Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    2,000 hmac sha 256 travaux trouvés au tarif de EUR

    Je souhaite la création d'un serveur TCP multithread qui envoi des messages qui seront chiffré en(SHA-512 ,RSA-4096 ,AES-256) en JAVA ou C++

    €118 (Avg Bid)
    €118 Offre moyenne
    10 offres
    WHMCS getaway HMAC SHA1 S'est terminé left

    Bonjour, J'ai développer un module de paiement Monitico pour whmcs. Je recherche une personne pour écrire la partie HMAC SHA1. Je fournie le module WHMCS et le code teste de Monetico pour finalisé le module de paiement.

    €23 (Avg Bid)
    €23 Offre moyenne
    4 offres

    ... et :030_commandes *************************************** SMTP & IMAP4rev1 *************************************** 1) SSL/TLS 2) Authentification - LOGIN - PLAIN - USER - CRAM-MD5 - DIGEST-MD5 - GSSAPI (voir au cas où cela peut vous aider) - NTLM - ANONYMOUS - EXTERNAL - SCRAM-SHA-1 et CRAM-SHA1 - KERBEROS (KERBEROS_V4 ?) - SKEY - SCRAM et SCRAM-MD5 3) Multihoming (c'est à dire on peut choisir une ou plusieurs adresses IP sur lesquelles on écoute). Ex au lieu de this->listen(HostAddress::Any, int port)) plutot this->listen("IPV4 1, IPV6 1, IPV4 2, IPV6 2, ...", int port, Type connexion "TLS OR SSL OR NORMAL") ; Ex : Hostname|IP PORT SÉCURITÉ CERTIFICAT

    €6 (Avg Bid)
    €6 Offre moyenne
    1 offres

    I require a capable developer to create a new Python module from Wazuh server using C programming. This module should retain the following functionalities from the original: - Agent registration - Remote configuration - Log receiving A deep understanding of TLS and SHA technologies is a must.

    €474 (Avg Bid)
    €474 Offre moyenne
    48 offres

    Hey you! Do you have more than 6 years as a Laravel Developer? Can you prove it? Can you prove/provide evidence of what you have personally done as a developer? Does compliance to high security standards, encyption at rest, encryption in transit, AES 256, SHA 256 mean something to you? Are you willing to join an existing project? Are you willing to work for a flat monthly salary? Then this job may be for you. Our team is hard at work building a web application. We currently need an additional developer to assist with some key activities. You will be assigned duties by our Application Team Leader. Shoot us a quick message if interested. No agencies or middle men please.

    €6 / hr (Avg Bid)
    €6 / hr Offre moyenne
    83 offres

    Project: Configuration of the eCash node and mining pool The Pool will only be...(LocalHost). 2. Installation and configuration of ckpool mining software on the same server. 3. Configuring ASICs to connect and mine through the pool. 4. Ensure continuous connectivity and proper functioning of the eCash node and mining pool. 5. Troubleshooting issues related to network connectivity and hardware configuration. Requirements: - Proven experience with cryptocurrency mining, especially SHA-256. - Knowledge in installing and configuring cryptocurrency nodes and mining pools. - Ability to troubleshoot network connectivity and hardware configuration issues. - Familiarity with eCash (XEC) is an advantage. Submit proposals with details about your experience, including examples of simil...

    €1093 (Avg Bid)
    Urgent
    €1093 Offre moyenne
    6 offres

    ...setup. I would like to have an efficient algorithm implemented that is capable of converting existing hashing power to mine using the SHA-256 algorithm. This would allow me to increase the diversity of my mining operations. Key requirements for this project include: - Developing an algorithm that can convert hashing power automatically - Primary focus on SHA-256 algorithm - Emphasis on compatibility across different systems rather than speed or energy efficiency Ideal candidates for this project will have a strong background in algorithm development, specifically relating to cryptocurrency mining. Familiarity with different mining algorithms, particularly SHA-256, is absolutely essential. Lastly, having prior experience in developing high comp...

    €551 (Avg Bid)
    €551 Offre moyenne
    25 offres
    High-Speed C# File Hashing Software S'est terminé left

    I'm in need of a C# program that can hash files as quickly as PowerShell does. The program should be able to hash image files and all other types of files at the same speed, while utilizing the SHA-256 hashing algorithm. Additionally, it would need to read and write data efficiently. Key requirements: - Develop a C# program to hash files. - Implement the SHA-256 hashing algorithm. - Ensure the program reads and writes data smoothly.

    €23 (Avg Bid)
    €23 Offre moyenne
    2 offres
    C# Program Hashing Fix Needed S'est terminé left

    I need a C# program that hashes text strings using SHA-256 hashing algorithm. The current program I have was designed to hash data, but I've noticed it does so in a different order than PowerShell. This is problematic for my workflow, as I need the two to hash data in the same order for consistency. Key Requirements: - Make the C# program hash data in the same order as PowerShell using SHA-256 - Ensure the program is efficient and secure - Document the changes made for future reference Ideal Skills: - Proficient in C# programming - Expertise in working with hashing algorithms, especially SHA-256 - Prior experience with data consistency issues - Strong understanding of security protocols and best practices Please include your relevant exper...

    €42 (Avg Bid)
    €42 Offre moyenne
    18 offres

    I require a specialist to build a solution that validates the authenticity of hashed data in video format. The key focus of this project demands: - Experience in hashing algorithms, notably SHA-256 - Proficiency in data authenticity verification - Familiarity with video formats, particularly MP4 - An understanding of how to match video-recorded audit logs with original hashed data It's crucial to know if the hash data from the video recording matches the original hash of the audit logs for data authenticity purposes. Please note that the audit logs are text-based and believed to contain a hash of the original file. Your role is to confirm this authenticity. This task requires a comprehensive understanding of data security and integrity checks. If you have prior exper...

    €84 (Avg Bid)
    €84 Offre moyenne
    13 offres
    Trophy icon Humorous T-shirt Design S'est terminé left

    I'm seeking a skilled graphic designer to create a funny, brightly colored T-shirt design that features humans. The aim is to create an engaging, humorous design that is sure to catch the attention. Key Requirements: - Excellent skills and experience in gra...particularly with T-shirt design. - Ability to create eye-catching, humorous designs. - Proficiency in handling bright colors and human figures in design. - Good sense of humor to incorporate wit in the design. The ideal candidate will have a keen eye for detail and ability to translate ideas into creative graphics. It needs to have my company name and phone number, Custom Pro Services llc 256-399-7140. I want it to say something like, i got plastered by Custom Pro Services. We are a swimming pool plastering and ...

    €93 (Avg Bid)
    Garanti
    €93
    141 propositions

    I'm looking for a professional translator to convert an English written content to Italian. The timeline for this project is extremely tight and I need a freelancer who can deliver quality results promptly. Key Requirements: - Translate English content into Italian: You must have excellent command of both languages with experience in content translation. - Experience with Pagination: The conten...Skills and Experience: - Proven experience in English to Italian translation, specifically in the context of pagination. - Ability to work under tight deadlines without compromising on quality. - Strong communication skills to provide regular updates on the progress of the project. Please provide a portfolio of your previous translation work and any relevant experience with pagination. P...

    €343 (Avg Bid)
    €343 Offre moyenne
    64 offres

    I’m in need of an intermediate-level C++ coder for a bitcoin mining initiative. The successful applicant must be comfortable with coding for solo mining. This project doesn't require expertise in multi-threading or pool mining, but a firm grasp on the creation and development of bitcoin mining algorithms is essential. An understanding of SHA-256 algorithm implementation is a plus, though not mandatory. Looking forward to your bids, and to our potential collaboration.

    €120 (Avg Bid)
    €120 Offre moyenne
    18 offres

    ...into a challenge; we need to implement an HMAC signature to verify webhooks, but unfortunately, they have never worked with this feature before. Here’s where we need your assistance: - Implement the HMAC signature in the Shopify app webhook - Make sure this signature is verifying correctly - Since I'm unsure about having the required secrets to generate this HMAC signature, advice on this process will greatly be appreciated but you can get access to shopify partner account where we have the app in test development so I believe can access keys in there. Ideally, we are looking for someone with the following skills: - Proven experience with Shopify application development - Proficient in Laravel - In-depth knowledge and prior experience with HMAC...

    €113 (Avg Bid)
    €113 Offre moyenne
    49 offres
    AES Cryptography Using C & SHA -- 2 S'est terminé left

    ...role involves developing encryption, decryption, and key generation functionalities. Key Project Requirements: - Extensive knowledge and application of Cryptography - Proficiency in the C programming language - Experience in generating SHA keys The Cryptographer will perform the following tasks: 1. Encryption and Decryption: You will write code that facilitates both encryption and decryption processes using the AES (Advanced Encryption Standard) algorithm. 2. Key Generation: Involves the creation of a safe and secure key generation mechanism utilizing SHA. You should prioritize key security to guarantee the confidentiality and integrity of the encrypted contents. 3. File Support: The coded software should accept file inputs only, handling and processing encryption a...

    €16 (Avg Bid)
    €16 Offre moyenne
    3 offres
    Icon Design From Existing Logo S'est terminé left

    ...both a 3D and flat icon for brand consistency. I need an icon to use in some cases since my logo is so big. The requirements include: - Creating a 3D icon version utilizing the original logo colors - Designing a flat icon version using the same color scheme - Delivering the final icons in PNG, AI, SVG, and JPG formats Here's an example of the flat icon - Here's the 3D icon - Here's my actual logo files - The ideal freelancer for this

    €71 (Avg Bid)
    €71 Offre moyenne
    171 offres

    I need a modern architectural design for a house with a plot size of 32x72, covering 256 square yards. The ground floor should include a double-height living area, three bedrooms, a kitchen, dining area, and a drawing room. The first floor should feature three additional bedrooms. The project should envelop both interior and exterior designs, along with 3D visualizations. Specifications: - Style: Modern Architecture - Theme: Modern Interior - Color Palette: Latest Trending Styles Ideal skills and experience for the job: - Bidders should have proficiency in modern architecture and interior design - Experience in creative space utilization in residential layouts - Expertise in 3D visualization of plans and designs - Awareness of latest color trends in interior design This is a fa...

    €130 (Avg Bid)
    €130 Offre moyenne
    45 offres

    As an expert in Google Cloud services and security configurations, you'll be tasked to: - Set up a Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen sharing....Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen sharing. - The main goal is to increase the security of the site. - You're expected to disable TLS 1.0 and 1.1 protocols, and enable both TLS 1.2 and TLS 1.3 versions in the project for optimal security. - Also, certain encryption algorithms, specifically RSA, AES 128, AES 256, CBC and GCM need to be disabled. The ideal candidate must have extensive experience with GCE and advanced understanding of TLS protocols and en...

    €49 (Avg Bid)
    €49 Offre moyenne
    4 offres

    More details: What is the primary reason for encrypting the Raspberry Pi 4 OS and inside files? Protect sensitive data What encryption level do you require for your sensitive data? 256-bit encryption Are there specific files or data types that need to be prioritized in the encryption process? Program and System Files

    €144 (Avg Bid)
    €144 Offre moyenne
    8 offres
    pixel art de escudo S'est terminé left

    hacer el escudo en 256 y otro de 128 pixel

    €39 (Avg Bid)
    €39 Offre moyenne
    1 offres

    ...modifications of weak passwords. - Display warnings for passwords that exceed the maximum length without truncation. - Implement an "eye" icon for toggling password visibility. Security Enhancements: - Check passwords against a list of breached passwords and prompt users to change them if matched. - Use Argon2 for password hashing with a unique salt for each password. - Integrate an additional HMAC layer for hashing with a highly secure secret salt. - Implement two-factor authentication (2FA) using a popular service like Google Authenticator. - Enforce session security with HTTPS and consider HTTP Strict Transport Security (HSTS) for enhanced security. - Implement CAPTCHA verification to prevent automated attacks and manage session rate limiting effectively. Recovery...

    €22 (Avg Bid)
    €22 Offre moyenne
    30 offres
    Bitcoin and Python Backend job S'est terminé left

    ...Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this task is for you to implement the validation logic manually. - Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. - Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the task of finding a hash be...

    €10 (Avg Bid)
    €10 Offre moyenne
    3 offres
    Shopify app developer S'est terminé left

    I have created a shopify app and in the publishing process dont know how to Implement an HMAC signature to verify webhooks pls help me with that I have also used for hosting

    €372 (Avg Bid)
    €372 Offre moyenne
    12 offres

    I need someone to calculate and show me simply the difference between different computer systems: 1) standard 32 bit computer 2) standard 64 bit computer 3) 32 qubit quantum computer 4) standard 256 bit super computer 5) standard 1024 bit super computer 6) a hypothetical system that uses hex instead of bits I will give 2 simple calculations and i simply need to understand how many combinations ie how long it would take to perform simple calculations for each of the 6 systems. Will lead to more work

    €88 (Avg Bid)
    €88 Offre moyenne
    30 offres

    ...process accurately recovers the original file, including its correct extension. The decrypted file should be identical to the original input file in every aspect. Topics for Approach 1: Implementation of one of the below algorithms Implementation of DES (Data Encryption Standard) AES (Advanced Encryption Standard) Camellia Blowfish Twofish RC4 (Rivest Cipher 4) Serpent CAST-128/CAST-256 Project Guidelines: 1. Proposal Submission: o ● Submit a proposal outlining the chosen approach and topic. o ● Include a brief description of the methodology for Approach 1 or the selected 2. Research Phase: o ● Approach 1: Conduct research on the chosen encryption algorithm, understanding its principles and functionality. 3. Writing Phase: ● Approach 1: Document the softwa...

    €108 (Avg Bid)
    €108 Offre moyenne
    43 offres

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security and confidentiality given its sensitive nature.

    €12 (Avg Bid)
    €12 Offre moyenne
    26 offres

    ...for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this challenge is for you to understand and implement the validation logic manually. Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the challenge of finding a hash...

    €12 / hr (Avg Bid)
    €12 / hr Offre moyenne
    7 offres

    For this task, I require a skilled developer with solid background in Docker and Kafka. The task at hand is to work on an existing Docker Compose script for a Kafka application centered around authorization. Key Requirements: - Incorporating SASL/SCRAM authentication mechanism. - Focusing on the SCRAM-SHA-256 version for Kafka authentication. A deep understanding of the listed technologies and profound experience in adding security features to Kafka applications will be a significant advantage. Secure, reliable streaming is the goal. Therefore, the freelancer needs to be knowledgeable about how SASL/SCRAM authentication enhances Kafka application's security. Only bid if you are highly confident you can deliver my exact requirement.

    €25 (Avg Bid)
    €25 Offre moyenne
    4 offres

    I'm seeking an experienced developer with expertise in AWS Lambda using Node.js. Your task will be setting up a simple function to encode parameters using HMAC-SHA1 and make a GET request, returning the response body. The shared secret of "theworldsmostsecretkey" will be held as an environment variable. The function request will include a 'customer' parameter. Take the customer KVP and encode it with the shared secret i.e. encode 'customer=12345' to produce 2a531a451bbbce27323fe248d53f59914726895f; The search term is the first 20 characters of the value; Make a GET request to google using the search term. Return the response body. The right person for this job should have a clear understanding of API backend construction using AWS Lambda in ...

    €143 (Avg Bid)
    €143 Offre moyenne
    40 offres

    I am looking to enhance the security level and add features to my current Payten payment gateway through PHP. This gateway is functionally intact yet bordering obsolescence. Our ideal candidate should have substantial experience with Payten, PHP, and secure payment gateways. The scope of work involves: -Up...our payment gateway. The amount you bid is what I will accept! after bidding I will not sit down with you to discuss the amount to be paid. READ THE REQUIREMENTS AND BID ACCORDINGLY! DO NOT WASTE MY TIME! I will provide the latest php samples provided by my payment gateway the current scripts are working but they use SHA1 algorithm and soon they will stop working. The new samples work with SHA You are required to modify the current files to make them work with the latest...

    €162 (Avg Bid)
    €162 Offre moyenne
    61 offres
    Create script wallet eth generator S'est terminé left

    Hello i need to creare a script on nodeJS for create a wallet eth , the screept need to work on autoincrement and need to have a range page , the script on parameter need to have page start and page stop for generate , every page need to have 128 / 256 result the user need to choise , the result need to be stored on sql server text me for more info

    €24 (Avg Bid)
    €24 Offre moyenne
    10 offres
    Author Speaker Logo Design S'est terminé left

    ...is an author and speaker with strong focus on China. Therefore, red should be the main color. See my substack here: Needs: - Logo for a Homepage (together with set of fonts to use in the homepage) - Logo for Business Cards (together with set of fonts to use on the business card) - Youtube: for channel and watermark Substack: - minimum 256×256 Pixel (square logo) - brand name: minimum 1344×256 aspect ratio: 21:4 - title picture: minimum: 600x600px square LinkedIn: - Round profile picture - rectangle profile background...

    €85 (Avg Bid)
    €85 Offre moyenne
    91 offres
    AES-256 SQLite Encryption in VB.Net S'est terminé left

    ...an expert to implement advanced AES-256 bit security encryption for an SQLite database in a Windows application using VB.Net. This task requires specific expertise in working with encryption to secure private data. Key Requirements: - Proficiency in VB.Net - Deep understanding of AES-256 bit encryption - Familiarity with SQLite databases - Prior experience in data encryption The encrypted SQLite database will become a storage unit for personal identifiable information. This sensitive data demands high security measures, thus professional handling is crucial for the success of this project. The completed task should ensure maximum protection against unauthorized access and reliably shield the stored personal data. Main Task: - Implement advanced AES-256 bit enc...

    €55 (Avg Bid)
    €55 Offre moyenne
    2 offres

    Necessito que as descrições sejam traduzidas de forma correta e com gramática. Quem se candidatar deverá perceber do produto e não fazer tradução literal mas sim dar os nomes corretos em português Necessito de amostra de tradução da linha 142, linha 256, linha 413, linha 1076, linha 1150, linha 1204, linha1229.

    €128 (Avg Bid)
    €128 Offre moyenne
    32 offres
    Trophy icon Lawn Care company logo S'est terminé left

    Looking for a skilled graphic designer who can help me out in creating a professional logo. My company provides lawn care services. The name of the company is Crabtree Lawn Solutions LLC. I like the idea of having a leaf or a blade of grass somewhere on the logo. The "T" in the word Crabtree could even be a tree. The logo will go on a company vehicle. I also want to add the phone number (256-473-9580) to the bottom of the logo. I really like the example logo that I have attached called "Evergreen". Key requirements for this job are as follows: - Color Palette: The dominant color scheme for the logo needs to be a harmony of green, white, and black. These colors should exude a playful and bold character. - Design Style: The designed logo needs to strike a ba...

    €46 (Avg Bid)
    Garanti
    €46
    657 propositions
    Trophy icon Wildfly 26 SSL/TLS & Vault Configuration S'est terminé left

    ...vault in my Wildfly 26. The goal is bolstering the security of my data transmission, shielding sensitive data in transit. Features required: - Configure SSL/TLS to desire a 256-bit encryption standard, providing a high level of security, for secure data transmission. - Support for both TLS 1.2 and 1.3 protocols in the SSL/TLS configuration to enable both secure and reliable communication. - Implement Vault setup for effective protection of sensitive data. The ideal freelancer would have: - Extensive experience in handling Wildfly servers. - Detailed knowledge of SSL/TLS configuration and the ability to implement 256-bit encryption. - Familiarity with different TLS protocols and how to support multiple versions. - Proven record of setting up and managing Vaults. Your a...

    €18 (Avg Bid)
    Garanti
    €18
    1 propositions

    this is for both bitcoin and litecoin address bitcoin bc1 and tb1 litecoin ltc1 address...understanding various programming concepts. -Bech32 Format Conversion: I am specifically interested in how to convert between formats using Bech32. Your experience with handling this encoding scheme's complexities would be very beneficial. -SHA-256 Functioning: Your in-depth understanding of SHA-256's operation is crucial. I'm not looking to implement it myself yet; I just want to understand how it works under the hood. Ideal skills and experience include a strong working knowledge of Python, expertise in the Bech32 encoding format, and an understanding of SHA-256 hashing algorithm functionalities. If you're a tenacious problem-solver w...

    €123 (Avg Bid)
    €123 Offre moyenne
    2 offres
    Python Scripts for ECDSA Signatures S'est terminé left

    I'm looking for a proficient...focusing on their application in user authentication. Key Requirements: - Generation and verification of ECDSA signatures using Botan 2 and Botan 3 - Scripts should be designed for user authentication - The use of SHA-256 as the hashing algorithm for ECDSA signatures Ideal Skills: The ideal freelancer for this project will have extensive experience in Python development with proven knowledge of digital signatures, specifically ECDSA. Familiarity with Botan cryptographic library is a major requirement. They should also have a solid understanding of hashing algorithms, particularly SHA-256. Attention to detail and ability to meet deadlines is also a key expectation. Note: Please remember that I need two scripts, each compati...

    €153 (Avg Bid)
    €153 Offre moyenne
    26 offres

    ...design of the client should be user-friendly, making it easy to traverse and understand. - High performance and stability: Despite its ease of use and setup, the client should not compromise on performance or stability. - The client interface needs the following features: "Connect", "Disconnect", and "Import Config" buttons. Clicking "Import Config" imports a configuration file encrypted with AES-256. The configuration file contains the server IP address, port number, virtual HUB name, username, and password. After importing the configuration file, VPN connections can be made by clicking connect and disconnect. Use direct TCP/IP connections, with an automatic reconnection interval of 15 seconds, always keeping the VPN online. The official c...

    €131 (Avg Bid)
    €131 Offre moyenne
    4 offres
    C++ Bitcoin Mining Code Development S'est terminé left

    I’m in need of an intermediate-level C++ coder for a bitcoin mining initiative. The successful applicant must be comfortable with coding for solo mining. This project doesn't require expertise in multi-threading or pool mining, but a firm grasp on the creation and development of bitcoin mining algorithms is essential. An understanding of SHA-256 algorithm implementation is a plus, though not mandatory. Looking forward to your bids, and to our potential collaboration.

    €142 (Avg Bid)
    €142 Offre moyenne
    14 offres
    need z brush expert -- 42073 S'est terminé left

    more info will b sha red in chat

    €2 / hr (Avg Bid)
    €2 / hr Offre moyenne
    5 offres
    API Tokenization Expert Needed S'est terminé left

    I'm seeking a programmer with experience in Node.js and JavaScript for analyzing requests. The goal is to understand the tokenization process and communication with the API for a specific route. The project involves replicating specific functionalities in Node.js, including the generation and sending of encrypted parameters, and handling HMAC SHA256 digital signatures. Knowledge in data encryption, especially HMAC SHA256 in JavaScript, and experience with payment APIs or sensitive data tokenization are required. The challenge includes deciphering how data is prepared, tokenized, and sent to the tokenization API, replicating this logic in a Node.js environment.

    €436 (Avg Bid)
    €436 Offre moyenne
    43 offres
    Project for Allumalla A. S'est terminé left

    Would you like to do another similar job? 256 transaction. 5 columns. about 20-30 characters per column. 1 additional column what will be one of 3 numbers so not really any effort (just a 4 digit number).

    €46 (Avg Bid)
    €46 Offre moyenne
    1 offres
    Image processing in python S'est terminé left

    Hi, I need a python script that transforms the Image into n-different color codes/palettes: 24 colors, 64, 126, 256 . It uses dithering to optimize the Image quality. It uses a fixed color palette. Thanks

    €18 (Avg Bid)
    Urgent
    €18 Offre moyenne
    11 offres
    One page HTML Design. S'est terminé left

    ...These are the designs I like: This one most I liked: ~exp=1707715746~hmac=d86c26191478fdfda258ee8658211f59c859e91b913c93b06143d5e3ac99232d These are less, but will give you an idea. https://www.freepik.com/free-psd/flat-design-astrology-poster-template_25919369.htm#page=3&query=numerology&position=48&from_view=search&track=sph&uuid=a9028654-5c29-485f-99b7-379dea79b78e ~exp=1707714407~hmac=e25178bd336717870404a3fb19787ea128a0a8d6584eb40e2b79db2dbca5740a

    €27 - €28
    Scellé
    €27 - €28
    90 offres

    ...Unified Communications Manager Express (CME) 9.1 ir newer - Familiarity with Cisco IP Phones, particularly the 7965 model - Proficiency in language configuration and firmware updates - Knowledge of Spanish (Spain)-specific configurations would be a plus. Hardware: - Cisco Router is 3945 1GB flash memory 2GB RAM. IOS 15.0(1r)M16 CME 9.1 Router has 3 PVDM3 DSP DIMM 32 channels, 128 channels and 256 channel. - Cisco switch 3750 Poe. -PC with windows 11 and anydesk for you connection. -Putty console connection to router. Requirements: - Configure CME 9.1 Spanish language on user-locale 0 and network-locale 0 - Leave US English default language on user-locale 1 and network-locale 1 - All phones need load Spanish Language on startup. But it will be tested on two phone (7965 a...

    €47 (Avg Bid)
    €47 Offre moyenne
    3 offres

    We need a developer with Python experience to help us optimize and fix a script that connects to an API then processes the pulled data. - Script is 256 lines. File is attached. - Understands API connections - Can identify and fix data processing errors - Can optimize scripts to handle high-speed data with buffering. Currently the script fails when an API call fails to retrieve some piece of data. Additionally, it does not seem to properly handle assigning "request ID" within the loop, leading to "duplicate request ID" errors during a session. We think the solution is some combination of "retry" and "wait" loops with validation. You should review the code and make the appropriate changes, so the script can run properly. Experience with I...

    €135 (Avg Bid)
    €135 Offre moyenne
    64 offres
    Python Scraper for Horse Odds Data S'est terminé left

    I am in need of a Python expert who can write a web scraper to extract specific data for me. - I need to webscrape the fixed odds for each horse in each race in Sha Tin and Happy valley for the last 15 years. I need the top 5 bookmakers at least, Sportsbet, bet365, Ladbrokes, etc. I need the data to be spit out in CSV format or equivalent. I need the race date, race number, horse name, and fixed odds. - More specifically, the job involves extracting price information. - The ideal candidate for this project would be proficient in Python and have prior experience in writing web scrapers.

    €97 (Avg Bid)
    €97 Offre moyenne
    57 offres