Expertzzz hackers jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 expertzzz hackers jobs found, pricing in USD

    I need an experienced cybersecurity professional to perform a penetration test on my Python system. Your primary goal is to identify any vulnerabilities that could be exploited by hackers. Key Responsibilities: - Conduct an in-depth analysis of my Python code to uncover potential flaws. - Assess all possible entry points and security measures put in place. - Provide a detailed report outlining the identified vulnerabilities and recommended fixes. - Ensure that the system meets industry standards for security. Skills and Experience: - Proven experience in conducting penetration tests, specifically on Python systems. - Extensive knowledge of cybersecurity and different attack vectors. - Ability to think creatively and anticipate potential security threats. - Excellent communi...

    $19 (Avg Bid)
    $19 Avg Bid
    23 bids

    As a victim of a usurped Gmail account, I need an expert who can support me in retrieving my precious information. Even after using Google's account recovery mechanism, my effort has proven futile. Here’s what this role entails: - Expedite the recovery of my Gmail account which has been attacked by hackers. What makes the ideal candidate? - Prior experience handling such Gmail issues, more specifically account recovery. - Proficient in advanced troubleshooting techniques. - Absorb the intricacies of Google's account recovery procedures. At a quick glance, your task is to recover my account promptly, ensure my files are protected moving forward, and guide me through fortifying my account against future breaches.

    $85 (Avg Bid)
    $85 Avg Bid
    12 bids

    I’m seeking an experienced cybersecurity specialist to secure my informational websites against hackers and malware. Key Responsibilities: - Implement robust security measures to fend off hacking attempts and prevent malware infections. - Prioritize the website's availability and uptime, ensuring the security protocols don’t interfere with the website's responsiveness and speed. Ideal Skills: - Extensive practical knowledge of website security best practices. - A solid understanding of hacker methodologies. - An ability to install and configure cybersecurity software. - Previous experience in protecting informational websites. Your role will be crucial in maintaining a secure digital environment that keeps my users' trust and consistently delivers ...

    $25 / hr (Avg Bid)
    $25 / hr Avg Bid
    36 bids

    Hello . I’m looking for someone with jammer building experience. This jammer must be a spark gap based jammer . The frequency range that is must sweep is 1Mhz to 10Ghz Must be analog circuits! Digital circuits are too easy for the hackers to remotely disable. Must sweep between 1Mhz to 10Ghz Must use multiple antennas and/or broadband antennas.

    $683 (Avg Bid)
    $683 Avg Bid
    3 bids

    I need an experienced and creative developer to help me create various distinctive online casino games. Here's what you'll be working on: - Games: The casino games to be developed include mines, thimbles, apple of fortune, gems and mines, and wild west. These are not your typical poker or blackjack games, so I appreciate creativity and distinctiveness in their design and gameplay mechanics. - Platform: While I don't have a specific platform requirement, the games should be created with versatility in mind. They should run smoothly on any web browser and also be adaptable for mobile and desktop applications should the need arise. Having experience in multi-platform game development will be an asset. - Design: I'm open to any design style since I skipped this question....

    $6822 (Avg Bid)
    $6822 Avg Bid
    5 bids

    I'm in need of an expert in ethical hacking, cybersecurity, and penetration testing. The main task will be gaining access to an Android phone for the purpose of monitoring and surveillance. Specific activities to monitor include: - Call logs and messaging - Location tracking Extensive experience in similar projects is a must, with a focus on maintaining data integrity and confident...expert in ethical hacking, cybersecurity, and penetration testing. The main task will be gaining access to an Android phone for the purpose of monitoring and surveillance. Specific activities to monitor include: - Call logs and messaging - Location tracking Extensive experience in similar projects is a must, with a focus on maintaining data integrity and confidentiality. Please, only ethical hackers...

    $66 (Avg Bid)
    $66 Avg Bid
    5 bids

    ...removal: The professional should scan every file in my website to identify and remove all the malware scripts planted by hackers. - Firewall setup and configuration: Setup and appropriately configure a strong firewall to prevent future unauthorized access. - Regular software updates and patches: Ensure that all software are up-to-date. This includes underlying server software and any installed scripts, plugins, and themes. Skills & Experience: The ideal person for this job should have: - Prior experience in dealing with hacked websites, especially those infiltrated via PHP shell. - Profound knowledge of PHP, JavaScript, SQL, and other technologies often exploited by hackers. - Experience with using and setting up firewalls and security plugins. - An understanding ...

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    28 bids

    Its about vintage videogames I have a project that make emulation of cartridges. Each original Cartridge have circuits with ASIC customs called " mappers ". Theses mappers circuits are not available for sale, because was made in 90 years. Some hackers rebuild functionality of Asics throught verilog, and implemented in a single cartdridge with ALL mappers inside. In Github are The opensource project , and ALL mappers writed in verilog are available separated. My Idea is take one a one mapper and generate a output file and burn in individual hardware , like Xillinks XC9572 or XC95144 because The original project use hard weight hardware,like a

    $521 (Avg Bid)
    $521 Avg Bid
    12 bids

    I'm seeking an experienced web developer fluent in React and Tailwind to create a bug bounty platform. I have an example platform that I am looking to replicate. Key Responsibilities: - Building a platform to cater to bug bounty, a process where ethical hackers are recognized and rewarded for finding and reporting software bugs. - The application should user walletconnect for web3 authentication - There will be 3 user roles: hunter, program manager, and admin Ideal Skills and Experience: - Strong knowledge and experience in React and Tailwind CSS - Prior work with bug bounty platforms or similar concepts

    $2297 (Avg Bid)
    $2297 Avg Bid
    198 bids

    ...affordable pricing? You have come to the right place. I will remove WordPress malware and fix your hacked WordPress site within 24 hours. I will also do comprehensive security hardening on your site so that it will be protected from future malware attacks and black hat hackers. My service includes: - Removal of malware from hacked WordPress site - Fix website redirecting to other site - Full website and database backup - Removal of backdoors and phishing scripts - Removal of fake admin accounts added by hackers - Updating all plugins and themes - Improving login security - Optimized configuration of security plugins - Protection against malware and improve site security This service is valid for a single WordPress site only. With my WordPr...

    $75 (Avg Bid)
    $75 Avg Bid
    1 bids

    Project Deadline: Within 1 Day Server Type: Linux Ubuntu Project Type: Optimization & Performance Enhancement Project Overview: 1) We have seen a huge spike in our "public - outbound" traffic that we would like investigated & resolved 2) Occasionally our website has an issue connecting to it's MySQL database, we would like investigated & resolved 3) We want o...Project Type: Optimization & Performance Enhancement Project Overview: 1) We have seen a huge spike in our "public - outbound" traffic that we would like investigated & resolved 2) Occasionally our website has an issue connecting to it's MySQL database, we would like investigated & resolved 3) We want our server to be running with maximum performance 4) We want. our server to...

    $109 (Avg Bid)
    $109 Avg Bid
    25 bids

    ...had to buy a new phone and sim because they seem to have access to my old two step verification. I found a remote monitoring program on my laptop and removed it but I need to make sure that's all I have to do. I don't know enough about this to know if that's it or if there's other ways in Preferred Candidate: - Expert knowledge of cybersecurity best practices. - Proven experience in tracing hackers. - Excellent understanding of real-time monitoring, firewalls, antivirus software, and log analysis. - Previous experience in handling severe cyber attacks. Acting swiftly and accurately is a primary concern of mine in this sensitive situation. Sadly I do not have a lot of money right now but I will in the coming months so I guess I'm just looking for advic...

    $286 (Avg Bid)
    $286 Avg Bid
    15 bids

    I am in need of an expert ethical hacker to perform detailed penetration testing on my iOS mobile application. Key responsibilities will include: - Conducting in-depth penetration testing: your task is to identify any weak spots in our application's system, revealing potential opportunities for hackers to exploit and providing actionable feedback to help remediate these risks. Ideal Skills and Experience: - Extensive experience in ethical hacking - Proficiency in penetration testing techniques - Familiarity and experience with iOS mobile applications - Thorough understanding of iOS security measures and potential vulnerabilities The goal of this project is to ensure the security of our iOS application, leaving no stone unturned in the pursuit of potential pitfalls in our...

    $343 (Avg Bid)
    $343 Avg Bid
    16 bids

    ...not only possesses sound knowledge in AWS but is also experienced in server deployment, security, and monitoring. Key responsibilities for this role: 1. Server Deployment: The manager will be responsible for the efficient and effective deployment of servers that will host an e-commerce platform. 2. Server Security: Ensuring the security of the server is a very crucial part of this project - hackers and data thieves are not welcome here! 3. Server Monitoring: The server manager must be effectively observant to monitor the servers regularly, mitigating any arising issues and ensuring optimal performance. The anticipated traffic on this server is low which translates to minimal load. However, due to the server hosting an e-commerce platform, it is important that the freelan...

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    16 bids

    ...to believe that not only is there a need for troubleshooting and optimization, but a potential risk of DDoS attacks or similar malign activities also exists. Ideally, I'm seeking an expert who can: - Intensively troubleshoot the site and server for any performance issues, - Optimize the server and site's overall performance, - Investigate for any potential security threats like DDoS attacks or hackers. Preferred skills and qualifications for this job are: - Profound experience in WordPress troubleshooting, - Solid understanding and experience with Plesk, - Extensive knowledge on dedicated server optimization including database optimization, server configuration, and security enhancements. Your role in this project will be crucial in maintaining and enhancing the per...

    $149 (Avg Bid)
    $149 Avg Bid
    55 bids

    ...to believe that not only is there a need for troubleshooting and optimization, but a potential risk of DDoS attacks or similar malign activities also exists. Ideally, I'm seeking an expert who can: - Intensively troubleshoot the site and server for any performance issues, - Optimize the server and site's overall performance, - Investigate for any potential security threats like DDoS attacks or hackers. Preferred skills and qualifications for this job are: - Profound experience in WordPress troubleshooting, - Solid understanding and experience with Plesk, - Extensive knowledge on dedicated server optimization including database optimization, server configuration, and security enhancements. Your role in this project will be crucial in maintaining and enhancing the per...

    $151 (Avg Bid)
    $151 Avg Bid
    111 bids

    Vision and look and feel of the website: Research User experience Logo design and branding Content writing for the website Website Development and Adaptive Design User-friendly backend for administrators WhatsApp integration with pop-ups and forms Bugs Maintenance for 3 months after release Maintenance 1-year dedicated hosting + sitelock monitoring (protection from hackers) + ssl certification + mails Domain name per year

    $503 (Avg Bid)
    $503 Avg Bid
    196 bids

    I'm in search of proficient security experts and ethical hackers to help improve our company's digital defenses through a well-structured Bug Bounty Program. This project is for those passionate about cybersecurity and interested in earning rewards for their skills by identifying and reporting system vulnerabilities. Key Responsibilities: - Scan and identify vulnerabilities within our web applications. - Report found issues with clear, reproducible steps. - Suggest potential fixes or measures to enhance security. Access Parameters: - Initially limited to specific applications or services. - Expanded access given based on the severity and quality of reports. Desired Skills & Experience: - Experience in penetration testing and ethical hacking. - Proficient with web ap...

    $566 (Avg Bid)
    $566 Avg Bid
    6 bids

    ...banner image for my new YouTube channel that will host a podcast called "Tice's Tech Trek" which is basically a podcast in which I share my "indie hacker" journey. I'll talk mostly about tech, startups and how to start online businesses. So you can take inspirations from podcasts that talk about similar topics. Here are a few listed: - Indie bites: @indiebites - Indie hackers Podcast: - Masters of scale: @MastersofScale_ - Tech Talks Podcast: @4iizTechTalksPodcast - And I added many more podcast covers in the files attached for inspiration. I added some attachments. An explanation on what I would like the logo + banner art to look like: - The main theme should be

    $50 (Avg Bid)
    Guaranteed
    $50
    103 entries

    As the developer of a web application, I'm looking for a skilled ethical hacker to conduct a detailed penetration testing. The primary objectives are: - Identify potential vulnerabilities - Instill robust da...While a specified technology stack is not clear, familiarity with various stacks such as MEAN, MERN, and LAMP would be advantageous, as it demands versatile skill set. Your role will involve a complete scrutiny of the system, pinpointing possible risks, and providing actionable recommendations to mitigate said risks, all while preserving the integrity and safety of the data. I encourage ethical hackers with a firm grasp of latest cyber security trends and threats to bid. Remember, the safety and trustworthiness of our web application hangs in the balance. Let's ...

    $51 (Avg Bid)
    $51 Avg Bid
    20 bids

    I am looking for an experienced ethical hacker

    $450 (Avg Bid)
    $450 Avg Bid
    6 bids

    I am looking for an experienced ethical hacker

    $425 (Avg Bid)
    $425 Avg Bid
    12 bids

    I am looking for an experienced ethical hacker

    $634 (Avg Bid)
    $634 Avg Bid
    7 bids

    ...prevent attempts to harm the site. - DDoS Attacks: Mitigation strategies should be in place to lessen damage from DDoS attacks. - Unauthorized Access: The software needs to thwart attempts to gain access to site data without permission. 2. Comprehensive Features: - Cloned Page Blocking: The ability to detect and block cloning of pages is crucial. - SMS Interception: We need to prevent hackers from intercepting SMS messages. - Antivirus Protection: The software should function as a tuning software at the same time, optimizing site performance. - AI and ML Capabilities: It should leverage AI/ML to identify vulnerable areas in the website. 3. Subscription Model: - IP Based: The software will utilize a subscription model based on IP addresses. Ideal candidates...

    $1182 (Avg Bid)
    $1182 Avg Bid
    77 bids

    ...we are on a mission to redefine cybersecurity, offering innovative solutions that safeguard your digital landscape. As a leading cybersecurity company, we understand the dynamic nature of the online world and the critical need for robust protection against evolving threats. Who We Are: MUTTII® is not just an Australian cybersecurity company; we are a collective of visionary experts, ethical hackers, and relentless innovators. Our team comprises seasoned professionals with a diverse range of skills, experiences, and backgrounds, united by a common goal – protecting what matters most in the digital age. Why MUTTII: Expertise: Our team consists of cybersecurity experts with a proven track record, bringing unparalleled expertise to the table. Tailored Solutions: We unde...

    $15 (Avg Bid)
    $15 Avg Bid
    2 bids

    ...quality work that aligns with the event's themes - Capability to incorporate provided text effectively within the design Ideal Skillset: - Advanced graphic design skills - Excellent creativity and artistic flair - Proficiency in utilizing design software platforms like Adobe Illustrator or Photoshop - Outstanding attention to detail. *******INFO for the Flyer is the following****** Health Hackers Meeting 2024 Mayo 18 y 19 DAY 1 7:30am – 9am Registro 9:15am – 11am Conferencia & Ashtanga con Amado Cavazos “Ashtanga con Amado Cavazos” (1 hr. 45 mins) DAY 1 11-12pm Snack/Juice Break DAY 1 12pm Conferencia y Meditación/Pranayama Healing (Marcela Sustaita y Selene Ceja)/(Marcia Vargas) “Niveles de Energía y Conocimiento del Ser&...

    $20 (Avg Bid)
    Guaranteed
    $20
    65 entries

    Solo freelancers only Big project Immediate start ACF experience REST API experience Company Description MUTTII® is a leading Australian cybersecurity company that offers innovative solutions to safeguard your digital landscape. Our experts, ethical hackers, and innovators leverage their diverse skills and experiences to protect our clients from evolving cyber threats. We pride ourselves on our tailored solutions, proactive approach, client-centrist attitude, and continuous improvement mindset. Role Description This is a full-time remote role for a WordPress Developer. The role will involve day-to-day tasks of back-end web development, front-end development, responsive web design, web design, and web development. Qualifications Strong skills in Front-End Developmen...

    $35 (Avg Bid)
    $35 Avg Bid
    43 bids

    Solo freelancers only Big project Immediate start ACF experience REST API experience Company Description MUTTII® is a leading Australian cybersecurity company that offers innovative solutions to safeguard your digital landscape. Our experts, ethical hackers, and innovators leverage their diverse skills and experiences to protect our clients from evolving cyber threats. We pride ourselves on our tailored solutions, proactive approach, client-centrist attitude, and continuous improvement mindset. Role Description This is a full-time remote role for a WordPress Developer. The role will involve day-to-day tasks of back-end web development, front-end development, responsive web design, web design, and web development. Qualifications Strong skills in Front-End Developmen...

    $29 (Avg Bid)
    $29 Avg Bid
    50 bids

    Solo freelancers only Big project Immediate start ACF experience REST API experience Company Description MUTTII® is a leading Australian cybersecurity company that offers innovative solutions to safeguard your digital landscape. Our experts, ethical hackers, and innovators leverage their diverse skills and experiences to protect our clients from evolving cyber threats. We pride ourselves on our tailored solutions, proactive approach, client-centrist attitude, and continuous improvement mindset. Role Description This is a full-time remote role for a WordPress Developer. The role will involve day-to-day tasks of back-end web development, front-end development, responsive web design, web design, and web development. Qualifications Strong skills in Front-End Developmen...

    $365 (Avg Bid)
    $365 Avg Bid
    169 bids

    ...asap. New Version: 21.7 Warning: Found outdated WordPress inside: ./must - Version: 6.3.2 (from ./must/wp-includes/)- Please update asap. Warning: Found outdated WordPress inside: ./old - Version: 6.3 (from ./old/wp-includes/)- Please update asap. ----------------------------------------------------------------------------- Outdated software makes your site vulnerable to hackers, and they can break into the site even after our cleanup. So please update this software at the earliest. It's showing clean on VirusTotal, which scans your website against 90 different blocklists that would've flagged your website for malware if it still had any: I've reviewed the Google

    $35 (Avg Bid)
    $35 Avg Bid
    50 bids

    Big project Immediate start 4AUD per page Company Description MUTTII® is a leading Australian cybersecurity company that offers innovative solutions to safeguard your digital landscape. Our experts, ethical hackers, and innovators leverage their diverse skills and experiences to protect our clients from evolving cyber threats. We pride ourselves on our tailored solutions, proactive approach, client-centrist attitude, and continuous improvement mindset. Role Description This is a full-time remote role for a WordPress Developer. The role will involve day-to-day tasks of back-end web development, front-end development, responsive web design, web design, and web development. Qualifications Strong skills in Front-End Development and Responsive Web Design Expertise in...

    $22 (Avg Bid)
    $22 Avg Bid
    85 bids

    Project Title: Maximum Security Measures for E-commerce Website I am in need of a skilled freelancer who can implement maximum security measures for my e-commerce website. As the website deals with sensitive customer information, it is crucial to protect it from potential hackers and cyber threats. Skills and Experience Required: - Extensive knowledge and experience in web security - Familiarity with e-commerce website security protocols and best practices - Proficiency in implementing strong encryption and authentication mechanisms - Ability to conduct comprehensive vulnerability assessments and penetration testing - Understanding of secure coding practices to prevent common web application vulnerabilities - Experience in configuring and managing firewalls, intrusion detection s...

    $302 (Avg Bid)
    $302 Avg Bid
    18 bids

    I've recently experienced a malware infection within my system and I need an expert to conduct a comprehensive forensic investigation. Your task will be to examine and analyze the infected system thoroughly to gain an understanding of the attack methods utilized by the hackers. This is not about recovering or identifying compromised data; the focus of this project is solely on understanding the tools, tactics, and procedures of the cyberattack. I have 2 systems (a dell PC desktop and an HP PC desktop) I believe are currently compromised and also a router which I believe is also compromised. I need a thorough evaluation of all three. You should have extensive experience conducting such investigation, and your application should demonstrate your proficiency in cyber forensics....

    $1080 (Avg Bid)
    $1080 Avg Bid
    26 bids

    ...from external site via WP All Import, applying via external link ) - blog / news - portfolio - footer and menue etc. - configure the built-in contact form and make it work with Brilliant Web-to-Lead for Salesforce plugin, if possible - perform extended on-page optimization to make your site rank higher in Google and other search engines and bring more customers as a result - secure website from hackers, malware and other threats - make the website compliant with the core principles of GDPR & CCPA Privacy regulations (currently running Complianz for GDPR/CCPA Cookie Consent) - make sure you love the final result and are revisions included The project should ideally be completed within a week. The website should be user-friendly and optimized for conversions. Looking forward ...

    $168 (Avg Bid)
    $168 Avg Bid
    229 bids

    Project Title: Cybersecurity Protection for Small Business Project Description: I am in need of a cybersecurity expert to enhance the protection of my small business network against potential hackers. The ideal candidate should have experience in network monitoring and intrusion detection to ensure the safety and integrity of our sensitive data. Specific Cybersecurity Measures: - Network monitoring: Implement real-time monitoring solutions to detect and prevent any unauthorized access attempts or suspicious activities on our network. - Intrusion detection: Set up robust intrusion detection systems to identify and mitigate any potential cyber threats or attacks. Nature of the Network: Our network is a small business network, and it is crucial to safeguard our confidential informat...

    $170 (Avg Bid)
    $170 Avg Bid
    42 bids

    ...years, and more than 10 years will conduct specialized training sessions. • Comprehensive Toolkits: Each lab is equipped with tools necessary for forensic analysis, networking exercises, and source code review. Guest Workshops The CoE will organize a minimum of three guest workshops, featuring esteemed personalities in the cybersecurity domain: Features: • Ethical Hackers: Renowned ethical hackers will share their experiences and insights. • Bounty Winners: Individuals recognised for their exceptional contributions to cybersecurity. • Industry Experts: Authors of best-selling books, international experts, and individuals making a mark in the field of cybersecurity. Benefits and Expected Outcomes The establishment ...

    $72 (Avg Bid)
    $72 Avg Bid
    18 bids

    ...looking for someone to install GRAMPS into my Ubuntu system for personal use. Requirements: - Experience with Linux Ubuntu systems, preferably for beginners - Ability to provide a step-by-step guide on how to manage the GRAMPS software after installation. I was a Windows 10 user, with Office 7 and experience. I do not have Internet any longer, due to 3 unfortunate experiences with hackers. After my last experience I cancelled my Internet account. That was over a year ago, and I want to get back into my ancestry tree history. I have accumulated a good deal of info I want to add. I'm 80 years old and I want to get this done, while I'm still standing! I have already moved a good deal of data to my hard drive. I noted that some of those files are unable to open, ei...

    $480 (Avg Bid)
    $480 Avg Bid
    28 bids

    ...need business developers in charge of our affiliation program. You’ll have to find new affiliates and new clients. All your activity is tracked by the professional WordPress Plugin “Ultimate Affiliate Pro”: You have a dashboard where you can see all your referrals and sales on any period. You’ll have to send us an invoice to get paid. Our software is a social media automation tool for growth hackers/marketers, and agencies. It is a very high-demanded software in the underground marketing. We will give you the software (value 497€) with a license to help you to go faster. We will give you a course (1 hour) to install, and configure the software and explain to you the road map to follow. We will give you a coupon code to offer to potential clients fo...

    $2186 (Avg Bid)
    $2186 Avg Bid
    20 bids

    Scenario: Your boss want to know hackers’ Locations (Failed password) in the following 3 cases Giving functions/commands and Operators: index, source, HDFS, rex, stats, iplocation, geostats, where, NOT, |, =, count by. Using regex to extract the IP address as field name “hacker_ip”. Data fields’ name: : hacker_ip, Country, Region, City Practicing with your data: Using regex to extract the IP address as field name “hacker_ip”, review the values in the fields of hacker_ip, Country, Region, City. Case 1: Showing statistic of hackers’ IP address, Country, Region, City. • Hint 1: Lab 7, Lab 9 • Hint 2: index=??? source=??? | rex ??? | stats ??? | iplocation ??? • Hint 3: “| geostats ???”, Visualizing with map Ca...

    $47 (Avg Bid)
    $47 Avg Bid
    2 bids

    Well, God the website from virus and hackers

    $95 (Avg Bid)
    $95 Avg Bid
    31 bids

    ... but the exact dimensions will be provided. I do Universsity homework on computer security and we want to make an analogy with American baseball. I need to produce a poster measuring 63.5 x 76.2 cm (25 x 30 inches). I want to show that the players on the field represent the employees of the company. The company is called CoopR. On each goal, I would like to put players who look like computer hackers. I wish there was a scoreboard with the picture of the baseball field. There would be a team named CoopR and the other Cyber Pirate. I am submitting to you an image that I made quickly. The poster would be separated into approximately two parts. One half with the image of the baseball field and the other side, some point form text. Ideal Skills and Experience: - Graphic design sk...

    $240 (Avg Bid)
    $240 Avg Bid
    82 bids

    ...without needing a third party payment processor. The website should have a modern look, with an intuitive navigation so customers can easily browse and purchase products. It should be mobile-friendly and able to scale so it can cope with increased traffic. I also want to ensure it is secure so customers can purchase with confidence knowing their personal and financial data is protected from hackers. If possible, I would also like the website to include a live chat feature, as well as an email subscription that will allow me to keep customers informed about new products and special offers. I am looking for a reliable and experienced website development expert who can handle the entire project from start to finish. The completed website should be optimised for SEO so it can ea...

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    56 bids

    ...requirements of each student according to their character, personality and preferences. It will offer customization options so that students can modify the interface according to their own preferences. This adaptability will guarantee each student a personalized experience and increase their engagement and satisfaction. My product must be secure for users. It must be designed to fight malware and hackers, which means it must follow secure coding guidelines, be able to regularly check for software upgrades, and update the program. My product must guarantee secure data transfers between users and a secure connection between the application and the server. This can be achieved through the use of encrypted data in transit, secure communication protocols such as HTTPS, and user auth...

    $179 (Avg Bid)
    $179 Avg Bid
    37 bids

    The online world is in danger and only you can help to stop it. I'm in need of top AI developers to help create the most intelligent and unhackable AI that can hunt down hackers and scammers and erase them from existence.

    $532 (Avg Bid)
    $532 Avg Bid
    31 bids

    I am looking for a freelancer who is experienced in Linux, Ubuntu, Python, and PHP to set up a VPN server for me. My primary goal for this server is to secure my personal network and prevent any potential hackers from gaining access. Time ago another developer implemented OPENVPN on a DIGITALOCEAN Server and using Raspberry PI4 for tunnel system for port forwarding, it is working great but the links are Static and anyone could reach this link. I am looking if there is any way to have these Static links secure? Skills and Experience: - Proficiency in Linux and Ubuntu operating systems - Knowledge of Python and PHP programming languages - Experience in setting up VPN servers and implementing SSL encryption - Ability to configure firewall settings and ensure maximum security - Fa...

    $465 (Avg Bid)
    $465 Avg Bid
    70 bids

    I am in need of someone to clean up my hacked website as soon as possible. the hackers made a redirect from the website to a telegram channel Need to find out where its at and clean up the website so it wont get reinfected.

    $55 / hr (Avg Bid)
    $55 / hr Avg Bid
    10 bids

    I am currently running two websites. The two sites are constantly being attacked by various hackers. I need help to penetrate the sites. Are there any ethical hackers who can analyze the vulnerability and loopholes that currently exist. I need to protect the websites and manage security issues. If you are able to help me, I will give you an offer. Please message me whether it is doable and give me a quote. I am looking for a skilled penetration tester to conduct a comprehensive web application penetration testing for my project. The ideal candidate should have experience in web application security and be proficient in identifying vulnerabilities and potential risks. Specific requirements for the project include: - Conducting a thorough assessment of the web application t...

    $2229 (Avg Bid)
    Urgent
    $2229 Avg Bid
    20 bids

    seeking 5 skilled and motivated Amazon Growth Hackers to join our dynamic remote team. This role is integral to our e-commerce operations, as it involves managing and optimizing Amazon advertising campaigns to drive sales and growth. The ideal candidate is data-driven, detail-oriented, and possesses a deep understanding of Amazon's advertising platform. **Key Responsibilities:** - Amazon Advertising Strategy: - Develop and execute comprehensive Amazon advertising strategies to achieve revenue and profitability goals. - Conduct in-depth keyword research, competitor analysis, and market research to identify growth opportunities. - Optimize advertising campaigns for various Amazon platforms, including Sponsored Products, Sponsored Brands, and Sponsored Displays.

    $97 (Avg Bid)
    $97 Avg Bid
    29 bids

    I am looking for someone to provide me with enhanced security protection for my one iPhone. This security needs to be at the advanced level due to the growing trend of hackers and the importance of my phone staying secure. I understand that ensuring my device is safe from malicious attacks requires more than just baseline protection, so I am seeking a professional who can provide me with comprehensive security services appropriate for this type of device.

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    21 bids