...Physics).. * Game Features : Very Attractive UI/UX. Should have the Old Physics for the Ball. More Obstacles, challenging obstacles. Solo Carrier mode through levels, Time attack, in settings hard mode, easy mode, and (If possible Multiplayer through Local WIFI or Internet Multiplayer). A lot of Levels, and (in Future Updates Actively Multi Levels
Hi Janki we make Games and Animations and are looking to work with an artist for all our projects. The current requirement is a female char...projects. The current requirement is a female character sprite sheet. We have designed the character, we need only the Character sprites to be designed (like run , jump, attack etc) . Best Regards Vinay
I need a proof of ...following: one running hidden service with a bad configuration which will lead to the leak of the public ip using the attack showed in the video. I need to know the case where it can happen, how to execute the attack and how to prevent the attack. I have a vulnerable test site up, if you can do this job I will give you the details
Hey, i have been attacked and most of my sites display this screen shot message.I need a fixer urgently to fix this kind of attack
...(first) log file will be mixed (attack + robot + normal) log file. Next, 5 log files which I have downloaded from internet will be provided to you. Here, you need to classify entries in these each log file as per given 6 attacks. The same algorithm will find how many IP numbers are there in each file for each attack and percentage of it. Note - one
Hello, I need php/html/server specialist to help me with Server/Website optimization to counter GET method HTTPS spam/ddos.
There is requirement to identify all footprints/patterns of brute force attack from any web server log file. Algorithm is required to write in python/R language and it is required to test on given few log files.
...protect it, 1 in front, 1 on the left and 1 on the right) 5) After the game is over results are recorded on user account Other: - Every character should have 3 attacks. A basic attack and then 2 different attacks that cool down over time. - After a game, each player of the winning team receives 100 gold. While the losing team gets 10 gold. - Leaderboard
...Facebook, Twitter and Instagram to be managed with weekly post or two post per week. This position will start in March. Now I just want to meet someone who can devise a plan of attack for when March begins so we can hit ground running. This is a salary position at $100/month + potential monthly bonus for starters. If you have more experience then pay is
...client with chat, user list in PC browser webcam using WebRTC in mobile/computer HTML5 browser PC desktop encoders like OBS, XSplit, Wirecast iOS/Android RTMP encoder apps like Wowza GoCoder app IP camera 24/7 RTSP streams scheduled video playlist (integrates Video Share VOD) custom mobile apps with full functionality (extra) Playback Live Video advanced
A spacecraft model is to be created for a PC Game (Viper Attack). This model will then serve as Enemy in the game *. From the submissions can several "winning", so ultimately I need several models. It's a top down-scrolling arcade game. To illustrate I have here a little in-game video: [log ind for at se URL] There are almost no limits to
...using given log files), accuracy of algorithm (based on 1 mix log file) 8) 6 log files will be provided. Among these files, 1 log file will be mixed (attack + robot + normal) log file. I have created attack log file by using DVWA application and applying 3 scanners, I have downloaded another robot file and normal file from web. I need to mix this, or you
Server have got an phishing attack report and needs to be cleaned. Also e-mail service have stopped regular with 3-5 days between. Exim restarted with no help. Server restart fix issued. All need to be report with cause and fix.
- In this lab,...twodimensional, viscous and turbulent. The effect of variation of the angle of attack has on the lift and drag characteristics of the aerofoil are the main object of this lab as well as the utilizationof different turbulence models when separation occurs for high angles of attack. Additional details and the geometry will be provided.
Hello, I need a Website where we can predict possible cyber attack based on the previous dataset. I need you to come up or find out dataset and based on that we can decide how the output will look like.
Looking for a Layer 7 ddos tool / script (for websites)
Hey, i dont know how to pm you. My question: i need some1 who can write me a bo...protect from melee/ranged and magic. What i need is that my bot client will automaticaly detect what the monsters are gonna do and then to use the protection prayer against the attack from the monster. The minigame is Called "infernal cape". Waiting for a answer. Thanks
I need Expert for Installation/configuration of Wowza Live streaming server in Linux or windows. Expert required for long time per hour via Teamviewer or help to install and configure the server. Please only bid if you have worked with wowza or 24/7 live streaming.
Hello, I now explain that I opened a video game project, and I have a lot of Ddos, I would look for someone to configure a firewall via iptables or other so that the ddos does not pass. Of course you have to test before I have friends who can attack. My host has a 100gbps protection that is not enough: / He told me that an itpable configuration
I would like a URL Shortner Script Built tha...urls that can be shortened Charges for number of time a shortened Url is used Material UI template for responsiveness as simple as google Detailed Analytics & Statistics API DDOS prevention High scalability The developer should be able to make updates to the script and track them via github private repo
I am looking for Network Expert required with no-ip connection to the home sever to help me...required with no-ip connection to the home sever to help me via teamviewer to install the home server is connect via NO-IP service and need to open ports in router to connect my wowza server, what is working fine locally but not with no-ip. Max one hour job
...pixel art. Each character will be: - Unique design (as per Vector example that will be given) - Idle (standing) animation - Passive Attack animation punch/stab - depending on the character design - Special Attack animation - unique to each character. For example may be animating shooting a bow. - All 8 direction versions required For now I have
I have a wordpress website which was functioning well Suddenly the hosting company suspended my account due to some hackers attack. I have un-blocked the website but need to fix the gaps and make some security checks and fixes to avoid it in future
...kali linux on Virtual machine Wifi adapter, realtek rtl8812au Wifi adapter, ralink rt2870/rt3070 Methodology: any of following plans Plan A: create an auto script of krack attack Link: [log ind for at se URL] Plan B: update fluxion script to allow clients to auto connect to fake AP. Link: [log ind for at se URL]
hello currently have two sites under attack 1. [log ind for at se URL] seems ok but once you go to [log ind for at se URL] theres a weird page that pops up. 2. [log ind for at se URL] seems ok also but once in a while, the same error will show up.
Hi, We provide anti-hacking solutions to websites built on Wordpress, Magento, Php, Drupal, etc. Our technology secures websites from DDoS, SQL Injection, XSS and all such issues. Also we fix hacked websites. We are looking for website development agencies / companies / freelancers who who want to add security to their portfolio and get more revenue
...vulnerabilities for my website as I am doing this for my final year project. The vulnerabilities i wish to do are SQL injection, Xss, CRSF and file inclusion. For server side DDoS, Brute force and Man in the Middle. If anyone could help me with this I would really appreciate this or if anyone has any other attacks that they could do for me i would really
...building a new MMORPG and are looking for a long-term relationship with professional modelers. All models must be high quality and include around 10 animations (walk, run, some attack, die, etc.). -Character Models: These must be HIGH POLYGON (think Overwatch game quality). We'll need around 12-14. -Item Models: Each character will have 5 sets of armor
...Shoot any enemies nearby. 3) Recover The Flag The tank has to recover the captured flag and return to base. Shoot any enemies encountered 4) Engage Enemy The tank has to attack the enemies nearby. Shooting doesn't have to be fancy. Just shoot some spheres!! Use A* or any other effective solution. Navigation to waypoints using wheel colliders is
...recognise at a glance. Some of these icons will be elemental classifications (such as Earth, Air, Fire, etc), while others will be physical statistics (such as Health Points, Attack, Defence, etc.) If you are interested, then please send me a message to discuss the project in further detail (Due to the number of offers I receive, only artists who contact
Hello. I have a project coming up where we are to stream 10x audio streams using Wowza. At the receiving end, we have been asked to deliver these 10x streams as separate audio feeds to a mixing desk. Short of using 10x laptops, each with a browser open to a specific stream, I'm looking for a good solution to allow 1-2 laptops to receive the 10x streams