How to watch for common scams
Very simple job. The work is very simple. I need someone to delete my image from google images unfortunately, I lost the password to the portal, where I registered, in 2013, and I also do not have access to the registered email. I asked google, the elimination, of the search result, but they told me that it could not, because the photo that appears mine, in the result of the search in google, ...
Requirement on the below Deadline: 3 days Page: you have to write around 7 pages (excluding table of content and references) Font: 12 size Spacing: 1.5 Reference: APA formatting (intext citation) Plagiarism: less than 15% will be acceptable
I recently ran an audit for a website and I need someone to make changes in order to: - Resolve site errors - increase quality score, - update meta description, - connect to a Google My Business Page [login to view URL]
very simple work of working with hashes and rainbow tables, md5 hashes etc
We are looking for short-term support to review and implement necessary security measures for an in-house server we use to run .NEt core application. We are looking for an experienced system admin with extensive experience in Security.
I need to set SSL for my domain [login to view URL] at GCP. I am running a compute engine for my little service. You need to do it via teamviewer. Thanks. Google Cloud Platform Linux PHP Web Hosting Web Security
In this project, you will exploit a series of web vulnerabilities for test purposes. You will be given WebGoat, an insecure web application designed for learning purpose. This will be a more practical and hands-on project. You will be using some tools that (like Burp ). There is not much coding involved but that does not mean this would be an easy project.
Im interested in developing a Graph Neural Network based Intrusion Detection System. The system should be capable of training with a PCAP file and analyzing suspected PCAP. The output must provide the IP address or MAC address of the suspected attacker. ****To be considered you MUST provide some detail of how you see this WORKING, demonstrating your knowledge in the subject area. ** So far no re...
Topics: [login to view URL] Phishing, [login to view URL] Attacks, [login to view URL] attacks, [login to view URL] protection, [login to view URL] protection, [login to view URL] Protection
Extract the API from android app then scrap some data.
A pilot asp.net application is hosted in an amazon ec2 server with SQL Server database. Need an aws expert to suggest how security can be implemented for this app when this goes live. Person will create a documentation on how to create security around the app based on the best practices and using existing aws security products and solutions
1. Enable docker container on the raspberry pi 2. We use the Raspberry PI in kiosk mode. We would like to optimize the Linux build and make it security enabled so that no one can modify the image. 3. Build a docker image of our software and install on raspberry pi 4. We will make the raspberry pi remote access available for development
Hello, Looking for live active healthcare-related domains in US with physical presence for leeching a page/taking hidden links for marketing purposes only. Looking for service on monthly basis. Example: [login to view URL] [login to view URL]
We are looking for a website developer for build a small wordpress website. Here we're giving some example pages for your information. [login to view URL] [login to view URL] [login to view URL] [login to view URL] [login to view URL] [login to view URL] [login to view URL] [login to view URL] [login to view URL] [login to view URL] And more important thing you have to build Landing Page...
Need penetration test done that covers the OWASP top 10. The task will be to conduct the test, produce a professional report and answer any questions that you can if needed. Once we remediate any issues, we'll be looking to have you run the penetration test again. Note: need both the unauthenticated and authenticated site verified. Note: you must be a certified security professional
implement a SSH server, 2. implement a honeypot, 3. implement security controls using baseline configurations, multi-factor authentication, and a firewall 4. perform security monitoring through logging 5. evaluate the network for vulnerabilities and recommend changes
Hi Hoping you might be able to help my situation and can show evidence where you were able to sort a similar problem to my own. I can't login to my fb account neither through the website or via the mobile app - the password is correct but for the first time Facebook are now asking for 2 Factor Authentication, which I don't have setup (See images). I had this switched on in the past but ...
Hi friends, I build my own smtp and run with my python script, but all information (server, my ip, spamscore ..) is displayed! I want to hide it in the header receipt. I want to send my email with a header like this header (see file please). if it is possible for you, send me a message.