Freelancer Scams: 10 Red Flags and Warning Signs
Occasionally a fraudulent client or scammer will post a project, causing trouble for freelancers. Find out how you can spot the early warning signs.
EL bot debe poder operar en varios DEX usando flashloans como caracteristica pricipal, las oportunidades de las transacciones las debe buscar en los mempool de los contratos inteligentes de cada DEX. Tambien debe poder hacer frontrunning de las transsacciones The bot must can operate on many DEX using flashloans like principal function, the oportunities of transaction have to l...caracteristica pricipal, las oportunidades de las transacciones las debe buscar en los mempool de los contratos inteligentes de cada DEX. Tambien debe poder hacer frontrunning de las transsacciones The bot must can operate on many DEX using flashloans like principal function, the oportunities of transaction have to look for in the mempool of the Contratcs of the DEX. must can do frontrunning,and sandwich ...
Necesitamos un colaborador para instalar Gophish y gestionar una campaña de simulación de phishing
...correctamente. Me gustaría que pudieras arreglar el mod y que este lo mejor configurado para que cada 10 días haya hordas de enemigos cada vez mas complicadas, así progresivamente hasta un máximo de 200 días con los mods que ya vienen en la carpeta adjunta. Que sea dificil pero tampoco muy complicado. A demas si tambien es posible me gustaria añadir algunos mobs personalizados gigantes como en la serie de attack on titans o de ese estilo que sean fuertes y que tengan ciertas habilidades y que no presenten muchos errores a la hora de comabtirlos, en total me gustaria que fueran 5 mobs diferentes. Todo esto configurado en la carpeta de mods que enviare ( para que sean compatibles con los mods ya existentes o futuros que quiera meter ) que s...
tenemos una pequeña empresa de ciber seguridad que acabamos de comenzar y necesitamos mostrarle a nuestros clientes algunas formas reales de como los ciber delincuentes roban sus datos personales como nombres, identificaciones, datos de tarjetas de credito, datos bancarios etc. necesitamos unos sitios de simulacion de phishing que hagan la simulacion de robar datos bancarios y personales.
mi dominio esté involucrado para actividades de phishing. Para resolver esto, segun el hosting necesito limpiar mis sitios web y volver a cargarlos. Es posible que deba es decir necesito el servicio de limpieza de wordpress Necesito desinfección completa para solucionar el problema con 1 dolar web hosting, ahi tengo alojado dos dominios, tengo problemas solicite hacer una copia de seguridad completa para limpiar y volver a cargar. el cpanel esta desabilitado igual la carpeta public_html para evitar suspensión URL infectadas:
Se necesita quitar un malware o phishing de una pagina web de joomla. Se tiene la ruta exacta para proceder a la eliminación.
Requiero una persona con experiencia en rigging para la animación de 18 personajes. 10 personajes son jugadores las cuales requieren las siguientes animaciones: idle, run, attack, run_attack y die 8 enemigos los cuales requieres las siguientes animaciones. idle, run, attack_1,attack_2 y die. Si esta interesado puedo brindar mas información.
...contenido acorde al rubro. SOLO SE BUSCAN PROFESIONALES DE HABLA HISPANA, idealmente conectado con canales de noticia chilena y que haga articulos rápidamente si algo sale en prensa chilena asociado al tema. Se deben subir TIPS, noticias de tendencias, etc..., como por ejemplo: - Tips para cuidar tu PC - Los mejores antivirus para tu PC - Windows vs Mac (OSX) - Como detectar un mail fraude (phishing) Queremos que se suba al menos 1 artículo por día, idealmente 2. Buscamos alguien con quien trabajar a largo plazo. Buscamos llegar a ser un referente en el tema....
...dirigida por Rian Johnson (Looper, The Brothers Bloom, Brick), y cuenta con J.J. Abrams (Star Trek: Ms all, Calle Cloverfield ten, Misin: imposible - Nacin secreta) como productor ejecutivo. El reparto principal DE la pelcula EST compuesto por los actores flower sea turtle (Star Wars: El DEspertar de la Fuerza), Adam Driver (Paterson), award patriarch (A propsito DE Llewyn Davis), John Boyega (Attack The Block), adems DE Carrie Fisher (Maps To The Stars) y Mark Hamill (Kingsman: Servicio secreto) retomando Sus papeles DE Leia y Luke. Se incorporan a la adventure story los actores Benicio del Toro (Sicario) y Laura Dern (Alma salvaje). hace seven mutos - Ole HD Completa asubt paol lato Acts of Violence 2018 ulada Es, ver Acts of Violence 2018 ole espaol Grats (2018), ver Acts...
Antivirus y Antispyware Anti-Phishing Bloqueo de exploits Exploración basada en la nube Mínimo impacto en el sistema Protección contra ataques basados en scripts Protección ante ransomware UEFI Scanner Firewall personal Antispam Protección contra ataques de red Protección ante botnets Control parental Protección de cámara Web Anti-Theft FUNCIONE EN WINDOWS Y LINUX
Tengo un problema con mi sitio tanto Chrome como Firefox lo detectan como phishing me urge resolverlo.
Necesito una pagina similar a esta, por razones de etica se deben cambiar el nombre para que no sea usada como phishing y eso
Necesito una pagina exactamente identica a esta, por razones de etica se deben cambiar el nombre para que no sea usada como phishing y eso
...la mejora continua. - Resolución de incidentes - Aplicación de Cambios Evolutivos de aplicaciones - Backup & Recovery de aplicaciones - Seguimiento de logs de aplicaciones - Hacking, Spoofing, Backdoors. - Shellscripting, Troubleshooting. - “hacking”: exploración, denegación de servicio, “sniffing”, “spoofing”, “buffer overflows”, “exploits”, “backdoors”, “key loggers”, “phishing”; entre otras - configuration management. - implementaciones con CA Release Automation, Harvest, Bamboo, Puppet, u otras herramientas asociadas a DevOps. - herramientas ágiles (Jira, Confluence, Stash, Artifactory, Sonar, Git, Bamboo, Enter...
<br />Hemos sido informados de que mi presencia en Internet con los dominios de Strato ha sido objeto de un envío masivo de correos electrónicos (SPAM).Al parecer, el ataque se realizó a través de agujeros de seguridad en los scripts PHP/CGI instalados. Sin embargo, también es posible que exista una restricción local en tu sistema (virus, keyloggers, etc.). Otra posibilidad es que las contraseñas sean inseguras.<br /><br />Para detener esta práctica y dejar de poner en riesgo la seguridad del servidor , Strato se ha visto obligado a bloquear brevemente mi(s) dominio(s). <br /><br />El informático que buscamos debe comprobar todo el contenido, así como ...
Quiero un phishing indetectable para GMAIL, y tambien quiero un spoofing, o sea, suplantar identidad de cualquier correo y que el correo llegue a la bandeja de entradas.... 25 $USD.
Quiero tener una protección bastante buena anti ddos. Me atacan bastante a mi maquina donde tengo alojado mis servidores Minecraft. Espero encontrar a alguien que me pueda ayudar y montar todo lo necesario para proteger mi dedicado de fuertes ataques ddos. Un saludo.
...opción para que a algunas fotografías pueda insertarle una marca de agua con el logotipo del portal como se puede observar en la siguiente imagen. Sitio de carga rápido Base de datos (hemeroteca digital) Diseño adaptable a diferentes dispositivos electrónicos. Compatibilidad con la mayoría de navegadores. Diseño eficiente para el posicionamiento en buscadores. Seguridad ante un hacker--phishing, robo de datos y la ejecución de archivos maliciosos para el sistema Integración de RSS Diseño elegante y pulcro. Módulo. de registro de visitantes al momento Libertad para el posicionamiento de banners de publicidad. Administración de contenidos sencilla. Flash al mínimo. HTML5 Enc...
...experience in e-commerce and SMM panel development. The project involves building from scratch an SMM (Social Media Marketing) panel website that should also include the following specific features: - Integration of UpiGateway/UpiApi, Coinbase Commerce, and Sellix payment gateways. It's important that the website supports these payment gateways seamlessly. - User-friendly interface - host with DDOS attack protections The ideal candidate should have: - Proven experience in developing e-commerce websites and SMM panels. - In-depth knowledge of integrating different payment gateways, with previous experience on UpiGateway/UpiApi, Coinbase Commerce, and Sellix being a plus. - The ability to create a responsive and user-friendly interface. - Excellent communication skills and t...
...in-app purchases. This project requires someone with a keen eye for detail and clean, efficient coding practices. What I'm looking for: - Auth (The game should be online) - Ability to create character (with 5 slots [for instance, if you create 1 character, you will still have 4 slots to create more]) selecting 5 characters [each character have different 2 skill-set] - Core mechanics (Upside camera, attack animations, leveling up, experience etc.) - Map Importing from the original (I will give 2 example maps, players should be able to teleport between all maps, The MapLoader I will give has an issue, but you probably can fix that.) - Boss & Dungeon Mechanics (I will show 1 dungeon as example, boss will use skills, animations, all you need to make is scaleable dungeon con...
I'm looking for a professional logo designer to create a modern, icon-based logo for my tech startup. Requirements: - Modern style: The logo should reflect a contemporary and innovative vibe to align with our tech startup image. - Icon-based on the left with text: The preference ...the left with text: The preference is for an icon-based logo, with text after Ideal Skills: - Experience in designing logos for tech companies. - Proficiency in creating modern, minimalistic designs. - A strong portfolio demonstrating your skills in icon-based logo design is a plus. name of the company attached Company is focused on training and educating other companies on cyber security, phishing, writing safe code etc. The focus of the company is to make sure the tech of any company is hack pr...
I'm seeking a skilled professional who can help me with a malware issue affecting multiple websites I own. - All my websites are experiencing the same type of malware. - The primary issue I'm facing is the presence of the malware on the websites. The ideal candidate for this job should have the following skills and experience: - Proven experience in malware removal and website security...websites I own. - All my websites are experiencing the same type of malware. - The primary issue I'm facing is the presence of the malware on the websites. The ideal candidate for this job should have the following skills and experience: - Proven experience in malware removal and website security. - Familiarity with various malware scanning tools. - Implement security measures to a...
I'm looking to create a captivating iOS p...interested in a Cartoonish 2D art style. This should give the game a fun and engaging aesthetic that will appeal to a wide audience. Desired Power-Ups' Functions: - Health Increase: Some power-ups should increase the player's health, allowing them to sustain more damage. - Ability Enhancement: Other power-ups should enhance the player's abilities. This could mean increasing their speed, jump height, or attack power, amongst other possibilities. Ideal Skills and Experience: - Experience in iOS game development - Proficiency in creating 2D games with engaging gameplay - Ability to design and implement boss fights - Understanding of in-game economy and power-up systems - Strong skills in visual design, particularly in cr...
Hello^^^^. I'm using Amazon AWS and would like to request server maintenance. First of all, I would like to ask you to do as much as possible for server security and privacy, such as SSL installation, automatic backup once a day, DDOS attack prevention, system performance optimization, hacking prevention, encryption between data transmissions, real-time monitoring, data recovery, backdoor checking, backdoor checking and deletion of compromised files, attack root identification and blocking, suspicious process occupation identification and recovery, server hacking analysis, server access history tracking, password recovery and complexity setting, virus and malicious software checking,,data leakage prevention.....etc My current monthly budget is about $50, Please send me...
I need a versatile programmer who can work with Python, C or any other programming language to develop a system for identifying Distributed Denial of Service (DDoS) attacks with the help of machine learning algorithms. Skills and Experience: - Extensive experience in Python, C, or similar programming languages - Knowledge of Machine Learning algorithms - Experience in network security would be beneficial - Proven track record in detecting cyber threats in a small network environment. Your success will be judged by your ability to create a reliable, data-driven system capable of efficiently detecting DDoS attacks in a small-scale network.
Looking for a Full Stack Developer >6 years of experience in agile development of scalable SaaS apps in the cybersecurity area: Improve our app (URL Risk assessment) Improve our app (Domain Typosquatting) Improve our project (Darknet Monitoring) Create an app "hackerview" for passive attack surfave enumeration Create an app for detecting spoofed social media profiles Create an app to scrape ransomware threat actor website and maitain stats about those sites Improve an existing app to monitor paste sites Mininmal Tech Experience: MERN, REST API (JWT), Django, Python, Github, CI/CD, Celery, Redis, Linux, Postgress, Kubernetes, Docker, Nginx, JS, HTML5, Protocols (DNS, SMTP, SSL, HTTP..).Detailed app specifications will be shared at a later stage. |------
Lost crypto to scammer My funds were scammed from my account I have all required certifications Scammer used fake platform for trading crypto Preliminary forensic shows my fund is at certain platform Cannot afford legal attorneys fees
...need of a professional white hat hacker's services. I am dealing with some compromised accounts, and your expertise with vulnerability assessment, network penetration testing, and web application security testing is required. Tasks I need help with: 1. Vulnerability Assessment: Conduct a systematic evaluation of my system's vulnerabilities. 2. Network Penetration Testing: Simulate a possible attack on my network to assess its security. 3. Web Application Security Testing: Ensure the security of my web applications against potential threats. Further, I have been compromised on some of my email and social media accounts. I need your support with: - Password Recovery: Restore access to my accounts by recovering or resetting lost passwords. - Account Verification: Conf...
There appears to be a ddos attack on one of my servers, I have cloudflare active on all sites, and even with under attack mode on some sites, the ddos attack continues Ubuntu/Nginx server, no web panel
...experience: - Proficient in sales and lead generation within the cyber security industry - Experience in working with both small businesses and large enterprises - Knowledge of either: ----- A variety of cyber security services, including Network Security, Cloud Security, Vulnerability Assessment & Penetration Testing, Managed Security Services Provider (MSSP), Real-time Security Monitoring, Phishing Awareness Training & Assessment, Application Security Testing, Network / Infrastructure Security Testing, and Mobile Application Security Testing ----- A variety of Big Data services like ETL Testing, Big Data Migration Testing, Big Data Validation, BI Reports testing etc. - A strategic thinker with a keen eye for inbound and outbound marketing opportunities - Target a ...
...experience: - Proficient in sales and lead generation within the cyber security industry - Experience in working with both small businesses and large enterprises - Knowledge of either: ----- A variety of cyber security services, including Network Security, Cloud Security, Vulnerability Assessment & Penetration Testing, Managed Security Services Provider (MSSP), Real-time Security Monitoring, Phishing Awareness Training & Assessment, Application Security Testing, Network / Infrastructure Security Testing, and Mobile Application Security Testing ----- A variety of Big Data services like ETL Testing, Big Data Migration Testing, Big Data Validation, BI Reports testing etc. - Target a wide range of industries such as Healthcare, Finance, Retail, Technology, Start-up, Early...
I'm looking for an experienced developer who can help me add a "Report Phishing" button to my Microsoft Outlook and Office 365 client. This button will allow users to report phishing emails directly to an API. Key Requirements: - Development of a 'Report Phishing' button in the Outlook interface. - Action: Determines if emails is from us (simulation). If yes: our simulates phishing security test come with a special SMTP header. The add-in contacts us servers to record the action of the user in our admin console. Then, the emails gets deleted from the user's inbox. If not: the email could be a legit email, ould be spam or a real phish. The email is sent directly from the user's email client yo our admin consol. Then, the ema...
I'm looking to incorporate Reinforcement Learning algorithms (DQN and Actor Critic) within my existing Godot game. The objective is to enhance the behavior of the slime entity, enabling it to both chase and attack the player. Key Points: - The game is in 2D, so experience with Godot's 2D engine is essential. - This project involves integrating a machine learning plugin into a game. - The AI of the slime entity should be at a basic level, with simple and predictable patterns, and should not be too complex. Ideal Freelancer: - Proficient in Godot engine, with experience in 2D game development. - Skilled in machine learning, particularly with reinforcement learning algorithms such as DQN and Actor Critic. - Understanding of game AI, and able to implement AI at a basic level...
As a Wordpress site owner, I'm interested in conducting security testing with the primary aim of testing penetration resistance. I'm specifically looking to uncover any instances of ineffective firewalls, Denial Of Service attack possibilities in the security system of the website built with Elementor and WooCommerce plugins. Skills and Experience: • Expert in Wordpress security and firewall systems • Comprehensive understanding of penetration testing • Solid background in ethical hacking • Experience with Elementor and Woocommerce platforms • Ability to produce detailed reports Deliverables: • A thorough report on identified vulnerabilities, specifically related to firewalls • Recommendations for improvements in website security &bul...
I am seeking to acquire a comprehensive list of 10,000 fake domains associated specifically Saudi Arabia with phishing scams. This list will primarily serve the purpose of security testing. The focus of this task will be on the accumulation of domains, with no requirement for a detailed description of each domain's potential threat level. The ideal freelancer for this job would have a strong background in cyber security and a profound understanding of Web Scraping, phishing scams.
...entity, enabling it to both chase and attack the player. Key Points: - The game is in 2D, so experience with Godot's 2D engine is essential. - This project involves integrating a machine learning plugin into a game. - The AI of the slime entity should be at a basic level, with simple and predictable patterns, and should not be too complex. Ideal Freelancer: - Proficient in Godot engine, with experience in 2D game development. - Skilled in machine learning, particularly with reinforcement learning algorithms such as DQN and Actor Critic. - Understanding of game AI, and able to implement AI at a basic level. - Good communication skills is a plus, as I would like to understand the process and logic behind the AI's implementation. Upon a successful attack on the ...
I've had a hacking attack in the past and now need to regain my peace of mind by having an ethical hacker check my devices for security. The devices to be checked are my Windows computer and Android Smartphone. Desired Skills and Experience: - Proficient ethical hacker with experience in computer and smartphone security. - Knowledge of Windows and Android operating systems. - Ability to conduct a thorough security check and provide a detailed report of the findings.
Project Requirements A. Implement Hatchetman attack in Contiki 3.0 B. Implement Resolution of Hatchetman attack using 2ACK scheme. C. Evaluate the solution with standard RPL (RFC 6550) under Hatchetman attack D. Detailed documentation of the steps so that it could be replicated. Details are provided in the attached PDF.
I'm in need of a cybersecurity expert who is well-versed with Microsoft Office 365. I've recently received an O365 login report and I'm looking for someone to analyze it. Specifically, I need your expertise to identify any suspicious activities within the access logs, focusing on potential indicators of a shell attack. Key Project Details: - I'm specifically interested in suspicious access logs. Your task is to meticulously scrutinize these logs and provide me with detailed written feedback. The questioned application activity is highlighted in red. - I do not require ongoing monitoring, so this will be a one-time project. Ideal Skills & Experience: - Proficiency in Microsoft Office 365 is a must. You should have deep understanding of the platform and its s...
As security conscious organization, we're hiring a cybersecurity expert for a comprehensive penetration testing on our Linux-based system. Emphasis lies primarily on our web-based applications, with the aim to identify and eradicate any potential vulnerabilities. Key Tasks: - Perform Open Source Intelligence (OSINT) - Port scanning - Man-in-the-middle (MiTM) attack simulation - Focus intensively on injection attacks (SQL, XSS) - Authentication and session management puncturing - Cross-Site Scripting (XSS) evaluation The ideal freelancer will have: - Strong experience in cybersecurity and penetration testing - Excellent knowledge and experience with Linux-based systems - Proven experience in web application security testing - Firm understanding of SQL, XSS and authentication v...
I have a back end code for a project of phishing website detection…it is a CNN vs LSTM comparative study …but I want a person who can develop a UI for that project as well as who can explain that code to us
I'm in need of a professional who can help me set up an intermediate level phishing environment. The purpose is for security training, so the focus is on creating realistic simulations of phishing attacks. Key Requirements: - Simulating Email, Spear, and Direct Phishing Attacks: I aim to cover a wide range of scenarios to better prepare my team for potential threats. - Intermediate Level Difficulty: The environment should challenge my team without being too overwhelming, ensuring effective learning outcomes. Skills and Experience: - Prior experience in setting up phishing environments; specifically, experience in creating intermediate level simulations would be a plus. - In-depth knowledge of different types of phishing attacks and their characteri...
I require a person who has stage combat, choreography, and live performance experience. The main goal is to orchestrate a faux attack scenario wherein I appear to successfully defend myself. Key elements: - Choreographing a believable yet safe confrontation - Ensuring the performance goes as planned in a live setting - Professionalism in order to maintain the illusion for the audience Ideal skills and experience: - Stage combat and choreography - Previous acting or performing arts experience - Ability to react and improvise if things don't go as planned Please note, this is not about encouraging violence or causing fear. It's all about creating an engaging performance that makes me look like a hero in front of my girlfriend.
...specific expertise in creating intuitive user interfaces and seamless user experiences. The task at hand involves crafting the UI/UX for a cutting-edge platform dedicated to attack surface management. Project Overview: Our goal is to develop a user-friendly platform that enables efficient management of attack surfaces, empowering users to identify, assess, and mitigate potential vulnerabilities effectively. As such, we require a designer who can translate complex functionalities into visually appealing and easy-to-navigate interfaces. Key Requirements: - Strong background in UI/UX design - Experience designing for attack surface management or other cybersecurity platforms - Proficient in creating interactive visualizations, intuitive navigation, and real-time moni...
I am seeking a highly skilled Machine Learning (ML) professional who will work...looking forward to meticulous, results-oriented work. Regarding the objective, three classifiers showed the best results: FilteredClassifier, J-48, and RandomForest. Considering the second objective, InfoGainAttributeEval method showed the best performance. Hence, it is highly recommended to build an ensemble model that consists of the three best classifiers to solve the problem of website phishing. Metaheuristic algorithms can be used to design feature selection algorithms with greater performance. Remember, your ability to interpret categorical data and convert it into actionable information through a Python-based machine learning model is crucial. Apply now and let’s create something g...
I'm in need of a skilled professional who can help me set up SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) for my Gmail account. Key Tasks: - Set up SPF: I need you to authenticate my emails using SPF to prevent spoofing and phishing attacks. - Configure DKIM: Implementing DKIM will ensure that my emails are not tampered with in transit and that my domain is not being abused by spammers. Requirements: - Proficient in email authentication protocols. - Experience with DNS settings and domain authentication. - Familiarity with Gmail's email authentication systems. - Ability to explain the process clearly and concisely. Please provide a brief overview of your relevant experience in the field.
I need an expert in Natural Language Processing, specifically in sentiment analysis and text classification, to assist with my project. While I haven't chosen a programming language for this task, I am open to suggestions. It's currently unclear if I will need a pre-trained or custom NLP model, so both options should be explored. Best fit for the job would include: - Extensive experience in NLP, especially sentiment analysis and text classification - Ability to provide insights on different programming languages for the task - Experience with both pre-trained and custom NLP models.
I'm currently in an urgent situation where my website has seemingly vanished and a malware infection has been detected. The public PHP file has been modified which I discovered within the last 24 hours. Unfortunately...last 24 hours. Unfortunately, I have not been able to recover any data or files from my website. I'm looking for a skilled specialist with experience in: - Website restoration - Malware removal and prevention - PHP recovery and security The ideal freelancer would be someone who can help recover my lost data, restore the functionality of my website, mitigate the effect of the current malware attack, and ensure the robust constitution of the website to prevent future breaches. Quick turnaround is of essence due to the critical nature of this situation.
It's unfortunate we've found ourselves under a malware attack on our WordPress website. We believe it's due to code injections, though we can't rule out other possibilities. As a result, we're looking to onboard a professional with relevant experience in swiftly identifying and effectively resolving such issues. Skills & Experience: - Proven experience in dealing with WordPress malware attacks - Proficient in identifying and resolving code injections - Strong security strategy for preventing future attacks Your application should demonstrate your previous experience in handling similar situations. Evidence of your ability to work quickly and effectively is crucial to this emergency! Let's secure our website and prevent this from happening again....
I am looking for a skilled web developer who can create a robust and secure web application. The primary aim of this tool is to provide crucial security features to users. Key Features: - Password Strength: The app should be able to evaluate the strength of the passwords users choose. - Phishing Email Checker: It should have a feature that can determine if an email is a potential phishing attempt. - Secure Password Storage: The application needs to securely store user passwords. The web application will also need to have the following features: - User Authentication: - Username and Password - Two-factor Authentication
Occasionally a fraudulent client or scammer will post a project, causing trouble for freelancers. Find out how you can spot the early warning signs.