Hash md5 salt decrypt jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 hash md5 salt decrypt jobs found, pricing in INR

    ...&sd=true We followed the instructions provided and implemented the following code using server-side Node.js. We utilized ngrok to enable HTTPS connections. We have successfully initiated a transaction using this code in the uploaded file. However, we encountered an issue retrieving the transaction, which should have been provided but is not available. We were advised to handle callbacks and decrypt the response, but we're facing difficulties in doing so. Handling callbacks and post-success payment URLs did not resolve the issue. We now need the transaction ID, which we are unable to obtain. We need someone who can do the final step here and complete the integration on the website. The website is in React Js and Node Js. The solution should be configurable for other we...

    ₹7595 (Avg Bid)
    ₹7595 Avg Bid
    24 bids

    I'm looking for a skilled Python developer with experience in GPU programming using CUDA to assist in a project that involves image processing and data analysis. - I have a python code and I need to modify it to work with GPU the code takes an image changes its pixels one by one and each pixel change calculates new image hashes if images hash satisfies some specs it save image and code ends. this is whole python code is doing now. it is a 40 lines code. very simple for someone who knows how to code on cuda.

    ₹3255 (Avg Bid)
    ₹3255 Avg Bid
    7 bids

    ...menu=5&menu-item=UCFDocs We followed the instructions provided and implemented the following code using server-side Node.js. We utilized ngrok to enable HTTPS connections. We have successfully initiated a transaction using this code in the uploaded file. However, we encountered an issue retrieving the transaction, which should have been provided but is not available. We were advised to handle callbacks and decrypt the response, but we're facing difficulties in doing so. Handling callbacks and post-success payment URLs did not resolve the issue. We now need the transaction ID, which we are unable to obtain. We need someone who can do the final step here and complete the integration on the website. The website is in React Js and Node Js. The solution should be conf...

    ₹1002 / hr (Avg Bid)
    ₹1002 / hr Avg Bid
    51 bids

    I'm working with an API who giving the hash of a file, it returns a p7s digital sign in base64 who needs to be add it to the PDF dictionary. (It can be one or more signatures) What I want is, the ability to add the sign to the PDF in NodeJS (better if it's with typescript) and then open it in adobe acrobat and see the sign. I will provide the PDF sample, the hash of the file and the response of the API in base64 to be tested. Additionally I have an example in Java to better undestanding of the requeriments The flow of the file will be: 1. Give the hash and received the API response (this will be mocked) 2. The API response must be decoded (it's in base64) and add it to the PDF 3 A new PDF must be saved in the disk 4. When the new pdf is opened in Ado...

    ₹10850 (Avg Bid)
    ₹10850 Avg Bid
    36 bids

    I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption methods

    ₹13520 (Avg Bid)
    ₹13520 Avg Bid
    40 bids

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be determined as part of this process.

    ₹29210 (Avg Bid)
    ₹29210 Avg Bid
    14 bids

    ...breached passwords and prompt users to change them if matched. - Use Argon2 for password hashing with a unique salt for each password. - Integrate an additional HMAC layer for hashing with a highly secure secret salt. - Implement two-factor authentication (2FA) using a popular service like Google Authenticator. - Enforce session security with HTTPS and consider HTTP Strict Transport Security (HSTS) for enhanced security. - Implement CAPTCHA verification to prevent automated attacks and manage session rate limiting effectively. Recovery Options: - Generate recovery keys using () with at least 20 bits of entropy. - Ensure recovery keys are delivered securely and are single-use. - Hash recovery keys using Argon2 with individual salts. - Explore implementing HSTS to p...

    ₹2014 (Avg Bid)
    ₹2014 Avg Bid
    33 bids

    ...deployed to a single device, so I will likely need help setting up LaunchPad, or bringing up the code in my own developer environment for self-install. The traffic capture going on is literally equivalent to what is already being done in published and approved App Store applications. I will only be capturing my traffic, so it is not confidential. No, this app will not be able to break encryption and decrypt securely encrypted data. (Freelancer requires me to make this statement explicitly in the project description because they have genuinely no idea how encryption actually works on a technical level.) Required skills: - Knowledge of an iOS app implementation language (ObjC or Swift) - Experience developing robust, well-functioning apps (buffering and saving data, stable withou...

    ₹41980 (Avg Bid)
    ₹41980 Avg Bid
    45 bids

    ...same exact name. Of course browsers often use the cached version instead. The files are big enough where I want the browser to cache them, but only until they change - then the browser needs to grab the new version from the server. The apache and .htaccess expire headers haven't done what I need. I read that some codebases exist that will assign a variable to the end of the URL based on a file hash. I thought this may be the way to go. The solution needs to be editable by me. I am more of a general IT person who can do some front end development and tweak some code. So markup and explanations are important or available documentation if we cab use a simple library. A follow up project might be to implement squid or some sort of automatic way of localizing those pdf a...

    ₹2003 / hr (Avg Bid)
    ₹2003 / hr Avg Bid
    90 bids

    ...been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as part of the investigation and produce a report based on your management of the case, your analysis and your findings. You will have to: setup your forensic workstation for your analysis, which would include any forensic tools that you feel are appropriate for the job, download a copy of the forensic image from th...

    ₹9431 (Avg Bid)
    ₹9431 Avg Bid
    25 bids

    ...been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as part of the investigation and produce a report based on your management of the case, your analysis and your findings. You will have to: setup your forensic workstation for your analysis, which would include any forensic tools that you feel are appropriate for the job, download a copy of the forensic image from th...

    ₹1753 / hr (Avg Bid)
    ₹1753 / hr Avg Bid
    17 bids

    ...standing pouch mylar bag design for my organic, dairy-free, non-GMO, Kosher, low-calorie, corn chip white matte mylar standing pouch. The product name is "Double Dip Chips" and we offer various flavors like Arctic Delight, Flamin Fuego, Hickory BBQ, White Truffle Salt, Black Truffle Truffle Salt, Sour Cream and Onion, Sour Cream and Bacon Flavor(no actual bacon), Original Kosher Salt, Flamin Fusion with Dill, Healthy Air Fried, Homestyle Ranch, Jalapeno, Kettle Cooked, Lemon Pepper, Nashville Hot, Original Dipped in Chocolate, Salt and Vinegar, Spicy Nacho. Key requirements: - Design for two STANDING POUCH WHTIE MYLAR BAG - Bag sizes – (3.8" X 6.5") 1.5 oz and (3.8" x 6.8") 3.5 oz. - The design should highlight specifi...

    ₹10015 (Avg Bid)
    Guaranteed
    ₹10015
    54 entries

    ...the following structure: First line: The block header. Second line: The serialized coinbase transaction. Following lines: The transaction IDs (txids) of the transactions mined in the block, in order. The first txid should be that of the coinbase transaction Difficulty Target The difficulty target is 0000ffff00000000000000000000000000000000000000000000000000000000. This is the value that the block hash must be less than for the block to be successfully mined. Execution Create a file named that contains the command to execute your script. This file should ideally contain a single command like python or node index.js. Your script should autonomously perform all tasks when is executed, without requiring any manual intervention. Evaluation Criteria Your submission will be evaluat...

    ₹918 (Avg Bid)
    ₹918 Avg Bid
    3 bids

    This is a project to convert a complex file encryption/deencryption write in C++ to VB.NET (Framework 4.0)

    ₹1973 (Avg Bid)
    ₹1973 Avg Bid
    3 bids

    I need to decrypt a crypted client-side log file (.txt) of a desktop application The goal is to understand the logic behind encryption and write a simple script that translates data in human-readable text. I have no idea on how encryption is made. The application has a client-server architecture, and could have restrictions based on user location. So, you will likely need to use a vpn or vps to test. Source code must be delivered at the end of contract, better if logic behind script is directly explained via call (not mandatory). Preferred language for scripts is p1ton (volutanry wrong to not received automated answers), but I am open to other language if there are clear benefits.

    ₹10850 (Avg Bid)
    ₹10850 Avg Bid
    63 bids

    ...hpn5B"/> <Params> <Token Type="string" Value="b6JnfGF7fXMjOjB79zVoLCJwZCIyICIvMTMjLCJp9ka18WRo9jIyICJnYWvnYSIrIkfgeWUjOjAjYkfx9j2iY62T8Ga5YkFreDMjLCJpejIyICJwezZoZ1FnIjpjfGouZSIyICIvNnE6NTm5NiIvIz7"/> <TransactionID Type="string" Value="9156174388"/> <WinReferenceNum Type="string" Value="17612298068"/> <WinAmount Type="int" Value="75"/> <GameReference Type="string" Value="bgor-cc-Showball3 "/> <Hash Type="string" Value="1b522defc135ef9bea631d94a99f587bcb1cb03ec08ca356de42fb77f4e3c4a4"/> <BonusWinAmount Type="int" Value="0"/> <GameStatus Type="string" Value="Pending"...

    ₹2420 (Avg Bid)
    ₹2420 Avg Bid
    79 bids

    Hiring technical personnel can achieve complete development of the following code in practice. There may be something wrong with the code below, but there is project direction. pip install telethon Import TelegramClient from Import functions from # Create Telegram client with your API ID and API hash api_id = 'Your API_ID' api_hash = 'YOUR_API_HASH' Client = TelegramClient('session_name', api_id, api_hash) Asynchronous def send_dice(chat_id, dice_face): Asynchronously with client: result=awaitClient(( peer = chat id, Query id=0, id='robot command', silence=false, Scheduled Date = None, background=false, cleardraft=false, hide_via=true, selected=[dice_face] # 1-6 are ordinary dice )) print(result) # Fill in your account mobile

    ₹81122 (Avg Bid)
    ₹81122 Avg Bid
    59 bids

    I'm in need of an expert who resides in the Salt Lake City UTAH USA area, too manage the bureaucratic process for gaining a Utah Oil Gas and mineral exploration permit, with a focus on just the paperwork to get a mineral exploration permit. Experience required. A preferred relationship with Utah DOGM local governance and a proficient understanding of the geological framework of UTAH would be an advantage. Desirable skills and qualifications: * Experience in minerals and mining permit processing * UTAH SPECIFIC DOGM - you must be a Utah resident, USA. * Familiarity with Utah's mineral exploration permit application procedures.

    ₹27207 (Avg Bid)
    ₹27207 Avg Bid
    28 bids

    ...cutting-edge algorithms to enhance the project's efficiency and security. requirements are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you shou...

    ₹24453 (Avg Bid)
    ₹24453 Avg Bid
    27 bids

    ...is to develop a permanent HWID (Hardware Identification) virtualizer capable of virtualizing various hardware IDs on a Windows-based system. Project Description: We require the development of a C++ program capable of permanently virtualizing the following hardware IDs: - Disks - Volumes - SMBIOS - UUID - BIOS Serial Number - Chassis Serial Number - MAC Address - CPU/GPU - TPM Module - MD5 - SHA1 - SHA256 - Memory - Windows Product ID The virtualizer should be designed to retain the virtualized HWIDs even after a system restart. A robust persistence mechanism should be implemented to ensure the virtualization is enduring. Furthermore, it is imperative that the program be cross-platform and compatible with various versions of Windows (10 & 11). Key requirement...

    ₹187615 (Avg Bid)
    ₹187615 Avg Bid
    34 bids

    More details: What specific tasks or functionalities do you need assistance with? Writing test cases, Implementing test automation, Debugging code What programming languages are involved in your project? Python, Java, JavaScript What is the main goal or objective of your project? Improving software performance

    ₹926 / hr (Avg Bid)
    ₹926 / hr Avg Bid
    8 bids

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    ₹17359 (Avg Bid)
    ₹17359 Avg Bid
    12 bids

    I am in urgent need of a decryptor tool to recover my files that have been encrypted by a virus. My all files are encrypted with ".mkp" Unfortunately, I do not have any backups of these files, so the tool needs to be able to decrypt them directly. Key Requirements: - The tool must be compatible with Windows OS - It should be able to quickly and effectively decrypt files with the .mkp extension Experience Needed: - Proficiency in software development and security - Experience in creating decryption tools is highly preferred - Ability to work quickly and effectively to meet the immediate deadline Please only bid on this project if you are confident in your ability to meet these requirements and can deliver the tool within the specified timeframe.

    ₹1002 (Avg Bid)
    ₹1002 Avg Bid
    1 bids

    I'm seeking an expert who can decrypt an AES encrypted .cap file. The file contains encrypted data I need to access for educational purposes. Key requirements include: - Expertise in decrypting AES encrypted files - Ability to efficiently and securely recover the data from the .cap file - Strong commitment to data privacy and confidentiality Please provide examples of similar work you have done in the past, and outline your proposed approach to this task.

    ₹1502 / hr (Avg Bid)
    ₹1502 / hr Avg Bid
    15 bids

    Project Description: We are a distinguished brand in the health food industry, known for our premium Bone Broth range. Our products are crafted with the finest ingredients, including ACV, turmeric, Himalayan salt, gelatin, and marrow, designed to cater to health-conscious consumers seeking nutritious and flavorful options. As we aim to expand our footprint into the Saudi Arabian market, we're seeking a highly skilled professional with a deep understanding of the food and beverage landscape in Saudi Arabia, particularly in Riyadh, Jeddah, and Dammam. Your Responsibilities: Market Research: Conduct comprehensive market research to understand the health food landscape in Saudi Arabia, focusing on consumer preferences, competitor analysis, and regulatory requirements in Riyadh, ...

    ₹16525 (Avg Bid)
    ₹16525 Avg Bid
    35 bids

    I'm seeking an expert in writing Splunk queries to detect threats, efficiently querying from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expert...from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expertise include: - Proven skills in extracting and analyzing data from logs - The ability to use Regex queries to extract additional, nuanced information - Proficient querying from CrowdStrike EDR telemetry. The information to be extracted comprises of EDR fields like: - Process Name - File Hash - Command Line I look forward to working with a detail oriented and security savvy professional who will utilize this data to help us identify potential security threats and ensure sy...

    ₹29461 (Avg Bid)
    ₹29461 Avg Bid
    19 bids

    I'm looking for a talented individual with proficiency in image processing and hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in such a way that its original concepts not changes - making image change so many time like a loop - calculating images hash The resultant processed images should be provided in JPEG, PNG, and GIF formats. A background in encryption and cryptography will be highly desirable. Your experience with these specific image processing techniques will be crucial to the success of this task.

    ₹10015 (Avg Bid)
    ₹10015 Avg Bid
    56 bids

    ...and need assistance to set up a Global TCP Passthrough Load Balancing to distribute my online traffic. The ideal bidder would have: - Extensive experience in setting up Load Balancing on GCP. - Solid understanding of routing and IP Hash distribution. -Each instance stores unique files, it is important there is the lowest latency possible, when a file is sent, it must go to the instance closest to who sent the file via TCP to the load balancing IP. -I can deploy as well, just need best practices on how to achieve this. Essentially, I need you to develop an IP Hash distribution strategy for distributing online traffic effectively. GCP certification is appreciated but not necessary as long as you have experience in networking and have worked on similar tasks before. A smoot...

    ₹12101 (Avg Bid)
    ₹12101 Avg Bid
    18 bids

    I'm looking for an expert in large format ASA 3D printing to print two predesigned objects. The material choice is essentia...skills in ASA 3D printing - Experience in prototyping, specifically machine parts - Ability to achieve a moderate level of detail in produced parts I need two parts printed from each file (4 pats in total). I have two files that have been custom designed to retro fit a 1960's pool where no parts are available. The material choice of ASA resin is based on the ability to tolerate UV exposure in a salt water pool. The stl files are to scale and must remain dimensionally stable. The end goal is to receive a well-executed product that aligns with the described specifications for prototyping purposes. Please ensure to detail your experience and prof...

    ₹48552 (Avg Bid)
    ₹48552 Avg Bid
    30 bids

    ... "INGREDIENTS:Maltitol, milk protein blend (calcium caseinate, whey protein concentrate, whey protein hydrolysate), hydrolyzed bovine collagen, water, polydextrose, glycerin, cocoa butter, milk, high oleic sunflower oil, unsweetened chocolate, xylitol, contains less than 2% of each of the following: cocoa processed with alkali, whey protein isolate, butter (pasteurized cream, salt), sunflower lecithin, gelatin, salt, natural flavors, soy lecithin, cocoa, sucralose." "NATURAL AND ARTIFICIAL FLAVORING. EXCESSIVE CONSUMPTION MAY CAUSE A LAXATIVE EFFECT (DUE TO MALTITOL). NOT A LOW OR REDUCED CALORIE FOOD." UPC Allergen Statement "Contains: Milk, soybeans. Manufactured in a facility that also processes: Wheat, gluten, peanuts, tree nuts and sesame.&...

    ₹28126 (Avg Bid)
    Urgent
    ₹28126 Avg Bid
    42 bids

    ...different products, then put his address files in etc. and finally the bot needs to create a crypto invoice for the cryptocurrency of choice at current price and wait for payment confirmation from the crypto pay gate. Finally, once the order is confirmed, the bot needs to process all order information into a .txt or .csv file and save it locally on the machine. The script should also be able to decrypt PGP encrypted address information automatically. 2) Some sort of APIs between the bot script and all the messengers desktop sessions listed above that allow the bot script to communicate with each messenger. The purpose of this is to allow running regular non-business, non-shop affiliated messenger accounts as effective bot shops. I do NOT want to use shop-affiliated infrastructur...

    ₹229177 (Avg Bid)
    Featured
    ₹229177 Avg Bid
    37 bids

    1- I need an update on my buy and sell bot that works on the Solana network through the Raydium pool, the bot has a mechanism for capturing variations in the chart and sending buy or...com/runtime/programs exemple : *jito priority documentation : *examples of program users that currently run within the Solana blockchain : user hash >program + jito = *example of priority in JITO + jupiter agregator user hash =

    ₹87715 (Avg Bid)
    ₹87715 Avg Bid
    138 bids

    I am looking for a specialist to make a custom encryption for my laptop's UEFI firmware at runtime and decrypt at output. At no point will the firmware itself be decrypted. This will enhance security and protect the firmware from potential tampering or unauthorized access. I am keen on improving the overall safety of my system, and thus value someone who understands the essence of addressing security vulnerabilities. Here's what I am looking for: - A comprehensive understanding of kali linux as that is the targeted operating system for this project. - Proficiency in dealing with UEFI firmware. Specifically, if you have experience working with the firmware on the Lenovo Ideapad Slim 3 15IIL05, that would be preferable. - Prior experience with firmware encryption and decr...

    ₹106493 (Avg Bid)
    Featured
    ₹106493 Avg Bid
    6 bids

    ...Developera który stworzył ten program:: Features Written in c++, best performance with multithreading Beautiful GUI, inspired in Blizzard All errors and exceptions throw user friendly messages International Multilanguage Fast download files Method of Hash (CRC32) default Banner in home (Promotion, Event, New Image, etc...) + News / Patch notes Initialize client with arguments Tool user friendly for generate serverlist hashs New config game for Metin built-in (Requirements: metin2client source) Available Hash method to choose Md4 Md5 Sha1 Sha224 Sha256 Sha384 Sha512 Sha3_224 Sha3_256 Sha3_384 Sha3_512 Available Languages This is extremely flexible when hiring you can add new languages or change existing since that helps me to translate correctly Engl...

    ₹9264 (Avg Bid)
    ₹9264 Avg Bid
    57 bids

    Do NOT bid if you are not clear on the project. Do Not bid if you did not read the entire project. Bids which come in under 3 minutes from posting will be reported to freelancer as fake bids because it is not possible to read all the documentations in under 3 minutes. Receive data many gps devices. Decrypt data Upload to Mysql ( about 10 fields) Create the ability to to send instructions to gps even from a remote device by api Protocol is JT808

    ₹22701 (Avg Bid)
    ₹22701 Avg Bid
    13 bids

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security and confidentiality given its sensitive nature.

    ₹1085 (Avg Bid)
    ₹1085 Avg Bid
    26 bids

    ...the following structure: First line: The block header. Second line: The serialized coinbase transaction. Following lines: The transaction IDs (txids) of the transactions mined in the block, in order. The first txid should be that of the coinbase transaction Difficulty Target The difficulty target is 0000ffff00000000000000000000000000000000000000000000000000000000. This is the value that the block hash must be less than for the block to be successfully mined. Execution Create a file named that contains the command to execute your script. This file should ideally contain a single command like python or node index.js. Your script should autonomously perform all tasks when is executed, without requiring any manual intervention. Evaluation Criteria Your submission will be evaluat...

    ₹1085 / hr (Avg Bid)
    ₹1085 / hr Avg Bid
    7 bids

    This Pepe like figure should be the Salt Bae with his long hair and awkward salt move. I want it to be very flamboyant and over the top. Need this to make people laugh hysterically. Want a style like the frog photos or similar to the Pepe meme. Be creative!

    ₹4173 (Avg Bid)
    Urgent Guaranteed
    ₹4173
    132 entries

    In need of a tech-savvy, innovative app developer well-acquainted with both iOS and Android system...innovative app developer well-acquainted with both iOS and Android systems. The ultimate goal is to create a cryptomining application that's user-friendly and efficient. Key Features Required: - User Registration and Login: A secure authentication method, protecting user's data and mining activity. - Real-time Mining Statistics: To keep users informed about their mining status, providing data like hash rate, earnings, and more. - Wallet Integration: Facilitate seamless transactions using popular crypto wallets. Proficiency in blockchain technology, crypto mining, and payment gateway integration is a must. We value security and user experience, so expertise in these area...

    ₹57920 (Avg Bid)
    ₹57920 Avg Bid
    16 bids

    I am in need of a Python application that will compute the md5sum of every file in a designated directory. This includes hidden files but subdirectories can be disregarded. The output function should be factored into it's own function (e.g. reportResult( dir, hashvalue ) ) and should be something similar to: < absolute path + filename > <md5sum> The application should run seamlessly on a Windows operating system. The output should simply print the computed md5sums; there is no need to store them in an external file. Requirements: - Proficient in Python - Familiarity with Windows OS - Knowledge of md5sum computation Completion is needed as soon as possible. This project is a great opportunity for someone highly skilled and efficient in Python programming.

    ₹2003 (Avg Bid)
    ₹2003 Avg Bid
    15 bids

    I need a ghostwriter to focus on the global salt industry, covering all aspects from the production methods to its historical significance and its impact on the economy. The book should: - Provide insight into different geographical regions, emphasizing the respective methods of salt production. - Highlight the historical significance of salt, explaining its impact on various eras across different regions globally. - Discuss how salt influences the economy on a global scale. Ideally, potential freelancers for this job should have: - Strong research and information synthesis skills to absorb and present a vast amount of data. - Experience writing non-fiction or histories. - An understanding of the different aspects of the global economy. - The ability to...

    ₹22010 (Avg Bid)
    ₹22010 Avg Bid
    16 bids

    I am looking for a person who will rewrite a few functions for me, preferably into a hash map or a vector, depending on what is faster and easier, it concerns objects on the map

    ₹12018 (Avg Bid)
    ₹12018 Avg Bid
    13 bids

    Informative and persuasive text which argues the benefits of salt water pools v.s the harmful effects that chlorine chemicals have on the skin. For swim teachers: exposure time and also children’s. Argue importance of swim cap and goggles.

    ₹26707 (Avg Bid)
    ₹26707 Avg Bid
    27 bids

    ...receive cycle with status return message of POP3 Server The SMTP and POP3 transmission should also be possible via SSL. SMTP and POP3 authentication should support standard authentication. SMTP Server and POP3 Server and account settings should be configurable. Email Subject should be configurable (but should also have a key to compute the cycle time in the otel receiver, like cyclekey=some number or hash ). Configuration should be done via yaml (in accordance to the opentelemetry standard) Skills and experiences required for this job: - Experience with - Experience with golang - Proficiency in SMTP and POP3 protocol - Ability to develop configurable systems - skills in data metrics and logs This project will require you to be detail-oriented, reliable, and have exceptiona...

    ₹9882 (Avg Bid)
    ₹9882 Avg Bid
    9 bids

    I'm looking for someone experienced in PLC programming to help develop a control program for a tank fill process. Our process involves efficiently moving salt water brine product to storage tanks. The program should monitor: 1. Level of salt water brine 2. Temperature of salt water brine We need the system to be automated, reliable, and easy to use as it forms a critical component in our operations. It's essential for you to have a profound knowledge of PLC programming, experience with designing control systems for liquid transfers, and a knack for creating user-friendly interfaces. Familiarity with industrial standards related to liquid storage and transfer would be an asset. The compiled code and complete documentation should be provided upon completion...

    ₹925 - ₹1542 / hr
    Urgent Sealed NDA
    ₹925 - ₹1542 / hr
    10 bids

    I'm looking for expert assistance with the electrical plan/schematic setup of a medium-sized swimming pool 30m2. This will involve the installation of pool lights, a pump system, a heating system and spare wall plugs for potential future use. Here's what I need: Switch/electricL box, containing circuit breaker...electrical plan/schematic setup of a medium-sized swimming pool 30m2. This will involve the installation of pool lights, a pump system, a heating system and spare wall plugs for potential future use. Here's what I need: Switch/electricL box, containing circuit breakers and timer to control: -Pool lights - pump system - full inverter heat pump system - 4 spare wall plugs for future utilization - salt water solinator. The timer should control all the above,...

    ₹14271 (Avg Bid)
    ₹14271 Avg Bid
    19 bids

    Here is a NodeJs package that is used to decrypt media files received on WhatsApp messages for our clients. This works well, however, it decrypts file into binary data which is saved on hard disk. This takes a lot of memory for large files. We need to modify this script so as to return stream instead of data. We should be able to use the stream in a pipeline/pipe. I have a small NodeJS script with above code, that you should take a look at and let me know if you can do it. To accomplish this, you should definitely have: - Experience with advanced NodeJS development and general decryption algorithm - Try not using other external packages, if possible - Ask me for the nodejs project in private message - Should be easy task for someone experienced

    ₹3923 (Avg Bid)
    ₹3923 Avg Bid
    7 bids

    ...cloves, crushed a thumb-sized piece of ginger, grated 6 chicken thighs, boneless and skinless 3 tbsp medium spice paste 400g can of chopped tomatoes 100g Greek yogurt 1 small bunch of coriander, leaves chopped 50g ground almonds naan breads or cooked basmati rice, to serve Methods Heat the oil in a flameproof casserole dish or large frying pan over medium heat. Add the onion and a generous pinch of salt and fry for 8-10 mins, or until the onion has turned golden brown and sticky. Add the garlic and ginger, cooking for a further minute. Chop the chicken into chunky 3cm pieces, add to the pan, and fry for 5 mins before stirring through the spice paste and tomatoes, along with 250ml water. Bring to the boil, lower to a simmer and cook on a gentle heat uncovered for 25-30 mins or un...

    ₹1586 / hr (Avg Bid)
    ₹1586 / hr Avg Bid
    37 bids