni association, we need a web developer to create a highly interactive and user-friendly site featuring a detailed map. This map should ...are clicked. Each popup window should contain: - A photograph of the alumnus. - Contact information. We will need a back office to deal with the data, and a form to allow each one to be added on the map after verification. We would like to be able as well to store the list of everybody's emails to send message easily. The whole site will of course need to be protected, to dont have data stolen by a virus or whatever. This project requires a web developer with skills and experience in creating detailed, interactive maps, and managing user data on a website. The ideal candidate should have prior experience in handling si...

    €638 (Avg Bid)
    €638 Gebot i.D.
    72 Angebote

    I need a creative and skilled editor who can handle both video and audio edits for a 5-10 minute wedding project. The ideal candidate would be able to transform the raw footage and sound bytes into a mesmerizing romantic, cinematic wedding video that tells a love story. Key Deliverables: - A polished 5-10 minute wedding video with overlying audio - Video and audio edits focusing on the romantic cinematic style Skills and Experience: - Video and audio editing, ideally with past wedding project experience - Strong storytelling capabilities - Proficient in video editing software - Good time management skills - Familiarity with romantic cinematic style wedding videos.

    €251 (Avg Bid)
    €251 Gebot i.D.
    77 Angebote

    I need a proficient developer to build an iOS mobile application that serves to locate lost or stolen devices. Key Features: - Real-time location updates: The system should provide instantaneous location alerts to keep us posted on the device's whereabouts. - Location history logs: The software should track the device's past locations, showing us a clear timeline of its movements. - Geofencing alerts: It should support configurable geofences and push notifications when the device enters or leaves a predefined zone. Ideal Skills & Experience: - Proficiency in iOS platform development - Previous experience building GPS tracking applications - Understanding of geofencing concept and implementation - Ability to implement real-time updates functionality. sistema com se...

    €243 (Avg Bid)
    €243 Gebot i.D.
    41 Angebote

    Looking for a logo for my business. The business name is Robertson Investigations The company is a pr...most commonly used in this industry are fingerprints and magnifying glasses. I am open to interpretation. We have not decided on colors yet. Please use your creativity, but keep the colors to 2-3 shades if possible. Key Requirements: - The logo should be unique, simple yet sophisticated. - It should clearly represent my company's name. - Use of colors should be minimal and attractive. - NO STOLEN DESIGNS - I will be doing a reverse image search - NO CANVA DESIGNS Ideal Skills and Experience: - Strong graphic design skills - Logo design experience - Knowledge in branding and visual identity - Creative thinker with an eye for design I will only need the AI file a...

    €14 (Avg Bid)
    Garantiert
    €14
    264 Einträge

    ...com/pages/can-dbc-file-database-intro For a better overview of the project, see below: The editor both enables the creation of the DBC file itself, but it also allows users to view the logic of how signals are encoded in the DBC file via the Signal Preview section. Further, users can test how raw data bytes are going to be decoded via the DBC file using the payload decoding section. You can find the latest source code for the editor below: The current version of the editor has some bugs and we are looking for a person to fix these, as well as help with future development projects. This project requires good Javascript coding skills

    €154 (Avg Bid)
    €154 Gebot i.D.
    38 Angebote

    I'm developing on odoo 12 and I had to uninstall a module and during the reinstallation it set all the data in the res_parter table to false and cascaded the data from the related tables to false. I did a restoration of my Windows serve...on odoo 12 and I had to uninstall a module and during the reinstallation it set all the data in the res_parter table to false and cascaded the data from the related tables to false. I did a restoration of my Windows server to recover the data from the backup a few days before the data came back except that I got the error ERROR: could not read block 17 of the file “base/16393 /2619”: read only 0 bytes on 8192. after research and inspection I was able to determine the column of the table which poses this problem but I cannot correc...

    €24 (Avg Bid)
    €24 Gebot i.D.
    10 Angebote

    ...will be contacted on Monday to being the trial offer. PAYMENT It does not matter to me if you submit an offer for $10/h or $1000/hour, so don't worry about this part. I have a non negotiable hourly I am willing to pay at $40/h that will scale up to $75/h over 3 months once you onboard yourself to the workflow. TRIAL RUN Unfortunately, we live in a time where many people submit fraudulent or stolen portfolios. For this reason, I do a trial run to verify the skillset showcased in the portfolio. You will receive up to 5 requests to make a hero concept shot, similar to the ones you have on your dribbble portfolio. These should take no more than ~2 hours to complete. Your compensation will be $50 / shot, so $25/hour. You are welcome to use them in your portfolio, I ...

    €44 / hr (Avg Bid)
    Featured
    €44 / hr Gebot i.D.
    60 Angebote

    I'm currently dealing with a PHP and MySQL errors in 2 different files that urgently needs to be resolved. - In the first file, I get the following error message: Fatal error: Allowed memory size of 536870912 bytes exhausted (tried to allocate 8192 bytes) in ........ on line 71 - In the second file, i get a timeout error message sometimes, but not always. The content takes very long to load though. The problem requires an experienced PHP developer with strong diagnostic skills, who is not averse to confronting an undefined problem. As the issue and error message arising from running the PHP code are uncertain, applicants should be: - Highly proficient in dissecting PHP errors and MySQL queries - Capable of troubleshooting and fixing a range of PHP errors, such as Pa...

    €24 (Avg Bid)
    €24 Gebot i.D.
    60 Angebote

    ...Wi-Fi and RX I2C. The server logic for Wi-Fi RX handling is additionally described stepwise below: 1 Listen for Wi-Fi RX messages, receive the message packets 2 Put all messages into the RX-WIFI queue. 3 Put all messages also in the TX-UART and TX-WIFI (for all detected clients network IP-s) queue 4 Check the first two 1-byte characters of the message that define the message type and If the 2 bytes are 0x58, 0x02 then put the message also into the TX-I2C queue In the case of RX I2C the messages from this queue once received should be put into the TX-UART queue. The project should also include additional server and client functions that will allow the client to automatically detect the address IP of the server (on the same router) by the clients, like UPnP or some other, possib...

    €1170 (Avg Bid)
    €1170 Gebot i.D.
    16 Angebote

    ...threats. In-depth knowledge of device and network protection protocols is crucial, as well as the ability to guide me through the necessary steps to secure my digital perimeter. Preference will be given to candidates who can demonstrate a track record of successfully resolving similar concerns. Let's work together to restore my digital peace of mind. I believe i know who is hacking me, they have stolen folders from a Gmail account after i deleted the account, they left watssap groups from numbers that are no longer in service for months, there picture showed in my email address, They are blocked yet they appear when sharing stuff on Facebook etc, I have messaged myself and group and the individual gets the numbers, I have received Facebook codes that i googled and see a hac...

    €34 / hr (Avg Bid)
    Dringend
    €34 / hr Gebot i.D.
    10 Angebote

    I'm in search of a skillful Android developer to create a mobile application that will increase the security of android phones by disabling the shutdown option in settings. The main functionality of the application is to prevent thieves from switching off the phones without users' permission. This should make stolen devices easier to track and recover. Key Project Features: - Application should run in the background without draining battery - The ability to disable the shutdown option in the Android phone settings Ideal Skills for the Job: - Android App Development - Android SDK - Security software development - Familiarity with Android system settings - Exceptional attention to detail It would additionally be beneficial if you've previously worked on security ...

    €562 (Avg Bid)
    €562 Gebot i.D.
    45 Angebote

    Stolen Innocence: Artists Pay Homage to Children of Conflict. Overview: "Stolen Innocence" is a mobile art instillation that seeks to convey a powerful message of empathy and awareness by transforming a school bus into a canvas for artistic expression. Each artist involved will be assigned a seat and two “body bags”, symbolizing the children affected by conflict. (Their names will be written on the outside.) This will be integrated into the project to evoke a sense of urgency and reflection. (No body bags as of 1/31/24) Concept: The school bus, a universal symbol of innocence and childhood, will serve as a poignant canvas for artists to communicate their unique perspectives on the impact of conflict on children. The two “body bags” positio...

    min €46 / hr
    Lokal
    min €46 / hr
    0 Angebote

    Stolen Innocence: Artists Pay Homage to Children of Conflict. Overview: "Stolen Innocence" is a mobile art instillation that seeks to convey a powerful message of empathy and awareness by transforming a school bus into a canvas for artistic expression. Each artist involved will be assigned a seat and two “body bags”, symbolizing the children affected by conflict. (Their names will be written on the outside.) This will be integrated into the project to evoke a sense of urgency and reflection. (No body bags as of 1/31/24) Concept: The school bus, a universal symbol of innocence and childhood, will serve as a poignant canvas for artists to communicate their unique perspectives on the impact of conflict on children. The two “body bags” positio...

    €9 - €10
    Lokal
    €9 - €10
    0 Angebote