Text data decrypt access jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    3,279 text data decrypt access jobs found, pricing in GBP

    ...working a week ago, just need to update offsets and program, but need to decrypt. I have SDK old source, old working esp and aimbot working 1 week ago I have everything needed to build off of, just need update to offsets and a little to source. Have old program. I have decrypt method to get the offsets so this job is very easy, bypass example to work

    £225 / hr (Avg Bid)
    £225 / hr Avg Bid
    1 bids

    ...process, I have program that was working a week ago, just need to update offsets and program, but need to decrypt. I have everything needed to build off of, just need update to offsets and a little to source. Have old program. I have decrypt method to get the offsets so this job is very easy, bypass example to work off of, old source code for ESP

    £182 (Avg Bid)
    £182 Avg Bid
    5 bids

    ...communication. It can be both command line apps. Server app will be running and listening Client will create xml file or xml document and send it to the server (encrypted) Server decrypt the xml document, edit it and send back to the client (encrypted) Server should be able to deal with more clients at one time That is all. Thank you for proposals

    £124 (Avg Bid)
    £124 Avg Bid
    41 bids
    Decrypt streams link Ended
    VERIFIED

    Hi, I want get from directv the links, iam able to get this link but is with token and some other limitation, I need a clean line, I can provide you an account to you can try get other links and clean: [login to view URL],kabc,_fw_ae,,auth,1,_fw_nielsen_app_id,TF98B5EB1-E7FE-51D1-E040-070AAD31558A&ad._v=2&ad.flex=0&ad.access_level=1&ddp=1&v=3&ad.pingf=2&expand=drmOff...

    £132 (Avg Bid)
    £132 Avg Bid
    7 bids
    export data base Ended
    VERIFIED

    i have a Android app which has an encrypted database of phone numbers in it. decrypt and export to excel and you get the money

    £822 (Avg Bid)
    £822 Avg Bid
    46 bids

    Hello DEVs, I need a small, light application that will backup a users data. This application will backup data from a list of up to 10 locations, encrypt / compress then upload to an offsite storage Icloud, Google Drive, Dropbox, etc. on a schedule. Application must be installable on user machine. Please feel free to ask any questions. Application

    £408 (Avg Bid)
    £408 Avg Bid
    13 bids

    ...use, transmitting information as quick as light. We have to show both uses, military one and spacial one. The system is very fast (Light speed), secure and impossible to decrypt, so very useful for military confidential communication, for secret services, governmental agencies. On one side;, we have to show that present confidential communications

    £142 (Avg Bid)
    Guaranteed
    £142 Avg Bid
    9 entries

    ...information with a table, edit, view, delete, this will be for UserSpice 4.3.23 cms ***i want it all to be Using PHP “openssl_encrypt” and “openssl_decrypt” to Encrypt and Decrypt Data*** there will be 3 fields name (textarea) value"onsite" Or value"offsite" (radio) cost (DECIMAL(19,4);) CREATE TABLE materials ( id INT...

    £69 (Avg Bid)
    £69 Avg Bid
    45 bids

    ...Secure messaging program that will register user & hash pwd in sqlite3 db. Users can login, send encrypted msg using refined key, see number of messages, select message, and decrypt using predefined key. Using crypto++ or similar library is req. Program must be run via command line....

    £340 (Avg Bid)
    £340 Avg Bid
    13 bids

    Hello I want to Decode this [login to view URL] If you can decrypt it tell me

    £19 (Avg Bid)
    £19 Avg Bid
    1 bids

    Hello I want to Decode this [login to view URL] If you can decrypt it tell me

    £7 (Avg Bid)
    £7 Avg Bid
    1 bids

    Hello I want to Decode this [login to view URL] [login to view URL] [login to view URL] If you can decrypt it tell me

    £11 (Avg Bid)
    £11 Avg Bid
    1 bids

    ...Win XP also) 3. Features - a. Restrict / allow printing b. Restrict / allow copying data of specified volume c. Restrict / allow adding new data to specified volume d. On-fly Encrypt / decrypt file contents of volume. e. Facility to restrict data access I. Duration based i.e. within specified dates. II. Count based i.e. allow only 'n' times

    £942 (Avg Bid)
    £942 Avg Bid
    5 bids

    Hello- while having a developer clean up my temp drive on my server it stopped the FTP to SQL load process. Today we have a script that uses FTP to FTP, Cleopatra t0 Decrypt and a separate script to load to SQL. None of this happening today because when the bat file tries to run in the morning it errors our immediately. I know this isn't a difficult

    £110 (Avg Bid)
    £110 Avg Bid
    3 bids

    i have a file in format of msg.db.crypt12.

    £763 (Avg Bid)
    £763 Avg Bid
    2 bids

    Vpn Pc app Recode change payload encryption make own encrypt decrypt app for payload and json file

    £158 (Avg Bid)
    £158 Avg Bid
    2 bids

    ...rsa function for decrypt this boxkey and rsakey (encrypted previosly with my privates keys N, D). This keys must be decrypt in memory with my public key (N) and public exponent (11) and the result must be saved in the boxkey and rsakey for its normal treatment. boxkey and rsakey is value encrypted with rsa1024 i need only decrypt with public exponent

    £95 (Avg Bid)
    £95 Avg Bid
    3 bids

    ...D and N (this process i make in Windows PC with special tool) So i want implemented in oscam source rsa function for decrypt this boxkey and rsakey (encrypted previosly with my privates keys N, D). This keys must be decrypt in memory with my public key (N) and public exponent (11) and the result must be saved in the boxkey and rsakey for its normal

    £139 (Avg Bid)
    £139 Avg Bid
    3 bids

    I need a perl program that can encryp and decrypt text. An example of encryption is that "a" becomes "z", and "b" becomes "y" and so on, or whatever shifting algorithm you can devise. The input file is any readable text file that is to be encrypted. When this input file is run against the encryption program, it encrypts the file with y...

    £30 (Avg Bid)
    £30 Avg Bid
    3 bids

    helllo looking for someone who can convet JAVA code (10 lines) to php the code decrypt a a string into json object

    £16 (Avg Bid)
    £16 Avg Bid
    32 bids

    Need custom bootloader for SAMD21G18 to load firmware updates from SD card and decrypt. Also need matching pc app to encrypt updates before distribution. Basically need to combine the SD SPI bootloader from this project: [login to view URL] combined with the security features from this project:

    £1149 (Avg Bid)
    £1149 Avg Bid
    24 bids

    ...Support about your username account, you should use the instagram App , When you want to contact technical support, your user name must be associated with your device. I want to decrypt this code by creating an application that can associate any username I want to contact technical support , I need make the app can i Contacting with Instagram Support about

    £410 (Avg Bid)
    £410 Avg Bid
    29 bids

    I n...Manage Switch (TAP(Test Access Point) or SPAN (Switch Port Analyzer Port) 2. Search Engine Index Those unstructured Network Messages, Filter, Decrypt based on those Macing Messages 3. Breakdown & Parsing those Network Messages from Physical Layer,  Socket Layer & Data Layer which XML,  SOAP, HTML, Native Mode and ISO8583 into Data Structures

    £1937 (Avg Bid)
    £1937 Avg Bid
    12 bids

    I have a video file encrypted using [login to view URL] with the method SAMPLE-AES. Here is the info #EXT-X-SESSION-KEY:METHOD=SAMPLE-AES,URI="skd://4caba1e9-ff99-41c0-9d3a-b741d0a67ba5",KEYFORMAT="[login to view URL]",KEYFORMATVERSIONS="1" Please bid only if you can perform the task. If you get awarded and complete the task you will also get to work on my other pr...

    £145 (Avg Bid)
    £145 Avg Bid
    2 bids

    1. Secure data and encrypt using private keys as Read only, no delete, update or edit. 2. Source of origin, Date&Time stamp. 3. decrypt data with using the specific keys, add user.

    £592 (Avg Bid)
    £592 Avg Bid
    7 bids

    Hi, this is a simple socket programming project. We already have the connection and everything set up, ...socket programming project. We already have the connection and everything set up, you just have to help us send a HMAC to the server, the server would decrypt it if it is correct or else it would reject it. Text me up, if you wanna talk in detail!

    £26 (Avg Bid)
    £26 Avg Bid
    7 bids

    We have a -JTL*shop*system and wanna move to WooCommerce shop system. ...existing customers can log in as usual in their account. But the problem is: J T L encrypt the data for field "password" with a blowfishkey. your Job is: decrypt the customer data (password) with from us provided blowfishkey and send us all data as a csv file or sql-file.

    £145 (Avg Bid)
    £145 Avg Bid
    16 bids

    ...of experience required. We required a android studio team whoes have knowldege of Apli management , Api master, guarrented App & web security and experienced in data management. data is immediately show on front end from We need 24/7 hours support service for problem solving & required change immediately. individual allowancement for web designer

    £8609 (Avg Bid)
    £8609 Avg Bid
    19 bids

    ...Requirements: 1. GOOD C# KNOWLEDGE 2. GREAT ENGLISH SKILLS PROJECT INFO: 1. ACCOUNT CHECKER 2. IMPORT COMBO 3. IMPORT PROXIES 4. BE ABLE TO CONVERT BYTE TO BINARY AND DECRYPT THE RESPONSE 5. CAPTURE INFORMATION. I will provide you with a .saz file from a fiddler captured request so you can have some understanding of the project. You must

    £189 (Avg Bid)
    £189 Avg Bid
    20 bids

    Don't show me other apps in cover letter. I need to list all installed apps on iPhone. You should very familiar with encrypt/decrypt process regarding the image file. I will share more details via private interview.

    £181 (Avg Bid)
    £181 Avg Bid
    22 bids
    Web server Ended
    VERIFIED

    ...user identifies it; the public key plays the role of the user's address. Each message is encrypted with the public key (address) of the addressee, so only the addressee can decrypt it. The mini-server can receive messages in two ways: -either directly from a customer, -by synchronizing with a peer, that is, another instance of the same server of

    £13 / hr (Avg Bid)
    £13 / hr Avg Bid
    13 bids

    This is a java project and Task is: As an Admin, i want to track which user has read my .txt encrypted file which i will encrypt and share to users to decrypt and read. Each user will declare that they have read that file. I want to be able to know with certainly which user has read the file and which have not read the file.

    £108 (Avg Bid)
    £108 Avg Bid
    25 bids

    Criar em G...criptográfica GPG da seguinte forma: func GPG_Generate_Keys() { ... return PrivateKey and PublicKey } func encrypt(text, PublicKey) { ... return encryptedcontent } func decrypt(encryptedcontent, PrivateKey) { ... return text } é um app com versão de código fonte em GoLang e em Javascript, com as mesmas funç...

    £335 (Avg Bid)
    £335 Avg Bid
    2 bids

    i looking for wireshark expert for teach me how decrypt ssl traffic

    £131 (Avg Bid)
    £131 Avg Bid
    7 bids

    i want a java prog...java program to hide text in an image using LSB and decrypt the text using MD5 the program WITHOUT interface the program works as follows: encrypt function takes a string and encrypted using MD5 and hiding it in an image. decrypt function takes an image and return the hidden text that decrypted using MD5 and decrypt it.

    £16 (Avg Bid)
    £16 Avg Bid
    5 bids

    anyone can encryp my auto script file or selling encryp decrypt file for my auto script

    £15 (Avg Bid)
    £15 Avg Bid
    3 bids

    ...entire project : As a developer in a company specialized in cyber security solutions development, you were assigned a task to develop a java application for the purpose of data encryption, decryption, secure key exchange, and digital signature. You are required to develop an application that satisfies the following security standards: 1) The

    £143 (Avg Bid)
    £143 Avg Bid
    20 bids

    I have 10 cipher text that I think are encrypted with AES CGM (check attachment) I know that the symmetric key is IvKVlyODk8I4VPhWosQtLw== I know the nonce and authentication tag is included in the cipher text, I'm guessing first 12 bytes are nonce (you can see a pattern of repetition) and last 16 bytes are tags because the total payload increased

    £453 (Avg Bid)
    £453 Avg Bid
    9 bids

    I have 10 cipher text that are encrypted with AES CTR I know that the symmetric key is IvKVlyODk8I4VPhWosQtLw== I know the IV/Nounce is included in the chipher I want you to show me how I can decrypt the data. To know that you have successfully decrypted the data, some cipher text should contain "Game" when decryted, though most part of the

    £411 (Avg Bid)
    £411 Avg Bid
    12 bids

    I have 10 cipher text that are encrypted with AES I know that the symmetric key is IvKVlyODk8I4VPhWosQtLw== I need a professional to find out what kind of aes counter mode is being used to encrypt the data, and the data must contain some kind of nonce/IV or something since the first few bytes are all the same. Also the cipher blocks are all in

    £115 (Avg Bid)
    £115 Avg Bid
    7 bids

    The project is: Encrypt and decrypt using Java or C ++ programming languages important note : I do not want to write the code, There are online codes you should look for For more details, I will attach the file

    £106 (Avg Bid)
    £106 Avg Bid
    5 bids

    As a developer in a company specialized in cyber security solutions development, you were assigned a task to develop a C++ application for the purpose of data encryption, decryption, secure key exchange, and digital signature. You are required to develop an application that satisfies the following security standards: 1) The application

    £91 (Avg Bid)
    £91 Avg Bid
    6 bids

    As a developer in a company specialized in cyber security solutions development, you were assigned a task to develop a C++ for the purpose of data encryption, decryption, secure key exchange, and digital signature. You are required to develop an application that satisfies the following security standards: 1) The application should make use

    £28 / hr (Avg Bid)
    £28 / hr Avg Bid
    12 bids

    ...attached "[unlocksupp@[login to view URL] or BM-2cTVHx6b7RYhJ9gGKZn6yTuBpBBq3LHRkz@[login to view URL]][login to view URL]" It happened in Feb 2018 and been looking for a solution to decrypt the files. What I have done is kept the files as is on a secondary HDD in case a decrypter was created for it. I repartitioned and formatted primary HDD to rid of the ransomware

    £79 (Avg Bid)
    £79 Avg Bid
    3 bids

    To protect mp3 file in ionic 3 going to encrypt file. If you are familiar with ionic and encrypt and decrypt please bid me. Also I have to play this mp3 file in my ionic 3 app. Thanks for your bid.

    £126 (Avg Bid)
    £126 Avg Bid
    8 bids

    I need you to develop some software for me. I would like this software to be developed for Windows . I need some one to decide a way to disable the encryption of DRM-X and thus deactivate the encryption it applies to mp4 files , we should be able to play mp4 files without encryption based on licence generated by a username and password for that particular file, we also need to untie the safety mec...

    £1124 - £2248
    £1124 - £2248
    0 bids

    Need an application developed in c# , where i can hide any file into a video/audio file without size restriction. Avi or mp4 for video is fine. select file to hid...c# , where i can hide any file into a video/audio file without size restriction. Avi or mp4 for video is fine. select file to hide: select carrier file: set password to decrypt: ok.

    £322 (Avg Bid)
    £322 Avg Bid
    9 bids

    ...intercepting the existing software of energy meter and connecting it to a device which starts transmitting the data. rs485 to usb converter cable + if we can connect OLD SMARTPHONE 2G sim to L&T meter, and write a code to decrypt the data + send it to a server. FYI- I DONT HAVE CURRENT SOFTWARE OF METER AS ITS LICENSED BY MANUFACTURER AND EXPENSIVE

    £418 (Avg Bid)
    £418 Avg Bid
    10 bids

    Are you able to help me with a little project. What I am after is a python script that enable multiple users to encrypt and decrypt a file with a password. The password must be entered by the user via command line (not stored in the script). The encryption hash used must be SHA256. The script must have the ability to list multiple files in the index

    £17 (Avg Bid)
    £17 Avg Bid
    4 bids