Arp spoofing sourcecode jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 arp spoofing sourcecode jobs found, pricing in INR
    Mobile MMORPG Dev 3 days left
    VERIFIED

    Looking for experience MMORPG developer to customise a strategic game similar to Honor of Kings using open source / ready built game sourcecode, that integrated with NFT items and tokens. Pls reply the following 1. Are you an individual freelancer or agency? If agency, what's the team strength, skillset? 2. Pls show your works related to MMORPG game development. 3. What development language, technology, platform & blockchain you could work on? More details will be provided to shortlisted bidders.

    ₹98291 (Avg Bid)
    ₹98291 Avg Bid
    54 bids

    I am building an AI Inference Hub where users can use any open-source model on a pay-as-you-go basis. The application is halfway done, however I cannot continue building the app. I need someone to continue developing on top of the already existing project. You will be given the supabase token and the existing sourcecode Requirements: - Supabase - Sveltekit - Skeleton UI (Sveltekit UI library) - Midtrans Authentication: - Setup a login and register page using the supabase SDK that also allows users to register/login using third parties such as github, google, etc. - Prompt user to input billing info on register. Settings: - User page: - Design and create an intuitive page for users to edit their information - Tokens page: - Design a page for user to retrieve their API token...

    ₹36932 (Avg Bid)
    ₹36932 Avg Bid
    113 bids

    I am looking for an experienced computer networking expert who can assist me in enhancing my understanding of network protocols, routing and switching, and network security. I am going to have an online at home test at 3pm EST(Eastern Standard Time) to 5pm on April 18th so I need just two hours of your time. The lect...plane - Section 5.5 (5.5.1, 5.5.2, 5.5.3, 5.5.4) - ICMP: The Internet control message protocol Section 5.6 >> The link layer and LANs: Chapter 6 - Introduction to link layer - Section 6.1 - Error detection and correction techniques Section 6.2. - Multiple access links and protocols Section 6.3. - Switched local area networks - Section 6.4 - Link Layer addressing and ARP 6.4.1 - Ethernet - section 6.4.2 - Link layer switches...

    ₹8779 (Avg Bid)
    ₹8779 Avg Bid
    14 bids

    I'm looking for a skilled professional to conduct a network security test on our workstations using ARP poisoning techniques. The focus of this project is to identify vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someon...

    ₹5336 (Avg Bid)
    ₹5336 Avg Bid
    15 bids

    I'm looking for an expert in email spoofing for an intriguing project. I need someone who can send an email to me that appears from a specific domain or address I provide. The ideal candidate would be someone who can disguise the email source skillfully yet ethically. The email should contain detailed, specific information. Highlights of this project include: - Using a specific domain or email address to hide the real source - Crafting an email with specific data and information You should have: - Skills in ethical spoofing methods - Understanding of email protocols - Exceptional copywriting abilities to write engaging, detailed emails. This project can be a fun challenge for those who enjoy working with specifics and puzzles within the realm of cyber communicatio...

    ₹10421 (Avg Bid)
    ₹10421 Avg Bid
    45 bids

    I need a skilled iOS professional to develop a Swift UI mobile application centralized on face anti-spoofing. The app must include: - Facial recognition: The app should successfully recognize and capture faces. - Liveness detection: The software should be able to distinguish between an actual person and a face in a photograph, video, or mask. - Anti-spoofing detection: The application should include mechanisms to detect and prevent fraudulent face representation. Can use this Python project for what we need for the application. It needs to detect a Real face versus a fake face in real-time and if it is a Real Face, take a selfie. Please note the app is exclusive for iOS, so knowledge in the specific platform is crucial. The ideal candidate

    ₹100042 (Avg Bid)
    ₹100042 Avg Bid
    73 bids

    I have several clients running Windows web Applications on IIS . I also have a online windows server with public ip and domain. I would My clients like to access there local applications remotely via the Windows server as a proxy There fore will require htto tunnel form client computers to the proxy server where by they will be exposed to the internet to be acces...clients like to access there local applications remotely via the Windows server as a proxy There fore will require htto tunnel form client computers to the proxy server where by they will be exposed to the internet to be accessed from anywhere. If you can build both the tunnel and the http proxy server, the solution must be built on either C# or php /javascript. you should also provide the sourcecode on ...

    ₹11755 (Avg Bid)
    ₹11755 Avg Bid
    34 bids

    ...Domain is through GoDaddy. The main objective of this project is to elevate my email deliverability. I'm completely new to DMARC, (Domain-based Message Authentication, Reporting & Conformance) policy, so I need someone patient, communicative, and adept to walk me through it. Job Responsibilities: - Application of DMARC policy to my Gmail DNS - Enhance email deliverability by preventing email spoofing and bolstering email security Ideal Candidate: - This job requires notable experience in handling DNS systems, particularly Gmail - Thorough understanding of DMARC policy application is a must - Excellent communication skills to explain the steps taken, in a way that is understandable to a beginner in DMARC policy. Shape the future of my email security and join me ...

    ₹9504 (Avg Bid)
    ₹9504 Avg Bid
    17 bids

    I need a skilled network analy...skilled network analyst who can examine an ARP request and reply message within my network. The purpose of this project is network troubleshooting. - Use Wireshark - Focus on personal computers - Generate a report outlining patterns or oddities - You should be knowledgeable about detecting intrusion, maintaining network security, and problem-solving in complex network environments. Experience with the Wireshark tool is essential. Your goal is to give a clear snapshot of the situation with the ARP request and reply messages. Here are the deliverables: - ARP request and reply messages log - A detailed report about these ARP messages and potential problems Please, only bid if you have a concrete understanding of Wireshark Net...

    ₹2751 (Avg Bid)
    ₹2751 Avg Bid
    5 bids

    ...the mp3 stream is available. I would like the player to have a spot in the media-controls space in android, per the attached image. The app currently runs but has one bug, which simply plays the audio. The functions are simple. It has a 'start', 'stop' button. That's it. It should continue to run in the background when it's part of the media controls. I can give you access to the existing sourcecode, etc. Before you respond, you should know that I will only reply / contact you if you just give me a simple text submission.. Just tell me a bit about yourself, don't give me your standard copy / pasta of text. and also, to make sure that you're not a bot, please make sure you start your response with the word "bird".. because, y...

    ₹1625 - ₹13540
    Sealed
    ₹1625 - ₹13540
    26 bids

    I am in need of an advanced face recognition we...a url or anyway to integrate a existing PHP app) or API (by sending photo) for purposes of liveness detection. Key features for this project should include liveness detection utilizing facial movements and eye blinking as anti-spoofing measures - this will contribute to robust security. Once the identity verification is successful, the application should send the image by POST passing arguments to identify the user. Experience in creating highly secure web applications, as well as a comprehensive understanding of facial recognition technologies and anti-spoofing techniques free and open source, will be essential for the successful completion of this project. Moreover, a tested ability to integrate API features seamlessly wi...

    ₹6503 (Avg Bid)
    ₹6503 Avg Bid
    10 bids

    ...to be developed aims to provide facial recognition and anti-spoofing capabilities to integrate into already existing applications. It will focus on being a hybrid component compatible with Flutter, allowing its use on both iOS and Android devices. Importantly, no significant effort will be required in creating an elaborate user interface, as the SDK will be integrated into another pre-existing application. Instead, the emphasis will be on ensuring that face detection, face comparison, and anti-spoofing features work optimally and are easily integrated into the main application workflow. i need somone who could work on it quick please Key Features Required: * Face detection * Face recognition * Liveness detection * Anti-spoofing capabilities Ideal Skills and Exper...

    ₹12968 (Avg Bid)
    ₹12968 Avg Bid
    20 bids

    ...beginner-level tutorial that expands comprehension on the concept and theory underlying spoofing emails and text messages. The ultimate aim is to harness the knowledge for the purposes of ethical hacking. Key focus areas: - Fundamentals of Email and Text Message Spoofing. - Core Concepts that Govern Ethical Hacking. - Understanding the Interface between Spoofing and Ethical Hacking. A potential candidate for this project will ideally have: - Extensive experience in cybersecurity and ethical hacking. - Innovative teaching skills to simplify complex concepts. - Proficiency in course structure and creation. Your assignment is to enlighten beginners with zero experience about the theory behind spoofing, imparting them the tools necessary to utilize this know...

    ₹2001 / hr (Avg Bid)
    ₹2001 / hr Avg Bid
    20 bids

    Creating a Bluestacks emulator like a real Android device while meeting the specified requirements involves several technical steps. Below is a step-by-step guide to achieve this: Spoofing Methodology: Develop or find an app-based or Play Store-based spoofing solution. This involves creating or finding an application that can manipulate device information such as IMEI, Android ID, device model, etc. The spoofing solution should preferably work at the system level to provide a more comprehensive emulation of a real Android device. Android Version Selection: Configure the Bluestacks emulator to run either Android 7 or Android 9. You may need to use custom ROMs or images compatible with Bluestacks for these versions. Root and Xposed Bypass: Implement a solution that d...

    ₹7336 (Avg Bid)
    ₹7336 Avg Bid
    5 bids

    I don't accept cloning apps like appcloner. 1-Spoofing will be app based and play store based or fully system based. 2-We prefer android 7 but if not possible android 9 is fine too. 3-we need no root and no xposed solution if available 4-We need to bypass app based safetynet can use any safetynet checker app to check your settings. 5-We need an app for changing android fingerprints and hiding root, hiding xposed if you use can suggest us apps instead of creating them or you can inject codes to the 'll consider economic solutions for the apps you suggest. 6-The app name we will use is no matter for can check your settings via test apps. 7-Solution will be for multi bluestacks instances and will work for a long time.

    ₹46436 (Avg Bid)
    ₹46436 Avg Bid
    36 bids

    ...module from scratch. The ideal candidate should have expertise in building scalable and efficient notification systems that can seamlessly integrate with existing applications. The primary focus will be on creating a modular and flexible codebase that can be easily plugged into existing mobile app or various applications. "Final project/code handover in the form of a mobile app with FE and BE Sourcecode, subject to testing before final approval." Responsibilities: # Develop a Notification Engine or module from scratch that aligns with project requirements. # Design and implement scalable and efficient notification systems. # Ensure seamless integration of the notification code with existing applications. # Collaborate with the existing development team to understand ...

    ₹10671 (Avg Bid)
    ₹10671 Avg Bid
    6 bids

    As a cybersecurity enthusiast looking to deepen my understanding, I need an expert with strong skills and experience in email spoofing, CNAME record manipulation, mailing setup, and domain configuration. Key Objectives: - Successful demonstration of email spoofing for educational purposes - Setting up mailing system and DNS configuration - Detailed walkthrough of CNAME record manipulation Professional Requirements: The ideal candidate should demonstrate a comprehensive understanding of the following areas: - Email spoofing techniques - CNAME record manipulation - Mailing system setup - Domain configuration This project is purely intended for knowledge acquisition and educational purposes, therefore, any advice or demonstration should comply with ethical guidelines...

    ₹9429 (Avg Bid)
    ₹9429 Avg Bid
    13 bids

    As an expert in Ruby Opcode, I'm looking to reverse engineer some code. The task involves converting the entirety of my Ruby Opcode into Ruby Sourcecode. Key Responsibilities: - Thorough conversion of Ruby Opcode into Sourcecode. - Adherence to reverse engineering principles. Ideal Skills and Experiences: - In-depth understanding of Ruby Opcode and Sourcecode. - Proficiency in Ruby and Object-Oriented Programming (OOP). - Experience in reverse engineering. - Strong attention to detail and ability to handle complex codes. This project requires a high degree of professionalism and expertise in the domain. Looking forward to collaborate with those who are up for the challenge!

    ₹14256 (Avg Bid)
    ₹14256 Avg Bid
    14 bids

    DotNet developers required for 'Errors removal and improvement work' in thenafter Host on server. Developers should also have knowledge about Merger of sourcecode and database of his done-work with other developer's done-work on GitHub. Website Address - User emailid- @gmail.c Password- kaspersky Errors and Improvement work which has to be done is explained in below link-

    ₹12255 (Avg Bid)
    ₹12255 Avg Bid
    13 bids

    ...**Efforts Already Made:** - Attempted basic troubleshooting myself, including: - Reinstalling Fortnite - Changing some hardware components - Using various VPN services **Ideal Skills and Experience:** - Proficient in handling and resolving HWID bans for PC games, especially Fortnite. - Familiarity with the intricacies of gaming security and anti-cheat mechanisms. - Experience in modifying or spoofing hardware IDs securely without compromising system stability. - Knowledge of network security practices to advise on the safe use of VPNs or similar technologies to avoid future issues. - Ability to provide a step-by-step plan on how to avoid such bans in the future, emphasizing safe and fair gameplay practices. I'm looking forward to collaborating with someone who can gu...

    ₹12589 (Avg Bid)
    ₹12589 Avg Bid
    7 bids

    I'm looking for a Khatabook / Vyapar like android apps with sourcecode to start a business. Features are added in png format, if you think you can build one or have already built for other customer, I am agree to buy it. I'll prefer those freelancer with lowest bid but quality product for the project. Also, if you've built earlier any such project I would like to go through the demo.

    ₹26428 (Avg Bid)
    ₹26428 Avg Bid
    7 bids

    I'm searching for a proficient SIP/Asterisk engineer who has ample experience in performing the following tasks: - Setting up and configuring an Asterisk server - Ensuring that the server is set up for high security and can support telemarketing or sales calls - Adding a specific function of calling and spoofing numbers, to be used exclusively for telemarketing and sales purposes Ideal skills and experience for the job: - Extensive experience with Asterisk and SIP protocols - Past-experience in setting up IVR systems - Understanding of server security measures - Familiarity with telemarketing systems Please provide a summary of your relevant work experience and your approach to this task in your bid.

    ₹52855 (Avg Bid)
    ₹52855 Avg Bid
    16 bids

    ...container service, Lambda, Elastic beanstalk, S3, EFS, Storage gateway, Glacier, VPC, Direct connect, Transit Gateway, ELB, Auto Scaling, ACM, Cloud Front, Cloud Formation, Cloud Watch, Cloud Trail, SNS, SES, SQS, SWF, IAM, RDS, DynamoDB, Elasticache, Redshift, AWS Backup · Operating Systems: UNIX, Redhat LINUX, Windows · Networking & Protocols: TCP/IP, Telnet, HTTP, HTTPS, FTP, SNMP, LDAP, DNS, DHCP, ARP, SSL, IDM 6.0 and 7.0 · DevOps Tools: Puppet, Chef, Subversion (SVN), GIT, Jenkins, Hudson, Puppet, Ansible, Docker and Kubernetes · Scripting Languages: UNIX Shell Scripting (Bourne, Korn, C and Bash), Python, Perl Scripting, · Database: Oracle, Amazon Aurora, MySQL, MariaDB, PostgreSQL, Microsoft SQL Server · Version Controlling ...

    ₹667 / hr (Avg Bid)
    ₹667 / hr Avg Bid
    1 bids

    ... Third-party services 4. **Which phase in the development lifecycle is threat modeling most effective?** A. Requirement gathering B. Design C. Implementation D. Deployment 5. **What does the ‘STRIDE’ methodology stand for in threat modeling?** A. Spoofing, Tampering, Repudiation, Information Disclosure, Elevation of Privilege B. Security, Tracing, Reliability, Isolation, Debugging, Encoding C. Scalability, Transferability, Reliability, Integration, Development, Efficiency D. Spoofing, Tracing, Refactoring, Information Disclosure, Denial of Service, Encryption 6. **Which of the following is not a characteristic of serverless computing?** A. Stateful applications B. Event-driven execution C. Auto-provisioning o...

    ₹3085 / hr (Avg Bid)
    ₹3085 / hr Avg Bid
    3 bids

    ...particularly with Gmail. - Expertise in DNS management and modification. - Solid understanding of email security standards, including DKIM and DMARC. - Experience in troubleshooting and improving email deliverability. This project demands meticulous attention to detail to ensure that both DKIM and DMARC are set up correctly, not only to increase email deliverability but also to safeguard against email spoofing. Freelancers with prior experience in enhancing email security and deliverability, especially within Gmail environments, are encouraged to bid....

    ₹12005 (Avg Bid)
    ₹12005 Avg Bid
    13 bids

    I need a camera spoofing app like the attached video. I don't need ID card feature, just live feed spoofing. I should be able to select a verification video (short clip holding the verification pose) when Tinder prompts me to verify. I need this app working on Tinder, bumble, and badoo

    ₹51521 (Avg Bid)
    ₹51521 Avg Bid
    60 bids

    ...Internal staff D. Third-party services 4. Which phase in the development lifecycle is threat modeling most effective? A. Requirement gathering B. Design C. Implementation D. Deployment 5. What does the ‘STRIDE’ methodology stand for in threat modeling? A. Spoofing, Tampering, Repudiation, Information Disclosure, Elevation of Privilege B. Security, Tracing, Reliability, Isolation, Debugging, Encoding C. Scalability, Transferability, Reliability, Integration, Development, Efficiency D. Spoofing, Tracing, Refactoring, Information Disclosure, Denial of Service, Encryption 6. Which of the following is not a characteristic of serverless computing? A. Stateful applications B. Event-driven execution C. Auto-provisioning of resourc...

    ₹4168 / hr (Avg Bid)
    ₹4168 / hr Avg Bid
    1 bids

    In this project, we aims to create a website or application that leverages multiple cloud servers worldwide to process user searches across various geographical regions, with a primary focus on shopping queries sourced from Google Shop...servers worldwide to process user searches across various geographical regions, with a primary focus on shopping queries sourced from Google Shopping. Users will select different locations, and their search phrases will be queried as if from those destinations, aggregating and displaying results on a single page. To begin, our Minimum Viable Product (MVP) will simulate server locations using address spoofing methods, such as those utilized by ' ', to conduct searches on Google and present consolidated results.

    ₹1751 / hr (Avg Bid)
    NDA
    ₹1751 / hr Avg Bid
    44 bids

    ...developing an automated scheduling system for attendance marking. **What I Need:** - Development of a method to bypass or emulate fingerprint authentication effectively. - Implementation of location spoofing that satisfies app requirements without manual intervention. - Creation of an automation scheduler to perform attendance tasks at predetermined times. **Ideal Skills and Experience:** - Proficiency in mobile application development, particularly in Android or iOS platforms, depending on my device. - Experience with security features such as fingerprint authentication and GPS location spoofing. - Knowledge in automation and scripting to facilitate scheduling tasks within the application's needs. - Capability to provide a robust, user-friendly solution that integr...

    ₹2084 (Avg Bid)
    ₹2084 Avg Bid
    2 bids

    I urgently require a savvy Instagram expert to address a pressing issue – my account is being spoofed, and it's affecting my follower count. - **Main Goal**: Implement measures to prevent altering the visual representation of my followers count. This spoofing issue presents with erratic loss and gains, not reflective of genuine follower interactions. - **Challenges**: - Addressing follower count discrepancies - Preventing unauthorized spoofing activities - **Skills Needed**: - Proficiency in Instagram's security features - Experience with social media analytics - Understanding of Instagram's algorithm regarding follower engagement - Strong problem-solving abilities related to social media issues - **Expected Outcomes**: A restored and sec...

    ₹45185 (Avg Bid)
    ₹45185 Avg Bid
    19 bids

    I need expert assistance to bolster my email defense mechanisms. My goal is to rapidly integrate top-tier email authentication standards with my Zoho mail to minimize the risk of phishing and spoofing attacks. **Essentials:** - Implement SPF, DKIM, and DMARC protocols. - Expect completion within a week. - Requires basic Zoho configuration. **Skills Needed:** - Proficient in email security protocols. - Experienced with Zoho Suite. - Strong understanding of DNS configurations. Do you have the expertise to tighten my email security without delay? Reach out and let's fortify my Zoho mail system.

    ₹1751 / hr (Avg Bid)
    ₹1751 / hr Avg Bid
    40 bids

    I urgently require a savvy Instagram expert to address a pressing issue – my account is being spoofed, and it's affecting my follower count. - **Main Goal**: Implement measures to prevent altering the visual representation of my followers count. This spoofing issue presents with erratic loss and gains, not reflective of genuine follower interactions. - **Challenges**: - Addressing follower count discrepancies - Preventing unauthorized spoofing activities - **Skills Needed**: - Proficiency in Instagram's security features - Experience with social media analytics - Understanding of Instagram's algorithm regarding follower engagement - Strong problem-solving abilities related to social media issues - **Expected Outcomes**: A resto...

    ₹41351 (Avg Bid)
    ₹41351 Avg Bid
    24 bids

    I'm looking for a knowledgeable professional to assist in improving my email deliverability. Your task will involve enhancing the security and authenticity of my emails, to ensure they land safely in the recipients' inbo...legitimacy of my emails. - Google Workspace: My business currently uses Google Workspace as our email service provider. Familiarity with this platform is crucial for successful implementation of the aforementioned protocols. Skills and Experience: - Advanced understanding of DMARC, DKIM, and SPF - Proven experience with Google Workspace - Expertise in improving email deliverability and preventing spoofing. Through your work, we aim to minimize the occasions when our emails end up categorized as 'spam'. A proven track record in such impro...

    ₹2918 / hr (Avg Bid)
    ₹2918 / hr Avg Bid
    20 bids

    ...with clients hosted on servers I rent. Several of the clients have either Mail Chimp or Constant Contact. I want to learn how to add the proper CNAME, TXT DNS settings so their emails follow new standards and compliance for delivery. I know the basics, but want to have a more clear understanding of: - Implement DKIM: Configure DomainKeys Identified Mail to validate outbound emails, preventing spoofing. - Set up DMARC: Deploy Domain-based Message Authentication, Reporting, and Conformance to specify how receiving servers handle unauthenticated emails. - Ensure Policy Enforcement: Adjust policies for strict compliance adherence and report on email traffic. - Guidance on Best Practices: Advice on maintaining and updating security protocols. - rau IDEAL CANDIDATE: - Proficient in ...

    ₹2835 / hr (Avg Bid)
    ₹2835 / hr Avg Bid
    6 bids

    I am looking for C++ developer to develop a command to override password. Scenario: Lets say user set password, but somehow he lost it, then he will be able to use that command, which will override password and send fund. I have attached the sourcecode, which is similar like Bitcoin Sourcecode If you know bitcoin source than you will be familiar with its all json rpc call. Example call: sendtoaddress <bitcoinaddress> <amount> So i want you to add new call, lets say: 'forcesend <bitcoinaddress> <amount>' this command have to send fund eventhough if there is password, it will override it. I hope you have understood. Please only bid, if you are good in c++ and well known with bitcoin source. all proxy bidder please avoid this project, as I do...

    ₹2501 - ₹20842
    Featured Sealed
    ₹2501 - ₹20842
    3 bids

    I'm seeking an AI expert to develop a system focused on the detection of partially spoofed audio signals. The objective is not merely to recognize tampering but to ensure authenticity in audio streams, possibly for security or proprietary content protection. Key Aspects of the Project: - Implement cutting-edge algorithms designed to detect audio spoofing. - Integrate the AI with existing systems for seamless operation. - Prioritize accuracy and reliability in detection. Ideal Skills: - Proficiency in AI and machine learning, especially in audio analysis. - Experience in signal processing and anomaly detection. - Ability to implement solutions that can perform with a high degree of precision. - Familiarity with real-time processing is a plus, given the lack of clarity on the e...

    ₹7003 (Avg Bid)
    ₹7003 Avg Bid
    2 bids

    ...improve our existing project. This involves enhancing the functionality of an AI Audio Spoofing Detection System. Work primarily entails updating the current code and implementing the revamped system effectively. Here's a little more about what's needed: - Code Enhancement: You'll be tasked with refining our current system. It's been written in Python, and we expect you to be proficient in this language and ideally experienced in AI/ML projects. - System Implementation: After updating our code, your second task will be to integrate the improved system ensuring top-notch performance. Ideal candidates should possess skills and experience in Python, AI/ML, and have a sound understanding of audio spoofing detection. Demonstrated ability to handle sim...

    ₹43268 (Avg Bid)
    ₹43268 Avg Bid
    9 bids

    I'm seeking a specialized freelancer to create a highly accurate wifi geolocation spoofing tool for Android to bolster my location privacy. Your expertise will help me keep my whereabouts concealed for personal privacy. Ideal Candidate Skills: - Proficient in Android app development - Knowledgeable in geolocation technologies - Experienced in VPN/spoofing techniques - Understanding of privacy and security protocols Requirements: - Develop an Android-compatible geolocation spoofing app. - Ensure high accuracy in spoofed locations. - Prioritize privacy and undetectability. - Offer a user-friendly interface. Expectations: - Work within set deadlines. - Communicate progress regularly. - Provide post-development support for troubleshooting. I'm looking forward...

    ₹10754 (Avg Bid)
    ₹10754 Avg Bid
    9 bids

    DotNet developers required to 'Remove errors' in thenafter Host on server. Developers should also have knowledge about Merger of sourcecode and database of his done-work with other developer's done-work on GitHub. Website Address - User emailid- @gmail.c Password- kaspersky Errors list which has to be Removed is below and will be explained over discussion or video link will be given to developer - 1. If user types any scientific equation then error message in yellow should not appear. In case of mobile it should appear once only. Typed text should appear in left side of box rather than in middle. Scientific keyboard should appear below comment window. 2. 'Bank account numbers' in 'Transaction details' should show that

    ₹1917 (Avg Bid)
    ₹1917 Avg Bid
    5 bids

    Dear professionals in the field of programming and artificial intelligence, My name is Jorge Moreno, General Manager of SELLO ARP, S.L., a pioneering and leading company in quality certifications for online training programs. At SELLO ARP, we are undergoing a digital transformation process aimed at optimizing our audit system. Our goal is to implement an artificial intelligence-based solution capable of autonomously evaluating whether an online course meets our rigorous quality standards. This AI will need to perform the following tasks: Precise and Strict Analysis: Accurately and thoroughly evaluate each course, ensuring adherence to our quality standards. Constructive Feedback: Provide clear feedback and recommendations to help course providers continuously impr...

    ₹182076 (Avg Bid)
    ₹182076 Avg Bid
    20 bids

    "I am seeking an ethical hacker specialized in email security. My Outlook email has been compromised, and I have currently lost all access. I suspect it might be the result of unauthorized access, phishing attempts, or email spoofing. Your job is to help me regain control of my email account. Skills and Experience: 1. Email Security: Extensive experience in ethical hacking and email security protocols. 2. Outlook Familiarity: Proficiency in Outlook platform and its security aspects is critical."

    ₹2501 / hr (Avg Bid)
    ₹2501 / hr Avg Bid
    6 bids

    ...familiarity in the Solana ecosystem, to create a tensor bot for me. This bot will be used on the Tensor(). The bot's core functionalities will consist of: - Bidding on NFTs. - Listing NFTs for sale. -Adjusting bid according to the top bid so it doesn't get filled everytime.....like i want my bid to fill just once or twice in two three days so that tensor doesn't count my bid as spoofing. In order to accommodate my requirements, the successful freelancer should have extensive experience in bot creation, a strong understanding of decentralized exchanges, and specific familiarity with Tensor and Solana protocols. I'm also looking for a developer to design a user-friendly, web-based interface for the bot. This will ensure I can easily manage the bot's fun...

    ₹27762 (Avg Bid)
    Featured Urgent
    ₹27762 Avg Bid
    6 bids

    ...Packet Tracer. Technical Skills: =============== Good understanding and knowledge of TCP/IP, OSI Layer. Practical experience in configuring in CISCO 800, 1900, 2900, 2800, 2800, ISR 4300, 4100, ASR 1000 series and catalyst 2960, 9300, layer3 switches, nexus switch. #Static, RIP, RIPv2, EIGRP, OSPF, OSPFv3 and BGP #VLAN, VTP, STP, HSRP, GLBP, VRRP, SPAN, RSPAN, DHCP Snooping, Dynamic ARP Inspection, ARP ACL. #CISCO nexus 9k and CISCO ACI solution like BD, VRF, EPG, Tenant, L4-L7 graph etc. #ACL, NAT, Transparent Mode, Multiple context and Failover (Active/Active, Active/Standby) Site-to-Site VPN, Remote Access VPN and SSL VPN, Intrusion policy, AVC, Malware & File Policy etc in Cisco ASA, Next Generation Firewall and Firepower Management Center (FMC) #F5 BIG-I...

    ₹2501 (Avg Bid)
    ₹2501 Avg Bid
    1 bids

    ...establishing these authentication protocols. Here's what I need from you: - **DKIM Configuration**: Set up DomainKeys Identified Mail (DKIM) records to ensure that the emails sent from my domain are authenticated and trusted by recipient email servers. - **DMARC Implementation**: Implement Domain-based Message Authentication, Reporting & Conformance (DMARC) policies to protect my domain against email spoofing and to align with authentication standards. - **Compliance Check**: Verify that the DKIM and DMARC implementations are correct and meet the necessary compliance standards. IDEAL SKILLS AND EXPERIENCE: - Experience with 123 reg email services - Background in email security and authentication protocols - Proven track record in improving email deliverability throug...

    ₹13208 (Avg Bid)
    ₹13208 Avg Bid
    26 bids

    DotNet developers required for Improvement work in thenafter Host on server. Developers should also have knowledge about Merger of sourcecode and database of his done-work with other developer's done-work on GitHub. Website Address - User emailid- @gmail.c Password- kaspersky Video link for Explaining 'Improvements work to be done' is below-

    ₹12172 (Avg Bid)
    ₹12172 Avg Bid
    6 bids

    ...user-friendly interface that allows users to easily navigate and interact with the scraped information. Scalability: Design the system to be scalable, accommodating potential changes to the Gig platform and handling a growing user base. What needs to be done: Full website design (Front-Back End) Dashboard for Admin Server configuration Payment Integration Bot Development (Script) Geolocation Spoofing Web App Ideal Skills and Experience: - Experience in web scraping and data extraction. - Proficiency in programming languages such as Python or Java. - Knowledge of HTML and CSS for website design. - Familiarity with scraping tools and libraries such as Beautiful Soup or Scrapy, Selenium. - Experience in developing systems with real-time functionality. - Knowledge of secure authe...

    ₹2751 / hr (Avg Bid)
    ₹2751 / hr Avg Bid
    76 bids

    ...- the persons, who will later test your work, are typically not engineers. They have a good understanding of simulating or entering sensor values. - based on this sensor values, the actors shall trigger and display on the UI. E.g. if you have simulated PIR, the persons shall activate a PIR detection duration and amout. So they can identify how sensitive the PIR requires to be. - if you assume a ARP-based presence detection, the users, shall be able to trigger a "smartphone" wifi logon - if the presence is detected, the corresponding actor shall be triggered and be visualized to the end user. Timeline: - this is for now a setup project of the simulator for our premise. Based on the pace and quality of delivery we will like to integrate you into the process of implementi...

    ₹1584 / hr (Avg Bid)
    ₹1584 / hr Avg Bid
    14 bids

    DotNet developers required for Improvement work in thenafter Host on server. Developers should also have knowledge about Merger of sourcecode and database of his done-work with other developer's done-work on GitHub. Website Address - User emailid- @gmail.c Password- kaspersky Video link for Explaining 'Improvements work to be done' is below-

    ₹9587 (Avg Bid)
    ₹9587 Avg Bid
    13 bids

    I'm currently in need for assistance in the setup of DKIM, DMARC, and SPF records for multiple domains (between 2 to 5), specifically on Office 365. The project's details are as follows: 1. DKIM, DMARC, SPF Setup: A professional who can efficiently set up these email authentication methods, ensuring all our outgoing emails are verified — curtailing email spoofing and phishing attacks. 2. Policy Development: I'm not sure whether there's an existing policy for DKIM, DMARC, and SPF or a new one will need to be created, hence part of your role would involve assessing the current state and subsequently formulate a suitable policy if required. Ideal skills and experience: - Proficiency with Office 365 email service, godaddy, active campaign, wordpress - An u...

    ₹5252 (Avg Bid)
    ₹5252 Avg Bid
    26 bids