Filter

Meine letzten Suchanfragen
Filtern nach:
Budget
bis
bis
bis
Typ
Fähigkeiten
Sprachen
    Jobstatus
    5,000 wormhole attack Gefundene Jobs, Preise in EUR

    Write 8 Blog Posts, directly in Wordpress + add 10 images for each post + 1 featured image 1. Indulge Guilt-Free: The 10 Best Gluten-Free Desserts You Must Try 2. Snack Attack: 10 Easy-to-Make Gluten-Free Snacks for Every Craving 3. Beyond the Aisle: 10 Gluten-Free Finds You'll Love at the Grocery Store 4. Brunch Bliss: 10 Mouthwatering Gluten-Free Recipes to Start Your Day 5. Dinner Delights: 10 Gluten-Free Main Courses That Steal the Show 6. On-the-Go Goodies: 10 Portable and Delicious Gluten-Free Snacks" 7. Morning Fuel: Energize Your Day with These 10 Gluten-Free Breakfast Delights 8. Culinary Inspirations: My Personal Picks for the Top 10 Gluten-Free Food Blogger Add a short description + an image + source link to each dish (see

    €21 (Avg Bid)
    €21 Gebot i.D.
    24 Angebote

    Project Title: E-commerce Malware Removal Description: It's important to note that this par...Platform: WordPress Backup: Yes, I have a backup of my website, so there is no risk of data loss during the removal process. Identification of the Source: I have a general idea of where the malware is coming from, but I need an expert to fully identify and remove it. Skills and Experience Required: - Proficiency in WordPress security and malware removal - Knowledge of common malware sources and attack vectors - Experience in identifying and removing malware from e-commerce websites - Familiarity with website backups and restoration processes Please provide examples of previous projects where you have successfully removed malware from WordPress e-commerce websites.

    €29 (Avg Bid)
    €29 Gebot i.D.
    23 Angebote

    very strong ddos attack on website cloud flare is set up seems like ip based attack

    €111 (Avg Bid)
    €111 Gebot i.D.
    37 Angebote

    ...am looking for a skilled professional to secure my website against DDoS attacks. The ideal candidate should have experience in website security and be able to implement effective measures to protect against DDoS attacks. Budget: $100 Specific security measures: No, I am open to suggestions Timeline: Immediately Skills and experience required: - Strong knowledge of website security and DDoS attack prevention - Experience in implementing security measures to protect against DDoS attacks - Ability to quickly assess and identify vulnerabilities in the website - Proficiency in configuring firewalls and other security tools to mitigate DDoS attacks - Knowledge of industry best practices for website security If you have the necessary skills and expertise to secure my website agains...

    €62 (Avg Bid)
    €62 Gebot i.D.
    16 Angebote

    Project Description: Setting Cloudflare Protection from DDoS for GoDaddy-hosted E-commerce Website Skills and Experience Required: - Strong knowledge and experience in setting up Cloudflare protection against DDoS attacks - Expertise in working with GoDaddy hosting platform - Familiarity with E-commerce websites and their specific security needs - Ability to analyze and assess current DDoS attack situation and develop appropriate protection measures - Proficient in configuring Cloudflare settings and implementing security features to mitigate DDoS attacks - Knowledge of best practices for securing E-commerce websites and preventing future attacks - Excellent problem-solving skills and attention to detail to effectively address security vulnerabilities and risks

    €12 / hr (Avg Bid)
    €12 / hr Gebot i.D.
    8 Angebote

    ...project, I am looking for someone to conduct a membership inference attack on a single ML model based on the CIFAR-100 dataset. This project will require to perform the attack using the three types of methods: black box, white box, and transfer attack. The results of the attack should be documented and presented in a way that is understandable to a university level audience as this is the university level project. It is important that the individual who carries out this project is familiar with the CIFAR-100 dataset, ML models, and methods for performing membership inference attacks. Having previous experience working with any variation of these topics is desirable but not required. The goal of this project is to evaluate the attack and identify poten...

    €83 (Avg Bid)
    €83 Gebot i.D.
    16 Angebote

    ...influence the game's outcome. Key Features and Specifications: Team-Based Play: Automatically assign viewers to one of two medieval castle teams for balanced gameplay. Viewer Interaction: Likes spawn soldiers with the viewer's nickname. 1 diamond spawns a soldier, 10 diamonds spawn an archer tower. Combat System: Units from both teams engage in battles. If a team loses all units, opponents can attack their towers and base. Boss Mechanics: Every 10 minutes, spawn a neutral Boss unit. The team defeating the Boss gains 5 archers. Game Resolution: 1080x1920, optimized for vertical display on TikTok Live. Visual and Audio Design: Develop detailed medieval aesthetics with engaging sound effects and background music. Balancing: Implement algorithms to balance gameplay, ensuri...

    €246 (Avg Bid)
    €246 Gebot i.D.
    43 Angebote

    I am looking for a Cloudfare specialist who can assist me with protecting my website against DDoS attacks. Tasks: - Implementing measures to prevent and mitigate DDoS attacks - Configuring Cloudfare to enhance website security Requirements: - Experience in Cloudfare setup and configuration - Knowledge of DDoS attack prevention strategies - Familiarity with website security best practices If you have expertise in Cloudfare and can help me protect my website from DDoS attacks, please reach out to me. This project has an immediate urgency, so I need someone who can start working on it right away.

    €37 / hr (Avg Bid)
    €37 / hr Gebot i.D.
    32 Angebote
    Trophy icon T-Shirt Art Work Beendet left

    Hello, I am looking for the following: 1.) final design must be PNG file type. With a Transparent background. 2.) The cavass must be no larger th... With a Transparent background. 2.) The cavass must be no larger than 11x17 and 300 pixels minimum. 3.) the image must have any outer edges in Black or Grey as this image will be used on different color back drops on t-shirts. The image has to be the following: I would like a Valkyrie with a Black or Dark color Armor. She must be posed in a way where it shows her either falling down on an Attack or Flying upward. The back drop can be clouds or other similarly aspects. I would like the Moon or the Sun in the back drop of her. The background will need to be Transparent. (red) See examples of types of Valkyries. AI ART WORK IS AUTO...

    €41 (Avg Bid)
    Garantiert
    €41
    131 Einträge

    ...name required for a 3v3 arena, and a dynamic 1/10 player Battle Royale. Key Features and Requirements: • Varied Arena Designs: Four distinct versions of each arena type (1v1, 2v2, 3v3, Battle Royale) to enhance gameplay diversity and replay value. • Rich Hero Roster: A diverse range of heroes featuring unique combat styles, including melee and ranged types. Detailed classifications based on attack diversity and abilities are needed. • In-Game Communication: Robust in-game chat functionality for seamless player interaction and strategy planning. • Comprehensive In-Game Shop: A shop featuring a variety of items such as character skins, experience boosters, money boosters, and level boosters to enhance player engagement. • Cross-Platform Compatibility:...

    €4080 (Avg Bid)
    €4080 Gebot i.D.
    10 Angebote

    ...Maintain an aggressive Azure Security Score both through reactive monitoring and proactive automation • Support internal and external resources to meet ongoing technical and business demands • Handle inbound security questions and concerns while proactively communicating to the organization on critical security topics • Research and implement solutions to prevent malicious behavior at the point of attack, or otherwise rapidly identify, isolate, and shut down bad actors • Introduce tools and processes to identify and report vulnerabilities in systems, services, containers, and infrastructure, through automated scanning, pen testing, and similar research efforts • Assist the development team to understand threat vectors, model exposure, and implement ...

    €8335 (Avg Bid)
    €8335 Gebot i.D.
    8 Angebote

    ...areas and are passionate about training others, we want to hear from you. Locations: Delhi NCR Duration per batch: 100 hours approximately 15-17 days Commercials per batch: Rs. 30,000 Topics you should be able to teach are: 1. Firewall and its types 2. Inspection Techniques 3. Layers, Protocols and Ports 4. Network Level Attacks and Detection Techniques 5. Brute Force Attack 6. Security Recommendations, Countermeasures and Security Baseline 7. Network Analysis and Monitoring 8. Cryptography and Cryptanalysis 9. Understanding Digital certificates and Signatures 10. Web Server & Application Security 11. Proxy Setup 12. Secure Coding Practices 13. Web Application Vulnerability Scanning Tools 14. Burp Suite, Nikto, CMSeek, ...

    €313 (Avg Bid)
    €313 Gebot i.D.
    7 Angebote

    I am the manager of an unsigned band: 3Head. We play dub, Trip hop and that kind of stuff (think Massive Attack and Portishead style ref our music). We are performing live on 6th December - It is in a brewery in North london. There will be 3 performers on stage as the main band - a drummer/percussionist who'll be triggering samples, a violinist and a rapper. I have been in the past doing all the band shots but I'm a creative director not a professional photographer - and I want a professional photographer. And furthermore, also, I'll be DJ ing for the 1 hour warm up set before the band comes on so I need someone to do the following: 1) capture the event - not sure how many people will turn up but its not going to be a huge amount as we're not at all well kno...

    €23 - €292
    Lokal Versiegelt
    €23 - €292
    13 Angebote

    I am looking for a freelancer who can assist me with a project involving two IoT devices. The main objective of this project is to implement lightweight cryptographic code to secure data transmission between the devices. Additionally, I would like to test the power consumption of the devices and ...consumption of the devices and assess their vulnerability to side-channel attacks. Ideal Skills and Experience: - Proficiency in IoT device development and programming - Strong understanding of cryptographic algorithms and protocols - Experience with implementing lightweight cryptographic code - Knowledge of power consumption testing methodologies for IoT devices - Familiarity with various side-channel attack techniques and countermeasures - Ability to analyze and interpret test results ...

    €142 (Avg Bid)
    €142 Gebot i.D.
    12 Angebote

    Hello! I'm looking for someone who can help me to shape the narrative structure and dialogues of game I'm working on. - Here's the game public short-description: Hirocato is a fast-paced side scroller loaded with hard-to-beat levels, great music, gorgeous pixel art and an emotional subtle story. Control Cato while running through an exciting city ...good" - to give a little of initial context. So what I'm looking to get is a script for the game dialogues and narrative, I don't expect to have "story" portions on every level, but to be able to tell the whole story in a subtle and emotive way. I'll be happy to answer any doubts you have. As a final comment here are a few Stories that I like a lot for you to use as a reference: - Futurama -...

    €18 (Avg Bid)
    €18 Gebot i.D.
    25 Angebote

    King Araille of Isfolk, a small island bordered by land, launches an attack on the Celtivicans, by not paying the tributes they are under bondage for. King Araille is under a lot of pressure as his people are hungry because most of his income goes to tributes. It is the kind of behaviour that calls for outright war. But Araille is dead and has been for a few years. Araillina, his young daughter and heiress, is now the queen. The Celtivicans don’t know this. They are dealing with a transition of their own, as their king is dead, and Gaius, the heir is now king. Celtivica decides to take the bait and take the battle to Isfolk’s gates. Isfolk is ready and Celtivica only wins this battle by the sheer genius of Gaius. But when the “king” of Isfolk is captured, Gai...

    €68 (Avg Bid)
    €68 Gebot i.D.
    29 Angebote

    ...those pages, but their arguments should be very easy to shoot down. I can flesh out those arguments but I need the main points. Please help. I have more than 100 other cases I need help with and I am recruiting partners. I keep getting results for generative AI but I prefer humans. The case is simply this - a wrongful claim of possession. My rich client's company was subjected to a terror attack. As a result of the disruption he made a claim for an SMI Loan under statute, and it was granted. His mortgage company denies there was an SMI loan. The evidence presented shows that they had been served with proof of it from the horse's mouth. They claim arrears for the amount covered by the loan and possession. This matter has escalated well beyond expectations....

    €232 (Avg Bid)
    Featured Dringend NDA
    €232 Gebot i.D.
    11 Angebote

    Based on DDoS attack... need to mitigate them with very good accuracies and show some novelty.

    €299 (Avg Bid)
    €299 Gebot i.D.
    18 Angebote

    ...reinforcement learning. I am looking for someone reliable, creative, and highly knowledgeable in the field of machine learning. If you believe you are the right fit for this project, please reach out and I would be eager to discuss further details. Thank you! Topic: Detection of cyberattacks using ML algorithms in healthcare field Implementation: selecting 3 types of cyberattacks and for each attack using the existing ML algorithms and calculating parameters like F1 score, accuracy, precision, delay ratio and some other performance analysis parameters for each algorithm in every cyberattack case. Finally if we get 3 algorithms in 3 cases as best algorithms we will develop a new algorithm which can be combination of this 3 algorithms so that it works in all the 3 cyberattack cas...

    €133 (Avg Bid)
    €133 Gebot i.D.
    19 Angebote

    I'm looking for an ethical hacker to help protect my accounts from being hacked. Specifically, I'm being targeted via email, devices, and cell service via SIM swapping. This type of attack targets both PC/laptop and mobile devices, so I need someone who can thoroughly investigate both. Furthermore, I'm looking for ongoing monitoring of my device's security, as this type of hacking could continue or become more frequent. I need someone who takes security seriously, can quickly assess a problem, and solve it efficiently.

    €539 (Avg Bid)
    €539 Gebot i.D.
    19 Angebote
    unity 3d rts game Beendet left

    This is a unity project, and a fighting simulation game. our guards will attack enemy. so we need npc interaction system. we have a 3d animation designer who can help you with the animations but you have to make sure the coding side and gameplay is good.

    €2152 (Avg Bid)
    €2152 Gebot i.D.
    73 Angebote

    ...a simulated network environment, and optimize the system's performance. The goal is to enhance network security by accurately detecting and preventing intrusions using advanced Machine Learning techniques. machine learning models and algorithm : Random Forest. intrusion detection system (IDS) type : anomaly-based IDS. Types of attacks to detect: Denial-of-Service (DoS) and DDoS and others attack simulation tools: Scapy | Jupyter | NS-3 or any other tools programming language: Python Dataset:CIC-DDOS2019 Skills and Experience: - Strong background in machine learning, particularly in developing supervised models - Experience in intrusion detection systems and understanding of different types of intrusions - Proficiency in data analysis and visualization tech...

    €373 (Avg Bid)
    €373 Gebot i.D.
    35 Angebote

    I am looking for someone to help me with the configuration of an HPE rackmount storage server. I don't Skills and experience required: - Exten...technologies). Utilize NIC 10G BASE-T DP Utilize web GUI and CLI for easy management and configuration. Provision The backup storage hardware should have at least a minimum of usable capacity is 60TB after RAID calculating or (Erasure coding) Enable high deduplication ratio data reduction Provisioning at least 2 backup storage for Air-Gap Sync ,data redundancy and high availability against cyber attack. Enable WORM feature Write Once, Read Many (WORM) functionality. Enable Secure snapshots which cannot be modified or deleted and can be set with a protection period. Enable data protection features with RAID or Erasure Coding (EC) prot...

    €493 (Avg Bid)
    €493 Gebot i.D.
    20 Angebote

    I am looking for someone to create a network topology to simulate a DDoS attack for me. The script needs to be written in TCL scripting language, and the simulation needs to be visualized using nam. The purpose of the simulation is to analyze the impact of a DDoS attack. I have specific devices and connections in mind, and I need a high level of detail in the visualized simulation – showing individual packet movements. If you have the necessary background and experience in network engineering, I would very much appreciate your help in completing this project.

    €121 (Avg Bid)
    €121 Gebot i.D.
    3 Angebote

    I am looking for a freelancer who can help me develop a defense mechanism for the Zombieiload attack. Target System: I need assistance in identifying a specific target system to test. Required Expertise: - The freelancer should have expert knowledge about C programming and Security , computer architecture Skills and Experience: - Strong understanding of system vulnerabilities and defense mechanisms - Experience in investigating potential threats - Knowledge of Zombieiload attack and its implications - Expertise in developing effective defense mechanisms against such attacks If you have the necessary skills and experience, please reach out to discuss further details of the project.

    €55 (Avg Bid)
    €55 Gebot i.D.
    3 Angebote

    the project is about security awarness about Zero day vularnability , I need slide which include training objectives as showen below: What is Zero-day vulnerability? whos the audiance or target What is Zero-Day exploit and why is it dangerous Search for vulnerabilities: Generate exploit code: Search for systems affected by the vulnerability: Planning the attack: Offside: Zero-Day vulnerability released: Examples of Zero-Day attacks Zero-Day Market White hat markets Zero-day Zero-day exploit extracts Zero-day vulnerability attackers Types of Zero-Day attacks in terms of target How do we protect ourselves from Zero Day attacks? Zero Day initiative Promote Vigilance and Reporting: Encourage a culture of vigilance among employees, emphasizing the importance of promptly reporting any un...

    €77 (Avg Bid)
    €77 Gebot i.D.
    31 Angebote
    Ethical Hacker Beendet left

    I am looking for an ethical hacker to test the security of my web application. I have forgotten the login information for my website and need assistance in...website and need assistance in retrieving it. Specifics: - System to be tested: Web Application - Vulnerabilities: No specific vulnerabilities, open to recommendations - Deadline: Testing to be completed within 1 week Ideal Skills and Experience: - Experience in ethical hacking and penetration testing - Strong knowledge of web application security - Familiarity with common vulnerabilities and attack vectors - Ability to provide detailed reports and recommendations for improving security measures If you have the necessary skills and expertise, please provide a proposal outlining your approach to testing and your relevant e...

    €18 (Avg Bid)
    €18 Gebot i.D.
    8 Angebote

    This is a bear attack animation An artist will perform using Blue Mat We need animation like the one in the blue matte suit is acting

    €473 (Avg Bid)
    €473 Gebot i.D.
    12 Angebote

    ...drawing design - of a cat (Ill use it for a tattoo later) The person who will make the order must have experience with drawing the anatomy of animals Below I will attach images with examples and numbering the images A. B. C. D. E. F. represent what we would like the result to be. 0) all the drawing (apart from some details) must be in sketch style in black and white colors 1) the cat must be in the attack position of a tiger, 2) with one paw stretched forward and the other bent at the elbow, 3) both paws must have their open claws somehow embedded in the ground for launching, 4) the cat's eyes must be white, 5) the head tilted forward downwards and the gaze should look up and forward, 6) the mimic should be one of irritation, 7) the mouth must not be open, possibly only the ...

    €88 (Avg Bid)
    €88 Gebot i.D.
    34 Angebote

    ...project should be completed within 1 month. If you have the required skills and expertise, and can deliver the project within the specified timeline, please submit your proposal. Below is a Summary of the targets to be achieved: 1. The project needs to be emulated on Mininet 2. The purpose of the project is to use the concept of Moving target defense and Software define networking to prevent cyber attack on an infrastructure 3. Network devices in the infrastructure are Openflow 4. The concept of the project is that the controller ( Ruy or Floodlight controller ) should send script that would change the Ip address of the Router and map the existing ip to the honeypot. Honeypot should logs the type of attacks performed by the attacker and generate a report for the administrato...

    €258 (Avg Bid)
    €258 Gebot i.D.
    10 Angebote

    I need to give some students an exercice showing ways of attacking an active directory environnement. I am active directory expert but have no time to prepare this exercice. Could you suggest one or more exercices which could be done in 5 or 6 hours maximum. Your job consist to explain : - the goal of each exercice - the steps to achieve the exercice, which will be given to the students as a correction. - The exercice should be done with : - one windows server 2019 or 2022 as the domain controller to be attacked - one windows client like windows 10 or windows 11 Each students will have this environment. So if your are interested by this job, please tell me in a few words : - the king of exercice you suggest - the time and price you want to produce it. Thanks in advance. I may need oth...

    €39 / hr (Avg Bid)
    €39 / hr Gebot i.D.
    9 Angebote

    First thing, I will ignore all bots that submit bids. So on your first line to me, type the answer of 3+3= Second, feel free to make your bid sealed but do NOT do a bid just to chat and then say, whats your budget. Our conversation will end at that time. I need a digital invisible watermark for images that will sustain the following methods of attack. I also need a way to decode the actual watermark. My server is Ubuntu. The decoding needs to be able to be completed via shell. Python/PHP ect can be used. The end goal is protection against these methods: 1. adding text on image 2. adding filled shape on image 3. minor crop 4. rotate - flip-vertical - flip-horizontal 5. minor resize 6. screen capture Time Frame is 5 days. I have no clue what the term "Provenance...

    €453 (Avg Bid)
    €453 Gebot i.D.
    61 Angebote

    ...Play Framework(slick) that simulates and defends against SQL injection attacks. This application will serve as a platform for both testing SQL injection vulnerabilities and showcasing how to protect against them. Project Objectives: SQL Injection Attack Simulation: Create a module for emulating SQL injection attacks on a basic music retrieval application and its associated database. Implement various types of SQL injection attacks (e.g., classic SQL injection, blind SQL injection with conditional errors/conditional responses,union attack) to test the application’s vulnerability. Populate the database with approx. 30 records of songs Defense Mechanisms: Implement security measures to defend against SQL injection attacks. Utilize prepared stateme...

    €29 (Avg Bid)
    €29 Gebot i.D.
    4 Angebote

    I am looking for a freelancer who can help with recovering, cleaning, and ensuring future safety for my website. The site is currently completely down and I am not sure about the specific type of malware attack it is experiencing. Unfortunately, I do not have any backups of the website. Skills and experience required: - Expertise in AWS server management and security - Experience in recovering websites from malware attacks - Knowledge of different types of malware attacks and their remediation strategies - Proficiency in website cleaning and ensuring future safety measures - Ability to work efficiently and quickly to get the website back up and running - Strong problem-solving skills and attention to detail

    €171 (Avg Bid)
    €171 Gebot i.D.
    42 Angebote

    I am looking for a skilled 3D artist who can create a Pokemon-like toon monster for my project. The monster should have a cute and friendly style. The poly count should be below 10k. We will provide a drawing of t...be below 10k. We will provide a drawing of the monster for reference. If we are happy with the results there will be follow up contracts for many more monsters. The ideal candidate should have experience in creating 3D models with rigging and animations. The monster will need to be rigged and animated with various animations: including idle, walking, running, stunned, taunt, melee, and shoot attack. The 3D model should be compatible with Unity3d software. Skills and experience required for this project: - 3D modeling and rigging - Animation - Proficiency in Unity3d ...

    €174 (Avg Bid)
    €174 Gebot i.D.
    36 Angebote

    ...Honeypot - Proficiency in OpenFlow platform - Intermediate level knowledge in SDN and honeypot technology If you have the required skills and experience, please submit your proposal. Below is a summary of target to be achieved: 1. The project needs to be emulated on Mininet 2. The purpose of the project is to use the concept of Moving target defence and Software define networking to prevent cyber attack on an infrastructure 3. Network devices in the infrastucture are Openflow 4. The concept of the project is that the contoller ( Ruy/Floodlight controller ) should send script that would change the Ip address of the Router and map the exsiting ip to the honeypot. Honeypot should logs the type of attacks performed by the attcker and generate a report for the administrator. repo...

    €202 (Avg Bid)
    €202 Gebot i.D.
    10 Angebote

    ...You're polite, but RELENTLESS in chasing down details from others. • You are high energy, optimistic, and driven to succeed. • You are a self-driven investigator and problem-solver! • You have a strong work ethic. (Details kneel in your presence!) • You LOVE playing on a TEAM that makes real differences in peoples’ lives • You LOVE creating order out of chaos, (when others get overwhelmed, you ATTACK!) • You are a Time, Control, and Detail freak! • You LOVE everything ON time, and IN place! • You are a fast learner and never afraid to ask ANY kind of questions • You have a healthy sense of humor and social flexibility • You LOVE working with the wealthy, because YOU want to become one yourself! Qualifications • (R...

    €17 / hr (Avg Bid)
    €17 / hr Gebot i.D.
    10 Angebote
    Ethical hacking Beendet left

    Project Title: Ethical hacking for Mobile App System or Network: Mobile App Testing Type: Penetration Test Timeline: Less than a week Skills and Experience Required: - Experienced ethical hacker with a focus on mobile app security - Proficient in conducting penetration tests and vulnerability assessments - Strong knowledge of mobile app vulnerabilities and common attack vectors - Familiarity with tools and techniques for retrieving passwords from mobile apps - Ability to identify and exploit security vulnerabilities in a mobile app - Understanding of best practices for securing mobile apps - Excellent problem-solving and analytical skills - Strong communication skills to effectively communicate findings and recommendations to the client Note: The ideal candidate should have a ...

    €79 (Avg Bid)
    €79 Gebot i.D.
    23 Angebote

    Linux Ubuntu Server was under attack and became infected. I wanted to upgrade from Ubuntu 18 to 20. After that neither Plesk nor the websites (Wordpress) worked. The database appears to be affected. Goal: - Restoration of server functionality (Plesk, websites: e.g. connect database for Plesk and websites, delete virus/delete infections) - Backup and transfer of websites including databases to other servers If the server is secure again, it may continue to operate, otherwise data should be moved to a new one

    €32 (Avg Bid)
    €32 Gebot i.D.
    23 Angebote

    Title: Website Security Vulnerabilities Fix for sainikcanteen.i... Project Description: I am in need of a skilled professional who can address the security vulnerabilities on my website, sainikcanteen.in. The specific issue that needs to be resolved is a potential hacker attack via email. Skills and Experience Required: The ideal candidate for this project should have: - Expert knowledge in website security and vulnerability assessment - Proficiency in identifying and resolving email-based security vulnerabilities - Experience in securing websites from unauthorized access and potential malware infections - Familiarity with DDoS attack prevention and mitigation techniques Project Urgency: The urgency level for resolving the security vulnerabilities on the website is medium...

    €21 (Avg Bid)
    €21 Gebot i.D.
    4 Angebote
    Ethical Hacker Beendet left

    I am looking for an ethical hacker who specializes in network security assessment. Thi...hacker who specializes in network security assessment. This project requires someone with expertise in assessing and identifying vulnerabilities in our network security. Skills and Experience: - Proven experience in network security assessment and penetration testing - In-depth knowledge of different network protocols and systems - Familiarity with common network security vulnerabilities and attack vectors - Ability to analyze and interpret security assessment results - Strong problem-solving and troubleshooting skills Timeline: - Immediate (within 1 week) Please note that we do not require vulnerability remediation advice post-assessment. We are only looking for an assessment of our network...

    €12 (Avg Bid)
    €12 Gebot i.D.
    4 Angebote
    documentary Beendet left

    ...Dixieland melody and leave out the emphasis on the first and third beat, but emphasize the second and fourth, and add a beat to which the listenerscan clap or even dance – that would serve their wishes. The rest was easy – I took catchy phrases like ‘Crazy Man, Crazy’ and made songs out of them with the method I just explained.” On February 9th, 1981 Bill Haley died suddenly of an apparent heart attack at his home in Harlingen, Texas. He was only 55 years old. What occurred before, during, after, and in between the many successes and phases of Bill Haley’s career? What was actually behind the professional image of “the star” Bill Haley? And what led to his untimely death at the relatively young age of 55? These are a few of the ques...

    €456 (Avg Bid)
    €456 Gebot i.D.
    14 Angebote

    Hey I’m looking for some sketches of some characters I’m designing. I’m more of a writer than artist, so I can provide whatever detail necessary. Nothing complicated, just some basic designs. I have the names, backstory, nationality, ethnicity/race, costume design, etc. just need an idea of what they look like. I'm trying to depict a human character for a seinen manga, for example Attack on titan and Vinland saga or even tokyo ghoul. I would like them to be in a similar type of art style, nothing too complicated. Hand drawn pencil sketches would be preferable, but if the artist would prefer to use digital that works. I'd like to get one character done for now, just to see how it goes. Bid if interested

    €26 (Avg Bid)
    €26 Gebot i.D.
    44 Angebote

    I am looking for a skilled writer to create a research background in the field of Technology, specifically focusing on the use of machine learning in detecting wireless sensor network (WSN) attacks such as Blackhole, Grayhole, Flooding, and Scheduling attack,. Requirements: - Strong understanding of wireless sensor networks and Artificial Intelligence - Familiarity with Cybersecurity and Blockchain Technology is a plus - Ability to conduct thorough research and present findings in a clear and concise manner - Excellent writing skills with attention to detail - Previous experience in writing research papers or academic articles is preferred NOTE: The papers should be recent 5 years or less unless some has many Citations > 100. For each reviewd paper, explain the method and the...

    €80 (Avg Bid)
    €80 Gebot i.D.
    34 Angebote
    Iot Security Beendet left

    The objective is to monitor an IoT device, such as a D-Link camera, known to have vulnerabilities (we already have one in hand that is the (DCS-930L). The aim is to simulate an attack on the device and counter the attack using while also conducting a forensically sound analysis of the incident resulting from the simulated attack. We are open to suggestions for other devices and value your input. Please feel free to share your thoughts! This is currently a demo project, and we aim to have it up and running within a month if feasible.

    €58 / hr (Avg Bid)
    €58 / hr Gebot i.D.
    4 Angebote

    I am looking for a very professional person with expert proficiency in Kali Linux to perform a password cracking active directory attack. The end goal of this attack is to demonstrate a vulnerability. Skills and experience required: - Expert proficiency in Kali Linux - Strong knowledge and experience in active directory attacks - Deep understanding of password cracking techniques - Familiarity with vulnerability assessment and penetration testing - Strong problem-solving and analytical skills - Excellent attention to detail and ability to work independently Requirements : 1- Kali Linux machine: This is a Linux distribution designed for digital forensics and penetration testing. It comes preinstalled with a lot of useful tools like Responder and Hashcat. 2- Windows 10 machi...

    €137 (Avg Bid)
    €137 Gebot i.D.
    16 Angebote

    FIRST AND FOREMOST: If you are involved in spying, tracking, stalking, hacking in any way, stay WAY away from me, because I treat it as war and terrorism, especially if it is not just a short-term national security investigation. I pride myself and my company on not making the mistake of working with spies, because spying, unless it is an attack on someone, would always be discriminative out-of-context and over-valued information from the past. It can never help the person being spied on, as the person being spied on has better information and decision making about his own life. I dont play games when it comes to spying on people. I want a developer familiar with integrating Apple In-App Purchases. I just need three things completed (see below). The App is already configured to c...

    €76 (Avg Bid)
    €76 Gebot i.D.
    23 Angebote

    Hi! We're looking for a person, who has experience with creating, texturing, rigging and animating 3D Models. We're looking for Low-Mid Poly Models. The style of the low-mid poly models have to look similar to the attachments below. The animations would be basic walking, idle, idle2, attack, attack2 animation + death animation. We would be looking for 20 models for given budget. The models have to be compatible with Unity. We're looking for long term cooperation! Thank you!

    €1011 (Avg Bid)
    €1011 Gebot i.D.
    83 Angebote

    ...game using Scratch. The game has 8 backdrops. I have completed first four backdrops need to be tested and fixed before going further. Then the description for the last four backdrops (5-8) are given below: Backdrop 3: Problem to be fixed Backdrop 4: Problem to be fixed Backdrop 5: - Boss Dinosaur in blue - He has 3 hits to die - The blue shirt boy with sword has to attack the dinosaur and the dinosaur has to attack back - If boy need more lifes, he goes to bed of lives which will help him to get more lives to defeat the Boss. - Put a * win sign when he wins. Backdrop 6: Note: You need to finish backdrop 5 before doing 6. - Has to beat the Wigglie dude to get the key and open the treasure box to get the sword. - He has to teleport from the red whole in Backdrop 2. - ...

    €539 (Avg Bid)
    €539 Gebot i.D.
    5 Angebote

    ...short range auto defense fire power. the player then finds a garden, tool cage, gun rack, water source, map station, museum, Research station as the player mines to find these. as the player mines the player gathers bolts as well as fossils. when a fossil is found the player then has to research the fossil with research points from finding fossils. after research is complete the player falls under attack by the dinosaur that the fossil is from. Apon winning such battles the player is rewarded with exp points, research points as well as bolts and weapon upgrade points. the player over all level is with exp points. such points are earned by attacks as well as construction upgrade and weapon upgrade. chests are discoverable that contain extra bolts as well as research points. ...

    €29 (Avg Bid)
    €29 Gebot i.D.
    7 Angebote