Guten Tag, ich suche nach jemanden der meinen Shop absichern kann gegen Hacker. Verwendet wird Magento. Das MYSQL Passwort sollte geändert werden und der Zugang soll durch einen Authkey gesichert werden, also dass man nicht mehr auf dem Server kommt ohne sich mit dem Key einzuloggen. Weitere Sicherheitsmaßnahmen wären natürlich wünschenswert
...15 Fragen wird eine Versicherungssumme ermittelt Formeln stehen in Excel zu Verfügung. 2. Durch ca. 12 Fragen wird festgestellt, wie interessant diese Firma für Hacker ist. 3. Durch Eingaben wird ein beschreibbares PDF erstellt, welches als Angebot für den Kunden dient. 4. Die Berechnungen müssen speicherbar und wieder aufrufbar
...Fragen wird eine Versicherungssumme ermittelt Formeln stehen in Excel zu Verfügung. 2. Durch ca. 12 - 15 Fragen wird festgestellt, wie interessant diese Firma für Hacker ist. 3. Durch Eingaben wird ein beschreibbares PDF erstellt, welches als Angebot für den Kunden dient. 4. Die Berechnungen müssen speicherbar und
...Escape werden, nur das man sich mit dem VR Gear durch den Raum bewegt. Variante 2 (move adventure, Steuerung erfolgt durch einen Controller) Es gibt 2 Charaktere, einen Hacker und einen Techniker. Zu beginn des Spiel´s muss sich für einen Charakter entschieden werden. Je nach Entscheidung kann man dann versuchen Daten zu stehlen oder den Diebstahl
...sich vor Online Gefahren, Viren, Phishing, Spam usw. schützt. Die neuesten Bedrohungen und Sicherheitslücken für Smartphones und Tablets, wie man sich vor Hackern schützt, wie Hacker vorgehen usw. Bezahlung: 2 Cent pro übersetztes / geschriebenes Wort. Kann in den folgenden Monaten schrittweise erhöht werden. Pensum: Wahrscheinlich Minimum 1-3 News
Implementierung einer spannenden No-Root-App, die temporär nicht verlassen/beendet werden kann (Fokus: Manipulation der Android-Navigation über Umwege). Wer sich einen tieferen Eingriff ins Android-System zutraut: bitte melden. Wer zudem noch C# beherrscht: noch besser. Wir freuen uns auf Ihre Nachricht.
Hello, I need an ethical hacker to and security specialist to check as small software spyware, malware and viruses. I need the details result written as soon as possible.
Site keeps having unusual data loss from the DB Need you to inspect code, hosting setup & files for potential threats & vulnerabilities Help put an end to mysterious data loss AWS server
Hello, our ftp server where we host our wordpress website have been hacked. all the injured files have been removed, so thats now fixed, but we want you to protect our ftp server so that no files can be modified. the hacker had placed a [Zur Anzeige der URL Anmelden] file in all the folders of our server.
...backlinks. Some websites must be PR6 and PR7. As many PR8 and PR9 as possible. * NO LINKS FROM DIRECTORIES, ARTICLES,SOCIAL BOOKMARKING. * All links must be appropriate for our website. * Page Rank is for page that has the backlink - not the homepage or other page on the site. * ALL backlinks must be DO FOLLOW... ALL links will be checked. * Text and Links
I needed an information security expert As well as an expert in databases He has a Certified Ethical Hacker He has a long experience in his field It has news in networks
I need 200 High PR 3-8 Permanent Quality Backlinks for my escort website. Requirement are as follows : * 200 PR3+ backlinks. As many PR8+ and PR9 as possible. * NO LINKS FROM DIRECTORIES, ARTICLES,SOCIAL BOOKMARKING. * All links must be appropriate for our website. * Page Rank is for page that has the backlink - not the homepage or other page on the
We are looking for a technical marketing expert with strong expertise in Search, Display and Social Media Advertising. Our ideal candidate would be certified and experienced in Facebook and Instagram ads, Google Adwords, Google Display Network, and Google Analytics. Below is a more detailed description of the level of knowledge required: - Facebook
Hello, professionally I myself is an ethical hacker and perform web penetration testing. I do have a good understanding of networks, firewall, IDS/IPS, Kali Linux, and related tools etc. So, I am not a newbie and not even at the Intermediate or Mid-level of my career. But due to some personal interests and for some projects, I need Advanced Red Team
I'm looking for typography designs for four different T-shirts that will be suitable to sell on an e-commerce platform like Shopify, Teespring, etc. The theme for all these five shirts is "programmer humor"; or "computer hacker humor". So what means is: 1) only sans-serif fonts, 2) Very minimalist/simple design, 3) If you use any clipart, it has to
An Individual who needs Cyber security Expert, ethical hacker to analyze Network and Devices (android and PC) Devices seem recording and sending data to unknown people especially when call is made. Are the devices set to public? Need to know more details of [Zur Anzeige der URL Anmelden] it also possible to check if i am under any Voice app or google Voice. Am i under one's
it expert google hacker google expert
Hello, My whatsapp is penetred my skye is penetred my both emails are penetred : personal and professionnel my smartphone is penetred (sms...) all my communications are going to third person If you can help me to being protected and localise the intrusion, we can work together. Thanks
...We are a seed Startup based in Tokyo, Japan. We recently raise funds from a venture capital and looking for a mobile app developer who can develop either both platforms or iOS, android (preferably iOS if multi-platform is not an option). Also, we're looking for a Chief Technology Officer (CTO). The CTO position will be given a certain amount of equity
Buscamos un Growth Hacker - Marketing Planner que se encargue del crecimiento de nuestro aplicativo (Web - SAAS). Debe tener sólidos conocimientos como Growth Hacking parar complir nuestro objetivo: Question: “How do I get customers for my product?” Response: Website analytics, A/B tests, Search Engine Optimization (SEO) and Content Marketing. Además
Seeking experienced digital marketing professional to help us grow several new startups. If you are passionate about blending new ideas with technology to drive qualified traffic, acquire leads and convert customers, please describe your experience here. Must understand and have experience with the following: Google Ads A/B Testing Facebook Local Ads Influencer Marketing Instagram Marketing Exc...
NY based Healthcare startup is looking to work with a growth hacker and social media marketing person to create brand awareness especially around major event happening in first week of December. US based are preferred. NYC area and healthcare expertise a plus but not necessary
...can handle the rest. Details for the character design: I am a maker, coder, and all-around tinkerer. I need a character that looks a little bit like a mad scientist / hacker / nerd. A dude that looks a bit crazy, and a little bit genius. Have some fun with it. I'm not an artist, so I leave all the creativity up to you! Deliverables: I need a
I need to find out if my domain but especially if my emails from my...especially if my emails from my quote request form on my site can be hacked by sending them to another destination or if they can be intercepted by the hacker first and them redistributed to my based on what the hacker wants me to receive. I feel that this is happening to me. Aldo
We would like test our website to see if it's secure. Project would require a trained ethical hacker to attempt to hack our website and if successful, give us a full report on what information they got and how we can secure it better.
...first. I want you to write a short film about a hacker and his interactions with an entity known as the God in the Wired. Kind of like Mr. Robot. A film like Pi by Darren Aronfsky would be a good frame of reference It has to keep soecial effects to a minimum, it will be in black and white, the hacker has a cybernetic eye that violet and goggles on
...film. I want you to write a short film about a hacker and his interactions with an entity known as the God in the Wired. Kind of like Mr. Robot. A film like Pi by Darren Aronfsky would be a good frame of reference It has to keep soecial effects to a minimum, it will be in black and white, the hacker has a cybernetic eye that violet and goggles on
... *Database data has been altered/deleted Its most likely by a former manager who use to work for us and created the system, and threated to sabotarge it. So we assume the hacker knows the complete source code of the server. Probably some kind of code/SQL injection attack. I've resetted the hosting account password and cPannel/FTP password since we
This is for a cyber exercise scenario. I wanted to have a scenario where a malicious hacker is able to alter the applications program of payment system to cause disruption to the finance industry e.g. 1) Every online banking transaction that is initiated from a bank was amended to a default of $100 regardless of the amount, 2) All transferee and recipients
Searching for a growth hacker with intimate knowledge of cloud/SAAS software with relevant experience and knowledge of UI/UX and some ASP.NET background. Terms of engagement is negotiable if you can prove your mettle. PM me your resume and let me contact you.
I need a business card design! Attention grabbing, creative and related to an infosec/cyber security company! (Hacker/security/networks,elegance,creativity)
Looking to hire App Marketer (growth hacker) than can help me with following for my android apps for Japan and South Korea Kids Place: [Zur Anzeige der URL Anmelden] Safe Browser: [Zur Anzeige der URL Anmelden] a. Improve Play Store listing with app title; description;
An individual who needs an expertise of a digital forensic/cybersecurity expert to analyze devices (2 android mobiles and 1 win 7) for Malware removal and network security.
...organic (SEO/referral) and we want to start growing with SMM (Facebook, Instagram). We have a team of 5 marketing members who can create content, run campaigns, etc. We are looking for a person that: - can help us setup the tracking tools + KPIs to prepare for SMM (pixel, analytics, etc) + analytical / dashboard tools - coordinate the team in running
I'm looking for a freelance certified trainers for the following subjects: • MCSA Server 2016 (As one package) • ITIL Foundation v3.5 • Security+ • Ethical Hacker and Countermeasures if you meet one of the above subjects please contact me [Removed by Freelancer.com Admin]