Draw Attention To Your E-Store With Magento
Magento – here’s how turn a bane into a boon.
implementing simple crypto-primitives and data structures like merkle tree, signature and transactions and simple SHA256 hashing.
...developer to build a fully functional e-commerce website with front end and back end dashboard. 1) Make an e-commerce website with the and Node.js 2) Backend should be written with node js and mongoDB 3) User Signin/Signup : Create User account with Email, Facebook and Google plugin, forget password, sent user creation confirm authentication email 4) login details should be safe by password hashing 5) Cart Functionality: Dynamic Add to cart, update cart, product suggestion, User should be able to select items and those items would be visible in the cart (Same as Reference 1 below), Payment Gateway 6) Backend Dashboard: Display widgets Dashboard as per the provided template, Blog (CRUD), Order History (Display order list and export to csv or pdf), FAQ, 7) Code will be SEO optimi...
ITS ABOUT THE COMPANY LAUNCHING NEW DATA SECURITY . SO TO MAKE IT PUBLIC WE HAVE A IMPORTANT CONCEPT MEATING REGARDING DATA SECURITY SO IN URGENCY WE NEED ONE FREELENCER TO PREPARE PRESENTATION FOR OUR COMPANY
...table storages that store the same M known malware hashes/signatures. Your data storage should be able to hold up to 10,000 entries. For the hash table, implement two types of hash tables using two different probing approaches for adding and searching for elements in the hash table: one using linear probing, and another using quadratic probing. Use any hashing function with your hash tables, but make sure to justify the selection of the hashing function in your report. Randomly generate M hash values and store one copy of each in the different storage tables. These values will represent the hashes/signatures of known malwares Randomly generate 1000 hash values (N), and search for these values in the storage tables. For each type of storage, plot the running time for the cr...
Write a complete C program that does the following: 1) Read the data stored in the file "" into an array of records containing the student ids and the student names. 2) Sort the array of records following the students' names in alphabetical order and display the sorted names on the screen. 3) Prom...and the student names. 2) Sort the array of records following the students' names in alphabetical order and display the sorted names on the screen. 3) Prompt the user to search for the student id by the student's name. Submit the completed C program and the screenshot of the outputs (sorted names & searched id). You may use any sorting algorithm to sort the array of records, but you need to use hashing for searching. Resolve any collision (if any). Note: Use...
To develop a Campus Facility Booking system with 3 required modules which are: 1. Login/Registration (Admin and User panel) 2. Book Facility 3. Geting user feedback The PHP Web application does not require a fancy UI but needs to implement the following list: 1. Suitable Design Patterns (Eg: Adapter, Observer, Facade, etc | Preferably: laravel) 2. Secure Coding Practices (Eg: Hashing) 3. Usage of XML, XSLT & XPath (Eg: convert database file into XML and display XML data into PHP) 4. Web Services (Eg: SOAP)
sequential search, 2-3 balanced search tree, and modular hashing. Detailed instruction is attached, and I will provide the sample data
Hi, you blocked me so im chating threw this. I would like to add feathure that will print nounce for whitch is => difficulty-2. Example: String: Python Difficulty 10: .... hashing.. wow i found hash with difficulty8 ... wow i found 9.. .... hashing... Wooow now i have your desired difficulty 10. Another thing: Your code is calculating "nounce" by som block size. I dont have any.. Is it possible to add nounce only by one ? So i can go threw all numbers and be 100% sure i tried everything.
I am looking for php web developer to build website similar to attached screenshot. I have attached screenshot of portal. Also need to install on my web hosting cpanel (i will provide cpanel account). Should be on PHP & MYSQL and PHP Framework (codeigniter/laravel). Website should be secure 1. Cross-Site Request Forgery (CSRF) Prevention 2. Cross-Site Scripting (XSS) Prevention 3. Password Hashing 4. Avoiding SQL Injection Please check attached screenshot.
python and linux experts needed! hashing as well
...Comment System Secure Authentication Password Reset Google Analytics Advanced Settings Options Visual Settings Change Logo, Favicon, Site Title, Site Description, etc. from Admin Panel Easy Installation Using Installation Wizard Detailed Documentation Runs on PHP 5.6, 7.0, 7.1, 7.2, 7.3, 7.4, 8.0 Security Cross-Site Request Forgery (CSRF) Prevention Cross-Site Scripting (XSS) Prevention Password Hashing Avoiding SQL Injection I dont want any previous script.. I want fully new functional script...
...balance in a deposit account, before the balance is updated), Calculate Interest (this calculates the interest rate for all deposit accounts and updates the balances) File: Open, Save, Save As (these should use JFileChooser dialogs. The random access file should be able to hold 25 records. The position in which a record is stored and retrieved will be determined by its account number by means of a hashing procedure, with a standard method being used when dealing with possible hash collisions) Exit Application (this should make sure that the collection is saved - or that the user is given the opportunity to save the collection - before the application closes) When presenting the results in a JTable for the List All option, the records should be sortable on all fields, but not edit...
I need 20 pages research document about trap door function (Chameleon hash function) I need history Security analysis Function How it used with Blockchain Summarize all listed papers below: 1- Ateniese, Giuseppe, e...(Chameleon hash function) I need history Security analysis Function How it used with Blockchain Summarize all listed papers below: 1- Ateniese, Giuseppe, et al. "Redactable blockchain–or–rewriting history in bitcoin and friends."[2] 2- More Practical and Secure History-Independent Hash Tables [22] 3- Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based 4- Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems "all above papers is available in Google schola...
...ENCRYPTION exemple (Webcrypto API): so I need: Modify the existing script to add encryption/uncryption : ---- REMOVE: AWS user authentification and make the script work with generic S3 (backbaze/wasabi/minio) ---- ADD a field to enter the encryption password -------- password field normalization UTF8 -------- password derivation PBKDF2 derivation with 10000 iterations of SHA256 hashing ---- ADD multipart uploading with encryption (using Webcrypto API / AES 256 GCM authenticated mode) ---- support uploading file of 100gb ---- ADD retry/stop button ---- ADD check duplicate (ignore/ignore all/replace) ---- ADD encrypted file & folder name on the bucket encryption/uncryption (all files folder on the bucket have to be encrypted) ---- ADD ability to download multiples file...
I'd like some help developing an efficient API that can quickly search through a local folder of images that could potentially be in the thousands, and return a result of closest matches (if there are any). There could be some indexing or hashing needed to build this solution in a way that is optimised enough to not take more than a few seconds to return a result. If that's a one-off process that's done once an image is added to the directory I'd like that to be included as well. The API could be written i Python as it seems most open source libraries for this purpose are in Python. But I'm open to suggestions. It's important that a website can query the API by sending an image through and get matches back in return with a percentage similarity rating,...
Searching for a developer (or a team) who can help me with creating a tool that can: - scan through folders to find files - scan the content of each file and separate each item by a given parameter - save data to MongoDB - generate additional data based on the found items in the files. This can be prepending, appending or hashing of that data. - check for existing data and update if needed Other requirements: - should be a CLI tool - preferred teck stack is MERN, so probably needed to use NodeJs for the CLI tool. Python is also possible - MongoDB is the preferred database - List of plugins that are required - No paid plugins - Clean code - Source code included service The attached file contains more detailed information.
...DocuSign competitor where you can upload any type of file and choose who you want to send it to for signing. The files are then hashed and signed with a crypto wallet that records the signature on a blockchain. (and returns a URL to the proof on the chain that it was signed) There needs to be a way to check that a file is the one that was hashed and signed, by uploading the file at a later date, hashing it, and retrieving signatures related to that hash. I am looking for a designer to create 7-8 pages of the product itself that walk the users through how they: 1. Sign in 2. Upload the file they want signed 3. Choose who to send it to for signing 4. Sign the document themselves by signing in with their (near wallet) and signing. 5. View a list of who has signed the document
Swift function with completion handler needed to send POST request to API with HMAC authentication. The request body is JSON data. Ideally, developer will use Apple’s CryptoKit for encoding and hashing. Completion handler needs to report if API call is a success or failure. Once code is successfully tested and API call is authenticated, a modified version where variables are sent via querystring instead of in request body is needed. We will be provide API url, AppId and Secret Key for testing.
I need a Java and Security expert to build and improve from a past Java project. Within the space of 2 to 3 weeks. - Java Application. - Block Chain Security. - Hashing Algorithm. - Smart Contracts. - Not a live application. - Users can purchase, test, verify tickets. Can place tickets in a basket, save for later, have an email reminder, purchase the tickets collectively.
We need to design a middleware windows app which can communicate with the new Egyptian Tax Authority (ETA) portal using their API to review and submit invoices. The app main feature is to import excel file, prepare it to JSON and XML, create canonical version, apply hashing of the serialized document, signing the hash value using eSeal certificate and creating CADES-BES signature, then submit the invoice.
I need a Java and Security expert to build and improve from a past Java project. Within the space of 2 to 3 weeks. - Java Application. - Block Chain Security. - Hashing Algorithm. - Smart Contracts. - Not a live application. - Users can purchase, test, verify tickets. Can place tickets in a basket, save for later, have an email reminder, purchase the tickets collectively.
I want to hire a Mern stack developer to build me a Real-time messenger chatting application which should include the followings - * should be built-in dark mode only * use for real-time data transfer * login and sign up with profile pictures * profile page to allow a user to update his name, email, bio, and other kinds of stuff * an explore page which would show...available users list from the database * send, receive friend requests from exploring page * accept or deny any received request on a different page * cancel a sent request and show a list of received and sent requests in different tabs * a 1O1 chatting page to have a conversation with friends * emoji button * real-time friend online and offline status * real-time message seen status * password hashing * user validatio...
...CRC-32. The algorithm will be determined by me inside the script I want to be able to determine the original string (plain text) and get the hashed string. To practically understand what I mean, visit the page below. Type a word in the first text field and get the result in the second. HASH SECURITY IS NOT MY CONCERN. That is why I choose CRC hashing instead of other more secure hashing algorithms. My concern is to get a hash which will be shorter than the original text. Example: Original text = This is my text Hashed text = e489ba80 SECOND SCRIPT/UTILITY It will create all possible combinations of the elements that I will determine (uppercase/lowercase letters, numbers, symbols etc). I also wish to determine the number of elements in each combination
So extend your project with recursions, recursive sorts, hashing, trees and graphs.
Hello, We worked on our own smart contact, that is now ready. Next phase we are looking for a cryptocurrency / blockchain developer who can help us with an on-site Pre-Sal...180 + 360 days User information - First name - Last name - Email address - Telegram account KYC - API connection with i.e.: SumSub - Or advice an other KYC provider Database security Information must be stored in a database (MySQL), a side of the Wallet Address listed on BSCScan. - Hash all data in the database (use Salt + Password) - Pepper the Hashed Password (Pepper + Salt + Password) - Hashing: HMAC SHA3-512 Language on site - Preferably PHP + HTML + CSS - Subdomain linked from Wordpress site Assist in adding Staking Rules in smart contract - Explained above Budget $750 + 0.1% share in the token as t...
...under pressure and with minimal supervision and he/she must have previous professional experience and excellent theoretical knowledge of blockchain technologies. Please apply only if you at least fulfill all of the “must have” criteria. Must have : In-depth knowledge/experience with distributed ledger technologies, directed acyclic graphs and consensus protocols Proficient with cryptographic hashing principles Professional experience in developing and setting up blockchain infrastructure Very good programming and scripting skills using Go, TypeScript, Shell, Vue Strong analytical and mathematical skills Big plus : Good knowledge of Avalanche protocol and the Avalanche infrastructure Good knowledge of Proof-of-Stake mechanism Experience in setting up Avalanche su...
Python 3 on AWS Lambda Step Functions workflow for exporting a database, loading into a clean database, scrubbing some fields (hashing certain fields to remove personally identifyable information, exporting again, and loading into a different server. We're open to workflow suggestions, but one requirement is that the scrubbing has to take place before the data is loaded to the new server, and the source database must remain untouched. Deliverables Terraform code for the necessary Python Lambda Step Functions with State Machine. Export database Load to temporary database Scrub fields (probably MD5 hash, anything that cannot be un-hashed) Export again Load to database on different server You can use your own sample database (which you must also provide for testing on our end) ...
need a Python 3 on AWS Lambda Step Functions workflow for exporting a database, loading into a clean database, scrubbing some fields (hashing certain fields to remove personally identifyable information, exporting again, and loading into a different server. We're open to workflow suggestions, but one requirement is that the scrubbing has to take place before the data is loaded to the new server, and the source database must remain untouched. Deliverables Terraform code for the necessary Python Lambda Step Functions with State Machine. Export database Load to temporary database Scrub fields (probably MD5 hash, anything that cannot be un-hashed) Export again Load to database on different server You can use your own sample database (which you must also provide for testing on ou...
i need help about flash bitcoin generation anyone who is expert in hashing or flash btc please apply for this job. Further discussion in chat box.
In this project, we need to implement the Dictionary ADT by using an implementation of a List ADT and hashing.
I need a Java and Security expert to build and improve from a past Java project. Within the space of 2 weeks. - Java Application. - Block Chain Security. - Hashing Algorithm. - Smart Contracts. - Not a live application. - Users can purchase, test, verify tickets. Can place tickets in a basket, save for later, have an email reminder, purchase the tickets collectively. * Original work please, no third party applications. * If you can't complete the work please don't waste time and tell me early
I need a Java and Security expert to build and improve from a past Java project. Within the space of 2 weeks. - Java Application. - Block Chain Security. - Hashing Algorithm. - Smart Contracts. - Not a live application. - Users can purchase, test, verify tickets. Can place tickets in a basket, save for later, have an email reminder, purchase the tickets collectively. * Original work please, no third party applications. * If you can't complete the work please don't waste time and tell me early. NO TIME WASTERS!
...should be ongoing work. To begin with, I will send through a node.js/react basic project, that allows: * a user to sign up (with name, email and password) * sends a verification email, with a link to click on * has endpoints to verify an account, validate the user, and sign in / out and retrieve the user profile * it is connected to mongodb, uses Joi for validation, and bcrypt for salting and hashing passwords etc The initial work would be working on the security (for example ): * I would like security measures put in place to make the website comply with best practice (such as preventing brute-force attacks, and other common security issues). The second task is around sending the user a verification email. Unfortunately it seems
Need a sample application developed for iPhone / swift to show base64 encoding and hashing
I need a Java and Security expert to build and improve from a past Java project. Within the space of 2 weeks. - Java Application. - Block Chain Security. - Hashing Algorithm. - Smart Contracts. - Not a live application. - Users can purchase, test, verify tickets. Can place tickets in a basket, save for later, have an email reminder, purchase the tickets collectively. * Original work please, no third party applications. * If you can't complete the work please don't waste time and tell me early.
I need a Java and Security expert to build and improve from a past Java project. Within the space of 2 to 3 weeks. - Java Application. - Block Chain Security. - Hashing Algorithm. - Smart Contracts. - Not a live application. - Users can purchase, test, verify tickets. Can place tickets in a basket, save for later, have an email reminder, purchase the tickets collectively.
Hi Sk Hayat Z. I need a Java and Security expert to build and improve from a past Java project. Within the space of 2 to 3 weeks. - Java Application. - Block Chain Security. - Hashing Algorithm. - Smart Contracts. - Not a live application. - Users can purchase, test, verify tickets. Can place tickets in a basket, save for later, have an email reminder, purchase the tickets collectively.
I need a Java and Security expert to build and improve from a past Java project. Within the space of 2 to 3 weeks. - Java Application. - Block Chain Security. - Hashing Algorithm. - Smart Contracts. - Not a live application. - Users can purchase, test, verify tickets. Can place tickets in a basket, save for later, have an email reminder, purchase the tickets collectively. * Original work please, no third party applications. * If you can't complete the work please don't waste time and tell me early.
...(hooks) TypeScript CSS preferably styled-components or tailwind css Jest Redux Apollo Client (GraphQL) JWT authentication Stripe It is okay and recommended to use a front end component library like tailwind bootstrap or other to speed up your front end development, at least for this project Backend: Node.js TypeScript Apollo Server (GraphQL) Jest MongoDB Stripe Bcrypt password hashing --- This is what the website must do: Allow users to sign up for an account with email and password. Require users to create a monthly subscription with Stripe in order to use the website. Once the user has created a subscription, they unlock the ability to link their Instagram and Twitter account. Once they link their Instagram and Twitter account, they can select an account ...
Por favor, regístrate o inicia sesión para ver los detalles.
I need help, I have two codes PHP language in Information Security Required: do some study on it and comparison between him (comparison between two code and analysis study), Necessary has a background in Information Security to be able to write academic information (CAPTCHA - Encryption - Hashing) as sample + the English level high (professional), code language is PHP Deadline 4 to 5 days, Time is sensitive Note: I do not accept ready solutions from the internet. Thank you
Using MD5 for rainbow table! Please contact me
Hello, i have a small project that requires coding in Java that involves hashing and rainbow table, would need it to be done in about 4 days.
I need help, I have two codes PHP language in Information Security Required: do it some study on it and comparison between him (comparison between two code and analysis study), Necessary has a background in Information Security (CAPTCHA - Encryption - Hashing) + the English level high (professional), code language is PHP Deadline 4 to 5 days, Time is sensitive Note: I do not accept ready solutions from the internet. Thank you
I need help, I have two codes PHP language in Information Security Required: do it some study on it and comparison between him (comparison between two code and analysis study), Necessary has a background in Information Security (CAPTCHA - Encryption - Hashing) + the English level high (professional), code language is PHP Deadline 4 to 5 days, Time is sensitive Note: I do not accept ready solutions from the internet. Thank you
Detecting Image forgery using hashing - MD5 function
Hi Shweta, I saw your profile and maybe we can work to a project together. we have multiple FPGA units(especially blackminer F1 ultra).We would like someone to test a Kawpow bitstream on the unit. the F1ultra is using 6x of Xilinx Kintex-7 420T chips. what is a possible theoretical hashing power expressable? contact me if interested, we can find multiple middle ways and agreements if interested, like testnets,mining hashpower,parthnerships or one time payment. Thankyou in advance. Prism
...in software development and/or cyber security/IT security. Native English speakers preferred. Specifics We’re looking for one or more writers to work with on an ongoing, long-term basis on various blog content. Moreover, we need writers who can create original, engaging, and informative pieces on topics ranging from DevOps and secure coding best practices to cyber security and PKI (encryption, hashing, etc.). We’ll make PKI-related training available to those writers whom we want to work with long term. What We Need From You Please place a bid for the following initial project: • Quantity: 1 blog post • Length: in-depth article, approximately 2,000-3,000 words • Topic: TBD, can discuss topic that works both for us and you. Please include relevan...
I need help, I have two codes PHP language in Information Security Required: do it some study on it and comparison between him (comparison between two code and analysis study), Necessary has a background in Information Security (CAPTCHA - Encryption - Hashing) + the English level high (professional), code language is PHP deadline 4 to 5 days, Time is sensitive Note: I do not accept ready solutions from the internet. Thank you
I need help, I have two codes PHP language in Information Security Required: do it some study on it and comparison between him (comparison between two code and analysis study), Necessary has a background in Information Security (CAPTCHA - Encryption - Hashing) + the English level high (professional), code language is PHP deadline 4 to 5 days, Time is sensitive Note: I do not accept ready solutions from the internet. Thank you
Magento – here’s how turn a bane into a boon.