Blowfish endian jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    443 blowfish endian jobs found, pricing in USD

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be determined as part of this process.

    $355 (Avg Bid)
    $355 Avg Bid
    13 bids

    ...extension to the encrypted files. 5. Ensure that your decryption process accurately recovers the original file, including its correct extension. The decrypted file should be identical to the original input file in every aspect. Topics for Approach 1: Implementation of one of the below algorithms Implementation of DES (Data Encryption Standard) AES (Advanced Encryption Standard) Camellia Blowfish Twofish RC4 (Rivest Cipher 4) Serpent CAST-128/CAST-256 Project Guidelines: 1. Proposal Submission: o ● Submit a proposal outlining the chosen approach and topic. o ● Include a brief description of the methodology for Approach 1 or the selected 2. Research Phase: o ● Approach 1: Conduct research on the chosen encryption algorithm, understanding its principles and fu...

    $117 (Avg Bid)
    $117 Avg Bid
    43 bids

    ...instead specifies that a message is Standard or Extended, in which case the vFrameFormat value should instead be 0 or 1, respectively Task: Update the editor so that the vFrameFormat value of a given message always matches the message type as follows: Standard: 0 Extended: 1 J1939PG: 2 #2: Intel/Motorola is currently not handled correctly for data payload decoding Currently, the little/big endian works correctly for the ‘CAN signal preview’ section to the left. Note in particular that the byte order changes when changing between Intel and Motorola. However, in the right-side payload decoding, this is not implemented correctly. Task 1: Replicate the byte order index column to the left of the Data column in order to make it explicit what the byte order is. This sho...

    $168 (Avg Bid)
    $168 Avg Bid
    38 bids

    Good morning friends, I have an Endian server which is working as a VPN and firewall. But for a moment when I want to access Google from any browser, it tells me that The connection is not private and shows me the certificate information. The curious thing is that the mentioned certificate expires in 2029. This happens to all internal and VPN clients. I hope in advance for your support. Write to me for any questions, the connection could be through Anydesk.

    $144 (Avg Bid)
    $144 Avg Bid
    24 bids

    Need a tcp client program written in C (or C++) that follows 1. Works on Linux (windows is not necessary) 2. C++17 3. Does not use Boost or ASIO or any higher level libariries 4. Must be simple, contained in one file 5. IP address of the server must be found out from it's host name using getaddrinfo function, port is 9009. 6. The byte order is little endian Rest of the requirements are in the attcahed Word document.

    $43 (Avg Bid)
    $43 Avg Bid
    13 bids

    I want an excel file with two columns and 1500 rows The first column is an explicit text consisting of one, two or three words The second column is the ciphertext of the first column using the Blowfish encryption algorithm Note / I can give you a website that you use to encrypt the ciphertext Duration of work / one or two days only

    $22 (Avg Bid)
    $22 Avg Bid
    47 bids

    This i need to send receive audio data to websocket and websocket data pass back to asterisk. Now code is :- asterisk sending audio stream data to go program and go convert wav file in send back to asterisk before change the chunk size 320 and 16-bit, 8kHz, mono PCM (little-endian). Need to change:- create a new websocket client and client audio strem data sent to asterisk via go. asterisk side receive audio strem data send to websocket client side . AudioSocket is a simple TCP-based protocol for sending and receiving realtime audio streams. There exists a protocol definition (below), a Go library, and Asterisk application and channel interfaces.

    $301 (Avg Bid)
    $301 Avg Bid
    5 bids

    For the implementation & comparison, we have selected the algorithms DES, 3DES, AES, Blowfish & RSA. For comparison, we have used files of different sizes like 25 KB, 50 KB, 1 MB, 2 MB, and 3 MB. The same input files are used for all encryption algorithms. For evaluation of the performance of various encryption algorithms, the following metrics have been chosen. Encryption time, Decryption time, Avalanche effect, Memory consumption WE REQUIRE ANY PROGRAMMING LANGUAGE CODE IMPLEMENTATION OF THESE ALGORITHMS TO COMPARE THE ABOVE-MENTIONED PARAMETERS.

    $208 (Avg Bid)
    $208 Avg Bid
    24 bids

    For the implementation & comparison, we have selected the algorithms DES, 3DES, AES, Blowfish & RSA. For comparison, we have used files of different sizes like 25 KB, 50 KB, 1 MB, 2 MB, and 3 MB. The same input files are used for all encryption algorithms. For evaluation of the performance of various encryption algorithms, the following metrics have been chosen. Encryption time, Decryption time, Avalanche effect, Memory consumption WE REQUIRE ANY PROGRAMMING LANGUAGE CODE IMPLEMENTATION OF THESE ALGORITHMS TO COMPARE THE ABOVE-MENTIONED PARAMETERS.

    $161 (Avg Bid)
    $161 Avg Bid
    6 bids

    Demonstrate deflate compression/decompression with Blowfish encryption/decryption. One textbox with two buttons for save and open Open: blowfish decrypt & deflate decompress (textbox) Save: (textbox) deflate compress & blowfish encryption to file Only work with bytes in file. Use deflate import. Convert C# blowfish to vb.net .net framework 4.8 sdk

    $34 (Avg Bid)
    $34 Avg Bid
    9 bids

    We have the following sites in webflow and need to finetune the designs as they are not optimised for responsive and look bad on mobile platforms : * * *htt...correcting the basis responsive issue, there are further opportunities to work with us on enhancing the design and building additional features, including for our main company site : *** We also have some issues with certificates/SSL which could be looked at as a general website support. In order of priority the project covers : 1. Build for SEAMAR website and BLOWFISH website 2. Editing existing sites for any technical errors on desktop site, and mainly on optimising for responsive on mobile platforms 3. Shopify development 4. Everything else

    $1230 (Avg Bid)
    NDA
    $1230 Avg Bid
    76 bids

    ...406G 6% / none 2.0G 0 2.0G 0% /sys/fs/cgroup none 2.0G 0 2.0G 0% /dev tmpfs 2.0G 0 2.0G 0% /dev/shm tmpfs 2.0G 116K 2.0G 1% /run tmpfs 410M 0 410M 0% /run/user/0 =================================== CPU Architecture: x86_64 CPU op-mode(s): 32-bit, 64-bit Byte Order: Little Endian CPU(s): 4 On-line CPU(s) list: 0-3 Thread(s) per core: 1 Core(s) per socket: 4 Socket(s): 1 Vendor ID: GenuineIntel CPU family: 6 Model: 79 Model name: Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz Stepping: 1 CPU MHz: 2353.271 BogoMIPS: 4200.35 Virtualization: VT-x Hypervisor vend...

    $63 (Avg Bid)
    $63 Avg Bid
    9 bids

    ...406G 6% / none 2.0G 0 2.0G 0% /sys/fs/cgroup none 2.0G 0 2.0G 0% /dev tmpfs 2.0G 0 2.0G 0% /dev/shm tmpfs 2.0G 116K 2.0G 1% /run tmpfs 410M 0 410M 0% /run/user/0 =================================== CPU Architecture: x86_64 CPU op-mode(s): 32-bit, 64-bit Byte Order: Little Endian CPU(s): 4 On-line CPU(s) list: 0-3 Thread(s) per core: 1 Core(s) per socket: 4 Socket(s): 1 Vendor ID: GenuineIntel CPU family: 6 Model: 79 Model name: Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz Stepping: 1 CPU MHz: 2353.271 BogoMIPS: 4200.35 Virtualization: VT-x Hypervisor vend...

    $91 (Avg Bid)
    $91 Avg Bid
    7 bids

    ...406G 6% / none 2.0G 0 2.0G 0% /sys/fs/cgroup none 2.0G 0 2.0G 0% /dev tmpfs 2.0G 0 2.0G 0% /dev/shm tmpfs 2.0G 116K 2.0G 1% /run tmpfs 410M 0 410M 0% /run/user/0 =================================== CPU Architecture: x86_64 CPU op-mode(s): 32-bit, 64-bit Byte Order: Little Endian CPU(s): 4 On-line CPU(s) list: 0-3 Thread(s) per core: 1 Core(s) per socket: 4 Socket(s): 1 Vendor ID: GenuineIntel CPU family: 6 Model: 79 Model name: Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz Stepping: 1 CPU MHz: 2353.271 BogoMIPS: 4200.35 Virtualization: VT-x Hypervisor vend...

    $132 (Avg Bid)
    $132 Avg Bid
    25 bids

    ...406G 6% / none 2.0G 0 2.0G 0% /sys/fs/cgroup none 2.0G 0 2.0G 0% /dev tmpfs 2.0G 0 2.0G 0% /dev/shm tmpfs 2.0G 116K 2.0G 1% /run tmpfs 410M 0 410M 0% /run/user/0 =================================== CPU Architecture: x86_64 CPU op-mode(s): 32-bit, 64-bit Byte Order: Little Endian CPU(s): 4 On-line CPU(s) list: 0-3 Thread(s) per core: 1 Core(s) per socket: 4 Socket(s): 1 Vendor ID: GenuineIntel CPU family: 6 Model: 79 Model name: Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz Stepping: 1 CPU MHz: 2353.271 BogoMIPS: 4200.35 Virtualization: VT-x Hypervisor vend...

    $74 (Avg Bid)
    $74 Avg Bid
    12 bids

    We have the following sites in webflow and need to finetune the designs as they are not optimised for responsive and loo...for our main company site : We also have some issues with certificates/SSL which could be looked at as a general website support. We are relaunching our blowfish site as well which we will redesign for new branding, but can also be another project should you wish to quote for this, in order of priority the project covers : MANDATORY 1. Editing 4 sites for any technical errors on desktop site, and mainly on optimising for responsive on mobile platforms OPTIONAL 2. Rectify issues with certificates or SSL issues (mainly noticed on Blowfish site) 3. New design work on Blowfish site 4. New design work on Onikishi & Milestone Beverages sites.

    $1331 (Avg Bid)
    $1331 Avg Bid
    61 bids

    Hello, I want to simulate the sinkhole attack in WSN and implement a cryptography algorithm like Blowfish to prevent it. It could be any simulator but I need the source code and enough instructions how to run the simulation and get experimental results.

    $520 (Avg Bid)
    $520 Avg Bid
    7 bids

    Using C#.Net or VB.Net, write one or more algorithms that consume binary (Base 16, Hex) data coming from a Continental AG ARS 548 automotive radar. The data comes over 100BaseT1 ethernet protocol to the intended application and needs to be converted from Big Endian binary to the appropriate ASCII Messages and Data Payloads in human readable (string) format.

    $1174 (Avg Bid)
    $1174 Avg Bid
    18 bids

    The method should do the following steps in application that use Cloud Computing: the nature if application if the priority is speed or security? the priority for security then use AES. 3. If priority for Speed then use Blowfish simulation for designed method on any application in Cloud Computing Environment and give the results for Entropy, Encryption & Decryption Time and The Bandwidth (to compare these results of this method with the AES & Blowfish) to show the enhancement

    $267 (Avg Bid)
    $267 Avg Bid
    1 bids

    The method should do the following steps in application that use Cloud Computing: the nature if application if the priority is speed or security? the priority for security then use AES. 3. If priority for Speed then use Blowfish simulation for designed method on any application in Cloud Computing Environment and give the results for Entropy, Encryption & Decryption Time and The Bandwidth (to compare these results of this method with the AES & Blowfish) to show the enhancement

    $190 (Avg Bid)
    $190 Avg Bid
    2 bids

    I'm doing project on secure file storage on cloud using hybrid cryptography using AES BLOWFISH RSA algorithms and image steganography I have built the backend functionality in python for the same I want a person to do the front end for that and the database connection to the back end.

    $16 (Avg Bid)
    $16 Avg Bid
    2 bids

    I'm doing project on secure file storage on cloud using hybrid cryptography using AES BLOWFISH RSA algorithms and image steganography I have built the backend functionality in python for the same I want a person to do the front end for that and the database connection to the back end.

    $21 (Avg Bid)
    $21 Avg Bid
    3 bids

    -*a file containing signed integers, unsigned integers and floating point numbers -* the byte ordering type (Little Endian or Big Endian), -*the size of the floating point data type (the size of both signed and unsigned integers are 2 bytes), as input and converts the contents of the file to hexadecimal according to the predefined format and gives the converted data as output.

    $124 (Avg Bid)
    $124 Avg Bid
    14 bids

    Task briefly: Find multiple parameters in a binary file and replace their values with new ones. Binary file encoded using the Resource Interchange File Format in a Big-Endian byte-ordering. The structure of the file and data is known, at least for searching and parsing the necessary blocks. What will be provided: Binary file (test file), xml representation of a binary file (to understand the structure), language definitions and structure of a binary file, an indicative guide on the structure of blocks for search (parsing) and the names of the desired parameters, additional supporting details and explanations. Input parameters for a function in a console c++ application: File path, string with value to search, parameter values to replace Research Procedure (a specific schem...

    $150 (Avg Bid)
    $150 Avg Bid
    4 bids

    Task briefly: Find two parameters in a binary file and replace their values with new ones and overwrite the original binary file. Binary file encoded using the Resource Interchange File Format (RIFF) in a Big-Endian byte-ordering. The structure of the file and data is known, at least for searching and parsing the necessary blocks. The binary file can be uploaded to the online service and narrow down on how data is represented. What will be provided: Binary file (test file), xml representation of a binary file (to understand the structure), language definitions and structure of a binary file for the Kaitai viewer (), an indicative guide on the structure of blocks for search (parsing) and the names of the desired parameters, additional supporting

    $122 (Avg Bid)
    $122 Avg Bid
    6 bids

    ...RS232/RS422/RS485. The 6 UARTs are controlled via FPGA. The SoC is connected to the FPGA via IFC bus. Refer to block diagram (attached) The Linux Kernel generic 16550 Kernel Driver has implementation of 8 bit/32 bit base. The access to our FPGA is via 16-bit chip select. The UART Control FPGA registers have the low 8 bits for actual R/W and the high 8 bits are reserved. Also it appears like we have Endian (Big/Little) polarity problem between the SoC Linux Kernel and the FPGA. The DTB is properly set. So here the connection is broken. We need a short time Linux Kernel expert level solution that will evaluate all of the 6 Serial ports properly working (including interrupts) via setserial/minicom app in user space. Regarding the solution, we would prefer to leave the generic 165...

    $4000 (Avg Bid)
    $4000 Avg Bid
    1 bids

    Determine ActionScript version of swf file using PHP. Below is a link to some code in C# that maight be helpful. To clarify, I'm running webserver that has PHP on it and a lot of SWF files. I need a function in PHP that w...uses Linux as an OS. Need to be done ASAP. I cannot wait week or even days. Read first 4 bytes of SWF file. First 3 bytes are Signature which reads (CWS or FWS) and next byte is SWF file version. So you don't need any library, just simple File IO will suffice. For actionscript version you need to look for FileAttributes Tag. So here is pseudo code for doing this. (in SWF file data is in Little Endian, so write your readInt or readShort function accordingly).

    $190 (Avg Bid)
    $190 Avg Bid
    4 bids

    I need vb6 module for CRC-16-IBM Reversed 0xA001 Little Endian (DCBA)

    $26 (Avg Bid)
    $26 Avg Bid
    3 bids

    We require a consultant to provide guidance on patching vulnerabilities in a client SUSE linux server. You will NOT have unsupervised access to the client server and will be required to provide written advice and procedures for our team to implement. On some occasions we might allow ...implementations of SSH is not known. SSH can be done using Counter (CTR) mode encryption. This mode generates the keystream by encrypting successive values of a "counter" function. In order to mitigate this vulnerabilty SSH can be setup to use CTR mode rather CBC mode. 2020-05-15 0:00:00 2020-09-25 0:00:00 2020-10-02 0:00:00 TCP 22 * Running SSH service * Insecure CBC ciphers in use: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc devdb..com (n/a - Third Party): This ...

    $14 / hr (Avg Bid)
    $14 / hr Avg Bid
    8 bids

    My setup: I setup my mailserver with postfix, dovecot on ubuntu 18.04 lts. dovecot 2.3.11.3 (502c39af9) mail_version = 3.3.0 Postfix+dovecot handle 1 email account for 1 domain, mappings/auth (blowfish) through mysql on the same server. The server also hosts some websites (nginx, multiple domains) that smtp emails to SendGrid (delivery service) thanks to postfix. Mail to root is supposed to get sent to one email address, set on /etc/aliases on another domain. Doesn't work. User doesn't exist because postfix doesn't read /etc/aliases Furthermore the setup has an issue where authentication fails. /var/ tells "aborted login client didn't finish SASL auth".

    $83 (Avg Bid)
    $83 Avg Bid
    7 bids

    We are music agency, we are looking for creating high quality lyrical videos for our clients. Master digital video Vevo Release File (separate clips) * Package: .MOV Supported Video Codec: Apple ProRes 422 (HQ) Supported frame formats: • 3840x2160 progressive 23,976, 25, 29.97 fps • 1920x1080 progressive 23,976, 24, 25, 29.97 fps Audio Codecs **: PCM (little or big endian / 16 bit or 24 bit) - 48kHz - L R (Stereo) * clips cannot contain logos that exceed 3 seconds. To insert a logo, it must be informed to the artistic department. ** The video must be synchronized with the latest audio version. Please let us know the price for a video creation

    $142 (Avg Bid)
    $142 Avg Bid
    33 bids

    The pogrom is about testing the performance of AES, BLOWFISH, DES AND 3DES i have the codes and the structure for each security algorithm , i am working with C# the purpose is to test the performance of each algorithm on some parameters like Encryption time Deception time Entropy Avalanche effect CPU and memory usage

    $20 (Avg Bid)
    $20 Avg Bid
    2 bids

    I am trying to make the packer to protect a file but it seems like the shellcode needs a JMP instruction added at the top, so it jumps to the entrypoint of it, E9 <32bit little endian> The code was too big to post it here the first line of code is main.c , the second syscall.c , the third utils.c. I have put to each line of code , main.c : , syscall.c : , utils.c :

    $82 (Avg Bid)
    $82 Avg Bid
    1 bids

    This job is to understand the encoding of the Dominion QRCode. Decoding the graphic QRCode graphic is no problem. It complies with the open standard. What we need is to und...02 22 21 00 80 40 00 | ~~"~B~ ~"!@~ | 0020 00 00 92 01 00 00 09 00 03 00 0a 2a 80 00 00 64 | ~~~~~~~~~~~*~~~d | 0030 ab f7 99 fe ad 85 f4 13 91 6b 29 80 30 c3 76 43 | ~~~~~~~k)~0~vC | 0040 91 e1 c1 e7 fb dc 6f 02 13 fb 11 72 c0 ca ff f3 | or | Can be converted at It appears that 8f 23 00 00 in the first line appears to be 0x0000238f in little-endian format and that is 9103, the precinct number. I see also 91 01 00 00 which is 0x00000191 or 401 and 92 01 00 00 in the third line which is 402, the other number printed at the top, which are probably the style designators.

    $220 (Avg Bid)
    $220 Avg Bid
    4 bids

    I have a 24 byte message of data transmitted in Little Endian byte order. I need this message decoded based on field descriptions I have attached and output in csv format. I prefer the code be written in PHP if possible. attached holds 3 seperate messages for testing. attached holds the field descriptions.

    $117 (Avg Bid)
    $117 Avg Bid
    3 bids

    ...career and we thought it would make for an incredible documentary. We started production last May and have procured interviews on Mr. Engler’s behalf from some of the biggest names in the industry. Namely, Peter Asher (promoter and manager for Neil Diamond, James Taylor, Diana Ross, Linda Ronstadt & Bad Finger); Doc McGhee (Manager for Kiss, Bon Jovi, Scorpions, Motley Crue and Hootie and the Blowfish); James Young (Founding Member and Guitarist for Styx), Phil Earhart (Drummer and Manager for Kansas); Pete Hewlett (Singer for Billy Joel, Elton John); Joe Grushecky (Founder of the Iron City House Rockers and collaborator with Bruce Springsteen); Benny Faiella & Herman Granati (Granati Brothers and The Jaggerz); Norman Nardini and Frank Czuri (Diamond Reo); J...

    min $50000
    min $50000
    0 bids

    Make me a research essay about a topic on encryption, such as: AES, Blowfish, 3DES.

    $81 (Avg Bid)
    $81 Avg Bid
    3 bids

    * Change the format into RIFF (little-endian) data, WAV format (not .wav), Microsoft PCM, 16 bit, mono 8000 Hz audio. This is the only acceptable audio format to work on my FreePBX server. * These are sound files for a recorded hotline that we advertise so people call us.

    $18 (Avg Bid)
    $18 Avg Bid
    15 bids

    I need to convert the attached list of decimal numbers to 14 place hexidecimal. The standard DEC2HEX formula in excel does not work. can you provide a method to do this conversion?

    $115 (Avg Bid)
    $115 Avg Bid
    9 bids

    Hi I would like some incredible business cards designed with an existing logo that I have. I will be looking for someone who pays attention to detail and who is great with artistic branding. I will need the following information on the business card such as. IT services for business and education 24/7 Managed IT Services Cloud ...business and education 24/7 Managed IT Services Cloud Computing Servers and Networking Network Security VOIP Phone Systems CCTV First name and surname email address: joe@ Business phone number and mobile: Facebook Link: website link: Then on the other side of the card I would like some of the brands we are partnered with. Microsoft Apple MYOB LEAP Endian Firewall Voucher code: Blank space for sticker with a number

    $76 (Avg Bid)
    Urgent Guaranteed
    $76
    558 entries

    Please ANSWER ALL of the below questions in your BID offer in order to be considered! Thanks! (But I will hire ANYONE that simply completes the TASK described in the attachment. So do not fear the questions :) ) 1. Are you a Linux Kernel expert experienced with Embedded Linux Systems using U-Boot bootloader? 2. Are you experienced debugging Qemu KVM virtualization with GDB etc? 3. Are you experienced with programming embedded devices and firmware/bios etc in C/C++? Thanks for answering those questions! SEE FILE ATTACHED FOR DETAILS for the DETAILS of the JOB/TASK. (The job/task should be pretty simple/straight forward but takes a couple hours.) When you BID make sure to mention if your BID INCLUDES PART 4"B" or just part "A".

    $264 (Avg Bid)
    $264 Avg Bid
    3 bids

    UPDATE: It took forever to get anyone to bid so I started working on solution myself, I got a VM r...solution myself, I got a VM running fine, i will close project tomorrow if I don't need any more help, will see how it goes. ============ I need to install a 32-bit big-endian PPC linux guest virtual machine on a x86_64 debian or ubuntu HOST server running qemu/kvm version 3.1.0 (I'm open to upgrading qemu if that's required.) (When I try to change domain to qemu and set machine to 40p and arch to ppc and set path to emulator to location of my qemu-system-ppc binary virsh refuses to save config giving error.) Anyway so I want someone to provide me a WORKING proven qemu virsh config xml file that works to run a 32-bit big endian PPC linux VirtualMachine (like ...

    $595 (Avg Bid)
    $595 Avg Bid
    2 bids

    Implementing a device communication server for a given device may take a significant and substantial amount of programming work to accomplish, depending on the device protocol. To implement a server, you wil...the device protocol. To implement a server, you will likely need an in-depth understanding of TCP/UDP based communication, and a good understanding of Java programming techniques, including socket communication, multi-threading, and possibly bitwise manipulation techniques for extracting bit fields from binary data (including knowing whether the tracking device sends data in big-endian or little-endian formats). If using an http-based protocol, you may also need an understanding of how servlets are built, and how they operate within a Servlet container, such...

    $7 - $7
    $7 - $7
    0 bids

    PLEASE REFER TO THE ATTACHED DOCUMENTS FOR FURTHER DETAILS Implementing a device communication server for a given device may take a significant and substantial amount of programming work to accomplish, depe...the device protocol. To implement a server, you will likely need an in-depth understanding of TCP/UDP based communication, and a good understanding of Java programming techniques, including socket communication, multi-threading, and possibly bitwise manipulation techniques for extracting bit fields from binary data (including knowing whether the tracking device sends data in big-endian or little-endian formats). If using an http-based protocol, you may also need an understanding of how servlets are built, and how they operate within a Servlet container, suc...

    $536 (Avg Bid)
    $536 Avg Bid
    2 bids

    Hi Blink Media/ BlowFish SEO, I noticed your profile and would like to offer you my project. We can discuss any details over chat.

    $2 / hr (Avg Bid)
    $2 / hr Avg Bid
    1 bids

    I need the completion of 3 short projects in x86 32 bit Assembly lang, the project consinst of writing the relative assembly code in a asm section of c file: The assemby must be in Intel syntax. The mini projects are: 1: Replace all occurrences of a substring within a string in Ass...assembly code in a asm section of c file: The assemby must be in Intel syntax. The mini projects are: 1: Replace all occurrences of a substring within a string in Assembly 2: Find the Greatest common divisor of unsigned ints in array 3: Given an array of DWORDs, reverse the order of the DWORD bytes that have a number odd bit to one (the inversion consists of the transition from little-endian to big-endian). I will send you the templates from the C file. You cannot use more variables tha...

    $20 (Avg Bid)
    $20 Avg Bid
    1 bids

    May I ask you if I need project on back links building. How much cost per piece? I need long term cooperation. Pls note human hand white hat back links or google would punish me and give up my project.

    $100 (Avg Bid)
    $100 Avg Bid
    1 bids

    I need a matlab code for blowfish algorithm encryption with text file that I can write into it the plaintext to finally get the ciphertext. The ciphertext will be uploaded to cloud and need to be decrypted before get to the user.

    $86 (Avg Bid)
    $86 Avg Bid
    11 bids

    Hi Blink Media/ BlowFish SEO, I noticed your profile and would like to offer you my project. We can discuss any details over chat.

    $237 (Avg Bid)
    $237 Avg Bid
    1 bids