Phpcipher decrypt jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 phpcipher decrypt jobs found, pricing in GBP

    I have files encrypted by BlackBit, and rename the files a .eking. I need decrypt this files.

    £208 (Avg Bid)
    £208 Avg Bid
    4 bids

    ...Problem Every year personal information of website users are stolen and sold illegally. Data provided by the users are unsafe in centralised servers. In some countries, there is a hefty fine if you fail to keep the data secure. Our Solution  We don’t save your data in a centralised or decentralised server as it is. Only a hash of the data is saved in the blockchain. Only Authorised users can decrypt the hash with the help of smart contract. To find out how Web3 can be used, please visit Stand a chance to win an iPhone 14. Register at ______________________________ Please bid only after reading the details....

    £18 (Avg Bid)
    £18 Avg Bid
    21 bids

    1) Describe how to implement the following queries in MapReduce: SELECT , , , , FROM Employee as emp, Agent as a WHERE = AND = ; SELECT lo_quantity, COUNT(lo_extendedprice) FROM li...MapReduce engine only needs to take action if a job was in progress). Where does the Mapper store output key-value pairs before they are sent to Reducers? Can Reducers begin processing before Mapper phase is complete? Why or why not? Repeat the RSA computation examples by a) Select two (small) primes and generate a public-private key pair. b) Compute a sample ciphertext using your public key c) Decrypt your ciphertext from 4-b using the private key d) Why can’t the encrypted message sent through this mechanism be larger than the value of n?

    £160 (Avg Bid)
    £160 Avg Bid
    1 bids

    Please apply only if you have worked on this type of script, also start your bid by saying "PHP PGP" so I know you read it all. : $LocalFilePath='CSV File path to encrypt'; $EnryptKeyFile='File to Public Key File'; ------------- Your Code here ------------------ $PgpFilePath='Encrypted PGP File Path'; --------------------------------------------------------------------------------------------------- : $LocalPGPFilePath='PGP Encrypted File Path'; $DecryptKeyFile='File to Public/Private Key File'; ------------- Your Code here ------------------ $CSVOutPutPath='Decrypted File Path';

    £75 (Avg Bid)
    £75 Avg Bid
    9 bids

    I need someone to help me with cryptographic techniques to encrypt and decrypt messages using a mixture of asymmetric and symmetric cryptography in an unix based environment.

    £152 (Avg Bid)
    £152 Avg Bid
    2 bids

    Demonstrate deflate compression/decompression with Blowfish encryption/decryption. One textbox with two buttons for save and open Open: blowfish decrypt & deflate decompress (textbox) Save: (textbox) deflate compress & blowfish encryption to file Only work with bytes in file. Use deflate import. Convert C# blowfish to vb.net .net framework 4.8 sdk

    £27 (Avg Bid)
    £27 Avg Bid
    9 bids

    Hi I do have a ECU file that is encrypted, also i do have a full log file of original diag tool when flashing the ecu if needed need file decrypted

    £129 (Avg Bid)
    £129 Avg Bid
    10 bids

    STOP. It is imperative that you read this entire post before sending any messages to the employer. Summary: We have a number of on-going projects and need multiple developers. Specifically, we need back-end developers experienced with Linux and Python. This project is a test of your skills. For this test, you will build a very simple web service that uses GPG to decrypt a message. Your successful completion of this project will allow you to bid on larger projects. Basically, this is an interview that you can get paid for taking. Deliverable: 1. Your deliverable must be a single file named "". 2. This is how your deliverable will be used: - Our automated build system will extract your deliverable file to "/usr/local/src" on a fresh server instance that exactly m...

    £90 (Avg Bid)
    £90 Avg Bid
    4 bids

    My database server was attacked by ransomware and encrypted my backup I need to decrypt my backup

    £464 (Avg Bid)
    £464 Avg Bid
    8 bids

    ...crypto wallets. As a part of this product, i want to build an Android SDK which any app A can integrate to get following functionalities : 1. generate a public private key pair locally (not in the server) 2. Take user PIN / password as user input 3. Encrypt private key using this user PIN 4. Store the encrypted key in local device (not on server) 5. Access the stored encrypted key when needed and Decrypt with user PIN input 6. Sign some data with this decrypted key. In such a manner that all above steps occur within the app A but the app A itself can NEVER access this encrypted or raw Keys stored in the local device, during any process. If you ae from India, and have used any payment app like PhonePe or GPay, take the UPI pin interface as reference, as this SDK can be imagine...

    £1499 (Avg Bid)
    £1499 Avg Bid
    32 bids

    Functionality required in Android Native app:- Scan a QR code In the response you will get an AES encrypted string Decrypt that base64 information There will be AVIF format image and some other base 64 information Show image and information in phone GUI. Some data and images will be pre stored in local storage to Show in GUI

    £260 (Avg Bid)
    £260 Avg Bid
    23 bids

    An encrypted epub file. Thank you

    £42 / hr (Avg Bid)
    Urgent
    £42 / hr Avg Bid
    4 bids

    Hi Sonny W., I noticed your profile and would like to offer you my project. We can discuss any details over chat. I have many files need to decrypt that are encrypted due to extansion is pahd

    £8 (Avg Bid)
    £8 Avg Bid
    1 bids

    We are setting up a Dovecot mailserver with Mail Crypt plugin for email encryption. We have set up per-user encryption, emails are getting encrypted, can be sent and received. However, webmail (we use SOGO) is unable to decrypt emails. We suspect that there is an issue with the passwords, respectively they are not being passed to webmail or this is being done incorrectly. Passwords are being stored in a mysql database. We need to fix this issue and make webmail read/show encrypted emails.

    £16 (Avg Bid)
    £16 Avg Bid
    2 bids

    I have a 3D printer with MKS Gen-L V1.0 with some modified version of Marlin and I am trying to modify the source code of Marlin in a way that only works with an encrypted gcode file. My plan was to use a symmetric encryption algorithm such as AES or DES to encrypt my gcode file in C or C++ with a key and use the same key in the Marlin code to decrypt the code on Arduino and continue printing as normal. I would like to hire an Marlin firmware expert about this issue.

    £169 (Avg Bid)
    £169 Avg Bid
    7 bids

    I need to decrypt the response from a websocket, this text below is encrypted, I don't know the hash. 3>5S5n:k4O4S@l3:5TAh87@N844n>85K3T8E@N@N7C7V4S:I7KBF985i8V7U8@1I8@9=8Y8V>8AJ5f7b877a598o>8<@5W37^20?5H;E3[:N3[0<5O:m9M557Z0G4[3A3_557@2_077V8R784X4X=<;c2_5e49@N0H9;;e3W877U7K61;c7M30?9X8?8<4=4X0@5b;F8<417K2493_0;5a4O5j0GAh5W7^9X=Z7?3:5a5m5L Response from a ws from Evolution Gamming. Send me the answer to this text and I'll hire you for the service, I need to know the hash or simply a way to decrypt it, whatever it is.

    £15 / hr (Avg Bid)
    £15 / hr Avg Bid
    15 bids

    Hello, I want someone who be able to give me a code for Encryption in AES algorthem the Encryption should be done in java and the decrypt in javascript. Thanks

    £21 (Avg Bid)
    Urgent
    £21 Avg Bid
    3 bids

    Hello I am looking for a developer who has already worked in a System ALPR project. I am looking to develop a system capable of reading Arabic and French license plates and opening an electronic barrier. The project is for system and hardware development, the software must detect an IP camera on the network and read the images it will provide to decrypt the license plate and open the barrier if yes or display a message on a screen if not. I don't have a camera, we are looking for a company that can do all the projects, please write me your price proposal

    £1912 (Avg Bid)
    £1912 Avg Bid
    31 bids

    I am looking for a PHP developer who knows how to integrate the Vahan API. We have following requirement:- 1) Implement a script on test page. 2) Fetch the data and decrypt the result. 3) It has access on server private IP, so the implementation needed to be with such parameters. 4) PHP language to be used. 5) Attached is the document for some understanding.

    £97 (Avg Bid)
    £97 Avg Bid
    15 bids

    am not a programmer but i understand the concept behind the idea of live streaming.. so All i need is a dashboard with a script to decrypt keys for an m3u8 therefore generate an iframe with the m3u8 player for a live stream! it's all about ovveriding the XMLHttpRequest. for more info please refer to this :

    £424 (Avg Bid)
    £424 Avg Bid
    15 bids

    I have a CRUD system that uses JSON configuration files. I would like the ability to encrypt those JSON files so users cannot easily make changes. I would still like them to be readable by ColdFusion though. Please provide a plan in your bid description along with your quote. Please use the term cfguru so I know you have read and understood this project. Thanks!

    £105 (Avg Bid)
    £105 Avg Bid
    4 bids

    ...function add a check for an empty file, and if the file is empty, the function should not pull it to the server. -Write to the file variable environment etc current active IP (if the connection is broken it will remember where it failed and drop the remnants of the IP list as an output, not a finished process) -implementation of cookies/passes extraction and decrypt from Chrome 80+ ( in open-source version its broken ) decrypt and extract should work with both auth-e by hash and auth-e by clear text passwords -Collecting cookies/passes from Microsof IE Edge (IE already collects, but for some reason only if you give the .pvk key to the input) -Collection of browser history Microsof IE Edge Chrome FF -Collect Quick Access, recently used files from file-...

    £368 / hr (Avg Bid)
    £368 / hr Avg Bid
    10 bids

    - Plagiarism Prevention using Steganography Technique. - Do web-based application for this project. Focus on image steganography using PHP language and MySQL as the database For my project have two actors, which is user and a...the database For my project have two actors, which is user and admin. Total use case: 9 1. Create Account 2. Login Account 3. View Profile 4. Delete Profile 5. Create Encrypt Image 6. View Encrypt Image 7. Reset Encrypt Image 8. View Decrypt Image 9. Reset Decrypt Image Partition for user : - create account - login account - view profile - create encrypt image - view encrypt image - reset encrypt image - view decrypt image - reset decrypt image For admin : - create account - login account - view profile - delete profile - view enc...

    £20 (Avg Bid)
    £20 Avg Bid
    39 bids

    * Experience in C++, Python * Principle of Symmetric & Asymmetric Cryptography, Hands-on, Technical, Problem Solver. * Can easily crack hash & decrypt strong encryption * Evaluate, Analyse and target weakness in cryptographic security system and algorithms. Investigate, research and test new cryptology theories & applications. Develop and update methods for efficient handling of Cryptic process * Knowledge of cryptography is required.

    £1219 (Avg Bid)
    £1219 Avg Bid
    8 bids

    I created a spring boot application- It reads the encrypted file from the source dir and decrypts to the output directory. I need help to promote this jar to the AWS (Lambda/s3). The source and destinations will be in S3. As and when new file uploaded to the S3 src dir, jar have decrypt and write the file to S3 output dir.

    £73 (Avg Bid)
    £73 Avg Bid
    13 bids

    Hi, CONTEXT ---------------- I have downloaded multiple gpg-encrypted files and I have the pgp private key asc file to decrypt them. Using command line works fine on my local machine. But on target deployment machine, I am not allowed to install that exe. So the architects have come up with using java and the libraries of bouncy castle to perform the decryption. However, after reading the docs, googling and digging on stackoverflow, I cannot get it work. REQUIREMENTS --------------------------- - create java class (can be a jar file) called PGPDecryptor taking 2 arguments : 1) full path to an file 2) full path to the pgp private key asc file - the output is a decoded file in the same folder as the input file whose name is same as input file but without .gpg extension

    £102 (Avg Bid)
    £102 Avg Bid
    8 bids

    Hi Sir, my system has been attacked by Ransomware attack, how can I recover it or decrypt all files

    £91 (Avg Bid)
    £91 Avg Bid
    8 bids

    I have software. the php code is encrypted and should be decrypted. the encryption of the php code is encrypted with ion cube loader. For this reason I cannot run the code via xampp on localhost. I would like to decrypt the php code and thereby run the code on localhost.

    £461 (Avg Bid)
    £461 Avg Bid
    25 bids

    We are looking for a comprehensive engineer who would deal with us and keep long term business! This project has serious inquiry and has already how the process could be. We need C+ Programming , coding , web analysis, Know how to access one's website' web socket. ]

    £1844 (Avg Bid)
    £1844 Avg Bid
    37 bids

    ...on which anybody will be able to purchase a fraction of a property and get a fraction of the rent to get rental income We are looking for an article writer that will be able to publish it's article on famous high end websites: Forbes Time Bloomberg Inc Financial Times CNN etc... We also have some specific websites linked to the crypto market and blockchain like: 1. CoinDesk 2. CoinTelegraph 3. Decrypt 4. Cryptopotato 5. Blockonomi 6. BeinCrypto 7. Bitcoin Magazine 8. NewsBTC 9. CryptoBriefing 10. Bitcoinist 11. CryptoSlate 12. AMBCrypto etc.... The article should probably be around 500 words You'll have to write the unique article and have it published on one of those website or any other website that we would agree with you Please provide example of articles and websi...

    £75 (Avg Bid)
    £75 Avg Bid
    7 bids

    ...on which anybody will be able to purchase a fraction of a property and get a fraction of the rent to get rental income We are looking for an article writer that will be able to publish it's article on famous high end websites: Forbes Time Bloomberg Inc Financial Times CNN etc... We also have some specific websites linked to the crypto market and blockchain like: 1. CoinDesk 2. CoinTelegraph 3. Decrypt 4. Cryptopotato 5. Blockonomi 6. BeinCrypto 7. Bitcoin Magazine 8. NewsBTC 9. CryptoBriefing 10. Bitcoinist 11. CryptoSlate 12. AMBCrypto etc.... The article should probably be around 500 words You'll have to write the unique article and have it published on one of those website or any other website that we would agree with you Please provide example of articles and websi...

    £264 (Avg Bid)
    £264 Avg Bid
    41 bids

    Hi, I am looking for someone to create a system to restream Live Mpeg-Dash manifests parsing the segments to decrypt/copy and mux to HLS m3u8 manifest. This ideally i would like this done via ffmpeg/PHP/NGINX core setup. Process ideally.. open MPD manifest Create parser to download segments via Aria2c download correctly in correct order and concat to mp4 and then transcode to HLS via M3U8 with TS segments. Delete old concat files and downloaded segments.

    £413 (Avg Bid)
    £413 Avg Bid
    18 bids

    There isn't a built in root filesystem encryption tool for the nvidia jetson line. They have secure boot and also bootloader encryption but not rootfs encryption. This is possible through customizing the u-boot to decrypt the fs although it is not built in by default. Looking for someone to build an image with encryption that i can flash to an xavier nx. Then help with instructions for enabling secure boot and testing resilience of system. Added details. This encryption and security method also needs to work with the jetson nano emmc. This will make it slightly harder as the nano can't encrypt the bootloader. Refer to this post If someone can access the key mentioned in the post the encryption can be handled by

    £2230 (Avg Bid)
    Featured NDA
    £2230 Avg Bid
    11 bids

    I want some videos to be decrypted. They are paid lectures, which comes with a validity and view times. I want to be free from that, that's why I want to decrypt those. If someone can do this....pls send proposal

    £117 (Avg Bid)
    £117 Avg Bid
    11 bids

    ...put mergefuel tokens with them (depending on total value of bitcoins,ethereums,bnbs)… then I hit merge button.. all the wallets of btc, eth, bnb, mergefuel will be locked… the private key of all wallets will be encrypted. After the merge process finishes, the outcome will be a mergify nft token.. This mergify nft token is the only way to open all the wallets back again… it will be able to decrypt the private keys of the wallets and regain access… the decryption could be done through one of the following options: 1. Attaching the decryption keys of private keys to the nft itself (but it should be hidden from the public). , 2. We could attach the decryption key into a online decentralized cloud, which will only access when we put the nft mergify to...

    £1940 (Avg Bid)
    £1940 Avg Bid
    59 bids

    All files in the server are affected by ransomware. Please message in the chat for more details. Price we can discuss once the issue is fixed.

    £21 (Avg Bid)
    £21 Avg Bid
    3 bids

    I want someone that can decrypt this type of encoding. 063B80FDCE3F2750251FD72BC59ED19380C8081087BD3F8607653F5918488DEFE6B6A88F57937C512F74129F84E4ABB1A781408B92304DA0115ED14E594ED1B28C2B594E8C6BP738F628B59310A4E23348E347B05192070AFC9C4DCC0 This type of enconding was received from Advanced Bluetooth Terminal

    £9 / hr (Avg Bid)
    £9 / hr Avg Bid
    5 bids

    I am looking for skilled ransomware virus expert, some weeks ago my excel files are encrypted from the virus. I need to decrypt my files, After attacked from the virus, I installed new OS at my PC, I have only personal virus ID and encrypted file. Please ping me only security experts. my files are encrypted with *.uyjh I have tried with "Emisoft Ecrypter for stop Djvu" program in my side, But failed. I see only this message "File: D:2222021 Error: No key for New Variant online ID: aM52ICzJQKQw5RzWb694LpEJS4hoQggGum2NGG0i Notice: this ID appears to be an online ID, decryption is impossible" Please bid only experts. Thanks.

    £497 (Avg Bid)
    £497 Avg Bid
    9 bids

    I have a short python script I put together that opens a file grabs the bytes of it and then uses AES encryption library to encrypt those bytes and write them back to the same file with some header info about how it was encrypted. I am now trying to add to it so it grabs the encrypted bytes from the file and will decrypt them and write them back to the file.

    £20 (Avg Bid)
    £20 Avg Bid
    13 bids

    ...com Sat May 14 08:25:02 2022 VERIFY OK: depth=0, C=CD, L=Kinshasa, O=FINCA RD CONGO SA, CN=*. Sat May 14 08:25:03 2022 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key Sat May 14 08:25:03 2022 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication Sat May 14 08:25:03 2022 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key Sat May 14 08:25:03 2022 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication Sat May 14 08:25:03 2022 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Sat May 14 08:25:03 2022 [*.] Peer Connection Initiated with [AF_INET] Sat May 14 08:25:04 2022 MANAGEMENT: >STATE:1652513104,GE...

    £3 / hr (Avg Bid)
    £3 / hr Avg Bid
    5 bids

    ...corrupted, and it is not read by the phone anymore. The phone works and the card itself works, it can be read by software. But of course the card is fully encrypted and when read externally nothing useful can be done with the card, and my last backup was 2-3 months ago. I see on the internet that I have to extract the encryption key from the phone stored in /data/misc/vold and then mount and decrypt the card to get access to the files. There are nice instructions and it seems easy. The thing is that the phone is not rooted, to get access to the filesystem to read the key, and I don't want to mess with it. I don't care if it gets bricked, but I don't want to risk to lose the encryption key. I guess it is not mandatory to be root to read files, but at the same tim...

    £412 (Avg Bid)
    £412 Avg Bid
    9 bids

    Hi, i have an encrypted javascript file (1.5MB) that need to decrypt because i want it to be readable and modifiable for me. If you are able and used to decrypt the things, this task should be fit for you. Please bid and i will send you the file i want to decrypt then start working together :) Thank you.

    £108 (Avg Bid)
    £108 Avg Bid
    5 bids

    ...Display on the page: Retrieval link Expiry (in date & time format) To decrypt the secret info: 1. go to URL 2. Enter Passphrase 3. Submit The page must: a) check the link is valid. If it is not then show message "Sorry this link is not valid" b) if the link is valid, but the viewed_date >0000-00-00 show message "Sorry this message has already been viewed and deleted" a) check the expiry date of the data - if it is after the expiry, then delete the row and show message "Sorry this message has expired" b) if not expired then check the hash of the passphrase matches the stored hash in the db. If it is wrong then show message: "Sorry this passphrase is incorrect" c) If not expired and passphrase hash matches. Then decrypt data ...

    £157 (Avg Bid)
    £157 Avg Bid
    28 bids

    List All Roulettes Playtech with last results in a table. i would like help figuring out how i can get this result No need to program for me, just teach Description: I'm developing a bot in visual studio, and I'm having trouble retrieving data from Roulette Playtech on the beta site, I tried to use web scraping but after a while running the time out site and the bot can't run, even restarti...how i can get this result No need to program for me, just teach Description: I'm developing a bot in visual studio, and I'm having trouble retrieving data from Roulette Playtech on the beta site, I tried to use web scraping but after a while running the time out site and the bot can't run, even restarting not always the bot worked. I tried to use Socket but the informa...

    £121 (Avg Bid)
    £121 Avg Bid
    6 bids

    I need a solution for the most important files i have on my workstation, I stored a backup of them on and on google drive. The problem i have is that the files are not encrypted. I need to encrypt them before uploading on Mega and Google-Drive. I am looking for someone who can implement 2 functions to encrypt and decrypt the files. the Encryption should be done by using a Public-Key and the Decryption by using a Private-Key. I am open for any fast and good solution.

    £109 (Avg Bid)
    £109 Avg Bid
    8 bids

    we need to make project based on the serial port communication,in which software will open Multiple serial ports then send /receive data using the serial port and save received data decrypt or bifurcate then save into the defined database. we need to open atleast 8 channels to open 8 different serial ports, then using that serial port we need to communicate with remote device using serial port, which should work in group, like 15 devices we put in group of the 8:00AM then , at 8AM it should dial remote devices of the group 8AM then save received data into database then it should go with 2nd device dial then receive data and save into database, same like upto configured devices of that timeline group. we need to show graph and data received into graph also in the software .

    £337 (Avg Bid)
    £337 Avg Bid
    9 bids

    * Experience in Matlab , C++, Python * Principle of Symmetric & Asymmetric Cryptography, Hands-on, Technical, Problem Solver. * Can easily crack hash & decrypt strong encryption * Evaluate, Analyse and target weakness in cryptographic security system and algorithms. Investigate, research and test new cryptology theories & applications. Develop and update methods for efficient handling of Cryptic process * Knowledge of cryptography,Hash is required. * Experience seeing the entire lifecycle of software products is crucial. Strong experience working with engineering and product development teams.

    £1205 (Avg Bid)
    £1205 Avg Bid
    7 bids

    I need a class with 2 methods one to encrypt and other to decrypt a Json document using third party key pair (public and private keys) that receives encrypted data and returns Json, or receive Json and returns encrypted data.

    £23 (Avg Bid)
    £23 Avg Bid
    2 bids

    the user is first greeted with a log in page, you can create an account or log in, data saved into a database which can be accessed, then the user is sent to a second screen where they can encrypt or decrypt a document.

    £154 (Avg Bid)
    £154 Avg Bid
    11 bids

    I have encrypt string and decrypt string I want to know what type of encryption is used and write code to encrypt in Python, I dont need decrypt (sorry my bad English) example: decrypt: encrypt: BbXY2eUW8ecOigwm+1UKF/oxxd51abktyeKbWp21d8uSMN9J3s7LpvnzJNKBep7jAYP/DhzFcYwbhLdBja3NUQ== more test case: -> 6y4X7FkKOF4hl1jP3LsZgigoZGGaGHoPuW2Wilyd00c9WCNLIlLTPsYRQfAv3mpLgf3mARA9e0wvYWnFaGQu8Q== 3485.4926543.0add19874dae1b5d62a256fe52518b26 -> zzDRrhwSJA42z5LB8LamahupbOXmZZ6li+/WnDL/Neq4+qMR1oY8yENdUFI+h7+ulJgvKszS9RZP9AGyU4aOvQ==

    £414 (Avg Bid)
    £414 Avg Bid
    21 bids