PLEASE CHECK ALL DETAILS BEFORE BID . LAST CODER DID NOTHING JUST WASTED TIME!!
Hi
Basicly all currently known encryption implementatations have to be used based on a certain pattern.
An encryption method shall be implemented according to a design which will be revealed only to the contractor. IN ATTACH FILES. This is the specification.. the graphics .. how its work..as you will get idea for better understand.
Hi there
My name is Carlos and I'm an expert in .Net and sql server.
I have been working in software developement for the last 20 years.
I have many experience in desktop and web development.
Regards