Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Slags
Evner
Sprog
    Job-status
    7,636 xss attack code jobs fundet, i prisklassen EUR

    Please check my description BEFORE you apply. After a recent malware attack I have updated all my wordpress plug-ins. As a result one of the processes on website has became REALLY slow or hangs altogether. I need to get it working the way it was before. I don't know if it is caused be the plug-in updates or the malware. The website is wordpress

    €30 (Avg Bid)
    €30 Gns Bud
    9 bud

    ...about XSS (Cross-Site Scripting) it will be published in scientific journal , the document must be satisfy the following conditions . 1. The article must be word doc with Arial font type and 12 p font size. [log ind for at se URL] article must be at 10 pages , cover the following subjects . A. Introduction to XSS threats. B. XSS definition and history . C. XSS typ...

    €89 (Avg Bid)
    Garanteret
    €89
    0 indlæg

    ...need is a Manticor, a winged lion chimera with a scorpion tail. You can decide, whether it moves by flying or walking (it can fly, but its not necessary that it does). For the attack and combat art, you can choose freely from paws, wing-talons (if any), bite and scorpion tail. A few impressions can be seen here: [log ind for at se URL]

    €110 (Avg Bid)
    €110 Gns Bud
    1 bud

    We do have 3 Servers where is ISPConfig installed. One Server is the Main Server who is managing the other servers....our server was attacked. in the log files we saw multiple attacks on the server and database. We also want the have blocked some hosts form outside Europe, so that they can't attack anymore. maybe the ISP config Database is also hacked

    €119 (Avg Bid)
    €119 Gns Bud
    19 bud

    ...crawlers (or bots, spiders or robots), and malicious users using automated web vulnerability scanners (TypAcunetix/Netsparker/W3AF) 3) Real-time detection 4) Other than SQLI and XSS vulnerability such as CSRF should be addressed too. Duration - 10 days maximum Budget - 40,000 (INR) For more project details, you can message me. Project is based on

    €495 (Avg Bid)
    €495 Gns Bud
    4 bud

    ...KYOKO BAERTSOEN - known for her work with Lunascape and Hooverphonic (for full song, please PM us; lyrics below). The song is a dark triphop sound, think of moby / masstive attack / faithless but a bit darker and rougher to make it more edgier and real. Some examples of people we worked with in the past, where we exposed their work to our fans. - https://www

    €1188 (Avg Bid)
    €1188 Gns Bud
    22 bud
    adversarial machine learning 4 dage left
    VERIFICERET

    You will create convolutional neural network for online database and fine accuracy of classifier then u will adding some poise it means exposure an attack to degregate classifier performance

    €65 (Avg Bid)
    €65 Gns Bud
    3 bud
    Auto Browse. 4 dage left

    ...bot to make automated request but the bot failed to connect. Reason is in the header there nonce, device, timestamp and sign. I think they implement it to protect from reply attack. Im looking for someone who can reverse engineere the app. And create for me a script to login and browse freely as if it's real person doing all the browsing. If you think

    €188 (Avg Bid)
    €188 Gns Bud
    7 bud

    Make presentation slides up to 10 , simply fill the slides with content related to the topic . slides looks good .The topic is Brute force Algorithem/Attack.

    €25 (Avg Bid)
    €25 Gns Bud
    26 bud

    Need hosting and domain registration with instant activation. Need secure server. that protects our files from any attack.

    €142 (Avg Bid)
    €142 Gns Bud
    21 bud

    Hi plane4you, need 5 more articles related to diet and nutrtionist targeting dietbities, sugar, heart attack, high blood presure and different diets that can help them [log ind for at se URL] need 3 heading for same title for seo

    €45 (Avg Bid)
    €45 Gns Bud
    1 bud

    Hi Guys, I have about 20+ characters I will like to animate in Spine. [log ind for at se URL] I will...[log ind for at se URL] my characters are created similar to the artwork in the video I will need animations for each character - idle - walk - attack - hard attack My budget is $10 per character for 20 characters? Thanks

    €144 (Avg Bid)
    €144 Gns Bud
    10 bud

    ...to increase the risk of an electronic attack on the rail infrastructure, as it brings more systems under centralised control. Consequently, the railway industry and government identified a need to understand the security implications of the new technology. structured as follows: Introduction, Main threats, Attack scenarios, Countermeasures, Conclusion

    €122 (Avg Bid)
    €122 Gns Bud
    26 bud

    ...called "Save Your Nuts". We are looking for a 3D artist to the modelization for a Raccoon (cartoon style), with 4 textures and 6 animations (idle, run, horizontal attack, vertical attack, jump, dig). We provide art direction with character illustration and examples of others character already integrated into the game. Video and details of the game:

    €375 (Avg Bid)
    €375 Gns Bud
    36 bud

    ...to continue. This would not be a problem because I paid for it. However, the check fails frequently due to problems on the developer's system (I'm not sure, he is under ddos attack, his system it's simply not working well) and my users suffer a lot from this issue. I need two things: 1) Remove the obfuscation 2) Remove the queries to the developer's

    €98 (Avg Bid)
    €98 Gns Bud
    14 bud

    Hi Farid, next creature i need is a scarab, a co...ers:fixed_height(100,100):origin()/pre00/cd89/th/pre/i/2007/273/8/3/[log ind for at se URL] Again with four animations: - Move - Idle - Attack - Combat Art (a defensive one, not an attack) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian

    €111 (Avg Bid)
    €111 Gns Bud
    1 bud

    Hi Can you please check our server code files and server settings for vulnerabilities and fix them. Our server runs our Accounting/Inventory system ([log ind for at se URL] [log ind for at se URL] Based on a modified FrontAccounting ERP. And also a custom web app for our wholesale customers to check stock and order, as well as for staff to edit price list, view some

    €445 (Avg Bid)
    €445 Gns Bud
    1 bud

    This is for a cyber exercise scenario. I wanted to have a scenario where a malicious hacker is able to alter the applications program of payment system to cause dis...masked out and non-identifiable. There must be end to end steps description how this can be done, including what are the processes and what parameters to be set to enable such attack.

    €330 (Avg Bid)
    €330 Gns Bud
    5 bud

    ...Foxes will keep dropping from the Helicopters, and your job is to shoot them before they get you. The massive game play trailer opens with a gag as the foxes preparing for the attack while the bunnies are taking positions on the ground. The intro part requires a bit more serious read, imagine that you are doing a low-key sport broadcast on radio. The rest

    €45 (Avg Bid)
    €45 Gns Bud
    1 bud

    ...entered URL website or not. And a report needs to be generated. For reference check [log ind for at se URL] SQLi Protection Protection from SQL Injections (SQLi) and XSS Vulnerabilities (Cross-Site Scripting). Mass Requests Protection Protection from Mass Requests that are made in order to overload your website. Spam Protection Protection from

    €210 (Avg Bid)
    €210 Gns Bud
    13 bud

    ...crawlers (or bots, spiders or robots), and malicious users using automated web vulnerability scanners (TypAcunetix/Netsparker/W3AF) 3) Real-time detection 4) Other than SQLI and XSS vulnerability such as CSRF should be addressed too. Duration - 10 days maximum Budget - 40,000 (INR) For more project details, you can message me. Project is based on

    €578 (Avg Bid)
    €578 Gns Bud
    10 bud
    Network Design Udløbet left

    ...types of traffic. 4. Select a more secure method of cross site communication. 5. Design wireless networks to be secure as possible. 6. Design security so they can monitor any attack. 7. Insure outside traffic never connects to the internal network. 8. Insure their data is secure in all three states. 9. All departments are segmented from the others, but

    €19 / hr (Avg Bid)
    €19 / hr Gns Bud
    26 bud

    ...FEMALE for casting (superhero and enemy roles). You have to be liberal, creative, open minded and cooperative. The acting will be for a cinematic movie talking about aliens who attack earth and the rise of superhero. The story, storyboard, technical info will be provided later. The procedure is as following: 1- You bid 2- We discuss details on freelancer

    €31 / hr (Avg Bid)
    €31 / hr Gns Bud
    8 bud

    three questions 1. Question 1; Choose one case of the following and what would you do? (3 points) 2. Question 2; Apply ethics ...points) 2. Question 2; Apply ethics in IT Professional environments? (3 points) 3. Question 3; Mention some cases of cyber attacks in kingdom of saudi arabia and anti-cyber attack law in kingdom of saudi arabia? (4 points

    €58 (Avg Bid)
    €58 Gns Bud
    42 bud

    Program stop accepting connections at DOS attack

    €185 (Avg Bid)
    €185 Gns Bud
    12 bud
    C# Program Udløbet left

    ...DPM and APM numeric value). Basically some math will need to be done to get these values based on the following. if the weight is 1, he can attack 10 times per minute. for each extra weight, he can attack one time fewer as shown in the following (defense works with similar formula): Weight = 1, 10 attacks per minute. Weight = 2, 9 attacks per minute

    €31 (Avg Bid)
    €31 Gns Bud
    24 bud

    ...the result of what is known as a reflection / amplification denial of service (DoS) attack. What this means is that certain ports (in this case, UDP Port 111) can be made to respond to a malicious request, with a lot of traffic being sent to the target of the DoS attack (in this case, Google IP addresses were the targets of the DoS, and your EC2 Instances

    €67 (Avg Bid)
    €67 Gns Bud
    10 bud

    ...opponent, formation used etc.). ~What time of the game the team has scored/conceded, the goal type (set-piece such as penalty, free-kick or corner, established play, counter attack or cross from left/right) - THE FILTERING OF THE STATS: For the player stats I'd like to filters such as competition, home/away/neutral, starter/substitute, time of day the

    €93 (Avg Bid)
    €93 Gns Bud
    5 bud

    I need a 3D model of Heart attack detector ring This ring can detect heart attack symptoms and starts an alarm when it detects one and send a message to the emergency if you don't turn the alarm off in one minute.

    €92 (Avg Bid)
    €92 Gns Bud
    19 bud

    Hi Farid, next creature i need is...com/originals/54/ab/49/[log ind for at se URL] [log ind for at se URL] Again with four animations: - Move - Idle - Attack - Combat Art (be creative ;) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian

    €111 (Avg Bid)
    €111 Gns Bud
    1 bud

    ...animations and simple gun, bat or knife particle type cut or gun shot shown on eitehr you as your hit or the computer. 5.) You or the Computer draw a weapon card, that has an attack attribute. Either a Knife, a Bat, a Hand Gun, or a Machine Gun. This is the weapon card you have the duration of that game instance. 6.) Knife can cause 5 damage points, bat

    €509 (Avg Bid)
    €509 Gns Bud
    10 bud

    I need you to write a research article on ddos attack on exchange server. it should be case study.

    €79 (Avg Bid)
    €79 Gns Bud
    34 bud

    Looking for a professional penetration tester to test my server in order to determine if it's vulnerable to any attack

    €22 / hr (Avg Bid)
    €22 / hr Gns Bud
    29 bud

    ...will choose between male or female character, just one of each to start. You will have a base health, base intellgence, base attack and defense. Weapon and defense cards are pulled during the game to be able to help with attack and help with defense. 8. You fight to win a street corner. You fight to won both corners and therefore own the street. 9.

    €1129 (Avg Bid)
    €1129 Gns Bud
    36 bud
    Perform DDoS Attack Udløbet left

    I am looking for someone who can perform DDoS attack on my website so i can test security levels of my website. I will also expect you to teach me how to perform DDoS attack

    €127 (Avg Bid)
    €127 Gns Bud
    15 bud

    ...normal flow or anormal flow I mean there is attack or non attack network flow. This dataset is really huge so I have small part of this dataset and you can work on it . you can see attached this dataset.(Excel format). My expectation is that createing a neral network classifier to decide whether there is attack or not. I am not looking perfect classifier

    €58 (Avg Bid)
    €58 Gns Bud
    14 bud

    My website [log ind for at se URL] needs about 40 seconds to load and it is due to some PHP process that is running on background and to few malwar...net and some other scans. The work is about cleaning this website (hosted on an economy shared-hosting on [log ind for at se URL] and with Cloudflare) and to secure it to avoid any other attack. Thank you

    €123 (Avg Bid)
    €123 Gns Bud
    64 bud

    Hello, I'm looking to have a code block created to prevent xss injections on my site. I have a site that has forms and a searchbox the code block will also need to block URL injection also. I've looked into OWASP and was only able to prevent the searchbox attacks but couldn't get the URL to decode for URL injection

    €50 (Avg Bid)
    €50 Gns Bud
    6 bud
    Trophy icon Design a Logo Udløbet left

    ...specialise in antivirus and ransomware protection for businesses, offering state of the art monitoring and fortification solutions to suit your budget. WannaCry ransomware attack was one of the biggest and well know that’s why our name is going to be Wannasmile I want the logo to be sharp and edgy maybe with a smile of sort incorporated in the logo

    €46 (Avg Bid)
    Garanteret
    €46
    144 indlæg

    ...page to its original state - as obtained from the original JSON object. Handling of CORS is necessary. All code should be written to current web security standards. (no XSS, no SQL Injection, or any other major known vulnerability). All code should use dependencies that are not known to be vulnerable (no known CVEs et al). This is a work for hire

    €518 (Avg Bid)
    €518 Gns Bud
    39 bud

    ...opponent, formation used etc.). ~What time of the game the team has scored/conceded, the goal type (set-piece such as penalty, free-kick or corner, established play, counter attack or cross from left/right) - THE FILTERING OF THE STATS: For the player stats I'd like to filters such as competition, home/away/neutral, starter/substitute, time of day the

    €105 (Avg Bid)
    €105 Gns Bud
    30 bud

    ...three alerts, 1: General Alarm: that sounds when our entire guild are being attacked. 2: Shield Alarm: that sounds when the shield of an member ends and he are vulnerable 3: attack Alarm: that sounds when the guild member are being attacked, so he need to enter fastly to the game and put shield. the alarm sound need to be different and need to sound

    €167 (Avg Bid)
    €167 Gns Bud
    8 bud

    HI , i am building an app and i want to evaluate the security of the features based on A V Comparatives report of how vulnerable my app will be in...comparison to other known security phone apps i need to evaluate the score based on criteria of phone device vulnerability such as microphone access permission can be used for attack on phone for instance

    €122 (Avg Bid)
    €122 Gns Bud
    7 bud

    I need you to create me a vulnerable website ...can can edit, add, view the table. There should be an button where it shows the table of the database that can be penetrated. There should be a button with an attack scenario where the code for adding,deleting, editing the table. There's should be reset button where it resets it back to the beginning.

    €22 (Avg Bid)
    €22 Gns Bud
    2 bud

    ...opponent, formation used etc.). ~What time of the game the team has scored/conceded, the goal type (set-piece such as penalty, free-kick or corner, established play, counter attack or cross from left/right) - THE FILTERING OF THE STATS: For the player stats I'd like to filters such as competition, home/away/neutral, starter/substitute, time of day the

    €142 (Avg Bid)
    €142 Gns Bud
    11 bud

    DDOS attack Monitoring, Analyses, Detection and Defence

    €98 (Avg Bid)
    €98 Gns Bud
    9 bud
    SQL injection Udløbet left

    Demonstrate a network or web application attack such as such as DNS poisoning, Session hijacking, Cross-site scripting, SQL injection or buffer overflow using DVWA or WebGoat.

    €20 (Avg Bid)
    €20 Gns Bud
    3 bud

    ...for a person who has the background of the control theory and engineering or applied mathematics with expertness in Network Control System with power system or smart grid ( attack, detection, prevention, and stability). I want to write an article. So I need your help to implement existing problems as well as mathematical calculation and MATLAB simulation

    €131 (Avg Bid)
    €131 Gns Bud
    7 bud

    ...opponent, formation used etc.). ~What time of the game the team has scored/conceded, the goal type (set-piece such as penalty, free-kick or corner, established play, counter attack or cross from left/right) ~I'd attach some screen shots from my excel sheets at the moment to give you a rough guidance of how I'd expect the sheet to sort of look like. But

    €119 (Avg Bid)
    €119 Gns Bud
    8 bud