Router vulnerabilities list jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 router vulnerabilities list jobs found, pricing in GBP
    Network and Web Security Testing 14 hours left
    VERIFIED

    I'm in need of an ethical hacker to assist in testing the security of our network and web applications. This is to ascertain the effectiveness of our current security...- Web application security testing Access: - You will have full system access, which will enable you to conduct comprehensive testing across all areas. Ideal Experience: - Previous experience in ethical hacking with a specific focus on network and web application security testing - Familiarity with various penetration testing tools and methodologies - Ability to document and communicate vulnerabilities effectively - Strong understanding of IT security principles and best practices. Your assistance in this project will be invaluable in helping us fortify our security measures and protect our systems from mal...

    £28 (Avg Bid)
    Urgent
    £28 Avg Bid
    9 bids

    I'm seeking a highly skilled cybersecurity expert with a deep understanding and experience in international banking and financial transactions. The main tasks include cybersecurity assessment, penetration testing, and fraud detection. Your primary focus will be on our online banking platform and payment gateways, ensuring that these areas are secure from potential cyber threats and vulnerabilities. We want you to prioritize three key security aspects: network security, data encryption, and user authentication. Your expertise should include: - In-depth knowledge of international banking and financial systems and transactions - Proven experience in cybersecurity assessment, penetration testing, and fraud detection - Specialization in online banking platforms and payment gatew...

    £44722 (Avg Bid)
    £44722 Avg Bid
    10 bids

    I'm in need of a professional web developer to create a basic website for managing workplace shift schedules. It is enough that this project has the qualifications to do the job. I am leaving a few photos so that you can have general information about the project design. It is sufficient that at least the texts that will be seen in the UI be in Turkish. Key Features: - Employee login and registration - Comprehensive shift scheduling and management tools - Facility to view and edit shift details - User access restrictors based on roles The web platform should be designed with a professional and corporate aesthetic, ensuring it's not only functional but visually appealing to users. Ideal Skills and Qualifications: - Proficiency in web development, particularly with SpringBoot :...

    £127 (Avg Bid)
    £127 Avg Bid
    28 bids

    I am seeking a professional to develop a software that can efficiently extract and present the scripts used on a list of URLs provided. The software should be able to handle up to 1000 URLs at a time and run specifically on Windows. Key requirements include: - Extracting scripts: The software should be able to seamlessly access the provided URLs and list the scripts used on each page. - Bulk processing: The software should be capable of handling a significant amount of URLs, up to 1000 at once. - Windows compatibility: It is essential that the software is designed to run on Windows OS. Website Accessibility: - Restricted access: Websites that require restricted access or login should be identified and reported separately. The software should skip such pages and indicate the...

    £384 (Avg Bid)
    £384 Avg Bid
    78 bids

    ...concepts. Key Requirements: - The task involves writing a client request to obtain a flag from a vulnerability site with advanced complexity (e.g., bypassing security measures). - The project involves emphasizing on Remote Code Execution (RCE) and pollution while interacting with the vulnerability site, so experience in these areas is a plus. --- Challenge Name: Emu Apothecary Category: Vulnerabilities Description has just opened up their potion brewing website for other Emus to create new potion recipes! However, they are afraid that one of the human hackers will pollute their ingredients. Can you get Remote Code Execution (RCE) on the Emu Apothecary's website? Below are the steps on creating the terminal command you want to execute on the website: Visit to crea...

    £21 (Avg Bid)
    £21 Avg Bid
    12 bids

    ...penetration test on my Windows desktop application. Key Requirements: - Conduct a automated penetration test specifically tailored for a Windows desktop application. - Ensure the test covers all potential vulnerabilities and security risks. - Provide detailed reports on the findings, including any exploits, weaknesses, and areas of improvement. Ideal Experience: - Proven track record in penetration testing for Windows desktop applications. - Extensive knowledge of cybersecurity, with a focus on application security. - Strong analytical skills to identify and assess vulnerabilities. - Excellent reporting skills to communicate findings effectively. I'm looking for a freelancer who can deliver a high-quality, detailed report on the security of my application. Th...

    £230 (Avg Bid)
    Urgent
    £230 Avg Bid
    9 bids

    ...process, pot distribution, and fee collection automatically. • Transparent and immutable records of all bets and transactions. 7. Administrative Dashboard: • An interface for administrators to manage games, view statistics , and handle user inquiries. • Tools for setting up new games and closing completed games. 8. Security and Transparency: • Ensuring the platform is secure and free from vulnerabilities. • Providing transparency to users regarding bet placements, odds, and pot distributions. Technical Specifications: • Blockchain Platform: Preferably Ethereum or any compatible blockchain supporting smart contracts (e.g., Binance Smart Chain, Polygon). • Smart Contract Language: Solidity (for Ethereum and compatible blockchains). &bu...

    £792 (Avg Bid)
    £792 Avg Bid
    105 bids

    ...making Desktop/Mobile responsive websites - Previous experience accurately converting a PSD design to a fully responsive website using MERN stack (or similar stacks) Requirements: Provide daily progress updates Develop the website's frontend and backend with database and admin panel Integrate payment gateways with full nodes for cryptocurrencies Test the website for bugs and security vulnerabilities Launch the website and perform post-launch checks Maintenance and ongoing improvements Monitor the website's performance and user feedback, fix bugs and implement new features based on user demand Must have all components required Must be responsive (work across mobile/desktop/laptop/tablet screens) Must not have any spacing/alignment/responsive/font issues or mi...

    £1376 (Avg Bid)
    £1376 Avg Bid
    26 bids

    I'm seeking a well-exp...candidate should have: - Proficiency in Wiznet development - Proficiency in STM32 development - Extensive experience with Ethernet connectivity - Understanding of data transfer speeds and protocols. - STM32 and W5500 modules at hand Your job will be to write an optimal code, preferably in STM32CUBEIDE or Keil MDK Arm. The Wiznet W5500 is connected to STM32 via SPI, it should connect to ethernet router with DHCP mode and afterwards establish and maintain a websocket connection to public domain, sending and receiving data. The code should be clear, well commented and easily readable-reusable. The devices used are STM32F103C8 and Wiznet W5500. Please, make your bid indicating your understanding of the project, and your proposed timeline for complet...

    £116 (Avg Bid)
    £116 Avg Bid
    22 bids
    Pentester Red Teamer Needed 4 days left
    VERIFIED

    ...goal of this project is to discover any potential weaknesses in the security of the network environment and gaps in the cybersecurity infrastructure's configuration. - We need to show the SOC how their security products can be bypassed. Ideal Skills and Experience: - Proven experience in network and server penetration testing and/or red teaming. - Solid understanding of common security vulnerabilities and how they can be exploited. - Strong problem-solving skills and the ability to think like a cyber attacker. - Proficiency in using various pentesting tools and frameworks (metasploit, cobalt strike, sliver). This is a critical project and requires a freelancer with a high level of expertise in network security. Please make sure to provide evidence of your previous wor...

    £24 / hr (Avg Bid)
    £24 / hr Avg Bid
    25 bids

    I'm looking for an experienced cybersecurity specialist who can help me in conducting a penetration test on my Wix website. Key Responsibilities: - Perform a thorough penetration test on my Wix website to identify potential security vulnerabilities. - Provide actionable recommendations to mitigate any vulnerabilities found. Your Skills: - Proven experience in conducting penetration testing on websites. - In-depth knowledge of common security vulnerabilities and how to identify them. - Familiarity with Wix's platform and its specific security features is a plus. - Strong communication skills to explain complex technical issues in an understandable way. Please be aware that the job strictly involves penetration testing for the purpose of enhancing securit...

    £116 (Avg Bid)
    £116 Avg Bid
    35 bids

    I'm working on a project using Ignition 8.1.31 and need a feature implemented. The goal is to have a dropdown list in the perspective view that allows the user to select files from a specified directory. Key Points: - The dropdown should be populated with the file names upon the user clicking a perspective View button. - The Load button should be located on the perspective view. The ideal freelancer for this job should have experience with Ignition 8.1.31 and familiarity with creating dropdown lists that are dynamically populated based on user interactions.

    £12 / hr (Avg Bid)
    £12 / hr Avg Bid
    36 bids

    I ...individual with experience in compiling email lists to help me create a targeted list of small businesses in Australia for my email marketing campaigns. I will provide the business types I'm interested in: retail stores, restaurants, and service providers. Key Responsibilities: - Research and compile a comprehensive email list of small businesses across Australia, specifically in the retail, restaurant and service provider sectors. - Ensure the list is accurate, up-to-date, and segmented according to the provided business types. Ideal Candidate: - Experience in creating targeted email lists, particularly for small businesses. - Familiarity with Australian small business landscape. - Attention to detail to ensure list accuracy. Please include your r...

    £9 / hr (Avg Bid)
    £9 / hr Avg Bid
    43 bids

    I'm looking for a freelancer to help me with email scraping to build a targeted email list in the education sector. Specifically, I'm interested in parents who are seeking tuition services for their children. Key Responsibilities: - Conducting research online to identify and extract email addresses of parents seeking tuition services for their children - Organizing the list in an easily accessible format that I can utilize for email marketing campaigns Skills and Experience: - Proficiency in email scraping and list-building - Prior experience in targeting the education sector is desirable - Understanding of lead generation and email marketing best practices

    £16 (Avg Bid)
    £16 Avg Bid
    42 bids

    I'm in need of a skilled Network Support Engineer who can assist me with my small network comprising of 1-50 devices/users. The ideal person should have experience with routers, switches, and firewalls. Key Responsibilities: - Identify and resolve issues related to slow network speed, connectivity problems, and potential security vulnerabilities - Recommend and implement improvements to enhance network performance and security I'm looking for someone with: - Proven experience in handling small-scale networks - Deep understanding of routers, switches and firewalls - Strong troubleshooting and problem-solving skills The successful candidate is expected to not only resolve immediate issues but also provide insights and recommendations to prevent future network problems. Lo...

    £8 / hr (Avg Bid)
    £8 / hr Avg Bid
    23 bids

    ...security of our GlobalView application hosted on Azure and our WordPress website hosted on WP Engine. Objectives: Conduct a thorough security assessment of the GlobalView application and WordPress website. Identify security vulnerabilities and threats. Provide actionable recommendations for remediation to meet ISO27001 standards. Scope of Work: GlobalView Application: Hosted on Azure. Developed with PHP and JavaScript, code on GitHub. Emphasis on application, data, and cloud security. WordPress Website: Hosted on WP Engine. Focus on CMS security, plugin vulnerabilities, and web application security. Deliverables: Penetration Testing Report: Detailed findings with severity ratings. Recommendations for remediation. Timeline: Project duration: 2-3 weeks. Requirements: E...

    £1685 (Avg Bid)
    £1685 Avg Bid
    73 bids
    Video Streaming Network Setup 4 days left
    VERIFIED

    I would like a Network Admin to configure the router of an internet network to allow the transmission of video signals from an RTP/RTSP-RTMP encoder, installed on a PC with a router equipped with a dynamic IP address in OFFICE A, to the recipient OFFICE B , which is connected to a server with a router with a static IP address. Reception/decoding in OFFICE B must take place via an RTP/RTSP-RTMP decoder or via VLC. We are also evaluating the possibility of implementing a CDN or a VPN to further optimize signal transmission.

    £110 (Avg Bid)
    £110 Avg Bid
    22 bids

    I am looking for a cybersecurity expert to conduct a thorough penetration test on my custom-built web application. The primary goal of this testing is to ensure my application is fully compliant with the regulations set by the Saudi Cyber Security Authorities. Key requirements for the project: - Conduct a comprehensive penetration testing on my web application. - Identify and exploit vulnerabilities in the current setup. - Suggest and implement measures to address any identified issues. - Ensure the application is fully compliant with the regulations set by the Saudi Cyber Security Authorities. Ideal Freelancer: - Proven track record of successful penetration testing on custom-built web applications. - Extensive experience working with regulatory standards, ideally, knowledge of S...

    £136 (Avg Bid)
    £136 Avg Bid
    14 bids

    Building a comp...equipment, and assets. Manage purchase orders and inventory levels. Analytics and Reporting: Provide analytics on student performance, attendance, and financial data. Generate customizable reports for administrators, teachers, and parents. Security and Data Protection: Implement robust security measures to protect sensitive data. Regularly update and maintain the software to patch security vulnerabilities. Mobile App Integration: Develop mobile apps for iOS and Android platforms to allow access to features on mobile devices. Enable push notifications for important updates and reminders. Integration with External Systems: Integrate with other systems such as learning management systems (LMS), accounting software, and student information systems for seamless data...

    £530 (Avg Bid)
    £530 Avg Bid
    21 bids

    I need assistance with extracting specific data from a voter list that comes in PDF format from the election commission. Here’s what I need: - Extract Name, FathersName, Age, Gender, VoterID, and SerialNumber from the PDF voter list. - Placement in a standard Excel format is acceptable, no need for any specific formatting. - Not just a one-time service, I also need a software or script that can perform this PDF-to-Excel conversion automatically in the future. Ideal candidates for this project have advanced skills in data extraction, familiarity with handling election data and proficiency in developing an automated system for convenient PDF to Excel conversion.

    £72 (Avg Bid)
    £72 Avg Bid
    41 bids

    I'm looking to create an extensive database of rice mills in India that includes essential information like Name, Address, Contact, Email and GST details. This data will be used for sales outreach, so each entry needs to be thorough and accurate. Key deliverables: - Compilation of data in a spreadsheet format. - Each entry must include the rice mill's Name, Address, Contact, Email, and GST details. Ideal Skills and Experience: - Proficiency in data collection and organization. - Strong attention to detail and accuracy. - Prior experience in market research, data mining or similar projects. - Knowledge of the agricultural industry in India would be a plus, but not required.

    £57 (Avg Bid)
    £57 Avg Bid
    26 bids

    I'm looking for a white hat hacker to conduct penetration testing on my network infrastructure. Key Objectives: - Identify potential vulnerabilities within my network infrastructure - Perform various penetration testing activities to test the security measures in place Key Requirements: - Experience in network penetration testing - Knowledge of common tools and techniques used for network security testing This project will involve testing the security of both Android and iOS mobile operating systems within my network infrastructure. The ideal freelancer should be well-versed in these areas and capable of providing a detailed report outlining the vulnerabilities found and recommendations for enhancement.

    £44 / hr (Avg Bid)
    £44 / hr Avg Bid
    13 bids

    I'm currently in need of a professional white hat hacker's services. I am dealing with some compromised accounts, and your expertise with vulnerability assessment, network penetration testing, and web application security testing is required. Tasks I need help with: 1. Vulnerability Assessment: Conduct a systematic evaluation of my system's vulnerabilities. 2. Network Penetration Testing: Simulate a possible attack on my network to assess its security. 3. Web Application Security Testing: Ensure the security of my web applications against potential threats. Further, I have been compromised on some of my email and social media accounts. I need your support with: - Password Recovery: Restore access to my accounts by recovering or resetting lost passwords. - Account...

    £431 (Avg Bid)
    £431 Avg Bid
    16 bids

    I'm looking for someone to help me create a list of 2000 industry specific business contacts, particularly names, company names, position, location information and email addresses. I would like this list to be compiled through online research only. Key responsibilities: - Researching and compiling a list of business contacts - Ensuring all email addresses are verified and duplicates removed. Note: The focus should be on getting accurate, up-to-date information.

    £19 (Avg Bid)
    £19 Avg Bid
    78 bids

    Seeking assistant... Job Duties: Gather Contact Info Email & Phone Number for the following U.S States: 1. Utah ( Primary Home State) 2. Nevada 3. Idaho 4. Wyoming 5. Arizona 6. New Mexico 7. Colorado -Locate all Roofing companies by state and compile a list for me to email & offer property claim insurance services. - Locate all Restoration & Mitigation Companies by state to offer insurance property claim services. Contact Emails for HR preferred/ management. Email & Phone compiled into a spreadsheet or what you see best fit for a email list to send out. I am based in Utah so starting homebase and spreading out to surrounding states after. would like to have 100+ roofing companies by state. 100+ mitigation companies by state. 100...

    £719 (Avg Bid)
    £719 Avg Bid
    49 bids

    I'm looking for a freelancer who can assist me with an unspecified test project.

    £39 (Avg Bid)
    £39 Avg Bid
    32 bids

    ...up and managing a secure network infrastructure to ensure protection against possible network threats. - Implementing solutions for data protection to safeguard sensitive data and reduce the risk of data breaches. - Establishing reliable threat detection mechanisms to identify and combat cyber threats before they impair our systems. - Conducting penetration testing to identify any potential vulnerabilities and strengthen our security posture. Further, to navigate our specific industry regulations, we need someone experienced in compliance with GDPR, HIPAA, and PCI DSS standards. Our business involves handling sensitive customer information which makes compliance with these regulations a priority. Ideal candidates should possess: - A strong background in cybersecurity, includin...

    £712 (Avg Bid)
    £712 Avg Bid
    6 bids

    Quote for evaluating the list with potential departments

    £39 (Avg Bid)
    £39 Avg Bid
    1 bids

    I need an expert to gather a list of 10k email addresses from Shopify users residing in the U.S. within the last 12 months. Your primary task will be to ensure the emails are from users who would be interested in receiving marketing information regarding Shopify or e-commerce in general. Key requirements: - 10,000 valid email addresses - Shopify users - Based in the U.S - Data from last 1-12 months - Segmented by industry sector Ideal Skills and Experience: - Proficiency in data mining and data collection - Strong understanding of email marketing and segmenting - Experience in curating U.S. based email lists - Past success in creating lists for ecommerce or Shopify users a plus. Please respond with your approach to this task and any previous experience that is relevant to this p...

    £16 (Avg Bid)
    £16 Avg Bid
    21 bids

    Project Guidelines for Lead Generation Campaign: Nurse Yard Overview: Nurse Yard, a leading compression sock manufacturer, and e-commerce company is seeking to expand its market by targeting hospital gift shops and independent pharmacies across North America. We are seeking a consultant to generate a comprehensive list of potential leads. This list will be used primarily for email and calling campaigns to promote and sell Nurse Yard's compression socks. Target Details: Independent Pharmacies 1. Type of Pharmacies: • Privately owned pharmacies that operate independently. • Small chains or groups of pharmacies under a single ownership. 2. Location Criteria: • Urban and suburban areas with high foot traffic. • Pharmacies located near medical centers or...

    £590 - £1181
    Featured Urgent Sealed
    £590 - £1181
    27 bids

    As a thriving business, maintaining the health and security of our office's IT infrastructure is critical. We're seeking an experienced IT Auditor to perform a comprehensive health check of our current setup. Key facets of the project include: - Analyzing network security: We need a professional understanding of our potential vulnerabilities and the advisable improvements to ensure optimal security. - IT infrastructure: The focus should be on our existing Local Area Network (LAN) and Wireless Network. Familiarity with these infrastructures is thus key. - Access Control: The review should delve into our implemented security measures – primarily access control. Recommendations for enhancing our current setup are expected. In-depth knowledge of LAN, Wireless networks...

    £508 (Avg Bid)
    £508 Avg Bid
    22 bids

    I'm looking for a skilled ethical hacker who can evaluate the security of a website, specifically focusing on a public Wi-Fi network. Key Requirements: - Identify any vulnerabilities in the system - Conduct a thorough test on the website's security protocols - Provide a detailed report of any weaknesses found Please note that this project requires you to have permission from the administrator of the public Wi-Fi network in question. Your ethical hacking certification and previous experience will be valuable assets in this project.

    £82 (Avg Bid)
    £82 Avg Bid
    10 bids

    I'm looking for someone to help me create a list of 2000 industry specific business contacts, particularly names, company names, position, location information and email addresses. I would like this list to be compiled through online research only. Key responsibilities: - Researching and compiling a list of business contacts - Ensuring all email addresses are verified and duplicates removed. Note: The focus should be on getting accurate, up-to-date information.

    £22 (Avg Bid)
    £22 Avg Bid
    108 bids

    I am looking for an experienced hacker who would help me modify games scores or currency in an online gaming site called "Rockingplay". This project is partly for personal gain, but also partly to expose potential vulnerabilities within the system. Key Tasks: - Unauthorized access into Rockingplay to modify game scores or currency - Extend the time allowance for bets Essential skills: - Expertise in ethical hacking - Experience with online gaming sites is a must. - Strong understanding of online betting system mechanics. - Excellent problem identification and security vulnerability detection abilities. This project requires a balance of discretion and transparency, your guiding principle should be ethical hacking.

    £65 (Avg Bid)
    £65 Avg Bid
    5 bids

    ...the email lists that have ever subscribed to my website's newsletter. Here's a brief overview of what I'm looking for: - **Data Extraction**: I'm looking for a full database extraction - including names, email addresses, subscription dates and any engagement metrics, if available. - **Data Compilation**: I would prefer to receive the compiled list in a Google Sheets document. **Ideal Skills and Experience:** - Proficiency in WordPress and email list management. - Previous experience in data extraction and compilation. - Strong attention to detail and ability to ensure data accuracy. - Excellent communication skills to keep me updated on the progress. Please note that I'm not looking to apply any specific filters or criteria to the data at this...

    £111 (Avg Bid)
    £111 Avg Bid
    81 bids

    I'm seeking a freelancer to generate a comprehensive list of interior design companies in a particular city. Below are the specific requirements: - Contact Details: For each company, I require their phone number, email address, and website URL. It's crucial that these details are up-to-date and accurate. - Organization: The list should be arranged by the companies' years of experience. This is a primary factor for my research. - Photos & Videos: Should also collate few photos and videos of the projects/designs the company has completed - Verification: While I do need the list organized by experience, I do not require formal verification of the companies' years of experience. However, I need the freelancer to ensure that the companies are legiti...

    £208 (Avg Bid)
    £208 Avg Bid
    32 bids

    ...including actions, reducers, and middleware. Strong CSS and Styling Skills: Redesigning the landing page and menus will require modifying the existing styles or creating new styles. The candidate should have expertise in CSS, CSS preprocessors (e.g., Sass, Less), and CSS-in-JS solutions (e.g., styled-components). Knowledge of React Router: Superset's frontend uses React Router for handling client-side routing. The candidate should have experience working with React Router and managing navigation in single-page applications. Understanding of Responsive Design: Since Superset is a web-based application, the redesigned components should be responsive and adapt to different screen sizes and devices. The candidate should have experience in creating responsive use...

    £189 (Avg Bid)
    £189 Avg Bid
    80 bids

    ...professional who is proficient in configuring an Asus router. The router is set up at my residence and I am currently experiencing a few issues with its advanced settings, particularly with port forwarding and QoS. Key responsibilities include: - Diagnosing current configuration problems. - Implementing effective port forwarding solutions. - Enhancing the Quality of Service (QoS) settings for optimized network performance. I need someone that has prior experience with Asus routers and can address these issues swiftly and efficiently. Please provide details of your relevant experience in your bid. My configuration currently works as: ISP - ISP's router - switch- PC What I would like is to have it like this: ISP - ISP's router - Asus router...

    £20 (Avg Bid)
    £20 Avg Bid
    2 bids

    In this project, I'm looking for an expert who can provide an effective zero-click exploit aimed at extracting personal data. This won't involve any unauthorized access but would serve as a tool for understanding my system’s vulnerabilities better and further strengthen it. Technical Proficiency Required: - Understanding of zero-click exploits and system vulnerabilities - Experience in encryption and decryption - Expertise in handling sensitive information Please note that the environment for deployment of this exploit is yet to be determined. Therefore, flexibility and adaptability are highly valued. Note: This project strictly disapproves and discourages any form of illegal activity, thus only candidates who are ethical and responsible should apply. RAN...

    £290 (Avg Bid)
    £290 Avg Bid
    17 bids

    I'm looking for a knowledgeable and experienced individual to review my technical project, specifically focusing on network security, cyber attacks, and comprehensive testing. Key Requirements: - In-depth knowledge of network security, cyber attacks, and testing methodologies - Proven experience in identifying vulnerabilities and protecting against cyber attacks - Ability to conduct comprehensive testing and provide detailed reports - Experience working with Raspberry Pi and understanding its security concerns The ideal candidate will have a strong background in cyber security and will be able to provide insights and recommendations to enhance the security of the project.

    £128 (Avg Bid)
    £128 Avg Bid
    19 bids

    I need a skilled professional to hack an iPhone for the purpose of eliminating harassing content. The main aim is to secure and protect someone by erasing electronically vulgar materials from the device. The task also involves testing the phone's security vulnerabilities. Executing this project requires: - In-depth knowledge and skills in iPhone operating systems - Experience in ethical hacking and security systems - Understanding of handling sensitive information The ideal candidate should be able to assure completion without negatively impacting other data on the iPhone. Kindly propose your plan of action and estimated timeline in your bid.

    £29 (Avg Bid)
    £29 Avg Bid
    15 bids

    I need someone to create a merge file for my mailing list. The mailing list is currently in a text file format. I want to use this merge file for both address labels and personalized letters. Key requirements: - Convert text file mailing list into a merge file for mailer - Incorporate both address labels and personalized letters in the final product - Implement company branding on the design Ideal skills and experience include: - Expertise in mail merge applications - Graphic design experience for company branding integration - Proficiency in data management and conversion from text formats I want the addresses to be printed directly on the envelopes, not on labels to be applied to the envelopes.

    £67 (Avg Bid)
    £67 Avg Bid
    49 bids

    I need an expert in VPN routers to assist me in setting up a router for a VPN switch. To show I am working in USA while I live in another country

    £19 / hr (Avg Bid)
    £19 / hr Avg Bid
    25 bids

    ...looking for an IT freelancer with experience in infrastructure assessment, particularly in automation testing. Your primary task will be to evaluate our IT landscape and develop a comprehensive understanding of its network security, system performance, and data backup and recovery systems. Key Responsibilities: - Conduct thorough infrastructure assessment - Generate insights on potential vulnerabilities and performance bottlenecks - Suggest improvements and solutions for identified issues In addition, you are expected to automate testing of specific features in our application. This includes user authentication, data validation, and error handling. The ideal candidate should have: - Proficiency in IT infrastructure assessment - Experience with automation testing using Se...

    £17 / hr (Avg Bid)
    £17 / hr Avg Bid
    17 bids

    I'm looking to hire a professional email marketer to help me grow my email list using Aweber. Key Responsibilities: - Devise and implement strategies to significantly increase the number of subscribers on my email list. - Develop engaging and appealing email campaigns that will help attract and retain subscribers. Ideal Candidate: - Proven experience in email marketing, specifically with Aweber. - Adept at crafting impactful and conversion-focused email campaigns. - Familiarity with strategies for enhancing subscriber growth. - Excellent communication and collaboration skills. Please include examples of previous successful campaigns and subscriber growth you've achieved in your proposal.

    £317 (Avg Bid)
    £317 Avg Bid
    16 bids

    I need an expert in cyber security for a project. The specifics of the project include: - Assessing and identifying vulnerabilities in our network, data, and applications - Developing a comprehensive security strategy - Implementing and managing security measures The primary goal of this project is to ensure that our systems are secure and to prevent data breaches. The ideal candidate should have a deep understanding of various areas within cyber security, possess experience with security strategy development, and be proficient in system implementation and management.

    £78 (Avg Bid)
    £78 Avg Bid
    9 bids

    I'm looking for a freelancer who can download pictures from an excel list that will be provided (see 2 attachments). Following are the specific project requirements: We need those pictures in 2 separate folders (f.e. zip or rar file), one for each excel list. All pictures must be saved with Superaction excel file Pictures must be saved with their code. f.e. (code is in column A). If in Column F there are more than 1 pictures, then save 2nd, 3rd etc. pictures like: , adiddv0318_4.jpg... Always in Column F (URL's for download), pictures without _a, _b... are the main picture (therefore must be saved like ). Pictures with _a, b.. etc. must be save as 2nd, 3rd ... (, ). If in Column F there is no picture without _a

    £110 (Avg Bid)
    £110 Avg Bid
    75 bids

    ...making Desktop/Mobile responsive websites - Previous experience accurately converting a PSD design to a fully responsive website using MERN stack (or similar stacks) Requirements: Provide daily progress updates Develop the website's frontend and backend with database and admin panel Integrate payment gateways with full nodes for cryptocurrencies Test the website for bugs and security vulnerabilities Launch the website and perform post-launch checks Maintenance and ongoing improvements Monitor the website's performance and user feedback, fix bugs and implement new features based on user demand Must have all components required Must be responsive (work across mobile/desktop/laptop/tablet screens) Must not have any spacing/alignment/responsive/font issues or mi...

    £945 (Avg Bid)
    £945 Avg Bid
    28 bids
    AI Development cyber security 21 hours left
    VERIFIED

    I am looking for an artificial intelligence developer to develop a cybersecurity module using the famous vulnerability logging site CVE As the model is trained on all web vulnerabilities and server vulnerabilities presented, then we provide it, for example, with our website, so it searches for gaps or security problems. Then it gives us reports with the severity rating of the vulnerability, whether inside the server or on the site itself This is a CVE database that the freelancer choosing for this topic might benefit from The model must be highly developed and highly trained

    £154 (Avg Bid)
    £154 Avg Bid
    35 bids