...gehaltener APP, die per Knopfdruck einen QR-Code scannt. Hinter dem QR-Code steckt eine URL, die ein täglich wechselndes Bild zurück liefert, dieses sollte nach erfolgreichem Scan gleich in der APP (ohne Nutzung einer Drittsoftware wie Browser) angezeigt werden. Vorzugsweise ein Freelancer mit Erfahrung in iOS Programmierung für eine spätere Übersetzung
Entwicklung: Wir benötigen die Entwicklung einer IOS-App für IPads und IPhones,... welche eine bestimmte URL/Website im integrierten Browser öffnet. Andere Funktionen im Browser dürfen nicht verwendet werden können, nur Adressen dieser Website dürfen aufgerufen werden. Zusätzlich soll es einen Button mit einer Scanfunktion für die Frontkamera geben, welche ...
Scan, Remediation and Rollback scripts required for following ( python for Linux flavours and PowerShell for windows). Win 2012 R2 CIS Linux (RHEL 7 and 6) CIS Ubuntu 14.x and 16.x CIS Coding standards to be followed 1. code should be wrapped in API's 2. there should be comment
...Speed Score is: 52 Mobile User Experience: Size tap targets appropriately URL Vulnerability: Injecting parameters in path is processed failed URL Vulnerability: www / non-www page redirects are not configured URL Vulnerability: Error page is not accessible URL Vulnerability: Configured wrong Warnings Content check: Content to code ratio: 3% (Recomended
I need you to finish develop of my software codes with C# & bind my core code ( back end ) with my UI (XAML WPF ) it’s my front end. My software is for test vulnerability of website and its education use cause I’m student. Talked with staff of freelancer.com and all is clean about my software
hi i have system to compare and scan XML have some bug, so i need some one know very good OPENCART and SQL this job very importent so maybe need build this scan XML from start if can fix it's be better only OPENCART programmer!!
I want to convert PDF to word document . Its a very easy job. Kindly bid if you are expert. I need the quality job soon.
...process and technology enabling them to proactively defend against advanced cyber attacks. Our Services Strategic Consulting SOC Services Audit, Vulnerability & Risk Management Penetration Testing, Red Team & Advanced Adversary Simulations Digital Forensics Investigations Expert Witness Services Industrial Control Systems Security Incident
Hi I a...from scratch , design , coding ... etc signup by number + OTP + Name sign in by number + OTP or number + pass - promotion page , can but shops and promotions - Scan barcode . to scan the barcode , & will add in account directly - can use it to buy from promotion page Send your bid + time Send your points & previous work as apps
...people, process and technology enabling them to proactively defend against advanced cyber attacks. Our Services Strategic Consulting SOC Services Vulnerability & Risk Management Penetration Testing, Red Team & Advanced Adversary Simulations Digital Forensics Investigations Industrial Control Systems Security Incident Response & Remediation
...recipients who share the folder. *Script must remain secure. Basically a script or tool inside Google apps (GSuite) that does not expose it to any outside third party vulnerability, of course, but does the following: Allows us to enable/disable Google Drive folder/file change notifications. So if a file is created, added or changed in a particular
...or upload a Word/PDF/etc and send it to the third party system via API. PHP or other code must be built using bank-grade methodologies and pass Acunetix or similar vulnerability scan. This includes designing the main website, the user interface as well as the backend code. Basically, everything to make this a fully operational business. Programmer
...implementation of security concepts in the MS environment o Experience in the connection to HP SM and SIEM o Experience in the area of security of standard technologies and vulnerability elimination on web servers o Knowledge in MS Hyper-V/VM-Ware architecture/application, as well as Domain Controller, Exchange and Citrix o Conception and operation of
Hey. I need a person who can scan geographical maps in The Library of Congress. In the city of Washington. I will write you the card code, the year of the card, the place in the library. You are required to come to the library and scan your geographic maps.
...Mainframe SRG and/or STIGs as updates are released, and report changes with the potential to have significant impact. • Analyze DoD and DISA directives and orders, and provide vulnerability reports • Review and validate the installation and configuration of cyber tools on UNISYS assets and report deficiencies. • Participate in A&A process activities, including
we need a website content will cover the below: IT Support: Business, Home Website desig...content will cover the below: IT Support: Business, Home Website design Cloud solution: Office 365, Microsoft Azure and Amazone aws Security: Penetration test, Forensic, Vulnerability assessment ERP solution: Accounting, invoicing, Purchase, Inventory, HR, POS
Hi We are looking for a long term contract (renewed annually based on quality of service) for 4 times an year VAPT penetration testing i..e. report every 3 months for our web application. Below are the quick details: - 12-15 dynamic pages - Web based custom developed application (Ngnix, Phython, MySql, Linux) • Single installation on a server if hosted
Hi Mudassar, good day!. I need your help for a project, it consists of a new Vulnerability Assessment of my website [Zur Anzeige der URL Anmelden], which I changed its hosting provider. In addition to this I need a security analysis for 3 landing pages that are in the same hosting, one of them is built in Wordpress, but the other two are built in html (AMP) The landing
Hi, We develop a mobile application using Xamarin forms. This application needs to be able to scan documents with a mobile phone using the embedded camera. We need then a library which works on iPhone and Android. Functions we need: • San a document with the mobile -> obtain the document only (not the table or all around) • The camera detect the document
I ...application which is able to scan URL and find vulnerabilities and generate report after penetration testing. I want it for black box security audit which will be able to categorized vulnerabilities from OWASP top 10, also it will able to update its vulnerability database from OWASP, For reference, you can check Acuntix web vulnerability scanner.
...that are running and identifying if there are any Critical CVEs with the version. Running RDS Postgres, RDS MySQL, RDS Aurora, Cassandra, Redshift, DynamoDB. This task should scan all AWS accounts to get the list of RDS, Redshift and Dynamo databases and the current versions they are running For Cassandra, this will require SSH to the instance to get
I’m looking for simple thinkorswim scan thinkscrip build. The scan will return list of stocks within set date meaning the current price is within the previous defined dates. If the date cannot be shown in the scan that would be ok because I can modify the dates within the code.
We are a s...and we are looking for a technical writer to provide content for the corporate documentation, mainly: - Description and Methodology of the services ( Penetration tests, vulnerability assessments, Wireless and Mobile app Assessment, etc) - Proposal documents and SOW. - Content for the corporate brochure . Knowledge of IT security services
...nosql, app engine), Google Earth Engine, Google Map, - Paypal for payments of storage hosting, capacity upgrades, renewals subscription - OWASP top 10 web application vulnerability scanning e.g. github - JSON for multi language website (initially just English and Spanish) - Developer is overall responsible for configuring Google Cloud Platform to
Hi Risky Pathak, I am Andrew. We worked together years ago with a C+ project tha...need a to combine a number of scripts i have to work together. This project is for me and my friends to have a private website that will have a number of IP tools, vulnerability Testing tools and more. Are you interested? IF SO_ lets talk a price. Thanks in advance.
...malware and give all possible support in terms of web security such as penetration testing, vulnerability assessment, vulnerability scanning, server hardening, installing firewall etc. It is a wordpress/woocommerce site so likely to be vulnerable. This is for a site in testing stage. You will secure the whole website and prepare for the pentest. If all
I already have a on page php code which is vulnerable and only uploads 1 image. I need 1) for it to upload up to three images 2) max files size limit and err message 3)...it to upload up to three images 2) max files size limit and err message 3) file type limit and err message 4) reCAPTCHA integration and verification of any other basic vulnerability
...must help me write about the follow vul 1. CRITICAL 10.0 77823 Bash Remote Code Execution (Shellshock) 2. CRITICAL 10.0 78385 Bash Incomplete Fix Remote Code Execution Vulnerability (Shellshock) 3. MEDIUM 4.3 90317 SSH Weak Algorithms Supported 4. HIGH 7.8 82101 Debian DLA-118-1 : linux-2.6 security update 5. SSH Server CBC Mode Ciphers Enabled and
I have a vulnable prolog file that has structures. Create at least five queries from the feature lists and make sure the tables & sample data match...have a vulnable prolog file that has structures. Create at least five queries from the feature lists and make sure the tables & sample data match what the existing Prolog vulnerability database contains.
...issues coming to it while uploading it to playstore ... Read below issues or may be few more are there, you need to resolve them all. 1. Hostname verifier. 2. Security Vulnerability Issues. Check for other issues & send us back the working codes. 5 star guaranteed & we want you to get this done by tomorrow 1pm MAX... BID only when you can do it on
I have a site that was hacked with this exploit: [Zur Anzeige der URL Anmelden] on this host. I just restored from a backup, and was hacked again. I restored from yet another backup, and want someone to go through and let me know if there is any vulnerability and fix it before it is hacked again. Thank you!
Vulnerability Assessment tool: Nessus Operating System: Debian 6(Squeeze) Scope of the Paper (Why you need to do this scan?)explain A world global leading energy sector...(Please help to write with your experience and creativity, base on vulnerability assessing the client) Summary of Finding We will be performing three type of vulnerabilities assessment
I am looking for an individual that can support technical aspects of a planned Network Security audit. Required competencies are k...technical aspects of a planned Network Security audit. Required competencies are knowledge of Network architecture and Virtual environments, as well as hands-on use of vulnerability scanning tools like Nessus and Qualys.
I looking for react-native/android/IOS Developer to build Android and IOS (Smartphone and tablet) mobile app enable user to scan, sign PDF document without Printer. Regards,
You need to remove malware and give all possible support in terms of web security such as penetration testing, vulnerability assessment, vulnerability scanning, server hardening, installing firewall etc. It is a wordpress site so likely to be [Zur Anzeige der URL Anmelden] will give all possible support you can in terms of making the site safe from future attacks.