...security company and a brochure that will outline our services. The name of the company is elliptic Cyber ("Votre assurance en ligne") Website: [log ind for at se URL] Who we are! Elliptic Security is an experienced and talented team of cyber security professionals whose primary mission is to provide our clients with knowledge and expertise to defend
...new doc added or edited. It worked great up until about a month ago. Now it logs the changes in the database but no longer sends the emails. We need someone to take a look and get the email portion to start working again. Any help is greatly appreciated. Thank you! Here is the original project description: --- We would like a tool, within our G-Suite
...system. 3. Produce a report summarizing your penetration testing processes and findings. Preparation You are given a VMWare virtual machine containing a potentially vulnerable operating system. The coursework is to apply the techniques discussed in lectures and labs over previous weeks to find and exploit as many vulnerabilities as you can. You
...me assessment around 5000 words the question as below : deadline within one week " Select a category of spend from your organisation. Develop and discuss a strategy using the knowledge gained from this programme which could form the basis of a formal commercial negotiation. Your assignment should include an explanation of the key facts, data and approaches
...from MyCase, Rocket Matter, Practice Panther and Clio and pushes them to a third party system via API. This is a user based system so the platform needs to allow the user to sign up for an account, connect to MyCase, Rocket Matter, Practice Panther or Clio and the system must pulls their active documents and show them. The user can then select which
...AD, SCCM, Fluent German Speaking/Reading/Writing skills Job Description: • Windows Server/Infrastructure & .net Expertise in the Security Context • Microsoft Clients, Server and Architecture Workspace • Independent implementation of work packages agreed in the respective call-off according to the objectives defined. • Analysis of the current situation
Need to build an Ios Ipad Application from a working web Application. An application is designed for taking the online assessment test. -- Screen Designs -- Modification of API Integration with Mobile App -- Offline Cache Management for questions -- Screen response capture on the last question in Offline mode Last Question Submission) -- Auto Timer
I am looking for a penetration tester for periodic assessments against company networks. The person should be very familiar with Metasploit CLI interface (MSFConsole). If you are familiar with additional tools that is great. The tests will be performed using MSFConsole over a WebEx for observation and assistance. You must be able to create reports of
We have a client-server software with web app + mobile app as front end and looking for good hacker to break into it and find all the loopholes. A detailed report is required for each iteration. Thanks!
Hi, I am looking for a program that can check Socks4/Socks5 validity from a [log ind for at se URL] and then expose port 5566 as a proxy to be used by other penetration testing tools. and change proxy each 1min. So now i can run [log ind for at se URL] with different socks4/5 each 1min a new one.
...handover frequently at the same times. This will leads to incur network loads and degraded the network performance quality. In general when the UE communicate directly with the Evolved NodeB (eNodeB) it will suffer from a severe degradation of the quality of service due to path loss and shadowing effect as the wireless signal travailing across the train carriage
...setup one-off infrastructure to test website that is currently in beta - and allow on-going testing as various changes occur. End to end testing of responsive website is required for desktop, tablet and mobile on various popular browsers: Should be familiar with automated testing and tools ( eg from amongst the usual suspects such as GhostInspector, S...
Web Security and Penetration Test I am looking for a great team to complete my project. you have even penetrated server of a big website, then received Bounty!!! for example facebook、google、Microsoft and so on. This is very important . If you don't have the abilities, don't bid. Thanks. Because it is a very very difficult project. Challenge it , you
Scope You are to plan and execute a penetration test of the computer system hosted in the VM, following a formal, recognised methodology. Which methodology you choose is up to you, but you must give a brief rationale as to why you have selected it. The scope of the test is limited to the IP address of the VM, and to any discovered open ports.
Implementar crud para 5 entidades. Implementar interacciones entre dichas entidades. Implementation crud for 5 entityes. And implementation from entityes interop.
...Understanding and Approach to Provide UNISYS Mainframe Compliance - Serve as a Mainframe UNISYS technical specialist to support cybersecurity and IT services. • Assess, audit, review, analyze, validate, and report Mainframe SRG and STIG vulnerabilities, and ensure security controls are implemented within Mainframes IAW DoD, DISA and cybersecu...
...factors and issues that affect the adoption of cloud and also based on the highlighted parts of cisco book i will attached .then we take some organisations as study cases and test thier readiness for cloud based on the framework .After building the framework and get data from organizations we can say this organization is ready for cloud by60% and that
...are working on a building demolition project and we want a demolition method with different building sizes there main hall building it have underground basement + ground floor +first and attached to the building a theater hall which is higher from the main hall building we want to write the safe method and sequence to bring the theater building down
...answered, around 19 questions about business and marketing. Answer plan, book and smart weights are just support material. Other observations: Questions, plan of answers to be based, the book that practically we do not even use it, would be more for support because usually, I search everything on the internet and the material of support of the fictional
Technologies to used: ASP.NET 4.0, C#, JS, JQuery and Database is MSSQL 2010 Online Exam should be a perfect responsive web based platform to conduct online exams, tests and Quizzes. Key features are listed below Schedule Exams Organize Secure Delivery Type of Questions Secure Delivery Equations
we need a website content will cover the below: IT Support: Business, Home Website design Cloud solution: Office 365, Microsoft Azure and Amazone aws Security: Penetration test, Forensic, Vulnerability assessment ERP solution: Accounting, invoicing, Purchase, Inventory, HR, POS
...service) for 4 times an year VAPT penetration testing i..e. report every 3 months for our web application. Below are the quick details: - 12-15 dynamic pages - Web based custom developed application (Ngnix, Phython, MySql, Linux) • Single installation on a server if hosted on Cloud (It is 3 tier architecture Web, app and DB). All the 3 layers can be split
Hi Mudassar, good day!. I need your help for a project, it consists of a new Vulnerability Assessment of my website [log ind for at se URL], which I changed its hosting provider. In addition to this I need a security analysis for 3 landing pages that are in the same hosting, one of them is built in Wordpress, but the other two are built in html (AMP) The landing
I want one win...which is able to scan URL and find vulnerabilities and generate report after penetration testing. I want it for black box security audit which will be able to categorized vulnerabilities from OWASP top 10, also it will able to update its vulnerability database from OWASP, For reference, you can check Acuntix web vulnerability scanner.
Involves reviewing the version of database that are running and identifying if there are any Critical CVEs with the version. Running RDS Postgres, RDS MySQL, RDS Aurora, Cassandra, Redshift, DynamoDB. This task should scan all AWS accounts to get the list of RDS, Redshift and Dynamo databases and the current versions they are running For Cassandra, this
...team is looking to do a survey in a rating scale format, and is also looking for assessment results to be immediately churned out for the respondents’ viewing upon completing the survey’s questions. We were wondering if anyone is keen to take on this project? We have the survey questions ready and are looking to get this ready by 19 October. To illustrate
I am launching a new company which is specializing in professional IT services. I need a competent SEO specialist with proven track of records for site's audit and initial optimization. May require some content writing.
...are a small an IT security provider startup and we are looking for a technical writer to provide content for the corporate documentation, mainly: - Description and Methodology of the services ( Penetration tests, vulnerability assessments, Wireless and Mobile app Assessment, etc) - Proposal documents and SOW. - Content for the corporate brochure ...
...user(s) share and view satellite image files using Google Maps/Google Earth Engine. High level features: 1. Home Page (new user signup, login, language selector) 2. Login screen / Forget Password 3. New account user sign up screen (for the designated admin or first person in the user organization, this person pay subscription for the account and will be
We need a QTI experienced developer to help us develop our question & test import/export functions to include QTI format. We currently import from SCORM and flat text (.txt) files and need this additional option added.
Required points - 1. Alternate Data connection with Credit Underwriting 2. Financial Results of NBFC's and their improvement in Credit Penetration due to Alternate Data and Impact on Micro & Small Enterprises in India. Must be minimum 15-20 pages. need it in a week
...my friends and i. I would like to know if you will help with the programming. Let me give you an over view on the project. First this is an internet base website platform. I want a very simple CMS. My friend can log into their profiles and i can manger the profiles and users as an ADMIN. Each profile will have 1 page with alot of AJAX and iFrame features
...to remove malware and give all possible support in terms of web security such as penetration testing, vulnerability assessment, vulnerability scanning, server hardening, installing firewall etc. It is a wordpress/woocommerce site so likely to be vulnerable. This is for a site in testing stage. You will secure the whole website and prepar...
I want to build a web-based online MCQ assessment tool. The UCAT is a new University Clinical Aptitude Test being implemented in Australia and New Zealand [log ind for at se URL] The interface would need to look similar to the current UKCAT online assessment which can be seen on [log ind for at se URL] The interface is simple but the analytics
I am a coach, and I need to offer a free tool to people. 1. It is an assessment tool with 10 questions max that'll have conditional logic embedded 2. Each individual that takes the assessment needs to get an individualised result with the tool score they had 3. It'll have an email opt in functionality with terms and conditions selection checkbox inserted
I already have a on page php code which is vulnerable and only uploads 1 image. I need 1) for it to upload up to three images 2) max files size limit and err message 3) file type limit and err message 4) reCAPTCHA integration and verification of any other basic vulnerability
ONLY SERIOUS AND PEOPLE WHO READ THE APP DESCRIPTION PLEASE I need a self-assessment model for DevOps which I can host locally on my machine. You may use any tech stack, be it asp.net, MS SQL, Angular or whatever you prefer. The idea of this assessment would be based on this picture: [log ind for at se URL]