Filter

Meine letzten Suchanfragen
Filtern nach:
Budget
bis
bis
bis
Typ
Fähigkeiten
Sprachen
    Jobstatus
    2,000 hash converteer Gefundene Jobs, Preise in EUR

    In an Excel file, you want to create the MD5 hash from the first cell from the value of one cell in another cell. Enclosed is a sample file. The values from column A should be displayed in the yellow cells. German desciption: In einer Excel-Datei soll aus dem Wert einer Zelle in einer weiteren Zelle der MD5-Hash aus der ersten Zelle erstellt werden. Anbei ist eine Beispiel-Datei hinterlegt. Die Werte aus Spalte A sollen jeweils in den gelben Zellen angezeigt werden.

    €84 (Avg Bid)
    €84 Gebot i.D.
    8 Angebote

    In an Excel file, the MD5 hash of a value should be created. From this, a QR code should then be created and output in MS Word in a mail merge. The goal is to display a QR code in a Word document. We ask you to create the file in MS Excel and in MS Word for the production of the mail merge. German description; In einer Excel-Datei soll der MD5-Hash eines Wertes erstellt werden. Daraus soll dann ein QR-Code erstellt und in MS Word in einem Seriendruck ausgegeben werden. Das Ziel besteht darin, dass in einem Word-Dokument ein QR-Code angezeigt wird. Wir bitten Sie um die Erstellung der Datei in MS Excel und in MS Word zur Herstellung des Seriendrucks.

    €31 (Avg Bid)
    €31 Gebot i.D.
    5 Angebote

    Moin liebe Photoshoper, wir sind ein junges Start-Up im Online Handel und nehmen jeden Monat eine vielzahl an neuen Produkten in unser Sortiment. Für unser Projekt suchen wir noch einen Photopshoper mit herausragende Skills in der Bildbearbeitung. Wir legen besonder...Skills in der Bildbearbeitung. Wir legen besonderen Wert auf seriös&zuverlässig und suchen einen Meister seines Fachs. Wir wollen auf Amazon zu den besten Händlern gehören und das geht nicht ohne Photoshopper ;-) Wir benötigen aktuell 4-6 Produktfotos für unsere Produktbeschreibung. :m:mv1ikzesGJnp9Q_GqUv6vyg:rk:2:pf:0 Wir suchen eine langfristige Zusammenarbeit. Liebe Grüße Fabi

    €13 / hr (Avg Bid)
    €13 / hr Gebot i.D.
    15 Angebote

    Unsere Filme werden über das WebTorrent System illegal verbreitet. Wir benötigen ein Tool welches zu einem gegebenen Torrent-File/Hash über die Tracker die IP-Adressen der Seeder ermittelt. Zur rechtssicheren Ermittlung muss das Tool dann zwei Mal mit jedem Seeder Kontakt aufbauen und einen Teil der Datei herunterladen. Die Vorgänge müssen dann mit genauer Zeit protokolliert werden. Das Tool kann in Perl, Python, C++ o.ä. programmiert werden.

    €988 (Avg Bid)
    €988 Gebot i.D.
    3 Angebote

    Guten Tag, wir suchen jemanden der unser ebay Template anpasst, als Beispiel Template finden Sie dieses hier :m:mfuDqxqC3PlO9GL3ZNvs1MA Da wir auch Vorbaurollladen verkaufen, möchten wir ähnliche Bilder und eine ähnliche Auktion, bitte nur Deutschsprachige Bewerber. MfG

    €144 (Avg Bid)
    €144 Gebot i.D.
    10 Angebote

    Eine Kryptowährung soll mit dem Daten, die in der Hochgeladenen Datei zu finden sind, erstellt werden.

    €153 - €153
    €153 - €153
    0 Angebote

    Ich benötige jemanden, der mir einen Hash-Tree programmiert und dazu eine Blockchain.

    €374 (Avg Bid)
    €374 Gebot i.D.
    3 Angebote
    Kryptowährung Beendet left

    Ich habe die Aufgabe, eine Kryptowährung zu programmieren, bzw. nicht komplett. Ich benötige die Implementation eines Merkle Tree/Hash Tree, Blockchain und ein Signature verfahren.

    €224 (Avg Bid)
    €224 Gebot i.D.
    1 Angebote

    Auf Basis unserer PC CADDIE://online Single Sign On Schnittstelle (Doku gibt es gerne auf Anfrage) soll ein Plugin für Joomla ent...CADDIE://online Single Sign On Schnittstelle (Doku gibt es gerne auf Anfrage) soll ein Plugin für Joomla entwickelt werden, dass zwei Aufgaben löst: 1. Die Nutzung der PC CADDIE://online Zugangsdaten für den Zugriff auf einzelne Unterseiten in Joomla (inkl. verschiedener Benutzergruppen die über die Schnittstelle geliefert werden) 2. Soll es auf Basis der SSO-Schnittstelle möglich sein einen HASH zu generieren, der auf Wunsch an eingebettete IFRAMES übergeben werden kann um den Benutzer an eingebettete Module zu übergeben. Das Plugin soll als Ausgabe für das Login einen <DIV> liefern, der dann...

    €474 (Avg Bid)
    €474 Gebot i.D.
    5 Angebote

    ...gegeben werden, um eine Türe zu öffnen. Die gesuchte Hardware soll aus einem Lesegerät bestehen, das ein RFID Tag erkennt, einliest, mit den XML Daten vergleicht und im Erfolgsfall den Impuls an das Motorschloss weitergibt. Die Hardware sollte WLAN bzw. LAN fähig sein, um in regelmäßigen Abständen die aktuellste XML-Datei via Web Schnittstelle auszulesen und zu speichern. Auf den RFID Tags könnte ein Hash gespeichert sein, der auch im Online System beim entsprechenden Benutzer eingetragen werden muss. 2.) Auto-Login Online System Das Online System verfügt über einen mit Benutzername und Passwort geschützten internen Bereich. Ein Lesegerät soll ein RFID Tag erkennen und auf Basis dessen den Benutzer automatisch einlo...

    €2328 (Avg Bid)
    €2328 Gebot i.D.
    4 Angebote

    ...278 585 742 374 163 031 901 703 229 103 070 899 465 375 563 218 531 und e=3 zum signieren. Dokumente werden vor dem signieren mit SHA1 gehasht, ein Padding erfolgt nicht. Wir betrachten jetzt 2 Spezialfälle: • Die prüfende Implementierung berechnet t = se mod n, und prüft dann nur ob t mit dem gesuchten Hash beginnt. Folgen in t noch weitere Bytes nach dem Hash, so werden diese ignoriert. 
 • Hier wird ebenfalls t = se mod n bei der Signaturprüfung berechnet. Eventuell vor dem Hash stehende Bytes werden ignoriert, es werden lediglich die letzten 20 Bytes (SHA1 hat eine Ausgabelänge von 20 Bytes) verglichen. 
Erstellen sie für beide F ̈alle ein Dokument ihrer Wahl sowie eine Signatur zu diesem Dokument, die von so einer Im...

    €224 (Avg Bid)
    €224 Gebot i.D.
    1 Angebote

    Wir suchen jemanden der unsere Artikel mit Artikelattribute von Ebay auf Amazon übernimmt. Hierbei sollten die Texte und Variationen 1:1 von Ebay auf Amazon übernommen werden. Die EAN Codes werden von uns bereit gestellt - Bilddaten und Beschreibung finden Sie bei unseren bestehenden Ebay Artikeln wie z.B. Ebay auf Amazon übernimmt. Hierbei sollten die Texte und Variationen 1:1 von Ebay auf Amazon übernommen werden. Die EAN Codes werden von uns bereit gestellt - Bilddaten und Beschreibung finden Sie bei unseren bestehenden Ebay Artikeln wie z.B.

    €193 (Avg Bid)
    €193 Gebot i.D.
    3 Angebote

    Wir produzieren und verkaufen u. a. Keilrahmenbilder über die eBay-Plattform. Unsere Angebote dort sind eher statisch, für diesen Produktbereich benötigen wir jetzt aber ein Skript, welches auf eBay einsetzbar ist. Kunde soll sich ein Template für sein Keilrahmenbild aussuchen können. (verschiedene Aufteilungen und Größen) Er soll dann sein eigenes Foto hochladen u...soll automatisiert geprüft werden (Pixelanzahl Mindestwert) Es soll möglich sein das Kundenfoto und seine gewünschte Bildgröße/Aufteilung direkt an uns zu übertragen. Ein Wettbewerber hat das bereits recht perfekt gelöst, so in etwa stellen wir uns das vor:

    €979 (Avg Bid)
    €979 Gebot i.D.
    2 Angebote

    Die App besteht soll aus einem Login-Screen bestehen, der Nutzernamen un dPasswort abfragt und diese an einen Webservice (REST / JSON) schickt. Bei erfolgreicher Authentisierung wird eine Login-Token (Hash) zurückgeschickt und der Login View wird durch einen WebView ersetzt, der eine bestimmte, vordefinierte URL öffnet, an die der Login-Token angehängt wird. Unterhalb des WebView gibt es eine Tab-Leiste mit (zunächst) 4 Icons, die jeweils auf einen Webview mit leicht unterschiedlicher URL öffnet. Jeweils wieder mit dem Login-Token als Parameter. Der Login-Token soll in der App gespeichert werden, so dass eine erneute Anmeldung nicht nötig ist. Wird der Token nach z.B. 30 Tagen vom Server abgelehnt, soll der Login-Screen erneut angezeigt werden. Zi...

    €603 (Avg Bid)
    €603 Gebot i.D.
    6 Angebote
    SEO ADVICE Beendet left

    PLEASE COT ON THIS https://www.freelancer.com/projects/Internet-Marketing-SEO/Need-Experts-SEO-discuss-about.html?hash=azbt%2B%2F0d4bu7A5poPl%2FL%2BMRjBIP%2Bh4S35OVsgZ7sQbk%3D

    SEO
    €8 / hr (Avg Bid)
    €8 / hr Gebot i.D.
    1 Angebote

    Ich suche jemanden der für Shopware ein Zahlungsmodul (iframe und Redirect) für Shopware progammiert, Dokumnetation und Demogateway vorhanden, Daten müssen via HTTP POST an Gateway gesendet werden (Shopvariablen + HASH Wert) und Rückantwort des Gateway ausgewertet werden (Rückgabewerte + Response Hash) weitere Informationen stelle ich gerne zur Verfügung.

    PHP
    €437 (Avg Bid)
    €437 Gebot i.D.
    1 Angebote

    ... including my website and social media accounts. The ideal freelancer for this job should have: - Strong experience in creating unique, engaging logo designs - Proficiency in cartoon-style animation - A clear understanding of branding principles and how to apply them in logo design - A solid portfolio of previous logo designs that demonstrate versatility and creativity Company name is Molten Hash Extracts. Want a cartoon picture of a volcano eruption out the top of the head of a cartoon that looks like my son that I send you. The man in the pictures attached. With company name incorporated in logo. The clouds of the volcano eruption in the attached picture is what I envision coming out of the top of the head. I'm open to creative interpretations and suggestions during t...

    €72 (Avg Bid)
    €72 Gebot i.D.
    123 Angebote

    I'm in need of an expert who can manage commercial prospecting via Instagram, with the aim to: - Increase my pool of potential customers -...targeted audience is: - Aspiring authors - Individuals who have interest in reading - Librarians Please note, my book coaching services are high-value and are priced above €200. Ideal candidates should have tangible experience in Instagram marketing and niche targeting, with a proven track record of increasing product visibility and customer growth. Your creative approach and understanding of hash-tag usage, Instagram algorithms and engagement strategies will be critical to our success. Skills in copywriting and graphic design, as well as knowledge of the book industry, would also be advantageous to the role. Looking forward ...

    €144 (Avg Bid)
    €144 Gebot i.D.
    32 Angebote

    Para este proyecto, estoy buscando a alguien con experiencia en integr...opción de pago "Con tarjeta" y es enviado al API de mercado pago. Los parámetros a configurar son: Parametro de evento: Fecha del evento Nombre del evento URL de origen del evento Origen de acción Identificador del evento Número de artículos Identificador del pedido Parámetro de configuración de cliente: Apellido Agente de usuario del cliente - No cifrar con hash Correo electrónico Nombre Dirección IP de cliente - No cifrar con hash Ciudad País Teléfono Consideraciones generales - El servidor de producción es godaddy - Se entregará fuentes de php y de base de datos mínima de mysql. Caso de Pru...

    €412 (Avg Bid)
    €412 Gebot i.D.
    24 Angebote

    I'm looking for an expert C# developer to create a software that can hash CDs for the purpose of file integrity. The primary use of this software will be to compare the hashed data with other CDs. Key Points: - The software should be designed to hash CDs at a speed that outperforms the hashing process in PowerShell, ensuring efficiency and time-saving - The primary focus of the hashing is to maintain the integrity of files on the CD, so I need a developer who understands the importance of this and can ensure the software is reliable in this regard - The software should be user-friendly, with a preference towards a fully automated process to make it as easy as possible for end-users. I'm looking for a skilled C# developer who has experience in creating high-speed ...

    €3670 (Avg Bid)
    €3670 Gebot i.D.
    26 Angebote

    I'm in need of a C# program that can hash files as quickly as PowerShell does. The program should be able to hash image files and all other types of files at the same speed, while utilizing the SHA-256 hashing algorithm. Additionally, it would need to read and write data efficiently. Key requirements: - Develop a C# program to hash files. - Implement the SHA-256 hashing algorithm. - Ensure the program reads and writes data smoothly.

    €23 (Avg Bid)
    €23 Gebot i.D.
    2 Angebote

    I need a C# program that hashes text strings using SHA-256 hashing algorithm. The current program I have was designed to hash data, but I've noticed it does so in a different order than PowerShell. This is problematic for my workflow, as I need the two to hash data in the same order for consistency. Key Requirements: - Make the C# program hash data in the same order as PowerShell using SHA-256 - Ensure the program is efficient and secure - Document the changes made for future reference Ideal Skills: - Proficient in C# programming - Expertise in working with hashing algorithms, especially SHA-256 - Prior experience with data consistency issues - Strong understanding of security protocols and best practices Please include your relevant experience and approach in...

    €42 (Avg Bid)
    €42 Gebot i.D.
    18 Angebote

    I have a C# co...that's currently designed for file manipulation but I really need it to work like Powershell for data processing. - Task: I'm specifically working with text files and need to perform a hashing operation on them. - The end goal: The code needs to be able to read through the text files and hash them in a way that's similar to what one can do with Powershell. The ideal freelancer for this job should have: - Proficiency in C# programming, especially in the context of data processing. - A good understanding of hash functions and how to implement them in a C# code. - Familiarity with text file handling in C# is a plus. I'm looking for an efficient and smooth solution that's able to process large text files quickly. Your experience in...

    €36 (Avg Bid)
    €36 Gebot i.D.
    36 Angebote

    ...The key focus of this project demands: - Experience in hashing algorithms, notably SHA-256 - Proficiency in data authenticity verification - Familiarity with video formats, particularly MP4 - An understanding of how to match video-recorded audit logs with original hashed data It's crucial to know if the hash data from the video recording matches the original hash of the audit logs for data authenticity purposes. Please note that the audit logs are text-based and believed to contain a hash of the original file. Your role is to confirm this authenticity. This task requires a comprehensive understanding of data security and integrity checks. If you have prior experience in this area, your input would be greatly appreciated. The video files are about 1.3 gigs...

    €84 (Avg Bid)
    €84 Gebot i.D.
    13 Angebote

    I'm looking for a skilled developer to create a script that will pass hash value from the parent page to an iframe, and use the hash value as part of the iframe's URL. Key Requirements: - Extract the hash value from the parent page's URL. - Pass the extracted hash value into the iframe. - Utilize the hash value as part of the iframe's URL. Ideal Skills: - Proficiency in JavaScript, particularly working with iframes and URL manipulation. - Strong understanding of web security principles. The successful candidate for this project will have a keen eye for detail and the ability to create a robust, secure solution that meets the specified requirements.

    €60 (Avg Bid)
    €60 Gebot i.D.
    27 Angebote

    ...database. Here’s what the project involves: - Functionality: The add-on must copy user registration data from Xenforo into a separate database (for a start a simple sqlite3 file database). The password must be hashed and salted, similar to MyBB standards. ( this requires us to do it on every registration attempt because we only have the plaintext password at that moment and can only create a MyBB hash and salt at that time. Must Have: Xenforo Add-on dev env. I don't want to have to give you my license key for your xenforo development Ideal skills: - Xenforo knowledge: It's essential for you to have prior experience working with Xenforo software to ensure that the add-on can be comfortably integrated into our current forum. - Database management and replicati...

    €303 (Avg Bid)
    NDA
    €303 Gebot i.D.
    5 Angebote

    As a founder of "", I'm taking on an advanced cryptography course selling project. This comprehensive course encompasses: - Symmetric Key Cryptography - Public Key Cryptography - Hash Functions and Digital Signatures I'm looking for candidates with a deep understanding of these concepts, given the course is of advanced level. Furthermore, an affiliate marketer with a knack for turning complex content into engaging, easily digestible information is ideal. This course should be marketed as moderately interactive, featuring occasional quizzes to keep learners engaged. Skills and Experience: - Advanced cryptography knowledge - Proven affiliate marketing success - Ability to simplify complex information The Course Costs 1330.33$ You will use the discount code &quo...

    €91 (Avg Bid)
    €91 Gebot i.D.
    8 Angebote

    I need a tool using Microsoft Powershell that can fetch security patches and patch release information from the internet for various OS levels and applications using vendor websites. The tool should be able to download the patches and store them loca...severity level. Key requirements: - Fetching security patches for various OS levels and applications using vendor websites. - Downloading patches for specific applications only. - Storing the downloaded patches locally. - Collect patch information patch source, OS type, software impacted, software name, software description and the patch name and severity level - collect security hash from website and compare hash to ensure patch was not tampered with during download and output all of this data within the CSV file - export All...

    €476 (Avg Bid)
    €476 Gebot i.D.
    34 Angebote

    I'm looking for a skilled Python developer with experience in GPU programming using CUDA to assist in a project that involves image processing and data analysis. - I have a python code and I need to modify it to work with GPU the code takes an image changes its pixels one by one and each pixel change calculates new image hashes if images hash satisfies some specs it save image and code ends. this is whole python code is doing now. it is a 40 lines code. very simple for someone who knows how to code on cuda.

    €38 (Avg Bid)
    €38 Gebot i.D.
    7 Angebote

    I'm working with an API who giving the hash of a file, it returns a p7s digital sign in base64 who needs to be add it to the PDF dictionary. (It can be one or more signatures) What I want is, the ability to add the sign to the PDF in NodeJS (better if it's with typescript) and then open it in adobe acrobat and see the sign. I will provide the PDF sample, the hash of the file and the response of the API in base64 to be tested. Additionally I have an example in Java to better undestanding of the requeriments The flow of the file will be: 1. Give the hash and received the API response (this will be mocked) 2. The API response must be decoded (it's in base64) and add it to the PDF 3 A new PDF must be saved in the disk 4. When the new pdf is opened in Ado...

    €124 (Avg Bid)
    €124 Gebot i.D.
    34 Angebote

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be determined as part of this process.

    €326 (Avg Bid)
    €326 Gebot i.D.
    13 Angebote

    University Assignment: Flask Web Application for Secure Authentication System ONLY BID IF YOU CAN DO IT. Go to Template Folder to see the code and use Docker to run it. It should take 2-3 hours to do it. Need it ASAP. Project Overview: I will give you a zip file with , login.h...Authenticator. - Enforce session security with HTTPS and consider HTTP Strict Transport Security (HSTS) for enhanced security. - Implement CAPTCHA verification to prevent automated attacks and manage session rate limiting effectively. Recovery Options: - Generate recovery keys using () with at least 20 bits of entropy. - Ensure recovery keys are delivered securely and are single-use. - Hash recovery keys using Argon2 with individual salts. - Explore implementing HSTS to prevent downgrade attacks.

    €22 (Avg Bid)
    €22 Gebot i.D.
    30 Angebote

    ...same exact name. Of course browsers often use the cached version instead. The files are big enough where I want the browser to cache them, but only until they change - then the browser needs to grab the new version from the server. The apache and .htaccess expire headers haven't done what I need. I read that some codebases exist that will assign a variable to the end of the URL based on a file hash. I thought this may be the way to go. The solution needs to be editable by me. I am more of a general IT person who can do some front end development and tweak some code. So markup and explanations are important or available documentation if we cab use a simple library. A follow up project might be to implement squid or some sort of automatic way of localizing those pdf a...

    €22 / hr (Avg Bid)
    €22 / hr Gebot i.D.
    89 Angebote

    ...been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as part of the investigation and produce a report based on your management of the case, your analysis and your findings. You will have to: setup your forensic workstation for your analysis, which would include any forensic tools that you feel are appropriate for the job, download a copy of the forensic image from th...

    €104 (Avg Bid)
    €104 Gebot i.D.
    25 Angebote

    ...been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as part of the investigation and produce a report based on your management of the case, your analysis and your findings. You will have to: setup your forensic workstation for your analysis, which would include any forensic tools that you feel are appropriate for the job, download a copy of the forensic image from th...

    €19 / hr (Avg Bid)
    €19 / hr Gebot i.D.
    17 Angebote

    ...the following structure: First line: The block header. Second line: The serialized coinbase transaction. Following lines: The transaction IDs (txids) of the transactions mined in the block, in order. The first txid should be that of the coinbase transaction Difficulty Target The difficulty target is 0000ffff00000000000000000000000000000000000000000000000000000000. This is the value that the block hash must be less than for the block to be successfully mined. Execution Create a file named that contains the command to execute your script. This file should ideally contain a single command like python or node index.js. Your script should autonomously perform all tasks when is executed, without requiring any manual intervention. Evaluation Criteria Your submission will be evaluat...

    €10 (Avg Bid)
    €10 Gebot i.D.
    3 Angebote

    ...hpn5B"/> <Params> <Token Type="string" Value="b6JnfGF7fXMjOjB79zVoLCJwZCIyICIvMTMjLCJp9ka18WRo9jIyICJnYWvnYSIrIkfgeWUjOjAjYkfx9j2iY62T8Ga5YkFreDMjLCJpejIyICJwezZoZ1FnIjpjfGouZSIyICIvNnE6NTm5NiIvIz7"/> <TransactionID Type="string" Value="9156174388"/> <WinReferenceNum Type="string" Value="17612298068"/> <WinAmount Type="int" Value="75"/> <GameReference Type="string" Value="bgor-cc-Showball3 "/> <Hash Type="string" Value="1b522defc135ef9bea631d94a99f587bcb1cb03ec08ca356de42fb77f4e3c4a4"/> <BonusWinAmount Type="int" Value="0"/> <GameStatus Type="string" Value="Pending"...

    €27 (Avg Bid)
    €27 Gebot i.D.
    77 Angebote

    Hiring technical personnel can achieve complete development of the following code in practice. There may be something wrong with the code below, but there is project direction. pip install telethon Import TelegramClient from Import functions from # Create Telegram client with your API ID and API hash api_id = 'Your API_ID' api_hash = 'YOUR_API_HASH' Client = TelegramClient('session_name', api_id, api_hash) Asynchronous def send_dice(chat_id, dice_face): Asynchronously with client: result=awaitClient(( peer = chat id, Query id=0, id='robot command', silence=false, Scheduled Date = None, background=false, cleardraft=false, hide_via=true, selected=[dice_face] # 1-6 are ordinary dice )) print(result) # Fill in your account mobile

    €894 (Avg Bid)
    €894 Gebot i.D.
    59 Angebote

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    €191 (Avg Bid)
    €191 Gebot i.D.
    12 Angebote

    I'm seeking an expert in writing Splunk queries to detect threats, efficiently querying from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expert...from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expertise include: - Proven skills in extracting and analyzing data from logs - The ability to use Regex queries to extract additional, nuanced information - Proficient querying from CrowdStrike EDR telemetry. The information to be extracted comprises of EDR fields like: - Process Name - File Hash - Command Line I look forward to working with a detail oriented and security savvy professional who will utilize this data to help us identify potential security threats and ensure sy...

    €325 (Avg Bid)
    €325 Gebot i.D.
    19 Angebote

    I'm looking for a talented individual with proficiency in image processing and hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in such a way that its original concepts not changes - making image change so many time like a loop - calculating images hash The resultant processed images should be provided in JPEG, PNG, and GIF formats. A background in encryption and cryptography will be highly desirable. Your experience with these specific image processing techniques will be crucial to the success of this task.

    €113 (Avg Bid)
    €113 Gebot i.D.
    53 Angebote

    ...and need assistance to set up a Global TCP Passthrough Load Balancing to distribute my online traffic. The ideal bidder would have: - Extensive experience in setting up Load Balancing on GCP. - Solid understanding of routing and IP Hash distribution. -Each instance stores unique files, it is important there is the lowest latency possible, when a file is sent, it must go to the instance closest to who sent the file via TCP to the load balancing IP. -I can deploy as well, just need best practices on how to achieve this. Essentially, I need you to develop an IP Hash distribution strategy for distributing online traffic effectively. GCP certification is appreciated but not necessary as long as you have experience in networking and have worked on similar tasks before. A smoot...

    €133 (Avg Bid)
    €133 Gebot i.D.
    18 Angebote

    1- I need an update on my buy and sell bot that works on the Solana network through the Raydium pool, the bot has a mechanism for capturing variations in the chart and sending buy or...com/runtime/programs exemple : *jito priority documentation : *examples of program users that currently run within the Solana blockchain : user hash >program + jito = *example of priority in JITO + jupiter agregator user hash =

    €964 (Avg Bid)
    €964 Gebot i.D.
    136 Angebote
    Game Luncher C++ Beendet left

    ...stworzony. oto opis Developera który stworzył ten program:: Features Written in c++, best performance with multithreading Beautiful GUI, inspired in Blizzard All errors and exceptions throw user friendly messages International Multilanguage Fast download files Method of Hash (CRC32) default Banner in home (Promotion, Event, New Image, etc...) + News / Patch notes Initialize client with arguments Tool user friendly for generate serverlist hashs New config game for Metin built-in (Requirements: metin2client source) Available Hash method to choose Md4 Md5 Sha1 Sha224 Sha256 Sha384 Sha512 Sha3_224 Sha3_256 Sha3_384 Sha3_512 Available Languages This is extremely flexible when hiring you can add new languages or change existing since that helps me to translate co...

    €101 (Avg Bid)
    €101 Gebot i.D.
    56 Angebote

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security and confidentiality given its sensitive nature.

    €12 (Avg Bid)
    €12 Gebot i.D.
    26 Angebote

    ...the following structure: First line: The block header. Second line: The serialized coinbase transaction. Following lines: The transaction IDs (txids) of the transactions mined in the block, in order. The first txid should be that of the coinbase transaction Difficulty Target The difficulty target is 0000ffff00000000000000000000000000000000000000000000000000000000. This is the value that the block hash must be less than for the block to be successfully mined. Execution Create a file named that contains the command to execute your script. This file should ideally contain a single command like python or node index.js. Your script should autonomously perform all tasks when is executed, without requiring any manual intervention. Evaluation Criteria Your submission will be evaluat...

    €12 / hr (Avg Bid)
    €12 / hr Gebot i.D.
    7 Angebote

    In need of a tech-savvy, innovative app developer well-acquainted with both iOS and Android system...innovative app developer well-acquainted with both iOS and Android systems. The ultimate goal is to create a cryptomining application that's user-friendly and efficient. Key Features Required: - User Registration and Login: A secure authentication method, protecting user's data and mining activity. - Real-time Mining Statistics: To keep users informed about their mining status, providing data like hash rate, earnings, and more. - Wallet Integration: Facilitate seamless transactions using popular crypto wallets. Proficiency in blockchain technology, crypto mining, and payment gateway integration is a must. We value security and user experience, so expertise in these area...

    €638 (Avg Bid)
    €638 Gebot i.D.
    16 Angebote

    I am looking for a person who will rewrite a few functions for me, preferably into a hash map or a vector, depending on what is faster and easier, it concerns objects on the map

    €132 (Avg Bid)
    €132 Gebot i.D.
    13 Angebote