Draw Attention To Your E-Store With Magento
Magento – here’s how turn a bane into a boon.
...what you need to integrate into apps and such to support this stype of login, such as SSH Clients or Crypto Wallets. Examples: ECDSA Curve: secp256k1 (used in Ethereum ERC20 tokens) Curve: NIST P-256 Curve: secp256k1* Schnorr signature scheme (default for secp256k1) Curve: BLS12-381-Jubjub* Used for zero-knowledge proofs EdDSA Curve: curve25519 Curve: secp256k1 Curve: EdDSA* Uses non-standard hashing algorithm Curve: Bulletproofs Used for range proofs Winternitz OTS Curve: secp256k1 Curve: curve25519 Curve: NIST P-256 ZK-SNARKS Curve: secp256k1 Curve: BLS12-381-Jubjub* RSA RSA key length: 3072 bits RSA key length: 4096 bits Skills: Shamir's Secret Sharing / homomorphic encryption This will be used in a world changing project that already has many completed aspects before...
Develop a fast bitcoin mining software that doesn’t require a miner and can mine 0.1 btc within some hours The software should have it own hashing power
I need to make a VPN connection using Strongswan, the remote network is behind a NAT and I have the Encryption Domain assigned to me and the remote, the tunnel has the following properties: Authentication Method Pre-Shared Key Encryption Scheme IKE Diffie-Hellman Group Group 2 Encryption Algorithm 3DES Hashing Algorithm SHA-1 Lifetime (for renegotiation) 28800s Aggressive Mode Main Mode Encapsulation (ESP or AH) ESP Encryption Algorithm 3DES Hashing Algorithm SHA-1 Perfect Forward Secrecy No Lifetime (for renegotiation) 3600s
Implementation of hashing algorithms for analysis (without the use of libraries) Single program able to call on multiple hashing algorithms ready for analysis. Hoping to brute force the hashes created and don't have that much processing power available to do so, if it is possible to weaken the hashing algorithms to allow for this that would be great .
I have a project written by Java. This project is very simple. Hashing with Sha256, and curve25519. ex) password = name123 name123 --->hashing with sha256--->hashing with curve25519--->result I need more than million calculating power. I don't care about language if program works. ( python, c++, c, java etc) Maybe openCL or cuda or GPGPU is required ( in my opinion )
Tutor for competitive programming. Can solve high level Codeforces problems arround 2400 and explain them to me. I will pay multiple times for multiple consultings. You need to have expierence in Competitive Programming or Algorithms such as Dynamic Progamming, Dijkstra, Minimum Spanning Tree, Hashing, or Segment Trees
Thread Safe Hashing Java. Please find the attachment for more information
...nonce of size 32 bytes and a flag indicating the choice of key exchange algorithm. You may randomly generate the nonce as in Step 1 and randomly generate the choice of key exchange algorithm as well. The server randomly generates a pair of RSA public/private keys and sends to the client {public key, hash(public key)}. This constitutes the certificate. You may use libraries for key generation and hashing. Upon receiving this certificate, the client re-hashes the public key and compares with the hash that is sent. If they match the client proceeds to Step 5. Otherwise, the process ends here with an error message. The client proceeds with exchanging the pre-master secret (PS) depending on whether RSA or Diffie-Hellman were chosen in Step 2. The details of this step are in the lectur...
I need help with someone that can solve USACO gold problems. These concepts include dynamic programming, hashing, and trees.
I want a matlab code that takes an input as either zero or one and encrypt it and decrypt it using hash message authentication code
I want a matlab code that takes an input as either zero or one and encrypt it and decrypt it using hash message authentication code
we have to use locality sensitive hashing instead of contextual loss and the results
Simple 30 minute video call needed to help me create a database and a hashing function for my andriod studio application. I just need somone who can help me finish complete my project in the next 30 minutes. Live video call to help me implement Room database that will store 3 usernames and passwords. it needs to compare the hashed function of the user input to the store hashed password. then allow user to move to the next screen. everything is already set up. only need someone to do the user database and hashing function over video call so that I can understand it well. should not take more than 30 minutes. Willing to pay $30 $1 per minute. Only bid if you are ready to start now! Thank you
Hello, I am looking for an Software engineer who is familiar with HPC and GPU Acceleration. The goal is to write a PoC Kernel that computes as many sha hashes per Second as possible. Payment only for performance as discussed (should be competitive to others).
Regarding the project we discussed in chat.
Need to write a code for a simple question in java . please let me know if you are interested for details please contact me. thank you
I will purchase source codes for a biometric facial recognition algorithm for android smartphones from a mobile developer. The android smartphone app will be used in reg...candidate must be a top-notch developer/programmer and have proven experience in the development of systems. The successful bidder will be required to maintain the app with version controls and regular improvements from time to time. And must have the ability to solve problems within a short time so that the system is 99.99% operational. Importantly must secure the web portal with password hashing and a good understanding of security and make the site secure from hacking. And no short-term fortune hunters are required to bid. Only genuine developers with the required expertise are to bid as we’re on l...
we want to build a simple gui app it should use hashing algo with of store hash value in database compressed file and upload and retrview the file and decompressed it from s3 bucket and when we upload new file it check the hash and if hash value is present in file it will not upload in cloud
To prevent incoming requests from dns server by mapping them to mysql table on different server by sha1 hashing
...discovered to the defense. Be certain that you will be cross-examined over every detail. Final Report In a final report, describe to a jury how you determined the contents of the SMB transfer between the two suspects. The exercise will cover the topics of full-disk encryption, symmetric encryption, and network/email security. And, at the very least, the student should demonstrate a knowledge hashing, encryption/decryption, and geo-location semantics. Your paper should be at least five pages, double-spaced, and conform to APA style. Software Needed: Winzip or equivalent Veracrypt aescrypt Wireshark You will need other Web-based software to perform conversions....
Hashing for secure sending message implemented via MATLAB
The project involves modifying code that processes a registration form and a code that processes the login form database must now store details about the equipment available Whenever even happens on the PHP website, a log of should be recorded in SQL database. Admin users should have access to a page that displays statistics drawn from the data in the database.
Hi there I have a small webform and I need to insert data into a SQL server 2019 table using javascript. I need to hash my password using Password Hashing in NodeJS using Bcrypt. My table has 5 columns. 1. user , password, name, lastname, email, phonenumber. I have installed sequalize, node.js. driver for Microsoft Azure.
Hi there I have a small webform and I need to insert data into a SQL server 2019 table using javascript. I need to hash my password using Password Hashing in NodeJS using Bcrypt. My table has 5 columns. 1. user , password, name, lastname, email, phonenumber. I have installed sequalize, node.js. driver for Microsoft Azure.
The project includes creating and sorting folders and SHA256 hashing
Hi, I am looking for C# implementation that can retrieve similar images from a large image database in the shortest possible time. The basic idea is to use phash and vp-tree algorithms. There are three steps in the algorithm that needs to be implemented. * phash for image feature extraction. We can find implementation in nuget * sto...feature extraction. We can find implementation in nuget * store the image features in sql server * VP-tree to build index of the image feature for clustering. * based on input query image, retrieve similar images fast. Need to be developed in Visual Studio as a C# console app. Sample image database will be shared in message. Python reference Happy bidding.
Hi, I am looking for a solution that can retrieve similar images from a large image database in the shortest possible time. The basic idea is to use ORB and LSH algorithms. There are three steps in the algorithm that needs to be implemented. * ORB for image feature extraction. We can find the implementation in EMGU lib * locality-sensitive-hashing (LSH) to perform indexing of the image feature from ORB * locality-sensitive-hashing (LSH) to perform similarity matching. Need to be developed in Visual Studio as a C# console app. References to the LSH C# code will be shared in a message. However, getting to work needs to be taken care of by you. Sample images will be shared in message. Happy bidding.
Hi, We are looking for a solution that can retrieve similar images from a large image database in the shortest possible time. The basic idea is to use ORB and LSH algorithms. There are three steps in the algorithm that needs to be implemented. * ORB for image feature extraction. We can find the implementation in EMGU lib * min-hash for finding similarities between images * locality-sensitive-hashing (LSH) to perform indexing for fast image retrieval - because we have thousands of images to compare. Need to be developed in Visual Studio as a C# console app. Check the attached relevant paper on this topic. Sample images will be shared in message. Happy bidding.
Hi, We need to develop near-duplicate image detection using SURF, min-hash, and LSH algorithms. There are three steps in the algorithm that needs to be implemented. * SURF for image feature extraction- can be reused from EMGU or ACCORD lib * min-hash for finding similarities between images * locality-sensitive-hashing (LSH) to perform indexing for fast image retrieval - because we have thousands of images to compare. Need to be developed in Visual Studio as a C# console app. Check the attached relevant paper on this topic. Sample images will be shared in message. Happy bidding.
Hi, I need someone who is expert in hashing, will share more details in chat
Hi, We need to develop near-duplicate image detection from a database of million images The basic concept is to use SURF (or SIFT) with min-hash and index it using LSH. * SIFT for image signature * min-hash for finding similarity * locality-sensitive-hashing (LSH) to perform indexing To be developed in Visual Studio as a C# console app. Sample images and corresponding paper will be shared in message. Thanks
hi, our isp has advised we need the following edit made on our server 1. SSL cert is using a weak hashing algorithm - the SSL certificate authority should be able to reissue a more secure certificate. 2. SSL 2 and SSL 3 are enabled - ideally only TLS 1.2 would be enabled. 3. Generic XAMPP pages are available on the internet at - this site should be turned off. 4. Medium strength ciphers are supported (3DES or less than 112 bits) - this opens the server to the SWEET32 vulnerability its a windows server running xamp. we need a server tech to help us with this task and others.
Hi , i have a source code in c++ and i need to "hide" functions like CreateThread ! A real example can be found here :
I need to rewrite the python source code to use the GPU - CUDA instead of the CPU. I have a Geforce RTX 3070 OC 8GB graphics card. The code must be rewritten so that it uses maximally the performance of the card. Maximum number of threads and maximum speed. You need to add a few more lines to show the current hashrate (MH / s). I was thinking about using Numba libraries Example: https://stackov...CUDA instead of the CPU. I have a Geforce RTX 3070 OC 8GB graphics card. The code must be rewritten so that it uses maximally the performance of the card. Maximum number of threads and maximum speed. You need to add a few more lines to show the current hashrate (MH / s). I was thinking about using Numba libraries Example:
Looking for a full-stack developer to develop an admin and user dashboard with the following features based on the Vuexy theme: Main: ● User Registration ● User Login, includ...Notification and Announcement page. ● Multilingual Support (Internationalization/i18n & RTL). ●Operations menu by user role -Display the latest news -Display the latest notifications and announcements -Display last login specifications Security Features ● JWT or ACLs Authentication ● Cross-Site Scripting (XSS) Protection ● SQL Injection Protection ● CSRF Protection ● Secure Encrypt Password Hashing ● 256-bit Enterprise-Grade Encryption ● SMTP / API Mail (Mailgun Email Service) ● Sending data through webhooks or APIs Also, the developer must sign a Non-disclosure Agreement to work on our project.
I need a photo search engine designed and deployed. I have a growing library of photos (approximately 4 million) that I need to be able to search via submission of a photo to the API. The search would return, via the API, the closest matched photo and meta data associated with the photo an...search would return, via the API, the closest matched photo and meta data associated with the photo and up to 6 closest photos. The system also needs a method to insert new photos to the library, preferably in bulk, manage the metadata, and update existing photos in the library. The search feature needs to be extremely fast and accurate () This needs to be production ready, easily managed, and fast.
•My code should have security as a paramater and that should be increased compared to existing system by (SHA-256 Secure Hashing algorithm) •Privacy of patient health data must be maintained •Based on patient's symptoms using Machine learning algorithms, patient must be directed to a specific department (ex: heart patient based on synptoms must be directed to Cardiologist and Ear patient to ENT) •On the website patient after one transaction and doctor prescription purchased, a patient should have the privilege to book another appointment •Database must have all the symptoms existing giving results for upto 40 diseases. Blockchain databases must have Electronic health records EHR maintained on Blockchain network. Can be user defined blockchain as a sim...
Develop a fast bitcoin mining software that doesn’t require a miner and can mine 0.1 btc within some hours The software should have it own hashing power
...beside each other in supporting our community on financial goals to free this world from economic crisis. And in this exciting journey we need you besides us to reach that goal. For that instance only we are incorporating new age financial systems called crypto mining apps or banking systems that provide you money without asking for paybacks. In world of today's currency we call this system as hashing or generating random currencies from conservative fast operation of token generation process called building hashes. After all about of what cryptocurrency is we need to know specially which are legitimate and which really provides good returns to users just by enabling a few apps every 12-24 hours on your Android, IOS Or Computers. Later on the generated revenue is with...
Hi, i currently have a cuda script which handles some basic sha256 hashing this script works fine on a single thread, however i will need to run this on a multi threaded platform which is where i get an exception if i try to run on more than 1 thread i will provide the .cu script along with a c# testing project so you can replicate the issue this should be a very easy project for someone familiar with .cu code however my code is messy as i am not familiar with it and this being my first time working with it if you think you can do this please let me know
Hi, i currently have a cuda script which handles some basic sha256 hashing this script works fine on a single thread, however i will need to run this on a multi threaded platform which is where i get an exception if i try to run on more than 1 thread i will provide the .cu script along with a c# testing project so you can replicate the issue this should be a very easy project for someone familiar with .cu code however my code is messy as i am not familiar with it and this being my first time working with it if you think you can do this please let me know
Hi, i currently have a cuda script which handles some basic sha256 hashing this script works fine on a single thread, however i will need to run this on a multi threaded platform which is where i get an exception if i try to run on more than 1 thread i will provide the .cu script along with a c# testing project so you can replicate the issue this should be a very easy project for someone familiar with .cu code however my code is messy as i am not familiar with it and this being my first time working with it if you think you can do this please let me know
Develop a fast bitcoin mining software that doesn’t require a miner and can mine 0.1 btc within some hours The software should have it own hashing power
We are looking for someone who are passionate to build courses for students on Practical Data Analytics. An ideal candidate should have experiences in teaching these topics in any education institution, bootcamps or c...Introductions to Data Analytics - Data Analytics Process - Hands-on project and exercises with SQL and BigQuery - Data Cleaning (normalization, cleaning and standardizing) - Feature Generation - Visualization 3. Feature Engineering (with pandas and numpy) - Removing Data (missing values, outliers, dimensionality reduction) - Transforming Data (Numerical Encoding, Categorical Encoding, Bagging, Hashing) - Enhancing Data (Creating new features) - Validating data (data quality) 4. Data Analysis - Linear Regression - Logistic Regression - Visualizations (matplotlib an...
We have a built website (using php and mysql) and we’re missing a few security features such as validations, password hashing, 2FA
...robotics/control/business model Complex user-defined use of object-orientated programming (OOP) model, eg classes, inheritance, composition, polymorphism, interfaces Complex client-server model Algorithms: Cross-table parameterised SQL Aggregate SQL functions User/CASE-generated DDL script Graph/Tree Traversal List operations Linked list maintenance Stack/Queue Operations Hashing Advanced matrix operations Recursive algorithms Complex user-defined algorithms (eg optimisation, minimisation, scheduling, pattern matching) or equivalent difficulty Mergesort or similarly efficient sort Dynamic generation of objects based on complex user-defined use of OOP model Server-side scripting using request and response objects and server-side extensions for a complex ...
...beside each other in supporting our community on financial goals to free this world from economic crisis. And in this exciting journey we need you besides us to reach that goal. For that instance only we are incorporating new age financial systems called crypto mining apps or banking systems that provide you money without asking for paybacks. In world of today's currency we call this system as hashing or generating random currencies from conservative fast operation of token generation process called building hashes. After all about of what cryptocurrency is we need to know specially which are legitimate and which really provides good returns to users just by enabling a few apps every 12-24 hours on your Android, IOS Or Computers. Later on the generated revenue is with...
**Receipt all information, code, documents, designs and all other deliverables from the executing company.** **Detect and request for any missing information, details or...out to be inadequate, another layer of defense can prevent a security flaw from becoming an exploitable vulnerability and/or limit the consequences of a successful exploit. - Use effective quality assurance techniques. - Develop Detailed Error Handling and Logging Files, and Keep Them Secure - Update System Design and Network Configuration to Maintain Security - Always use strong encryption and hashing to secure sensitive data. - Provide detailed information about the used encryption algorithms, SSL certificates and their private/public key names & lengths. - Avoid weak authentication methods and maintain ses...
implementing simple crypto-primitives and data structures like merkle tree, signature and transactions and simple SHA256 hashing.
Magento – here’s how turn a bane into a boon.