Dos attack programlar jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 dos attack programlar jobs found, pricing in USD

    I'm seeking a skilled professional who can help me with a malware issue affecting multiple websites I own. - All my websites are experiencing the same type of malware. - The primary issue I'm facing is the presence of the malware on the websites. The ideal candidate for this job should have the following skills and experience: - Proven experience in malware removal and website security...websites I own. - All my websites are experiencing the same type of malware. - The primary issue I'm facing is the presence of the malware on the websites. The ideal candidate for this job should have the following skills and experience: - Proven experience in malware removal and website security. - Familiarity with various malware scanning tools. - Implement security measures to a...

    $79 (Avg Bid)
    $79 Avg Bid
    40 bids

    Quiero pasar estas dos funciones de C++ a C template<class T> int EEPROM_put(int ee, const T& value) { const byte* p = (const byte*)(const void*)&value; unsigned int i; for (i = 0; i < sizeof(value); i++) foo(ee++, *p++); return i; } template<class T> int EEPROM_get(int ee, T& value) { byte* p = (byte*)(void*)&value; unsigned int i; for (i = 0; i < sizeof(value); i++) *p++ = foo(ee++); return i; }

    $18 (Avg Bid)
    $18 Avg Bid
    7 bids

    I'm looking to create a captivating iOS p...interested in a Cartoonish 2D art style. This should give the game a fun and engaging aesthetic that will appeal to a wide audience. Desired Power-Ups' Functions: - Health Increase: Some power-ups should increase the player's health, allowing them to sustain more damage. - Ability Enhancement: Other power-ups should enhance the player's abilities. This could mean increasing their speed, jump height, or attack power, amongst other possibilities. Ideal Skills and Experience: - Experience in iOS game development - Proficiency in creating 2D games with engaging gameplay - Ability to design and implement boss fights - Understanding of in-game economy and power-up systems - Strong skills in visual design, particularly in cr...

    $709 (Avg Bid)
    $709 Avg Bid
    32 bids
    Linux Server Maintenance 4 days left
    VERIFIED

    Hello^^^^. I'm using Amazon AWS and would like to request server maintenance. First of all, I would like to ask you to do as much as possible for server security and privacy, such as SSL installation, automatic backup once a day, DDOS attack prevention, system performance optimization, hacking prevention, encryption between data transmissions, real-time monitoring, data recovery, backdoor checking, backdoor checking and deletion of compromised files, attack root identification and blocking, suspicious process occupation identification and recovery, server hacking analysis, server access history tracking, password recovery and complexity setting, virus and malicious software checking,,data leakage prevention.....etc My current monthly budget is about $50, Please send me...

    $119 (Avg Bid)
    $119 Avg Bid
    26 bids

    I need a versatile programmer who can work with Python, C or any other programming language to develop a system for identifying Distributed Denial of Service (DDoS) attacks with the help of machine learning algorithms. Skills and Experience: - Extensive experience in Python, C, or similar programming languages - Knowledge of Machine Learning algorithms - Experience in network security would be beneficial - Proven track record in detecting cyber threats in a small network environment. Your success will be judged by your ability to create a reliable, data-driven system capable of efficiently detecting DDoS attacks in a small-scale network.

    $379 (Avg Bid)
    $379 Avg Bid
    18 bids
    Full Stack Developer (MERN) 3 days left
    VERIFIED

    Looking for a Full Stack Developer >6 years of experience in agile development of scalable SaaS apps in the cybersecurity area: Improve our app (URL Risk assessment) Improve our app (Domain Typosquatting) Improve our project (Darknet Monitoring) Create an app "hackerview" for passive attack surfave enumeration Create an app for detecting spoofed social media profiles Create an app to scrape ransomware threat actor website and maitain stats about those sites Improve an existing app to monitor paste sites Mininmal Tech Experience: MERN, REST API (JWT), Django, Python, Github, CI/CD, Celery, Redis, Linux, Postgress, Kubernetes, Docker, Nginx, JS, HTML5, Protocols (DNS, SMTP, SSL, HTTP..).Detailed app specifications will be shared at a later stage. |------

    $53 / hr (Avg Bid)
    $53 / hr Avg Bid
    74 bids

    ...need of a professional white hat hacker's services. I am dealing with some compromised accounts, and your expertise with vulnerability assessment, network penetration testing, and web application security testing is required. Tasks I need help with: 1. Vulnerability Assessment: Conduct a systematic evaluation of my system's vulnerabilities. 2. Network Penetration Testing: Simulate a possible attack on my network to assess its security. 3. Web Application Security Testing: Ensure the security of my web applications against potential threats. Further, I have been compromised on some of my email and social media accounts. I need your support with: - Password Recovery: Restore access to my accounts by recovering or resetting lost passwords. - Account Verification: Conf...

    $544 (Avg Bid)
    $544 Avg Bid
    17 bids
    Trophy icon Postcard Design 2 days left

    Quiero hacer un diseno de postcard para enviar a mis clientes despues de cada servicio, con un QR Code que ya tengo, y ofreciendo 20$ OFF para usar o regalar a alguien mas, que diga los servicios que ofrecemos y agradeciendo por elegirnos. las medidas son de 8.3" x 5.8" por los dos lados. Servicios: Carpet Cleaning Area Rugs Cleaning Upholstery Cleaning Tile & Grout Cleaning Water Damage Restauration

    $50 (Avg Bid)
    Guaranteed
    $50
    85 entries

    Estoy desarrollando un proyecto en el que necesito crear una cartografia dual/comparativa entre dos estadisticas. La idea es generarla con processing para conseguir una cartografia interactiva o generativa.

    $193 (Avg Bid)
    $193 Avg Bid
    23 bids
    Stop DDOS Attack 4 hours left
    VERIFIED

    There appears to be a ddos attack on one of my servers, I have cloudflare active on all sites, and even with under attack mode on some sites, the ddos attack continues Ubuntu/Nginx server, no web panel

    $155 (Avg Bid)
    $155 Avg Bid
    21 bids

    Description: We are seeking a talented graphic designer to create a compelling and innovative logo for our new quantum cryptography project named "TANIA". This logo will be a central part of our branding and marketing efforts, symbolizing our commitment to cutting-edge security and technology. Design Requirements: 1. **Logo Name:** The logo must incorporate the name "TANIA...scalable and look good on various platforms, including websites, business cards, product packaging, and promotional materials. It should be effective in color as well as black and white. **Deliverables:** - High-resolution vector file (AI, SVG) - High-resolution PNG and JPEG formats - A black/white version of the logo - A style guide describing the usage of the logo including color codes, typography...

    $31 (Avg Bid)
    $31
    356 entries

    I'm looking to incorporate Reinforcement Learning algorithms (DQN and Actor Critic) within my existing Godot game. The objective is to enhance the behavior of the slime entity, enabling it to both chase and attack the player. Key Points: - The game is in 2D, so experience with Godot's 2D engine is essential. - This project involves integrating a machine learning plugin into a game. - The AI of the slime entity should be at a basic level, with simple and predictable patterns, and should not be too complex. Ideal Freelancer: - Proficient in Godot engine, with experience in 2D game development. - Skilled in machine learning, particularly with reinforcement learning algorithms such as DQN and Actor Critic. - Understanding of game AI, and able to implement AI at a basic level...

    $154 (Avg Bid)
    $154 Avg Bid
    3 bids

    As a Wordpress site owner, I'm interested in conducting security testing with the primary aim of testing penetration resistance. I'm specifically looking to uncover any instances of ineffective firewalls, Denial Of Service attack possibilities in the security system of the website built with Elementor and WooCommerce plugins. Skills and Experience: • Expert in Wordpress security and firewall systems • Comprehensive understanding of penetration testing • Solid background in ethical hacking • Experience with Elementor and Woocommerce platforms • Ability to produce detailed reports Deliverables: • A thorough report on identified vulnerabilities, specifically related to firewalls • Recommendations for improvements in website security &bul...

    $2026 (Avg Bid)
    $2026 Avg Bid
    45 bids

    ...entity, enabling it to both chase and attack the player. Key Points: - The game is in 2D, so experience with Godot's 2D engine is essential. - This project involves integrating a machine learning plugin into a game. - The AI of the slime entity should be at a basic level, with simple and predictable patterns, and should not be too complex. Ideal Freelancer: - Proficient in Godot engine, with experience in 2D game development. - Skilled in machine learning, particularly with reinforcement learning algorithms such as DQN and Actor Critic. - Understanding of game AI, and able to implement AI at a basic level. - Good communication skills is a plus, as I would like to understand the process and logic behind the AI's implementation. Upon a successful attack on the ...

    $100 (Avg Bid)
    $100 Avg Bid
    6 bids

    Estamos creando una plataforma SASS y necesitamos dos plantillas para tomar como ejemplo. Las plantillas son muy básicas, pero no acaban de funcionar. En una plantilla creamos un recurso: AWS::ApiGateway::RestApi hemos exportado el recurso para que sea exportable y en otro Type: AWS::ApiGateway::Resource en RestAPI, deberíamos poder usar la variable export la idea es que finalmente podamos tener un sistema modulable cloudformation

    $150 (Avg Bid)
    $150 Avg Bid
    17 bids

    I've had a hacking attack in the past and now need to regain my peace of mind by having an ethical hacker check my devices for security. The devices to be checked are my Windows computer and Android Smartphone. Desired Skills and Experience: - Proficient ethical hacker with experience in computer and smartphone security. - Knowledge of Windows and Android operating systems. - Ability to conduct a thorough security check and provide a detailed report of the findings.

    $99 (Avg Bid)
    $99 Avg Bid
    8 bids

    Project Requirements A. Implement Hatchetman attack in Contiki 3.0 B. Implement Resolution of Hatchetman attack using 2ACK scheme. C. Evaluate the solution with standard RPL (RFC 6550) under Hatchetman attack D. Detailed documentation of the steps so that it could be replicated. Details are provided in the attached PDF.

    $45 (Avg Bid)
    $45 Avg Bid
    2 bids

    I'm in need of a cybersecurity expert who is well-versed with Microsoft Office 365. I've recently received an O365 login report and I'm looking for someone to analyze it. Specifically, I need your expertise to identify any suspicious activities within the access logs, focusing on potential indicators of a shell attack. Key Project Details: - I'm specifically interested in suspicious access logs. Your task is to meticulously scrutinize these logs and provide me with detailed written feedback. The questioned application activity is highlighted in red. - I do not require ongoing monitoring, so this will be a one-time project. Ideal Skills & Experience: - Proficiency in Microsoft Office 365 is a must. You should have deep understanding of the platform and its s...

    $74 (Avg Bid)
    $74 Avg Bid
    18 bids
    Trophy icon Crear 2 Logos 10 days left

    Descripción del Proyecto: Crear dos logotipos que representen la esencia y los valores de Escuela Prana. Busco un diseño que incorpore un Merkaba con una Flor de Loto dentro, utilizando los colores morado y dorado, con un estilo sutil, fluido y con movimiento. Concepto: La combinación del Merkaba y la Flor de Loto simboliza el despertar espiritual y la conexión con la energía esencial femenina. Se busca transmitir la idea de equilibrio, renovación y crecimiento espiritual, representado por la Flor de Loto que emerge del fango hacia la luz, y el Merkaba como vehículo interdimensional que activa la conciencia superior. Elementos a Incluir: *Merkaba con una Flor de Loto dorada dentro. *Preferencia por un diseño fluido ...

    $21 (Avg Bid)
    Guaranteed
    $21
    34 entries

    As security conscious organization, we're hiring a cybersecurity expert for a comprehensive penetration testing on our Linux-based system. Emphasis lies primarily on our web-based applications, with the aim to identify and eradicate any potential vulnerabilities. Key Tasks: - Perform Open Source Intelligence (OSINT) - Port scanning - Man-in-the-middle (MiTM) attack simulation - Focus intensively on injection attacks (SQL, XSS) - Authentication and session management puncturing - Cross-Site Scripting (XSS) evaluation The ideal freelancer will have: - Strong experience in cybersecurity and penetration testing - Excellent knowledge and experience with Linux-based systems - Proven experience in web application security testing - Firm understanding of SQL, XSS and authentication v...

    $628 (Avg Bid)
    NDA
    $628 Avg Bid
    13 bids

    I require a person who has stage combat, choreography, and live performance experience. The main goal is to orchestrate a faux attack scenario wherein I appear to successfully defend myself. Key elements: - Choreographing a believable yet safe confrontation - Ensuring the performance goes as planned in a live setting - Professionalism in order to maintain the illusion for the audience Ideal skills and experience: - Stage combat and choreography - Previous acting or performing arts experience - Ability to react and improvise if things don't go as planned Please note, this is not about encouraging violence or causing fear. It's all about creating an engaging performance that makes me look like a hero in front of my girlfriend.

    $25 - $313
    $25 - $313
    0 bids

    ...specific expertise in creating intuitive user interfaces and seamless user experiences. The task at hand involves crafting the UI/UX for a cutting-edge platform dedicated to attack surface management. Project Overview: Our goal is to develop a user-friendly platform that enables efficient management of attack surfaces, empowering users to identify, assess, and mitigate potential vulnerabilities effectively. As such, we require a designer who can translate complex functionalities into visually appealing and easy-to-navigate interfaces. Key Requirements: - Strong background in UI/UX design - Experience designing for attack surface management or other cybersecurity platforms - Proficient in creating interactive visualizations, intuitive navigation, and real-time moni...

    $439 (Avg Bid)
    $439 Avg Bid
    92 bids

    I need an expert in Natural Language Processing, specifically in sentiment analysis and text classification, to assist with my project. While I haven't chosen a programming language for this task, I am open to suggestions. It's currently unclear if I will need a pre-trained or custom NLP model, so both options should be explored. Best fit for the job would include: - Extensive experience in NLP, especially sentiment analysis and text classification - Ability to provide insights on different programming languages for the task - Experience with both pre-trained and custom NLP models.

    $317 (Avg Bid)
    $317 Avg Bid
    32 bids

    I'm currently in an urgent situation where my website has seemingly vanished and a malware infection has been detected. The public PHP file has been modified which I discovered within the last 24 hours. Unfortunately...last 24 hours. Unfortunately, I have not been able to recover any data or files from my website. I'm looking for a skilled specialist with experience in: - Website restoration - Malware removal and prevention - PHP recovery and security The ideal freelancer would be someone who can help recover my lost data, restore the functionality of my website, mitigate the effect of the current malware attack, and ensure the robust constitution of the website to prevent future breaches. Quick turnaround is of essence due to the critical nature of this situation.

    $42 (Avg Bid)
    $42 Avg Bid
    23 bids

    It's unfortunate we've found ourselves under a malware attack on our WordPress website. We believe it's due to code injections, though we can't rule out other possibilities. As a result, we're looking to onboard a professional with relevant experience in swiftly identifying and effectively resolving such issues. Skills & Experience: - Proven experience in dealing with WordPress malware attacks - Proficient in identifying and resolving code injections - Strong security strategy for preventing future attacks Your application should demonstrate your previous experience in handling similar situations. Evidence of your ability to work quickly and effectively is crucial to this emergency! Let's secure our website and prevent this from happening again....

    $419 (Avg Bid)
    $419 Avg Bid
    152 bids

    ...proyecto. Específicamente, necesito desarrollo web3 y contrato inteligente desarrollado con Solidity para un mercado simple utilizando la cadena de bloques Polygon. Las tareas y entregables clave incluyen: - Integracion de blockchain ( nodo proveedor - IPFS si es necesario o no) en el front-end ya construido - Integrar billetara para autenticacion de usuario - Encargar el desarrollo de un o dos contrato inteligente para una aplicación de mercado simple. - Garantizar que el contrato inteligente respalde la compra y venta de productos. Anticipo que este contrato brindará una excelente oportunidad para mostrar sus sólidas habilidades en contratos inteligentes, web3 y, especialmente, desarrollo de redes Polygon. Se valorará punto extra tener exp...

    $567 (Avg Bid)
    $567 Avg Bid
    57 bids

    I'm in need of a graphic designer who can draft a visually engaging and easy-to-understand training poster focused on safety specific to the security team Key features include: - The focal point: Highlighting Pre Attack Indicators (PAINs) . - Target audience: The security team - Content: A visual reminder of the different PAINs (Pre Attack Indicators) that they should be aware of when working. Company Name: 3D Academy of Applied Security The poster will be blown up and posted in our office (36 inches high x 24 inches wide) Would imagine it may be easier to have different squares for each PAIN, but will leave that up to designer As a bonus, would like to have something consistent on 2 pages that could be incorporated into a PowerPoint presentation. The righ...

    $183 (Avg Bid)
    Guaranteed
    $183
    151 entries

    I need a cybersecurity expert who can conduct penetration testing and data encryption tasks for me. Key Tasks: - **Penetration Testing:** This involves assessing the security of a system by simulating an attack from an external source. You need to be able to identify vulnerabilities, weaknesses and potential threats. I'm not sure whether I need comprehensive testing of my system or a specific target, so you should be able to advise on this. - **Data Encryption:** I would also need assistance with encrypting my data. This is crucial to protect sensitive information from unauthorized access. Reporting: - **Reporting Detail:** After the penetration testing and data encryption tasks are completed, I require a comprehensive report. This should include both an executive summary...

    $854 (Avg Bid)
    $854 Avg Bid
    12 bids

    I'm going to attack Freelancer and expose how you guys are crooks. The entire Freelancer community will know who you are. I give you 72 hours to give me my paid work. I paid you, and I have the receipts, but as of today, I can't get anything for work. It's a scam. I will shout your name and your techniques very loudly

    $266 (Avg Bid)
    $266 Avg Bid
    1 bids

    ...with crafting or construction businesses. - Be proficient in graphic design software. - Understand brand identity. - Have a good sense of typography and alignment. - Have a good color sense. Tips on getting the bag: Creativity, simplistic, Original, with a touch of pride. Add a simple touch of usa or florida flag element Simplistic is the foundation.. U got 13 days so please research..plan...and attack this with patience. I m taken my time and will hire to create brand stuff in future. Super Tip...if ur good at old vintage looking authentic wooden signs from old westerns(without bullet holes please) then u will have my attention. Carpenters dont use actual trees or logs or axes etc... Thats more arborists...or landscaping.. We use by products of wood..plywood..2*4s etc... If...

    $100 (Avg Bid)
    Guaranteed
    $100
    1596 entries

    ...paper discuss the current event you have selected, specifying the counterterrorism activity that was carried out and the specific terrorist activity that was directly prevented from being carried out, as a result of the actions of the individuals involved in the prevention of the attack. Include a summary of the major points presented in the selected news source, including what activity was prevented, how that activity was prevented, who was involved in preventing the attack, and who attempted to perpetuate the attack. Close by discussing the global efforts in counterterrorism and how these efforts affect the presence of terrorist activity. Include sub-headers for all sections of your paper. Include at least five (5) scholarly sources, three of which must be peer-re...

    $73 (Avg Bid)
    $73 Avg Bid
    52 bids

    Necesito un cartel tamaño póster, para una hamburguesería que refleje la identidad de una hamburguesa con pan rojo, cebolla caramelizada, queso de cabra, 200g de vacuno español y crema de aguacate. El cartel debe tener una de nuestras fotos o las dos adjuntas y un texto que diga: La Vaca Enamorada ( así se llama la hamburguesa) Busco un diseño creativo con posibilidad de mas encargos.

    $21 (Avg Bid)
    Guaranteed
    $21
    32 entries

    Game Requirement Character : Male, full animation: Idle, run, attack, jump, die… Provide full UI and Game Asset Provide full sound and effect Number Map: 8 Number Boss: 8 Enemy for each map: 4-5 ( with full animation: idle, run, attack, die… ) Provide Game icon. Intergrate with Admob in game Intergrate shop IAP in game. Game can run on Mobile and PC also. Game resolution: Hozirontal 1920x1080

    $25 (Avg Bid)
    $25 Avg Bid
    7 bids

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $29 (Avg Bid)
    $29 Avg Bid
    8 bids

    ...the time the systems administrators discovered the nature of the attack, it was largely too late. Critical files all across the AvantPharm network had been encrypted and were unusable. To make things worse, the backup system in place was unmonitored and had been failing backup jobs for months, so they did not have a reliable way to restore the encrypted data. AvantPharm narrowly averted complete disaster by paying the attackers one of the largest ransomware payments in history; 25 million dollars. However, they nearly lost the business when the attacker took 2 full weeks to return control of their data as well, so the impact was further damaging to profitability and reputation. In the end, the company barely weathered the attack and resumed operations at reduced capacity o...

    $19 (Avg Bid)
    $19 Avg Bid
    95 bids

    I require a reliable and experienced developer to assist me in implementing a Content Security Policy (CSP) in my JavaScript application. Key Details: - Purpose: The primary goal of this CSP implementation is to prevent Cross-Site Scripting Attacks within the application. - Target Sources: The CSP should be configured to allow only self-hosted scripts...permitted. - Integrate the CSP seamlessly with the existing application architecture, ensuring no disruptions in functionality. Ideal Skills and Experience: - Proficiency in JavaScript and web application security. - Prior experience with Content Security Policy implementations. - Understanding of and its usage in specifying content sources. - Knowledge of common Cross-Site Scripting (XSS) attack vectors and mitigation strategies.

    $12 (Avg Bid)
    $12 Avg Bid
    11 bids

    ...vulnerabilities, severity levels, and recommended remediation measures. Collaborate with our development team to prioritize and address security issues. Requirements: Proven experience in penetration testing for Magento 2 websites and AWS environments. Proficiency in industry-standard tools and techniques for vulnerability assessment. Strong understanding of web application security principles and common attack vectors. Excellent communication skills. Deliverables: Detailed penetration testing report. Regular progress updates and communication. How to Apply: Please submit your proposal with details of your experience, approach to penetration testing, and proposed timeline and cost estimates. Additionally, include any relevant certifications or references. Thank you for your i...

    $178 (Avg Bid)
    $178 Avg Bid
    21 bids

    We recently experienced a malware attack on our system and we're seeking an expert who can ensure this doesn't happen again in the future. We don't require data recovery services; our main priority is to make sure it never happens again. Ideal candidates should possess: - In-depth experience in counteracting malware attacks - Mastery in various security domains such as network, application, and endpoint security - Proven track record in enhancing system security

    $127 (Avg Bid)
    $127 Avg Bid
    19 bids

    Marketing digital e gerenciamento de impulsionamento para dupla de música sertaneja que possui carreira de 10 anos. Tem um projeto super diferente do que está no mercado atual de sua concorrência. Um dos integrantes é parente de um cantor famoso do segmento. Já tiveram presença em diversos meios de comunicação. A dupla está voltando ao mercado após um hiato. Precisa de gerenciamento de impulsionamento digital para aumento efetivo de sua presença digital face ao seu segmento. Conhecimentos de impulsionamento em redes sociais, Youtube, Spotify e blogs do segmento. Campanhas virais e memes. Gerenciamento e inteligência de orçamento otimizado para impulsionamento. Amadores, ou aventureiros da &aac...

    $1714 (Avg Bid)
    $1714 Avg Bid
    14 bids

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $11 (Avg Bid)
    $11 Avg Bid
    6 bids

    ...of autoencoders for feature extraction and GRU models. Key project elements include: * Professionals will need to implement an autoencoder for feature extraction with the core goal of reducing data dimensionality. Prior experience in working with high-dimensional data and in deploying autoencoders is necessary. * Subsequently, the system built should be capable of classifying Denial of Service (DoS), User to Root (U2R), and Probe attacks within the KDD dataset. Good working knowledge of GRU models and the mentioned attacks is required. * The project includes steps to ensure the accuracy and reliability of both the autoencoder and GRU model. This includes: 1. Hyperparameter Tuning: Applicant should be dexterous in practicing various optimization techniques to increase the per...

    $34 (Avg Bid)
    $34 Avg Bid
    8 bids

    I'm seeking an experienced animator to create a 2D logo animation for my brand. This shouldn't just be an ordinary animation, it should convey professionalism and trust, leaving a memorable impression on anyone who encounters it. Key dos and don'ts for the project: - Please use neutral colors that gel well with the ethos of my brand. - Ensure the animation is smooth and clean, signifying the professional style we're after. - The animation should be simple, not overly complex or flashy. Subtlety is key in reaching the professional and trust-worthy feel. - Keep in mind the purpose of this logo animation is to evoke a sense of trust in our audience. Ideal freelancer should have: - Proven experience in 2D animation, especially in logo animations. - A strong eye ...

    $66 (Avg Bid)
    $66 Avg Bid
    25 bids

    ...are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you should connect with ibm quantum computer. 4- all requirement should be delivered in three days. ...

    $293 (Avg Bid)
    $293 Avg Bid
    27 bids

    I'm looking for a skilled professional to conduct a network security test on our workstations using ARP poisoning techniques. The focus of this project is to identify vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someone with signifi...

    $64 (Avg Bid)
    $64 Avg Bid
    15 bids

    I'm looking to modify the SAAS-BOILERPLATE open-source project to create an interactive membership website for indie filmmakers and film students. NOTE: MOST of the required functions are already implemented in the boilerplate. You do NOT need to connect Stri...for webdesigner collaboration (squarespace has an interesting version that is attached below to the project) IDEAL FREELANCER PROFILE: - Have previous experience with backend development using Laravel PHP - security-focused emphasis on security against attacks on webapps - experience minimizing the attack surface of webapps - Understand how to integrate video hosting in SaaS

    $554 (Avg Bid)
    Featured
    $554 Avg Bid
    62 bids

    I am seeking a skilled freelancer to help me create a data collection tool for an intrusion detection system. This system's main purpose is to collect data for analysis, focusing on network traffic. Key tasks include: - Designing a new normal and attack dataset using Mininet WiFi - The focus is on detecting Denial of Service (DoS) and Man-in-the-Middle (MitM) attacks Ideal candidates should have experience: - Building intrusion detection systems - Working with Mininet WiFi - Handling network traffic data - Familiarity with DoS and MitM attacks This tool will greatly aid in identifying and preventing future network attacks by providing structured data for our analysis team.

    $350 (Avg Bid)
    $350 Avg Bid
    3 bids

    I'm looking for a highly skilled web designer to create a beautiful, user-friendly wedding website for my special day. Key Features: - Romantic pastel color palette - Incorporation of essential pages including: - Event Details - An editable RSVP form - Wardrobe Planner - Tuck Shop - Places to visit nearby - Dos & Don'ts - Photo Gallery - A visually pleasing countdown timer The perfect candidate should have a great eye for design, outstanding technical skills, and prior experience in wedding website creations. Familiarity with interactive features is a must. Let's make this dream a reality!

    $193 (Avg Bid)
    $193 Avg Bid
    13 bids

    We are looking for a experienced agency to help us with our lead generation campaign, to help us attract small and medium business outside Qatar who are interested to expand their ecommerce business to Qatar, (More about th...targeting channels for this campaign, including the following scope: Understanding the target audience, defining the appropriate channels to use, create a budget per target audience, doing a keyword search based on the search intent , assess the initial Budget spent, content production, campaign performance monitoring. Budget is allocated for the service fee of managing the campaign, and dos not include the media buying fees that will be assessed and budgeted based on the plan. Open to suggestions regarding which marketing channels to utilize for the ...

    $389 (Avg Bid)
    $389 Avg Bid
    45 bids

    Necesitamos a dos personas que consigan videollamadas para nuestro negocio. Proporcionaremos nosotros los leads. EL horario es flexible Consistirá en realizar llamadas a negocios que pueden necesitar nuestros servicios, se le proporcionará los contactos con su información. Pagaremos una comisión de 12 euros por videollamada, será por las mañanas. La persona debe de ser Española. We need two people to get video calls for our business. We will provide the leads. The schedule is flexible. It will consist of making calls to businesses that may need our services, you will be provided with the contacts and their information. We will pay a commission of 12 euros per video call, it will be in the mornings. The person must be Spanish.

    $521 (Avg Bid)
    $521 Avg Bid
    3 bids

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    $208 (Avg Bid)
    $208 Avg Bid
    12 bids