Microchip encrypted bootloader jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 microchip encrypted bootloader jobs found, pricing in USD

    I'm in need of a skillful deve...received an email from TNT ... quote There is a change coming to the TNT RTT API, this is what you use to get pricing for shipping on your online store or internal system. Please have this email directed to whomever controls the online portal: You are currently using the ASP version of the RTT service, and we need customers to move to our .NET version. This will require that the XML payload is URL encrypted, note there is no change to the content of the XML just how it is presented. I have included the newer spec doc but it should be a simple process. endquote I am at a loss on how to update or replace this extension. The links in the email take me to a blank page. The attachment is confusing, but you might be able to make sense of it. What el...

    $4 / hr (Avg Bid)
    $4 / hr Avg Bid
    9 bids

    I am seeking a skilled developer to upgrade our Tsmdc Telangana Sand Booking Extension Portal website. The main goals are to increase efficiency and enhance security. Key Additions a... Experience in security features like two-factor authentication and data encryption is a plus. A portfolio showcasing previous similar projects would be highly advantageous. Security Enhancements: - **Two-factor Authentication:** Implement a robust two-factor authentication system to enhance security and protect user accounts. - **Encryption of Sensitive Data:** Ensure that sensitive data is encrypted and secured to prevent any unauthorized access. I am looking for a professional with expertise in web development, particularly in creating and integrating online payment systems, developing mobile ap...

    $19 / hr (Avg Bid)
    $19 / hr Avg Bid
    8 bids

    I'm in need of a skillful ...received an email from TNT ... quote There is a change coming to the TNT RTT API, this is what you use to get pricing for shipping on your online store or internal system. Please have this email directed to whomever controls the online portal: You are currently using the ASP version of the RTT service, and we need customers to move to our .NET version. This will require that the XML payload is URL encrypted, note there is no change to the content of the XML just how it is presented. I have included the newer spec doc but it should be a simple process. endquote I am at a loss on how to update or replace this extension. The links in the email take me to a blank page. The attachment is confusing, but you might be able to make sense of it. What el...

    $525 (Avg Bid)
    $525 Avg Bid
    94 bids

    ...Moderation - **4.1 Managing Posts** - Admins can delete any reviews deemed inappropriate or not compliant with platform policies. - Admins can perform CRUD operations on posts to edit or update details as needed. General System Requirements - **Security** - Implement secure authentication and authorization mechanisms. - Sensitive data such as user emails and phone numbers should be encrypted. - **Performance** - The system should handle multiple users simultaneously without significant performance degradation. - **Scalability** - The system should be scalable, capable of handling an increased load of users and data entries as the platform grows. - **Usability** - The interface should be user-friendly and accessible on multiple devices, including smartphones and...

    $240 (Avg Bid)
    $240 Avg Bid
    90 bids

    I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption methods

    $160 (Avg Bid)
    $160 Avg Bid
    38 bids

    I'm looking for an experienced developer to create a web-based application focused on real-time fund transfers using UPI protocols. ...efficiently. - **User Interface Elements**: The key focus here should be on an interactive transaction history. Users should be able to easily track and monitor their transactional activities within the app. - **Security Features**: Implementing two-factor authentication is non-negotiable. Please ensure that the application is extremely secure, and that all data associated with transactions is encrypted and protected. Ideal candidates should have prior experience in developing applications that handle financial transactions and have a strong understanding of UPI protocols. An eye for user experience and a keen sense of security are crucial fo...

    $216 (Avg Bid)
    $216 Avg Bid
    14 bids

    I need a program developed for a microchip aimed at controlling industrial machinery. - The program should focus on device control, ensuring seamless operation and management of the machinery. - The ideal candidate for this task should be proficient in microcontroller programming, particularly in the context of industrial applications. - Familiarity with industrial machinery and relevant safety standards in this field is highly desirable. - Candidates with a background in device control systems are strongly encouraged to apply.

    $909 (Avg Bid)
    $909 Avg Bid
    32 bids

    I need ...role will entail implementing encryption on our data. Key Responsibilities: - Generate an encryption key. You’ll be responsible for creating a robust and secure encryption key. - Implement Database Encryption. Utilise your Django expertise to seamlessly integrate encryption without compromising the performance or accessibility of our database. - Maintain Data Format. It is critical that the encrypted data retains its original format. Ensure that no distortions occur during this process. Ideal Skills: - Proficient in Django - Knowledgeable in database structures and encryption - Proven ability to generate secure encryption keys - Experience in ensuring data integrity during encryption If you have the above skills and can provide high-quality results, I look forwar...

    $74 (Avg Bid)
    $74 Avg Bid
    10 bids

    ...device, so I will likely need help setting up LaunchPad, or bringing up the code in my own developer environment for self-install. The traffic capture going on is literally equivalent to what is already being done in published and approved App Store applications. I will only be capturing my traffic, so it is not confidential. No, this app will not be able to break encryption and decrypt securely encrypted data. (Freelancer requires me to make this statement explicitly in the project description because they have genuinely no idea how encryption actually works on a technical level.) Required skills: - Knowledge of an iOS app implementation language (ObjC or Swift) - Experience developing robust, well-functioning apps (buffering and saving data, stable without crashes, etc) - Mus...

    $503 (Avg Bid)
    $503 Avg Bid
    45 bids

    ...of a professional to help me fortify the security of the videos on my WPLMS website. Currently using IDM, students can download videos. My client DOES NOT wish to use any 3rd party Video hosting services like YouTube, Screen Pal etc. All videos should get hosted in the website hosting account Key Requirements: - Implementation of Video Encryption: I need the videos on my WPLMS website to be encrypted to prevent unauthorized downloads. This is a crucial aspect of the project and must be handled with the utmost care and expertise. - Domain-Level Access Restrictions: I am also considering implementing domain-level access restrictions as an additional layer of security. This, combined with video encryption, will help in preventing unauthorized access and downloads. Specifics: - T...

    $95 (Avg Bid)
    $95 Avg Bid
    94 bids

    ...happened, a malicious executable was automatically installed on the user’s computer and quickly crawled the entire network, encrypting data. By the time the systems administrators discovered the nature of the attack, it was largely too late. Critical files all across the AvantPharm network had been encrypted and were unusable. To make things worse, the backup system in place was unmonitored and had been failing backup jobs for months, so they did not have a reliable way to restore the encrypted data. AvantPharm narrowly averted complete disaster by paying the attackers one of the largest ransomware payments in history; 25 million dollars. However, they nearly lost the business when the attacker took 2 full weeks to return control of their data as well, so the impact ...

    $19 (Avg Bid)
    $19 Avg Bid
    95 bids

    I need help recovering encrypted documents from my partially operational server. The server is currently inaccessible, but I have a complete backup of the affected files. The files are encrypted, and I need them recovered in their original format. Key Requirements: - Specialized in encrypted file recovery - Proficiency in data recovery from partially operational servers - Experience with document recovery and decryption It's important that the freelancer has the necessary skills and tools to recover the encrypted documents from my server without causing any further damage. The recovered files should be in their original, uncorrupted format.

    $120 (Avg Bid)
    $120 Avg Bid
    5 bids

    ...skilled .NET Core and Angular developer to collaborate on the creation of a secure, on-demand video playback platform. Here are the key features required for the project: - **Video Streaming:** The platform will facilitate hosting and streaming of pre-recorded videos. Live streaming functionality is not necessary. - **Video Encryption:** Ensuring the security of the content, all videos must be encrypted to prevent unauthorized access. - **Secure Playback:** It's imperative that users cannot download videos through inspect elements or any other means, ensuring the integrity of the content. - **User Registration and Authentication:** The platform should offer robust user registration and authentication functionalities, allowing users to create accounts and log in securely. P...

    $89 (Avg Bid)
    $89 Avg Bid
    20 bids

    ...video playback platform with the following features: Note : If you already have sample demo project, in which users cannot download videos through inspect element using any option. Please connect me immediately. • Video Streaming: The platform will host and stream pre-recorded videos. No live streaming is required. • Video Encryption: To prohibit unauthorized access, the videos need to be encrypted. • Secure Playback: It's crucial to me that users won't be able to download videos through inspect elements or any other methods. • User Registration and Authentication: The platform should allow users to register and log-in. Prior experience with video streaming apps will be a definitive plus. Your bid should include a realistic time frame. I apprecia...

    $123 (Avg Bid)
    $123 Avg Bid
    16 bids

    I'm looking for an expert in website development, specifically utilizing Drupal, who can integrate a user registration and login feature into my website. Key Requirements: - Develop user registration and login functionality with a simple and straightforward approach. The process must be intuitive yet secure. - Ensure user data is safe, by implementing encrypted database storage. Knowledge of data encryption methods and understanding on how to implement them is crucial. Ideal Skills: - Drupal Web Development - User Registration/Login Implementation - Database Encryption Techniques - Knowledge of User Privacy Measures I am open to suggestions on how to make this process as easy as possible for users without compromising on security. Your expertise and understanding of buildin...

    $495 (Avg Bid)
    $495 Avg Bid
    206 bids

    I'm looking for an experienced firmware developper to build an STM32 for a board based on STM32G0 MCU, The firmware shall manage interruption between button and sensors, enter into bootloader mode on an interruption on the serial port (RS232), the firmware shall manage a state machine based on sensors input and go to sleep mode when no interruption occurs. More details will be shared later

    $172 (Avg Bid)
    $172 Avg Bid
    33 bids

    I am seeking a highly experienced developer to create a quantum encrypted crypto wallet, cbdc exchange, and p2p transactions. The core feature of this wallet will be its ability to securely make transactions with cryptocurrencies. The wallet needs its functionality to be accessible both as an app and a website. The app should be compatible with both Android and iOS platforms, thus requiring proficiency in cross-platform app development. Key quantum encryption technologies for integration include: - Quantum Key Distribution (QKD): To ensure secure encryption keys are used. - Quantum Side-Channel Attacks Protection: To ensure robust defense mechanisms against potential quantum attacks. - Quantum Secure Direct Communication (QSDC): To allow direct transfer of cryptocurrency ...

    $4599 (Avg Bid)
    $4599 Avg Bid
    32 bids

    This job requires an experienced Mechanical Engineer for a specialized analysis and troubleshooting project. Phase 1: Data Collection and Processing The initial phase entails gathering crucial data fr...will be examined and potential failure modes will be investigated. Based on expected corrosion rates, incremental thickness loss progression of the tank walls can be incorporated into the shell finite element model. Based on the failure mode, an investigation into time to failure predictions will be investigated. All finite element simulations and prediction data estimates will be stored on an encrypted hard drive. I wil provide the Matlab code of the tank model and geometry description. Please message me with previous work example and proper explanation of the work that how will ...

    $708 (Avg Bid)
    $708 Avg Bid
    26 bids

    With an aim to leverage the power and efficiency of HL7 for hospital usage, I need a proficient developer to create a secure server that is cloud based. The server should be crafted in a way that integrates HL7, placing a strong focus on data security, as we will be storing confidential patient information. Key tasks to undertake include: - Implementing encrypted data storage and retrieval, ensuring integrity and confidentiality of patient data. - Setting up HL7 message parsing and processing, enhancing data interoperability. - Facilitating user authentication and access control via role-based access control, limiting system access to authorized personnel only. To meet these tasks, you should bring a proven familiarity with encryption methods and SSL/TLS certificates to secure ...

    $133 (Avg Bid)
    $133 Avg Bid
    11 bids

    I am looking for an accomplished app designer, experienced with IOS and Android, with the main functionality being the management of electronic signatures and encrypted QR codes. Additional Features: * User login * File Sharing * General Validations * Location Identification Your skillset should ideally include a working knowledge of these features, as well as a keen eye for intuitive design. I do have a design in mind for the application and your input and recommendations to bring this vision to life will be appreciated. The application is intended for general users, thus the interface and functions should be user-friendly and easy to understand. Applicants who can showcase previous work involving similar functionalities would be viewed favourably. Your creativity, reliabili...

    $2351 (Avg Bid)
    $2351 Avg Bid
    125 bids

    ...enhance the project's efficiency and security. requirements are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you should connect with ibm quantum...

    $293 (Avg Bid)
    $293 Avg Bid
    27 bids

    I'm seeking a proficient programmer to translate a short program (approx 1000 lines) written in assembler to C code for a PIC16. The task will require: - creat... - ...replace goto statements with C type loops (for, while, do) and function calls. - adding comment blocks ahead of each function with some notes of what the code is doing. - check where the global variables are actually used and where possible change scope to a local variable. - create the main() function - add comments for anything that looks like a bug or incorrect. - compile code using Microchip XC8 compiler and resolve any errors. Testing /. debugging on hardware is not part of the scope. We will run it here and see if the operation looks close to the original. Please see the attached document for a secti...

    $341 (Avg Bid)
    $341 Avg Bid
    38 bids

    For this task, I am seeking an expert with a deep understanding of programming a PIC16F877A microchip. The primary responsibility for this role is to support data acquisition from infrared signal decoder sensors. Specifically: - Experience programming PIC16F877A microchip is a must. - Knowledge in infrared signal decoder sensors for data acquisition integration. - Manage the sensor data interpretation logic. - The main output I'm looking for is accurate and smooth reading and decoding of data from the sensors. Your skill in the task will provide a foundation for accurate data readings and optimal functionality. Specialty in sensor technology is a high preference. Be ready to showcase your similar previous projects. Let's make this a success.

    $165 (Avg Bid)
    $165 Avg Bid
    24 bids

    I am seeking a proficient coder with experience in Android app development, End-to-End Encryption, and Firebase to secure my chat application using Virgil Security SDK. Key requirements include: - Integration of End-to-End Encryption: App already supports sending and receiving messages. The challenge is ensuring this process is safely encrypted without disrupting the user experience. - Retaining Real-time Chat Functionality: The encryption layer must not affect the current Real-time chat functionality. Capacity to handle this is critical. - No Interface Changes: This project focuses purely on backend security. Explicit indicators for encryption are not needed. Ideal candidates will have a track record of successful encryption integrations on mobile applications. Experience ...

    $318 (Avg Bid)
    $318 Avg Bid
    32 bids

    I'm looking for a skilled data entry specialist with experience using the Riot Games API. My project involves finding new Twitch streamers, cataloguing their Twitch Channel URL and gaming accounts. Specific data points required include encrypted puuid, league account region, game name, tagLine, and encrypted summonerId. Responsibilities: - Add new Twitch streamers to database by searching internet - Manage streamer profiles by updating vital information Ideal Skills and Experience: - Experience with Riot Games API - Experience with data entry - Knowledgeable about Twitch and gaming statistics - Ability to present data in table format Understanding of Twitch and the gaming industry would be advantageous. Accuracy, attention to detail, and punctuality with tasks are...

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    17 bids

    Here's what I'm specifically looking for: A bot that buys and sells solana tokens. Setup the wallet in the bot, either securely create wallet or import PK We send by post/get instructions on buying and selling tokens 1. we need a secure encrypted wallet (possibly have a wallet generation on the bot, or pass it a Private KEY - whatever is easier) 2. we can buy or sell automatically by sending the wallet address,contract address, amount in sol, slippage, gas parameters. by POST or GET 3. we should be using the popular dex such as raydium,jupiter etc. (dex that memecoins are usually located for fast swaps) 4. when the transaction goes through, we need to send back results such as TXID, price, and fees etc, so we can log things. Implementation within a month is idea...

    $274 (Avg Bid)
    $274 Avg Bid
    20 bids

    ...pricing structure may vary based on the duration of the chat or other criteria determined by the admin. 3. *Gift Requests*: Similar to a girlfriend, AI Infused can request gifts from users. These gifts may include virtual items, tokens, or real-world products. 4. *Privacy and Security*: The chat room will prioritize user privacy and data security. Personal information shared during chats will be encrypted and stored securely. 5. *Emotional Responses*: AI Infused will be programmed to provide empathetic and emotionally engaging responses, enhancing the user experience and mimicking a real-life relationship dynamic. 6. *Customizable Interactions*: Users may have the option to customize interactions with AI Infused, such as setting preferences for conversation topics, tone, and ...

    $150 (Avg Bid)
    $150 Avg Bid
    12 bids

    ...compatible with iOS, Android, and Web platforms. Key project requirements: - High video quality: The SDK should support high-definition video calls to ensure clear and crisp visuals for users. - Low latency: It is crucial for the video call experience to be smooth and without any perceptible delay. The SDK should be able to maintain a low latency level to ensure real-time communication. - Secure and encrypted communication: Data security is a top priority for my application. The video call SDK should have robust security features to keep all calls secure and private. Additional features: - Recording capabilities: One of the key functionalities I would like to include is the ability for users to record their video calls. This feature should be seamlessly integrated into the SDK...

    $723 (Avg Bid)
    $723 Avg Bid
    17 bids

    I require the following task to be completed: STEP ONE: TAKE TWO ARGUMENTS; INPUT AND INDEX. if INDEX is undefined; then do the following: CALCULATE (DO NOT USE BRUTEFORCE); the alphabetically sorted set of the string in order of all its variances in...ONE: TAKE TWO ARGUMENTS; INPUT AND INDEX. if INDEX is undefined; then do the following: CALCULATE (DO NOT USE BRUTEFORCE); the alphabetically sorted set of the string in order of all its variances index and store the index. STEP TWO: Find the string with the most repititions. Return the index and string with most repitions. If INDEX is defined; then do the following. CREATE THE STRING FROM THE ENCRYPTED STRING AND INDEX. Return the original String,. Please only post a quote if you are capable of doing this job! Sorry I can only pa...

    $23 (Avg Bid)
    $23 Avg Bid
    26 bids

    I am in urgent need of a decryptor tool to recover my files that have been encrypted by a virus. My all files are encrypted with ".mkp" Unfortunately, I do not have any backups of these files, so the tool needs to be able to decrypt them directly. Key Requirements: - The tool must be compatible with Windows OS - It should be able to quickly and effectively decrypt files with the .mkp extension Experience Needed: - Proficiency in software development and security - Experience in creating decryption tools is highly preferred - Ability to work quickly and effectively to meet the immediate deadline Please only bid on this project if you are confident in your ability to meet these requirements and can deliver the tool within the specified timeframe.

    $12 (Avg Bid)
    $12 Avg Bid
    1 bids

    I'm seeking an expert who can decrypt an AES encrypted .cap file. The file contains encrypted data I need to access for educational purposes. Key requirements include: - Expertise in decrypting AES encrypted files - Ability to efficiently and securely recover the data from the .cap file - Strong commitment to data privacy and confidentiality Please provide examples of similar work you have done in the past, and outline your proposed approach to this task.

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    16 bids

    ...cryptocurrencies, indicator settings, automatic trade execution, and now, enhanced security measures and transaction logging. --------- Key Features 1. Binance API Management Purpose: Ensure a secure connection and management of Binance API keys, with a focus on advanced security. Functionality: Secure addition, editing, and removal of API keys. Testing of API connectivity and permissions. API keys are encrypted and securely stored, inaccessible to developers or unauthorized personnel. 2. Crypto Management Purpose: Handle the roster of cryptocurrencies that the platform is authorized to trade. Functionality: Add new cryptocurrencies. Edit settings for existing cryptocurrencies (e.g., trading limits, associated indicators). Remove cryptocurrencies. 3. Indicator Settings Purpose: E...

    $596 (Avg Bid)
    $596 Avg Bid
    59 bids

    I am seeking an expert who can reverse engineer an APK file. the main idea is to know how to call the API from Postman as the API request has signature and the response is encrypted. the signature and the decryption happen inside the APK APK Link: This APK is coded in Java and your primary task will be to decipher the APK's code structure for a comprehensive understanding. Note that documentation is not required after reverse engineering. Experience in Java and advanced reverse engineering techniques are primary skills that you should possess. Good communication will be an important advantage because I might need to understand complex operations during the process. Thanks for considering this project.

    $470 (Avg Bid)
    $470 Avg Bid
    66 bids

    I'm seeking an expert in PIC microcontroller to assist in converting an existing embedded project. The primary goal of this conversion is to replicate the functionality of an existing project on a sister PIC chip. The original project was to create an Ethernet to Serial functionality on the Microchip Ethernet Starter Kit. This functionality was achieved. Now the objective is to move that project to a physically smaller PIC chip of the same family. A new custom daughterboard has been built. Some programmers are thinking to start over with the new chip. I believe this is an uncertain way forward. My request is to convert the existing project rather than start over. I am open to your suggestions. It's essential that interested freelancers have a strong background i...

    $322 (Avg Bid)
    $322 Avg Bid
    19 bids

    ...following guidelines: 1. Your program should accept any file type as input (e.g., .docx, .jpg, .xlsx, etc.). 2. Depending on your chosen encryption algorithm, the program must split the input file into appropriate blocks for encryption. 3. Encrypt the file's extension and append it to the last block of encrypted data. 4. Add a new, algorithm-specific extension to the encrypted file. For example, if you use an algorithm named "X", you might append ".bwf" or another unique extension to the encrypted files. 5. Ensure that your decryption process accurately recovers the original file, including its correct extension. The decrypted file should be identical to the original input file in every aspect. Topics for Approach 1: Implementation o...

    $113 (Avg Bid)
    $113 Avg Bid
    45 bids

    ...following guidelines: 1. Your program should accept any file type as input (e.g., .docx, .jpg, .xlsx, etc.). 2. Depending on your chosen encryption algorithm, the program must split the input file into appropriate blocks for encryption. 3. Encrypt the file's extension and append it to the last block of encrypted data. 4. Add a new, algorithm-specific extension to the encrypted file. For example, if you use an algorithm named "X", you might append ".bwf" or another unique extension to the encrypted files. 5. Ensure that your decryption process accurately recovers the original file, including its correct extension. The decrypted file should be identical to the original input file in every aspect. The algorithm chosen is AES...

    $132 (Avg Bid)
    $132 Avg Bid
    51 bids

    I'm seeking an expert in Python to develop a decryption utility tool. The purpose of this tool is to decode encrypted messages, binary files, and encoded data, helping me simplify and expedite data analysis tasks. The ideal candidate will: • Have substantial experience with Python programming. • Be familiar with various encryption algorithms, notably AES, RSA and DES. Your expertise in these will be key to the successful creation of this utility. • Be committed and focused, as the tool must be completed ASAP. Looking forward to receiving bids from suitable and interested freelancers. Please, when bidding, include any relevant experience and examples of similar projects.

    $21 (Avg Bid)
    $21 Avg Bid
    77 bids

    I'm urgently looking for an expert who can effectively implement a keylogger between an APK with Kotlin base and a Golang server. The primary purpose is to enhance security; therefore, an ideal candi...Golang server. The primary purpose is to enhance security; therefore, an ideal candidate must have an intricate understanding of both Kotlin and Golang, and a demonstrated capability in system security improvement. Your task will be to build this keylogger ensuring secure communication and activity between the server and APK. Though unspecified, the implementation may include features such as encrypted logs, remote monitoring, etc., depending on what you believe will maximize security. Turnaround time is crucial, as I am looking for an immediate commencement and swift completion ...

    $26 / hr (Avg Bid)
    $26 / hr Avg Bid
    38 bids

    ...products, then put his address files in etc. and finally the bot needs to create a crypto invoice for the cryptocurrency of choice at current price and wait for payment confirmation from the crypto pay gate. Finally, once the order is confirmed, the bot needs to process all order information into a .txt or .csv file and save it locally on the machine. The script should also be able to decrypt PGP encrypted address information automatically. 2) Some sort of APIs between the bot script and all the messengers desktop sessions listed above that allow the bot script to communicate with each messenger. The purpose of this is to allow running regular non-business, non-shop affiliated messenger accounts as effective bot shops. I do NOT want to use shop-affiliated infrastructure such as ...

    $2746 (Avg Bid)
    Featured
    $2746 Avg Bid
    37 bids

    I need an ETL developer to streamline and automate an existing manual process. This includes: - Transferring two encrypted *. files from a source server to a local machine. - Decrypting these files into *.csv format. - Running SQL on one file and a PowerShell command on the other file to create a staging table. - Setting up a Microsoft SQL Server database into read-write mode from read-only. - Reverting the database back to read-only upon task completion. - Sending a report to the user upon task completion. Ideal skills for this job include advanced SQL, PowerShell, and ETL development. Familiarity with read/write permissions on Microsoft SQL Server and experience with data transfer and encryption/decryption processes are also highly beneficial.

    $34 (Avg Bid)
    $34 Avg Bid
    17 bids

    ...user profile based consulting website where one can connect with other user and also charge for his/her time. Below are the few features which I would like: • User Registration and Registration fees option – Option to register as a User or Consultant • Chat Enabled where the user can pay and initiate chat with other consultant • Pay and Call Enable through Website and calls are recorded and encrypted • International Payment Options • Multi Filter Search option where user can shortlist consultants based on reviews, Background, experience, location etc • Email/Mobile Verification • Account Verification through Documents for consultants only then the account goes live • Consultant Ratings by the other users who have used their consult...

    $1032 (Avg Bid)
    $1032 Avg Bid
    38 bids

    ...adjustments. 5. **Refer and Earn Page Enhancement:** Improve the refer and earn page functionality by enabling users to submit one or more mobile numbers as references. This requires modifications in both frontend and backend/server-side scripting. 6. **Contact Encryption and Storage:** Develop a feature to read contacts, encrypt them using mobile numbers as keys, and securely store them in an encrypted format in a MySQL database on the server. 7. **VAT to GST Replacement:** Replace all instances of the term "VAT" with "GST" throughout the project, including Android, iOS, and PHP components. (Only replace the display word "VAT" with "GST") **Deliverables:** - Detailed documentation/logs of all modifications made. - Full modified source ...

    $70 (Avg Bid)
    $70 Avg Bid
    5 bids

    ...but the project contains a few important decisions to take. I plan to continue this project in the future and I want you to choose platforms and tools which are easy to work with. You will also build a basic CI/CD to allow fast testing and deployment in the future. This project includes several components: 1. **Backend**: Create a basic python backend using FastAPI. The backend should support encrypted communication. 2. **Chrome Extension**: User can send textual page content to the server to be logged in a database. In the database, text is indexed by user-id and url. 3. **User Authentication**: The extension will use Google sign-in for user authentication. 4. **Deployment**: You will choose a deployment setup which is easy to manage. I don't care about scale. 5. **CI...

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    92 bids

    ...installation documents. 4. **Refer and Earn Page Enhancement:** Enhance the refer and earn page functionality by allowing users to submit one or more mobile numbers as references. This necessitates both frontend and backend/server-side scripting. 5. **Contact Encryption and Storage:** Develop a feature to read contacts, encrypt them using mobile numbers as keys, and securely store them in an encrypted format in a MySQL database on the server. 6. **VAT to GST Replacement:** Replace all instances of the term "VAT" with "GST" throughout the project, including Android, iOS, and PHP components. 7. **Android Application and Server-side Script Modifications:** Perform necessary modifications on the Android application and server-side scripts to accommodate additi...

    $18 - $150
    Sealed
    $18 - $150
    11 bids

    I'm looking for a professional who has experience in editing encrypted PDF documents. The ideal candidate will need to: - Carry out text edits - Conduct image alterations - Perform page restructuring The purpose of the edits include: - Error correction - Introducing new information - Sensitive information redaction Given that the security of the document post-edit is critical, the freelancer must have robust practices in place to maintain document integrity. Demonstrable experience working with sensitive PDFs and a strong understanding of encryption is highly beneficial for this project.

    $12 (Avg Bid)
    $12 Avg Bid
    48 bids

    ...address and thread count, a dynamic mining status dashboard, and potentially advanced settings for experienced users. Commitment to ensuring broad compatibility with Android OS 7.0 (Nougat) and later versions, optimizing for minimal battery consumption and thermal management to prevent device overheating. Implementation of state-of-the-art security practices for sensitive data protection, including encrypted storage for wallet addresses and secure API calls. Compliance with all legal and regulatory standards applicable to cryptocurrency mining applications, ensuring adherence to Google Play Store policies. Deliverables: Well-structured and commented source code hosted in a private GitHub repository, adhering to best coding practices for maintainability and scalability. A fully f...

    $1500 - $3000
    Featured Sealed NDA
    $1500 - $3000
    11 bids

    ...facilitate patient-doctor interaction and diagnosis. - Online booking: Scheduling appointments and reminders. - Prescription Management: Ensuring organized and efficient handling of prescriptions. - Chat: Secure real-time messaging for instant communication between doctors and patients. - Document Management: A system for uploading, managing, and securing sensitive patient documents. - Online payment: Encrypted payment provisions for services rendered. - Doctor profile management: Allowing doctors to manage their professional profiles. The ideal applicant should have experience in developing intricate web platforms, has a solid understanding of healthcare systems, excellent knowledge of cyber-security, a high proficiency in user-experience design, and a notable portfolio showcas...

    $180 (Avg Bid)
    $180 Avg Bid
    15 bids

    ...Setup Wizard:** Guided setup process for connecting and configuring new devices. - **Help and FAQs:** In-app support for troubleshooting and guidance on how to use the app and its features. - **Software Updates:** Regular updates to support new devices, improve features, and fix bugs. ### 8. **Security and Privacy** - **Secure Connection:** Ensure data transmission between the app and devices is encrypted and secure. - **User Data Protection:** Transparent policies on how user data is collected, used, and protected. ### 9. **Additional Value-Added Services** - **Widgets:** For quick access to remote functions directly from the home screen without opening the app. - **Multi-Device Management:** The ability to control multiple TVs or devices from within the same app interface. I...

    $245 (Avg Bid)
    $245 Avg Bid
    14 bids

    I need a bootloader for the STM32H750B-DK development board. The bootloader must be written with STM32CubeIDE and must contain the .IOC file When the board is turned on, if there is a valid application in the board's QSPI memory (dual bank), it starts it If there is no valid application or if the "user" key is pressed, the bootloader must allow the loading of a new firmware (.xip file) from the PC to the QSPI memory (dual bank) via USB CDC Once the file has been uploaded, you must launch the application It is sufficient that we establish a serial communication protocol, I will take care of creating the PC software for choosing and sending the .xip file to be sent to the board.

    $205 (Avg Bid)
    $205 Avg Bid
    15 bids