hello coders we have an task to build a security system so as we can identify our chat clients connecting our servers. so we use authentication GUID's. below is a sample for coders so that they can get an idea of work. we have to select a team of 10 coders to build a system like this. our task is to make the security foolproof. the selected coders would have to present their ideas and should implement them after it gets approved. the rest of the team would try to decode the system and the coder whose system would be unbreakable would recieve double of his bid amount. rest of the coders would earn their bid amount. if you can resolve the sample task and have more ideas to improve security then you should contact us immidiately. we have to build this system as quickly as possible. NOTE:- i want only the coders who have capabilities to do the work. The sample task is designed by me so that you can analyze your skills. SAMPLE TASK ---------------------------------------------------- the task is to find the formula or method by which the origional guid have transformed into resulting guid string. the samples are given below. use them to find how they transformed into the resulting guid. Note:- these are 32 charectar guid strings but sometimes the resuting guid may have 31 charectars . same transformation is used for all samples. 1 origional: SCXO4JYQ43DPW4G3VF5JPMT3BI5XPJX3 resulting: NYO5ELSMVXCKQAIBMAL4S23NO5OORLOV 2 origional: CONBUVLCGZ4XDDHFNRXXGGEXT5F22XJJ resulting: EIWA62YBSH7QAVWP73BMNGCVIC742V7 3 origional: 63N6YK6UOMITD5BQB4RBLO7C7GSHK54W resulting: AQ5XLVX4HX3UYO5Y46ZANF4B3KWCVDPQ 4 origional: VUSBFY4OSZUZ4GMHB5X2JVSIDGFHWKES resulting: 4FGUW47ATSAIC63KDD4GR6Y7PWPUQQL6 5 origional: 3LYU4ZKF5SCVYBSK2P4HWQ5WM4XJ6YRM resulting: EJ647SH6OBGEMQ2NS42OAUE57QX6TWN6 6 origional: MPN3D5T76NLWP7G73I7NAJ6QYIBGPXW3 resulting: XU5DRYMLHEBT33BZ6U4YYYEHXZNVURC2 7 origional: WFIZ6UIEMFS7WNRCWQXIKBMWWH5EEJDB resulting: 6A3HGZIVDH2NVQWYQVDNXQN6SQ62Y7PW thanks
1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done.
2) Installation package that will install the software (in ready-to-run condition) on the platform(s) specified in this bid request.
3) Exclusive and complete copyrights to all work purchased. (No GPL, GNU, 3rd party components, etc. unless all copyright ramifications are explained AND AGREED TO by the buyer on the site per the coder's Seller Legal Agreement).