Research & writing about Environmental Impact Assessment (EIA) and Environmental Management System (EMS)
I am looking for a penetration tester for periodic assessments against company networks. The person should be very familiar with Metasploit CLI interface (MSFConsole). If you are familiar with additional tools that is great. The tests will be performed using MSFConsole over a WebEx for observation and assistance. You must be able to create reports of
... 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Scope You are to plan and execute a penetration test of the computer system hosted in the VM, following a formal, recognised methodology. Which methodology you choose is up to
We are a software company that have a web app that we need to have some PEN tests carried out on. This is a web only system and we need software testing not server security. We want to arrange an independent test to see if the web software system security is good, bad, or ugly and find weaknesses and vulnerabilities. We can give login name and passwords
...levels of speed and data integrity. 6. Security: Experience implementing security considerations to protect sensitive user data. Experience with server hardening and penetration testing. If you don't meet at least 4 of the requirements listed above, don't apply. Please don't send a cover letter. Just make sure your profile is updated with relevant
...people, process and technology enabling them to proactively defend against advanced cyber attacks. Our Services Strategic Consulting SOC Services Vulnerability & Risk Management Penetration Testing, Red Team & Advanced Adversary Simulations Digital Forensics Investigations Industrial Control Systems Security Incident Response & Remediation
...recipients who share the folder. *Script must remain secure. Basically a script or tool inside Google apps (GSuite) that does not expose it to any outside third party vulnerability, of course, but does the following: Allows us to enable/disable Google Drive folder/file change notifications. So if a file is created, added or changed in a particular
...given operating system for vulnerabilities. 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Preparation You are given a VMWare virtual machine containing a potentially vulnerable operating system. The coursework is to apply the
I required someone to write me assessment around 5000 words the question as below : deadline within one week " Select a category of spend from your organisation. Develop and discuss a strategy using the knowledge gained from this programme which could form the basis of a formal commercial negotiation. Your assignment should include an explanation of
...txt or upload a Word/PDF/etc and send it to the third party system via API. PHP or other code must be built using bank-grade methodologies and pass Acunetix or similar vulnerability scan. This includes designing the main website, the user interface as well as the backend code. Basically, everything to make this a fully operational business. Programmer
...implementation of security concepts in the MS environment o Experience in the connection to HP SM and SIEM o Experience in the area of security of standard technologies and vulnerability elimination on web servers o Knowledge in MS Hyper-V/VM-Ware architecture/application, as well as Domain Controller, Exchange and Citrix o Conception and operation of
Need to build an Ios Ipad Application from a working web Application. An application is designed for taking the online assessment test. -- Screen Designs -- Modification of API Integration with Mobile App -- Offline Cache Management for questions -- Screen response capture on the last question in Offline mode Last Question Submission) -- Auto Timer
We have a client-server software with web app + mobile app as front end and looking for good hacker to break into it and find all the loopholes. A detailed report is required for each iteration. Thanks!
Hi, I am looking for a program that can check Socks4/Socks5 validity from a [log ind for at se URL] and then expose port 5566 as a proxy to be used by other penetration testing tools. and change proxy each 1min. So now i can run [log ind for at se URL] with different socks4/5 each 1min a new one.
...(LTE-A) release 10 standard [7, 8, 9]. Indeed, using Mobile Relays (MRs) within the highspeed railway enhances the cellular coverage and overcome the moderate to high vehicle penetration loss (VPL)[10, 11] and also help to group handover procedures of (UE) devices, mobile relay also suffer from frequent handover. For example assume the train travailing with
...one-off infrastructure to test website that is currently in beta - and allow on-going testing as various changes occur. End to end testing of responsive website is required for desktop, tablet and mobile on various popular browsers: Should be familiar with automated testing and tools ( eg from amongst the usual suspects such as GhostInspector, Selenium
Web Security and Penetration Test I am looking for a great team to complete my project. you have even penetrated server of a big website, then received Bounty!!! for example facebook、google、Microsoft and so on. This is very important . If you don't have the abilities, don't bid. Thanks. Because it is a very very difficult project. Challenge it , you
Scope You are to plan and execute a penetration test of the computer system hosted in the VM, following a formal, recognised methodology. Which methodology you choose is up to you, but you must give a brief rationale as to why you have selected it. The scope of the test is limited to the IP address of the VM, and to any discovered open ports.
Implementar crud para 5 entidades. Implementar interacciones entre dichas entidades. Implementation crud for 5 entityes. And implementation from entityes interop.
...impact. • Analyze DoD and DISA directives and orders, and provide vulnerability reports • Review and validate the installation and configuration of cyber tools on UNISYS assets and report deficiencies. • Participate in A&A process activities, including system categorization, risk assessment, compliance status queries and related documentation requests.
...factors and issues that affect cloud computing. 2- Technical factors: which can be taken from cisco book and the questionnaire that I will attach. Cloud computing readiness assessment framework 1. Review research papers with the following considerations: 1-author/s (if they more two just mention the 1st author last name following by et al. 2- the area
we are working on a building demolition project and we want a demolition method with different building sizes there main hall building it have underground basement + ground floor +first and attached to the building a theater hall which is higher from the main hall building we want to write the safe method and sequence to bring the theater building down
Follow the material. Answer the "question document". It is 6 tasks to be answered, around 19 questions about business and marketing. Answer plan, book and smart weights are just support material. Other observations: Questions, plan of answers to be based, the book that practically we do not even use it, would be more for support because usually, I search everything on the internet an...
Technologies to used: ASP.NET 4.0, C#, JS, JQuery and Database is MSSQL 2010 Online Exam should be a perfect responsive web based platform to conduct online exams, tests and Quizzes. Key features are listed below Schedule Exams Organize Secure Delivery Type of Questions Secure Delivery Equations
we need a website content will cover the below: IT Support: Business, Home Websi...website content will cover the below: IT Support: Business, Home Website design Cloud solution: Office 365, Microsoft Azure and Amazone aws Security: Penetration test, Forensic, Vulnerability assessment ERP solution: Accounting, invoicing, Purchase, Inventory, HR, POS
Hi We are looking for a long term contract (renewed annually based on quality of service) for 4 times an year VAPT penetration testing i..e. report every 3 months for our web application. Below are the quick details: - 12-15 dynamic pages - Web based custom developed application (Ngnix, Phython, MySql, Linux) • Single installation on a server if hosted
Hi Mudassar, good day!. I need your help for a project, it consists of a new Vulnerability Assessment of my website [log ind for at se URL], which I changed its hosting provider. In addition to this I need a security analysis for 3 landing pages that are in the same hosting, one of them is built in Wordpress, but the other two are built in html (AMP) The landing
I want one windows application which is ...and find vulnerabilities and generate report after penetration testing. I want it for black box security audit which will be able to categorized vulnerabilities from OWASP top 10, also it will able to update its vulnerability database from OWASP, For reference, you can check Acuntix web vulnerability scanner.
...these versions should be compared to the CVE database to see if there are any Critical or vulnerabilities with the version Output of this should be, if there is a Critical vulnerability, to the PCI-notification slack channel (channel needs to be created) Each month a new Jira ticket is automatically created with this task. I would like this task to be able
Hi guys, My team is looking to do a survey in a rating scale format, and is also looking for assessment results to be immediately churned out for the respondents’ viewing upon completing the survey’s questions. We were wondering if anyone is keen to take on this project? We have the survey questions ready and are looking to get this ready by 19 October
I am launching a new company which is specializing in professional IT services. I need a competent SEO specialist with proven track of records for site's audit and initial optimization. May require some content writing.
We are a small an IT ...looking for a technical writer to provide content for the corporate documentation, mainly: - Description and Methodology of the services ( Penetration tests, vulnerability assessments, Wireless and Mobile app Assessment, etc) - Proposal documents and SOW. - Content for the corporate brochure . Knowledge of IT security services
...nosql, app engine), Google Earth Engine, Google Map, - Paypal for payments of storage hosting, capacity upgrades, renewals subscription - OWASP top 10 web application vulnerability scanning e.g. github - JSON for multi language website (initially just English and Spanish) - Developer is overall responsible for configuring Google Cloud Platform to
We need a QTI experienced developer to help us develop our question & test import/export functions to include QTI format. We currently import from SCORM and flat text (.txt) files and need this additional option added.
Required points - 1. Alternate Data connection with Credit Underwriting 2. Financial Results of NBFC's and their improvement in Credit Penetration due to Alternate Data and Impact on Micro & Small Enterprises in India. Must be minimum 15-20 pages. need it in a week
Hi Risky Pathak, I am Andrew. We worked together years ago with a C+ project tha...need a to combine a number of scripts i have to work together. This project is for me and my friends to have a private website that will have a number of IP tools, vulnerability Testing tools and more. Are you interested? IF SO_ lets talk a price. Thanks in advance.
...malware and give all possible support in terms of web security such as penetration testing, vulnerability assessment, vulnerability scanning, server hardening, installing firewall etc. It is a wordpress/woocommerce site so likely to be vulnerable. This is for a site in testing stage. You will secure the whole website and prepare for the pentest. If