Source code disclosure attacks php jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    4,529 source code disclosure attacks php jobs found, pricing in GBP

    Evaluation of different block cipher modes like ctr, cbc etc. under different attacks like cpa, cca and prove that how they are secure or insecure under different attacks. Generalized example is ctr mode is cpa secure, but we need the theoretical and mathematical proof. There would be approximately six to seven modes.

    £409 (Avg Bid)
    £409 Avg Bid
    7 bids
    DBT Journal App 4 days left

    ...Your Goals And Objectives (Y/N) -Interpersonal Effectiveness Skills: --Skill 9 DEARMAN: Describe, Express, Assert, Reinforce (Y/N) --Skill 10 DEARMAN: Broken Record, Ignore Attacks, Appear Confident, Negotiate (Y/N) --Skill 11 Relationship Effectiveness: Factors That Reduce Effectiveness (Y/N) --Skill 12 GIVE: Gentle, Interested, Validate, Easy Manner

    £497 (Avg Bid)
    £497 Avg Bid
    5 bids

    ...cornerstone and an accordion layout. This has worked well but the owner is happy to change to a different method if it works well. 7. The site has previously been open to DDoS attacks so needs to be secured from this, it currently is monitored by Sucuri. However, plugins etc can be installed that help in this area provided use of site is not impeded 8. The

    £1129 (Avg Bid)
    £1129 Avg Bid
    158 bids

    ...Crypto Currencies including a HOT AND COLD wallet system. • Referral Program • Android – iOS Apps and Update support • Security Aspects – CloudFlare – to mitigate DDoS attacks • Blog • Notification Ticker • Day and Light UI mode • Data Center Requirements and Deployment support. • It should be noted that - since Security a...

    £6006 (Avg Bid)
    £6006 Avg Bid
    34 bids
    Java developers needed 1 day left
    VERIFIED

    SQLiGoT: Detecting SQL Injection Attacks using Graph of Tokens and SVM

    £152 (Avg Bid)
    £152 Avg Bid
    7 bids

    ...current UX 2) Convert the code and use Laravel 3) Invoke our API REST (json) to make the site dynamic, we already have the services built 4) The site must have webpage caching (cache 1 day) and a url to clean the cache of the entire site 5) maximum load time should be maximum of 5 seconds 6) You must have security to avoid DDOS attacks or some other attack

    £156 (Avg Bid)
    £156 Avg Bid
    13 bids

    ...saving passwords ( Depend of server you are buying ) 2. Security feature to block Cross site scripting attacks 3. Security features to block SQL injection attacks 4. SEO for images 5. Future proof and Flexible development process Technology – PHP Timeline - 15 Days...

    £6 (Avg Bid)
    £6 Avg Bid
    1 bids

    ...saving passwords ( Depend of server you are buying ) 2. Security feature to block Cross site scripting attacks 3. Security features to block SQL injection attacks 4. SEO for images 5. Future proof and Flexible development process Technology – PHP Timeline - 15 to 20Days ...

    £287 (Avg Bid)
    £287 Avg Bid
    15 bids

    I need a certified Chinese lawyer who can write me a legal China-centered agreement called non-disclosure, non-use, non-circumvention agreement. The written language is Chinese with its English translation. The agreement must focus on: 1. The Chinese company agrees not to use the information (idea, concept, or product) in competition with me, the disclosing

    £79 (Avg Bid)
    £79 Avg Bid
    5 bids

    ...The Gurew product provides cyber security data to clients and helps prevent cyber attacks. Certain elements of the product could be highlighted in the design: a) It provides an "active defence", i.e. rather than just reporting cyber attacks, it can also stop attacks. b) It provides protection from inside AND outside the company's network. Usually,

    £87 (Avg Bid)
    £87 Avg Bid
    82 bids

    ...upgrade/update to Debian 8 but this was not helping. login to ISPConfig is not possible because mysql is not running. maybe our server was attacked. in the log files we saw multiple attacks on the server and database. We also want the have blocked some hosts form outside Europe, so that they can't attack anymore. maybe the ISP config Database is also hacked

    £105 (Avg Bid)
    £105 Avg Bid
    19 bids

    I need a Live project on IOT with AWS (IOT based Smart parking system using AWS ) or using the IOT to predict heart attacks and cancer .

    £54 (Avg Bid)
    £54 Avg Bid
    2 bids

    ...saving passwords ( Depend of server you are buying ) 2. Security feature to block Cross site scripting attacks 3. Security features to block SQL injection attacks 4. SEO for images 5. Future proof and Flexible development process Technology – PHP Timeline - 15 to 20Days ...

    £2311 (Avg Bid)
    £2311 Avg Bid
    13 bids

    We do have 3 Servers where is ISPConfig installed. One Server is the Main Server who is managing the other servers. The MySqL is not ...upgrade/update to Debian 8 but this was not helping. login to ISPConfig is not possible because mysql is not running. maybe our server was attacked. in the log files we saw multiple attacks on the server and database.

    £59 (Avg Bid)
    £59 Avg Bid
    4 bids

    The concept of my project is a virus created by men that overpowered them and attacks constructions, it "eats" the buildings and grows bigger and faster each day. Its organic form contrasts with the rectangular buildings. Whats required is a 3D organic model with more than two entities linked to each other with "webs" shapes and to the ground too (like

    £171 (Avg Bid)
    £171 Avg Bid
    9 bids

    Mitigation of Denial of service attacks on robot

    £17 (Avg Bid)
    £17 Avg Bid
    5 bids

    ...program as if they do not exist). To use the C++ set class, you will need to use the directive #include <set> Refinement of specifications specification ---> design ---> code ---> test specify legalMoves(P,c): If P is a position and c is a color, then the function call legalMoves(P,c) returns the set of all moves that are legal in position P when

    £8 (Avg Bid)
    £8 Avg Bid
    1 bids

    Hello, we have a network in Datacenter and our Router (Mikrotik RB2011UiAS) The cpu usage becoming sometimes 100% because of firewall service. We need an expert to config...(Mikrotik RB2011UiAS) The cpu usage becoming sometimes 100% because of firewall service. We need an expert to configure the router best performance and safest protect for attacks.

    £44 (Avg Bid)
    £44 Avg Bid
    4 bids

    ...the AdBlockers to hide the ads on the website. Content Protection Protect your website content from copying. Intelligent Pattern Recognition Detects Unknown and Zero-Day Attacks and Exploits. Ban System Block and redirect Visitors / Users (IP Addresses), Countries, IP Ranges, Operating Systems, Browsers, Internet Service Providers (ISP) and Referrers

    £154 (Avg Bid)
    £154 Avg Bid
    12 bids

    three questions 1. Question 1; Choose one case of the following and what would...case of the following and what would you do? (3 points) 2. Question 2; Apply ethics in IT Professional environments? (3 points) 3. Question 3; Mention some cases of cyber attacks in kingdom of saudi arabia and anti-cyber attack law in kingdom of saudi arabia? (4 points

    £51 (Avg Bid)
    £51 Avg Bid
    42 bids

    ...with similar formula): Weight = 1, 10 attacks per minute. Weight = 2, 9 attacks per minute. Weight = 3, 8 attacks per minute. Weight = 4, 7 attacks per minute. Weight = 5, 6 attacks per minute. Weight = 6, 5 attacks per minute. Weight = 7, 4 attacks per minute. Weight = 8, 3 attacks per minute. Weight = 9, 2 attacks per minute. Wei...

    £27 (Avg Bid)
    £27 Avg Bid
    24 bids

    ...only allow access to one exchange and one trading pair per bot and they store your API keys in their own database and servers which are susceptible to hacks and pump and dump attacks. Your API key protection and security is a high priority and WolfpackBOT is the only Trading Bot that gives you full control and security over your API keys. Wolvex is a new

    £62 (Avg Bid)
    £62 Avg Bid
    2 bids

    need a legal document for people I subcontract. I will teach them how to do what we do - they must no disclose anything about our business or the training they've received. They must also agree to not work in the industry for 10 years. Must be legal in Victoria/Australia

    £64 (Avg Bid)
    £64 Avg Bid
    5 bids

    Hello, I want to have a bitcoin lottery site, I would like to have a login & register option on this page and an integrated bitc...minus 10% for me. The site will be run by a VPS provider & connected to an onion domain, the site should also be DDOS protected and well protected against hackers or other attacks. Can you do something like that for me?

    £23 / hr (Avg Bid)
    £23 / hr Avg Bid
    1 bids

    Hello, I want to have a bitcoin lottery site, I would like to have a login & register option on this page and an integrated bitc...minus 10% for me. The site will be run by a VPS provider & connected to an onion domain, the site should also be DDOS protected and well protected against hackers or other attacks. Can you do something like that for me?

    £16 / hr (Avg Bid)
    £16 / hr Avg Bid
    1 bids

    Hello, I want to have a bitcoin lottery site, I would like to have a login & register option on this page and an integrated bitc...minus 10% for me. The site will be run by a VPS provider & connected to an onion domain, the site should also be DDOS protected and well protected against hackers or other attacks. Can you do something like that for me?

    £194 (Avg Bid)
    £194 Avg Bid
    1 bids

    We are onlinebased team and we welcome highly motivated sellers to market our merchandise in [login to view URL], [login to view URL], [login to view URL] [login to view URL] business preposition applies to seller...don't ship from China, Japan or other exotic country. Please make sure to provide your ebay ID when contacting us - we simply need to avoid the enormous spam and phishing atta...

    £377 (Avg Bid)
    £377 Avg Bid
    15 bids

    Hi I am Kira, and i have some VPS host that i use to reshare tv cards services with those VPS but some compititors attacks my host and always the server go down I hope talk to you to see if you can help Thanks

    £124 (Avg Bid)
    £124 Avg Bid
    6 bids

    ...encryptions especially the quantum resistance encryption as layer such as [login to view URL] I need the most advanced ios system to make it unhackable and unbreakable from any type of larg attacks. This is the main point. We need it to be very different and no one at all even me or anyone can do anything even if he got access in the server. The app must NOT store any

    £6054 (Avg Bid)
    £6054 Avg Bid
    33 bids

    ...done mobile game development to be able to have a good idea of what needs to be completed here. Because its turn based, that means dice based rolls for engine that controls attacks and defense and how power, health, etc. is affected. THIS MUST be done in GoDot game engine and development, no other game engine and development tools. All sprite and art

    £986 (Avg Bid)
    £986 Avg Bid
    36 bids

    ...small rifles: grant invisibility for a short moment Avenger: shadow sword that is possessed by the spirit of a powerful samurai that can empower the user and aid him in attacks Moleclaw: Fistclaw weapon that allow the user to easily burrow underground to ambush attackers The Other Side: A pocket mirror that can summon monsters Phobia: A flask

    £54 (Avg Bid)
    Featured Guaranteed Sealed NDA
    £54
    115 entries

    Hello, I'm looking to have a code block created to prevent xss injections on my site. I have a site that has forms and a searchbox the code block will also need to block URL injection also. I've looked into OWASP and was only able to prevent the searchbox attacks but couldn't get the URL to decode for URL injection

    £44 (Avg Bid)
    £44 Avg Bid
    6 bids

    Hi everyone, I'm...similar to Flappy Bird except that I'm a paratrooper and I just jumped off my warplane and into enemy territory. They are firing at me and I have to tilt the phone to dodge the attacks. The longer into the game the harder to dodge. Other than this, please keep everything else similar to Flappy Bird including the crappy graphics ;-)

    £432 (Avg Bid)
    £432 Avg Bid
    11 bids

    For this assignment, you are to create a PHP web app that lets a single user log in and manage (i.e. view, add, remove, and modify) the contents of a table stored in a MySQL database. The default idea is to create a “collection manager” to manage some collection of objects (i.e. coins, vinyl, blog posts, etc.) The Data Table Your table must have at

    £13 (Avg Bid)
    £13 Avg Bid
    11 bids

    ...primary mission is to provide our clients with knowledge and expertise to defend their enterprises against advanced cyber attacks. Our capabilities and methodologies are based on over a decade of defending enterprises against targeted attacks and sophisticated threat actors. For over a decade, our team has helped clients evolve their capabilities across the

    £31 (Avg Bid)
    Urgent Guaranteed
    £31
    53 entries

    ...primary mission is to provide our clients with knowledge and expertise to defend their enterprises against advanced cyber attacks. Our capabilities and methodologies are based on over a decade of defending enterprises against targeted attacks and sophisticated threat actors. For over a decade, our team has helped clients evolve their capabilities across the

    £47 (Avg Bid)
    Urgent Guaranteed
    £47
    232 entries

    ...CTS response message which we derive the true global MAC address of that device. Instead of a localization attack, we are using RTS/CTS exchanges to perform derandomization attacks". In essence we would get a CSV file with the following data of the device present in the area: date and time in microseconds of probe request reception, MAC addresses received

    £1106 (Avg Bid)
    £1106 Avg Bid
    7 bids

    ...you how to get the data for all the fields if you don’t know. Do not select channels with a bunch of different types of videos. For example, if the topic is "wild animal attacks", a channel that has videos of car crashes, gaming videos, or other topics should not be included. Do not give more than 5 channels on a single topic. For example, if you you’ve

    £9 (Avg Bid)
    £9 Avg Bid
    11 bids

    ...provide recommendations on what should be done about the various incidents. 2. Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented. 3. Discuss the importance of user technology security education

    £44 (Avg Bid)
    £44 Avg Bid
    51 bids

    defense in depth and awareness from cyber attacks protecting national infrastructure

    £30 (Avg Bid)
    £30 Avg Bid
    44 bids

    ...order for you to adjust your quote the way you should. Our current website is in a pretty bad shape (the original version was developed in WordPress, but after a number of attacks that took place a while ago, all the customization+other features has gone). Therefore we re looking for a brand new website, preferably but not necessarily in wordpress, with

    £7 (Avg Bid)
    £7 Avg Bid
    1 bids

    I need someone to draft me a custom nondisclosure/privacy agreement for my business.

    £26 (Avg Bid)
    £26 Avg Bid
    12 bids

    ...networks which is infrastructure less and adaptive in nature. Vampire attacks is the type of resource depletion attacks in which a malicious node create and send the message with node. Vampire attacks choose the longest path and loss the battery power. We can reduce the vampire attacks with the help of clustering technique. Clustering is the process that

    £301 (Avg Bid)
    £301 Avg Bid
    1 bids

    We are currently making a mobile game and we are looking for someone to create all the icons in game (battle, special attacks, store, in-game purchases, inventory, etc.). The mobile game is set in a cyberpunk universe where heroes enter a Battle Royale to win and be the last survivor team! The winner of the contest will be chosen to continue

    £39 (Avg Bid)
    Featured Guaranteed Top Contest
    £39
    15 entries

    Wowonder script will be customised according to following spects: [login to view URL], source code of this social network script will be provided. It is writtten on core php . With this script a new social network dedicated to crytocurrency in which people provide their crypto currency related information too. There is a step wise sign up process

    £5 / hr (Avg Bid)
    £5 / hr Avg Bid
    8 bids

    We are launching a new franchise, and we need a professional, who will write an introduction to the franchise, we will provide a kind of details on what our franchise is, and explain each step You the writer will now read what we have written, then understand it, and then write something totally new and fresh, which is different from ours, but as same meaning direction, but much more professional...

    £166 (Avg Bid)
    £166 Avg Bid
    8 bids

    ...Crypto Currencies including a HOT AND COLD wallet system. • Referral Program • Android – iOS Apps and Update support • Security Aspects – CloudFlare – to mitigate DDoS attacks • Blog • Notification Ticker • Day and Light UI mode • Data Center Requirements and Deployment support. • It should be noted that - since Security a...

    £13156 (Avg Bid)
    £13156 Avg Bid
    42 bids

    ...5-ability to send ussd code on a selected number ( click dongle and have options to send ussd and sms, and read sms inbox) 6- ability to remove dongle in gui or stop it ( remove now or stop now ) 7- ussd code should send next code based on “event” of response not a number of seconds, if it is not succesfull restart dongle and send code again. 8- HumanB...

    £559 (Avg Bid)
    £559 Avg Bid
    6 bids