...Protection of Personal Information (POPI) Act No.4 of 2013, and features military-grade security to ensure all members information is un-accessible from outside users or attacks. We are currently in the process of finalizing licensing and finishing up the "pretty" website elements across my website. Currently the website in locked away to Authorised
...server log file while performing the mentioned attacks (SQLI, XSS, CSRF, Brute Force, RFI, LFI), robot/crawler user agents on web application. 2) Writing of an algorithm (in python or R) which will analyze any web server log files based on the collected features, and robot user agents to find mentioned attacks' entries and differentiate (or classify) it
...(guns & arrows), and magic attacks. In order to win, a team needs to destroy the enemies headquarters (the headquarters has three defense bunkers next to it to protect it, 1 in front, 1 on the left and 1 on the right) 5) After the game is over results are recorded on user account Other: - Every character should have 3 attacks. A basic attack and then
...is to explore the potential benefits and risks of IoT prevalence and the security threat that is posed. 2) A number of cybersecurity attacks occur via Internet connected devices. Find articles on some of these attacks and write on how the attackers used these IoT devices. 3) Address whether this makes you reconsider the promise of IoT and write to support
...the mentioned attacks (SQLI, XSS, CSRF, Brute Force, RFI, LFI) on web application. The features of these attacks should not be based on only any one or two log files. 4) After this there is need to write an algorithm (in python or R) which will analyze any web server log files based on the collected features to find mentioned attacks' entries and differentiate
- Install and configure WebGoat / Vulnerable web server for testing (Remote Lab environment) - OWASP Top 10 Attacks simulation - Metasploit framework – Web vulnerability checks and attacks simulation (10 attacks) - Training and walkthrough of the above - Documentation Please reply only if you have hands-on experience on the above.
...has two parts that are tightly linked. In Part I an argument is presented and defended. In Part II the argument given in Part I is directly critiqued. A direct critique attacks a premise (showing it to be false or improbable) of an argument to undermine the argument's soundness, or the validity of the argument structure. 1. Part I of the Critical
Hello I am looking for a website security expert. I have two websites based on PHP. But I am having bad attacks from some hackers. so I need to hire a website security expert. Before hiring, I need to test him. It is a long-term job for an expert. If you are not an expert, you will be paid nothing. If you read my post, place 'security expert' on the
Responsive E-commerce platform with marketplace Features MICROSITE Each and every seller have their unique profile. Any buyer can become a seller and can se...mobile money, paypal, credit card, and payment on delivery 4- IOs and Android app for the portal to buy and sell products 5- Site must load fast and be fully secured against attacks 6- Others
...would like to get a sprite sheet of Sak walking, running, dashing, low jump, high jump, ladder climb and crawling, as well as a couple of sword swings, stabs, and then on to attacks etc. I am looking for just the right pixel artist to help bring this ultra-cute character to pixelated life for a 2d high-definition (but pixelated) animated project I am
I have created a website already using WordPress, i am using version 4.9.8. [login to view URL], I need someone to help...CRSF and file inclusion. For server side DDoS, Brute force and Man in the Middle. If anyone could help me with this I would really appreciate this or if anyone has any other attacks that they could do for me i would really appreciate it.
...(helmet, chest, boots, gloves, pants) and 5 sets of weapons -Monster Models: We'll need about 60-80 monster models, medium polygon. 10 bosses (large). Each will have 1-3 attacks, small amount will have more. -Pet models: around 5 very small pet models. -Mounts: 3 mounts for the characters to ride -Maps: 5-8 maps. Much smaller than the usually very
I want a Machine learning based IDS that will detect the normal network attacks as well as the IOT network attacks. IDS should run in Linux environment. should build in python.
...called BabaYaga. We now need a professional malware cleaner with experience of BabaYaga to help us: 1. Clean all files on our server 2. Identify backdoors 3. Prevent further attacks. 4. Report on files fixed and job done To apply for this project you need to have cleaned a server from BabaYaga before. This malware is more advanced compared to most other
...all possible footprints/keywords/features of attacks performed on web application and get stored in access log file. The attacks are - SQL injection, XSS, CSRF, Brute Force, RFI, LFI After this there is need to write an algorithm which will analyse log files based on these features to find mentioned attacks' entries and differentiate it from robot and
We are currently being bombarded by bots creating fake accounts for fishing schemes. We currently have the magento captcha but it is not stoppin...magento captcha but it is not stopping the bots. We also have google captcha on our contact form but it is also not stopping the bots. We need someone that is able to stop these attacks on our magento site.
I need a eth Hacker who is able to give me a solution i can use it to attack some spamers vps who attacks my system Thanks
...takes data from a typical site [login to view URL] send me a notification on telegram according to football matches in the world, if they occur: shots corner kiks attacks possession of the ball etc and PRE MATCH data for ex: goal facts goals conceded Ranking etc send me a message of the match on telegram data must be taken from sites
...down attack, forward attack, neutral attack, up aerial attack, down aerial attack, forward aerial attack, back aerial attack, neutral aerial attack. All the attacks are grounded and aerial attacks are when the character is airborne. - The drawing should be made in pixel art. - Animations should be sliced frame by frame, not in one sprite sheet. - All
Intrusion Detection Using Machine Learning Classification to Detect DDoS Attacks Steps • Use Wireshark data (.Pcap) with machine learning tool WEKA to classify. • Need to convert to .arff file or .csv file in readable format for WEKA tool • Identify relevant (most shootable) machine learning algorithm. • Use machine learning algorithm to Classify
Intrusion Detection Using Machine Learning Classification to Detect DDoS Attacks Steps • Design a Network using GNS3 network simulator • Generate traffic for DDoS attacks and use Ostinato traffic generator several times • Measure distance (eg. A to B) source and destination points • Use Wireshark and save .Pcap file • Analyze with Wireshark (.Pcap
wordpress job: 2019 invoices start with n * 1, and that they are sent automatically when the order is completed. automate the status of orders, once payment is receiv...order must pass completed after a couple of hours. in general optimization of the system and make the site compliant with the gdpr, and some basic security against viruses and attacks
Qualified lawyer required to peruse the attached NDA agreement for the 'Sale of an advertising company' and answer my questions in the comments section. In addition add any further advice and offer any further recommendations if necessary
!! READ the REQUIREMENTS before you knock !! 1. You are expected to have good knowledge on areas such as; blockchain attacks/crypto-threats/solidity/Smart-contract/Hash-Algorithms/51% attacks/Sybil attack/. 2. You will need to figure out a security issue in the blockchain network. We can help you with that. Some issues can be 51% attack, Sybil attack
We have a FDD for our business that needs to be reviewed and needs to add Professional attorney language. This is already filed with the WA State and are very close to get it finalized. The project is to read the entire FDD and correct the language and grammars or sentences Its 132 pages long, but many pages are reference and other things. We need someone from USA and have some kind of back gr...
!! READ the REQUIREMENTS before you knock !! You are expected to have good knowledge on areas such as; blockchain attacks/crypto-threats/solidity/Hyperledger/Smart-contract/Hash-Algorithms/51% attacks/Sybil attack/. You will be provided with any online books/Journals/articles that you will ask for regardless of how expensive they are. Programming
...before you knock !! Key Factors: - You are expected to have good knowledge on areas such as; blockchain/crypto-threats/solidity/Hyperledger/Smart-contract/Hash-Algorithms/51% attacks. - You will probably need to spend 90-130 hours per month to do the required tasks. ( For instance; an experienced person, in the related area, may do the required job
I am hosting 5 domains on a hosting service and I have been affected by some sort of malware. 4 out of 5 domains now redirect...now redirect to some other website. I would like help in - removal of any malware or any other traces of attack - updates and installation of any patches to prevent future attacks Any other suggestions are welcome. Thanks!
...structure and wholly anonymous transactions. The fully distributed ledger processes transactions with a twelve-second average block time and is secure against majority hashrate attacks. Dero will be the first CryptoNote blockchain to have smart contracts on its native chain without any extra layers or secondary blockchains. DERO hass now launched Smart Contracts
A legal professional to draft a 'Non-Disclosure Agreement'. I often hire services from writers on various topics. I pay for these services and the written works are handed over to me and become my property. At times I need to share some of my unpublished written works with other individuals. I need to be sure that my proprietary information
Have...someone to do this for me so I get it done right. Also I tried using one of those free submission services and it has some populated yet and all I got was a media malware attacks. I need this done right away I also could use some follow-up work and improving my text, making my site mobile friendly, adding a comment section and polling section.
If you want to send a proposal, Please include "JOB345" so I know you have read the description. Our website has been hacked, the hacker has added images ...for someone to: - clean up the website, deleting all the new information added - ensure the site is loading quickly again - take measures to secure the website from further attacks. Thank you.
I'm create a Medieval 2D action platformer game (somethi...to Hollow Knight), and I need the following 2D game assets: 1- one Hero Character with around 10 to 13 animations. 2- 7 Enemies with their attacks / move and die animations. 3- One boss enemy with several attacks animation. 4- Environment tile-set with 2D props and several layers backgrounds.
...am having trouble building project for my portfolio. Intrusion Detection Using Machine Learning Classification to Detect DDoS Attacks Steps • Design a Network using GNS3 network simulator • Generate traffic for DDoS attacks and use Ostinato traffic generator • Analyze with Wireshark (.Pcap file) to check traffic behavior (for IDS) • Use Wireshark
I need someone who is very conversant with Tweet Attacks Pro 4 I need him/her to configure it for automatic twitter commenting based on my keywords This is a very short and simple project for someone who understands the software Only serious bids
Hi, my project is related vehicular social network. here two vehicles connecting each other to shar...other to share the traffic information's, so i need help to write a protocols to share the traffic information between the two vehicles from different attacks( replay, relay, man in the middle attacks) to a secured connection between the two vehicles.
I have already developed website in CI frame work and I want following things to be done : 1) make website very secured . 2) make it secure from all kinds of hacking attacks , sql injection , cross site script , and all other security issues. 3)To optimize the website fully so that it can load very fast 4) Google SEO friendly 5) Implement header protection
I am looking for cryptoanalysis for existing work. improve crypto security analysis of an existing system by defining or determining attacks that are defeated by the design with good justification and professional explanation which includes cryptography, entropy, and mathematics solid knowledge. Please contact me for further details.
...to help me with the following things: FIRST (FOR NOW): - Setup a secure and private server of my own, from where the pools will be operated - secured against DDOS or other attacks, security of the miners/payouts/funds/logins are important - 1. NOMP pool(s) for a single/multiple coins with single/multiple algorithms - 1.1 NOMP pool as a MPOS stratum server