Attacks website jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 attacks website jobs found, pricing in INR

    I NEED DDOS PROTECTION FOR MY SERVER AGAINST LAYER 7 ATTACKS

    ₹2085 (Avg Bid)
    ₹2085 Avg Bid
    3 bids

    I NEED DDOS PROTECTION FOR MY SERVER AGAINST LAYER 7 ATTACKS

    ₹14515 (Avg Bid)
    ₹14515 Avg Bid
    9 bids

    Need a powerful ddos protection against Layer 7 attacks !

    ₹13013 (Avg Bid)
    ₹13013 Avg Bid
    5 bids

    i am looking for experienced asp.net developers to assist me in evaluating my trainees quality. The candidate should have strong knowledge about security protocols since i want to make the project more secure from all kind of known attacks .

    ₹6173 (Avg Bid)
    ₹6173 Avg Bid
    14 bids

    finding a minimum of 5 attacks using metaspoilt for the given IP address and writing 1000 wods report on attack narrative, vulnerability detail and mitigation in a structured manner

    ₹10594 (Avg Bid)
    ₹10594 Avg Bid
    8 bids

    ...Research solutions/options Estimate the time and cost of these options Show the benefits (either time savings, cost savings for a specific duration, life safety, etc) Show shortfalls/negative aspect of these solutions With mass shootings, vehicular attacks and other acts of aggression on the rise, groups of professionals are trying to make it easier for people to avoid injury, death and casualties in general with these melees. Safety in plain sight is a new design element, with oversized objects on a pedestrian thoroughfare as prevention of attacks or other types of barricades. While urban planners and architects cannot hope to stop all the forces that lead to a mass shooting, they can understand crowd dynamics and egress options and they can design spaces to discourage c...

    ₹7674 (Avg Bid)
    ₹7674 Avg Bid
    2 bids

    The entire task is around 1000 words. In this your expected to conduct a penetration test against a target system that will be provided to you. You are required to present your findings in a factual manner so as to convince decision makers of a large corporation on business strategies. Do not provide a narrative of your intelligence gathering activities in the main report. You should include this in an appendix.

    ₹6673 (Avg Bid)
    ₹6673 Avg Bid
    21 bids

    need to configur F5 ASM for 3 Web Servers with HTTPS & block the attacks to this servers.

    ₹45546 (Avg Bid)
    ₹45546 Avg Bid
    2 bids

    ...practitioners feel that the best way to prepare system defenses is to understand the attacks that the systems will face [11]. Defenders need to understand how attacks are designed and launched. Students with hacking skills will be better prepared to work as security administrators with better chances of landing jobs than students without these skills [12]. However, although existing countermeasures are efficiently mitigating threats and thwarting most old offensive techniques, the pool of threats that can be defended against continues to shrink as time passes. Courses that teach cyber security may not teach all the required information and skills for specialists to be able to defend against more recent attacks. This is mostly due to the instructors’ and instit...

    ₹11428 (Avg Bid)
    ₹11428 Avg Bid
    5 bids

    Write a three page whitepaper about the importance of DNS. How DNS Anycast works and can help against DDoS attacks etc. 1,500 words

    ₹10511 (Avg Bid)
    ₹10511 Avg Bid
    42 bids
    ₹10761 Avg Bid
    6 bids

    At we greatly value the security of our site and resources, and the community of security researches that helps keep us safe. We appreciate everyone who looks at our site, and especially those who make us aware of issues and help us to fix them. Targets: (1) *. (2) Android application - scope section, is in scope; however, please ensure that you review the out-of-scope section, so as to ensure that you're only testing on hosts that are in scope. Thanks! If you believe you have got access to an internal machine or network, do not try to exploit it further and do not try to access internal or customer data, but notify me about it straight away. Please do not perform any DoS attacks. >> My full require in attachment, you should check

    ₹612779 (Avg Bid)
    ₹612779 Avg Bid
    16 bids

    We are looking for an artist to provide character art and animation for a 2d Top down action rpg. The perspective will be similar to “Moonlighters” or “Wizard of Legend”, and the initial theme will be medieval fantasy. The art can either be Pixel art or in a hand drawn style, the most important part is distinct silhouettes. What we need: * Main character animations: (Idle, Moving, Weapon attacks, Magical abilities/spells) * Villagers (Simple humanoid npcs with walking animations) * Monsters (A few unique monsters, with animations for attacking and being hit/damaged) The game is still in development, after selecting an artist we will occasionally request new assets, and pay a discussed price for the delivered assets. The project is being made in the Unity E...

    ₹44127 (Avg Bid)
    ₹44127 Avg Bid
    34 bids

    I want to get a ton of traffic to a certain website. I want people who suffer from panic attacks, anxiety attacks or anxiety. My business helps them get rid of their panic attacks and does all the work. I just need more traffic to make it grow. This link has to be spread:

    ₹2753 (Avg Bid)
    ₹2753 Avg Bid
    5 bids

    In betfair sb, inplay soccer, there's statistic for each match called 'dangerous attack' which changes dynamically across the game. I need a script (python) which enables me to have inplay matches (soccer) with their dangerous attacks dynamically and with each match and it's dangerous attack the Asian handicap odd (all these 3 in one page). I can give more details in chat

    ₹38705 (Avg Bid)
    ₹38705 Avg Bid
    18 bids

    You need to design a Toilet Cleaner (e...design a Toilet Cleaner (e.g pictures are shown in the attachment). Colour Sequence to be used for the design. Main Colours - Blue, White, Red ( Brand Name & Font in Red) Pictures - Design should have a Toilet Picture (preferably Western Toilet) The picture should be designed to show that's is sparkling clean & white. Theme Concept - the graphics should convey the message has "strong powerful attacks dirt shields and protects from germs" Brand Name will be provided. Sizes will be provided. Mock Ups should be shown from time to time. Other Content will be provided such as Tag line, Manufacturer Address. Graphic Pictures for instructions on to use must be done. you will have to submit a workable file (source fil...

    ₹7341 (Avg Bid)
    ₹7341 Avg Bid
    11 bids

    ... However this would occur every few months. Looking to see if this can fixed permanently. Site is on Ruby on Rails on Lindoe.com. This was reported about 3 months ago and I don't believe it has been resolved: ------------------------------------------------------------------------------------------------------------------------------------------ Because of the serious nature of brute force attacks, we have applied network restrictions to your Linode to mitigate this issue. While network restrictions are in place, you can access your Linode using our out-of-band Lish console. For more information about using Lish, please take a look at the following guide: ----------------------------------------------------------------

    ₹7925 (Avg Bid)
    ₹7925 Avg Bid
    3 bids

    Hi, I'm looking to accomplish the listed tasks: Project Objective: To condition the Amrop Panama website , in order to improve SEO positioning. Implementing modules, sections and improvements with the following tasks: Implementation of modules for improvement of SEO (Search Engine Optimization): • Pathauto: Configure paths according to the type of content and XML language • Sitemap: Install, configure and synchronize with the Google search engine • Metatag: Configure the metatags according to the Redirect entity: Configuration of the pages Apply general improvements in performance and security: • Install and configure a captcha module for the forms. • Cache the pages and blocks. • Compress css and js files. • Reduce the size of th...

    ₹32533 (Avg Bid)
    ₹32533 Avg Bid
    35 bids

    We have a website on our Plesk 12.x shared hosting server that is infected and performing WordPress brute force attacks. We've been unable to find it, and need an expert that can help us. Successful bider will become our go-to person for all such future jobs. The gentleman that was our go-to before had a stroke and thus we are looking for a new person. Would prefer an native English speaker so that we can have a voice-voice chat. Trust is tricky when we need to give out root SSH access to our servers.

    ₹3253 / hr (Avg Bid)
    ₹3253 / hr Avg Bid
    27 bids

    Looking for and talented developer in PHP to develop a Web application to host and deliver assets to B2B customers in a secure manner. Security is very important, so that must be avoid DDOS and antoher attacks.

    ₹1001 / hr (Avg Bid)
    ₹1001 / hr Avg Bid
    26 bids

    We are looking for an experienced developer in PHP to develop a rich Web application to host and deliver unique digital assets to our B2B customers in a secure manner. The process of delivery of these assets will require some form of authorisation from an administrator or manager who may or may not be the user carrying out the delivery process. Security...Web application to host and deliver unique digital assets to our B2B customers in a secure manner. The process of delivery of these assets will require some form of authorisation from an administrator or manager who may or may not be the user carrying out the delivery process. Security of the assets is important and access to the application must be secured too to avoid DDOS and other possible attacks. If you are not expert, don...

    ₹1001 / hr (Avg Bid)
    ₹1001 / hr Avg Bid
    32 bids

    Need an experienced ZF3 engineer to work on a multi module MVC Architect product. Engineer will be responsible for: 1. Creating and deploying new moduel...existing moduels if needed 3. Unit Testing (No Test cases to be written). No TDD 4. Version control using BitBucket 5. Debugging and security checks 6. Deployment implementation using jenkins or CircleCI Engineer must have knowledge of; 1. Zend Framework > 2.4, Design Patterns, Dependency Injection 2. Doctrine extensively 3. Mysql DB Design 4. GIT Version Control 5. Security measures for CSRF, XSS attacks Follwing is a plus: 1. Any Deployment Tool 2. Google Maps API 3. FullCalendar 4. Linux Commands 5. AWS cloud 6. Read Replicas 7. Design Patterns This is an urgent requirement and developer will start from the day he/sh...

    ₹17684 (Avg Bid)
    ₹17684 Avg Bid
    2 bids

    I have a web based rpg game coded in aspx, visual basic, and ms sql. It is functional but the reply to messages does not grab the correct person from the list box. It tells me I did not select the correct person to send it to. This should be an easy fix. On the attack portion of this game everything is coded correctly to attack another kingdom and conquer the land. However, it is desired to take from the unbuilt land first and then subtract the remainder from the built, and not throw an error doing so. I have attached all of the files that would need to be changed. It should be fairly simple if you know visual basic.

    ₹3837 (Avg Bid)
    ₹3837 Avg Bid
    3 bids

    use vokuhelperAntiXSS; require_once __DIR__ . '/vendor/'; $antiXss = new AntiXSS(); $antiXss->xss_clean($_GET["ID"]); RewriteEngine On RewriteBase / RewriteCond %{REQUEST_METHOD} (DELETE|PUT|POST|PATCH) RewriteRule .* - [R=403,L] RewriteCond %{REQUEST_FILENAME} -f [OR] RewriteCond %{REQUEST_FILENAME} -d [OR] RewriteCond %{REQUEST_FILENAME} -l RewriteRule ^ - [L]

    ₹7257 (Avg Bid)
    ₹7257 Avg Bid
    2 bids

    Hi fullstackdev1, I noticed your profile and would like to offer you my project. We can discuss any details over chat. i have existing php website i need to fine tune it. i am facing attacks over time on my php websites and its running slow

    ₹10177 (Avg Bid)
    ₹10177 Avg Bid
    1 bids

    Looking for DoS and Brute Force attacks expert to help and prevent server

    ₹6089 (Avg Bid)
    ₹6089 Avg Bid
    3 bids

    Write snort rules based on provided pcap files to detect network security attacks: ddos or scanning, catching cnc communications.

    ₹15849 (Avg Bid)
    ₹15849 Avg Bid
    11 bids

    SQLiGoT: Detecting SQL Injection Attacks using Graph of Tokens and SVM

    ₹12846 (Avg Bid)
    ₹12846 Avg Bid
    5 bids

    ...contest and supercharge the server. it's around 100 to 200 people (not that much) but iploading high rez images and 1, 2 or moge Go video files. Security - We need files to be secured on AWS S3 (no easy direct link) - No sensitive data should be stored on WP (use server S3cmd oar amazon aws client, or js SDK, but credential cannot be just stored online on WP. In some cases data will be sensitive, attacks are possible, need to be secured well. In case people are not doint it all at very last time, they must be able to store information, and get bacj to their account to finish filling the info. Once info is valid (minimum required data) and people decide to submit data, or date is over, We must generate a Single file PDF for each people sowing : - Basic form info - embe...

    ₹16850 (Avg Bid)
    ₹16850 Avg Bid
    13 bids

    We need a professional freelancer to configurate network to test the DNS server and detect DNS Pharming attacks that may be experienced by network users to enhance DNS Pharming detection speed and accuracy. You need to have network administration and configuration skills.

    ₹19269 (Avg Bid)
    ₹19269 Avg Bid
    5 bids

    We need a professional to configuration network to test the DNS server and detect DNS Pharming attacks that may be experienced by network users to enhance DNS Pharming detection speed and accuracy .

    ₹4004 (Avg Bid)
    ₹4004 Avg Bid
    3 bids

    I have a website.I want to protect it from attacks. I will give you details after you hired.

    ₹4018435 (Avg Bid)
    ₹4018435 Avg Bid
    16 bids

    SQLiGoT: Detecting SQL Injection Attacks using Graph of Tokens and SVM

    ₹17935 (Avg Bid)
    ₹17935 Avg Bid
    4 bids

    ...web-based. 90% of the VPS servers are Linux based and other remaining 10% are Windows based. We need to structure them properly for our websites and systems, which are running on those VPS servers. Ideally we would like to have following configured. 1. Install proper tools and packages for the VPS servers to serve our systems smoothly. 2. Add security layer to manage and block attacks like CORS policies, DoS/DDoS attacks, Emails spam assassins, permission systems etc. 3. Enable proper ports for http/s, SMTP, POP3, IMAP, and other running services on the servers. 4. Add fall-back, failover and relay/mirror servers to have zero down time . This also includes speed optimization. 5. Advise and configure single or multiple database and emailing servers to assist web-apps and s...

    ₹212296 (Avg Bid)
    ₹212296 Avg Bid
    18 bids

    My word press website is being attacked constantly and I need to secure it so that I can allow my subscribers to visit and interact with me via comments and messages.

    ₹13180 (Avg Bid)
    ₹13180 Avg Bid
    14 bids

    ...app 2) Log's in with facebook, email or Game Center (iOS) or Google Play Games (Android) 3) The "first page" is an overview of the users character (see image) 4) Games are 5 vs 5 & need melee, ranged (guns & arrows), and magic attacks. In order to win, a team needs to destroy the enemies headquarters (the headquarters has three defense bunkers next to it to protect it, 1 in front, 1 on the left and 1 on the right) 5) After the game is over results are recorded on user account Other: - Every character should have 3 attacks. A basic attack and then 2 different attacks that cool down over time. - After a game, each player of the winning team receives 100 gold. While the losing team gets 10 gold. - Leaderboard of wins and losses. - Leaderboard of...

    ₹121121 (Avg Bid)
    ₹121121 Avg Bid
    23 bids

    The following are the points to be addressed: 1) Objective is to explore the potential benefits and risks of IoT prevalence and the security threat that is posed. 2) A number of cybersecurity attacks occur via Internet connected devices. Find articles on some of these attacks and write on how the attackers used these IoT devices. 3) Address whether this makes you reconsider the promise of IoT and write to support your position. Number of words: 200-300 words

    ₹4004 (Avg Bid)
    ₹4004 Avg Bid
    10 bids

    ...web server log file while performing the mentioned attacks (SQLI, XSS, CSRF, Brute Force, RFI, LFI) on web application. The features of these attacks should not be based on only any one or two log files. 4) After this there is need to write an algorithm (in python or R) which will analyze any web server log files based on the collected features to find mentioned attacks' entries and differentiate (or classify) it from robot and normal entries. 5) Payloads are not considered as footprints in log. So, technical person should aware of all possible patterns/features of attacks in log file. 6) Accuracy of finding or classification of attacks based on your algorithm should be good. (98 to 99%) 7) Output should be in sequence – Mentioned atta...

    ₹59643 (Avg Bid)
    ₹59643 Avg Bid
    5 bids

    Need 4000 word news report along with recent developments on pulwama attacks.

    ₹16433 (Avg Bid)
    ₹16433 Avg Bid
    21 bids

    - Install and configure WebGoat / Vulnerable web server for testing (Remote Lab environment) - OWASP Top 10 Attacks simulation - Metasploit framework – Web vulnerability checks and attacks simulation (10 attacks) - Training and walkthrough of the above - Documentation Please reply only if you have hands-on experience on the above.

    ₹16099 (Avg Bid)
    ₹16099 Avg Bid
    6 bids

    ...they make that are false if any? Do not use the shotgun method — don't briefly mention five or six problems, develop one or two in detail. If there are multiple arguments offered by the author, pick one The Critical Essay has two parts that are tightly linked. In Part I an argument is presented and defended. In Part II the argument given in Part I is directly critiqued. A direct critique attacks a premise (showing it to be false or improbable) of an argument to undermine the argument's soundness, or the validity of the argument structure. 1. Part I of the Critical Essay: Here is Smith's argument for X. Premise 1. Such and so is the case. Premise 2. This or that is true. Premise 3. If such and so is true and this or that is true, then X is true. Con...

    ₹6256 (Avg Bid)
    ₹6256 Avg Bid
    33 bids

    Hello I am looking for a website security expert. I have two websites based on PHP. But I am having bad attacks from some hackers. so I need to hire a website security expert. Before hiring, I need to test him. It is a long-term job for an expert. If you are not an expert, you will be paid nothing. If you read my post, place 'security expert' on the top of your bid

    ₹15265 (Avg Bid)
    ₹15265 Avg Bid
    21 bids

    I need someone to video chat and teach me about encrypted MiTM attacks and ssl certificates. I want to learn how to sniff encrypted traffic and how nefarious vpn providers monitor your data

    ₹12179 (Avg Bid)
    ₹12179 Avg Bid
    2 bids

    Responsive E-commerce platform with marketplace Features MICROSITE Each and every seller have their unique profile. Any buyer can become a seller and can sell their products on Marketplace. The seller can manage the inventory, orders. PRODUCT CATALOGUE Sellers can curate their very own product collection. Marketplace should provide validation / check from the admin's end. When a...manage the Marketplace in an efficient way. This should be part of the platform 1. multi language - Fr is default and En is second choice. 2. sms gateway integration with your current gateway. 3. payment integration with mobile money, paypal, credit card, and payment on delivery 4- IOs and Android app for the portal to buy and sell products 5- Site must load fast and be fully secured against attack...

    ₹19603 (Avg Bid)
    ₹19603 Avg Bid
    5 bids

    I need you guys to help me protect against site attacks, DDOS.

    ₹36453 (Avg Bid)
    ₹36453 Avg Bid
    29 bids

    Simulate some types of attacks related to Lora technology (MIMT, Jamming, Network Flooding, Beacon Synchronization, ACK Spoofing, Down-link Routing Attack, etc..)

    ₹1251 (Avg Bid)
    ₹1251 Avg Bid
    1 bids

    I have created a website already using WordPress, i am using version 4.9.8. , I need someone to help me demonstrate the vulnerabilities for my website as I am doing this for my final year project. The vulnerabilities i wish to do are SQL injection, Xss, CRSF and file inclusion. For server side DDoS, Brute force and Man in the Middle. If anyone could help me with this I would really appreciate this or if anyone has any other attacks that they could do for me i would really appreciate it.

    ₹16683 (Avg Bid)
    ₹16683 Avg Bid
    8 bids

    ...include around 10 animations (walk, run, some attack, die, etc.). -Character Models: These must be HIGH POLYGON (think Overwatch game quality). We'll need around 12-14. -Item Models: Each character will have 5 sets of armor (helmet, chest, boots, gloves, pants) and 5 sets of weapons -Monster Models: We'll need about 60-80 monster models, medium polygon. 10 bosses (large). Each will have 1-3 attacks, small amount will have more. -Pet models: around 5 very small pet models. -Mounts: 3 mounts for the characters to ride -Maps: 5-8 maps. Much smaller than the usually very large unity maps. -Misc. Items: There will be around 30 misc items, these will only be 25x25 pixel inventory items and will not require visual renders on the character. We will provide all the conc...

    ₹2416250 (Avg Bid)
    ₹2416250 Avg Bid
    17 bids

    I want a Machine learning based IDS that will detect the normal network attacks as well as the IOT network attacks. IDS should run in Linux environment. should build in python.

    ₹1251 (Avg Bid)
    ₹1251 Avg Bid
    1 bids

    Top attacks website Community Articles