Anti ddos attack jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 anti ddos attack jobs found, pricing in INR

    As a client in financial services, I'm in need of a comprehensive anti-fraud transaction monitoring system that leverages AI technology to enhance my fraud detection capabilities. Key Features Required: - Real-time monitoring: The system must be capable of monitoring transactions as they occur, allowing for immediate action if unusual activity is detected. - Pattern recognition: The ability to identify and flag patterns of potential fraud in transactions. - Alert notifications: The system should send out alerts to designated parties when suspicious transactions are identified. - User authentication: Strong user authentication processes to ensure that the system is secure and only authorized personnel can access and modify it. - Dynamic profiling: The system should be able to c...

    ₹372572 (Avg Bid)
    ₹372572 Avg Bid
    24 bids

    I'm in need of a skilled developer to craft an AI-based firewall in a SaaS format. Features must include: - Real-time threat detection - Automated incident response - A user-friendly dashboard. The finished product wi...a skilled developer to craft an AI-based firewall in a SaaS format. Features must include: - Real-time threat detection - Automated incident response - A user-friendly dashboard. The finished product will need to be hosted on a direct server. For security, it must meet these criteria: - Basic security measures - Advanced threat detection and prevention - Customizable security rules - DDOS attack prevention. Applicants with a strong background in AI, SaaS development, and cloud computing are desired, particularly those with experience in high...

    ₹27011 (Avg Bid)
    ₹27011 Avg Bid
    12 bids

    I am looking for an experienced press release writer to skillfully craft a compelling press release to raise brand awareness for our innovative anti-vibration mount. The release should be geared towards industry professionals, highlighting its unique problem-solving capability. Expectations are: - Exceptional writing skills to convey our message in a concise yet captivating way. - Ability to tailor content specifically targeting industry professionals. - In-depth understanding of our product's problem-solving capability and translating it into an engaging narrative. - Experience in distributing press releases is preferable. Your knowledge in technical or industrial products is a significant plus. This project will require a deep understanding of the product and its unique ...

    ₹1251 (Avg Bid)
    ₹1251 Avg Bid
    7 bids

    ...with implementing security measures within AWS, particularly leveraging AWS WAF, AWS IP Reputation, and AWS CloudTrail. Key Responsibilities: - Implement rigorous access control policies to ensure only authorized personnel can access our resources. - Configure and fine-tune AWS WAF to establish robust web application firewall rules, block specified IP addresses, and provide protection against DDoS attacks. - Set up and monitor AWS IP Reputation, ensuring that any malicious IP addresses are effectively blocked from our system. Skills and Experience: - Proven experience in implementing AWS security measures, particularly with AWS WAF, AWS IP Reputation, and AWS CloudTrail. - Strong understanding of encryption protocols and access control policies within AWS. - Experience with mo...

    ₹38516 (Avg Bid)
    ₹38516 Avg Bid
    18 bids

    I need a professional editor with advanced expertise in epidemiology to help with editing a scientific article. The task involves a comprehensive spell-checking, anti-plagiarism review, text structuring, and abbreviation verification. Key Responsibilities: - Comprehensive spell-checking: Ensuring that the text is free of any spelling errors. - Anti-plagiarism review: Verify the originality of the content and eliminate any possible infringements. - Text structuring: Help in restructuring the article to enhance its readability and flow. - Abbreviation verification: Double-check the usage of abbreviations and ensure they are accurate. The main goal of the editing process is to ensure the scientific accuracy and coherence of the article. Therefore, it is crucial that the edito...

    ₹28595 (Avg Bid)
    ₹28595 Avg Bid
    58 bids

    I need a skilled professional to help me creating email servers to send bulk emails and managing. - **Email Marketing**: I have been using the server for bulk mailing and email marketing. I need an expert who can optimize these operations, ensuring that the emails are being deliv...Although I did not select this as a specific task, I might need help with troubleshooting and support in the future. It would be great if the individual could provide this assistance as needed. The ideal candidate for this project is someone with extensive experience in managing email servers, particularly with SMTP, bulk mailing, and email marketing. A deep understanding of email deliverability and anti-spam measures is crucial. Experience with troubleshooting and providing support would be an added ...

    ₹5848 (Avg Bid)
    ₹5848 Avg Bid
    10 bids

    I'm looking for an expert in openbsc, osmocombb, and openbts GSM to help me with a project that includes the following key aspects: - **GSM Man-in-the-Middle (MITM):** The project also involves GSM man-in-the-middle functionality. This includes capabilities such as intercepting and analyzing GSM communications, modifying GSM network traffic, and manipulating GSM network authentication. Ideal Skills and Experience: - Proven experience with openbsc, osmocombb, and openbts GSM. - In-depth knowledge of GSM network setups, including voice calls, SMS, and base station capabilities. - Proficiency in network monitoring and analysis tools. - Previous experience with GSM man-in-the-middle implementations. - Excellent problem-solving skills to address any performance requirements that may ari...

    ₹191413 (Avg Bid)
    ₹191413 Avg Bid
    26 bids

    ...proficient game tester to provide comprehensive testing for my mobile game. The primary goals of this testing are to carry out game testing, bug detection, and anti-cheat testing. Key Responsibilities: - Conducting thorough testing to detect bugs in the game - Performing dedicated anti-cheat testing to ensure fair play - Sharing detailed reports on all encountered issues - Providing feedback on user experience The ideal candidate should have: - Proven experience in game testing, particularly in the mobile gaming sector - A keen eye for detail and an ability to thoroughly investigate potential bugs - A strong understanding of anti-cheat mechanisms and how to test for their efficacy Platforms: - The game is built for Android, thus the testing will be required on t...

    ₹1751 / hr (Avg Bid)
    ₹1751 / hr Avg Bid
    16 bids

    WHM clearing malware, sent ddos attaks reported ip abuse

    ₹4168 (Avg Bid)
    ₹4168 Avg Bid
    1 bids

    Anyone help me install Revolut App on BlueStacks Emulator - need anti-detection for emulator

    ₹13422 (Avg Bid)
    ₹13422 Avg Bid
    6 bids

    Game Requirement Character : Male, full animation: Idle, run, attack, jump, die… Provide full UI and Game Asset Provide full sound and effect Number Map: 8 Number Boss: 8 Enemy for each map: 4-5 ( with full animation: idle, run, attack, die… ) Provide Game icon. Intergrate with Admob in game Intergrate shop IAP in game. Game can run on Mobile and PC also. Game resolution: Hozirontal 1920x1080

    ₹1667 (Avg Bid)
    ₹1667 Avg Bid
    6 bids

    I need an e-commerce website primarily focused on selling custom anti tamper proof decals and name plates. The target audience is car enthusiasts and salvage vehicle auctions ( crashed damaged) basically so the design should be professional engaging and appealing for this demographic. Here's what the site should include: - Interactive creating of anti tamper proof labels: users should be able to design their labels live on the website, seeing their changes reflected in real time using our image templetes, customers will be entering details into each section boxes that will displace in real time on the image ive attached basic design to give you idea what im talking about. check out our current website on godaddy () to get idea of what kind of website we need at the...

    ₹54356 (Avg Bid)
    ₹54356 Avg Bid
    98 bids
    Redesign Website 1 day left
    VERIFIED

    ...#833 logo on top of page will need the 833 a bit darker so it has more contrast against # - include picture backgrounds to the 4 sections similar to cached site but lighter - contact form to be functional with submit button to my email address: abe@833easynumberscom - include CAPTCHA after submit button - include malware and anti-spam plugins - achieve satisfactory spacing between sections - cleanup any unnecessary files - ensure compatibility and optimization across desktop, tablet and mobile screens - include a Join Our Newsletter Button in the top first section next to the yellow 833-Easy Numbers logo - when clicked this will ask for users name and email address then click ok or submit, then sent to my email address

    ₹8754 (Avg Bid)
    ₹8754 Avg Bid
    46 bids

    I'm looking for a highly skilled machine learning expert to develop a solution that leverages supervised learning techniques to detect different types of side channel attacks . The solution should ideally be capable of adapting to various datasets. Key Responsibilities: - Development of detection model using supervised learning. - The model should be designed to adapt and learn from different datasets. - collecting data from Hardware level Ideal Skills & Experience: - Expertise in Machine Learning is mandatory, specifically in supervised learning techniques. - A strong understanding of cybersecurity and side channel attacks is required. - Familiarity with various datasets and hands-on experience in working with them. - A strong understanding of Microarchitecture analysis (reg...

    ₹38933 (Avg Bid)
    ₹38933 Avg Bid
    31 bids

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    ₹2418 (Avg Bid)
    ₹2418 Avg Bid
    8 bids

    I have a AWS Infrastructure setup project requiring expertise in Cloudfront NLB and protection using WAF. As the goal is targeted at content distribution and load balancing, proficiency i...want end user to access website on EC2 IIS with custom ports like 8080, 5440 etc and not standard 80 or 443. User will be providing url with port number and on IIS different website is binded with different port number. For WAF, protective measures against DDoS attacks, SQL injections, and XSS attacks are necessary. Thus, an understanding of these areas is also needed. Skills and experience: - Proficient in AWS services (Amazon EC2, ELB, Cloudfront and Amazon S3) - Knowledge of Cloudfront NLB - Experience with WAF - Understanding of DDoS attacks, SQL injections, and XSS attacks protecti...

    ₹12589 (Avg Bid)
    ₹12589 Avg Bid
    31 bids

    Project: Need key contacts (main lead/persons’) contact data that are engaged in IP-Enforcement, Anti-Counterfeit, Counterfeit and Brand protection activities within legal/law firms, Intellectual Property services providing companies or IP, IPR firms/companies or/and other companies offering relevant IPR services across United Arab Emirates (UAE), Saudi Arabia, Turkey, Singapore, Hong Kong and Thailand. Project Goals: The project aims to compile a comprehensive database of key individuals directly involved in IP-Enforcement, Anti-Counterfeit, Counterfeit and Brand protection activities within the top legal/law firms, as well as relevant service-providing companies (IP-Enforcement, Anti-Counterfeit, Counterfeit and Brand protection services) that provides these...

    ₹4411 (Avg Bid)
    ₹4411 Avg Bid
    62 bids

    ...the time the systems administrators discovered the nature of the attack, it was largely too late. Critical files all across the AvantPharm network had been encrypted and were unusable. To make things worse, the backup system in place was unmonitored and had been failing backup jobs for months, so they did not have a reliable way to restore the encrypted data. AvantPharm narrowly averted complete disaster by paying the attackers one of the largest ransomware payments in history; 25 million dollars. However, they nearly lost the business when the attacker took 2 full weeks to return control of their data as well, so the impact was further damaging to profitability and reputation. In the end, the company barely weathered the attack and resumed operations at reduced capacity o...

    ₹1584 (Avg Bid)
    ₹1584 Avg Bid
    95 bids

    I require a reliable and experienced developer to assist me in implementing a Content Security Policy (CSP) in my JavaScript application. Key Details: - Purpose: The primary goal of this CSP implementation is to prevent Cross-Site Scripting Attacks within the application. - Target Sources: The CSP should be configured to allow only self-hosted scripts...permitted. - Integrate the CSP seamlessly with the existing application architecture, ensuring no disruptions in functionality. Ideal Skills and Experience: - Proficiency in JavaScript and web application security. - Prior experience with Content Security Policy implementations. - Understanding of and its usage in specifying content sources. - Knowledge of common Cross-Site Scripting (XSS) attack vectors and mitigation strategies.

    ₹1000 (Avg Bid)
    ₹1000 Avg Bid
    13 bids

    I'm seeking a proficient grant writer to help secure funding for a comprehensive youth program. - The project targets the age group of 15-18 years old. - Aims to improve physical health, self-esteem, and reduce anti-social behavior. - The envisioned timeline for the project is 1 year. The ideal candidate will have prior experience in: - Writing successful grant proposals in the field of youth development. - Understanding of mixed martial arts (MMA) programs and their benefits for youth. - Knowledge in designing and implementing outreach programs. The successful freelancer will be responsible for: - Conducting research on potential funding sources. - Writing a compelling grant proposal tailored to the aforementioned objectives. - Assisting in the overall project planning an...

    ₹40850 (Avg Bid)
    ₹40850 Avg Bid
    55 bids

    ...vulnerabilities, severity levels, and recommended remediation measures. Collaborate with our development team to prioritize and address security issues. Requirements: Proven experience in penetration testing for Magento 2 websites and AWS environments. Proficiency in industry-standard tools and techniques for vulnerability assessment. Strong understanding of web application security principles and common attack vectors. Excellent communication skills. Deliverables: Detailed penetration testing report. Regular progress updates and communication. How to Apply: Please submit your proposal with details of your experience, approach to penetration testing, and proposed timeline and cost estimates. Additionally, include any relevant certifications or references. Thank you for your i...

    ₹14825 (Avg Bid)
    ₹14825 Avg Bid
    21 bids

    We recently experienced a malware attack on our system and we're seeking an expert who can ensure this doesn't happen again in the future. We don't require data recovery services; our main priority is to make sure it never happens again. Ideal candidates should possess: - In-depth experience in counteracting malware attacks - Mastery in various security domains such as network, application, and endpoint security - Proven track record in enhancing system security

    ₹10671 (Avg Bid)
    ₹10671 Avg Bid
    20 bids

    I'm urgently looking for a skilled professional to help me secure my website against DDoS attacks, specifically focusing on DNS amplification. work over any disk only must be now !

    ₹3918 (Avg Bid)
    ₹3918 Avg Bid
    50 bids

    ...precision and flexibility. Security and Compliance: Security is paramount in the cryptocurrency space, where the threat of hacking and theft is ever-present. Our platform will implement industry-leading security measures, including encryption, two-factor authentication (2FA), and cold storage for storing user funds. Additionally, we will ensure compliance with regulatory requirements, including anti-money laundering (AML) and know your customer (KYC) regulations, to mitigate legal and reputational risks. Liquidity and Market Depth: A key factor in the success of any cryptocurrency exchange is liquidity and market depth. To attract traders and ensure competitive pricing, our platform will employ liquidity aggregation mechanisms and market-making strategies to maintain ample liqu...

    ₹1667 / hr (Avg Bid)
    ₹1667 / hr Avg Bid
    23 bids

    In need of a customized solution for my project. Specifically, I'm seeking a professional that can create lightweight, anti-corrosive and high tensile strength fasteners: - Materials: Stainless steel is the preferred option due to its durability and resilience. - Types: I'm looking for screws and quarter turn fasteners tailored to specific needs. - Properties: The custom fasteners must be: - Lightweight for easy handling and installation - Anti-corrosive to improve durability and lifespan - High tensile strength to ensure structural stability Experience in manufacturing custom hardware is a must. A strong understanding of material properties including tensile strength, corrosion resistance and weight is crucial. Please provide samples or portfolios of ...

    ₹2168 (Avg Bid)
    ₹2168 Avg Bid
    28 bids

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    ₹917 (Avg Bid)
    ₹917 Avg Bid
    7 bids

    I'm seeking the expertise of a data scientist or machine learning engineer to develop a model for classifying various types of attacks on a KDD dataset. The ideal candidate will have extensive knowledge in the use of autoencoders for feature extraction and GRU models. Key project elements include: * Professionals will need to implement an autoencoder for feature extraction with the core goal of reducing data dimensionality. Prior experience in working with high-dimensional data and in deploying autoencoders is necessary. * Subsequently, the system built should be capable of classifying Denial of Service (DoS), User to Root (U2R), and Probe attacks within the KDD dataset. Good working knowledge of GRU models and the mentioned attacks is required. * The project includes steps to ensure...

    ₹2835 (Avg Bid)
    ₹2835 Avg Bid
    8 bids

    ...editing that includes grammar correction, increased sentence clarity and well-disguised plagiarism without compromising the original intent of the content. Please note, editing is not limited to clarity enhancement alone but should also spot and correct instances of plagiarism if present. This task requires somebody with a solid comprehension of academic writing, attention to detail and proficiency in anti-plagiarism tools....

    ₹3602 (Avg Bid)
    ₹3602 Avg Bid
    34 bids

    I am seeking a capable web deve...capable web developer who can construct a portfolio website with specific functionalities and top-notch security measures. The website task demands: - Implementation of anti-fraud and website security measures. This includes prohibition of Proxy/VPN usage, banning anonymous web browsing, and blocking Ad Block users. - Design of a robust and secure site that doesn't compromise on usability or aesthetic appeal. Ideal Skills and Experience: - Proficiency in web development and design. - Excellent understanding of website security principles. - Extensive experience in developing secure and engaging portfolio websites. - Knowledge of anti-fraud and authentication measures. - Expertise in handling proxy, VPN, anonymous web browsing, and Ad ...

    ₹9170 (Avg Bid)
    ₹9170 Avg Bid
    28 bids

    ...are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you should connect with ibm quantum computer. 4- all requirement should be delivered in three days. ...

    ₹24427 (Avg Bid)
    ₹24427 Avg Bid
    27 bids

    I'm looking for a skilled professional to conduct a network security test on our workstations using ARP poisoning techniques. The focus of this project is to identify vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someone with signifi...

    ₹5336 (Avg Bid)
    ₹5336 Avg Bid
    15 bids

    I require a skilled marketer to generate leads specifically from tech enthusiasts. Your role will be to: - Develop and implement strategies for actionable lead generation - Demonstrate an understanding and ability to reach tech enthusiasts - Utilize specifically marketing platforms, please no social media, SEO, or email marketing Ideal candidates will have a proven track record in generating viable leads, with a specific understanding of the needs and motivations of tech enthusiasts. Experience with unique marketing platforms and approaches will be highly regarded.

    ₹2501 (Avg Bid)
    ₹2501 Avg Bid
    3 bids

    I'm looking to modify the SAAS-BOILERPLATE open-source project to create an interactive membership website for indie filmmakers and film students. NOTE: MOST of the required functions are already implemented in the boilerplate. You do NOT need to connect Stri...for webdesigner collaboration (squarespace has an interesting version that is attached below to the project) IDEAL FREELANCER PROFILE: - Have previous experience with backend development using Laravel PHP - security-focused emphasis on security against attacks on webapps - experience minimizing the attack surface of webapps - Understand how to integrate video hosting in SaaS

    ₹46103 (Avg Bid)
    Featured
    ₹46103 Avg Bid
    64 bids

    I am seeking a skilled freelancer to help me create a data collection tool for an intrusion detection system. This system's main purpose is to collect data for analysis, focusing on network traffic. Key tasks include: - Designing a new normal and attack dataset using Mininet WiFi - The focus is on detecting Denial of Service (DoS) and Man-in-the-Middle (MitM) attacks Ideal candidates should have experience: - Building intrusion detection systems - Working with Mininet WiFi - Handling network traffic data - Familiarity with DoS and MitM attacks This tool will greatly aid in identifying and preventing future network attacks by providing structured data for our analysis team.

    ₹29179 (Avg Bid)
    ₹29179 Avg Bid
    3 bids
    Trophy icon an awesome Instagram ad! Ended

    I need a new Instagram ad promoting my CrystalVision Dive Mask Anti-Fog Kit. I need a square image (1080 x 1080 px) that showcases the product and really pops on the feed. My branding details are attached, so please incorporate them into your design. I'm drawn to clean, uncluttered layouts with a dominant color for a bold look. Here's some inspiration text to get you started: -"Never miss a moment underwater. The CrystalVision Dive Mask Anti-Fog Kit keeps your mask crystal clear for a fog-free dive." -"Be dive-ready anytime, anywhere. The CrystalVision Dive Mask Anti-Fog Kit is compact and easy to use, so you can defog your mask quickly and effectively." -"Don't forget your essentials! The CrystalVision Dive Mask Anti...

    ₹834 (Avg Bid)
    Featured Guaranteed
    ₹834
    90 entries

    I’m giving out anti bullying toolkit to students, and included in the tool kit is going to be a game tablet or PSP , which has fun and educative games , some anti bullying quotes , and most especially games that promotes equality and diversity and also inclusivity Open to tech stack options More details: What is the target age range for the children who will be playing the games? 11-17 What specific educational subjects or skills would you like the games to focus on? Science; Critical Thinking; Social Skills, Anti-bullying quotes, Diversity, inclusivity ,equality Are there any specific game genres or types that you would like to see incorporated into the project? Quiz games, Memory games; Role-playing games, Adventure

    ₹153397 (Avg Bid)
    ₹153397 Avg Bid
    30 bids

    I am looking for a freelancer who can help me compare specific automobile accessories on Shoppee and Lazada. Specifically, I am interested in: - Car mats - Seat covers - Phone holders I need someone to compare these products in terms of: - Waterproof - Anti-slip - Universal fit Ideal skills for this job include: - Web scraping - Data analysis - Knowledge of automobile accessories Please make sure you have experience with comparing and analyzing product data from online marketplaces. Responsibilities: Utilize Selenium to scrape data from various websites to identify the top 10 products in the automobile (Accessories) industry from Shoppee and Lazada. Compile a comprehensive activity list for each of the identified products, including pricing, features, customer reviews, and a...

    ₹8598 (Avg Bid)
    ₹8598 Avg Bid
    46 bids

    Looking for an expert in Selenium and Python for personal project. I require a solution that effectively automates the login process on specific movie websites. Key Responsibi...automates the login process on specific movie websites. Key Responsibilities: - Develop login automation using Selenium and Python - Provide clear instructions for use - Provide detailed documentation or clear code comments - Must be reliable and able to complete tasks quickly Ideal Skills: - Advanced Python coding skills - Proficiency in Selenium python library - Experience with overcoming anti-scraping measures - Strong problem-solving skills Successful completion of this task could open the door to future projects. Need this done ASAP. The specifics will be discussed over chat. Looking forward to ...

    ₹5051 (Avg Bid)
    ₹5051 Avg Bid
    32 bids

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    ₹17341 (Avg Bid)
    ₹17341 Avg Bid
    12 bids

    I am currently having problems with comment spam on my WordPress website. There are no significant anti-spam measures in place at the moment, thus I need a proficient freelancer to help with the clean-up. Site has lots of Japanese spam pages, and comment spam that needs to be removed. Easy job for the right freelancer.

    ₹10421 (Avg Bid)
    ₹10421 Avg Bid
    159 bids

    I am seeking a professional writer with an in-depth understanding of telecommunications and jamming technology to author a research paper. The paper should: - Be of an advanced technical level, tackling complex elements of jamming technology; - Not just provide an understanding of the technology, b...telecommunications, with an emphasis on jamming technology; - Exceptional in-depth technical writing skills; - Proven ability to research and present emerging trends within the field; - Strong ability to present technical information in a clear, cohesive manner. Paper Focus on Jamming Technology code to emulate jamming the code into the protocol developed at - Anti jamming protocol and survey of hardware based jamming device these are the major focus

    ₹2251 (Avg Bid)
    ₹2251 Avg Bid
    28 bids

    I'm looking for aid to eliminate a large volume of identical spam coming from numerous IP addresses on my Wordpress form. Expertise in the following areas would be beneficial for this job: - Understanding of "hidden field" or alternate anti-spam technologies - Experience with Captcha verification, Invisible reCAPTCHA, or IP Blocking - Proven track record of increasing web form security and spam prevention - Ability to identify and implement new methods for validating genuine submissions. Please note, description or identification of the "hidden field" technology wasn't provided, so an ability to work with vague requirements is important. Let's security-proof my Wordpress form, together!

    ₹2307 (Avg Bid)
    ₹2307 Avg Bid
    55 bids

    I need a research paper written on how India’s ruling party, the BJP, threatens the country’s secular democracy. The aim of this paper is to discuss: - How the BJP rose to power over its 40 year history (how the BJP has used Hindutva to gain popularity) - How Hindutva marginalizes non-Hindu religious groups - India’s history of discrimination against Muslims - How the BJP has amplified anti-Muslim sentiment over the last decade - What does this mean for the future of secular democracy in India The ideal candidate for this job should have: - Strong background in researching and writing academic papers at the graduate school level - Fluency in English writing and research skills The research paper should be at least 20 pages and be thorough, well-researched,...

    ₹156899 (Avg Bid)
    ₹156899 Avg Bid
    31 bids

    ...developer, with strong proficiency in developing dynamic, engaging, and user-friendly business websites, primarily centered around information technology services. Key Areas: - Showcase Services: Foremost, the website should beautifully present my key services which are Cybersecurity Managed Solutions ,Vulnerability Assessment and management, disaster recovery as a service, SOC as a service, DDoS mitigation, penetration testing, cloud computing security, and Incident Response. - Lead Generation: A flawless mechanism for capturing leads and inquiries is essential. Thus, effective CTAs, contact forms, and pop-ups, etc., should be correctly integrated. - Website Features: The website must feature video content to grab the attention of the viewer, must feature case studies, cl...

    ₹39683 (Avg Bid)
    ₹39683 Avg Bid
    116 bids

    I am in need of a skilled designer to create 13 icons that visually represent various computer components. The style should be minimalist and the designs should be clean. These will be used on my website The final result should be versatile, clear, and understanda...understandable. Previous experience in flat icon design is ideal but not necessary as long as your portfolio demonstrates your capacity for this style. Please include any relevant work examples in your proposal. Computer Case Computer Motherboard Computer Processor Computer Ram Computer SSD Computer Cooler Computer Power supply Computer Graphics Card Computer Fans Windows Icon Computer USB Drive Computer Anti Virus Computer Warranty

    ₹7586 (Avg Bid)
    ₹7586 Avg Bid
    49 bids

    I'm looking for a network specialist to set up my pfsense for public subnet, prioritizing network security. Specifically, my main concerns are: - Malware attacks - Distributed Denial of Service (DDoS) attacks - Intrusion attempts The setup should be designed to accommodate more than 50 connected devices. The ideal freelancer for this project should have advanced knowledge and experience in network security, specifically in dealing with the aforementioned threats. A strong background in pfsense setup and load balancing is also essential.

    ₹13922 (Avg Bid)
    ₹13922 Avg Bid
    9 bids

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    ₹1417 (Avg Bid)
    ₹1417 Avg Bid
    5 bids

    I need a skilled iOS professional to develop a Swift UI mobile application centralized on face anti-spoofing. The app must include: - Facial recognition: The app should successfully recognize and capture faces. - Liveness detection: The software should be able to distinguish between an actual person and a face in a photograph, video, or mask. - Anti-spoofing detection: The application should include mechanisms to detect and prevent fraudulent face representation. Can use this Python project for what we need for the application. It needs to detect a Real face versus a fake face in real-time and if it is a Real Face, take a selfie. Please note the app is exclusive for iOS, so knowledge in the specific platform is crucial. The ideal candidate

    ₹100042 (Avg Bid)
    ₹100042 Avg Bid
    73 bids

    I need a formulator to develop an anti-mould agent specifically for leather and fabric products. The ideal candidate should have extensive knowledge and experience in formulation chemistry. Key Pointers: - The agent should offer long-lasting protection against mould of 12 months - Non-toxic for safe use. - As natural as possible - Broad-spectrum - It must be odorless, colorless - Works on all leather including suede, vegetable-tanned, reptile, PU - Works on fabric - Does not affect leather color, smell - Safe on hardware - Ingredients needs to be accepted in EU, KR, JP, US, AU Skills & Experience: - Proven experience in chemical formulation. - Expert knowledge on anti-mould agents. - Understanding of safety standards in the chemical industry. - Previous experience wor...

    ₹140142 (Avg Bid)
    ₹140142 Avg Bid
    17 bids