Wlan attackstrabajos

Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    2,000 wlan attacks trabajados encontrados, precios en USD
    NFC BRIDGE Finalizado left

    necesito un puente entre lector y emulador, el lector debe ser apk para android y el emulador puede ser para windows aqui un ejemplo:

    $185 (Avg Bid)
    $185 Oferta promedio
    10 ofertas

    ...--------------------------------------------------------------------------- We are interested in hiring someone with knowledge in the world of video games if possible the video game Rust, is not essential. To create a story in seasons, the idea is to create an island so that players can begin to create their life and that on that island happen certain events as climatological events, zombie attacks, mini bosses, etc.. In conclussion, the events that directly affect the way the inhabitants of the island play. All events should be divided into 12 parts so that each event occurs once a month. ...

    $41 (Avg Bid)
    $41 Oferta promedio
    1 ofertas

    Hola Amigos Profesionales. Tengo un bar y deseo una aplicación para que mis clientes busquen su música favorita y la pongan en el bar. La idea es que la APP busque videos en Youtube y los ponga en las pantallas LED. El usuario tendría acc...que mis clientes busquen su música favorita y la pongan en el bar. La idea es que la APP busque videos en Youtube y los ponga en las pantallas LED. El usuario tendría acceso al WiFi del bar y existe un PC que esta conectado al WiFi (en la misma LAN). Los televisores son réplicas en una red HDMI cuta señal sale del PC por la tarjeta gráfica. Es decir el dispositivo del cliente está en la misma Red (WLAN). Será posible hacerlo? Espero su propuesta y de preferencia me gustar&iacut...

    $599 (Avg Bid)
    $599 Oferta promedio
    16 ofertas

    Seguridad en redes Wi-Fi Seguridad en la ocultación del SSID o filtrado de direcciones MAC Identificar entre las tramas la ejecución de un esquema EAP.

    $37 (Avg Bid)
    $37 Oferta promedio
    4 ofertas

    ...Manejo de las Herramientas de de Cableado ón a :Conocimiento en S.O 7/8/10/Server en administración de usuarios, servicios y recursos en redConocimientos de Sistema Administrativo Profit Plus 2K8, Nomina 2K12 y Contabilidad 2K12 (No Limitativo).Conocimientos Base de Datos SQL 2008 (No LimitativoConocimientos en Redes LAN/MAN/WLAN.-...

    $244 (Avg Bid)
    $244 Oferta promedio
    1 ofertas

    ...Security, Certificacion en Marca HP ASE, Certificacion en Marca Huawei* Nivel Técnico Intermedio en el idioma inglesExperiencia de 4 años en: * Administración y soporte de soluciones de conectividad LAN/WAN/WLAN en empresas de cobertura a nivel regional y nacional. * Configuración de equipos activos de red. * Conocimiento avanzado de protocolos de Enrutamiento LAN, WAN.* La experiencia debe ser sobre marcas Cisco, Huawei, HP, DELL.* Debe tener conocimiento complementarios en seguridad en redes y/o VOIP.* Experiencia relacionada con diseño e implementación de soluciones de conectividad LAN/WAN/WLAN en redes de misión critica para clientes corporativo sector gobierno y privado * La experiencia debe incluir Diseño sobre...

    $244 (Avg Bid)
    $244 Oferta promedio
    1 ofertas
    Especialista Finalizado left

    Importante Empresa en Tecnologías de la Información solicita: Especialista en Redes y Seguridad. DATOS GENERALES:Escolaridad: ...Técnico, Ing o Licenciatura en sistemas Comunicacionales Informática o carrera a fin INDISPENSABLE CONTAR CON CARTA DE PASANTE O TITULO Edad: 26 años en adelante Zona de trabajo: interlomas Horarios: Lunes a Viernes de 9:00 a 7:00 Sueldo: 16,000 + prestaciones de ley y superiores CONOCIMIENTOS INDISPENSABLES :Experiencia mínima de 2 años en el manejo de redes Experiencia en seguridad en redes LAN y WLAN Contar con Certificación CCNA en proceso de concluirla o con diplomados o curso sobre esta Experiencia en suporte a redes Experiencia en manuales de seguridad SI ESTAS INTERESADO Y CUMPLES CON LOS RE...

    N/A
    N/A
    0 ofertas

    Se requiere una Administradora de Red Junior con el siguiente perfil:Profesional Técnica o Universitaria (estudios culminados) de las carreras de Informática, Sistemas o afines con especialización en Redes y de cableado de Administración de Servidores entorno ón DNS y DHCP – Management - LAN - WLAN y Wireless – Server y DFS Management – I y CCNA II - AvanzadoActive Directory y Group Policy Management – ón de Central Telefónica Alcatel ón de Bases de Datos SQL 20012 (deseable)Administración Office de software ofimáés nivel adjuntar C.V en su perfil.-

    N/A
    N/A
    0 ofertas

    Empresa de tecnología requiere ingenieros para administración de servidores WMWARE, Linux y WINDOWS, DHCP, DNS, AD, Google APPS, Redes LAN, WLAN, Provevedores de comunicaciones, documentación de red Indicadores de servicio, administración de redes y canales de comunicaciones, adminsitracion de UTMs y Access points, administración de seguridad informática. Gestión de proveedores y contratos. Administración de la configuración. Gestión de respaldos y labores administración y soporte de plataformas informáticas. Recibe las requisiciones de servicio de los clientes y se relaciona de forma directa con ellos. Reporta y soluciona incidentes. Se encarga de verificar cada aspecto importante de la plataforma...

    $244 (Avg Bid)
    $244 Oferta promedio
    1 ofertas

    ...más de 5 años en el diseño de soluciones de seguridad de red y gestión de proyectos de despliegue de infraestructuras en el ámbito de operadoras de telecomunicación (redes fijas y móviles).<br /><br />Amplios conocimientos de los protocolos y tecnologías de red más habituales: GTP, GRX, GGSN, GSM/GPRS, UMTS, VSAT, SMATV, DVB, RDSI, Ethernet, FDDI, DWDM, XDSL, ATM, FrameRealy, X25, TCP/IP, LAN/WAN/WLAN, VoIP, WiFi/WiMax, WMM, QoS/QoE, etc. <br />Estar familiarizado con equipos de los fabricantes telco más habituales (Ericsson, Cisco, Alcatel, Huawei, etc.).<br /><br />Experiencia/conocimiento de las...

    $267 (Avg Bid)
    $267 Oferta promedio
    5 ofertas
    Network and Web Security Testing 13 horas left
    VERIFICADO

    I'm in need of an ethical hacker to assist in testing the security of our network and web applications. This is to ascertain the effectiveness of our current security measures. Key Tasks: - Network penetration testing - Web application security testing Access: - You will have full system access, which will enable you to conduct comprehensive testing across all areas. Ideal Experience: - P...focus on network and web application security testing - Familiarity with various penetration testing tools and methodologies - Ability to document and communicate vulnerabilities effectively - Strong understanding of IT security principles and best practices. Your assistance in this project will be invaluable in helping us fortify our security measures and protect our systems from malicious ...

    $36 (Avg Bid)
    Urgente
    $36 Oferta promedio
    9 ofertas

    I need a versatile programmer who can work with Python, C or any other programming language to develop a system for identifying Distributed Denial of Service (DDoS) attacks with the help of machine learning algorithms. Skills and Experience: - Extensive experience in Python, C, or similar programming languages - Knowledge of Machine Learning algorithms - Experience in network security would be beneficial - Proven track record in detecting cyber threats in a small network environment. Your success will be judged by your ability to create a reliable, data-driven system capable of efficiently detecting DDoS attacks in a small-scale network.

    $389 (Avg Bid)
    $389 Oferta promedio
    16 ofertas

    ...process seamlessly within the application. 2. **UI/UX Design:** - Design and implement intuitive screens for phone number entry and OTP verification. - Ensure a smooth and responsive user experience throughout the authentication flow. 3. **Security Measures:** - Implement encryption techniques to protect user data. - Incorporate measures to prevent security threats like brute force attacks and unauthorized access. 4. **Error Handling:** - Implement error handling mechanisms to handle edge cases gracefully. - Provide informative feedback to users during the authentication process. 5. **Testing:** - Conduct rigorous testing to validate the reliability and security of the authentication system. - Perform unit tests and integration tests to ensure robust f...

    $95 (Avg Bid)
    $95 Oferta promedio
    23 ofertas

    I'm in need of an experienced developer to create a new cryptocurrency that is based on the Bitcoin blockchain platform. Key Features: * Fast Transaction Processing: The cryptocurrency should be designed to complete transactions swiftly and efficiently. * High Security: It is of paramount importance that the cryptocurrency has advanced security features to protect it against cyber-attacks and fraud. * Scalability: The cryptocurrency must be capable of scaling to accommodate a high volume of transactions as the user base grows. Ideal Skills: * Experience with the Bitcoin blockchain platform * Proven experience in developing cryptocurrency * In-depth understanding of security protocols * Knowledge of frameworks for scaling up systems Prior experience with cryptocurrency cre...

    $2516 (Avg Bid)
    $2516 Oferta promedio
    67 ofertas

    I urgently require a ...breach on my website. The site was hacked, and I received a notification from a security provider regarding this. The primary goal is to remove the malware and secure the website to prevent future attacks. Key Tasks: - Identify the extent of the breach and locate the malware. - Completely remove all malware, malicious code, and backdoors. - Implement security protocols and measures to fortify the site from future breaches. Requirements: - Proven experience in restoring hacked Wordpress sites and proficient in malware removal. - Expertise in security and best practices to prevent cyber-attacks. - Excellent communication skills and a proactive approach to problem-solving. Your expertise is urgently needed to rectify this issue and ensure the site i...

    $159 (Avg Bid)
    $159 Oferta promedio
    35 ofertas

    I urgently require a ...breach on my website. The site was hacked, and I received a notification from a security provider regarding this. The primary goal is to remove the malware and secure the website to prevent future attacks. Key Tasks: - Identify the extent of the breach and locate the malware. - Completely remove all malware, malicious code, and backdoors. - Implement security protocols and measures to fortify the site from future breaches. Requirements: - Proven experience in restoring hacked Wordpress sites and proficient in malware removal. - Expertise in security and best practices to prevent cyber-attacks. - Excellent communication skills and a proactive approach to problem-solving. Your expertise is urgently needed to rectify this issue and ensure the site i...

    $150 (Avg Bid)
    $150 Oferta promedio
    127 ofertas

    ...machine learning system aimed at predicting heart risk issues for patients. This system is intended to primarily benefit doctors, patients, and admin workers in the medical field. Key Responsibilities: 1. Developing Predictive Models: The main objective of this system is to efficiently predict the likelihood of a patient having heart-related issues, specifically coronary artery disease, heart attacks, and arrhythmia. Expertise in machine learning algorithms and predictive modelling is crucial. 2. Integration of Data Sets: The system must be able to handle vast sources of patient data to generate accurate predictions. These include patient's medical history, lifestyle information, as well as real-time health data. Extensive knowledge in data integration and management is n...

    $153 (Avg Bid)
    $153 Oferta promedio
    28 ofertas

    I'm looking for a knowledgeable and experienced individual to review my technical project, specifically focusing on network security, cyber attacks, and comprehensive testing. Key Requirements: - In-depth knowledge of network security, cyber attacks, and testing methodologies - Proven experience in identifying vulnerabilities and protecting against cyber attacks - Ability to conduct comprehensive testing and provide detailed reports - Experience working with Raspberry Pi and understanding its security concerns The ideal candidate will have a strong background in cyber security and will be able to provide insights and recommendations to enhance the security of the project.

    $163 (Avg Bid)
    $163 Oferta promedio
    19 ofertas

    We are in urgent need of an OVH Server Security Specialist to address recurring security issues with our server. Our server has been frequently compromised by viruses, resulting in the creation of malicious files and folders across directories. Additionally, these viruses have been generating .htaccess files that block access to internal pages of o...environment and business needs. 3- Configure and optimize server settings, firewall rules, and access controls to enhance security posture and prevent future breaches. 4- Install and configure robust antivirus and malware detection solutions to proactively identify and remove malicious software. If you have the expertise and experience to secure our OVH server and protect websites from malicious attacks, please apply to this post. Be...

    $12 / hr (Avg Bid)
    $12 / hr Oferta promedio
    9 ofertas

    ...skilled cyber security professional who can assist with ensuring the integrity and safety of our systems. The ideal candidate should have expertise in network security, application security, and data security. Key project components include: - Conducting a thorough vulnerability assessment to identify potential weaknesses in our current systems. - Performing penetration testing to simulate cyber-attacks and evaluate the effectiveness of our security measures. - Executing a comprehensive security audit to ensure that our systems are aligned with industry best practices and compliant with HIPAA, GDPR, and PCI DSS. Your role will be crucial in ensuring our organization is not only secure from cyber threats, but also in compliance with relevant regulations. Experience with these c...

    $16 / hr (Avg Bid)
    $16 / hr Oferta promedio
    10 ofertas

    First, please note that I don't do business with low-ballers. This document contains all of the details of the project. I went over it extensively with the assistance of Gemini AI to make sure it was complete and thorough. So if you plan to place a low-ball price in order to get me to talk with you so you can give me your real, higher price later, don't waste your time bidding at all because...add functionality for: Capturing an image for each garden space Triggering email sending functionality 8. Security Considerations: The developer should implement security measures throughout the application: Secure storage of SMTP server credentials within a bundled configuration. Input validation for user-entered data (e.g., email address). Sanitize user input to prevent potential injec...

    $582 (Avg Bid)
    $582 Oferta promedio
    100 ofertas

    I'm in need of an expert to analyze our Joomla website's recent spike in traffic. I'm concerned whether this is genuine or bot-generated. This is a high-priority task for me, and I need immediate action. Key Tasks: - Verify i...bot-generated - Implement necessary security measures to prevent future bot traffic - Restore the website online and ensure it can handle an increased traffic load Ideal Freelancer: - Proficient in Joomla and its security features - Experienced in analyzing web traffic and differentiating bot-generated traffic from genuine - Familiar with implementing security measures to protect websites from bot attacks - Available to tackle this issue urgently If you're confident in your abilities to address these requirements promptly and effectivel...

    $140 (Avg Bid)
    $140 Oferta promedio
    65 ofertas

    I'm in need of a cybersecurity expert who is well-versed with Microsoft Office 365. I've recently received an O365 login repo...with detailed written feedback. The questioned application activity is highlighted in red. - I do not require ongoing monitoring, so this will be a one-time project. Ideal Skills & Experience: - Proficiency in Microsoft Office 365 is a must. You should have deep understanding of the platform and its security features. - Extensive experience in cybersecurity, particularly in dealing with shell attacks and access logs. - Strong analytical and reporting skills. You have to be able to translate your findings into a comprehensive, detailed report. Your analysis and insights will be crucial for me to ensure the security of my systems. Looking forw...

    $74 (Avg Bid)
    $74 Oferta promedio
    18 ofertas

    I'm in need of an hack...penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are crucial for ...

    $100 (Avg Bid)
    $100 Oferta promedio
    16 ofertas

    I'm currently facing potential malware attacks causing unexpected slowdowns, particularly affecting my website load times. Hence, I'm in urgent need of a knowledgeable cyber security professional who can identify and rectify issues within my server files. Key Responsibilities: - Investigate the root cause for the slowdown of the website load times - Pinpoint potential malware in server files - Advance and fortify the security system to prevent future occurrences Ideal Skills: - Proficiency in cybersecurity - Solid understanding of server operations, particularly SQL - Experience in malware detection and prevention Your task: Use your expertise to bring back operational efficiency and bolster my domains server's security. If you can catch the malware predator an...

    $111 (Avg Bid)
    $111 Oferta promedio
    8 ofertas

    ...conscious organization, we're hiring a cybersecurity expert for a comprehensive penetration testing on our Linux-based system. Emphasis lies primarily on our web-based applications, with the aim to identify and eradicate any potential vulnerabilities. Key Tasks: - Perform Open Source Intelligence (OSINT) - Port scanning - Man-in-the-middle (MiTM) attack simulation - Focus intensively on injection attacks (SQL, XSS) - Authentication and session management puncturing - Cross-Site Scripting (XSS) evaluation The ideal freelancer will have: - Strong experience in cybersecurity and penetration testing - Excellent knowledge and experience with Linux-based systems - Proven experience in web application security testing - Firm understanding of SQL, XSS and authentication vulnerabil...

    $628 (Avg Bid)
    Acuerdo de Confidencialidad
    $628 Oferta promedio
    13 ofertas

    ...hashing and the use of access tokens, to prevent unauthorized access. 5. Input Validation and Sanitization: To mitigate the risk of security vulnerabilities, the application will implement strict input validation and sanitization techniques. This section emphasizes the importance of validating user input to prevent common vulnerabilities, such as SQL injection and cross-site scripting (XSS) attacks. 6. Secure Transaction Processing: The application will incorporate secure transaction processing mechanisms to ensure the integrity and confidentiality of financial transactions. This section discusses the implementation of secure communication protocols, such as HTTPS, to protect sensitive data during transit. It also highlights the need for transaction validation and auditin...

    $289 (Avg Bid)
    $289 Oferta promedio
    9 ofertas

    ...crucial project, we aim to significantly improve the cybersecurity of data stored on the Google Cloud Platform (GCP), using cutting-edge artificial intelligence methods. Our main goals are as follows: - Use Machine Learning and Deep Learning to detect and mitigate any potential cyber threats before they occur. - Utilize AI to predict and intercept Unauthorized Access, Data Breaches, and Malware Attacks, thereby bolstering our defense mechanisms. The ideal candidate will be proficient in AI, specifically Machine Learning and Deep Learning, and have extensive knowledge of cybersecurity on clouds. Experience with GCP would be a valuable advantage. It's essential for the chosen freelancer to be adept at translating complex AI algorithms into practical cybersecurity solutions. ...

    $1185 (Avg Bid)
    $1185 Oferta promedio
    48 ofertas

    ...within the v2x technology landscape. This position is for a 3-year period and will focus on the following areas: - Threat Detection: The primary objective is to identify and analyze potential threats to v2x systems. Specifically, I am concerned about Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. The ideal candidate should have: - A strong background in v2x security research, with a focus on threat detection. - Extensive knowledge and experience in Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. - Experience presenting and publishing research at conferences like USENIX and NDSS. - The ability to produce high-quality research papers and practical solutions. - Affiliation with a research institute to e...

    $1255 (Avg Bid)
    $1255 Oferta promedio
    9 ofertas

    ...intermediate level phishing environment. The purpose is for security training, so the focus is on creating realistic simulations of phishing attacks. Key Requirements: - Simulating Email, Spear, and Direct Phishing Attacks: I aim to cover a wide range of scenarios to better prepare my team for potential threats. - Intermediate Level Difficulty: The environment should challenge my team without being too overwhelming, ensuring effective learning outcomes. Skills and Experience: - Prior experience in setting up phishing environments; specifically, experience in creating intermediate level simulations would be a plus. - In-depth knowledge of different types of phishing attacks and their characteristics. - Understanding of cybersecurity best practices and knowledge of ...

    $63 (Avg Bid)
    $63 Oferta promedio
    5 ofertas

    ...communication tools like email and messaging apps enhances communication among individuals in the workplace and beyond. 3. **Time Saving:** Technology allows tasks to be accomplished more quickly, saving valuable time that can be used for other activities. **Challenges:** 1. **Cybersecurity Threats:** With increased reliance on technology, individuals and organizations are exposed to risks of cyber-attacks and data breaches. 2. **Social Isolation:** Overreliance on technology can lead to social isolation and a loss of genuine personal interaction. 3. **Work-Life Balance:** Increased access to technology may make it challenging to set boundaries between work and personal life, negatively impacting the balance between them. **Additional Challenges and Benefits:** 4. **Change...

    $14 / hr (Avg Bid)
    $14 / hr Oferta promedio
    31 ofertas

    I'm in need of a skilled professional who can help me set up SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) for my Gmail account. Key Tasks: - Set up SPF: I need you to authenticate my emails using SPF to prevent spoofing and phishing attacks. - Configure DKIM: Implementing DKIM will ensure that my emails are not tampered with in transit and that my domain is not being abused by spammers. Requirements: - Proficient in email authentication protocols. - Experience with DNS settings and domain authentication. - Familiarity with Gmail's email authentication systems. - Ability to explain the process clearly and concisely. Please provide a brief overview of your relevant experience in the field.

    $113 (Avg Bid)
    $113 Oferta promedio
    30 ofertas

    ...future protection, ensuring my website remains secure and protected from potential threats. Key requirements: - Immediate automatic removal of existing malware: I need the malware on my site to be removed straightaway to ensure my site is clean and safe for visitors. - Firewall protection: I am specifically looking to implement a strong firewall to prevent any future malware infiltrations or attacks on my WordPress site. It's important for me to find a freelancer who has a proven track record in dealing with malware removal on WordPress sites and can effectively set up and manage a reliable firewall system. Your expertise and experience in website security will be highly valued in this project. Please quote the reference "WPMalware" when applying for this projec...

    $40 (Avg Bid)
    $40 Oferta promedio
    77 ofertas

    We are an e-commerce company with a WooCommerce store. We are looking for an experienced freelancer with expertise in WooCommerce and internet security to analyze our store and protect it from attacks. **Liabilities:** - Analysis of current WooCommerce store security. - Proposals and implementation of improvements to increase security. - Installation and configuration of security plugins. - Provide training to staff for optimal use of security tools. **Requirements:** - Experience in the field of e-commerce and specifically WooCommerce. - Expertise in network and web security. - Ability to easily communicate with our staff and provide training and support. - Ability to provide evidence-based suggestions and solutions. If you believe you have the necessary experience and skills fo...

    $68 (Avg Bid)
    $68 Oferta promedio
    66 ofertas

    I'm seeking a professional PHP developer to create a custom CMS that not o...allow clients to customize meta tags, including title tags, meta descriptions, and keywords for each page. - XML Sitemap Generation: The CMS should automatically generate and update an XML sitemap, making it easier for search engines to crawl and index the site. Security Features: - Vulnerability Protection: Ensure the CMS is robust against common web vulnerabilities like SQL injection and XSS attacks. Skills and Experience: - Strong PHP and CMS development background. - Proficiency in implementing SEO best practices. - Experience in web security and vulnerability protection. - Excellent communication skills and ability to understand and incorporate client requirements effectively. Budget is not mo...

    $530 (Avg Bid)
    $530 Oferta promedio
    60 ofertas

    ...and trends. Key Skills and Experience: - Proficient in PHP/SQL: You should have proven experience in PHP and SQL to create a robust, secure and user-friendly script. - Review System Development: A good understanding of how review capturing and redirection works will be crucial. - Web Security: An understanding of web security practices as the script will need to be robust against potential attacks....

    $113 (Avg Bid)
    $113 Oferta promedio
    39 ofertas

    Cyber warfare allows a state to conduct foreign policy in a more ethical way than traditional war.

    $54 (Avg Bid)
    $54 Oferta promedio
    20 ofertas
    Veeam Expert Engineer Finalizado left

    ...comprehensive documentation of Veeam configurations, procedures, and best practices. Share knowledge with team members through training sessions, technical presentations, and knowledge base articles to foster skill development and operational excellence. Security and Compliance: Implement security best practices to safeguard backup data against unauthorized access, data breaches, and ransomware attacks. Ensure compliance with relevant regulatory requirements and industry standards. Qualifications: Bachelor’s degree in Computer Science, Information Technology, or a related field (or equivalent work experience). Extensive experience (X years) working with Veeam Backup and Replication solutions in enterprise environments. Proficiency in designing, implementing, and managing V...

    $299 (Avg Bid)
    $299 Oferta promedio
    4 ofertas

    ...interest in "Side channel" detection. Skills and Experience: - Solid Python programming ability -Familiarity with collecting micro architectural traces - Familiarity with cybersecurity concepts - Experience in creating machine learning algorithms for detecting malware - Comprehensive knowledge in dealing with Side Channel attacks. Ideal candidates must have: - Proven experience in Python programming - Prior work in malware detection, particularly Side Channel attacks - A solid understanding of the different types of malware - The ability to work efficiently and deliver results in a timely manner. The goal is to create an efficient model that can detect various types of malware, with a particular interest in Side channel detection. The ideal candidate shoul...

    $1031 (Avg Bid)
    $1031 Oferta promedio
    24 ofertas
    Game Concept Art Finalizado left

    Is a sunny day, on a plateau, in the clouds a burning plane crashes and goes beyond the screen, the shot drops in altitude and stops on the...and behind them we glimpse some civilians running away. We continue and arrive at the edge of the dam, we jump down and land in a stream with water at mid-waist that runs through a dark forest. This time the main character has to continue towards the right, for the first few seconds he is slowed down by the water but shortly after he comes out of it, we meet some wild boars and a bear who attacks us while the wild boars run away... after a short while the forest ends, we find ourselves at the open to the sun in the middle of the fields, we don't even have time to get used to it before after a few moments of being outdoors and con...

    $32 (Avg Bid)
    $32 Oferta promedio
    1 ofertas

    It's unfortunate we've...malware attack on our WordPress website. We believe it's due to code injections, though we can't rule out other possibilities. As a result, we're looking to onboard a professional with relevant experience in swiftly identifying and effectively resolving such issues. Skills & Experience: - Proven experience in dealing with WordPress malware attacks - Proficient in identifying and resolving code injections - Strong security strategy for preventing future attacks Your application should demonstrate your previous experience in handling similar situations. Evidence of your ability to work quickly and effectively is crucial to this emergency! Let's secure our website and prevent this from happening again. Your expertise...

    $419 (Avg Bid)
    $419 Oferta promedio
    152 ofertas

    I'm looking for an ethical hacker to test and secure my web application, focusing on specific vulnerabilities and conduct a thorough background verification. - Web Application Security: - Focus on existing vulnerabilities - Emphasis on Injection attacks, XSS, and other potential weaknesses - Particularly interested in vulnerabilities related to social media integrations - Background Verification: - Criminal records checks - Education and credential verification - Character check Ideal Skills: - Proficient in ethical hacking - Strong experience in web application security - Knowledge of common web vulnerabilities - Competency in conducting background checks - Attention to detail and thoroughness in their work. Please bid if you have the necessary skills and exper...

    $103 (Avg Bid)
    $103 Oferta promedio
    8 ofertas

    ...against future incidents(will release milestone after 10 days), and I won't buy sitelock or sucuri these kind of service, but I will like long term serivce. Key tasks include: - Identify and remove malware: Addressing the specific malware identified - Website restoration: Ensuring the site is fully functional post-malware removal - Warranty: Offer a guarantee/warranty against further malware attacks Ideal freelancers should have: - Proven experience in WordPress website security and malware removal - Experience in working with E-commerce websites - Ability to provide a warranty for future protection - Strong communication skills, as I prefer instant messaging for updates and progress tracking. Overall, I am looking for a reliable and efficient developer who can ensure th...

    $26 (Avg Bid)
    $26 Oferta promedio
    74 ofertas

    ...and NGINX like WAF to prevent unauthorized access and malicious activities. - Malware Detection: An efficient malware detection mechanism needs to be integrated to scan for and eliminate threats within my setup. - DDoS Prevention: The implementation should include tools and configurations to mitigate risks related to DDoS attacks. Specific OWASP Top 10 Concerns: - Injection: I'm concerned about potential vulnerabilities that could lead to code or data injection attacks. - Cross-Site Scripting (XSS): The setup must effectively protect against any XSS vulnerabilities. - Insecure Direct Object References: I need to ensure that proper protection is in place to avoid any object reference issues. Ideal Candidate: - Proficient in Docker and NGINX - Strong background in im...

    $95 (Avg Bid)
    $95 Oferta promedio
    9 ofertas

    ...against unauthorized transfers. Ownership Verification: Develop methods for verifying ownership of a specific NFT by a given Ethereum address. Provide public access to ownership data of NFTs. Metadata Handling: Ability to store metadata of NFTs, such as images, descriptions, links to external resources, etc. Support for the ERC-721 standard for metadata. Security: Ensure contract security against attacks and vulnerabilities, including protection against stack overflow, recursive calls, and other known threats. Gas Limitations: Optimize gas usage for transactions related to the creation, transfer, and ownership verification of NFTs. Auditing: Document code with detailed comments explaining the logic and structure of the contract. Provide auditing information to ensure contrac...

    $7 / hr (Avg Bid)
    $7 / hr Oferta promedio
    28 ofertas

    ...(CBT) approach. Key Details: - The therapist should be specialized in CBT with substantial experience applying this approach. - You will provide online sessions, so the ability to be engaging and effective through remote communication is essential. - A critical part of the role will involve designing CBT treatment plans and implementing them during therapies. - Main issues are Anxiety panic attacks attention deficit and depression Ideal Skills and Experience: - Licensed Psychologist - Experienced in Cognitive Behavioral Therapy - Proficient in delivering online therapy - Strong communication skills Your ultimate goal as part of this project will be to assist in promoting mental health wellness through online therapy sessions. The ability to create a secure and comfor...

    $18 / hr (Avg Bid)
    $18 / hr Oferta promedio
    11 ofertas

    ...ads complying with the policies, they're regularly disapproved due to 'circumventing systems policy'. I need a Google Ads expert who understands this error and knows how to resolve it, ensuring my ads comply with Google's policies. • False Compromise Alert I'm getting false warnings of a 'compromised website'. My website is secure without any unauthorized access or signs of malware or phishing attacks. I'm looking for someone with experience in dealing with such false positives who can rectify this issue. Ideal Skills: • Extensive experience with Google Ads • Knowledge of Google's advertising policies • Ability to troubleshoot and resolve conflict errors • Experience dealing with website security issues, ...

    $93 (Avg Bid)
    $93 Oferta promedio
    20 ofertas

    I'm looking for an ethical hacker with specialization in network security, web application security, and social engineering attacks to protect vital medical records online. The Job's Purpose: - Scrutinize medical records to identify errors or discrepancies - Make crucial edits and effectively remove them from a specific website Why? Simply put, it’s about maintaining utmost confidentiality. Here are the ideal skills the job requires; Key Skills: - Substantial experience in cybersecurity; network and web application security in particular - Familiarity with social engineering attacks is a plus - Feeled capcacity to review, edit and ethically hack medical records online - Sharp eye to detect discrepancies in such records If you possess the aforementioned ca...

    $23 / hr (Avg Bid)
    $23 / hr Oferta promedio
    23 ofertas

    I'm looking for a skilled animator to create a cybersecurity video tailored for all employees in my company. This video will serve as a tool to raise awareness about common cyber threats, educate on how to recognize and prevent cyber attacks, and provide guidelines for secure online behavior. Requirements: - Proficiency in creating animated explainer videos. - Strong understanding of cybersecurity concepts. - Ability to convey technical information in a simple, engaging manner. - Prior experience in creating educational videos preferred. The ideal freelancer should be able to blend creativity and technical knowledge to deliver a compelling video that will effectively inform and engage our diverse workforce.

    $128 (Avg Bid)
    $128 Oferta promedio
    79 ofertas