Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Slags
Evner
Sprog
    Job-status
    6,532 php attack code jobs fundet, i prisklassen EUR

    ...English. The security product is established and you will use existing web application logs to discern characteristic patterns of attack. These attack vectors are already known. Your task will be to confirm these attack vectors, establish the simplest way to detect them, then implement an algorithm to work in near-real time. It is likely that you will

    €44 / hr (Avg Bid)
    €44 / hr Gns Bud
    20 bud

    ...across a customer which is an organization having a problem of bees which are attacking one of the wooden shade close to the main gate,they always come and go and sometimes they attack [login to view URL] Nature that surrounds this place is a bushland and thickets so they need a scientific report based on observation and how can they be permanently removed without

    €54 (Avg Bid)
    €54 Gns Bud
    23 bud

    need someone who is good in cryptography and cryptanalysis as w...who is good in cryptography and cryptanalysis as well as in matlab and maple. have to implement "differential-linear attack" on dummy structure of 4 or 8 bit cipher in matlab or maple. at the end i need a brief report and source code with comments. you have to do everything by yourself.

    €413 (Avg Bid)
    €413 Gns Bud
    11 bud

    ...territories, which are grouped into six continents. The object of the game is to eliminate the other players by occupying every territory on the board. Players use armies to attack and defend territories from other players. A random number generator determines the outcomes of battles. This program has three main screens that will have to be displayed

    €204 (Avg Bid)
    €204 Gns Bud
    7 bud

    Hi Ritu G., I noticed your profile and would l...add to its function. we would like to add if its a weapon and the roll is a sucess then check if the feat dice is higher than the weapon edge score you may have a piercing attack. also we would like if a weapon and its a success roll then give us damage we can explain both of these in more detail.

    €9 (Avg Bid)
    €9 Gns Bud
    1 bud
    Project for Jin.D 12 hours left

    The application will be about Dormitories in Turkey. Users will be able to register in this application using their mobile number, a confirmation code will be sent to them. After Successful registration, users will be able to select their 1- Dormitory Name ( Dormitory Names will be provided in an Excel file), 2- Block number 3- Room number 4- University

    €1052 (Avg Bid)
    €1052 Gns Bud
    5 bud

    Im lo...interesting way different than the existing [login to view URL] must react to being attacked by the player. Secondly, add a special weapon for the player, Special weapon must be able to attack and damage or destroy enemies in a unique way different from the standard weapon, special weapon must use limited or recharging ammo, preventing continuous use.

    €681 (Avg Bid)
    €681 Gns Bud
    19 bud
    Trophy icon Sketch of a sneak attack 6 days left

    I need an Illustration or sketch of a man being sneak attacked. It will be used in my game Heir to Dragonsfall The game is a Dungeons and Dragons style deckbuilding game. I would prefer someone being sneak attacked by a Rouge type character. We are using uncolored sketches for art in the game. I will try to post a picture similar to the style we are using below (the attached file is not mine, i...

    €26 (Avg Bid)
    Fremhævet Garanteret
    €26
    13 indlæg

    Hello i need someone to do Ns2 simulation and write a well-detailed documentation. Contact me for more details

    €39 (Avg Bid)
    €39 Gns Bud
    4 bud

    Hello, we are looking for animator who will help us to animate characters and integrate it. We develop in PHP/javascript. We expect you to suggest in which technology you want to create animations and work with our developer to implement it. Description of animations: - players build characters from 1) head & extras, 2) armor, 3) weapon, and we add

    €437 (Avg Bid)
    €437 Gns Bud
    19 bud

    Windows server was compromised due to due to SynAck ransomware attack We need to Decrypt a MS SQL Server 2008 database .mdf & .ldf file (2files)

    €21 (Avg Bid)
    €21 Gns Bud
    8 bud

    ...escape? 5. Why do some Lizards Squirt Blood from their Eyes? 6. Can they Inflate their Bodies to look larger? 7. Do they Whip their Tails as a defence mechanism? 8. Blue-Tongue Attack (like the Blue-tongued Skink)] Tone: > Entertaining & Informative BUT Actionable Use first and second person: "I," "we," and "you" - Use the word “you” fre...

    €31 (Avg Bid)
    €31 Gns Bud
    21 bud

    having had a recent attack on website, Google shows as site may be hacked, need someone to verify to google, and poss some seo work, to help get ranking back on form

    €73 (Avg Bid)
    €73 Gns Bud
    16 bud

    Hi Farid, next creature i need is a ...[login to view URL] [login to view URL] Again with four animations: - Move - Idle - Attack - Spell/Combat Art (be creative ;) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian

    €109 (Avg Bid)
    €109 Gns Bud
    1 bud

    Board game will be launched later this year. The style is sci fi, future soldier, tech, digital art. Aiming for $200 budget. 1. Attack Card: A future soldier aiming and shooting. Crop from the thighs up with the rest of the body showing. No background needed. 2. Move Card: A future soldier running. Crop from the thighs up with the rest of the body

    €129 (Avg Bid)
    €129 Gns Bud
    31 bud

    I have a wordpress site that has been subject to a hacker attack. I have cleaned up most of the files but now when I log in to the site I am directed to spam sites

    €28 (Avg Bid)
    €28 Gns Bud
    34 bud

    I need documentation talk about introduction social Engineering and phishing attack It should contain investigate level threats and awareness Our scenario is We create fake web page and email then we send emails to 2000 person in Company between staff and client. 1500 from them visit the web site and login with same account details for company And

    €53 (Avg Bid)
    €53 Gns Bud
    5 bud

    I need word documentation talk about awareness cyber security Introduction to Social Media and Phishing attack The document should contains a Graphics (Figures) and the methodology to investigate level to threats and a awareness The documentation has a scenario i will provide it to you

    €39 (Avg Bid)
    €39 Gns Bud
    19 bud

    i have some work related to NS2 and details will be shared in chat

    €62 (Avg Bid)
    €62 Gns Bud
    2 bud

    Urgent: Need to build a script or chrome extension to follow the website link that is protected by cloudflare I'm Under Attack mode and get the final re-directed URL. Final URL has to be captured and writen to the text file on server or if it is on chrome extension then that final url has to be split into different slices based on condition and it has

    €3 / hr (Avg Bid)
    €3 / hr Gns Bud
    9 bud

    So, my website just had malware attack until my hosting account deactivated. So i've cleaned it and the account back to active again. But, i still suspect there's malware there, because there are some unwanted redirection to other websites. So i need you to clean it accordingly 100%, i do have backup but it might be infected as well. then, after i

    €86 (Avg Bid)
    €86 Gns Bud
    39 bud

    ...playing). Here are the list of the cards: - Miner: A guy with a pickaxe - Viruses: 3 small viruses that fly and fire strange balls - Mining Rig: A rack with graphic cards that attack with electricity - Thunder: An area of electrical damage - Electric Shock: An electric impulsion that hit a single ennemy - Hacker: A guy with black glasses and a gun - Bugs:

    €99 (Avg Bid)
    Garanteret
    €99
    7 indlæg

    ...ability to produce good and solid code. At some point during the development phase of the project, you may be asked to share your code with an Independent Security Expert. This Expert has been hired to ensure there are no obvious holes within the code. The site being built may be susceptible to attack so all code needs to be proficient and built using

    €15 / hr (Avg Bid)
    €15 / hr Gns Bud
    56 bud

    Cryptography about 30 pages Abstract Encryption is the encryption process in cryptography. Make sure th...who is meant to use the keys that are rewritten in a legible form. In this paper I have handled a bit of history of cryptography, modern cryptography , cryptosystem, crypto attack system, [login to view URL], authentication, digital signature ....

    €163 (Avg Bid)
    €163 Gns Bud
    33 bud

    My name is Ibrahim, am doing masters in Network Security, i need to write a documentation about detection of Denial of Service attack in VANETs. The documentation should be about 8-10 thousand words

    €255 (Avg Bid)
    €255 Gns Bud
    9 bud

    I want a team that I can consistently rely on to manage multiple business's Faceb...questions: What e-commerce business’s have you worked for in the past? How have you scaled these businesses? What health-related businesses have you worked with? How would you attack this company Facebook ad strategy, what would you do?…. [login to view URL]?

    €8130 (Avg Bid)
    €8130 Gns Bud
    31 bud

    hi i want to add protect in my website protect it by captcha because there is many bots attack my database and take much cpu from my dedicated server because auto register and auto bad requests i want to stop this all bots please

    €278 (Avg Bid)
    €278 Gns Bud
    46 bud

    On our prestashop back end we ap...back end we appear to have the JSCoinminer virus and we are trying to get rid of this, each time we load a page in our back end we get norton telling us that it blocks a web attack from the JScoinminer Website. So we are after someone to quickly and securely remove that. Thank you Work will be paid in milestones.

    €87 (Avg Bid)
    €87 Gns Bud
    21 bud

    ...case study: 1. Describe the attack that occurred according to the ontological components specified in Mouton et al (2016). 2. Propose and justify potential mitigations for this type of attack, with consideration of people, process and technology factors. 3. Discuss key elements of a response plan for this type of attack, with consideration of people

    €27 (Avg Bid)
    €27 Gns Bud
    37 bud

    ...10-15 results above the current position ~3. If there are other approaches that I have not seen I am open to hearing them. The people who made the second video also created an attack website. The website appears around result 9-12 on the Google SERP. This result needs to be pushed below page 2 also. It is possible that the website could be de-indexed rather

    €1956 (Avg Bid)
    €1956 Gns Bud
    23 bud

    ...to the case study: Describe the attack that occurred according to the ontological components specified in Mouton et al (2016). Propose and justify potential mitigations for this type of attack, with consideration of people, process and technology factors. Discuss key elements of a response plan for this type of attack, with consideration of people, process

    €19 (Avg Bid)
    €19 Gns Bud
    9 bud

    ...slot cards only have 3 action cards. -It's important the given Equipment card has associated Actions Cards. Such as block oriented cards accompany armor type equipment and attack-oriented cards with weapon cards. -Ability cards are specific to the associated role. Either Tank, DPS, Healer. I need you to help me research and name the following: 1

    €17 / hr (Avg Bid)
    €17 / hr Gns Bud
    16 bud

    i need to analyze the big data of soccer inplay stat which i already have about 1 year records (eg. dangerous attack, shoot on target, asian handicap, match goal over, ...). To find the best strategy for winning betting.

    €190 (Avg Bid)
    €190 Gns Bud
    15 bud

    This project is for a logo design for the gaming product called "Barrage". Logo name: The Barrage ( it represents and refers to "being under attack or taking fire, it represents being inundated and immersed in the Entertainment Experience") The sub slogan is going to be "Full Effects Simulation" We want the colors to include red and black. This gaming

    €26 (Avg Bid)
    €26 Gns Bud
    1 bud

    ...keys System notification for new transactions Import and export your private key which under the BIP38 rule QR code generator Most important – highest security features. Immune to the following: Man-in-the-middle (MITM) attack Phishing attack Android malware / iOS malware attacks No compromised network in the security architecture Customer must be able

    €819 (Avg Bid)
    €819 Gns Bud
    16 bud

    I will need to check if a specific website is secure against hacker attack.

    €112 (Avg Bid)
    €112 Gns Bud
    31 bud

    Hello, I'm looking for some articles related to Cloud Backup, for now, based on next topics, that are the three principal...some articles related to Cloud Backup, for now, based on next topics, that are the three principal features of a new app for the Cloud Backup Unlimited Storage Ransomware Attack Detection Complimentary 24/7 Assisted Recovery

    €116 (Avg Bid)
    €116 Gns Bud
    8 bud

    i just want the performance measurement results of preventing and blocking the dos attack, also showing the difference between the normal and malicious traffic. would be more better if its used by PFsense

    €132 (Avg Bid)
    €132 Gns Bud
    8 bud

    Hi Farid, next creature i need is...[login to view URL] [login to view URL] Again with four animations: - Move - Idle - Attack (Bite) - Spell/Combat Art (Tail Lash) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian

    €110 (Avg Bid)
    €110 Gns Bud
    1 bud

    demonstration of NFC based relay attack using android and MIFARE Ultralight, then build a simple application to prevent the attack, the idea is to create a simple host-based IPS for prevention of NFC relay attack for android mobile

    €168 (Avg Bid)
    €168 Gns Bud
    9 bud

    Our website uses query strings to allow third party venders to retrieve information. The problem is other people are using these string to attack and steal information from our site. I need to secure these strings so that only people I allow to use the query string can use it. I do not want un authorized access being used with the query string. I

    €186 (Avg Bid)
    €186 Gns Bud
    51 bud

    ...the interview on the wrong day and time. However, she was able to interview me that day. While waiting for her, I knew that I was not going to get the job and had a panic attack during the interview. I couldn't focus on the questions and it was a mess. About 2 weeks later, I was informed I got the job. During the interview, I really could not tell

    €71 (Avg Bid)
    €71 Gns Bud
    43 bud

    Some more advanced research measurements , for example the performance measurements of the dos attack

    €9 / hr (Avg Bid)
    €9 / hr Gns Bud
    1 bud

    I need to do a simulation of an attack of the men-in-the-middle on a connected car considered like a connected object by programming the code of the attack with c ++ and using the NS3 software and I need someone who integrated the code and the simulation in my laptob via teamviewer

    €585 (Avg Bid)
    €585 Gns Bud
    7 bud

    ...in 2017 was 212% longer than in 2016. 4)google quarantines more that 10000 websites each day 5)60 percent of small companies go out of business within six months of a cyber attack. 6)43 percent of Cyber attacks target small business. 7) According to billionaire investor Warren Buffett, cyber attacks is the BIGGEST threat to mankind — even more of a bigger

    €45 (Avg Bid)
    Fremhævet Garanteret
    €45
    9 indlæg

    I need help to create 2 c# scripts for my game in unity 1. a script that makes my enemies attack after 3 seconds resulting in me losing 1 life 2. s script that shows an outline of the enemy that after 2 seconds changes color to let you know that he is about to shoot

    €33 (Avg Bid)
    €33 Gns Bud
    6 bud

    The application will be about Dormitories in Turkey. Users will be able to register in this application using their mobile number, a confirmation code will be sent to them. After Successful registration, users will be able to select their 1- Dormitory Name ( Dormitory Names will be provided in an Excel file), 2- Block number 3- Room number 4- University

    €802 (Avg Bid)
    €802 Gns Bud
    42 bud

    ...in 2017 was 212% longer than in 2016. 4)google quarantines more that 10000 websites each day 5)60 percent of small companies go out of business within six months of a cyber attack. 6)43 percent of Cyber attacks target small business. 7) According to billionaire investor Warren Buffett, cyber attacks is the BIGGEST threat to mankind — even more of a bigger

    €43 (Avg Bid)
    Garanteret
    €43
    3 indlæg

    ...get the correct address, reversed they are: /moc.dnammocdlog.www//:ptth And /ku.oc.ytefasdnahtlaew//:ptth Analysis of what needs to be done to improve rankings, strategy of attack. For example – we will need SSL for the sites. The goal is to produce a new website, using domain aliases so both domains show the same website. But before we review building

    €118 (Avg Bid)
    €118 Gns Bud
    10 bud

    ...means that its easier to code a C++ cheat on it, but i would prefer a C# one since i can program in C#, and i will maybe add some features depending on the API you wrote. C++ devs, don't be sad, because i don't mind that much about the language. The features this platform will need will be : 1- An orbwalker, or an auto attack mooving script, who will

    €571 (Avg Bid)
    €571 Gns Bud
    11 bud