Filter

Mine tidligere søk
Filtrer etter:
Budsjett
til
til
til
Skriv
Ferdigheter
Språk
    Jobbstatus
    1,313 ahamed sha jobber funnet, priser i USD

    I'm in need of a C# program that can hash files as quickly as PowerShell does. The program should be able to hash image files and all other types of files at the same speed, while utilizing the SHA-256 hashing algorithm. Additionally, it would need to read and write data efficiently. Key requirements: - Develop a C# program to hash files. - Implement the SHA-256 hashing algorithm. - Ensure the program reads and writes data smoothly.

    $25 (Avg Bid)
    $25 Snitt bud
    2 bud

    I need a C# program that hashes text strings using SHA-256 hashing algorithm. The current program I have was designed to hash data, but I've noticed it does so in a different order than PowerShell. This is problematic for my workflow, as I need the two to hash data in the same order for consistency. Key Requirements: - Make the C# program hash data in the same order as PowerShell using SHA-256 - Ensure the program is efficient and secure - Document the changes made for future reference Ideal Skills: - Proficient in C# programming - Expertise in working with hashing algorithms, especially SHA-256 - Prior experience with data consistency issues - Strong understanding of security protocols and best practices Please include your relevant experience and approach in...

    $38 (Avg Bid)
    $38 Snitt bud
    11 bud

    I require a specialist to build a solution that validates the authenticity of hashed data in video format. The key focus of this project demands: - Experience in hashing algorithms, notably SHA-256 - Proficiency in data authenticity verification - Familiarity with video formats, particularly MP4 - An understanding of how to match video-recorded audit logs with original hashed data It's crucial to know if the hash data from the video recording matches the original hash of the audit logs for data authenticity purposes. Please note that the audit logs are text-based and believed to contain a hash of the original file. Your role is to confirm this authenticity. This task requires a comprehensive understanding of data security and integrity checks. If you have prior experience i...

    $91 (Avg Bid)
    $91 Snitt bud
    13 bud

    ...authorized representative, such as line of business, key executives' name, etc. • Take pictures of the subject company and its vicinity, as per Confirmis’ standard operating guidelines. • Provide observation about the company to gauge activeness, e.g., staff working at the premise, loading/unloading of goods, etc. REQUIREMENTS: • Must be living in (or nearby) Greenfield tower, Concordia Plaza, Tsim Sha Tsui, Kowloon, Hong Kong • Has a camera or phone/tablet of quality with a camera, internet access • Must be available during business hours (9 AM - 4 PM) on working days Please see the attached file for the site visit guideline. You are only required to deliver the pictures, video & observations and are not expected to put together a ...

    $15 - $25
    Lokal
    $15 - $25
    0 bud

    I’m in need of an intermediate-level C++ coder for a bitcoin mining initiative. The successful applicant must be comfortable with coding for solo mining. This project doesn't require expertise in multi-threading or pool mining, but a firm grasp on the creation and development of bitcoin mining algorithms is essential. An understanding of SHA-256 algorithm implementation is a plus, though not mandatory. Looking forward to your bids, and to our potential collaboration.

    $130 (Avg Bid)
    $130 Snitt bud
    18 bud

    ...role involves developing encryption, decryption, and key generation functionalities. Key Project Requirements: - Extensive knowledge and application of Cryptography - Proficiency in the C programming language - Experience in generating SHA keys The Cryptographer will perform the following tasks: 1. Encryption and Decryption: You will write code that facilitates both encryption and decryption processes using the AES (Advanced Encryption Standard) algorithm. 2. Key Generation: Involves the creation of a safe and secure key generation mechanism utilizing SHA. You should prioritize key security to guarantee the confidentiality and integrity of the encrypted contents. 3. File Support: The coded software should accept file inputs only, handling and processing encryption a...

    $17 (Avg Bid)
    $17 Snitt bud
    3 bud

    ...Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this task is for you to implement the validation logic manually. - Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. - Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the task of finding a hash below a c...

    $11 (Avg Bid)
    $11 Snitt bud
    3 bud

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security and confidentiality given its sensitive nature.

    $13 (Avg Bid)
    $13 Snitt bud
    26 bud

    ...for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this challenge is for you to understand and implement the validation logic manually. Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the challenge of finding a hash below ...

    $13 / hr (Avg Bid)
    $13 / hr Snitt bud
    7 bud

    For this task, I require a skilled developer with solid background in Docker and Kafka. The task at hand is to work on an existing Docker Compose script for a Kafka application centered around authorization. Key Requirements: - Incorporating SASL/SCRAM authentication mechanism. - Focusing on the SCRAM-SHA-256 version for Kafka authentication. A deep understanding of the listed technologies and profound experience in adding security features to Kafka applications will be a significant advantage. Secure, reliable streaming is the goal. Therefore, the freelancer needs to be knowledgeable about how SASL/SCRAM authentication enhances Kafka application's security. Only bid if you are highly confident you can deliver my exact requirement.

    $27 (Avg Bid)
    $27 Snitt bud
    4 bud

    I am looking to enhance the security level and add features to my current Payten payment gateway through PHP. This gateway is functionally intact yet bordering obsolescence. Our ideal candidate should have substantial experience with Payten, PHP, and secure payment gateways. The scope of work involves: -Up...our payment gateway. The amount you bid is what I will accept! after bidding I will not sit down with you to discuss the amount to be paid. READ THE REQUIREMENTS AND BID ACCORDINGLY! DO NOT WASTE MY TIME! I will provide the latest php samples provided by my payment gateway the current scripts are working but they use SHA1 algorithm and soon they will stop working. The new samples work with SHA You are required to modify the current files to make them work with the latest...

    $176 (Avg Bid)
    $176 Snitt bud
    61 bud

    this is for both bitcoin and litecoin address bitcoin bc1 and tb1 litecoin ltc1 address...understanding various programming concepts. -Bech32 Format Conversion: I am specifically interested in how to convert between formats using Bech32. Your experience with handling this encoding scheme's complexities would be very beneficial. -SHA-256 Functioning: Your in-depth understanding of SHA-256's operation is crucial. I'm not looking to implement it myself yet; I just want to understand how it works under the hood. Ideal skills and experience include a strong working knowledge of Python, expertise in the Bech32 encoding format, and an understanding of SHA-256 hashing algorithm functionalities. If you're a tenacious problem-solver with an educational sp...

    $134 (Avg Bid)
    $134 Snitt bud
    2 bud

    I'm looking for a proficient...focusing on their application in user authentication. Key Requirements: - Generation and verification of ECDSA signatures using Botan 2 and Botan 3 - Scripts should be designed for user authentication - The use of SHA-256 as the hashing algorithm for ECDSA signatures Ideal Skills: The ideal freelancer for this project will have extensive experience in Python development with proven knowledge of digital signatures, specifically ECDSA. Familiarity with Botan cryptographic library is a major requirement. They should also have a solid understanding of hashing algorithms, particularly SHA-256. Attention to detail and ability to meet deadlines is also a key expectation. Note: Please remember that I need two scripts, each compatible with Botan...

    $166 (Avg Bid)
    $166 Snitt bud
    26 bud

    I’m in need of an intermediate-level C++ coder for a bitcoin mining initiative. The successful applicant must be comfortable with coding for solo mining. This project doesn't require expertise in multi-threading or pool mining, but a firm grasp on the creation and development of bitcoin mining algorithms is essential. An understanding of SHA-256 algorithm implementation is a plus, though not mandatory. Looking forward to your bids, and to our potential collaboration.

    $154 (Avg Bid)
    $154 Snitt bud
    14 bud

    more info will b sha red in chat

    $2 / hr (Avg Bid)
    $2 / hr Snitt bud
    5 bud

    I am in need of a Python expert who can write a web scraper to extract specific data for me. - I need to webscrape the fixed odds for each horse in each race in Sha Tin and Happy valley for the last 15 years. I need the top 5 bookmakers at least, Sportsbet, bet365, Ladbrokes, etc. I need the data to be spit out in CSV format or equivalent. I need the race date, race number, horse name, and fixed odds. - More specifically, the job involves extracting price information. - The ideal candidate for this project would be proficient in Python and have prior experience in writing web scrapers.

    $105 (Avg Bid)
    $105 Snitt bud
    57 bud

    ...well as the digital signature itself. Note: The PKCS12 envelope should not be BASE-64 encoded. It should not contain any start and end identifiers. The plain PKCS12 envelope which is a sequence of bytes should be written into the sig file. The sig file should have the same name as the original file name. The only difference is is in the extension. The digital signature should be generated using SHA-2(512 bits) algorithm for message digest and RSA-2048 algorithm for encryption. I want complete code with logic and with explanation with aal classes and dependency and using util class...

    $14 (Avg Bid)
    $14 Snitt bud
    3 bud

    ...for Bitcoin, and we are looking for a skilled professional to lead the design and implementation of the SHA-256 mining software. Position Overview: As an ASIC Miner Software Engineer specializing in SHA-256 mining, you will play a crucial role in developing the software that drives our next-generation Bitcoin mining hardware. The successful candidate will have a deep understanding of cryptographic algorithms, particularly SHA-256, and possess expertise in low-level programming for efficient mining operations. Responsibilities: 1. Algorithm Design and Optimization: - Collaborate with hardware engineers to understand the ASIC architecture and design mining algorithms optimized for SHA-256. - Develop and implement efficient and scalable software algorit...

    $22 / hr (Avg Bid)
    $22 / hr Snitt bud
    17 bud
    In the name of Allah Avsluttet left

    In the name of Allah Ma Sha Allah this project will be completed by Allah. Thanks to Allah for Allah

    $50 / hr (Avg Bid)
    $50 / hr Snitt bud
    1 bud

    Seeking an Android developer to update my Online Music Streaming app to the latest Android version, integrate AdMob, and assist with the SHA-key for Google Play Console. Minimal customization is needed, as an updated version is available. Tasks: Update the app to the latest Android version. Integrate AdMob for monetization. Resolve compatibility issues. Assist with SHA-key for Play Console upload. If you're an experienced Android developer, submit your proposal with relevant experience. Excited to enhance my music app with your expertise!

    $222 (Avg Bid)
    $222 Snitt bud
    11 bud

    I am looking for a talented artist who can quick portrait drawing on site for an upcoming commercial event. 10-15 mins per client. Date and time 10 Dec 1400-1900, Tsim Sha Tsui, Hong Kong Preferred Medium: Pencil or charcoal Style: Realistic / quick sketch Skills and Experience: - Proficiency in creating quick-sketch portraits using pencil or charcoal - Basic communication with VIPs - Ability to work within tight deadlines If you have a portfolio showcasing your quick-sketch portrait drawings and available in 10 Dec 1400-1900, central, please submit your proposal. Thank you.

    $32 / hr (Avg Bid)
    Lokal
    $32 / hr Snitt bud
    24 bud

    I am looking for an intermediate level freelancer to create a written documentation tutorial on cyber security. The tutorial should cover topics such as AES, SHA-256, Diffie-Hellman, PS, and TLS. The ideal freelancer for this project should have a strong understanding of cyber security concepts and be able to explain them in a clear and concise manner. Specific requirements for the tutorial include: - Written Documentation: The tutorial should be in written format, providing step-by-step explanations and instructions. - Practical Exercises: The freelancer should include practical exercises to help the readers apply the concepts they have learned. These exercises should be relevant to real-world scenarios and provide hands-on experience. - Clear and Concise Language: The tutorial s...

    $191 (Avg Bid)
    $191 Snitt bud
    6 bud

    We need support to resolve some penetration points raised by information security for hybrid mobile applications using Expo & React-Native as front-end and back-end Web API is in C# the issues raised are for Android 1-Application uses hashing algorithms that are known to consist of possible collisions (such as SHA-1 and MD5). Security Recommendations: It is recommended to be using safer/stronger hashing alternatives, such as SHA-256, SHA-512, SHA-3, etc. We are able to find these references in the application references but these references are related to Expo packages and can’t be changed. 2-Application uses Cipher Block Chaining (CBC) as it’s encryption mode, along with Public Key Cryptography Standards (PKCS5/PKCS7) padding. This configurat...

    $162 (Avg Bid)
    $162 Snitt bud
    18 bud

    I need help with the implementation of SHA 512 on an FPGA platform. I prefer to use the Xilinx platform, and I would like the programming language to be Verilog. I need the project to be completed in 2-3 days. I know this is a short timeline but I'm confident that with the right expert, it can be done. Please let me know if you have any questions or require more information.

    $417 (Avg Bid)
    $417 Snitt bud
    5 bud

    Hey you! Do you have more than 8 years as a Laravel Developer? Are you willing to do a supervised coding test? Can you prove/provide evidence of what you have personally done as a developer? Does compliance to high security standards, encyption at rest, encryption in transit, AES 256, SHA 256 mean something to you? Are you willing to join an existing project? Then this job may be for you. Our team is hard at work building a web application. We currently need an additional developer to assist with some key activities. You will be assigned duties by our Application Team Leader. Shoot us a quick message if interested. Job starts: ASAP.

    $9 / hr (Avg Bid)
    Taushetspliktsavtale
    $9 / hr Snitt bud
    44 bud

    Project Description: I am looking for a skilled professional who can decrypt a sha 256 hex code into a sentence. The sentence I want to decrypt is long, consisting of 11 or more words. Although I have partial information related to the sentence, I would appreciate any additional clues or hints that can aid in the decryption process. I am seeking a freelancer who has expertise in cryptography and is familiar with sha 256 encryption. The ideal candidate should also have experience in decrypting complex codes and converting them into meaningful sentences. The expected turnaround time for this decryption project is more than 48 hours, as I understand that it may require extensive analysis and decoding. If you possess the necessary skills and experience, I invite you to sub...

    $62 (Avg Bid)
    $62 Snitt bud
    5 bud

    Sorry, about disappearing before on this project I ha...is setup I’m looking for somebody to shrink these pages and improve my security on this script as when I coded it I was just coming into php MySQL. I know my script still uses md5(hash in I know it’s bad so as security is a must I would like for somebody to upgrade it to sha-256 for better security. This script will have users signing up and an admin center. And will also take payments soon. Main pages is I’m looking for you to upgrade my script fix up the coding and add a new feature where members' timeout sends them to the login page.

    $468 (Avg Bid)
    $468 Snitt bud
    109 bud

    ...SwiftUI URL Links for iOS Platform We are looking for a skilled developer to help us implement a hashing algorithm for our SwiftUI app on the iOS platform. The project requires the use of the SHA-256 hashing algorithm and will involve generating hashed URLs for our app's links. Requirements: - Use SHA-256 hashing algorithm to hash the URLs - Ensure compatibility with iOS platform - Implement specific requirements for the length and complexity of the hashed URLs Ideal Skills and Experience: - Proficiency in Swift and SwiftUI development - Experience with implementing hashing algorithms, particularly SHA-256 - Familiarity with iOS platform and app development best practices - Strong problem-solving skills and attention to detail If you have the skills and exp...

    $170 (Avg Bid)
    $170 Snitt bud
    28 bud

    I am looking for a C++ developer, who can make a simple program with the help of reference codes provided by me. There is total Six step needed in the program. The most of the codes needed for the program are avail...needed in the program. The most of the codes needed for the program are available in the reference files. It’s a part of bigger program. The developer needs to take these codes, understand it’s functions and then make a stand-alone program to do the required job. Expectation from the developer: 1. Experience in Cryptography 2. Should be familiar with BIP39 standard, Mersenne Twister(mt19937), SHA-256, PKBDF2-HMAC-SHA512, Keccak-256 hash Please bid only if you have prior experience in this field. More details will be provided to interested bidder. Bu...

    $100 (Avg Bid)
    $100 Snitt bud
    6 bud

    I am looking for a skilled developer to cr...for a skilled developer to create a crash predictor for BC.Game. The predictor should use a salted hash computation method, specifically SHA-256. The output of the predictor should provide detailed statistics. This Article will help you to understand the algorythym which [login to view URL] used [login to view URL] Skills and experience required for this project: - Proficiency in Python programming language - Experience with hash computation using SHA-256 - Ability to generate and analyze detailed statistics - Familiarity with [login to view URL] and crash prediction algorithms If you have a strong background in Python development, expertise in SHA-256 hash computation, and can deliver detailed statistical output, plea...

    $13 / hr (Avg Bid)
    $13 / hr Snitt bud
    17 bud

    I am seeking a developer with experience in Rest/API coding in perl using Sha-HMAC256 signing to help me with my project. The purpose of this coding is for data encryption and security, and the project needs to integrate with an existing system. I am looking for someone who can complete this project within 1 week or less, so the timeline is quite tight. The ideal candidate should have experience in perl programming and be knowledgeable in high-level security protocols. If you think you are up to the challenge, please reach out and let me know! I look forward to hearing from you. Need Perl Developer to perform code review on Perl code. Perl program was already developed using below C# spec as example Generating HMAC Key to access an API call to Web portal. Verify conversion of below ...

    $30 - $250
    Forseglet
    $30 - $250
    7 bud
    Trophy icon Mindful Beauty Mini Retreat Avsluttet left

    Flyers & Event Cover for Mindful Beauty Mini Retreat A morning of meditation, breathwork, mindful beauty session, sacred sounds and guided relaxation. Learn how to create a self care beauty ritual using Dr. Alkaitis steel Gua Sha tool and vibrational organic skincare. - Learn how to create a daily self care ritual that relaxes the mind, cleanses the skin and allows you to connect with your body at a deeper level for transformative healing - Learn the Dr. Alkaitis Gua Sha protocol for a holistic facial treatment that will lift, tone and hydrate the skin for a clearer, more youthful wrinkle free complexion. - Receive Guided Meditations for Grounding, Opening Your Heart Chakra & Breathwork for Centering - Holy Fire Reiki & Sound Healing Experience: Release any ne...

    $43 (Avg Bid)
    Garantert
    $43
    49 bidrag

    Hello,I am looking for devs who has experience and knowledge in FPGA to interface RF AFE chip from analogue device(exact part number via chat) Desired FPGA- xilinx Zynq/ equivalent se... Apart from the AFE the FPGA is expected t be interfaced with: 1) Display module 2) Keypad 3) Memory 4) Microphone 5) ESP32C3 and GNSS module. Additional MCU/processor can be added to reduce the burden on FPGA. It can be decided after discussing. The FPGA will perform the DSP task and will be used to transmit RF waveforms. It will be used to perform frequency hopping and encryption (AES-256/SHA) task for the waveform. More detailed information via chat. Eligibility: The freelancer must have experience in FPGA programming. Should have knowledge about SDR Should have knowledge on DSP and GNU...

    $644 (Avg Bid)
    $644 Snitt bud
    6 bud

    I am looking for a freelancer with experience in working with ESP32 boards to help me resolve a Bluetooth characteristic setValue error. Skills and Experie...0x4200d3ea:0x3fced310 0x4200b809:0x3fced370 0x42023536:0x3fced390 0x420240a9:0x3fced3b0 0x42045fd5:0x3fced400 0x42047fa3:0x3fced420 ELF file SHA256: 0000000000000000 Rebooting... ⸮ESP-ROM:esp32s3-20210327 Build:Mar 27 2021 rst:0xc (RTC_SW_CPU_RST),boot:0x8 (SPI_FAST_FLASH_BOOT) Saved PC:0x40377400 SPIWP:0xee mode:DIO, clock div:1 load:0x3fce3808,len:0x43c load:0x403c9700,len:0xbec load:0x403cc700,len:0x2a3c SHA-256 comparison failed: Calculated: 74cb8a0835ff948a23b1fa30f5641bd3d3fc50d3e848150763aab2d791fb9d34 Expected: ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff Attempting to boot anyway... entry 0x40...

    $12 / hr (Avg Bid)
    $12 / hr Snitt bud
    24 bud

    Hello, I'm looking for a Freelancer to help me create a custom car emblem. I'm looking for the emblem to be made of metal and be medium-sized. My vision for the emblem would include text and images, so if you're able to bring that to life then I'd love to hear from you! the one in the picture spells out the word Shelby. i want the new one to say GT 500. same size and everything.

    $29 (Avg Bid)
    $29 Snitt bud
    34 bud
    Trophy icon Baby name contest Avsluttet left

    Join our Name Suggestion Contest for a Hindu baby boy! Start the name with "Tha," "Sha," "S," "Thu" for a traditional touch. Let your creativity shine as you help us find a unique and meaningful name. Good luck on this exciting journey!

    $6 (Avg Bid)
    Garantert
    $6
    81 bidrag

    Hi, We are looking for a CA who has created financial statements for tech startups in the past and have enabled structuring SHA and deals for early stage enterprises. Regards.

    $91 (Avg Bid)
    $91 Snitt bud
    25 bud

    Hi Desource Translation, I noticed your profile and would like to offer you my project. We can discuss any details over i am a student.i like content writting.i hope i will help you .in sha allah.

    $20 (Avg Bid)
    $20 Snitt bud
    1 bud

    I am looking for a WordPress expert who can add an embedded Trustpilot review form to my Woocommerce Thank You page after successful checkout. Here is the unique link which must be formatted in Sha-1: The above must be embedded with this type of form on a customer Thank You page: So when a customer completes an order, they need to see the embedded form to leave a review on Trustpilot. The formatted URL will help pre-populate the form for them so they dont need to sign in to Trustpilot. (If the order date can also be prepopulated in the loaded form, that would be good, but i dont think the date attribute is possible to send in the URL.) Ideal candidate should have: - Strong

    $39 (Avg Bid)
    $39 Snitt bud
    34 bud
    I need a VPN expert Avsluttet left

    ...database so that we can perform SQL queries for reporting. We plan to provision a VM in GCP to meet their minimum hardware specification and we need someone to configure a VPN to the following specification: Phase 1 IKEv2 Parameters • Encryption Type: AES-256 • Hash Type: SHA-256 • Authentication Type: Pre-shared key will be generated by us and provided during the implementation • Diffie Hellman Group: 24 • Phase 1 Security Association Lifetime: 86400 seconds Phase 2 Parameters • Encryption Type: AES-256 • Hash Type: SHA-256 • PFS Group 24 • Phase 2 Security Association Lifetime: 28800 seconds • ICMP and TCP 1433 are minimum port requirements • We will dedicated a private subnet for your agency to NAT o Example, A S...

    $658 (Avg Bid)
    $658 Snitt bud
    19 bud
    SIV opertation -- 3 Avsluttet left

    ...about changes to a report file specified by the user. The SIV can be run either in initialization mode or in verification mode. In initialization mode, the SIV program requires the user to enter a path to a monitored directory, another path to a verification file (outside the monitored directory), a third path to a report file and a hash function (e.g., the SIV must support at least MD-5 and SHA-1 message digests). The program will do the following: a) Verify that the specified monitored directory exists b) Verify that the specified location of the verification file and the report file are outside the monitored directory c) Verify that the specified hash function is supported by your SIV d) If the verification file and/or report file exists already then they will be ...

    $187 (Avg Bid)
    $187 Snitt bud
    16 bud
    SIV opertation -- 2 Avsluttet left

    ...about changes to a report file specified by the user. The SIV can be run either in initialization mode or in verification mode. In initialization mode, the SIV program requires the user to enter a path to a monitored directory, another path to a verification file (outside the monitored directory), a third path to a report file and a hash function (e.g., the SIV must support at least MD-5 and SHA-1 message digests). The program will do the following: a) Verify that the specified monitored directory exists b) Verify that the specified location of the verification file and the report file are outside the monitored directory c) Verify that the specified hash function is supported by your SIV d) If the verification file and/or report file exists already then they will be ...

    $97 (Avg Bid)
    $97 Snitt bud
    6 bud

    Hello. I have python scrip that upload smart categories to shopify all is fine. Just some categories with certain words are not uploaded. Is needed to fix that. Is a very smal fix nothing complex. One note: You need to have your Shopify ambient to check as I don’t provide passwords, SHA keys or links. You must have to work all that. I repeat I will not provide any password, links or SHA keys.

    $46 (Avg Bid)
    $46 Snitt bud
    11 bud

    ...read them carefully. • Complete so that it can: – Connect to the DSTHash23 network using the given node name. – Find the node in the network with the ID closest to the key. – Use the key to get the value from the closest node. – If the value is found, return it. If the value is not found, return null. • Complete so that it can: – Compute the key for the input using the SHA-256 hash. – Connect to the DSTHash23 network using the given node name. – Find the three nodes in the network with the closest IDs to the key. – Store the contents of the file on all of the three closest nodes. – If this works, return true. If it does not, return false. • Complete so that it can: – Using the IP address, port number an...

    $98 (Avg Bid)
    $98 Snitt bud
    4 bud
    Ahamed Raza Avsluttet left

    I'm looking for a skilled freelancer to help design a logo for a new project. The expected timeline is one week from the start of the project. I'm not sure if I'll need any additional services at this time, so I'm open to discussing what might be necessary for a successful completion.

    $11 / hr (Avg Bid)
    $11 / hr Snitt bud
    8 bud
    Project Aryan Ahamed Avsluttet left

    Hii my name is Aryan ahamed and discuss the project etc....

    $14 / hr (Avg Bid)
    $14 / hr Snitt bud
    13 bud
    SIV opertation Avsluttet left

    ...about changes to a report file specified by the user. The SIV can be run either in initialization mode or in verification mode. In initialization mode, the SIV program requires the user to enter a path to a monitored directory, another path to a verification file (outside the monitored directory), a third path to a report file and a hash function (e.g., the SIV must support at least MD-5 and SHA-1 message digests). The program will do the following: a) Verify that the specified monitored directory exists b) Verify that the specified location of the verification file and the report file are outside the monitored directory c) Verify that the specified hash function is supported by your SIV d) If the verification file and/or report file exists already then they will be ...

    $40 (Avg Bid)
    $40 Snitt bud
    3 bud
    Trophy icon Travel Agency Logo Design Avsluttet left

    Hi There, Visit the below docs link/Attachement for details We are Travel Agency. We provide travel & tour-related services to our customers. You are welcome to participate in this logo design contest. You can show your design skills here as per your own. We have some requirements and that requirement is a...participate in this logo design contest. You can show your design skills here as per your own. We have some requirements and that requirement is attached. Or you can visit the below docs link for details. If you want, you can read that file and submit your design. The logo must be scalable and format friendly. It will need to be simplistic enough to implement into videos later. Submit your entries; In Sha Allah, We will evaluate your design if we like it.

    $60 (Avg Bid)
    Garantert
    $60
    449 bidrag

    Simple excel sheet is needed to calculate, drivers' incentives, based number of deliveries they do and as well as the rating they get for their delivery. We have 8 Delivery Drivers, Their Names are Mehaboob, Abbas, Raj, Ali, Ahamed, Sultanate, Zubir and Bashir. The driver who does the highest delivery and also receives the highest customer rating gets AED 60.00 as incentives, while the second highest gets AED 30.00 the third highest gets, 20 and the fourth highest gets AED 15.00. The Calculate the first person, we give a weightage of 5 points per deliver, 5 point for 5 start rating, 4 points for 4 star rating, -2 for 3-star rating, -3 for 2-star rating, minus 4 for 1-star rating, and -1 for a no rating. I wanted you to help create a beautiful excel sheet, with all forumula in...

    $19 (Avg Bid)
    $19 Snitt bud
    30 bud

    Simple excel sheet is needed to calculate, drivers' incentives, based number of deliveries they do and as well as the rating they get for their delivery. We have 8 Delivery Drivers, Their Names are Mehaboob, Abbas, Raj, Ali, Ahamed, Sultanate, Zubir and Bashir. The driver who does the highest delivery and also receives the highest customer rating gets AED 60.00 as incentives, while the second highest gets AED 30.00 the third highest gets, 20 and the fourth highest gets AED 15.00. The Calculate the first person, we give a weightage of 5 points per deliver, 5 point for 5 start rating, 4 points for 4 star rating, -2 for 3-star rating, -3 for 2-star rating, minus 4 for 1-star rating, and -1 for a no rating. I wanted you to help create a beautiful excel sheet, with all forumula in...

    $8 / hr (Avg Bid)
    $8 / hr Snitt bud
    92 bud