Text data decrypt access jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    3,353 text data decrypt access jobs found, pricing in GBP
    Code Obfuscation 5 days left

    I have python code which I have to deliver to client.. Client should not be able to look at the code. Once we obfuscate they could not able to de-compile/decrypt the code. Options: .exe cx_freeze pyminifier

    £19 (Avg Bid)
    £19 Avg Bid
    3 bids

    Decrypt Database files. I need to be able to export all of the data a set of DBF database encrypted files? These file are purposely encrypted by the creators. Have you successfully decoded dbf files with heavy encryption, as a reverse engineer or database decoder?

    £96 (Avg Bid)
    £96 Avg Bid
    3 bids

    I need someone who can decrypt an android apk and provide me the formula used for generating 2 header fields sent as http request. It should be a 10 - 15 minute job for someone who knows how to do it. I am not looking for someone willing to learn and I will ignore bot bids. Thanks.

    £124 (Avg Bid)
    £124 Avg Bid
    8 bids

    I need a standalone php script which will get stream url from openload links. Example Input Url: [login to view URL] Output Stream Url: [login to view URL]~1432452452~[login to view URL]~ZAXrv_PM?mime=true

    £94 (Avg Bid)
    £94 Avg Bid
    4 bids

    I need a Audio engineer. i need to find out and audio format the file does not have a format but it is wav i need the raw data inside the file i need to decrypt it its from a msr hardware thx

    £402 (Avg Bid)
    £402 Avg Bid
    6 bids

    Here i...Please follow the link to find two excel files: [login to view URL] 2) Find the password of the excel file or Decrypt the excel files 3) PM me once you have decrypted the file, the job will be assigned to you 4) Provide me with the password or decrypted file 5) Payment completed

    £22 (Avg Bid)
    £22 Avg Bid
    16 bids

    ...and public organizations to eradicate fraud and corruption, reduce cost and engage voters in a modern, convenient and accessible way. From apps that encrypt, shuffle, and decrypt ballots to election supply chain tracking, Agora is building an entire ecosystem for voting. Thanks to our expertise and close collaboration over many years with governments

    £2975 (Avg Bid)
    £2975 Avg Bid
    83 bids

    Project Requirements: Create simulation with Matlab for Secure Phase-Encrypted IEEE 802.15....256 bit. Matlab for Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design Using Rabbit Encryption Deliverables: Matlab code Flowchart Data reports : Bit error rates, Cipher size, execution time (Encryp/Decrypt) Schedule for Completion : 10 days maximum

    £129 (Avg Bid)
    £129 Avg Bid
    6 bids

    ...file with the clear password input file [login to view URL] with “mypassword” enclosed for example. 2) the 2nd script will do “aws kms decrypt” the file “[login to view URL] and provide a file called [login to view URL] with the file in clear text. Is $10 ok? (If not how much?) (Did I miss something?) This is something I need asap and to work on...

    £15 (Avg Bid)
    £15 Avg Bid
    3 bids

    ...concept - Encrypt the text file using symmetric key algorithm (e.g. AES) - Decrypt a text file using symmetric key algorithm (e.g. AES) - Generate an asymmetric key pair (public and private) - Encrypt the text file using the public key (e.g. RSA) - Decrypt the text file using the private key (e.g. RSA) - Generate the hash digest of the text file ...

    £58 (Avg Bid)
    £58 Avg Bid
    2 bids

    I have 100's of encrypted alphanumeric strings 28 characters long and their results of 13 characters long. I can give you as many needed. 10,...28 characters long and their results of 13 characters long. I can give you as many needed. 10, 20, 100, etc. The goal is to figure out the method being used and how to decrypt other strings in the future.

    £826 (Avg Bid)
    £826 Avg Bid
    15 bids

    ...existing data must not be lost, so please discuss the procedure with me (i.e. creating a new partition or folder without touching the existing data, unmounting the RAID, working on one disk first and then to re-establish the RAID) - if a container is used (dm-crypt) it must be dynamic, i.e. should grow if needed - I do not want to encrypt / decrypt individual

    £7 (Avg Bid)
    £7 Avg Bid
    2 bids

    i have the source code of a mailing app but when i want to install it into a dedicated ser...from him" and wait him to install it with an API crypt code that he only one who knows about it , every time i want to install it i have to ask for him to do it. i want to decrypt that code and can install it myself whenever i want without asking the app maker

    £123 (Avg Bid)
    £123 Avg Bid
    4 bids

    ...other options: • The application leverages an encryption key scheme such that only the users’ iPhone holds the encryption keys necessary to encrypt and decrypt messages. There is no ability to access email information outside of the Arculus App on the phone. Encryption keys are never stored, processed or transmitted on Arculus’ systems. • The application

    £1073 (Avg Bid)
    £1073 Avg Bid
    67 bids

    (1)Key generation. (2)Encryption. (3)Decryption. Hint: (i)For key gen...into blocks, encrypt each block with the round keys, and output the ciphertext of the sentence. (iii)For decryption, input the ciphertext (cut/paste), divide it into blocks, decrypt each block with the round keys, convert the plaintext to the sentence on the basis of ASCII codes

    £75 (Avg Bid)
    £75 Avg Bid
    5 bids

    ...below and bid accordingly. This project is to build a micro-site that demonstrates oAuth authentication, user details extraction, and Cookie-sending. It will write customised-access tokens to be used in ModRewrite on an application website. ModRewrite is out of the scope of this project - but is described at [login to view URL]

    £317 (Avg Bid)
    £317 Avg Bid
    6 bids

    I have client native app (vc++), it is packed by themida. Each time this app client send POST form data to server, data is encrypted with random key. Here is 1 example plain_text: hello data after encrypted something like: encrypted_text = 6NTkCAvY7NqYFz5lU1JjNQ== EncKey = ZCj35hEvmxMOQPrzYzov8CsOpKJayFoRUoc98FGTnnkUi+YZW5pzNHXhCuvKKqq4RAATdn1qSsZ

    £836 (Avg Bid)
    £836 Avg Bid
    15 bids

    I have client native app (vc++), it is packed by themida. Each time this app client send POST form data to server, data is encrypted with random key. Here is 1 example plain_text: hello data after encrypted something like: encrypted_text = 6NTkCAvY7NqYFz5lU1JjNQ== EncKey = ZCj35hEvmxMOQPrzYzov8CsOpKJayFoRUoc98FGTnnkUi+YZW5pzNHXhCuvKKqq4RAATdn1qSsZ

    £770 (Avg Bid)
    Guaranteed
    £770
    2 entries

    need experienced c or python programmer with knowledge of tcp , create a session , maintain and encrypt and decrypt md5 data .

    £9 / hr (Avg Bid)
    £9 / hr Avg Bid
    14 bids

    Hi sudhanlogics, please advise if you can decrypt .combo ransomware files. I have some files that I need decrypted.

    £67 (Avg Bid)
    £67 Avg Bid
    1 bids

    I'm looking for a Ransomware decrypt tool. Sample file with message is attached for your reference. If your able to decrypt the xls file before awarding the job you will be be qualified to bid the job.

    £25 (Avg Bid)
    £25 Avg Bid
    1 bids

    The input for the algorithm contains three ciphertext/plaintext (C1,M1) (C2,M2)(C3,M3) and the public parameter (P) of the encryption scheme. The output...ciphertext/plaintext (C1,M1) (C2,M2)(C3,M3) and the public parameter (P) of the encryption scheme. The output of the algorithm is the secret key SK = (s, q) which can be used to decrypt ciphertexts.

    £39 (Avg Bid)
    £39 Avg Bid
    1 bids

    Windows server was compromised due to due to SynAck ransomware attack We need to Decrypt a MS SQL Server 2008 database .mdf & .ldf file (2files)

    £19 (Avg Bid)
    £19 Avg Bid
    8 bids

    Hello. We are looking VOIP Tunnel software solutions to bypass voip calls in blockage area . It is encrypts/decrypt SIP and RTP packets and send voip traffic between soft switches without blockage . We are looking experienced guy who already developed or worked on this .

    £114 (Avg Bid)
    £114 Avg Bid
    10 bids

    ...we want to retrieve back. Have Windows Server 2008 R2, no backup image, need to remove and decrypt ransomware with extension .combo. Dharma ransomware that appends the .id-C67B68E4 Need my system back. Are you able to sort it out? I attached some sample data file for your ready reference. Can you please check and get back to me with cheapest quotes

    £27 (Avg Bid)
    £27 Avg Bid
    1 bids

    ...below and bid accordingly. This project is to build a micro-site that demonstrates oAuth authentication, user details extraction, and Cookie-sending. It will write customised-access tokens to be used in ModRewrite on an application website. ModRewrite is out of the scope of this project - but is described at [login to view URL]

    £363 (Avg Bid)
    £363 Avg Bid
    22 bids

    Decrypt South African Drivers License Barcode and output data in human readable format. C# Project

    £116 (Avg Bid)
    £116 Avg Bid
    17 bids

    ...security for user data storage. (must comply with EU laws) all data must be made sure it is stored safely and if it is not, then correction to the app where possible is to be rectified to comply. seeking highest level of encryption and security of all data and users logged in must be anonymous traffic which only the server can decrypt and understand.

    £1298 (Avg Bid)
    £1298 Avg Bid
    26 bids

    C# export and import RSA Keys and use the imported ones to encrypt and decrypt

    £10 (Avg Bid)
    £10 Avg Bid
    9 bids

    no backup image, need to remove and decrypt ransomware with extension .combo. Dharma ransomware that appends the .id-.[].combo Need my system back.

    £494 (Avg Bid)
    £494 Avg Bid
    5 bids

    Steps Creating model and database Mapping mysql to Entity framework Creating the UI, Grid showing Customers Add functions (Add/Edit/Delete Customer) Add functions encrypt/decrypt the key Add functions management license (Set active, renew,...) Creating domain webservice for checking, active trial the current license for users (For this I will code

    £653 (Avg Bid)
    £653 Avg Bid
    7 bids

    decrypt something for me in 7 hours

    £3 / hr (Avg Bid)
    £3 / hr Avg Bid
    1 bids

    There is a file in my server which is encrypted using IonCube encryption, is it possible to decrypt this file? if so can you make this?

    £333 (Avg Bid)
    £333 Avg Bid
    9 bids

    As the code is too big, I will post a link where the whole ...M + O + F + B + P + R) redirects me to another website which then checks some parameters and redirects me to 3rd website. This is very beautifully encrypted and I want to decrypt it. Please only reply if you can do it. P.S- If the code is too big, just start from line 997 and move upwards.

    £44 (Avg Bid)
    £44 Avg Bid
    6 bids

    I need a linux kernel module that execute a gpg command to decrypt a file. This cannot be done in userspace app, must be done in a module kernel! This is not optional! I will consider the task finished when you show me that the module decrypts the file using the gpg command! The kernel version is 4.9.x or bigger and the platform is ARM.

    £101 (Avg Bid)
    £101 Avg Bid
    5 bids

    mplement a research paper on video deduplication in cloud [login to view URL] a video is uploaded in the cloud via AWS then it needs to be compressed and encrypte...[login to view URL] that matches then no new copy of the video is to be uploaded and the key of the existing video needs to be [login to view URL] downloading the videos they key is needed to decrypt the videos.

    £331 (Avg Bid)
    £331 Avg Bid
    7 bids

    I have a java player which i used for my android app. i use encrypt decrypt to play the videos. can we play the videos same way in website?

    £86 (Avg Bid)
    £86 Avg Bid
    3 bids

    ...include the first character of the decrypted string in your bid (I know what it is) Here is the first 200 characters of the encrypted string for which I need the method to decrypt: cd0ee7c3fa920f74cbe3104ab02e5bee93a8e960956q+s7fJ608iCrikaMomVyxdPbXA4eYkjTcE0TjrzJ6jIvKsr3iu7WeG9QvnWvsQJ0BnwoDJOoF3GtbFU0qlwTd4/oosqUrXgNw4AYEW/MwJx13DB2wFHAQ5KUNHaJSr

    £33 (Avg Bid)
    £33 Avg Bid
    4 bids

    I have a Exe application for windows to play video lectures. Now i want to give a offline mode for users to save videos in encrypt format. I have the code to encrypt, decrypt in java. need to convert to C# and implement to the applications using any good player to play videos in offline

    £116 (Avg Bid)
    £116 Avg Bid
    9 bids

    I want to encrypt and decrypt Videos,Images,Audio,Pdf etc files. I want to make this type if app! [login to view URL] [login to view URL] [login to view URL] [login to view URL]

    £90 (Avg Bid)
    £90 Avg Bid
    4 bids

    I want to encrypt and decrypt Videos,Images,Audio,Pdf etc files. I want to make this type if app! [login to view URL] [login to view URL] [login to view URL] [login to view URL]

    £76 (Avg Bid)
    £76 Avg Bid
    7 bids

    - Windows Server 2008 R2 - no image backups - need to remove and decrypt ransomware with extension .combo. - Dharma ransomware that appends the .id-.[].combo

    £404 (Avg Bid)
    £404 Avg Bid
    12 bids

    Have Windows Server 2008 R2, no backup image, need to remove and decrypt ransomware with extension .combo. Dharma ransomware that appends the .id-.[].combo Need my system back.

    £353 (Avg Bid)
    £353 Avg Bid
    6 bids

    ...Project Left point earlier SRS 1. Color all table border with black and fill background color table header with light blue 2. Search Students by (id and Name) and fill students data into input boxes (Studentid, Name, Dept, Batch) 3. read Gender ,entry date and Graduation Date from SP Rpt_StudentTranscript 4. Show two button Print Transcript and Check Graduation

    £245 (Avg Bid)
    £245 Avg Bid
    10 bids

    Hey Mr. Zahek Actually I Have Some Captured Session Of Charles Of Some Site . The Session Have All Api and data and it has some &signature = i need to decrypt or to find from what source it is generating . I have the formula of it its almost we have to re url encode it and it is done u need to find it and code it for me in php . Will pay 4000-5000 bucks

    £45 (Avg Bid)
    £45 Avg Bid
    1 bids

    ...packet-based radar which sniffing PUBG game's UDP packets, decrypt them, find the location of players and other infos, show them on browser. It runs externally, sniffer packets only and doesn't modify memory. There are many pubg radar projects on github, but all are outdated since they can't decrypt packets. This project requires knowledge about pubg

    £419 (Avg Bid)
    £419 Avg Bid
    5 bids

    ...selves using their name, email id, password. 2. Logging In: User should be able to login using Email, Password. 3. Homepage: Show following functions. ➢ Encrypt the Key ➢ Decrypt the Key ➢ FAQ ➢ About Us 4. Encrypt the key: ➢ System should be able to verify integrity of key. ➢ System should be able to encrypt using Shor’s algorithm, Lamport signature

    £538 (Avg Bid)
    £538 Avg Bid
    48 bids

    Need to repair/fixed Amnesia ransomware effected/Corrupted zip file, that is the only file i have i did re installed windows just copied the zip file , which cannot extract . and showing 0kb.

    £80 (Avg Bid)
    £80 Avg Bid
    1 bids

    Hi Im looking for a freelancer to build a very simple web app in .NET Flow as below: A) - Creating Record: 1- user inserting URL in box on webpage. 2 - in box below random string of 15 characters with timestamp is generated ( that string is assigned to URL (point 1 ) in SQL Database) 3 - Box with string got copy button so content of the box can be copied easy. B) - Reading Records 1 - User inser...

    £20 (Avg Bid)
    £20 Avg Bid
    6 bids

    This project is for an advanced security application that will allow individuals and large companies the ability to security store data and files without fear of data breach. It does this through three levels of encryption and decryption. The idea is similar to Cryto Stripe; however, this platform would also allow for server storage through FTP. For

    £577 (Avg Bid)
    £577 Avg Bid
    29 bids