Wormhole attack olsr ns2Jobs

Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Slags
Færdigheder
Sprog
    Job-status
    2,000 wormhole attack olsr ns2 jobs fundet, i prisklassen EUR

    I'm looking for an expert in openbsc, osmocombb, and openbts GSM to help me with a project that includes the following key aspects: - **GSM Man-in-the-Middle (MITM):** The project also involves GSM man-in-the-middle functionality. This includes capabilities such as intercepting and analyzing GSM communications, modifying GSM network traffic, and manipulating GSM network authentication. Ideal Skills and Experience: - Proven experience with openbsc, osmocombb, and openbts GSM. - In-depth knowledge of GSM network setups, including voice calls, SMS, and base station capabilities. - Proficiency in network monitoring and analysis tools. - Previous experience with GSM man-in-the-middle implementations. - Excellent problem-solving skills to address any performance requirements that may ari...

    €2153 (Avg Bid)
    €2153 Gns Bud
    26 bud

    Game Requirement Character : Male, full animation: Idle, run, attack, jump, die… Provide full UI and Game Asset Provide full sound and effect Number Map: 8 Number Boss: 8 Enemy for each map: 4-5 ( with full animation: idle, run, attack, die… ) Provide Game icon. Intergrate with Admob in game Intergrate shop IAP in game. Game can run on Mobile and PC also. Game resolution: Hozirontal 1920x1080

    €19 (Avg Bid)
    €19 Gns Bud
    6 bud

    I'm looking for a highly skilled machine learning expert to develop a solution that leverages supervised learning techniques to detect different types of side channel attacks . The solution should ideally be capable of adapting to various datasets. Key Responsibilities: - Development of detection model using supervised learning. - The model should be designed to adapt and learn from different datasets. - collecting data from Hardware level Ideal Skills & Experience: - Expertise in Machine Learning is mandatory, specifically in supervised learning techniques. - A strong understanding of cybersecurity and side channel attacks is required. - Familiarity with various datasets and hands-on experience in working with them. - A strong understanding of Microarchitecture analysis (reg...

    €437 (Avg Bid)
    €437 Gns Bud
    30 bud

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €27 (Avg Bid)
    €27 Gns Bud
    8 bud

    ...the time the systems administrators discovered the nature of the attack, it was largely too late. Critical files all across the AvantPharm network had been encrypted and were unusable. To make things worse, the backup system in place was unmonitored and had been failing backup jobs for months, so they did not have a reliable way to restore the encrypted data. AvantPharm narrowly averted complete disaster by paying the attackers one of the largest ransomware payments in history; 25 million dollars. However, they nearly lost the business when the attacker took 2 full weeks to return control of their data as well, so the impact was further damaging to profitability and reputation. In the end, the company barely weathered the attack and resumed operations at reduced capacity o...

    €18 (Avg Bid)
    €18 Gns Bud
    95 bud

    I require a reliable and experienced developer to assist me in implementing a Content Security Policy (CSP) in my JavaScript application. Key Details: - Purpose: The primary goal of this CSP implementation is to prevent Cross-Site Scripting Attacks within the application. - Target Sources: The CSP should be configured to allow only self-hosted scripts...permitted. - Integrate the CSP seamlessly with the existing application architecture, ensuring no disruptions in functionality. Ideal Skills and Experience: - Proficiency in JavaScript and web application security. - Prior experience with Content Security Policy implementations. - Understanding of and its usage in specifying content sources. - Knowledge of common Cross-Site Scripting (XSS) attack vectors and mitigation strategies.

    €11 (Avg Bid)
    €11 Gns Bud
    13 bud

    ...vulnerabilities, severity levels, and recommended remediation measures. Collaborate with our development team to prioritize and address security issues. Requirements: Proven experience in penetration testing for Magento 2 websites and AWS environments. Proficiency in industry-standard tools and techniques for vulnerability assessment. Strong understanding of web application security principles and common attack vectors. Excellent communication skills. Deliverables: Detailed penetration testing report. Regular progress updates and communication. How to Apply: Please submit your proposal with details of your experience, approach to penetration testing, and proposed timeline and cost estimates. Additionally, include any relevant certifications or references. Thank you for your i...

    €167 (Avg Bid)
    €167 Gns Bud
    21 bud
    System Security Specialist Required 19 timer left
    VERIFICERET

    We recently experienced a malware attack on our system and we're seeking an expert who can ensure this doesn't happen again in the future. We don't require data recovery services; our main priority is to make sure it never happens again. Ideal candidates should possess: - In-depth experience in counteracting malware attacks - Mastery in various security domains such as network, application, and endpoint security - Proven track record in enhancing system security

    €119 (Avg Bid)
    €119 Gns Bud
    20 bud

    EL bot debe poder operar en varios DEX usando flashloans como caracteristica pricipal, las oportunidades de las transacciones las debe buscar en los mempool de los contratos inteligentes de cada DEX. Tambien debe poder hacer frontrunning de las transsacciones The bot must can operate on many DEX using flashloans like principal function, the oportunities of transaction have to l...caracteristica pricipal, las oportunidades de las transacciones las debe buscar en los mempool de los contratos inteligentes de cada DEX. Tambien debe poder hacer frontrunning de las transsacciones The bot must can operate on many DEX using flashloans like principal function, the oportunities of transaction have to look for in the mempool of the Contratcs of the DEX. must can do frontrunning,and sandwich ...

    €140 (Avg Bid)
    €140 Gns Bud
    22 bud

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €10 (Avg Bid)
    €10 Gns Bud
    7 bud

    I'm seeking the expertise of a data scientist or machine learning engineer to develop a model for classifying various types of attacks on a KDD dataset. The ideal candidate will have extensive knowledge in the use of autoencoders for feature extraction and GRU models. Key project elements include: * Professionals will need to implement an autoencoder for feature extraction with the core goal of reducing data dimensionality. Prior experience in working with high-dimensional data and in deploying autoencoders is necessary. * Subsequently, the system built should be capable of classifying Denial of Service (DoS), User to Root (U2R), and Probe attacks within the KDD dataset. Good working knowledge of GRU models and the mentioned attacks is required. * The project includes steps to ensure...

    €32 (Avg Bid)
    €32 Gns Bud
    8 bud
    PLESK DNS Problems Udløbet left

    Our main domain is also used as the DNS domain for ns1/ns2. Currently, we are experiencing difficulties accessing our website due to alleged DNS issues according to the PLESK system. The configuration should be adjusted so that the domain correctly points to the right directory despite using DNS ns1/ns2, without causing other domains that utilize these ns1/ns2 of the main domain to cease functioning. Please note that we only accept genuine offers. Post-negotiations or negotiations within the chat conversation are not desired.

    €62 (Avg Bid)
    €62 Gns Bud
    12 bud

    ...are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you should connect with ibm quantum computer. 4- all requirement should be delivered in three days. ...

    €275 (Avg Bid)
    €275 Gns Bud
    27 bud

    I'm looking for a skilled professional to conduct a network security test on our workstations using ARP poisoning techniques. The focus of this project is to identify vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someone with signifi...

    €60 (Avg Bid)
    €60 Gns Bud
    15 bud

    I'm looking to modify the SAAS-BOILERPLATE open-source project to create an interactive membership website for indie filmmakers and film students. NOTE: MOST of the required functions are already implemented in the boilerplate. You do NOT need to connect Stri...for webdesigner collaboration (squarespace has an interesting version that is attached below to the project) IDEAL FREELANCER PROFILE: - Have previous experience with backend development using Laravel PHP - security-focused emphasis on security against attacks on webapps - experience minimizing the attack surface of webapps - Understand how to integrate video hosting in SaaS

    €514 (Avg Bid)
    Fremhævet
    €514 Gns Bud
    65 bud

    I am seeking a skilled freelancer to help me create a data collection tool for an intrusion detection system. This system's main purpose is to collect data for analysis, focusing on network traffic. Key tasks include: - Designing a new normal and attack dataset using Mininet WiFi - The focus is on detecting Denial of Service (DoS) and Man-in-the-Middle (MitM) attacks Ideal candidates should have experience: - Building intrusion detection systems - Working with Mininet WiFi - Handling network traffic data - Familiarity with DoS and MitM attacks This tool will greatly aid in identifying and preventing future network attacks by providing structured data for our analysis team.

    €328 (Avg Bid)
    €328 Gns Bud
    3 bud
    Cryptogrphy expert Udløbet left

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    €195 (Avg Bid)
    €195 Gns Bud
    12 bud

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €16 (Avg Bid)
    €16 Gns Bud
    5 bud

    Wordpress site not opening need to fix now may be attack?

    €5 / hr (Avg Bid)
    €5 / hr Gns Bud
    81 bud

    Vær venlig at Tilmelde dig eller Log ind for at se detaljer.

    Fremhævet Forseglet Topkonkurrence NDA

    I'm on the lookout for a season...expertise in computer security. Key Project Objectives: - Assessment and improvement of network security - Implementation of secure protocols, with a specific focus on http3 - Thorough analysis and counteracting of cyber security threats - Network traffic analysis under attack conditions Ideal Skills and Experience: - Profound knowledge in network security and cyber security - An adept understanding and experience in http3 - Proven experience in security threat mitigation - Prior experience handling network traffic analysis under attack conditions Please note that only candidates with expert-level experience in the above-mentioned fields will be considered. This project demands the highest level of proficiency and professional acumen...

    €26 / hr (Avg Bid)
    €26 / hr Gns Bud
    21 bud

    I am in need of a skilled cybersecurity professional with specific experience in DDoS threats. The purpose of this project is to capture and analyze DDoS attack traffic from our corporate network. With your help, I aim to: - Identify patterns that indicate a potential DDoS threat - Understand our network's vulnerabilities to these specific attacks - Develop a proactive defense system through learned network behavior Please note, this project requires experience with corporate network environments, analysis of DDoS network traffic, and a deep understanding of network defense systems.

    €210 (Avg Bid)
    €210 Gns Bud
    11 bud

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €62 (Avg Bid)
    €62 Gns Bud
    8 bud

    I'm urgently in search of a certified and empanelled vendor who can perform a comprehensive scan for both my web and mobile applications. Key Tasks: - Conduct thorough scans to identify any potential vulnerabilities. - Draw up a comprehensive report detailing any findings. Ideal Candidate: - Comprehensive knowledge of different attack vectors is mandatory, even though no specific concern is prioritized for this project. - Proven experience as an empanelled vendor is compulsory. - Must be able to work under tight deadlines, as the completion of this project is ASAP.

    €319 (Avg Bid)
    €319 Gns Bud
    11 bud

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €62 (Avg Bid)
    €62 Gns Bud
    7 bud

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €77 (Avg Bid)
    €77 Gns Bud
    14 bud

    Per country analysis of Distributed Denial of Service attacks We have been collecting data on UDP reflection based Distributed Denial of Service attacks since 2014. There are significant differences in attack patterns between countries (time of day, day of week, target of attack) and in response to global interventions targeting DDoS. This project would involve drilling down in to the per-country data to understand what is going on and why.

    €128 (Avg Bid)
    €128 Gns Bud
    28 bud

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €35 (Avg Bid)
    €35 Gns Bud
    11 bud

    I have a small website running on Zencart that apparently suffered a DDoS attack 3 days ago and the website is still down. Now my clients can't visit the site, I've contacted Hostgator (I have a shared server account there) and I've been told I have "web bots crawling my site at unmanaged speeds"... I tried to set longer crawl delays and installed the CloudFlare but the website is still down... Any ideas how to bring the website up and running again?

    €21 (Avg Bid)
    €21 Gns Bud
    15 bud

    I'm seeking a seasoned Java developer for an immediate project involving the construction of a Spring Boot filter. The main task centres on the creation and implementation of a filter for all incoming requests to the controller, specifically designed to combat XSS attacks and remove Zero Width Space (ZWSP) characters. Key Project Requirements: - Develop a Spring Boot application filter. - The filter must effectively handle and block all potentials XSS attacks. - The filter must efficiently remove all encountered ZWSP characters. - The developed filter must suitably plug into a Spring Boot application. - The filter should be designed to handle high networking traffic smoothly. Test Cases Require to Cover: - Scenarios of filtering XSS attacks. - Scenarios that deal with the removal o...

    €130 (Avg Bid)
    €130 Gns Bud
    7 bud

    I require a comprehensive analysis of various attack surface management companies. The major areas to focus on include: 1. Features: This includes an exhaustive evaluation of the following: - Vulnerability scanning - Asset discovery - Risk assessment - Configuration management 2. Pricing: Provide a detailed overview of each company's pricing structure along with proof. 3. Effectiveness: I'm interested in a thorough evaluation of the effectiveness of each company's software/services. The ideal freelancer for this job should possess an in-depth understanding of cybersecurity software and services. Experience in writing reviews and comparisons of software is a bonus. The review is to be delivered in a concise, easy-to-comprehend report. Please include C...

    €102 (Avg Bid)
    €102 Gns Bud
    25 bud

    We require an individual capable of crafting a comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, N...comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, Networks, Infrastructures, and Active Directories. 2) Social Engineering Assessments. 3) Physical Security Evaluations. 4) Red Teaming Exercises. 5) Purple Teaming Collaborations. 6) Attack Surface Management. 7) Source Code Analysis. 8) Software Composition Analysis (SCA). 9) Dynamic Application Security Testi...

    €22 / hr (Avg Bid)
    €22 / hr Gns Bud
    22 bud

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    €839 (Avg Bid)
    €839 Gns Bud
    12 bud

    I want to get a topic in Ransomware and write on Ransomware attack effects on IT Businesses.

    €110 (Avg Bid)
    €110 Gns Bud
    53 bud

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    €2312 (Avg Bid)
    €2312 Gns Bud
    26 bud

    Seeking skilled freelancers for UI/UX design for an Attack Surface Management project. Familiarity with Attack Surface Management preferred but not mandatory. Design style similar to & Please share relevant work samples. Specifics: - Incorporate interactive dashboards - Include detailed analytics - Construct a user-friendly navigation system Skills and experience: - Strong UI/UX design skills - Previous work with similar projects - Knowledge in cybersecurity (preferred, not mandatory)

    €941 (Avg Bid)
    €941 Gns Bud
    58 bud

    As a rapidly evolving tech firm, I need a resource experienced in evaluating and implementing multiple notable blockchain technologies on our server. This involves acquiring and compiling the technologies' source codes. Ideal Candidate Skills: • Expertise in Wormhole, LayerZero, ChainLink, Axelar, Celer C-Bridge, and Flare • Experience in server-side compilation, implementation, and debugging When applying please include: • Your prior experience with the listed technologies Please note, the main goal or objective of this project has not been explicitly defined. It is, however, implicit in the tasks needed to be performed, namely, successful evaluation and implementation of the mentioned technologies.

    €188 (Avg Bid)
    €188 Gns Bud
    1 bud

    Looking for an experienced graphic artist with mastered skills in Microsoft Word to help me design an informative and eye-catching pamphlet about acute myocardial infarction or heart attack. Detailed Brief: - The pamphlet size: Must be designed to fit on both sides of A4 paper, including diagrams. - Color Scheme: Green and Yellow. I want these colors to be the dominant shades for the design, giving clean and professional vibes. Maximum size: two sides of an A4 page (margins 2cm), Font styles Arial or Calibri with minimum font size 11, line spacing 1.5 (minimum). - Content: It will cover three main points: 1. Symptoms of acute myocardial infarction. 2. Causes of acute myocardial infarction. 3. Prevention tips for acute myocardial infarction Ideal Skills: - Strong Microsoft ...

    €94 (Avg Bid)
    Haster Garanteret
    €94
    96 indlæg

    I'm facing a major reputation issue due to a personal attack in a Google review. This false info-based review has had a massive impact on my web presence. While I have made attempts to mitigate the issue by reporting it to Google and responding publicly, professional assistance is now needed for effective resolution. A background in online reputation management and knowledge of Google's content policy would be ideal for this task.

    €9 - €28
    €9 - €28
    0 bud

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €14 (Avg Bid)
    Garanteret
    €14
    4 indlæg

    Create an excel sheet where I can score my columns based on categor...Authentication b. IAM permissions c. Configuration of Network Security Measures 3. Breach Probability a. Historical Incidents b. Attack Frequency c. System Value 4. Encryption Status a. Relevance of Encryption Type b. Compliance with Encryption Standards c. Encryption Key Management and Controls 5. Configuration Complexity and Commonality of Misconfiguration Occurrence a. Complexity of Service Settings b. Common Configuration Errors c. Configuration Default Settings 6. Alignment with Pre-Exploitation Phases of MITRE ATT&CK and Cloud Threat Attribution a. Initial Access and Execution Risks b. Privilege Escalation and Defense Evasion c. Threat Actor Profiles and Attack Vector Analysis Total Li...

    €28 (Avg Bid)
    €28 Gns Bud
    8 bud

    Hi Ahmed Mahmoud S., hope you are all well. I have an assignment regarding a Differential Power Analysis attack on a crypto XOODYAK algorithm. And a task for conducting a leakage assessment and interpret test results. Would you be able to help? I currently have some of the code but it needs finishing. If I send you the description, can you take a look and healthly let me know whether you could finish it up in a week. This is highly important for me Sir.

    €234 (Avg Bid)
    €234 Gns Bud
    1 bud

    I am looking for a seasoned Cybersecurity Professional experienced in conducting realistic attack simulations and incident reports. The goal is to understand how our systems respond against: - DDoS (Distributed Denial of Service) attacks - Malware attacks - Ransomware attacks These simulations should include our Network Servers, four VMs, and Files. Ideal Skills: - Proficiency in conducting DDoS, Malware, and Ransomware attack simulations - Experience in handling and securing network servers and virtual machines - Practical knowledge about file-based attacks and their prevention The final deliverable should be a detailed report that includes a thorough technical analysis of the attack simulations' results. The report should help us identify vulnerabilities, un...

    €53 (Avg Bid)
    €53 Gns Bud
    15 bud

    I'm looking for an experienced professional who is skilled in working with WooCommerce to swiftly install 3D Secure on my e-shop. I need this done as soon as possible as this is an urgent project. Key Requirements: - Proven experien...working with WooCommerce to swiftly install 3D Secure on my e-shop. I need this done as soon as possible as this is an urgent project. Key Requirements: - Proven experience with WooCommerce - Profound knowledge of 3D Secure installation - Capability to quickly understand and implement necessary changes - Excellent attention to detail We had to disable the card payment as we faced massive cyber attack (card testing) recently. I need a quick intervention to make our e-shop fully functional again. Appreciate your time and look forward to ...

    €84 (Avg Bid)
    €84 Gns Bud
    17 bud

    I am seeking a skilled illustrator with a passion for Japanese anime and a keen understanding of various styles. Though I'm primarily interested in the classic anime style, I am open to incorporating other anime styles, if they serve the design well. The designs I require should be based on popular anime themes and characters, namely: - Naruto - One Piece - Dragon Ball Z - Attack on Titan - And other popular themes and characters, up for discussion Ideal freelancers for this project would demonstrate the following: - Proven experience with graphic design, specifically for clothing - A strong portfolio with emphasis on anime-style work - Ability to capture the essence of popular anime characters - A flexible design approach, to cater to different anime styles and...

    €105 (Avg Bid)
    €105 Gns Bud
    56 bud

    My website was compromised last week, and I need the damage from the malicious code injection assessed and repaired immediately. Unfortunately, I do not have a recent backup to rely on. The perfect professional for this job would: - Have extensive experience in WordPress security - Be capable of identifying and mitigating these attacks promptl...security - Be capable of identifying and mitigating these attacks promptly - Have a strong understanding of the latest threats and malware activities that can impact a WordPress website - Provide guidance on keeping my site secure moving forward Given the lack of backup, a keen attention to detail is necessary to ensure minimal data loss. Upon completion, I would like a detailed report of the attack and the measures taken to rectify the ...

    €19 (Avg Bid)
    €19 Gns Bud
    31 bud

    Goal: To Demo red team skills with a modern attack, Recording a video with steps in a power point slides with explains Metodology: • The recording Will not appears names or country about developers. Only Kali Linux in English • Slides with screenshot and explain all steps • Share the virtual machines on the scenary attack Content: • Envarionment: Ataque a "CompanyX". • Techniques: Phishing spearphishing, zero-day vulnerabilities pivoting, privilege escalation, data exfiltration. • Tools: Virtual machines in virtualbox, Kali Linux, latest generation of attack tools. Benefifts: • Deep understanding of Red Team attack techniques. • Practical vision of tools and strategies. • Improvement of the security posture...

    €119 (Avg Bid)
    €119 Gns Bud
    11 bud