A general social networking site/ web app with the following main 3-4 elements/ USPs of the project Main Features Connect - Both social & professional networking Sharing your experiences - Sharing your experiences through networking, more so a kind of story or informal blog letting others learn from your experiences Interests - Joining people through
Assimilator will be a Mac based version of an IOS app called Transformer currently on the App Store. Transformer is a password generator that uses a simplified password such as Wells Fargo Bank and converts that into a complex text string through the use of a private encryption key, and it is this encrypted password that you use to log in to a web-site
We have aes encrypted videos. A local server needs to be built with decrypts this video file and publishes the same.
searching a proper solution to get voice/voip to eg ejabber contacts on our xmpp server. Server is up and running under tor..
Hello, I had a ransomware hit my server 4 days ago, and I need an expert to help me de-crypt some encrypted files Please apply only if you can solve a ransomware security problem before I have a sample that I can send to check if you can de-crypt we can work together Thank you
...events 9. Please add as much detailed comments as possible so we can edit the code in the future. ---What we are looking for--- 1. Provided version with uncrypted and encrypted with key. 2. We want full shared rights of the script(s), once completed we will keep full rights and resale rights without royalty/fees. We are looking for someone who
If you are a REAL, experienced & qualified SQL, PHP, HTML specialist, this job should not take longer than 2 days to code, and 5 days in total to verify security with MySQL interactions. NO WORDPRESS PLUGINS CHANCERS - NO MARKETERS USING THIRD PART EMBEDED PLUGINS - NO TIME WASTERS TRYING THEIR LUCK - ONLY REAL HONEST AND EXPERIENCED DEVELOPER NEEDED FOR THIS SIMPLE JOB.
The project is: "Two entities, namely A and B, are communicating over a network (will be modified later to be a TOR network). A has an encrypted strings of data and send them to B. B has another encrypted string of data (same encryption technique with the same key) and searches for its strings over A's strings to find all the matching strings" The cryptotoolkit
...Server which is in my office. The harddisc of the Server is crypted. I have to enter a password each time i restart the server. I want to have a backup of this server hdd (encrypted) so i can clone this office server to a cloud server. you job is to create the backup and hand me out. also i want to know how exactly you create the backup (linux shell
My server got infected with Ransomware. Attached are 4 sample files. If you can decrypt then I will give you access to my pc to fix the rest. Attached files inc...files. If you can decrypt then I will give you access to my pc to fix the rest. Attached files include. 1) HTML message form the hacker 2) Good original file 3) 2 encrypted files.
I need an app developed to make secure encrypted calls. (something like cellcrypt) All the functionalities can be pretty basic as long as the encryption is strong. The user base is also very small (3 - 4 users for this private app). Nothing too over complicated just the basic app which is able to make encrypted calls to 3 or 4 users which use the
An XMPP Android application has encryption function in the so...application has encryption function in the source disabled by default. 1. Add a menu option to the contacts list titled 'Encrypted Chat' which starts an encrypted chat with the selected contact. 2. Fix an issue in the app which displays non-matching encryption keys after reinstall.
An XMPP Android application has encryption function in the source but this is disabled by de...source but this is disabled by default. 1. Add a menu option to the contacts list titled 'Encrypted Chat' which starts an encrypted chat with the selected contact. 2. Fix an issue which displays non-matching encryption keys after reinstall of the app.