Фільтрувати

Мої недавні пошуки
Фільтрувати по:
Бюджет
до
до
до
Тип
Навички
Мови
    Статус роботи
    2,000 executable encryption робіт знайдено, ціни вказані в USD

    ...target device - Keylogging - Screen recording - Call recordings - Listening to live microphone feed The ideal developer for this project should have experience in creating similar monitoring applications and a solid understanding of iOS security and privacy standards. In terms of data privacy and security, I want to ensure that the application follows best practices. This includes: - Data encryption - Secure server communication Additionally, I would like the user interface to be customizable to a basic extent. Simple modifications like changing colors and logos should be possible. This project involves creating an application that needs to be both highly functional and completely discreet. If you have experience in this area and are confident in delivering a reliable, secu...

    $1406 (Avg Bid)
    $1406 Сер. заявка
    28 заявки
    Excel XLSM Password Recovery 6 дні(-в) left
    ПІДТВЕРДЖЕНО

    I need a professional who can help me recover a password for an Excel XLSM file. Key Requirements: - Recover a lost password for an Excel XLSM file - Ensure the process is secure and compliant with standard security practices - Maintain the integrity and functionality of the document post-password removal Ideal Skills: - Proficient in pass...who can help me recover a password for an Excel XLSM file. Key Requirements: - Recover a lost password for an Excel XLSM file - Ensure the process is secure and compliant with standard security practices - Maintain the integrity and functionality of the document post-password removal Ideal Skills: - Proficient in password recovery methods for Microsoft Excel - Experience in data security and encryption - Strong knowledge of Excel XLSM file...

    $16 (Avg Bid)
    $16 Сер. заявка
    15 заявки

    As the owner of an advanced security level website, I am seeking professional hacking services to conduct thorough penetration testing. The key focus areas would be: - User Authentication Process: Probe for any weak links in our login and authentication systems. - Data Encryption: Assess the robustness of our data encryption protocols. - Server Security: Evaluate potential weaknesses in our server security. Ideal applicants would have significant experience with Python-based hacking tools and a proven track record in cybersecurity. Knowledge of advanced security measures and the ability to recommend improvements after testing is highly desirable. Please provide evidence of your skills and previous work in your application. Make sure your proposals are competitive yet fair.

    $619 (Avg Bid)
    $619 Сер. заявка
    4 заявки
    Responsive Moving Company Website Development 6 дні(-в) left
    ПІДТВЕРДЖЕНО

    ...calculator that accounts for distance-based and volume-based pricing. The calculator should be intuitive and easy for users to interact with. - Booking and Contact Forms: We need easy-to-use forms for customers to book our services and get in touch with us. - Security Features: Security is a top priority. The website should include SSL encryption, user authentication, firewall, anti-malware protection, two-factor authentication, security updates, CAPTCHA, and data encryption. The ideal candidate should be proficient in web development, with a strong background in creating responsive, user-friendly sites with similar booking and pricing functionalities. Experience with SEO optimization is a plus. Strong attention to detail, communication skills, and the ability to deliver ...

    $501 (Avg Bid)
    $501 Сер. заявка
    196 заявки

    ...designed with a user-friendly interface and responsive design. Key requirements: - E-commerce functionality: The website should be able to handle a large number of products and orders. - Payment gateway integration: I'll need assistance in integrating a specific gateway, and open to suggestions based on your expertise. - Security: The website must be secure with proper SSL certification and encryption. - SEO-friendly: The website should be designed with SEO in mind, to ensure it's optimized for search engines. Skills and experience needed: - Proficiency in web development, especially with e-commerce sites. - Experience with integrating payment gateways. - Strong understanding of security protocols and SSL certification. - Familiarity with SEO best practices. Ple...

    $115 (Avg Bid)
    $115 Сер. заявка
    60 заявки
    Fiscal Printer SSL Certificate Integration 6 дні(-в) left
    ПІДТВЕРДЖЕНО

    I'm seeking an SSL certificate expert to help integrate the SSL certificate within an inventory management software, which interacts with a fiscal printer. Key Respons...certificates, and experience in integrating them within software systems. - Software Integration: Experience with integrating software with hardware, especially printers, is crucial. - Inventory Management: Familiarity with inventory management systems, particularly with software that interacts with fiscal printers, will be a great advantage. - Security: A good understanding of network security, encryption protocols and best practices in ensuring secure communication between software and hardware is also essential. I look forward to receiving proposals from freelancers with a solid understanding of the abov...

    $499 (Avg Bid)
    $499 Сер. заявка
    97 заявки

    I'm in search for an experienced Java programmer with a clear understanding of the .mp4 standard to build a code that encapsulates a data stream in a previously recorded video. Specific knowledge of Ffmpeg is needed. The task at hand mainly revolves around end-processing, as the text file needs to be submerged after the final video compression. The text file will be in the .srt format, and no encryption or compression will be required for this item. Ideal candidate should be familiar with handling these types of video data stream manipulations.

    $147 (Avg Bid)
    $147 Сер. заявка
    15 заявки
    Email Service Provider Software Development 6 дні(-в) left
    ПІДТВЕРДЖЕНО

    ...protocol for our own domain. Key Features: - Secure encryption: The software should offer robust encryption to ensure user data and communications are secure. - Spam filtering: A strong spam filtering system is a must to maintain a clean and secure email environment. - Custom domain support: The software needs to allow users to use their own domain for personalization. User Capacity: - The software is expected to support a user base ranging from 1000 to 10,000 users. Interface Preference: - The email service should have a web-based interface for user convenience. Skills and Experience: - Proven track record in developing similar email service provider software - Strong knowledge of SMTP protocol - Experience in implementing secure encryption and spam filtering ...

    $319 (Avg Bid)
    $319 Сер. заявка
    18 заявки
    Python Script Compilation and GUI Creation 5 дні(-в) left
    ПІДТВЕРДЖЕНО

    I have a Python script that I would like to turn into an executable file for Windows. This script needs to be reviewed and compiled so it can run efficiently. Additionally, the current tables in the script need to be fixed. The project also involves creating a GUI with multiple buttons for different actions. The ideal freelancer for this project should have: - Experience in Python scripting and GUI creation - Knowledge of compiling scripts into executable files for Windows - Strong attention to detail to identify and fix issues in the existing tables Please note that the GUI should be user-friendly and intuitive. Also, the compiled executable file should be able to run on a computer without the need for Python or any additional dependencies. Before you bid: Ans...

    $27 (Avg Bid)
    $27 Сер. заявка
    20 заявки
    Linux SwanVPN Server Setup 5 дні(-в) left

    I'm in need of an experien...The server is running on Linux, hence a proficient understanding of this operating system is crucial. - The creation of this VPN server is from scratch, so a deep understanding of VPN server setup is required. - The VPN server's primary objective is securing data transfer, so a focus on encryption and robust security measures is essential. Ideal Candidate: - Extensive experience with Linux system administration. - Proven track record in setting up VPN servers. - Familiarity with data security and encryption protocols. - Strong understanding of networking principles. - Good communication skills to ensure a smooth setup process. This project requires someone who is meticulous, well-versed in Linux systems, and has a knack for implementin...

    $149 (Avg Bid)
    $149 Сер. заявка
    17 заявки

    ******************************************************************* Send me a message proving to me that you have read the project. ******************************************************************* If you are familiar with AWS programming, this should be a ...-started Requirements: • I will create a new AWS free account and will supply credentials. • In my AWS account, configure any IAM role/policy/user/credentials needed to run the example program. • Change the example program to accept credentials (accessKey/secretKey) as arguments passed to the executable. • Ensure that the corrected code successfully converts the speech in the audio file to text using the AWS Transcribe service. Deliverables: • All source code • Instructions on executing exe...

    $201 (Avg Bid)
    $201 Сер. заявка
    15 заявки

    Skills required Front-end: React or Angular for building a dynamic web application. Back-end: Node.js with Express for server management and API integration. Database: MongoDB or PostgreSQL for storing session data securely. Authentication: OAuth for handling secure authentication with streaming services. Technical Requirements and Development 1. Secure Auth...manage devices that can stream content, ensuring only authorized users can access the services during their stay. 3. Session Management: Ensure that user sessions are automatically ended upon checkout, or provide a simple way for users to log out when they are done watching. 4. Privacy and Security: Since the app will handle sensitive login information, ensure that the data is protected through encryption and secure network ...

    $780 (Avg Bid)
    $780 Сер. заявка
    61 заявки

    I'm looking for a skilled develop...windows. Ideal Skills and Experience: - Proficiency in C: Extensive experience with C language is a must. - DTLS Knowledge: Prior experience implementing DTLS is highly preferred. - Security Background: Strong understanding of encryption protocols and data integrity is necessary. - Time Management: Ability to work under strict deadlines and deliver high-quality results promptly. Required Skills: Proficiency in C programming language Experience with UDP socket programming Knowledge of DTLS (Datagram Transport Layer Security) protocol Ability to implement encryption and decryption mechanisms Familiarity with video streaming or live feed protocols and techniques" Please include examples of similar projects you have successfully ...

    $493 (Avg Bid)
    $493 Сер. заявка
    9 заявки
    Get Example AWS Transcribe code running 5 дні(-в) left
    ПІДТВЕРДЖЕНО

    If you are familiar with AWS programming, this should be a simple task for you. I have included an example C# solution using AWS Transcribe that I need to be working. Example Program: AWS ...-started Requirements: • I will create a new AWS free account and will supply credentials. • In my AWS account, configure any IAM role/policy/user/credentials needed to run the example program. • Change the example program to accept credentials (accessKey/secretKey) as arguments passed to the executable. • Ensure that the corrected code successfully converts the speech in the audio file to text using the AWS Transcribe service. Deliverables: • All source code • Instructions on executing executable with actual credentials

    $39 (Avg Bid)
    $39 Сер. заявка
    7 заявки

    ATTENTION: This is not a project to create a 3D model. It's to create a sample mobile app in Flutter. I need a 3D object renderer programmed in Flutter for PLY files. The intended purpose is visualization rather than animation or virtual reality. The selected candidate should possess: - A strong knowledge of Flutter and 3D rendering techniques. - Previous experien...in creating high-quality renderers, as this project demands a high-performance level. The renderer should include the following functionalities: - The ability to rotate objects. - Zoom in and out capabilities. As an expert in this field, you're expected to provide advice on the best techniques and practices to achieve a high-quality 3D object visualization. The Flutter project need to be executable on b...

    $147 (Avg Bid)
    $147 Сер. заявка
    25 заявки
    Linux Server & SMTP Security Expert 4 дні(-в) left
    ПІДТВЕРДЖЕНО

    I'm looking for a skilled professional who can help me secure my Linux server and SMTP setup. Key Requirements: - Deep experience with Linux server security measures and best practices. - Proficient in securing SMTP servers and ensuring authentication is managed effectively. - Capability to implement SSL/TLS encryption for enhanced security. Your application should focus on detailing your experience in this field. Please provide relevant examples of previous projects where you've successfully secured similar systems.

    $16 / hr (Avg Bid)
    $16 / hr Сер. заявка
    23 заявки

    I'm in need of a profici...developer who can help compile a Python code, that I have acquired from GitHub, into an executable format for Windows. As the client, I expect: - Understanding the existing Python code and its dependencies - Transforming the Python code into a Windows executable file Successful freelancers should provide a detailed project proposal illustrating how they plan to compile the code to exe on a Windows operating system. Though no specific Python libraries or frameworks were mentioned, a background in Python coding and debugging is paramount. The ideal freelancer should have a deep understanding of Python code, dependencies, and experience dealing with code from GitHub. Experience in generating Windows executable files from Python code wil...

    $28 (Avg Bid)
    $28 Сер. заявка
    23 заявки

    ...Java Full Stack Developer to build a comprehensive application with the following features and requirements: - **Features and Functionalities** I need the application to have the following features: - User registration and login: A secure and user-friendly way for users to create accounts and log in. - Payment processing: A seamless payment processing system. - Data encryption: Robust data encryption measures to ensure user data is safe and secure. - **Design and UI/UX Requirements** I'm looking for a modern and clean design that is responsive and mobile-friendly. The interface should be intuitive and user-friendly, making it easy for users to navigate and interact with the application. - **Integration and Third-Party Services** I'd like to inco...

    $12 / hr (Avg Bid)
    $12 / hr Сер. заявка
    41 заявки
    React Native Attendance Tracking App 4 дні(-в) left
    ПІДТВЕРДЖЕНО

    I am in need of a React Native developer to create a digital HR face recognition app for attendance marking. Key Requirements: - The app should be compatible with Android devices. It will not be deployed to iOS. - The facial recognition data should be secured with standard encryption. - No integration with existing HR software is needed. The ideal candidate should have experience with: - React Native and building mobile apps. - Implementing facial recognition technology. - Ensuring data security through encryption. I am open to suggestions and ideas on how to enhance the app's performance and usability. Looking forward to your proposals.

    $171 (Avg Bid)
    $171 Сер. заявка
    28 заявки
    StrongSwan Tunnel Error Resolution 3 дні(-в) left
    ПІДТВЕРДЖЕНО

    I'm facing an issue with my StrongSwan tunnel. I would appreciate a talented freelancer to assist in troubleshooting ...Additionally, I'm getting 'No matching CHILD_SA config found for IP/IP. received DELETE for IKE_SA' on the responder side Your Role: - The primary task is to address and rectify the issues causing the tunnel failure - As of now, the problem seems to be primarily on the responder side Ideal Skills for the Job: - Proficient in StrongSwan VPN - Strong troubleshooting skills - Experienced in resolving encryption-related issues - Familiar with debugging and resolving tunnel failures I'm using a Pre-shared key for authentication. Prior experience with StrongSwan tunnel configuration would be a plus. The tunnel is up and ping ok but a moment ...

    $142 (Avg Bid)
    $142 Сер. заявка
    16 заявки

    ...established conventions. - **Data Types**: Verify that the data types are correctly assigned and appropriate for each field. - **Indexing**: Check if indexes are set up and utilized effectively. Security Measures and CIS Benchmark Review: - **Authentication and Access Control**: Validate that the authentication mechanisms and access controls are properly implemented. - **Encryption and Data Protection**: Review the existing encryption measures and data protection strategies. - **Auditing and Logging**: Ensure that all actions are being adequately logged and audited. Specific Goals for the Review: - **Enhance Security**: Suggest enhancements to the current security measures. - **Optimize Data Storage**: Identify areas where data storage can be optimized without compromisi...

    $13 / hr (Avg Bid)
    $13 / hr Сер. заявка
    12 заявки
    Node.js NFC NTAG 424 DNA Tag Encoder 3 дні(-в) left
    ПІДТВЕРДЖЕНО

    I would need a script written in nodejs where a USB NFC reader (specifically the ACR122U or the ACR125U) wait for a NTAG424 DNA tag. Once an NFC tag is tapped write a URL data into the tag as well as encryption keys. Make sure the URL contains query parameters which are mirrored uid, counter, and cmac that are all encrypted. Part of this is to write a nodejs script to validate the above parameters from the URL and decrypt the uid/counter (or some Rust that can do the same)

    $188 (Avg Bid)
    $188 Сер. заявка
    20 заявки

    I need a skilled C# Winform .NET developer to protect my application using obfuscation techniques. The goal is to prevent reverse engineering and ensure the highest level of security. Key Requirements: - Implement Basic name mangling, Control flow obfuscation, and String encryption for the application. Ideal Skills and Experience: - Strong proficiency in C# and .NET framework - Prior experience with implementing obfuscation techniques - Knowledge of application security best practices This project is a great opportunity for a developer with a keen interest in application protection.

    $152 (Avg Bid)
    $152 Сер. заявка
    28 заявки

    I am seeking an exceptional AI developer to cr... the AI system should be capable of calculations and analysis for private search purposes. - Incorporating specific AI functionalities: The private AI system should have a thorough understanding of natural language processing, image recognition, and predictive analytics. - Developing private search capability: I want the AI system to perform encrypted and anonymous search. End-to-end encryption should be ensured while performing any search and there should not be any user identifiers during searches. - Firewall configuration: The firewall configuration should only block incoming connections to maximize security. Special consideration will be given to applicants who have previous experience in AI security and firewall de...

    $789 (Avg Bid)
    $789 Сер. заявка
    29 заявки

    I'm loo...download. - Installation: The installation could be a mix of fixed and remote installations, so you must have experience with both. Additionally, the system requires security features like encryption of sensitive data, secure remote access, and user authentication. Ideal Skills: - Prior experience in programming POS systems - Proficient in customizing user interfaces - Strong background in real-time inventory management - Knowledge of OS download for Ingenico iwl250 GPRS - Proven experience in installing POS systems remotely and on fixed locations - Expertise in implementing security features like encryption, secure remote access, and user authentication. If you have previous experience in similar projects and possess the skill set mentioned above, I�...

    $36 / hr (Avg Bid)
    $36 / hr Сер. заявка
    9 заявки

    I'm looking for a developer to create a VPN application that will run on both IOS and Android. This application should support both SoftEther VPN Protocol and OpenVPN. Key features to be included: -Protocols: Support both SoftEther VPN Protocol and OpenVPN. - Data encryption: An essential feature for securing users' data - Kill switch: A crucial function that ensures users' internet traffic is cut off should the VPN connection fail - Multi-location support: The VPN should offer various server locations for users to connect to securely The ideal candidate should have experience in developing applications for both IOS and Android, as well as prior experience in VPN development. A strong understanding of network security concepts and protocols is a must. The ability to...

    $341 (Avg Bid)
    $341 Сер. заявка
    17 заявки

    We are seeking a professional and experienced development team to build a comprehensive online marketplace for collectibles. The platform will include both web and mobile applications, providing users with the ability to buy, sell, trade, showcase their collections, and interact with other collectors. The project encompasses advanced features such as...optimization for better search engine visibility Mobile App Development: Development of native iOS and Android apps with all web platform features Seamless integration with the web platform to ensure a consistent user experience Push notifications for real-time updates, messages, and alerts User-friendly interface optimized for mobile devices Security Measures: Secure user authentication and data encryption Regular security audits a...

    $20 / hr (Avg Bid)
    $20 / hr Сер. заявка
    25 заявки
    The network architecture diagram flowchart 2 дні(-в) left
    ПІДТВЕРДЖЕНО

    ...zones or subnets to isolate zones which handle client data 3) A specific "allow" list of clients that may connect to subnets hosting customer data (host to host ACLs) 4) restrict network interfaces on servers or workstations (Which process client data) from being connecting to more than one network at any time 5) encryption as well as data minimization when transferring data between tiers Key Requirements: - Incorporate security measures such as Firewalls, IDS/IPS, WAF, and encryption standards. The network diagram should be designed to prevent and detect potential security breaches effectively. - Implement user access controls, allowing different levels of access. User access should be defined based on endpoints, ensuring that only authorized users can access ...

    $143 (Avg Bid)
    $143 Сер. заявка
    22 заявки
    Site-to-Site VPN Setup with AES Encryption 2 дні(-в) left
    ПІДТВЕРДЖЕНО

    I'm seeking expert to assist in configuring a Site-to-Site VPN on my Zyxel USG Flex 50, ensuring secure and reliable communication between our networks. Key Tasks: - connect to a already existing site - configure usg flex to not use dhcp and other option. just need vpn. i have a box behind Ideal Skills and Experience: - Proficient with Zyxel USG series - experience in VPN connection

    $161 (Avg Bid)
    $161 Сер. заявка
    11 заявки
    International Banking Cybersecurity Expert Needed -- 3 2 дні(-в) left
    ПІДТВЕРДЖЕНО

    ...on our online banking platform and payment gateways, ensuring that these areas are secure from potential cyber threats and vulnerabilities. We want you to prioritize three key security aspects: network security, data encryption, and user authentication. Your expertise should include: - In-depth knowledge of international banking and financial systems and transactions - Proven experience in cybersecurity assessment, penetration testing, and fraud detection - Specialization in online banking platforms and payment gateways - Strong understanding of network security, data encryption, and user authentication - Excellent communication skills and ability to report findings in a clear and concise manner - Up-to-date on the latest cybersecurity trends and threats in the financia...

    $56516 (Avg Bid)
    $56516 Сер. заявка
    12 заявки

    ...online credit card initial deposits at time of scheduling and final payments featuring Vaulting to retain credit card details for future or ongoing appointments. A feature automation to fwd notifications client of booked appointment / via text / emails Pls review the attached samples. - User authentication: This should ensure that only authorized users can have access to information. - Data encryption: This will provide necessary security to protect sensitive data such as confidential business information and customer details. - Scheduling: The scheduling feature should be calendar-based, allowing users to easily follow-up appointments or tasks. - Credit card payments: The API should be able to handle secure credit card transactions without issues. similar to the attached I...

    $523 (Avg Bid)
    $523 Сер. заявка
    78 заявки
    Linux Server Maintenance 2 дні(-в) left
    ПІДТВЕРДЖЕНО

    Hello^^^^. I'm using Amazon AWS and would like to request server maintenance. First of all, I would like to ask you to do as much as possible for server security and privacy, such as SSL installation, automatic backup once a day, DDOS attack prevention, system performance optimization, hacking prevention, encryption between data transmissions, real-time monitoring, data recovery, backdoor checking, backdoor checking and deletion of compromised files, attack root identification and blocking, suspicious process occupation identification and recovery, server hacking analysis, server access history tracking, password recovery and complexity setting, virus and malicious software checking,,data leakage prevention.....etc My current monthly budget is about $50, Please send me a prop...

    $129 (Avg Bid)
    $129 Сер. заявка
    28 заявки
    Windows Application Migration Specialist Needed 2 дні(-в) left
    ПІДТВЕРДЖЕНО

    ...highly skilled professional to help me reinstall the system from the copy to the Window Server 2016 environment. The job involves the following steps: 1) Change the OS from Linex to Windows Server 2016 or Higher Use the copies of the site and desktop (will be uploaded when you accept the job) 2) Download Windows Server 2016 II, Office 2019, , .NET Framework 4.7 or 4.8, Visual FoxPro 9 Executable. And it should be Configured to the present environment. 3) The on-line application should be connected to the desktop version and tested. 4) Chemplan and all its functionality should be tested and should be working. The output function of chemplan including view, to PDF and printer should all be working. 5) 40% of the payment will be kept for two weeks after project delivery to be sure ...

    $55 (Avg Bid)
    $55 Сер. заявка
    17 заявки
    Android App Developer Needed for Cyber Security Project 1 день left
    ПІДТВЕРДЖЕНО

    I am in search of a skilled mobile app developer who can assist me in creating an Android app with a primary focus on cyber security. The app is gearing tow...customers from online frauds. Key Responsibilities: - Develop an Android application from scratch - Implement cyber security features that will shield users from online frauds - Ensure the app is user-friendly and has an intuitive design I'm looking for a developer with: - Proven experience in Android app development - A strong understanding of cyber security principles - Ability to implement encryption and other security features - Knowledge of Android development best practices - Good communication skills to understand the project requirements and deliver the expected results. If you are located around my area, it w...

    $353 (Avg Bid)
    $353 Сер. заявка
    19 заявки

    ...files with an attached encrypted key. These files can be securely sent to another user who can download and decrypt the file using the same application. The app will integrate with our existing Shopify website for seamless user experience and functionality. Consultation Scope: - Secure File Upload: Enabling users to upload audio files with embedded encrypted keys. - Encryption & Decryption: Implementing robust encryption methods to ensure the secure attachment of keys to audio files. - File Sharing Facilitating the secure transfer of files between users within the app. - **Bluetooth Key Sharing:** Allowing the encrypted key to be shared via Bluetooth between devices. - Cross-Platform Development: Ensuring compatibility and seamless functionality on both iOS and An...

    $1500 - $3000
    Прихований
    $1500 - $3000
    122 заявки
    Flutter phone authentication and verification 1 день left
    ПІДТВЕРДЖЕНО

    ...OTP (One-Time Password). - Integrate SMS gateway for sending verification codes. - Handle the verification process seamlessly within the application. 2. **UI/UX Design:** - Design and implement intuitive screens for phone number entry and OTP verification. - Ensure a smooth and responsive user experience throughout the authentication flow. 3. **Security Measures:** - Implement encryption techniques to protect user data. - Incorporate measures to prevent security threats like brute force attacks and unauthorized access. 4. **Error Handling:** - Implement error handling mechanisms to handle edge cases gracefully. - Provide informative feedback to users during the authentication process. 5. **Testing:** - Conduct rigorous testing to validate the reliab...

    $95 (Avg Bid)
    $95 Сер. заявка
    23 заявки
    Design & Develop a Web Based Collaboration Platform: 1 день left
    ПІДТВЕРДЖЕНО

    I am working on a collaboration platform that will serve as a hub for individuals and small businesses. I need a skilled professional who can bring this vision to life through both design and development. Key Features: - Essential collaboration features such as file sharing, task management, and group chat are needed. - Extensive focus on user security: Incorporating End-to-End Encryption to ensure data privacy. - User Profiles: Users should be able to create and customize basic profiles, post updates, tag others, and use hashtags. - Proposal System: Implement a system for users to like/rate proposals, comment on them, and upload supporting documents/images. - Detailed Proposal Submission: A structured form for users to submit their proposals. - Blockchain Wallet Integration: Secu...

    $538 (Avg Bid)
    $538 Сер. заявка
    131 заявки

    I'm looking to integrate Optical Character Recognition (OCR) into my web application. The primary goal is to automate data entry processes. The current application contains manual data entry. I am attaching a screenshot of how it is entered manually and a picture of the paper from which it is typed. OCR should be done automatically. We can take pictures with a mobile phone in a few ...Synchronization with the Computer The data can be immediately available on a computer via the web application or a specialized desktop application. Real-time synchronization can be achieved using technologies like WebSockets. Security and Authentication It is important to ensure the security of the application by using HTTPS protocol, user authentication (e.g., using JWT - JSON Web Tokens), and data ...

    $23 (Avg Bid)
    $23 Сер. заявка
    15 заявки

    I am in need of skilled developers to build a cross-platform social networking app for both iOS and Android devices. The app main function will contribute to sparking discussions and interactions through cutting-edge features. Key Features: - User profiles to personali...real time content sharing and interactions. - End-to-end (E2E) conversations, facilitating encrypted and private conversations. Ideal developers for this project would have experience in building apps with similar features, fluent in cross-platform development and have a good understanding of user interface design. A strong background in data security would also be beneficial, given the E2E encryption requirement. Previous work in PPAR and live streaming feature integration would make you a standout candidate fo...

    $472 (Avg Bid)
    $472 Сер. заявка
    19 заявки

    ...Primary Features: - Timer scheduling - Remote control of ventilation systems - Monitoring parameters including temperature, humidity, twilight, and weather - Real-time notifications and alerts - Scheduling system actions - Support for multiple users simultaneously Given the sensitive nature of the data and operations, the application must be secure. Your work will involve implementing advanced encryption to safeguard our communications and data. The ideal candidate for this project should be proficient in mobile and desktop application development, with a deep understanding of systems' programming and security protocols. Knowledge of ventilation systems would be a plus. I encourage you to submit a proposal if you can deliver what I need and follow this with dedication and ...

    $16313 (Avg Bid)
    $16313 Сер. заявка
    96 заявки
    Laravel PHP Developer for Custom Web App 23 годин(-и) left
    ПІДТВЕРДЖЕНО

    Hey you! Do you have more than 6 years as a Laravel Developer? Can you prove it? Can you prove/provide evidence of what you have personally done as a developer? Does compliance to high security standards, encyption at rest, encryption in transit, AES 256, SHA 256 mean something to you? Are you willing to join an existing project? Are you willing to work for a flat monthly salary? Then this job may be for you. Our team is hard at work building a web application. We currently need an additional developer to assist with some key activities. You will be assigned duties by our Application Team Leader. Shoot us a quick message if interested. No agencies or middle men please.

    $7 / hr (Avg Bid)
    $7 / hr Сер. заявка
    82 заявки
    RFID PCB and Efficiency Optimization 22 годин(-и) left
    ПІДТВЕРДЖЕНО

    I'm looking for a skilled individual to design a PCB and program a chip for our RFID system. The focus of this project is on...- **Energy Efficiency Optimisation**: The system to be developed should be as power-efficient as possible. We need the RFID system to function optimally while conserving energy, ensuring long-term sustainability and performance. **Specifics of the Project**: The project is specifically for an RFID system, which comes with unique challenges and requirements. Since the system will not require encryption for secure data transmission, the focus is primarily on a strong wireless connection and energy efficiency. **Ideal Skills and Experience**: - PCB design - Chip programming - Wireless system design - Energy efficiency optimization - Previous experience ...

    $162 (Avg Bid)
    $162 Сер. заявка
    14 заявки

    ...professional to assist with encryption and compression functionalities within my project. Key Requirements: - Task: The primary task is to implement encryption and decryption, along with compression and decompression, in the existing project. - Data: The encryption and decryption will primarily focus on text data. - Implementation: I specifically require the use of AES, Huffman, Inflate and Deflate, and GZIP mechanisms for the encryption and decryption process. Ideal Skills and Experience: - Extensive Experience: Strong experience with VB6, particularly in encryption, decryption, compression, and decompression. - Specific Knowledge: Proficiency in implementing AES, Huffman, Inflate and Deflate, and GZIP in VB6. - Industry Best Practices: Knowledge of...

    $59 (Avg Bid)
    $59 Сер. заявка
    8 заявки
    Scalable Multi-Tenant Web App Development 16 годин(-и) left
    ПІДТВЕРДЖЕНО

    ...using GitHub Actions to automate testing and deployment. Cloudflare: Use Cloudflare for security (DDoS protection, WAF, SSL/TLS encryption), performance optimization (CDN, image optimization), and DNS management. 3. Specific Integrations or Third-Party Services OKTA: For secure tenant-based authentication and user management. GitHub: For version control and collaboration. DataStax Astra: Managed Cassandra database service for data storage. Netlify or Vercel: For hosting and deploying the frontend application. Monitoring and Logging: Prometheus and Grafana for monitoring. The ELK Stack for logging and analysis. Cloudflare: For DDoS protection, CDN, SSL/TLS encryption, load balancing, and traffic analytics. 4. Expected User Base and Their Needs User Base: The primary...

    $558 (Avg Bid)
    $558 Сер. заявка
    115 заявки
    Urgent Amazon AWS Infrastructure Setup 11 годин(-и) left
    ПІДТВЕРДЖЕНО

    ...file system....., etc. ->Use LUKS, etc... -Transport layer security -Connecting domains -Setting up and activating servers -Installing the control panel -Installing the Server Management Panel -Setting Up a Firewall -Harden SSH security -Install fail2ban and -Install log monitoring and analysis tools -Manage file and directory permissions -Install an intrusion detection system (IDS) -Manage encryption keys and set their complexity -Setting up iptables/rate limiting -Automatic security patching -rootkit hunter/clam av/lynis -open vas/nmap/modsecurity -bastellie linux/chkrootkit/linux audit -aws waf -netdata/cockpit/glances -anything else to boost server performance and security ...

    $23 (Avg Bid)
    $23 Сер. заявка
    35 заявки

    ...and the remaining balance available for future use. The deduction rate should be accurate, regardless of whether it's 0.5, 1, or 2 credits per minute. The system should automatically track and deduct credits based on the time spent in chat. In essence, the task will involve crafting a secure, easy-to-use, social networking text chat platform with added current-day features of Emoji Support and encryption....

    $182 (Avg Bid)
    $182 Сер. заявка
    59 заявки
    LegalSearch 9 годин(-и) left

    LegalSearch aims to be an artificial intelligence-based application that enables effective search and analysis of legal decisions. This application aims to provide users with fast and accurate access to information in lega...most current and reliable information through continuously updated databases. Technology and Infrastructure: Artificial Intelligence: Develops an AI-powered search engine using OpenAI's GPT model. Cloud Infrastructure: Runs on cloud-based services for fast and reliable access. Web-based Application: Provides access through a user-friendly interface via web browsers. Security: Utilizes strong encryption methods for user data privacy and security. Target Audience: Law firms and lawyers. Law school students and academics. Anyone involved in legal decision-ma...

    $1303 (Avg Bid)
    $1303 Сер. заявка
    46 заявки
    Cyber Security and IT Team 8 годин(-и) left
    ПІДТВЕРДЖЕНО

    ...have the latest software installed and updated. - Secure Environment Expectations: - I expect our overall environment to be top-notch in terms of security. This will involve implementing effective intrusion detection, utilizing strong data encryption practices, and managing access control. Your service should also extend to addressing day-to-day IT issues promptly. Ideal candidates should have: - Proven experience in Cyber Security and IT services - Strong background in security management, including Intrusion Detection and Data Encryption - Expertise in handling IT service requests efficiently - Previous experience in managing firewall and conducting vulnerability assessments - Ability to handle Penetration Testing and VAPT. Your team will be instrumental in...

    $586 (Avg Bid)
    $586 Сер. заявка
    43 заявки

    I'm seeking a proficient developer with a strong background in Android app development. This application is designed for working professionals, so understanding the needs and wants of this demographic is highly desirable. The functionalities required for this app include: - Login/Register: I need a secure login and registration system. This will require a user database and password encryption. Please note, the application will be in English only, so a strong working proficiency in English is crucial. A perfect fit would be someone who has prior experience in projects with similar requirements. Your portfolio showcasing your previous work with mobile authentication systems would strengthen your application.

    $687 (Avg Bid)
    $687 Сер. заявка
    17 заявки
    AI-based Requirement Document for Efficiency 7 годин(-и) left
    ПІДТВЕРДЖЕНО

    ...candidate applications based on predefined criteria and job requirements. • Use machine learning classifiers to filter and rank candidates, reducing manual effort and time spent by recruiters in the initial screening process. 8. Data Security and Privacy: • Implement robust data security measures to protect user data and ensure compliance with data protection regulations such as GDPR. • Utilize encryption techniques for securing sensitive information such as user credentials, resumes, and personal data stored in the database. 8.1. Performance and Scalability: • Design the system architecture to be scalable and capable of handling a large volume of users and job listings. • Utilize cloud infrastructure services such as AWS or Azure for scalable hosting a...

    $765 (Avg Bid)
    $765 Сер. заявка
    97 заявки