Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 hash jobs found, pricing in AUD

    I'm working with an API who giving the hash of a file, it returns a p7s digital sign in base64 who needs to be add it to the PDF dictionary. (It can be one or more signatures) What I want is, the ability to add the sign to the PDF in NodeJS (better if it's with typescript) and then open it in adobe acrobat and see the sign. I will provide the PDF sample, the hash of the file and the response of the API in base64 to be tested. Additionally I have an example in Java to better undestanding of the requeriments The flow of the file will be: 1. Give the hash and received the API response (this will be mocked) 2. The API response must be decoded (it's in base64) and add it to the PDF 3 A new PDF must be saved in the disk 4. When the new pdf is opened in Ado...

    $200 (Avg Bid)
    $200 Avg Bid
    31 bids

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be determined as part of this process.

    $543 (Avg Bid)
    $543 Avg Bid
    14 bids

    I'm seeking an expert to diagram and test a communication protocol using and . car (OBU On-Board Unit) sends (License Plate Reg) request to a Roadside Unit (RSU) RSU sends the car's LP, a challenge (C1), and a hash of the challenge-response pair (H(R1|TS)) to the Traffic Department which Decrypts the received light state command to be sent to the traffic signal. b. Verifies the hash of the challenge-response pair (H(R1|TS)) against its own hash (H(R1|TS)) for authentication. Upon verification, commands to open the traffic light.

    $212 (Avg Bid)
    $212 Avg Bid
    4 bids

    University Assignment: Flask Web Application for Secure Authentication System ONLY BID IF YOU CAN DO IT. Go to Template Folder to see the code and use Docker to run it. It should take 2-3 hours to do it. Need it ASAP. Project Overview: I will give you a zip file with , login.h...Authenticator. - Enforce session security with HTTPS and consider HTTP Strict Transport Security (HSTS) for enhanced security. - Implement CAPTCHA verification to prevent automated attacks and manage session rate limiting effectively. Recovery Options: - Generate recovery keys using () with at least 20 bits of entropy. - Ensure recovery keys are delivered securely and are single-use. - Hash recovery keys using Argon2 with individual salts. - Explore implementing HSTS to prevent downgrade attacks.

    $37 (Avg Bid)
    $37 Avg Bid
    33 bids

    ...same exact name. Of course browsers often use the cached version instead. The files are big enough where I want the browser to cache them, but only until they change - then the browser needs to grab the new version from the server. The apache and .htaccess expire headers haven't done what I need. I read that some codebases exist that will assign a variable to the end of the URL based on a file hash. I thought this may be the way to go. The solution needs to be editable by me. I am more of a general IT person who can do some front end development and tweak some code. So markup and explanations are important or available documentation if we cab use a simple library. A follow up project might be to implement squid or some sort of automatic way of localizing those pdf a...

    $37 / hr (Avg Bid)
    $37 / hr Avg Bid
    90 bids

    ...been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as part of the investigation and produce a report based on your management of the case, your analysis and your findings. You will have to: setup your forensic workstation for your analysis, which would include any forensic tools that you feel are appropriate for the job, download a copy of the forensic image from th...

    $175 (Avg Bid)
    $175 Avg Bid
    25 bids

    ...been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as part of the investigation and produce a report based on your management of the case, your analysis and your findings. You will have to: setup your forensic workstation for your analysis, which would include any forensic tools that you feel are appropriate for the job, download a copy of the forensic image from th...

    $33 / hr (Avg Bid)
    $33 / hr Avg Bid
    17 bids

    ...the following structure: First line: The block header. Second line: The serialized coinbase transaction. Following lines: The transaction IDs (txids) of the transactions mined in the block, in order. The first txid should be that of the coinbase transaction Difficulty Target The difficulty target is 0000ffff00000000000000000000000000000000000000000000000000000000. This is the value that the block hash must be less than for the block to be successfully mined. Execution Create a file named that contains the command to execute your script. This file should ideally contain a single command like python or node index.js. Your script should autonomously perform all tasks when is executed, without requiring any manual intervention. Evaluation Criteria Your submission will be evaluat...

    $17 (Avg Bid)
    $17 Avg Bid
    3 bids

    ...hpn5B"/> <Params> <Token Type="string" Value="b6JnfGF7fXMjOjB79zVoLCJwZCIyICIvMTMjLCJp9ka18WRo9jIyICJnYWvnYSIrIkfgeWUjOjAjYkfx9j2iY62T8Ga5YkFreDMjLCJpejIyICJwezZoZ1FnIjpjfGouZSIyICIvNnE6NTm5NiIvIz7"/> <TransactionID Type="string" Value="9156174388"/> <WinReferenceNum Type="string" Value="17612298068"/> <WinAmount Type="int" Value="75"/> <GameReference Type="string" Value="bgor-cc-Showball3 "/> <Hash Type="string" Value="1b522defc135ef9bea631d94a99f587bcb1cb03ec08ca356de42fb77f4e3c4a4"/> <BonusWinAmount Type="int" Value="0"/> <GameStatus Type="string" Value="Pending"...

    $45 (Avg Bid)
    $45 Avg Bid
    79 bids

    Hiring technical personnel can achieve complete development of the following code in practice. There may be something wrong with the code below, but there is project direction. pip install telethon Import TelegramClient from Import functions from # Create Telegram client with your API ID and API hash api_id = 'Your API_ID' api_hash = 'YOUR_API_HASH' Client = TelegramClient('session_name', api_id, api_hash) Asynchronous def send_dice(chat_id, dice_face): Asynchronously with client: result=awaitClient(( peer = chat id, Query id=0, id='robot command', silence=false, Scheduled Date = None, background=false, cleardraft=false, hide_via=true, selected=[dice_face] # 1-6 are ordinary dice )) print(result) # Fill in your account mobile

    $1507 (Avg Bid)
    $1507 Avg Bid
    59 bids

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    $323 (Avg Bid)
    $323 Avg Bid
    12 bids

    I'm seeking an expert in writing Splunk queries to detect threats, efficiently querying from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expert...from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expertise include: - Proven skills in extracting and analyzing data from logs - The ability to use Regex queries to extract additional, nuanced information - Proficient querying from CrowdStrike EDR telemetry. The information to be extracted comprises of EDR fields like: - Process Name - File Hash - Command Line I look forward to working with a detail oriented and security savvy professional who will utilize this data to help us identify potential security threats and ensure sy...

    $547 (Avg Bid)
    $547 Avg Bid
    19 bids

    I'm looking for a talented individual with proficiency in image processing and hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in such a way that its original concepts not changes - making image change so many time like a loop - calculating images hash The resultant processed images should be provided in JPEG, PNG, and GIF formats. A background in encryption and cryptography will be highly desirable. Your experience with these specific image processing techniques will be crucial to the success of this task.

    $185 (Avg Bid)
    $185 Avg Bid
    57 bids

    ...and need assistance to set up a Global TCP Passthrough Load Balancing to distribute my online traffic. The ideal bidder would have: - Extensive experience in setting up Load Balancing on GCP. - Solid understanding of routing and IP Hash distribution. -Each instance stores unique files, it is important there is the lowest latency possible, when a file is sent, it must go to the instance closest to who sent the file via TCP to the load balancing IP. -I can deploy as well, just need best practices on how to achieve this. Essentially, I need you to develop an IP Hash distribution strategy for distributing online traffic effectively. GCP certification is appreciated but not necessary as long as you have experience in networking and have worked on similar tasks before. A smoot...

    $225 (Avg Bid)
    $225 Avg Bid
    18 bids

    1- I need an update on my buy and sell bot that works on the Solana network through the Raydium pool, the bot has a mechanism for capturing variations in the chart and sending buy or...com/runtime/programs exemple : *jito priority documentation : *examples of program users that currently run within the Solana blockchain : user hash >program + jito = *example of priority in JITO + jupiter agregator user hash =

    $1630 (Avg Bid)
    $1630 Avg Bid
    138 bids

    ...stworzony. oto opis Developera który stworzyÅ‚ ten program:: Features Written in c++, best performance with multithreading Beautiful GUI, inspired in Blizzard All errors and exceptions throw user friendly messages International Multilanguage Fast download files Method of Hash (CRC32) default Banner in home (Promotion, Event, New Image, etc...) + News / Patch notes Initialize client with arguments Tool user friendly for generate serverlist hashs New config game for Metin built-in (Requirements: metin2client source) Available Hash method to choose Md4 Md5 Sha1 Sha224 Sha256 Sha384 Sha512 Sha3_224 Sha3_256 Sha3_384 Sha3_512 Available Languages This is extremely flexible when hiring you can add new languages or change existing since that helps me to translate co...

    $172 (Avg Bid)
    $172 Avg Bid
    57 bids

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security and confidentiality given its sensitive nature.

    $20 (Avg Bid)
    $20 Avg Bid
    26 bids

    ...the following structure: First line: The block header. Second line: The serialized coinbase transaction. Following lines: The transaction IDs (txids) of the transactions mined in the block, in order. The first txid should be that of the coinbase transaction Difficulty Target The difficulty target is 0000ffff00000000000000000000000000000000000000000000000000000000. This is the value that the block hash must be less than for the block to be successfully mined. Execution Create a file named that contains the command to execute your script. This file should ideally contain a single command like python or node index.js. Your script should autonomously perform all tasks when is executed, without requiring any manual intervention. Evaluation Criteria Your submission will be evaluat...

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    7 bids

    In need of a tech-savvy, innovative app developer well-acquainted with both iOS and Android system...innovative app developer well-acquainted with both iOS and Android systems. The ultimate goal is to create a cryptomining application that's user-friendly and efficient. Key Features Required: - User Registration and Login: A secure authentication method, protecting user's data and mining activity. - Real-time Mining Statistics: To keep users informed about their mining status, providing data like hash rate, earnings, and more. - Wallet Integration: Facilitate seamless transactions using popular crypto wallets. Proficiency in blockchain technology, crypto mining, and payment gateway integration is a must. We value security and user experience, so expertise in these area...

    $1076 (Avg Bid)
    $1076 Avg Bid
    16 bids

    I am looking for a person who will rewrite a few functions for me, preferably into a hash map or a vector, depending on what is faster and easier, it concerns objects on the map

    $223 (Avg Bid)
    $223 Avg Bid
    13 bids

    ...receive cycle with status return message of POP3 Server The SMTP and POP3 transmission should also be possible via SSL. SMTP and POP3 authentication should support standard authentication. SMTP Server and POP3 Server and account settings should be configurable. Email Subject should be configurable (but should also have a key to compute the cycle time in the otel receiver, like cyclekey=some number or hash ). Configuration should be done via yaml (in accordance to the opentelemetry standard) Skills and experiences required for this job: - Experience with - Experience with golang - Proficiency in SMTP and POP3 protocol - Ability to develop configurable systems - skills in data metrics and logs This project will require you to be detail-oriented, reliable, and have exceptiona...

    $184 (Avg Bid)
    $184 Avg Bid
    9 bids

    Hi DIGITAURUS Technologies, I noticed your profile and would like to offer you my project. We can discuss any details over chat.

    $99 (Avg Bid)
    $99 Avg Bid
    1 bids

    ..."Google", "name": "Apple", "description": "Search Engine", "pixels": [ 495 ], "groups": [ 54 ], "rules": [ { "type": "geo", "key": "us", "value": "" } ], "long_url": "" } The link GET call looks like this: "status": "success", "link": { "id": 1, "title": "reddit: the front page of the internet", "hash": "rF7r6", "alias": "red", "long_url": "", "short_url": "", "disabled": false, "ex...

    $198 (Avg Bid)
    $198 Avg Bid
    69 bids

    In need of a knowledgeable coder for a Node JS script project. Under the specifics of the task, you'll be required to configure a script that will facilitate the exchange of USDT for WSTETH on the UNISWAP V3 router using the INFURA endpoint. For this role, it is mandatory to ha...Output say: USDT balance is zero"(shown in colsole) 4. When Trade executes, it must take place on ARBITRUM and use the highest recommended gas fee to facilitate the trade as fast as possible. INFURA HAS AN API that detects current gas fees. I woudl like to use this to first check what they are and they use the fastest one. 5. When TX is complete I woudl like it to out put to the console, the tx hash, the amount of USDT as well as price for input and the Amount of WSETH received as well as pric...

    $896 (Avg Bid)
    $896 Avg Bid
    37 bids

    ...mind. Please note, the specifics of said theme will be discussed more in-depth once negotiations commence. Important elements for this project: - The website should be designed on Elementor. - The proficiency in developing appealing, navigable websites. Given the lack of explicit request for particular features such as e-commerce functionality, blogging capabilities or contact forms, we'll hash out the specifics during our discussions. When applying for this project, share relevant examples of your past work that demonstrate your WordPress and Elementor prowess. This previous work will be a significant influencing factor in my selection process. In conclusion, if you can share your past projects exhibiting your WordPress and Elementor proficiency, you could be the i...

    $253 (Avg Bid)
    $253 Avg Bid
    134 bids

    ...on monitoring historical transactions being processed by my WordPress site using WooCommerce plugin, specifically for Payment Gateways such as Barclays ePDQ or others of a similar nature. Specifically, the Payment Gateway owner (Barclays ePDQ) has requested we provide "We will need to see exactly what is being sent from your system over to ePDQ. Please include the following: 1. Your string to hash demonstrates the SHASIGN calculation. An example of this is as follows: AMOUNT=100myshapassphrase123CURRENCY=GBPmyshapassphrase123… etc. 2. Your form parameter/ value pairs submitted as part of the transaction request 3. The URL to which the requests are being submitted" Your expertise should include: - A thorough understanding of WooCommerce and Payment Gateways -...

    $53 (Avg Bid)
    $53 Avg Bid
    29 bids

    ...scanner looks for the pairs from an exchange that best meet the conditions for spot future difference arbitrage. On the right side, framed in white, are the open bots, so not only one bot is opened, but another bot for every currency pair that meets the conditions. Your job is to add a field in our database for the API key to the exchange and a database field for the API password. (in hash format of course). Every customer who logs in with us can then run a bot for their account, directly via our trading portal. That sounds complex at first, but it really isn't. Anyone who knows their craft can get through it in a week. We have already done this for a few exchanges and therefore have experience of how long it will take and how much it will cost. Please, dear developer, ...

    $50 / hr (Avg Bid)
    $50 / hr Avg Bid
    10 bids

    Hi, I'm in search of someone skilled in Excel& Crypto sheets to assist in creating a spreadsheet that tracks real-time Bitcoin prices, network difficulty/hash rate, and estimated mining rewards based on hash rate. The goal is to correlate this data with my estimated mining rewards, watts used per miner, and ultimately calculate ROI and the bottom line. If you're interested, please send me a private message. I'll provide further details and data once we connect. Looking forward to hearing from you!

    $197 (Avg Bid)
    $197 Avg Bid
    24 bids

    ...am looking for a highly knowledgeable and skilled individual to generate a Hash key of 10,000 Th/s and 20,000 Th/s. The outputs required are Hash160, which is to be generated using a bitcoin address with a value of more than 0.1 btc, and the corresponding BIP32 Root Key of the same wallet. To generate the Hash160 and the corresponding Hash Key, you will need to utilize the BIP32 Root Key. Additional functionality needed includes: - Blockchain data analysis - Balance check of provided address While no predefined programming language or framework was specified, please use the one you are most proficient in as the priority is on efficiency and accuracy. Ideal candidates should have a deep understanding of hash key generation, BIP32 Root Key manipulation as well...

    $429 (Avg Bid)
    $429 Avg Bid
    6 bids

    details for logo below design., Hash symbol logo (sample attached, it can be any design) on the four sides of the hash symbol (#) engraved or embossed style, need below elements, 1) Top - Vedic scroll 2) Right - Computer or computing 3) Bottom - Mech gear 4) Left - Electric component (capacitor)

    $97 (Avg Bid)
    $97 Avg Bid
    27 bids

    ...(USDT and BTC). This software should have the ability to exist as a web application accessible on both desktop and mobile platforms, hence demanding a responsive design. Key Features: - Creation of flash coins that stay valid in the wallet for 300 days - Flash coins should be tradable and transferable - Provision for the coins to be swapped and withdrawn - Each transaction should have an associated hash when being sent to other wallets Authentication: - Implementation of a strong two-factor authentication system is necessary for user verification, providing an extra layer of security. Ideal project bids will demonstrate previous experience in handling similar cryptocurrency system development. While working knowledge of blockchain technology, web application development and U...

    $229 (Avg Bid)
    $229 Avg Bid
    14 bids

    I'm facing considerable issues with the load time of my website. It's performing slower than expected and I'm looking for a skilled developer who can promptly diagnose, analyze, and fix this problem. Although I couldn't specify the exact reasons for the sluggish performance, it might be due to factors like heavy media files, extensive script/plugin use, or server performanc...areas is highly desirable: - Website performance auditing - Identification & Reduction of heavy media files - Optimization of scripts and plugins - Server performance enhancement I'm looking for someone who can start immediately on this project. Your role is crucial as fast load times directly affect user experience and SEO. I'm looking forward to working with someone w...

    $650 (Avg Bid)
    $650 Avg Bid
    192 bids

    ...wedding, so the wedding guess know what drinks are included. I have a text in the Excel spreadsheet, the drinks that are available, and I have also attached some ideas of what I'm looking for. This will be printed on an A3 size paper so cannot be too big. The name of the couple getting married is Josephine and Mitch we also need a food menu desighned with the following foods: SMALL BITES • Hash brown with black garlic cream fraiche and salt bush (V) • Sydney rock oysters, yuzu and lemongrass (GF) Mushrooms and truffle arancini, garlic aioli (GF) (V) Pumpkin and spinach Calzone (V) Kingfish ceviche, coconut cream chilli chicken crackling (GF) Beef tataki, ginger and smoked soy fried eschallots (GF) SUBSTANTIALS Beef brisket slider with asian slaw Crisp...

    $29 (Avg Bid)
    Guaranteed
    $29
    62 entries

    I am having "Unauthorized" error upon delivering output from Telegram TDLib API into my dev app. Tried using few diff account of TDLib API and TDLib Hash with no luck.

    $33 (Avg Bid)
    $33 Avg Bid
    7 bids

    I'm urgently looking for a social media specialist, specifically with a flair for Instagram aesthetics. I need assistance with the following tasks: - Organizing hashtags as a strategy to increase visibility and engage...Organizing hashtags as a strategy to increase visibility and engagement - Updating and optimizing my bio to accurately reflect the brand - Creating captivating thumbnails that will improve click rates - Making the overall look of my profile more attractive and reflective of the brand's vibe The ideal freelancer for this task should have a creative eye for visuals, understand Instagram's algorithm for hash-tagging, and hold knowledge about producing catchy thumbnails that attract a larger audience. Please provide examples of Instagram profiles you hav...

    $22 (Avg Bid)
    Guaranteed
    $22
    24 entries

    Building a Machine Learning Model for Game Here's a step-by-step guide to building a machine-learning model for the game, including code examples and resource recommendations: Step 1: Data Collection and Preprocessing Collect Hashes: Gather as many hashes as possible from the game. Consider recording the steps taken within the game to generate each hash. Analyze Hash Format: Determine the format of the hashes (e.g., length, character types, presence of delimiters). This helps choose appropriate algorithms for processing and analysis. Clean and Preprocess Data: Clean the data by removing duplicates, handling missing values, and ensuring consistent format. Standardize the data if necessary. Step 2: Model Selection and Architecture Design Choose Machine Learning Algorit...

    $2537 (Avg Bid)
    $2537 Avg Bid
    11 bids

    ...use OCR technology to accurately extract the text, focusing on producing a clean, searchable text output. Text Formatting and Cleanup: Apply special conventions for text formatting: Italics: Represent italics by surrounding the text with single asterisks (text). Bold: Represent bold text by surrounding it with double asterisks (text). Headlines: For larger text, such as headlines, use a leading hash symbol (# Headline) to denote its significance. Remove all headers, footers, and page numbers to ensure the text is free of any such elements. Line breaks in sentences due to page width must be removed, while line breaks due to new paragraphs must be preserved. Content Organization: The final document should begin with the Table of Contents. Follow the Table of Contents with each cha...

    $671 (Avg Bid)
    $671 Avg Bid
    29 bids

    I'm seeking someone skilled in digital marketing, specifically experienced in eBay's promotional tools. The goal is to boost the sales of my media-related goods, primarily DVDs. I aim to invest $25 in this initial venture. A superior understanding of the platfor...promotional tools is crucial. Any prior successful experience in promoting media products on eBay will be a plus. If this venture is fruitful, there might be potential for future collaborations. Here is a link to the item I wish to promote. I am looking for USA Customers only. I can pay bonuses for each sale generated. :g:2bIAAOSw4qdl1yhf I want to do a cheap test. If the test is successful I will create a new milestone and do it again.

    $57 (Avg Bid)
    $57 Avg Bid
    21 bids

    The loyalty payment app will allow the customer to tap or insert a banking card, identify the loyalty system member based on a hash key of the PAN and process both a financial banking transaction as well as an earn / redemption loyalty transaction. The app has to print both banking and loyalty receipts. The user interface has to be simple and intuitive to for the store staff and customer to operate.

    $56 / hr (Avg Bid)
    $56 / hr Avg Bid
    30 bids

    We are seeking an experienced individual or team with expertise in Bitcoin mining to assist with optimizing our mining operation. The project involves maximizing hash rates using the SHA256 hashing algorithm to increase our chances of successfully mining Bitcoin blocks. probably the “nerdminers “ software can work.

    $233 (Avg Bid)
    $233 Avg Bid
    6 bids

    We are seeking an experienced individual or team with expertise in Bitcoin mining to assist with optimizing our mining operation. The project involves maximizing hash rates using the SHA256 hashing algorithm to increase our chances of successfully mining Bitcoin blocks. probably the “nerdminers “ software can work.

    $171 (Avg Bid)
    $171 Avg Bid
    5 bids

    ...OCR technology to accurately extract the text. The focus is on producing a clean, searchable text output. Text Formatting and Cleanup: Apply special conventions for text formatting: Italics: Represent italics by surrounding the text with single asterisks (text). Bold: Represent bold text by surrounding it with double asterisks (text). Headlines: For larger text, such as headlines, use a leading hash symbol (#Headline) to denote its significance. Remove all headers, footers, and page numbers to ensure the text is free of any such elements. Content Organization: The final document should begin with the Table of Contents. Follow the Table of Contents with each chapter formatted as one long, coherent text block. Conclude the document with the Glossary. Ensure all other content not sp...

    $795 (Avg Bid)
    $795 Avg Bid
    34 bids

    ...data. - **Audit & Recommendations:** Conduct a thorough security audit of the current system and recommend additional security enhancements beyond the Hash upgrade. - **Documentation:** Provide detailed documentation on the changes made, including any necessary steps for future maintenance or upgrades by our internal team. **Ideal Skills and Experience:** - **Expertise in CLASSIC ASP, C#, and VB.NET:** Demonstrated experience with these languages is essential for navigating and upgrading our existing system. - **Experience with Hash Algorithms:** A strong understanding of cryptographic hash functions, specifically transitioning between hash function versions securely. - **Security Mindset:** A keen awareness of web application security principles and a ...

    $321 (Avg Bid)
    $321 Avg Bid
    20 bids

    ...alert to a Slack channel using the Slack SDK. The message sent to Slack should contain: 1) link to the exact Telegram msg that triggered the alert 2) contents of the message 3) time/date of message 3) This script will scan all Telegram channels an account is in every 15 minutes. It will require some pre-setup on your side to dev. Mainly a Slack channel to dev in and a Telegram account w API hash id and hash. Please have your Telegram account join 40-50 channels so you can see how long it takes to scan when your account is in many channels by keyword. tl;dr = python script to continuously scan Telegram channels monitoring for a keyword or phrase. Once found, it will send an alert into Slack using the Slack SDK. The Slack msg should contain a link to the Telegram message,...

    $217 (Avg Bid)
    $217 Avg Bid
    32 bids

    ...called the same. (Fix that Bug in the Code) Add a New Pricing Rule, (Requires to Simply Update the price_compute function, will take two lines), Sales Price: recommended_price * 1.5 and Regular Price: retail_price_without_tax * 2.5 if different is < 5 make them the same. Basically fix all of these issues and others w/ the API to make sure our website is near perfect. If possible try to get the image hash of all of the images to remove the duplicate images, or use a WordPress Plugin to Remove the Duplicate Images. Deadline for Completion: Thursday-Friday (Otherwise Provide Your Timeline which You can Work with Comfortably). This Job will involve once, done w/ the above running the code and keeping an eye out while everything on the website will go ahead and be updated......

    $234 (Avg Bid)
    $234 Avg Bid
    43 bids

    Looking for someone who knows how to effectively land a message using insta reels and use relevant hash tags and images in the bg The project would consist of 50 reels to be shooted by team in person

    $443 (Avg Bid)
    $443 Avg Bid
    11 bids

    I'm looking for a mathematician expert to help me create a hash. The idea is that a string is converted into ASCII Keys. These ASCII keys are then combined to create a number in scientific notation. Then essentially we need to redefine the keys using the scientific notation number.

    $11 (Avg Bid)
    $11 Avg Bid
    10 bids

    Im looking for a mathematician expert to help me create a hash. The idea is that a string is converted into ASCII Keys. These ASCII keys are then combined to create a number in scientific notation. Then essentially we need to redefine the keys using the scientific notation number.

    $16 (Avg Bid)
    $16 Avg Bid
    14 bids

    Top hash Community Articles