Reported attack site fix linuxJobs

Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Slags
Evner
Sprog
    Job-status
    7,893 reported attack site fix linux jobs fundet, i prisklassen EUR

    ...finding from web server log file and writing an algorithm. Detail - The 3 web server log files will be provided to you. 1) Normal users log data 2) Robots log data 3) Malicious/Attack log data. You need to find out features of mentioned web attacks from web log file which will differentiate it from robot log data and from normal users' log data. Based upon

    €88 (Avg Bid)
    €88 Gns Bud
    1 bud

    The eight queens puzzle is a well-known problem proposed in 1848. It is a problem of placing eight queens in a chessboard such that no two queens can attack each other. That means no two queens can share the same row, column or diagonal. In the classic problem of eight queens puzzle, we are looking for all possible solutions. However, in this project

    €639 (Avg Bid)
    €639 Gns Bud
    3 bud
    Cryptography. woo and lam Pi 6 dage left
    VERIFICERET

    I need you to write a report for something. I have a question and answer, I need you to check the answer as well as rewrite it so ...question and answer, I need you to check the answer as well as rewrite it so that it is more professional and makes sense. Woo and lam Pi is a attack which can be carried out and naming flaw is a flaw within the attack.

    €11 / hr (Avg Bid)
    €11 / hr Gns Bud
    5 bud

    ...[log ind for at se URL]'[log ind for at se URL] Again with animations: - Move - Idle - Attack (beak or front paws/talons) - Combat Art (beak of talons, the other one ;) - As you kindly offered, i would be happy about a dying animation As discussed, bonus for the last

    €110 (Avg Bid)
    €110 Gns Bud
    1 bud
    ss7 attack Guide 6 dage left
    VERIFICERET

    Im need perfect learn about Ss7 attack to call and sms

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud
    C++ Program 6 dage left

    ...each round beside the human loses 1/2 a heart The GP: The GP has 2 actions and 2 health Search for a AC to steal all the art They move as rapidly as possible to the human AC Attack the AC Once within 2 squares of a human they attempt to Steal all the Art for themselves 2 squares away: 65% chance of stealing a piece of art. If they successfully steal art

    €33 (Avg Bid)
    €33 Gns Bud
    9 bud

    Hi there, I am looking to hire a writer to write articles for my ... I am looking to hire a writer to write articles for my blog and write an e-book. My website and blog is [log ind for at se URL] What would be your recommended plan of attack and budget moving forward? I have suggested a fixed price budget for an initial article. Can you write

    €65 (Avg Bid)
    €65 Gns Bud
    1 bud

    ...brochure here [log ind for at se URL] - Old website can be viewed here: [log ind for at se URL] (content only, old design and plugins was lost/reset in a recent malware attack) - Deliver a professionally presented responsive WordPress site that must have consistent look for desktop and mobile devices. - Must use Evolve Plus WordPress

    €330 (Avg Bid)
    €330 Gns Bud
    46 bud
    Trophy icon Create logo + style 4 dage left

    ...yellow The colors of the *Snake: Turquoise, dark blue and yellow eyes. * We prefer that the snake will have a more friendly face, instead of a mouth with is open and in the attack position. The Cobra is a sign of awareness and meditation, so please take that into consideration please. Example pictures Fenix and Cobra snake. [log ind for at se URL]

    €100 (Avg Bid)
    Garanteret
    €100
    32 indlæg

    I need some help with finding an accountant to solve some accounting issues and interpretation of data from excel files. I need some high level expert in this field pleas...accounting issues and interpretation of data from excel files. I need some high level expert in this field please . Include "Unicorn" in your bid otherwise you will get reported.

    €114 (Avg Bid)
    €114 Gns Bud
    11 bud

    ...integration with bank account. Applying pre-testing for all website modules to ensure high level of security to eliminate any kind of cyber-attack such as sql-injection, XSS, CSRF, password dictionary attack or brute-force attack. Finally; for those interested please write a proposal and quote me a rough price in order to have more discussion about the readiness

    €203 (Avg Bid)
    €203 Gns Bud
    84 bud

    ...they have a drop down list with the type of malware that they wish to launch (Trojan Horse, AdWare, DDoS, etc.) 3. They can then select the type of attack and then launch it 4. Upon selecting the attack, the backend will be responsible for launching the respective types of attacks with that category. Ex: If chosen "Trojan Horse", the backend coordinates

    €173 (Avg Bid)
    €173 Gns Bud
    4 bud

    ...Godinterest was originally launched on December 2, 2012, then discontinued and later recreated after the website was purchased in April 2014 by Dean Jones. The site was hit with a series of DDoS attack soon afterwards. Godinterest founder Dean Jones refers to himself as a media publisher, dad, Christian, designer, and project manager. On December 20, 2017

    €108 (Avg Bid)
    €108 Gns Bud
    27 bud

    ...servers and it must be fixed correctly. I haven’t logged on to my server for long time so not sure what’s happening. It’s a voice chat site with active users so you must be very careful. Also there is another issue, site is on SSL certificate , it should forward to https on its own, it hasn’t been working all the times, when a first time user type the

    €43 (Avg Bid)
    €43 Gns Bud
    5 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    I need a windows application in C# that involves preventing ARP spoofing attack according to an algorithm that i will send to you (a flow chart) The idea depends on building a trusted ARP table at the server PC and then distributing that trusted ARP table among other clients. The clients PCs will start to enter static ARP entries to their ARP Cache

    €238 (Avg Bid)
    €238 Gns Bud
    6 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €500 (Avg Bid)
    €500 Gns Bud
    1 bud

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €489 (Avg Bid)
    €489 Gns Bud
    1 bud

    ...Wordpress based and seem to have quite a few frequent attacks. What I would like to resolve is having you trying to attack in to my website and for example, injecting some code into my Wordpress blog. For a test, I will provide a test site for you. If you manage, I would like to work with you on a lot more projects to help us enhance. Please let me know

    €191 (Avg Bid)
    €191 Gns Bud
    26 bud

    Hi, I've a big project that needs checking a function(10k-12k) lines of code and identify the vulnerabilities in the software. And also come up with solution to mitigate such risks. I will give detail to shortlisted candidates. Will hire 1 or 2 testers. Thanks!

    €20 / hr (Avg Bid)
    €20 / hr Gns Bud
    14 bud

    ...case by case basis. Bids significantly above budget will be discarded immediately. Any communication involving additional costs above the initial bid will be ignored and reported for wasting our time. UPDATE Re-uploaded specifications Deadlines are important for us so we expect delivery at the date promised so we can test everything on our side.

    €188 (Avg Bid)
    €188 Gns Bud
    33 bud

    Animation loops for the Airdrop Hunter 3D character for move and attack actions in 8 directions : top, top right, right, bottom right, bottom, bottom left, left and top left, with specific camera angle and shadow.

    €80 (Avg Bid)
    €80 Gns Bud
    1 bud

    ...using this technique: [log ind for at se URL] • The animations I would like you to do are an Idle, Walk, Attack stance and Attack. Please see this video for how a Funnel Web goes into an Attack Stance and Attacks: [log ind for at se URL] • I will upload the fbx file to you when I award you the job. Thanks....

    €137 (Avg Bid)
    €137 Gns Bud
    22 bud

    ...For now, we are not interested in hiring the freelancers from China, India, Pakistan, Saudi Arabia, Palestine, Bangladesh and African countries. Sorry for this. You will be reported if you're from these locations. 4. New freelancers are welcome! 5. Freelancers from Singapore, Japan, Australia, England, Germany, Brazil and Ireland are preferred. 6. Are

    €99 (Avg Bid)
    €99 Gns Bud
    29 bud

    ...For now, we are not interested in hiring the freelancers from China, India, Pakistan, Saudi Arabia, Palestine, Bangladesh and African countries. Sorry for this. You will be reported if you're from these locations. 4. New freelancers are welcome! 5. Freelancers from Singapore, Japan, Australia, England, Germany, Brazil, and Ireland are preferred. 6. Are

    €109 (Avg Bid)
    €109 Gns Bud
    2 bud