Checking compromised linux serverJobs

Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Slags
Evner
Sprog
    Job-status
    6,881 checking compromised linux server jobs fundet, i prisklassen EUR

    Looking for individual freelancer (welcome to 0 review) to do Proofreading, grammar/spelling checking & format report with the following specifications: - *) Plagiarism check. *) Figures numbering & add title. *) Deadline 12 hours. *) Report 32 pages. Project overview: - . In this project, we introduced a web site project that provide variety of services

    €113 (Avg Bid)
    €113 Gns Bud
    34 bud

    My website was created in with Laravel framework. It has a logic for sending an email automatically if someone doesn't respond. I need to make sure the logic works. Also, I need someone to run me through how to change the code in Laravel on pages where there is some text. Lastly, I need someone to help me change the description in Google when we search for the website. Additional advice inclu...

    €13 / hr (Avg Bid)
    €13 / hr Gns Bud
    43 bud

    work will be given via sheet..you need to compare original file and edited file and need to do corrections

    €78 (Avg Bid)
    €78 Gns Bud
    29 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    Hi There We are looking for someone who has good experience in editing and writing fresh content for a Behavioural Train...Brochure content that we have built. B. Editing our Corporate Profile Content that we have built. C. Editing & Adding relevant content for our website. Quality shall not be compromised. Only people with good experience apply.

    €74 (Avg Bid)
    €74 Gns Bud
    21 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €499 (Avg Bid)
    €499 Gns Bud
    1 bud

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €488 (Avg Bid)
    €488 Gns Bud
    1 bud

    Client website was compromised by hackers and needs to be restored. They have disabled access to the wp-admin & wp-login pages. I tried to put up a backup but made things worse. [log ind for at se URL]://[log ind for at se URL]

    €149 (Avg Bid)
    €149 Gns Bud
    61 bud

    I have an anroid app which requires to login via username and pincode of 4 chars. I have the apk, more info via chat!

    €467 (Avg Bid)
    Fremhævet Haster
    €467 Gns Bud
    36 bud

    Hi All, We're are looking for professional subtitling/close ...conversation (less than even 50%) because of the nature of the videos and they're HD digital quality videos. Turnaround time for each assignment will be 24 hours. Quality won't be compromised and we're looking only for experienced people who are comfortable working on adult video content.

    €271 (Avg Bid)
    €271 Gns Bud
    39 bud

    I have an approximately 40,000 word document with 437 in-text references that need to be checked one by one against the Australian Guide to Legal Citation Third Edition (AGLC). It’s imperative that this style is used and NOT another style (Harvard or APA or whatever). I have the endnote file with all the required details and the word document is linked to the endnote file. Theoretically my...

    €288 (Avg Bid)
    €288 Gns Bud
    22 bud

    d...blanks or duplicates 3/. check for missing dates and missing data 4/. check for out of sequence, for example the dates rows that are not in order also, ideally instead of checking each one individually, all the files in the folder can be checked and results produced into one report. i have 50+ files to check each with about 300 rows thanks Excel

    €28 (Avg Bid)
    €28 Gns Bud
    19 bud

    d...blanks or duplicates 3/. check for missing dates and missing data 4/. check for out of sequence, for example the dates rows that are not in order also, ideally instead of checking each one individually, all the files in the folder can be checked and results produced into one report. i have 50+ files to check each with about 300 rows thanks Excel

    €28 (Avg Bid)
    €28 Gns Bud
    29 bud

    I have a data analysis task. Quality analysis for American mortgage loan forms, conventional, condominium, multifamily etc

    €18 (Avg Bid)
    €18 Gns Bud
    2 bud

    Michael, It appears that your server has been compromised and is attacking other servers on the Internet; this degrades your service, as well as others, and is a large consumer of resources overall. The following files were found to be suspected of malware, which should be reviewed and removed:

    €50 / hr (Avg Bid)
    €50 / hr Gns Bud
    50 bud

    hi, plz check the app quality of our current app...ios and android in native language, swift in ios. quality check coding standard unneccary code [log ind for at se URL]

    €15 / hr (Avg Bid)
    €15 / hr Gns Bud
    40 bud

    Our business is called New Leaf. It is a non-profit organisation compromised of volunteers who are working towards aiding in the rehabilitation of those who have committed criminal offences. Our aim is to ensure that those who have offended are given a chance to move forward with their lives so that they can re-integrate and become contributing members

    €92 (Avg Bid)
    €92 Gns Bud
    94 bud

    My computer has been compromised and I would like answers on who

    €4 / hr (Avg Bid)
    €4 / hr Gns Bud
    1 bud

    has an existing wordpress website using Sahifa , need wordpress programmer for security checking & clean Malware

    €107 (Avg Bid)
    €107 Gns Bud
    24 bud

    We have developed an ios application and we wish to test it in iP...other iphone models but fails in Client's iPhone6+. So we are looking for one or two people who could install the app in his iPhone, test it as per our instructions (simple checking, not full-fledged test), and share the videos grab. Those who are willing and can do it now, please bid

    €14 (Avg Bid)
    €14 Gns Bud
    5 bud

    i have shop in market placed, if my shop banned by the market, my shop will be never show the product, if my shop not banned, my product will be show all. i need script for check product in the market (he banned or no) better its will be run on php thank

    €23 (Avg Bid)
    €23 Gns Bud
    2 bud

    We have a Google Sheet that we use for customer management and shipping. We have a SQL Server product database. We want to query the database and retrieve product data based on the item number input by the Google Sheet user and put product data into certain columns. We have the SQL query written that retrieves the proper details, but we need to code

    €132 (Avg Bid)
    €132 Gns Bud
    21 bud

    a new photo gallery for my WEEBLY SITE- I LIKE something like this,, https://www...2. when you click on a specific image they are all the same size 3. all the images in the gallery , the thumbnails are all uniform and same size 4. the pictures are not compromised or cropped this is my current website . [log ind for at se URL]

    €376 (Avg Bid)
    €376 Gns Bud
    9 bud

    Connecting to IDEX exchange with api keys, checking highest bid and highest ask for specific coin(should scan each few seconds), checking my order sell and buy rate(should scan each few seconds), placing and canceling order for specific coin all must be written in python , only through freelancer

    €58 (Avg Bid)
    €58 Gns Bud
    6 bud

    I have an open-source MATLAB code that computes a metric for checking if a given image is in focus and I would like the same code implemented in C++ so that it can be deployed on Android smartphones. Key requirements are as follows: 1. Use open-source libraries only. 2. The MATLAB code is not efficient, so we are looking for someone to not just port

    €89 (Avg Bid)
    €89 Gns Bud
    7 bud