Web Development Using Flask - Part 2
On Login, Sessions, Flush Messages, and Custom Error Handlers in Flask
I am looking for help transmitting orders from a website into a POS system. The order is transmitted via an encrypted email. We have not been able to eliminate the errors.
I need someone to change the login from my panel to use my IPBforum’s database. I already have a script that uses its encryption and such so it should be easier. Additionally I will need a form in that panel where you enter a username (located in the forum’s database) and it will set two values to NULL
...security Many security features, which include i.e.: --> Use TLS connectivity for handshake --> Use VPN connection for additional security --> Use ZRTP encryption protocol on VoIP (voice and video) communication --> Use text encryption for messaging and file sending --> Database security on app and server --> Secure connection settings --> Use code obfuscation protection + Sign the app --> Harden the security of application / program --+ Encrypt the entire application --+ Containerize the entire application --+ Encrypt the database --+ Lock screen / Login protection --+ Brute force protection --+ Code hardening by Pro+iX Guard --+ Store encryption keys securely in Trusty --> Set privacy settings - Design customization Many security featur...
Hi, I have some issue with the code. Your job would be to fix it, and would implement some algorithm. Details will be shared later. Having encryption knowledge is helpful Thanks!
This is an app development with the ...and like proactive people, who will be able to give the direction of how to develop in the easy and most cost effective the way the minimal viable product. The idea is very simple but requires following functions, geolocation possibility, video, audio, and text chatting, online payments, online consultation booking, synchronizing with many calendar systems, being very secure (some degree of encryption of the data). I am posting this now and will be answering to offers within first 24h and make my decision as soon as I find suitable person please if no one is chosen it is due to the skills sets required. Please in your bid list the skills you have and state your budget for this project. There is no budget 2500-4500 so I am posting as a mediu...
Im looking for a devloper who can create a secure messaging app for me with off shore servers for a small franchise that I am working with. The app requires to run strict protocols and all is to be encrypted with ECC encryption. Ideally im looking for someone with previous experience in ECC/PGP etc etc development.
Hi I need someone to reverse engineer a specific game's requests to its server. The end goal is to be able to decode, change and re-encode our own version of the request to the server. I have the JSON/fiddler requests already if you need an example of what the encryption looks like. PS: This is an android game, so you should have experience reverse engineering parts of android games. PPS: This is not HTTPS/SSL encryption - that part is already decrypted. you have to drag a jigsaw in a hole to complete the picture
Decrypt Database files. I need to be able to export all of the data a set of DBF database encrypted files? These file are purposely encrypted by the creators. Have you successfully decoded dbf files with heavy encryption, as a reverse engineer or database decoder?
Have two parts in this project. a & b. The project requirements are in the pictures below.
I need someone who can decrypt an android apk and provide me the formula used for generating 2 header fields sent as http request. It should be a 10 - 15 minute job for someone who knows how to do it. I am not looking for someone willing to learn and I will ignore bot bids. Thanks.
Looking good python developer who have good knowledge on dash streaming and encryption for create a personal video downloader tools.
Need a web application - Define excel templates To upload excel files - daily sales / service / enquiry from different branches - Validate the uploaded excel data - SHow error records which is not matching the validation logic - Provide form to edit records -Dashboard to view uploaded excel status - Ability to download excel files - Show different reports Final output file will have 250 ...download excel files - Show different reports Final output file will have 250 columns out of which 50 are calculated columns Sample input / output files attached Looking for a proposal with list of forms to be developed, tech stack, architecture, timeline to develop Future Scope (Not to be included in this project) Business Intelligence reports Graph representation Secure access Database encr...
Hello, i created an app in C# and now i want to have the same thing on android phone. The app must contain 5 input text (1 password). The fields must update while typing. While typeing something must be done using DES 64 CBC encryption, and the output must be the same as the C# app (i tried several online DES CBC but they result in a different output). I can't tell every detail, because i think this might be a good idea. So if you like to bid on this project, you must also be able to read C# code (to ensure output will be the same). I can provide a working VS 2015 project.
Neec a Amazon Prime Video Downloader Who can Explain me How to download it , Without Encryption
Looking good python developer who have good knowledge on dash streaming and encryption for create a personal video downloader tool.
Need for PCI certification for a custom platform with web control panel and iOS/Android mobile applications. The level of certification should cover the components invol...of the card is stored neither in the apps nor in the server, the only thing that is stored is the token that the bank returns to us. Development status: Beta Nº of transactions: 0 . In general we are interested in the level that implies a lower number of transactions, which in principle is the most basic and is the one that fits with the startup models. TLS 1.2 certificate for communications encryption (required for PCI certification) Components: - Web control panel (custom Backend). Hosted by Amazon AWS - iOS Mobile App (Not yet published). Native development - Android mobile app (not yet published). Nati...
Problem Statement Which encryption algorithm AES256(ECB mode), ChaCha 256 (20 rounds), Speck 256 (ECB mode) and Speck small 256 (ECB mode) would produce the best performance results (encryption/decryption time, memory power, power usage)? Expected Contribution Performance comparison of four encryption algorithms AES256(ECB mode), ChaCha 256 (20 rounds), Speck 256 (ECB mode) and Speck small 256 (ECB mode) implemented on an electronics platform (Arduino Mega). Methodology To measure the performance of algorithm we need to measure encryption/decryption time, memory, power usage. Encryption/decryption time can be measured by using function micros (), which is included in Arduino Language. To measure power consumption, we obtained the values for vol...
I am looking for a Raspberry Pi 3 B+ programmer not sure ...RPI based, but the adopisowifi is designed for the Raspberry 3 B and B+. There is a download section at the adopisowifi site if you want to get a demo version of the software and try running it or checking on the coding and how it runs and how it was made. I'll need a software similar to adopisowifi, with the same functionalities like using external wifi routers or repeaters, product key encryption and verification, customizable portal page, remote monitoring of the machine, plus some other features. I am looking to hire for one time programming or we can do a partnership for long term business. You can PM me thru facebook just place in the message Raspberry programmer or txt or call [Removed by Freelancer.com ...
...security Many security features, which include i.e.: --> Use TLS connectivity for handshake --> Use VPN connection for additional security --> Use ZRTP encryption protocol on VoIP (voice and video) communication --> Use text encryption for messaging and file sending --> Database security on app and server --> Secure connection settings --> Use code obfuscation protection + Sign the app --> Harden the security of application / program --+ Encrypt the entire application --+ Containerize the entire application --+ Encrypt the database --+ Lock screen / Login protection --+ Brute force protection --+ Code hardening by Pro+iX Guard --+ Store encryption keys securely in Trusty --> Set privacy settings - Design customization Many security featur...
...you must annotate each one. That is, you must write at least a paragraph about each article explaining what you learned from it. After you have read the articles write a one page single spaced proposal explaining what your 12 minute presentation will be about. You must explain why this topic is important and what you will be explaining in your presentation. Subject such as database security, encryption, and disaster recovery are too broad and inappropriate for this assignment. You should find something you think most of your classmates do not know and will be excited to learn. Topics such as how to create a culture of security in an organization, security concerns when migrating to the cloud, and how to write a business associate agreement under HIPAA are good topics. You must ...
...security Many security features, which include i.e.: --> Use TLS connectivity for handshake --> Use VPN connection for additional security --> Use ZRTP encryption protocol on VoIP (voice and video) communication --> Use text encryption for messaging and file sending --> Database security on app and server --> Secure connection settings --> Use code obfuscation protection + Sign the app --> Harden the security of application / program --+ Encrypt the entire application --+ Containerize the entire application --+ Encrypt the database --+ Lock screen / Login protection --+ Brute force protection --+ Code hardening by Pro+iX Guard --+ Store encryption keys securely in Trusty --> Set privacy settings - Design customization Many security featur...
...security Many security features, which include i.e.: --> Use TLS connectivity for handshake --> Use VPN connection for additional security --> Use ZRTP encryption protocol on VoIP (voice and video) communication --> Use text encryption for messaging and file sending --> Database security on app and server --> Secure connection settings --> Use code obfuscation protection + Sign the app --> Harden the security of application / program --+ Encrypt the entire application --+ Containerize the entire application --+ Encrypt the database --+ Lock screen / Login protection --+ Brute force protection --+ Code hardening by Pro+iX Guard --+ Store encryption keys securely in Trusty --> Set privacy settings - Design customization Many security featur...
...as well as email and phone number with OTP verification. 2. After login, the home panel must contain nearby studio, service provided and more. Location can be tracked via Geolocation feature or ask to be manually inputted by the user. 3. Cache enabled, not all data can be accessed from the cloud, some must be stored locally for faster processing. 4. Payment gateways with a secure end to end encryption. 5. After making a purchase, the user must be given an SMS code or a QR code to be shown at Studio. 6. After usage of services, there must be an option to leave review and rating. Having a referral system work great in increasing the chain of marketing. 7. Cancellation and refund process should be as smooth as possible and without much hassle. than the above, showing scheduled...
This supersedes the previous. Looking to hire skilled developers to create a new cryptocurrency exchange in node.js / EJS scripting. Also requires VPN tunneling knowledge. Needed individuals with a demonstrable portfolio previous node.js and angular projects - pref...in node.js / EJS scripting. Also requires VPN tunneling knowledge. Needed individuals with a demonstrable portfolio previous node.js and angular projects - preferably in financial services. Expect to be asked to demonstrate your coding skills to the project manager. We expect applications from real full stack developers with a range of front-end and back-end technologies. Blockchain and encryption knowledge is welcomed. International company with many other projects available for the successful. Fluent English is...
We are searching for a experienced asp.net developer with vb.net knowledge. We have a set of around 250 aspx files, which are created with a conversion tool from an access database. We would like to assess if a combination of the webf...conversion tool from an access database. We would like to assess if a combination of the webforms with MVC is possible. (as described here: ). Besided debugging the files we would like to extend the project with certein functionalities: - admin dashboard (adminlte for example) - user management/ login - encryption of database and ssl- encryption - design modifications Generic standard texts will not be answered.
...proof-of- concepts and pilots in at least one of the blockchain platforms - Ethereum, Hyperledger, Multi-chain. • Experience in Open source tools and technologies Understanding of Bitcoin or other crypto currencies • Understanding of various distributed consensus methodologies (Mining, PoS, etc). • Understanding of cryptography, including asymmetric (pub/priv key), symmetric, hash functions, encryption/signatures. • Knowledge of versioning systems Git etc. • Passion for best design and coding practices and a desire to develop new bold ideas HIGHLY DESIRABLE EXPERIENCE • Hands-on experience in using a number of the following languages: Java, Golang, Scala, Haskell, Erlang, C, C++ • Good Software Engineering skills, insights, and experience &bull...
Project Overview: -Install all required libraries and dependencies -Installs MySQL or configures the database connection to an existing database, e.g. PostgreSQL -configure Apache webserver -setup SSL encryption -configure email settings Refence URL :
Hi all, Creating a payment module to connect with our gateway. All communication with the gateway is done using SSL encryption and no confidential cardholder data is ever stored on the Magento 2 website. A process called tokenization is used to run transactions with stored payment information. This lets the customers pay with a 'saved' card which are not stored on the magento 2 server at all. When a customer visits the store and make checkout, he needs to select the payment method at the checkout, while selection of the payment gateway, he will need to enter the credit card information. He will be able to save the credit card to make further transaction easy and fast. So next time when he comes for the purchase, he will just need to select saved credit card. Customer will...
Project Requirements: Create simulation with Matlab for Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design Using RC4 encryption with different key size range starting from : 64,128 and 256 bit. Matlab for Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design Using Rabbit Encryption Deliverables: Matlab code Flowchart Data reports : Bit error rates, Cipher size, execution time (Encryp/Decrypt) Schedule for Completion : 10 days maximum
Looking to hire skilled developers to create a new cryptocurrency exchange in node.js / angular. Needed individuals with a demonstrable portfolio previous node.js and angular projects - preferably in financial services. Expect to be asked to demonstrate your coding skills to the project manage...developers to create a new cryptocurrency exchange in node.js / angular. Needed individuals with a demonstrable portfolio previous node.js and angular projects - preferably in financial services. Expect to be asked to demonstrate your coding skills to the project manager. We expect applications from real full stack developers with a range of front-end and back-end technologies. Blockchain and encryption knowledge is welcomed. International company with many other projects available for the s...
Hello, for an project i need a proptype of pusher channel api in classic ASP. (Not asp.net!) From the webserver i need to be able to sent Events to a channel. So there should be a function to sent an event to a channel in classic asp. The pusher API documentation can be fou...should be a function to sent an event to a channel in classic asp. The pusher API documentation can be found here: You can create a test account for free or we will deliver you the API key and information at the start of the project. We use for encryption (Rest, md5, SHA256 HMAC) etc the libraries of Chilkat A 30 day demo can be downloaded from the website. You should use these libraries for for encryption and posting
Hi, I need : Amazon EBS Encryption, Encryption Key Management with customer master key & Audit logs to be integrated in the application.
I need you to develop some software for me. I would like this software to be developed for Windows using Python. The tasks are as follows: - Random data generations - Each generation of data will have different sets of values - Each data generations will be encrypted - The encryption method will be from an SDK i currently have and will be converted from Java to Python and will be replicated and used for encrypting the data. Further details please message me I will not award someone not until there is a complete result. I am sick and tired of awarding people and not able to do the project so do not ask me to award you! You will have to start with the project, show the result via teamviewer or any desk and if i am satisfied, you will send the code then I will release the milest...
...to consider: a. Is BYOD Allowed? b. Physical Security c. Do you have a standardised device type, what happened when they are end-of-life? d. Minimum OS Requirement e. Lost and Stolen Policy, Device Pool Replenishment f. Are users allowed to install their personal apps? g. Are personal use allowed? Limits on personal use? Can the organisation wipe personal data? h. Device passcode requirement/ Encryption requirement i. Is SD Cards on devices allowed j. Periodic Wipe? k. Compromise Device Policy (i.e. what would you constitute a compromised device that is consider unsafe?) l. Must the user bring their device to work? What if they didn’t? m. Can the organisation track the owner’s location? Do we tell them they are being tracked? n. Etc. Assignment Format Minimum Del...
Hi, I need : Amazon EBS Encryption, Encryption Key Management with customer master key & Audit logs to be integrated in the application.
Hi, I need : Amazon EBS Encryption, Encryption Key Management with customer master key & Audit logs to be integrated in the built application.
Hi all, We need to create a module to connect a magento 2 store to our payment gateway. All communication with the gateway is done using SSL encryption and no confidential cardholder data is ever stored on the Magento 2 website. A process called tokenization is used to run transactions with stored payment information. This lets the customers pay with a 'saved' card which are not stored on the magento 2 server at all. When a customer visits the store and make checkout, he needs to select the payment method at the checkout, while selection of the payment gateway, he will need to enter the credit card information. He will be able to save the credit card to make further transaction easy and fast. So next time when he comes for the purchase, he will just need to select saved c...
We need a website with the following features built. I would also like to have a chat. The website itself:- Session Management:- Once a user logs a unique session is started the sourceIP and the browser type is stored, this ... Cross side scripting:- WE use a token to is part of a hidden form and send to the client whenever a post is done the tokens are compared to see if they are valid. Traffic between the components:- Traffic between the client - webserver - database are all encrypted (SSL). Survey API:- traffic from the survey API to the databases are also encrypted using SSL, however no encryption happens between then factory worker and the api(SMS and IVR). Instance Access:- Access to the server instance(CentOS) is only done by mea...
I would like to build a payment interface using encryption and bar codes linked to credit and debit cards.
• POLICY • VeraCrypt is an open-source utility used for on-the-fly encryption. It can create a virtual encrypted disk within a file or encrypt a partition or the entire storage device with pre-boot authentication. PLEASE NOTE: Accepted reports must follow VeraCrypt's Security Model (see attached PDF) • QUALIFICATION • Only CRITICAL vulnerabilities that demonstrate complete compromise of the system's integrity or confidentiality are eligible for payment - typically Arbitrary Code Execution or equivalent impact. Lower severity issues are not in scope at this time and will not be paid. YOU MUST DEMONSTRATE THAT REMOTE EXPLOITATION OF THIS BUG CAN BE EASILY, ACTIVELY, AND RELIABLY ACHIEVED. Awards are increased for fixes that include giving the...
Basically there is a website that does client side encryption of a form via adyen before submitting the information. Basically I need a program(script) that is able to replicate what is done with the client side encryption and return me the data that I would enter into the form encrypted just like the client side encryption does, but in my c# program. I have the website source code, the javascript which does the client side encryption and there are also examples that illustrate how the adyen client side encryption works which should make it easier to understand.
You must understand hashes and encryption for this is a long-term project. So, i require advanced freelancers
Scope 1: Web services application with Raspberry Pi & Java a. Fine tune Raspberry Pi with Java web services application including updating of encryption key with available source codes, etc. Including testing. within 2 weeks. b. Software monitoring tool to provide system alerts including testing. 1 week c. Build management documentation with versions including source code documentation for item a. 1 week d. Attend project meeting with customer software developers and collaboration to fine tune software. e. Support official launch period f. Additional software related tasks may be provided during project period of 2 months. Scope 2: develop C# interface a. Develop integration between access control systems via C# and datapoint servers. Including testing. 5 weeks b. Software mo...
Implement an encryption function that performs one round of encryption using S1 and S2 boxes with key generation schemes. Use binary plaintext (i.e. 100010110101 and key = 111000111) and print out the bit strings of L1R1, L2R2, L3R3, L4R4. Implement a decryption function that performs one round of decryption using the S1 and S2 boxes, and decrypts the L4R4 while printing out the bit strings of L3R3,L2R2,L1R1.
i need a bank website which gives interfaces like login page, transactions page and security features for the website like captche, 3 secutiry questions, honeypot, encryption for transactions.
...system shall compare the free text submissions against the defined standard and report IF and TO WHICH EXTENT the submission(s) are compliant with the standard. Example: - Standard: All communication between the supplier data center and the customer data center have to be encrypted. - Customer 1 submission: We use a Layer 1 encryption between on the WAN connection between data centers. - Customer 2 submission: Our WAN connection partner uses an optional encryption service on their WAN connection lines. - Customer 3 submission: Supplier uses xyz company product to encrypt all data going out of the supplier DC LAN. The AI should report: - Customer 1: Compliant - Customer 2: Non Compliant - Customer 3 Compliant. Obviously the AI would have to be trained for this. ...
Hi all, We need to create a module to connect a magento 2 store to our payment gateway. All communication with the gateway is done using SSL encryption and no confidential cardholder data is ever stored on the Magento 2 website. A process called tokenization is used to run transactions with stored payment information. This lets the customers pay with a 'saved' card which are not stored on the magento 2 server at all. When a customer visits the store and make checkout, he needs to select the payment method at the checkout, while selection of the payment gateway, he will need to enter the credit card information. He will be able to save the credit card to make further transaction easy and fast. So next time when he comes for the purchase, he will just need to select saved c...
On Login, Sessions, Flush Messages, and Custom Error Handlers in Flask
How safe is your online communications? Here are simple tips on how to get started on encryption.
Here are some nifty OTR (off-the-record) apps to beef up your mobile privacy and security