...gehaltener APP, die per Knopfdruck einen QR-Code scannt. Hinter dem QR-Code steckt eine URL, die ein täglich wechselndes Bild zurück liefert, dieses sollte nach erfolgreichem Scan gleich in der APP (ohne Nutzung einer Drittsoftware wie Browser) angezeigt werden. Vorzugsweise ein Freelancer mit Erfahrung in iOS Programmierung für eine spätere Übersetzung
Entwicklung: Wir benötigen die Entwicklung einer IOS-App für IPads und IPhones,... welche eine bestimmte URL/Website im integrierten Browser öffnet. Andere Funktionen im Browser dürfen nicht verwendet werden können, nur Adressen dieser Website dürfen aufgerufen werden. Zusätzlich soll es einen Button mit einer Scanfunktion für die Frontkamera geben, welche ...
The sites are all built with a custom PHP CMS and have a vulnerability. [Zur Anzeige der URL Anmelden] [Zur Anzeige der URL Anmelden] [Zur Anzeige der URL Anmelden] I need malicious links removed and the vulnerability identified and fixed please.
We are implementing SEIM solution on Wazuh/ELK/elastalert. The expertise we are looking at is a person with experience in above to stack to guide our implementation and implement our organization specific use-cases. Most important is Alerts, event correlation, port scanning just to mention as a starting point. We are particularly looking for tool expertise to guide our junior developers in deliver...
...for this project is a PowerPoint presentation of 10 slides that covers Vulnerability Management in Enterprise network/ infra/ app security. Details should include topics such as current drawbacks of manual vulnerability management, Asvantages of having an automated vulnerability management tool, maintenance, protection. Specific guideline for the topics
- Install and configure WebGoat / Vulnerable web server for testing (Remote Lab environment) - OWASP Top 10 Attacks simulation - Metasploit framework – Web vulnerability checks and attacks simulation (10 attacks) - Training and walkthrough of the above - Documentation Please reply only if you have hands-on experience on the above.
...specific lifecycle dates. This comparison will provide information or output to easily determine when hardware or software components are going end of support or face a vulnerability. The solution can be Excel based or custom programmed software. The Inventory Data Sources will come from an Excel file and the Product Lifecycle Data Source to be compared
Scan the World is an ambitious initiative archiving objects of cultural significance using 3D technologies. We collect scan data from the community and museums to make sculpture and cultural heritage accessible to everyone, and provide a platform for 3D printable art objects. We have many raw photogrammetry scans that need to be cleaned up and edited
Build powerpoint presentation on the following topics 1. Why is it important to patch 2. All the past vulnerability that was avoided if patched
Need someone to create a custom NBA 2K game CYBER FACE scan for me. I would like a celebrity of my choosing to be cyber faced into the game. I was told this process is somewhat confusing so if you can complete this job contact me with your price. [Zur Anzeige der URL Anmelden] [Zur Anzeige der URL Anmelden]
it's rather quick simplify the ui of webcodecamjs ([Zur Anzeige der URL Anmelden] the ui of webcodecamjs ([Zur Anzeige der URL Anmelden]) one scan window and one button to start/play the scan this works well but the interface is heavy you have to let the scan window and on button to start/stop the scan regards
We want a library for react native who can do this: [Zur Anzeige der URL Anmelden] Scanning UI User guidance to the best position for capturing the document Image Processing Use image processing filters for perfect color, greyscale or true 1bit black & white documents Document Detection Documents will be recognized and extracted automatically Perspective Correction Automatic ...
...container service that has ClamAV running. Create a Python Azure serverless function such that once a new file is uploaded to blob, it should trigger the container service and scan the file through ClamAV. Once complete, store the result in CosmosDB(mongo of Azure). 2. The second approach is easier where we create a serverless Azure function that contains
...perform is, there is a plugin called findbugs-IDEA inside intellij which does static analysis on source code. I need to focus only on SQL injection and Cross site scripting vulnerability code segments and take that vulnerable code by the xml report on findbugs ( In here, category = "SECURITY" and abbrev = "SQL" , abbrev = "XSS" is what I need to focus on
...(uncapped and great commission %). We are a reputable and fast growing business in the US (consulting services such as GDPR, Risk assessments, regulatory compliance, pen testing, vulnerability scanning etc - no product sales). Customers: CEO, CIO, CTO, CFO, CSO Customer size: Revenue $10M+ Average project size: $200K Client focus - 95% US - 5% international
For my current cake php project, I need to connect my scanner and automatically upload it to my webform, then enter data and save. This is the webform: [Zur Anzeige der URL Anmelden] Only make a bid if you have a similar feature and you can show me your demo.
We have been working in improving the security of our web application. After running an automated pentesting with netsparker and manual tests ...such as cross-site scripting of SQL injections. However, we would like a third opinion and select an expert to have a look and confirm if it is OK enough or there is any vulnerability left that we should fix
Hello, a month ago I found suspicious files (this code redirected my site to spam websites) in every website in my Digital Ocean ...it keeps happening. I need someone to clean every malicious file from the server, check from where are they breaking in and installing the scripts, and finally fix any vulnerability for this to never happen again. Thanks.
I need an Android app. I already have a design for it, I just need it to be built.
I have 2 pages of text (an old science test) and I need someone to literally enter in word the text and structure of the file. In other words, the word file has to look identical (to some approximation) to the 2 files provided. As you can see, each page is organized in three columns and I want the same structure. One note: the file is in Italian, but the task does not require any knowledge of Ital...
We have been working in improving the security of our web application. After running an automated pentesting with netsparker, we find no critical issu...find no critical issues such as cross-site scripting of SQL injections. However, we would like an expert to have a look and confirm if it is OK enough or there is any vulnerability that we should fix
Goal : succeed by aquiring dlink dir850L AP : wps pin and/or wan username and password. Available tools : latest updated version of kali linux on Virtual machine Wifi adapter, realtek rtl8812au Wifi adapter, ralink rt2870/rt3070 Methodology: any of following plans Plan A: create an auto script of krack attack Link: [Zur Anzeige der URL Anmelden] Plan B: update fluxion script to allow client...
Background: My company website ([Zur Anzeige der URL Anmelden]) is currently being blocked by LinkedIn as seen here ([Zur Anzeige der URL Anmelden]) because they believe it is a Malicious Website, which it is not. One of LinkedIn's safe browsing partners has detected some malicious code on my site, which may be participating in malicious behavior or abuse, such as sending out spam emails. Lin...
I want 1000 qr codes generated and linked to an app (offline) which can scan them then and check in the user's. The app should give an error warning when a user has been checked in and should be able to check out user. There will be no need for any personal information and all identification will be based on the numbers 0001-1000 assigned to each
hello, I want to scan a barcode, that may not be the problem, but than I want to write this code to an NFC label, all in java code, anyone can advise me or make this?
I have created a website already using WordPress, i am using version 4.9.8. [Zur Anzeige der URL Anmelden], I need someone to help me demonstrate the vulnerabilities for my website as I am doing this for my final year project. The vulnerabilities i wish to do are SQL injection, Xss, CRSF and file inclusion. For server side DDoS, Brute force and Man in the Middle. If anyone could help me with this ...
We would like to research creating a new app that utilizes the 3d model, generated from the below codebase, that would allow the player to use his own avatar to try on new clothing(rendered in 3D). You must: 1) speak engnlish well 2) be experienced using python 3) have created apps in the app store already
...Building a vulnerability model to measure the severity of the damages inflicted by the catastrophic events estimated by the hazard model for different geographical locations. 4. Development of a financial model which can be used to measure the financial impact of the events simulated in (2) and the extend of damages estimated by the vulnerability model
Dear freelancers, The goal is to create a self executing / tutorial steps for kali linux script from the following website: https://www.seebug....The goal is to create a self executing / tutorial steps for kali linux script from the following website: [Zur Anzeige der URL Anmelden] In order to confirm vulnerability of dlink dir-850L AP.
We are a Cyber Security company which provides end-to-end solu...consulting, awareness and other services. We are looking for Web Development companies who want to deliver secure websites to the clients. We will provide Vulnerability Assessment and Penetration Testing for websites. Note: Price mentioned is basic. It may change according to web pages.
...the buttons is Scan QR ( the other two buttons will be disabled for now) Screen showing: First name, Last name, Email, Interests. ** Interests will be a free text field with an Add button. Adding a new "Interest" will append to a list where each item (interest) has a remove button next to it Workflow: Select QR Camera opens Auto Scan QR Code Read/extract
We are developing a crossword-like mobile word game for iOS and Android. We have a good algorithm to generate puzzle boards programatically but we need a list of Serbian words that can be fed to the algorithm to generate the puzzles. We already have and will send you a long list of Serbian words in excel, google sheets or any format you like. You will go through this list and mark each word as &...
I need to create A CAD model IGS file from CT scan Dicom files i have
Hi. I need someone who is in Chicago to complete 3D scanning draw project for me. We repair digital camera. We need a lot of plastic cover or door. I will give you a sample of the cover. You will draw a 3D model for me. I need at least 5-7 drawing per week. Please contact me if you are interested. Thank you.
I need to create A CAD model IGS file from CT scan Dicom files i have
Hi - I have a problem in that my clients website has duplicate URLs which is harming SEO. When I run the site through an SEO analyser I get this error: URL Vulnerability Search engines see your [Zur Anzeige der URL Anmelden] and [Zur Anzeige der URL Anmelden] (or [Zur Anzeige der URL Anmelden]) as different pages. Can anybody
Rough initial cleanup/repair of interior 3d model scan. Repairing the most visible problems in the upper hall area (users will not move around much) like wonky floor/ceiling. Removing (or repairing where possible) windows visible from the main area etc. Will continue with a more detailed repair/remodel if the client chooses to go forward with the project
I have a number of PDF sheet music files that I need uploaded to photoscore, touched up and sent to sent to sibelius. I will require the sibelius files afterwards. If you are interested, please contact me and we can discuss your fee per chart.
Project Mission: Search and find all tables in a PDF Convert images of tables from PDF (or other) to CSV-formatted tables. Mainly pdf but must use OCR because not all PDF are formatted for parsing Must be able to handle tables that are on two pages (see standard bank report pg 12/13) Requirements: OpenCV (Python) Tesseract v4 A set images of pdfs will be provided. It's important not to opt...