Suodata

Viimeisimmät hakuni
Suodatusperuste:
Budjetti
asti
asti
asti
Tyyppi
Taidot
Kielet
    Työn tila
    5,000 encryption löydetyt työt
    c programme
    Loppunut left

    Your task is to design automated solvers for the shift and Vigen`ere ciphers. You must use C as the underlying programming language, in order to get prepared for the following assignments. Each solver should be completely automated, i.e., upon reading a text file containing the target ciphertext (given as command-line argument), it should print the encryption key and the decrypted plaintext without any user interaction. Test your code on the following ciphertexts, and answer these questions: (a) What is the key of the cipher? (b) What is the decrypted plaintext? Ciphertext 1 (shift cipher) ODKBFAXASKBDQEQZFEMPURRUOGXFKZAFRAGZPUZZADYMXMOMPQYUOPUEOUBXUZQEFTQZQQPRADFTQBDABQDUZFQDM OFUAZARODKBFASDMBTKMZPODKBFMZMXKEUEFTUEMDUEQEAGFARFTQRMOFFTMFUZFTQMNEQZOQARDQMXOAYYGZUOMF UAZEDQCGUDQYQZ...

    €100 Average bid
    €100 Keskimäär. tarjous
    9 tarjoukset
    Engineering Firm Website Refresh
    6 päivää left
    Varmennettu

    ...Engineering capabilities—erosion-control design, site and hazard inspections, and overall project-management services—while remaining easy for prospects to navigate. Scope of build • Pages: Home, About Us, Services and Contact. • Design: sleek, corporate aesthetic with intuitive navigation, crisp typography and imagery that reflects engineering precision. • Security: full-certificate SSL encryption across every page plus a locked, client-only portal where large drawings and reports can be shared safely. • Payment: integrated credit-card checkout (Stripe or comparable), ready to accept one-off transactions for inspection fees and report purchases. • Social: seamless links to our LinkedIn, Facebook and any additional channels we decid...

    €410 Average bid
    €410 Keskimäär. tarjous
    224 tarjoukset

    ...clean, intuitive UI/UX with responsive layouts. • Implement essential e-commerce functions: product catalogue, search & filters, shopping cart, checkout, user accounts, order history, and an admin dashboard for inventory and content management. • Integrate secure payments (Stripe, PayPal, or equivalent) and ensure full PCI compliance. • Set up authentication, role-based access, and data encryption best practices. • Include unit tests, basic end-to-end tests, and clear documentation so another dev can pick up the codebase without guesswork. • Containerise or script deployment—Docker, AWS, or an equivalent cloud service—so I can launch with a single command. Acceptance criteria 1. All listed features function seamlessly on the...

    €114 Average bid
    €114 Keskimäär. tarjous
    27 tarjoukset

    ...Data • Membership ID • Membership history • Office assignment Activity Data • Participation in events • Education/training history • Contribution records Sensitive files may include identity document photos and profile photos, which must be securely stored. Security & Design Requirements The system must follow good engineering practices. • Secure storage of sensitive data • Encryption where appropriate • Clean modular architecture • Clear separation of modules/domains • Scalable system design • Audit logging and traceability • Production-ready code standards What We Need From the Freelancer We are looking for help with architecture design and possibly development. Initial resp...

    €8089 Average bid
    €8089 Keskimäär. tarjous
    176 tarjoukset

    ...filing cabinets and into a secure, cloud-based repository. The goal is clear: cut document-retrieval time in half and stop generating paper altogether within the next three months. Scope of work • Audit and digitise existing financial records, naming and indexing them for quick search. • Configure a cloud platform of your choice (e.g., Google Workspace, Microsoft 365, AWS, or similar) with encryption enabled at rest and in transit. • Lock access down to admin-only permissions; no general or role-based visibility is required. • Create an intuitive folder or tagging structure so authorised staff can locate any record in under 30 seconds. • Provide a concise admin guide and a short video or live demo so we can maintain the system after hand-over...

    €17 / hr Average bid
    €17 / hr Keskimäär. tarjous
    16 tarjoukset

    ...Fingerprint • Facial recognition Optional future capability: • Iris recognition Note: biometric capture devices are not part of this project. System Scale The platform must support: • 30–33 million citizen identity records • High-volume authentication requests • Future scalability up to 50 million citizens Security Requirements Due to the sensitive nature of identity data, the system must include: • Encryption of personal data • Multi-factor authentication • Role-based access control • Secure API integrations • Full audit logging • Security monitoring Required Deliverables The selected vendor must provide: • Government Administration Dashboard • Citizen Web Portal • Android Mobile Application • iO...

    €50206 Average bid
    €50206 Keskimäär. tarjous
    22 tarjoukset

    Project Description Highlights The Mission: We are building "QuantumShield," a high-performance, user-friendly desktop application that protects sensitive SMB data against "Harvest Now, Decrypt Later" threats using standardized Post-Quantum Cryptography. Key Technical Focus: This is not a standard encryption project. We require implementation of ML-KEM (Kyber) and ML-DSA (Dilithium) within a Hybrid Cryptographic Scheme (PQC + Classical AES-256). The Deliverable: A functional MVP for Windows/macOS featuring a "One-Click Shield" drag-and-drop interface and a "Quantum Health Dashboard" that monitors file vulnerability status. Required Tech Stack: High-performance systems programming (e.g., Rust, C++, or Go) with direct experie...

    €5486 Average bid
    €5486 Keskimäär. tarjous
    72 tarjoukset

    I need Microsoft Purview Sensitivity Labels fully design...people see the right information. Start by reviewing our existing Microsoft 365 tenant, then propose a clear label taxonomy that reflects our business needs. Once approved, configure the labels, policies, and auto-labeling rules, making sure encryption is applied and permission restrictions behave correctly across the three workloads. Finish with validation tests, a succinct admin run-book, and a short end-user guide so the team understands when and how labels apply. Acceptance criteria: • Every targeted location inherits the correct label. • Encryption activates exactly as defined. • Access restrictions match the policy settings in real-world tests. • Handover documents and quick-start gu...

    €171 Average bid
    Kiireellinen
    €171 Keskimäär. tarjous
    17 tarjoukset

    Digital Loan Application Platform (Mobile App + Web Admin Panel) Project Overview: We are building a modern digital lending platform that allows users to apply for personal loans quickly and securely through a mobile application. The platform will simplify the entire borrowing proc...Technology Stack Mobile App: Flutter / React Native (Android & iOS) Backend: Node.js / Python / Java Database: PostgreSQL / MongoDB Admin Panel: React / Angular Web Dashboard API Integrations: CIBIL / Credit Score APIs Aadhaar / KYC verification Payment Gateway (Razorpay / Stripe / Paytm) Security & Compliance To ensure trust and regulatory compliance, the platform will include: • End-to-end data encryption • Secure API integrations • KYC verification • RBI compliance standar...

    €727 Average bid
    €727 Keskimäär. tarjous
    78 tarjoukset

    ...Services Microsoft Graph API (for Microsoft Calendar integration) Azure Key Vault Azure Monitor / Application Insights Azure Storage or Azure SQL for secure data storage Microsoft Entra ID (Azure AD) for authentication Compliance & Security Requirements The architecture must support: HIPAA compliance PIPEDA compliance Secure handling of personal and potentially health-related information Encryption of data in transit and at rest Secure authentication and role-based access control Audit logs and monitoring Privacy-first system design Expected Deliverables Architecture and system design documentation Fully functional AI Voice Agent deployed on Microsoft Azure Phone integration for handling inbound calls Integration with Microsoft Calendar (Outlook / Microsoft...

    €14 / hr Average bid
    €14 / hr Keskimäär. tarjous
    57 tarjoukset

    I run a custom PHP + MySQL website and nee...through TronGrid or a locally synchronised Tron node—and detect confirmed USDT transfers in real time. • Once a transfer is confirmed, an SQL call must update the user’s available balance in my existing database tables. • The entire stack must remain under my control; please keep third-party payment gateways (CoinPayments, NowPayments, Plisio, etc.) out of the solution. • Apply standard encryption protocols for key storage, address generation, and any communication between the monitoring service and the PHP backend. When you reply, start with “TRON-EXPERT” so I know these requirements are clear. If you have questions about my current schema or server environment, feel free to ask—clean...

    €78 Average bid
    €78 Keskimäär. tarjous
    5 tarjoukset

    ...into an established Git-based CI/CD pipeline. Key objectives • Run a full penetration test against the platform, documenting exploitable findings against the OWASP Top 10 and cloud-specific misconfigurations. • Configure vulnerability scanning (Nessus, Snyk, Trivy) and wire SAST, DAST and dependency checks into our build pipelines. • Implement and verify HIPAA technical safeguards—AES-256 encryption in transit and at rest, granular IAM, audit logging, MFA and alerting. • Assemble evidence for our upcoming SOC 2 Type II assessment and coach engineers on policy alignment. • Advise on secure architecture patterns for a multi-tenant AWS/Azure deployment, with special attention to container and Kubernetes hardening. • Establish monitori...

    €11 / hr Average bid
    €11 / hr Keskimäär. tarjous
    16 tarjoukset

    ...“sent” Look & feel Please mirror the current HDFC Bank mobile design as closely as possible—colours, typography, and general layout. Accuracy matters because the joke depends on immediate visual credibility. Behaviour & data Everything can run fully offline. A simple local JSON or SQLite store is fine for persisting the fake balance and transactions between sessions; no authentication, encryption, or live APIs required. I should also be able to update the balance and add or delete transaction rows myself without touching code—an in-app edit mode or an external config file would work. Platforms & deliverable Android APK is my first choice because that’s the phone I’ll use, but if you prefer Flutter or React Native, let me kn...

    €39 Average bid
    €39 Keskimäär. tarjous
    15 tarjoukset

    ...initial setup of enrollment profiles, creation of security and compliance policies, and Azure AD Conditional Access rules that gate company resources and SaaS apps behind device-health checks. Everything must support a BYOD model without exposing corporate data. Key points I want addressed • Autopilot/Company Portal enrollment flows for Windows and macOS • Baseline compliance settings (password, encryption, OS update cadence) and security baselines tuned to our environment • Conditional Access policies that tie sign-in to device compliance status • Application protection policies so corporate data stays within managed containers on personal devices • Clear written documentation of every profile, policy and assignment, plus a short hand-over sessi...

    €344 Average bid
    €344 Keskimäär. tarjous
    33 tarjoukset
    Encrypted Code Meta-Editor Build
    2 päivää left
    Varmennettu

    I’m putting together a lightweight yet secure meta-editing environment focused on code. The core need is a true code editor—nothing WYSIWYG or plain-text—able to read and write encrypted project files so that source remains protected end-to-end. Here is the essence of what I’m after: • A desktop or web-based editor purpose-built for coding tasks. • Built-in encryption/decryption of files or project folders using modern, open algorithms (AES-256 or similarly strong). • Smooth, familiar coding workflow: open an encrypted file, make edits, save, and the file is automatically re-encrypted without exposing plaintext on disk. • Clean, well-documented codebase so I can extend the tool later. Technology stack is open for discussion; fe...

    €294 Average bid
    €294 Keskimäär. tarjous
    118 tarjoukset

    Project Title: Digital Loan Application Platform (Mobile App + Web Admin Panel) Project Overview: We are building a modern digital lending platform that allows users to apply for personal loans quickly and securely through a mobile application. The platform will simplify the entire...Technology Stack Mobile App: Flutter / React Native (Android & iOS) Backend: Node.js / Python / Java Database: PostgreSQL / MongoDB Admin Panel: React / Angular Web Dashboard API Integrations: CIBIL / Credit Score APIs Aadhaar / KYC verification Payment Gateway (Razorpay / Stripe / Paytm) Security & Compliance To ensure trust and regulatory compliance, the platform will include: • End-to-end data encryption • Secure API integrations • KYC verification • RBI compliance standar...

    €589 Average bid
    €589 Keskimäär. tarjous
    92 tarjoukset

    ...Responsibilities:** * Develop and maintain backend services for the loan management system. * Design secure RESTful APIs to support mobile and web applications. * Implement business logic for loan applications, approval workflows, and repayment tracking. * Integrate third-party services such as payment gateways, credit scoring APIs, and KYC verification systems. * Ensure high levels of data security, encryption, and compliance with financial regulations. * Optimize database performance and manage large-scale financial data. * Collaborate with frontend developers and product teams to deliver seamless user experiences. * Monitor system performance and troubleshoot backend issues. **Required Skills:** * Strong experience with backend technologies such as **Node.js, Java, or Pytho...

    €550 Average bid
    €550 Keskimäär. tarjous
    84 tarjoukset
    AI Auto-Trading
    1 päivä left

    AI Auto-Trading Bot + Web3 Wallet (Complete System) 1️⃣ Web3 Wa...take profit Backtesting Paper trading Example UI: Create Bot │ ├ Strategy ├ Risk Settings ├ Trading Pair └ Activate Bot 6️⃣ Backend Infrastructure Recommended stack: Frontend React Backend Node.js Python AI server Database MongoDB Hosting Vercel Cloudflare 7️⃣ Security System (Very Important) Crypto bot platform me security sabse important hoti hai. Add these: API key encryption Wallet signature login Two-factor authentication Trade limits Withdrawal protection 8️⃣ Full System Architecture User │ Web App (React) │ Wallet Connect (MetaMask) │ Backend API (Node.js) │ AI Engine (Python) │ Market Data APIs │ Trading Execution │ Exchange (Binance / Coinbase)

    €25 Average bid
    €25 Keskimäär. tarjous
    20 tarjoukset

    ...colors, and domain. Core features I must see on delivery: • User trading dashboard (spot trading at minimum, with basic order types) • Wallet integration for deposits, withdrawals, and on-platform transfers • Real-time price tracking with live order-book data Security cannot be an afterthought; the build has to ship with 2-factor authentication baked in and follow best practices for data encryption, secure API keys, and protected admin access. If your script is already live elsewhere, links or demo credentials will help me verify functionality quickly. I’ll need clear hand-over of source code, database schema, and deployment instructions so I can spin up staging and production servers without surprises. Let me know what stack you’ve used, es...

    €223 Average bid
    €223 Keskimäär. tarjous
    12 tarjoukset

    ...colors, and domain. Core features I must see on delivery: • User trading dashboard (spot trading at minimum, with basic order types) • Wallet integration for deposits, withdrawals, and on-platform transfers • Real-time price tracking with live order-book data Security cannot be an afterthought; the build has to ship with 2-factor authentication baked in and follow best practices for data encryption, secure API keys, and protected admin access. If your script is already live elsewhere, links or demo credentials will help me verify functionality quickly. I’ll need clear hand-over of source code, database schema, and deployment instructions so I can spin up staging and production servers without surprises. Let me know what stack you’ve used, es...

    €80 Average bid
    €80 Keskimäär. tarjous
    4 tarjoukset

    ...Secure REST API with: JWT authentication Wallet linking MLM user syncing Reward distribution Token reward sending User reward data retrieval API Stack Node.js + Express or Laravel. Security Requirements The wallet must follow production-level security practices: AES encrypted wallet storage Private keys stored only locally Biometric authentication PIN lock system Secure API communication HTTPS encryption UI Screens Required The application must include the following screens: Splash Screen Login / Register Wallet Dashboard Crypto Portfolio Token List Send Crypto Receive Crypto QR Scanner Transaction History NEXA BULL Token Page MLM Rewards Page Settings Additional Features Dark Mode Push Notifications (Rewards / Transfers) Referral Link Generator Token Import Option Network Switch...

    €31 / hr Average bid
    €31 / hr Keskimäär. tarjous
    46 tarjoukset

    ...uncomplicated so users can dive straight into a conversation without hunting for buttons or menus. Core scope • Random audio call queue with quick-connect logic • One-tap switch to video chat, maintaining the same matchmaking session • Simple swipe or tap controls to skip, report, or favourite a caller • Automatic region and language detection to pair users intelligently • End-to-end media encryption for all streams I’m open to your suggestions on how we can enrich the experience—think in-app filters or masks, interest-based matching, coins or credits for longer calls, or any other engagement tools you have successfully deployed in similar apps. Push notifications, moderation dashboards, or lightweight analytics are all welcome add...

    €527 Average bid
    €527 Keskimäär. tarjous
    50 tarjoukset

    ...restrictions on Apple hardware before. *****I need a complete MDM environment setup for my company from ground up for enterprise security level protection. Core requirements include auto provisioning, deployment and configured full Stack (Server, certifications, profiles, Compliance policies) with cross platform policies including beacon protection. *****Enterprise-grade security policies for encryption, vpn, firewall and patch cadence. Admin documentation and a hand off off walkthrough showing how to add devices, adjust policies and audit compliance....

    €394 Average bid
    €394 Keskimäär. tarjous
    64 tarjoukset

    A multi-tenant SaaS platform combining real-time uptime monitoring, synthetic transaction monitoring across 7 global regions, and a full incident management system wi...synthetic monitoring, 7-region K8s deployment, fault-tolerance, data pipeline & dashboards Sprint 3 (Wk 5-6): Incident management, on-call scheduling, escalation (email + push), status page, tenant UI + mobile app, gamification & QA Sprint 4 (Wk 7-8): Quota/metering, billing, Super-Admin portal, K8s infra NON-FUNCTIONAL REQUIREMENTS (included): · ReBAC authorization · TLS 1.3 + AES-256 encryption · Saudi PDPL + ISO 27001 compliance · 90% test coverage · 15-Factor app · SBOM · Docker best practices · Arabic RTL · Prometheus + Grafana &...

    €44 Average bid
    €44 Keskimäär. tarjous
    1 tarjoukset

    I'm building Xrealy Ledger (XRY), a decentralized settlement infrastructure for financial institutions. I need expert assistance in three key areas: WASM-Based Programmability: - Smart contract deployment - Custom transaction processing - Integration with external APIs Regulatory-Native Privacy Enhancements: - Data encryption - User anonymity - Compliance with regulations Setting Up Decentralized Settlement Infrastructure Ideal skills and experience: - Proficiency in WASM and smart contract development - Strong background in cryptography and privacy protocols - Experience with decentralized finance (DeFi) infrastructures - Knowledge of regulatory compliance in the financial sector Looking for a developer who can work on all three aspects effectively...

    €4837 Average bid
    €4837 Keskimäär. tarjous
    27 tarjoukset

    The task is to create a brand-new Microsoft 365 E5 tenant for my c...deliverables: • Tenant creation and licence assignment for all users • Configuration of Identity & Access Management: MFA enforcement, Conditional Access policies, Privileged Identity Management • Threat protection hardening: Microsoft Defender for Office 365, Endpoint, and Cloud Apps with recommended baseline policies applied • Information protection: sensitivity labels, DLP policies, encryption settings aligned to best practice • Security Centre and compliance dashboard baselines set with alerts and reporting configured • A concise hand-off document outlining every change, policy, and setting applied, plus admin-level walkthrough Completion is urgent, so efficient yet ...

    €287 Average bid
    €287 Keskimäär. tarjous
    11 tarjoukset

    ...local storage structure and extract the stored QBank content into a clean, structured dataset. Scope of Work: Analyze the macOS application’s local container storage and database files Identify how the QBank data is stored within IndexedDB/LevelDB or similar storage systems Perform reverse engineering of the application’s storage structure to understand how the data is encoded or organized The encryption key used by the application is not currently available, so the process may require analyzing the app logic to determine how the data is decoded or accessed Extract all available downloaded offline QBank data, including: Questions Answer choices Correct answers Explanations Associated metadata (e.g., exam name, subject, topic, IDs, etc.) Convert and deliver the extract...

    €151 Average bid
    €151 Keskimäär. tarjous
    19 tarjoukset

    ...already created but still sits in a “not verified” state, and we want to clear every compliance hurdle so we can lawfully retrieve PII and use it to deliver genuinely personalized customer interactions that elevate our support experience. You’ll explain each Amazon security requirement in plain language, help us prepare the technical and policy documentation, and review our architecture for encryption, data retention, network controls, and logging. Once everything is in place, you’ll guide us through the submission steps, respond to any follow-up questions from Amazon, and stay with us until approval is confirmed. Deliverables • A step-by-step checklist tailored to our account, covering verification, roles, policies, and security controls •...

    €533 Average bid
    €533 Keskimäär. tarjous
    14 tarjoukset

    I'm looking for an RPA developer to automate the transfer of PDFs. The automation should include basic encryption for security. Key Requirements: - Experience with RPA tools (e.g., UiPath, Automation Anywhere) - Ability to implement basic encryption - Familiarity with PDF handling and transfer protocols Ideal Skills: - RPA development expertise - Security knowledge for basic encryption - Efficiency in document automation tasks Please provide examples of similar work and estimated completion time.

    €46 / hr Average bid
    €46 / hr Keskimäär. tarjous
    48 tarjoukset

    ...configuration I can trust. Scope of work • Firewall rules – Review what I have, remove redundancies, and add precise allow/deny rules and rate limits that match real-world traffic patterns without blocking legitimate users. • SSL/TLS – Move the zone to the most secure Full (Strict) mode, renew or generate any required origin certificates, enforce HSTS and secure ciphers, and confirm end-to-end encryption is flawless. • Bot management – Configure Bot Fight Mode and related features so genuine traffic flows while common scrapers and automated attacks are stopped, with clear analytics I can monitor. Acceptance criteria 1. No mixed-content or certificate errors after deployment. 2. Firewall events and bot logs show reduced malicious hits o...

    €44 / hr Average bid
    €44 / hr Keskimäär. tarjous
    39 tarjoukset

    ...overall discoverability. Rather than reskinning what already exists, I need the entire site rebuilt on a foundation that satisfies modern search architecture—Google’s crawler as well as AI-driven discovery engines such as ChatGPT, Perplexity, Gemini and similar LLM-powered tools. Scope of work • Re-architect the site so that mobile responsiveness, lightning-fast load times and airtight HTTPS encryption are baked in from day one. • Overhaul URL structure and internal linking to create a clean, logical hierarchy that search algorithms can parse quickly. • Embed technical SEO best practices (structured data, XML sitemaps, canonical tags, etc.) to maximise traditional SERP visibility while also surfacing concise, context-rich answers for AI search ag...

    €408 Average bid
    €408 Keskimäär. tarjous
    255 tarjoukset

    Developer brief Add the following prioritized features to the existing Node.js chat app: Real‑time multilingual pipeline (High) — signup language preference; per‑recipient auto‑translate; toggle original/translated; per‑chat override; low‑latency...Badges & reputation (Medium) — badge rules, reputation score with decay and penalties, tie to search/visibility. Community marketplace & creator monetization (Medium) — country/city rooms, pitch boards, micro‑invest/tipping, creator channels, paid sessions. Admin dashboard (Low‑Medium) — cross‑room metrics, wallet flows, moderation queue. Privacy roadmap (Long term) — plan for optional E2EE and encryption at rest. Deliverables: API endpoints, DB schema changes, unit tests, and deployment notes....

    €944 Average bid
    €944 Keskimäär. tarjous
    275 tarjoukset

    ...into a responsive web app (framework and language are up to you, as long as it is future-proof and well-documented). • Build a solid authentication flow and weave the paywall directly into the sign-up / sign-in process so users pay once to unlock full access. • Migrate all existing data, preserving current user accounts and purchase history. • Implement standard best-practice hardening—encryption in transit and at rest, secure session handling, input sanitisation, and logging—while remaining open to additional suggestions like two-factor authentication or periodic security audits if they make sense. When we’re done, I expect: 1. Source code with clear documentation. 2. A working deployment ready for production. 3. A brief walkthroug...

    €394 Average bid
    €394 Keskimäär. tarjous
    179 tarjoukset

    ...be a Raspberry Pi, mini-PC, dedicated router or NAS) plus any cables, power adapters, or memory cards I should add to the shopping cart. • Full setup – install and configure the VPN on the home unit, flash/configure the travel router, and hand me clear, copy-paste-ready instructions for connecting both my laptops/desktops and my iOS/Android phones. Secure browsing is the main goal, so strong encryption, a clean firewall policy, and DNS leak protection are mandatory. I’m flexible on protocol; if OpenVPN, WireGuard, or another option suits the hardware better, explain why and go with it. Once everything is up, we’ll run a live test while I’m on a public Wi-Fi network to confirm that all traffic routes through the tunnel and that speeds stay reasonabl...

    €153 Average bid
    €153 Keskimäär. tarjous
    40 tarjoukset

    ...core flow is simple: a user selects a contact, enters an amount, confirms with a PIN or biometric prompt, and both sender and recipient see the funds reflected instantly. Key elements I expect you to handle: • Native Android build in Kotlin (Android Studio) with modern Material 3 UI • Real-time balance updates and transaction status via WebSocket or equivalent push mechanism • Bank-grade encryption for data in transit and at rest • Simple KYC screens (photo ID + selfie) plugged into a third-party verification API • Admin console endpoint so I can view flagged transactions and force reversals I already have API access to the Instapay rails; you’ll integrate that SDK, manage token refresh, and surface meaningful error messages to the user....

    €74 Average bid
    €74 Keskimäär. tarjous
    28 tarjoukset

    ...a variety of processors in real time. The core engine must reliably accept, normalize and forward the following transaction types: • Credit card payments • Bank transfers (ACH/SEPA or equivalent) • Digital wallets (Apple Pay, Google Pay, etc.) Security is non-negotiable. The codebase, data flows and storage all have to meet: • Full PCI-DSS compliance (up to SAQ-D level) • End-to-end encryption of data in transit and at rest • Tokenization services to ensure PANs are never exposed to client applications The switch will serve three distinct environments, so clear, modular integration layers are required: • E-commerce websites (REST/JSON) • Mobile apps (iOS & Android SDK hooks or GraphQL) • Core banking systems (ISO 8...

    €12643 Average bid
    €12643 Keskimäär. tarjous
    116 tarjoukset
    TapLinx iOS NFC PoC
    Loppunut left

    ...application on a MIFARE DESFire EV2 tag, protect it with DES keys, and store a small block of plain text inside that new application. Scope of the PoC • The app must run on devices with iOS 14 or later. • When the tag is presented, the code should create an application on the EV2 card, apply DES encryption, and then write user-editable text data to a file within that application. • After writing, the app should immediately read the data back so that I can see proof the operation succeeded and the encryption keys were respected. Tooling & approach TapLinx (latest iOS release), Xcode, Swift or Objective-C—whichever gives the clearest sample code. Feel free to include helper wrappers around the TapLinx API to make the flow easy to follow. D...

    €134 Average bid
    €134 Keskimäär. tarjous
    43 tarjoukset

    ...js / Python / Go • Microservices architecture Frontend • React / • React Native / Flutter (mobile) Database • PostgreSQL • Redis cache Infrastructure • AWS / GCP • Docker containers • Kubernetes orchestration • CDN for media delivery SECURITY REQUIREMENTS • Secure wallet ledger system • Transaction logging • Fraud detection • Rate limiting • User authentication security • Data encryption PROJECT DELIVERABLES Developers must deliver: • Backend infrastructure • Frontend web platform • Mobile applications • Wallet system • Live streaming infrastructure • Admin dashboard • Deployment setup • Technical documentation PROJECT TIMELINE Estimated development tim...

    €1356 Average bid
    €1356 Keskimäär. tarjous
    12 tarjoukset

    ...The Play: Bet $41.67 on A and $220 on B. > * Total Risk: $261.67 | Guaranteed Payout: $300.00 | Net Profit: $38.33 > 4. Technical Pillars (Fully On-Chain) A. "Wallet From Nothing" System * Instant Creation: Upon my first interaction, the bot must generate a unique Polygon wallet (EVM compatible) from nothing (New Mnemonic/Private Key). * Non-Custodial: The system handles key generation and encryption natively. No pre-existing wallets are imported; the bot creates the infrastructure for the user. B. On-Chain Betting & Execution * Direct Pool Interaction: This is a legit on-chain bot. It must sign and broadcast transactions directly to the Polymarket CTF (Conditional Token Framework) contracts on the Polygon Mainnet. * Confirm Both: A single "Confirm&...

    €378 Average bid
    €378 Keskimäär. tarjous
    31 tarjoukset

    ...The Play: Bet $41.67 on A and $220 on B. > * Total Risk: $261.67 | Guaranteed Payout: $300.00 | Net Profit: $38.33 > 4. Technical Pillars (Fully On-Chain) A. "Wallet From Nothing" System * Instant Creation: Upon my first interaction, the bot must generate a unique Polygon wallet (EVM compatible) from nothing (New Mnemonic/Private Key). * Non-Custodial: The system handles key generation and encryption natively. No pre-existing wallets are imported; the bot creates the infrastructure for the user. B. On-Chain Betting & Execution * Direct Pool Interaction: This is a legit on-chain bot. It must sign and broadcast transactions directly to the Polymarket CTF (Conditional Token Framework) contracts on the Polygon Mainnet. * Confirm Both: A single "Confirm&...

    €438 Average bid
    €438 Keskimäär. tarjous
    39 tarjoukset

    I need a thorough, professional penetration test that zeroes in on database security. The work will involve actively probing our live environment for misconfigurations, permission-escalation paths, injection points, improper encryption, and any other weakness that a determined attacker might exploit. Scope • Assess the entire database layer—from connection strings and authentication flows to stored procedures and backup endpoints—without disrupting business operations. • Document every finding with reproducible steps, risk ratings, and clear remediation guidance. • Validate fixes with a follow-up retest so we can close the loop confidently. Deliverables 1. Methodology outline (tools, test phases, compliance references). 2. Vulnerability ass...

    €229 Average bid
    €229 Keskimäär. tarjous
    13 tarjoukset

    ...priority). • Transfer every user’s OneDrive files and sharing permissions into matching Google Drive locations. • Plan and execute the DNS/MX switchover at the ideal moment, keeping inbound mail flowing. • Maintain a tested rollback path in case we must return to Microsoft 365. • Apply normal best-practice security throughout; no specialised compliance frameworks are required beyond standard encryption and user authentication. Timelines The clock is ticking—I’d like the pilot to kick off immediately and the full migration completed as soon as technically possible. Deliverables 1. Pilot migration report confirming item-level accuracy. 2. Fully migrated production environment in Google Workspace with verified email flow. 3. ...

    €615 Average bid
    €615 Keskimäär. tarjous
    23 tarjoukset

    ...performance standards. Nginx is configured as a reverse proxy to manage incoming client requests and route them securely to the Node.js application server, while MySQL is optimized for reliable data storage and fast query execution. The Ubuntu server is professionally hardened by disabling root login, securing SSH access, configuring UFW firewall rules, and enabling automatic security updates. SSL encryption is implemented using Let’s Encrypt to ensure secure HTTPS communication. PM2 is used in cluster mode to maximize multi-core CPU utilization, provide automatic restarts, and ensure zero-downtime performance. The deployment follows a clean and maintainable folder structure with secure environment variable management. Database indexing, gzip compression, rate limiting, a...

    €227 Average bid
    €227 Keskimäär. tarjous
    42 tarjoukset

    ...switching works for guests and logged users Ensure payment pages are translated SMS PAYMENT (If Supported) Configure SMS billing if natively supported OR Implement SMS-based wallet top-up if technically feasible BACKUP SYSTEM (Wasabi S3) Automatic encrypted backups for: Web files + uploads Database dumps LiveKit configuration TURN configuration Requirements: Use restic or rclone with encryption Daily schedule Retention policy Documented restore procedure Restore test performed EMAIL SETUP Create: admin@ support@ noreply@ billing@ abuse@ security@ backups@ Configure: SPF DKIM DMARC Script must send emails via noreply SMTP. SECURITY REQUIREMENTS HTTPS only Secure headers Proper firewall configuration Webhook validation Anti double wallet credit Logging e...

    €125 Average bid
    €125 Keskimäär. tarjous
    22 tarjoukset

    ...Master and Nodes within coverage range. Technical Approach: Use UDP protocol to prioritize speed and minimize latency. Encode audio using the Opus codec for bandwidth efficiency. Development Notes Primary Objective: Optimize battery efficiency. Connection Priority: Local P2P connections > Cloud connectivity. Security Requirement: All P2P data streams must be protected using End-to-End Encryption (E2EE)....

    €19 / hr Average bid
    €19 / hr Keskimäär. tarjous
    81 tarjoukset

    ...platform has to exude exclusivity and discretion from the very first pixel while running flawlessly on desktop and mobile. Core expectations • Bespoke, responsive design that feels high-end—think elegant typography, refined colour palette and smooth animations. • Intuitive page flow: home, gallery/portfolio, individual profile pages, booking enquiry form and a secure contact channel (end-to-end encryption or comparable solution). • Simple yet robust content-management abilities so I can update profiles, rates and imagery without touching code. WordPress, Webflow or a custom CMS are all acceptable if the luxury look remains uncompromised. • SEO-friendly architecture and clean, semantically correct markup. • Fast load times; performance sco...

    €351 Average bid
    €351 Keskimäär. tarjous
    144 tarjoukset

    ...Technology. The scope covers full integration for three transaction sets—Purchase Orders (850/860), Invoices (810), and Advanced Shipping Notices (856)—from initial configuration right through to Walmart certification. You will be responsible for: • Deploying and configuring Aayu Technology as the EDI backbone • Establishing a secure, Walmart-compliant AS2 connection (URL, certificates, MDNs, encryption, signing) • Creating and testing the maps for 850/860, 810, and 856 transactions • Coordinating end-to-end testing with Walmart until all documents show green status in Retail Link • Hand-off documentation so my team can monitor, resend, and add partners in the future Please highlight previous Walmart or major-retailer AS2 projects y...

    €285 Average bid
    €285 Keskimäär. tarjous
    24 tarjoukset

    ...Filing proof storage * Audit trail Portal-based filing is acceptable in Phase 1. --- # 7. Automated NAS Archiving All uploaded documents must be archived automatically to NAS using a structured hierarchy: FirmArchive ClientCode/ YYYY/ MM/ YYYY-MM-DD Category/ file Preferred architecture: * Attachments stored in S3-compatible object storage * Scheduled export to NAS * Deterministic naming * Encryption at rest * Integrity validation --- # 8. AI Analytics & Predictive Engine We require a background AI system capable of: ## A. Cross-Client Intelligence (Anonymized) * Revenue trend analysis * Margin benchmarking * Cash flow cycle analysis * Inventory turnover benchmarking * Expense ratio comparison Client identities must not be exposed across datasets. --- ## B. Pre...

    €14042 Average bid
    €14042 Keskimäär. tarjous
    114 tarjoukset

    ...dashboards plus exportable PDF/Excel summaries. • Sales representative tracking – live GPS route logging with check-in/check-out and distance compliance. • Target & achievement tracking – quarterly and monthly quotas, visual progress bars and instant alerts when a rep is off-pace. Platform expectations • Clean, intuitive UI/UX (Figma or similar for sign-off). • Secure role-based login, data encryption at rest and in transit. • Offline mode with auto-sync once coverage returns. • Cloud backend (Firebase, AWS, or your proposed stack) that I can scale and maintain. • Thorough documentation and a short walk-through video so my admin team can manage day-to-day. Acceptance criteria 1. All listed features operate smoot...

    €561 Average bid
    €561 Keskimäär. tarjous
    84 tarjoukset

    ...or PostgreSQL • Frontend: React or Angular • Cloud: Google Cloud Platform or Amazon Web Services ⸻ Deliverables • Fully working AI system (production-ready) • Web dashboard (admin panel) • Camera integration setup • Installation guide • Camera configuration guide • Staff training session • Complete source code • Deployment documentation ⸻ Security and Privacy Requirements • Data encryption (at rest and in transit) • Role-based access control • Full audit logs • GDPR-style compliance • Secure cloud deployment ⸻ Ideal Freelancer Profile • Strong experience in AI and Computer Vision • Prior work in face recognition systems • Experience with CCTV RTSP integration • ...

    €369 Average bid
    €369 Keskimäär. tarjous
    34 tarjoukset

    Suosituimmat encryption -yhteisöartikkelit