Decrypting trabalhos

Filtro

Minhas pesquisas recentes
Filtrar por:
Orçamento
para
para
para
Tipo
Habilidades
Idiomas
    Estado do Trabalho
    538 decrypting trabalhos encontrados, preços em EUR

    ...newlogname firstlog secondlog thirdlog" etc etc the user input commands are how quake 3 controls movement ingame and consist of: xyz start positions, xyz start velocities, start pitch and yaw, server frametime, forward move, right move, up move, pitch, yaw, roll, weapon, and a few other infos. explanations for this are scattered around the q3 source part 2 of the tool would allow for limitless decrypting, editing, and encrypting of the demofiles (replays containing among other things the infos that part 1 of the tool modifies) associated with quake 3 and DeFRaG. may add more info as i remember ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete (preferably commented) source code of all work done. 2) Deliverables m...

    €235 (Avg Bid)
    €235 Média
    1 ofertas

    I have a Safelist Service running on Website with Custom Built Encrypted Safelist Script. The Script Source Code is an encrypted archive. I do not have private keys and password in order to be able to decrypt the Encrypted files. I have only access to Encrypted Source Code Files and these files need to be decrypted. I need your help in Decrypting the Encrypted Source Code Files.

    N/A
    N/A
    0 ofertas

    I need a developer experienced in using Rijndael Encryption in ASP. The method of encrypting and decrypting does not matter as long as it can be called as a COM component from an ASP page. You will be provided a sample key to encrypt and decrypt text strings. I will need install instructions and a sample of usage. I will provide other details when contractor is selected. Require strong english communication skills and someone that can get the job done quickly. Must be .NET or VB6 ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables): a) For web sites or other s...

    €141 (Avg Bid)
    €141 Média
    9 ofertas

    ...we do not want to slow our users down. If someone really wants to crack our files, they will succeed. We are looking to stop 99.9% of the market, such as the average user that wants to use our video clips in other products. Whatever form of encryption is used, it needs to keep the following in mind 1) Protect the files from being able to be easily cracked 2) Efficient method of encrypting/decrypting file Our files will range from anywhere from 50kb in size to over 10 megabytes. One method that would work to prevent others from readnig the files could be shifting the bits in the file (reversing 0's and 1's) Look forward to receiving your bids. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete sour...

    €287 (Avg Bid)
    €287 Média
    3 ofertas

    ...the performance of our application because of encryption. If someone really wants to crack our files, they will succeed. We are looking to stop 99.9% of the market, such as script kiddies, and novice/intermediate crackers. Whatever form of encryption is used, it needs to keep the following in mind 1) Protect the files from being able to be easily cracked 2) Efficient method of encrypting/decrypting file Our files will range from anywhere from 50kb in size to over 10 megabytes. Look forward to receiving your bids. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables): a...

    €333 (Avg Bid)
    €333 Média
    4 ofertas

    I'm enrolled in information assurance Master Degree course, and we have our first homework that cosists of decrypting a simple cipher text. I really downloaded a few tools and tried everything I have learned in the first class but nothing works. I need an expert in the area that point me in the right direction. attached is the cipher text ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables): a) For web sites or other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condit...

    PHP
    €13 (Avg Bid)
    €13 Média
    2 ofertas

    Hello, I have some data which is either encoded or encrypted. Here is a sample: 2488EA5898D946AC1C8EF236A20479EC52C0EE52C12F B0055CA8E84CAD2092F360CC36A91987B51988F5 6ADD43AFEF5CCC309CFD75A30776E3 B51A86F13295F659BA29920679A70B7AE7 EC5FC12C6CD849AC197AF12083F260 D83B9E074788F45BCA3DA1E451B2289B016F9D0170DD CE1159A1E12C9B0472E55AC9389DDE43A41285B31786F3 5BB2FA4383CD3DA51487FB6BD93F80E446B32755B82895 Each line stands for an email address. If you can crack this and deliver me a function in whatever programming language, I will pay right away. Once more, this can be simple or complex job, I have no idead and no time to find out. Thanks.

    N/A
    N/A
    0 ofertas

    ...the performance of our application because of encryption. If someone really wants to crack our files, they will succeed. We are looking to stop 99.9% of the market, such as script kiddies, and novice/intermediate crackers. Whatever form of encryption is used, it needs to keep the following in mind 1) Protect the files from being able to be easily cracked 2) Efficient method of encrypting/decrypting file Our files will range from anywhere from 50kb in size to over 10 megabytes. Look forward to receiving your bids. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables): a...

    €470 (Avg Bid)
    €470 Média
    4 ofertas
    CryptoAPI Encerrado left

    We need examples on Delphi, which uses CryptoAPI. 1. Creating private and public keys. 2. Encrypting small buffer by private key. (size of buffer is 256 bits) 3. Decrypting small buffer by public key. 4. Importing and exporting keys. P.S. We tried to do this, but CryptEncrypt returns NTE_BAD_LEN always. We need workable example. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables): a) For web sites or other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condition in ...

    €11 (Avg Bid)
    €11 Média
    1 ofertas

    I am haviong trouble with this I can encrpt and decrytp on the same page but what I am trying to accomplish is encrytings data on 1 site, sending it to another site uses GET and then decrypting on site 2

    €14 (Avg Bid)
    €14 Média
    1 ofertas

    CLONE wanted: I'm searching for a script like or ...due to every new user who joines is placed at the bottom (position#5). - In example with 5-line matrix: new users should pay TOTAL AMOUNT + 10% fee. For 5 lines, users pays $0,10 for each line + $0,05 (10% of $0,50 total). The fee is for the admin. - E-gold system has to be set-up so that users should only pay ONCE, this would require some kind of encryption concerning e-gold auto-processing (decrypting passcode to prevent hacking/mining)... - What has to be adjustable: Pay ammount, admin fee, e-gold account admin (and passphrase), e-gold accounts users, username users, type of matrix (3,4 or 5 line matrix) - Script must be "install free" so it could be installed on severall different sites

    €277 (Avg Bid)
    €277 Média
    1 ofertas

    ...software package: <> The problem is that we need to perform several modifications/corrections to the script but it's protected by SourceGuardian. Attached is one of the encrypted PHP files. So we need either: The encrypted functions of the site rewritten as new PHP pages incorporating all our modifications. Decrypting the existing files and applying the modifications. Please place a bid either for decrypting the existing pages (please quote a price per page) or creating a new 'clone' site with identical features. Scheduled to start immediately! Please let me know if you have any questions. Thanks! Joe ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done...

    PHP
    €78 (Avg Bid)
    €78 Média
    1 ofertas

    Decrypting Fox Pro Database. I have a Fox Pro database whose data is encrypted. I will like to know how it can be decrypted. The person must be able to decrypt it.. and later pass on the knowledge to me so that I can do it myself.

    €60 (Avg Bid)
    €60 Média
    16 ofertas

    I need someone who can provide me with a sys kernel driver (NT/2000/2003/XP/Vista) for encrypting/decrypting fileopen/filesave streams in realtime. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables): a) For web sites or other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condition in the Buyer's environment. b) For all others including desktop software or software the buyer intends to distribute: A software installation package that will install the software in re...

    €293 (Avg Bid)
    €293 Média
    2 ofertas

    ...proof of work and also as an example of usage of the class library(.dll file). This page should also be built in VB.NET and contain 3 text-area fields. The first field should allow text entered into it to be encrypted, and then shown in the second field. The third field should show the text that has been now decrypted. In other words, this page should show the entire process of encrypting and decrypting data, and be commented to ensure easy understanding of the usage of the class library. It should also make clear how to import the .dll file (assembly) into the ASP.NET page for usage. I also require that the class library (.dll file) be commented accordingly. Each line of the code doesn't need to be commented, however, each function used should have a summary of comments exp...

    €39 (Avg Bid)
    €39 Média
    1 ofertas

    I need someone who can provide me with a sys kernel driver (NT/2000/2003/XP/Vista) for encrypting/decrypting fileopen/filesave streams in realtime. More details upon request, everything can be discussed, price/timeframe etc. I am openminded here, please let me know your opinion and how you could help me. Thank you. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables): a) For web sites or other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condition in the Buyer's ...

    €1068 (Avg Bid)
    €1068 Média
    8 ofertas

    I need this project for one of my school assignments (class project actually). What i need is a kind of payment system, whereby the user would be paying for its utility bill through this application (gui swing) which will encrypt its payment details (on a client s...related to the payment. I am attaching the document with all possible scenarios, to help u understand better what is it that i need. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. Application which will encrypt 2) uml if possible 3) Need all: client (encrypting and payment side), server (decrypting and payment processing side) with database. 4). Coded in Java 2 sdk 1.* ## Platform Windows XP.. coded in pure ...

    €58 (Avg Bid)
    €58 Média
    11 ofertas

    The project must encrypt/decrypt files with specified algoritms. The project must use free libraries like ctc -> or gnupg ->

    €28 - €92
    Secreto
    €28 - €92
    14 ofertas

    We need an addin for Outllok for encrypting and decrypting mails. The user can also choose to digitally sign the message; signature can be verified at a trusted autorities which is saved in a list at sender side. An option to destroy the message after a number of days must be provided. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows? (depending on the nature? of the deliverables): a)? For web sites or? other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condition in the Buyer's environment. b) For all other...

    €28 - €74
    €28 - €74
    0 ofertas

    I need SFTP (part of OpenSSH) and pure-ftp (stand alone ftp daemon) to encrypt files sent to it prior to writing to disk. It must decrypt the file prior to sending it back to the client. For example: put from a local machine sends to the sftp-server process. The server process needs to encrypt the contents and write them to disk. get should result in the server decrypting the file and sending it. Both openssh-4.1p1 and pure-ftpd-1.0.20 need to be modified to enable this functionality. Encryption and decryption between the two programs must be identical, so someone can drop a file off with sftp and pick it up with regular ftp. The encryption key must be hard-coded into the applications. In no case should any cleartext data exist on disk. Please use the OpenSSL EVP

    €185 (Avg Bid)
    €185 Média
    4 ofertas

    Hi, I need some highly experienced coder (VC++, drivers) for providing me with an encryption driver. I have a small encryption app which uses some /temp-folder for decrypting files, after encryption those files are removed and overwritten again. Of course this also offers a certain level of security but I want to go one more step further and use some encryption driver for filesystem level encryption. The driver should decrypt/encrypt the filestream during opening/closing the file. Please let me know what you can do for me and correct me please if some of my above explanations were not clear/wrong. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-t...

    €221 (Avg Bid)
    €221 Média
    3 ofertas

    ...AES encryption for secured file transfer. The voice files are zipped for faster data transfer and then encrypted before uploading to our secured server, while the finished medical transcriptions (documents) are zipped and encrypted before being transferred to the clients PC. Therefore, at no time is the data left unsecured while using the Internet. The software shall take care of unzipping and decrypting the downloaded medical transcriptions automatically. A time saving feature is that of automatically printing all downloaded charts. Main Features: * User-friendly and easy-to-use desktop utility that can be run on any pc with an Internet connection. * Supports 256-bit AES encryption. * Highly secure (SSL) for confidential use. * Usage limited to authenticated users...

    €92 - €461
    Secreto
    €92 - €461
    13 ofertas

    Hello to all, i have some asp code that needs decrypting, all files are in ASP, this uses the command. it is part of an ecommerce program? apporximately 3 to 4? files with 4 lines of encrypted code each. Thanks in advance for your bid. hope to hear from you all soon. ## Deliverables Rent A Coder requirements notice: As originally posted, this bid request does not have complete details. Should a dispute arise and this project go into arbitration "as is", the contract's vagueness might cause it to be interpreted against you, even though you were acting in good-faith. So for your protection, if you are interested in this project, please work-out and document the requirements onsite. 1) Complete and fully-functional working program(s) in exe...

    €107 (Avg Bid)
    €107 Média
    4 ofertas
    64-bit Encryption Encerrado left

    ...imporatant is that the resulting COM object NOT require a server that has .net installed on it. (i.e. it must be called from within ASP and on Win2K and Win2K3 servers WITHOUT .net installed) Another critical element is that the encryption/decryption must be performed according to the algorithms designed in the .net classes (attached in the zip file). There is a third party who is encrypting/decrypting on their end and we must perform the opposite function on our side according to a key we decide between us. In the attached documents is a sample key. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depending on the natu...

    €90 (Avg Bid)
    €90 Média
    9 ofertas
    Decode Encryption Encerrado left

    I would like to know the process to decrypting an encrypted HTML page. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables): a) For web sites or other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condition in the Buyer's environment. b) For all others including desktop software or software the buyer intends to distribute: A software installation package that will install the software in ready-to-run condition on the platform(s) specified in this bid request. 3) Al...

    €27 (Avg Bid)
    €27 Média
    1 ofertas

    ...email with an encrypted attachment, the user should be able to click on the attachment(s) in the email client and have a "Decrypt and Save To Default Folder" option as well as a "Decrypt and Save To..." option which allows the user to save the decrypted files to a folder other than the default folder. The application should have a GUI to allow the user to set the default folder for saving decrypting files as well as to set encryption passwords, default email send method, etc. I am open to suggestions regarding the programming language, encryption protocol, etc. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run conditi...

    PHP
    €89 (Avg Bid)
    €89 Média
    3 ofertas

    ...erorr bad password if not supplied or wrong, again a fixed password hard coded in the dll. 4) Same as 3 except decrypt the string 5) This is the hardest part, if you think you can do 1-4 but not 5 please put in a bid for that as it may be that no one can do 5. This function will have these stages: a) ZIP a file b) Encrypt the Zipped files as in 1) c) create a self decrypting exe with this file for ease of distribution that will do the reverse. so when exe is run a box pops up asking for the password, as has of the password can be stored for password verification then if correct the file is decrypted and unzipped in the same folder that the .exe is being run from. The params for this function should be as so: X = createArchive(inputFile, ...

    €47 (Avg Bid)
    €47 Média
    1 ofertas

    ...the word "test" can be rendered into a complex value in order to sure a high-strength encryption. In the ARCFour project mentioned above, a hash is created, and padding is used, but there are several possible strategies that need to be considered. **Deliverables: **1) Two separate javascript files, one containing all code for encrypting, the other containing all code for decrypting, capable of encrypting and decrypting non-binary text has indicated in the requirments. 2) A simple html form with two textareas, in which sample text can be encrypted and decrypted. It should require no server-side scripting. The form should also contain test boxes that capture and display the output of the encryption and decryption process at various stages (e.g., the hash, t...

    €255 (Avg Bid)
    €255 Média
    4 ofertas

    ...basic source code or a VC++ DLL that can be used be visual basic that will open any VBA file saved in Office 2000 or higher and either decrypt the password or overwrite it with a new password that the user can specify. Such documents that use VBA passwords are Excel, Word, and Access. This code does not need to work for VBA files saved in office 97 or lower. Only 1 function is necessary: 'If decrypting password Result=GetVBAPass(Filepath) ' GetVBAPass returns a string value 'If overwriting the password Result=GetVBAPass(Filepath,NewPass, ConfirmPass) 'GetVBAPass returns a true/false value if successful. If it is not possible to let the user specify the new password, then overwrite it with a hard-coded password in the source code, and let me know what it is. ...

    €63 (Avg Bid)
    €63 Média
    6 ofertas

    ...should the .hta functionality (with less stringent security-based restrictions regarding client-side file access, and hence no permission prompts, as the main advantage). No additional interface, menus, etc. are required - process of en-/decrypting should be transparent to user. Functionality Whatever hides my code as required above, while at the same time being transparent to the user. I'm not sure how this will be done, so I am open for suggestions on functionality specifics. Platform Windows 95+ and Internet Explorer 5.5+ Constraints The process of en-/decrypting should be transparent to the user. Assumptions That this can be done at all ... ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of ...

    PHP
    €326 (Avg Bid)
    €326 Média
    3 ofertas

    ...basic source code or a VC++ DLL that can be used be visual basic that will open any VBA file saved in Office 2000 or higher and either decrypt the password or overwrite it with a new password that the user can specify. Such documents that use VBA passwords are Excel, Word, and Access. This code does not need to work for VBA files saved in office 97 or lower. Only 1 function is necessary: 'If decrypting password Result=GetVBAPass(Filepath) ' GetVBAPass returns a string value 'If overwriting the password Result=GetVBAPass(Filepath,NewPass, ConfirmPass) 'GetVBAPass returns a true/false value if successful. If it is not possible to let the user specify the new password, then overwrite it with a hard-coded password in the source code, and let me know what it is. ...

    €53 (Avg Bid)
    €53 Média
    3 ofertas
    Encryption Tools Encerrado left

    Embed encryption in the Windows Shell (The ability to right click on a file anywhere in windows to encrypt/decrypt files) *** Also, embed Shred file (overwrite 7 times with 0's and 1's) Multiple encryption algorithms (AES, DES, Triple DES, and Blowfish) Self decrypting file option (The ability to encrypt a file, give it a password, send that file via email to a friend, the friend will be able to open the file as long as they share the password knowledge.) Have a dedicated folder to store encrypted files with a password prompt to enter the folder. (User has option to store here or anywhere) Password Manager (A password-protected program that will store unlimited usernames, passwords, and associate them to websites…) ## Deliverables 1) Complete and fully-functional...

    €302 (Avg Bid)
    €302 Média
    23 ofertas
    Secuirty Check1 Encerrado left

    I currently have an employee that has worte me an encyption program. I would like to see if anyone can crack and decrypt the encrypted exe. I am looking to see how strong or weak the encryption is before I go in front of my clients. I am sorry I cant provide more information. If you are successful in decrypting the exe I will send you a bonus of 200$ ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Installation package that will install the software (in ready-to-run condition) on the platform(s) specified in this bid request. 3) Complete ownership and distribution copyrights to all work purchased. ## Platform Windows

    €20 (Avg Bid)
    €20 Média
    13 ofertas

    ...information to a text file. 4. Zip the local textfile and send it to a unique directory on a remote server (running PHP and mySQL, not ASP) that reflects the user of the access database. The application I will get you to work on (if successful here) is a multiuser app - so each user's information needs to be kept separate. 5. Insert the data into mySQL (remote server) by unzipping the text file, decrypting the data, and transferring the unencrypted data into the mySQL database. 6. Update the local AccessDB to ensure only incrementally added records are transferred in the next synchronization. 7. Create a very basic report server side to show that the data has been uploaded correctly. you will also need the skills to: 8. Update administration defined tables on the local Acces...

    €65 (Avg Bid)
    €65 Média
    5 ofertas
    RSA Project in C Encerrado left

    ...Decrypt - Take a ciphertext and perform RSA decrypt on it § Factor - Implements a factoring heuristic to factor large (in excess of 50-digit) numbers. Grading A perfect score depends on if you adequately implement the following: 1) Finding and multiplying two hundred-digit prime numbers to generate a 200-digit RSA public key and a corresponding secret key. 2) Encrypting, using the public key, and decrypting, using the secret key, a sample message. To show that the algorithm is implemented properly, it is sufficient to show that E(D(m)) = D(E(m)) = m. 3) Write a program for factoring large numbers using some factoring heuristic. Determine the average and worst-case times for factoring 40-digit keys. Tell what variables affected these times. 4) Show that a 50-digit (167-bit) k...

    €122 (Avg Bid)
    €122 Média
    7 ofertas
    RSA Project in C/C++ Encerrado left

    ...Decrypt - Take a ciphertext and perform RSA decrypt on it § Factor - Implements a factoring heuristic to factor large (in excess of 50-digit) numbers. Grading A perfect score depends on if you adequately implement the following: 1) Finding and multiplying two hundred-digit prime numbers to generate a 200-digit RSA public key and a corresponding secret key. 2) Encrypting, using the public key, and decrypting, using the secret key, a sample message. To show that the algorithm is implemented properly, it is sufficient to show that E(D(m)) = D(E(m)) = m. 3) Write a program for factoring large numbers using some factoring heuristic. Determine the average and worst-case times for factoring 40-digit keys. Tell what variables affected these times. 4) Show that a 50-digit (167-bit) k...

    €231 (Avg Bid)
    €231 Média
    8 ofertas

    ...encrypt/decrypt files/folders automatically and transparently as you use them; files must be completely invisible to others; password protected files cannot be viewed,modified or deleted; strong encryption should ensure that files are not only undetectable but uncrackable as well; encrypted files should be hidden within other files( image files) ; any file type can be secured even exe files; self-decrypting executable files can be transferred (via email,floppy,etc) and decrypted by entering specific key given by sender; this must be a true secure program - which means no bypassing by going to safe mode, or selective start-up or dos startup,etc.; built-in multi-image viewer; built-in mp3 player; drag and drop encryption; files can be read-only on a drive with any file system(NTFS ...

    €432 (Avg Bid)
    €432 Média
    21 ofertas
    Dvd Extractor Encerrado left

    I need a software that will rip and entire dvd to the hard drive (decrypting it first) and then down size the vob files if necessary to fit on a 4.7 gig dvd+r, dvd+rw, or dvd-r, dvd-rw. This is more complicated than it looks so please don't put in a bid unless you KNOW you can do this. The goal for this software is to allow people to back up their dvds with their dvd burners, keeping menus and extra items and such intact. ## Deliverables Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. Complete copyrights to all work purchased. ## Platform All MS Windows 9x and up.

    €350 (Avg Bid)
    €350 Média
    3 ofertas