Referrer spoofing jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 referrer spoofing jobs found, pricing in USD

    ...Unminified JavaScript and CSS Files (1) - Rectify 'Your database prefix is set to the default 'wp_'. - Remove The DISALLOW_FILE_EDIT constant is defined and set to false from our - Configure site for HSTS preload list - Rectify the X-XSS protection security header's non-recommended value: "1". - Rectify the HSTS Max-age security header's non-recommended value: "2592000 ". - Rectify the Referrer-Policy security header's non-recommended value: "origin-when-cross-origin". - Ensure page width matches viewport width (32) - Improve page loading time (32) - Delay loading images that appear below the fold (20) Less Important: - Rectify Orphaned Pages in Sitemaps (1) - Rectify Subdomain Doesn't Support HSTS Issue (1) - Re...

    $91 (Avg Bid)
    $91 Avg Bid
    36 bids

    Overview: We are seeking a skilled graphic designer to create a captivating wingtip flag design for our finance company. This flag will serve as a prominent marketing tool during events and outdoor promotions as well as at our agent/referrer locations. The design should be visually appealing, eye-catching, and effectively communicate our brand identity and message to potential customers. Company Background: Finance Direct is a locally known provider of a multitude of finance solutions, specialising in flexible and affordable financing options for individuals and businesses purchasing vehicles, caravans, machinery and equipment as well as business and personal loans. With our commitment to innovation and customer satisfaction, we aim to stand out in a competitive market by deliver...

    $51 (Avg Bid)
    $51
    10 entries

    I am in need of an advanced face recognition we...a url or anyway to integrate a existing PHP app) or API (by sending photo) for purposes of liveness detection. Key features for this project should include liveness detection utilizing facial movements and eye blinking as anti-spoofing measures - this will contribute to robust security. Once the identity verification is successful, the application should send the image by POST passing arguments to identify the user. Experience in creating highly secure web applications, as well as a comprehensive understanding of facial recognition technologies and anti-spoofing techniques free and open source, will be essential for the successful completion of this project. Moreover, a tested ability to integrate API features seamlessly wi...

    $78 (Avg Bid)
    $78 Avg Bid
    10 bids

    ...loan/rebate interest 7. Manage the customer transaction with deposit/withdrawal/investment record 8. Automatically send out the branch account summary & report of Branch Client function 7 to specific branch Telegram group 9. Automatically send out customer deposit/investment/withdrawal message to specific branch Telegram group Branch Client 1. Login 2. Create a customer profile with name, referrer, ID (auto generated) 3. Input the deposit/withdrawal/investment/locked cash amount for customers 4. Input the loan/repayment for customers 5. Calculate the rebate interest for customers 6. Manage branch outstanding cash, available cash, expense (multiple types such as travel, meal, etc.), salary per day 7. Show summary reports for branch account, customer list with bal...

    $5114 - $10228
    Urgent Sealed NDA
    $5114 - $10228
    22 bids

    ...business. The business address is attached to the new house I purchased. Examples - - MapQuest - - Yelp - - Better Business Bureau - - Facebook - - - - – - Nicelocal - Skills and experience required include: - Knowledge and experience in digital privacy - Experience with managing search

    $136 (Avg Bid)
    $136 Avg Bid
    35 bids

    ...to be developed aims to provide facial recognition and anti-spoofing capabilities to integrate into already existing applications. It will focus on being a hybrid component compatible with Flutter, allowing its use on both iOS and Android devices. Importantly, no significant effort will be required in creating an elaborate user interface, as the SDK will be integrated into another pre-existing application. Instead, the emphasis will be on ensuring that face detection, face comparison, and anti-spoofing features work optimally and are easily integrated into the main application workflow. i need somone who could work on it quick please Key Features Required: * Face detection * Face recognition * Liveness detection * Anti-spoofing capabilities Ideal Skills and Exper...

    $156 (Avg Bid)
    $156 Avg Bid
    21 bids

    ...beginner-level tutorial that expands comprehension on the concept and theory underlying spoofing emails and text messages. The ultimate aim is to harness the knowledge for the purposes of ethical hacking. Key focus areas: - Fundamentals of Email and Text Message Spoofing. - Core Concepts that Govern Ethical Hacking. - Understanding the Interface between Spoofing and Ethical Hacking. A potential candidate for this project will ideally have: - Extensive experience in cybersecurity and ethical hacking. - Innovative teaching skills to simplify complex concepts. - Proficiency in course structure and creation. Your assignment is to enlighten beginners with zero experience about the theory behind spoofing, imparting them the tools necessary to utilize this know...

    $24 / hr (Avg Bid)
    $24 / hr Avg Bid
    20 bids

    Creating a Bluestacks emulator like a real Android device while meeting the specified requirements involves several technical steps. Below is a step-by-step guide to achieve this: Spoofing Methodology: Develop or find an app-based or Play Store-based spoofing solution. This involves creating or finding an application that can manipulate device information such as IMEI, Android ID, device model, etc. The spoofing solution should preferably work at the system level to provide a more comprehensive emulation of a real Android device. Android Version Selection: Configure the Bluestacks emulator to run either Android 7 or Android 9. You may need to use custom ROMs or images compatible with Bluestacks for these versions. Root and Xposed Bypass: Implement a solution that d...

    $88 (Avg Bid)
    $88 Avg Bid
    5 bids

    1. Per...Compatibility: The bot should be designed to be easily set up and utilized by any community on Telegram. It should be adaptable to various channels or groups without significant customization. 5. Captcha Verification: Prior to awarding referral points, the bot should verify whether the user has successfully passed a captcha. Only after successful captcha verification into the desired group should the referrer gain the referral point. For example, passing rose or safeguard captcha system. The developer should ensure the bot's reliability, efficiency, and user-friendliness. Additionally, they should prioritize security measures to safeguard user data and prevent misuse of the referral system. Clear documentation and support for setting up and managing the bot should al...

    $85 (Avg Bid)
    $85 Avg Bid
    1 bids

    I don't accept cloning apps like appcloner. 1-Spoofing will be app based and play store based or fully system based. 2-We prefer android 7 but if not possible android 9 is fine too. 3-we need no root and no xposed solution if available 4-We need to bypass app based safetynet can use any safetynet checker app to check your settings. 5-We need an app for changing android fingerprints and hiding root, hiding xposed if you use can suggest us apps instead of creating them or you can inject codes to the 'll consider economic solutions for the apps you suggest. 6-The app name we will use is no matter for can check your settings via test apps. 7-Solution will be for multi bluestacks instances and will work for a long time.

    $557 (Avg Bid)
    $557 Avg Bid
    36 bids

    As a cybersecurity enthusiast looking to deepen my understanding, I need an expert with strong skills and experience in email spoofing, CNAME record manipulation, mailing setup, and domain configuration. Key Objectives: - Successful demonstration of email spoofing for educational purposes - Setting up mailing system and DNS configuration - Detailed walkthrough of CNAME record manipulation Professional Requirements: The ideal candidate should demonstrate a comprehensive understanding of the following areas: - Email spoofing techniques - CNAME record manipulation - Mailing system setup - Domain configuration This project is purely intended for knowledge acquisition and educational purposes, therefore, any advice or demonstration should comply with ethical guidelines...

    $113 (Avg Bid)
    $113 Avg Bid
    13 bids

    ...**Efforts Already Made:** - Attempted basic troubleshooting myself, including: - Reinstalling Fortnite - Changing some hardware components - Using various VPN services **Ideal Skills and Experience:** - Proficient in handling and resolving HWID bans for PC games, especially Fortnite. - Familiarity with the intricacies of gaming security and anti-cheat mechanisms. - Experience in modifying or spoofing hardware IDs securely without compromising system stability. - Knowledge of network security practices to advise on the safe use of VPNs or similar technologies to avoid future issues. - Ability to provide a step-by-step plan on how to avoid such bans in the future, emphasizing safe and fair gameplay practices. I'm looking forward to collaborating with someone who can gu...

    $151 (Avg Bid)
    $151 Avg Bid
    7 bids

    I'm searching for a proficient SIP/Asterisk engineer who has ample experience in performing the following tasks: - Setting up and configuring an Asterisk server - Ensuring that the server is set up for high security and can support telemarketing or sales calls - Adding a specific function of calling and spoofing numbers, to be used exclusively for telemarketing and sales purposes Ideal skills and experience for the job: - Extensive experience with Asterisk and SIP protocols - Past-experience in setting up IVR systems - Understanding of server security measures - Familiarity with telemarketing systems Please provide a summary of your relevant work experience and your approach to this task in your bid.

    $634 (Avg Bid)
    $634 Avg Bid
    16 bids

    ... Third-party services 4. **Which phase in the development lifecycle is threat modeling most effective?** A. Requirement gathering B. Design C. Implementation D. Deployment 5. **What does the ‘STRIDE’ methodology stand for in threat modeling?** A. Spoofing, Tampering, Repudiation, Information Disclosure, Elevation of Privilege B. Security, Tracing, Reliability, Isolation, Debugging, Encoding C. Scalability, Transferability, Reliability, Integration, Development, Efficiency D. Spoofing, Tracing, Refactoring, Information Disclosure, Denial of Service, Encryption 6. **Which of the following is not a characteristic of serverless computing?** A. Stateful applications B. Event-driven execution C. Auto-provisioning o...

    $37 / hr (Avg Bid)
    $37 / hr Avg Bid
    3 bids

    ...particularly with Gmail. - Expertise in DNS management and modification. - Solid understanding of email security standards, including DKIM and DMARC. - Experience in troubleshooting and improving email deliverability. This project demands meticulous attention to detail to ensure that both DKIM and DMARC are set up correctly, not only to increase email deliverability but also to safeguard against email spoofing. Freelancers with prior experience in enhancing email security and deliverability, especially within Gmail environments, are encouraged to bid....

    $144 (Avg Bid)
    $144 Avg Bid
    13 bids

    I need a camera spoofing app like the attached video. I don't need ID card feature, just live feed spoofing. I should be able to select a verification video (short clip holding the verification pose) when Tinder prompts me to verify. I need this app working on Tinder, bumble, and badoo

    $618 (Avg Bid)
    $618 Avg Bid
    60 bids

    ...Internal staff D. Third-party services 4. Which phase in the development lifecycle is threat modeling most effective? A. Requirement gathering B. Design C. Implementation D. Deployment 5. What does the ‘STRIDE’ methodology stand for in threat modeling? A. Spoofing, Tampering, Repudiation, Information Disclosure, Elevation of Privilege B. Security, Tracing, Reliability, Isolation, Debugging, Encoding C. Scalability, Transferability, Reliability, Integration, Development, Efficiency D. Spoofing, Tracing, Refactoring, Information Disclosure, Denial of Service, Encryption 6. Which of the following is not a characteristic of serverless computing? A. Stateful applications B. Event-driven execution C. Auto-provisioning of resourc...

    $50 / hr (Avg Bid)
    $50 / hr Avg Bid
    1 bids

    In this project, we aims to create a website or application that leverages multiple cloud servers worldwide to process user searches across various geographical regions, with a primary focus on shopping queries sourced from Google Shop...servers worldwide to process user searches across various geographical regions, with a primary focus on shopping queries sourced from Google Shopping. Users will select different locations, and their search phrases will be queried as if from those destinations, aggregating and displaying results on a single page. To begin, our Minimum Viable Product (MVP) will simulate server locations using address spoofing methods, such as those utilized by ' ', to conduct searches on Google and present consolidated results.

    $21 / hr (Avg Bid)
    NDA
    $21 / hr Avg Bid
    44 bids

    Hello everyone. I am Jannis from Germany and I have a company that works as a referrer for financial institutions. For my work, I need one or more very reliable assistants to help me acquire new customers. Your task will be to contact potential customers on Telegram, Facebook and Instagram with my guidance. You will receive detailed training from me. What you should bring with you: - A good command of English - You should know how to translate German texts into your language - Basic knowledge of how to use Telegram, Facebook and Instagram - 2-3 hours a day, 7 days a week (maybe more in the future) - Logical thinking skills - Ability to make independent decisions These are the advantages: - Simple job, from home - Bonus payments for every customer you acquire - Friendly

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    28 bids

    ...developing an automated scheduling system for attendance marking. **What I Need:** - Development of a method to bypass or emulate fingerprint authentication effectively. - Implementation of location spoofing that satisfies app requirements without manual intervention. - Creation of an automation scheduler to perform attendance tasks at predetermined times. **Ideal Skills and Experience:** - Proficiency in mobile application development, particularly in Android or iOS platforms, depending on my device. - Experience with security features such as fingerprint authentication and GPS location spoofing. - Knowledge in automation and scripting to facilitate scheduling tasks within the application's needs. - Capability to provide a robust, user-friendly solution that integr...

    $25 (Avg Bid)
    $25 Avg Bid
    2 bids

    I have a strange issue I have a REDMINE that works on the old server but after it is moved it says proxy issue and the user can not ac...a strange issue I have a REDMINE that works on the old server but after it is moved it says proxy issue and the user can not access it. **ERROR** [error] 9309#0: *44008 connect() failed (111: Connection refused) while connecting to upstream, client: , server: , request: "GET / HTTP/2.0", upstream: "", host: "", referrer: "" **PROXY code in NGINX** location / { proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header Host $http_host; proxy_pass ; } **Requirements:** - PLESK - UBUNTU 22.04 - REDMINE - MIGRATION between servers

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    10 bids

    ... . login to share your unique refer a friend link.. User get a link to click to copy, e.g. copy or share your link Copy this link or share buttons for whatsapp, fb, tw.. New user a at a dot com only goes they submit enquiry Insert into refer_a_friend , id , referrer = 1219 , referee = new_user_id_a at a dot com , amount €5 , complete=0, paid to referrer = 0, Pro submit quotes, e.g. €200 User clicks accept quote, then pro payment link = 5% / €10 . refer a friend get €5 off . = €10-5 = pro pay €5. On click accept quote, get amount from refer_a_friend , where referee = contact_info_email If pro fee is 0 , then no payment email link, email the pro , cc a at a dot com the contact info… Set refer_a_friend

    $221 (Avg Bid)
    $221 Avg Bid
    41 bids

    ...expiry_year = "2024" credit_card_first_6 = (0, 6) credit_card_last_4 = ( - 4) fetch("", { headers: { "content-type": "application/x-www-form-urlencoded", "x-fb-friendly-name": "useBillingAddCreditCardMutation" }, referrer: "", body: `av=${uid}&payment_dev_cycle=prod&__usid=&__user=${uid}&__a=1&__dyn=&__req=1d&__hs=%3Aads_campaign_manager_pkg.2.0.0.0.&dpr=1&__ccg=UNKNOWN&__rev=1005130120&__s=m3nwoo%3Ahk1830%3A8jyqhz&__hsi=7070146181357455798-0&__comet_req=0&fb_dtsg=${token}&jazoest=21981&lsd=FNrxnrWZ79fwVUhEKI7Bg7&__spin_r=1005130120&__spin_b=trunk&__spin_t=1646146685&fb_api

    $177 (Avg Bid)
    $177 Avg Bid
    9 bids

    I urgently require a savvy Instagram expert to address a pressing issue – my account is being spoofed, and it's affecting my follower count. - **Main Goal**: Implement measures to prevent altering the visual representation of my followers count. This spoofing issue presents with erratic loss and gains, not reflective of genuine follower interactions. - **Challenges**: - Addressing follower count discrepancies - Preventing unauthorized spoofing activities - **Skills Needed**: - Proficiency in Instagram's security features - Experience with social media analytics - Understanding of Instagram's algorithm regarding follower engagement - Strong problem-solving abilities related to social media issues - **Expected Outcomes**: A restored and sec...

    $542 (Avg Bid)
    $542 Avg Bid
    19 bids

    I need expert assistance to bolster my email defense mechanisms. My goal is to rapidly integrate top-tier email authentication standards with my Zoho mail to minimize the risk of phishing and spoofing attacks. **Essentials:** - Implement SPF, DKIM, and DMARC protocols. - Expect completion within a week. - Requires basic Zoho configuration. **Skills Needed:** - Proficient in email security protocols. - Experienced with Zoho Suite. - Strong understanding of DNS configurations. Do you have the expertise to tighten my email security without delay? Reach out and let's fortify my Zoho mail system.

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    40 bids

    I urgently require a savvy Instagram expert to address a pressing issue – my account is being spoofed, and it's affecting my follower count. - **Main Goal**: Implement measures to prevent altering the visual representation of my followers count. This spoofing issue presents with erratic loss and gains, not reflective of genuine follower interactions. - **Challenges**: - Addressing follower count discrepancies - Preventing unauthorized spoofing activities - **Skills Needed**: - Proficiency in Instagram's security features - Experience with social media analytics - Understanding of Instagram's algorithm regarding follower engagement - Strong problem-solving abilities related to social media issues - **Expected Outcomes**: A resto...

    $496 (Avg Bid)
    $496 Avg Bid
    24 bids

    I'm looking for a knowledgeable professional to assist in improving my email deliverability. Your task will involve enhancing the security and authenticity of my emails, to ensure they land safely in the recipients' inbo...legitimacy of my emails. - Google Workspace: My business currently uses Google Workspace as our email service provider. Familiarity with this platform is crucial for successful implementation of the aforementioned protocols. Skills and Experience: - Advanced understanding of DMARC, DKIM, and SPF - Proven experience with Google Workspace - Expertise in improving email deliverability and preventing spoofing. Through your work, we aim to minimize the occasions when our emails end up categorized as 'spam'. A proven track record in such impro...

    $35 / hr (Avg Bid)
    $35 / hr Avg Bid
    20 bids

    ...real-time calculations based on asset type and price. 3. Inquiry Popup: • Implement a "Get Rate" button that opens a user-friendly popup. • Collect user information, including Name, Email, and Mobile, through the popup. 4. CRM Integration: • Develop API connections to seamlessly transfer user data to our CRM system. • Tag the information with relevant details such as Name, Phone, Email, Asset type, Referrer ID, and Asset price. Requirements: • Proven experience in developing plugins for various web platforms. • Strong proficiency in web development technologies (HTML, CSS, JavaScript, etc.). • Experience with CRM integration and API development. • UI/UX design skills for creating an intuitive user experience. • Ability to ...

    $1591 (Avg Bid)
    NDA
    $1591 Avg Bid
    72 bids

    ...with clients hosted on servers I rent. Several of the clients have either Mail Chimp or Constant Contact. I want to learn how to add the proper CNAME, TXT DNS settings so their emails follow new standards and compliance for delivery. I know the basics, but want to have a more clear understanding of: - Implement DKIM: Configure DomainKeys Identified Mail to validate outbound emails, preventing spoofing. - Set up DMARC: Deploy Domain-based Message Authentication, Reporting, and Conformance to specify how receiving servers handle unauthenticated emails. - Ensure Policy Enforcement: Adjust policies for strict compliance adherence and report on email traffic. - Guidance on Best Practices: Advice on maintaining and updating security protocols. - rau IDEAL CANDIDATE: - Proficient in ...

    $34 / hr (Avg Bid)
    $34 / hr Avg Bid
    6 bids

    I'm seeking an AI expert to develop a system focused on the detection of partially spoofed audio signals. The objective is not merely to recognize tampering but to ensure authenticity in audio streams, possibly for security or proprietary content protection. Key Aspects of the Project: - Implement cutting-edge algorithms designed to detect audio spoofing. - Integrate the AI with existing systems for seamless operation. - Prioritize accuracy and reliability in detection. Ideal Skills: - Proficiency in AI and machine learning, especially in audio analysis. - Experience in signal processing and anomaly detection. - Ability to implement solutions that can perform with a high degree of precision. - Familiarity with real-time processing is a plus, given the lack of clarity on the e...

    $84 (Avg Bid)
    $84 Avg Bid
    2 bids

    ...improve our existing project. This involves enhancing the functionality of an AI Audio Spoofing Detection System. Work primarily entails updating the current code and implementing the revamped system effectively. Here's a little more about what's needed: - Code Enhancement: You'll be tasked with refining our current system. It's been written in Python, and we expect you to be proficient in this language and ideally experienced in AI/ML projects. - System Implementation: After updating our code, your second task will be to integrate the improved system ensuring top-notch performance. Ideal candidates should possess skills and experience in Python, AI/ML, and have a sound understanding of audio spoofing detection. Demonstrated ability to handle sim...

    $519 (Avg Bid)
    $519 Avg Bid
    9 bids

    I'm seeking a specialized freelancer to create a highly accurate wifi geolocation spoofing tool for Android to bolster my location privacy. Your expertise will help me keep my whereabouts concealed for personal privacy. Ideal Candidate Skills: - Proficient in Android app development - Knowledgeable in geolocation technologies - Experienced in VPN/spoofing techniques - Understanding of privacy and security protocols Requirements: - Develop an Android-compatible geolocation spoofing app. - Ensure high accuracy in spoofed locations. - Prioritize privacy and undetectability. - Offer a user-friendly interface. Expectations: - Work within set deadlines. - Communicate progress regularly. - Provide post-development support for troubleshooting. I'm looking forward...

    $129 (Avg Bid)
    $129 Avg Bid
    9 bids

    "I am seeking an ethical hacker specialized in email security. My Outlook email has been compromised, and I have currently lost all access. I suspect it might be the result of unauthorized access, phishing attempts, or email spoofing. Your job is to help me regain control of my email account. Skills and Experience: 1. Email Security: Extensive experience in ethical hacking and email security protocols. 2. Outlook Familiarity: Proficiency in Outlook platform and its security aspects is critical."

    $30 / hr (Avg Bid)
    $30 / hr Avg Bid
    6 bids

    ...familiarity in the Solana ecosystem, to create a tensor bot for me. This bot will be used on the Tensor(). The bot's core functionalities will consist of: - Bidding on NFTs. - Listing NFTs for sale. -Adjusting bid according to the top bid so it doesn't get filled everytime.....like i want my bid to fill just once or twice in two three days so that tensor doesn't count my bid as spoofing. In order to accommodate my requirements, the successful freelancer should have extensive experience in bot creation, a strong understanding of decentralized exchanges, and specific familiarity with Tensor and Solana protocols. I'm also looking for a developer to design a user-friendly, web-based interface for the bot. This will ensure I can easily manage the bot's fun...

    $333 (Avg Bid)
    Featured Urgent
    $333 Avg Bid
    6 bids

    ...establishing these authentication protocols. Here's what I need from you: - **DKIM Configuration**: Set up DomainKeys Identified Mail (DKIM) records to ensure that the emails sent from my domain are authenticated and trusted by recipient email servers. - **DMARC Implementation**: Implement Domain-based Message Authentication, Reporting & Conformance (DMARC) policies to protect my domain against email spoofing and to align with authentication standards. - **Compliance Check**: Verify that the DKIM and DMARC implementations are correct and meet the necessary compliance standards. IDEAL SKILLS AND EXPERIENCE: - Experience with 123 reg email services - Background in email security and authentication protocols - Proven track record in improving email deliverability throug...

    $158 (Avg Bid)
    $158 Avg Bid
    26 bids

    ...user-friendly interface that allows users to easily navigate and interact with the scraped information. Scalability: Design the system to be scalable, accommodating potential changes to the Gig platform and handling a growing user base. What needs to be done: Full website design (Front-Back End) Dashboard for Admin Server configuration Payment Integration Bot Development (Script) Geolocation Spoofing Web App Ideal Skills and Experience: - Experience in web scraping and data extraction. - Proficiency in programming languages such as Python or Java. - Knowledge of HTML and CSS for website design. - Familiarity with scraping tools and libraries such as Beautiful Soup or Scrapy, Selenium. - Experience in developing systems with real-time functionality. - Knowledge of secure authe...

    $33 / hr (Avg Bid)
    $33 / hr Avg Bid
    78 bids

    Hi, I got a wordpress website hacked. The hack leads to redirections to spam websites. The malware only occurs when I click on the website link on the facepage page on a mobile device. Therefore, I guess the malware redirects are activated referrer-based (facebook) and mobile specific (redirects do not happen on desktop). I used Malcare and Wordfence to scan the website. Both found some malware, however after removing the it the problem is still there. I need a IT security expert who can fix this manually. Please tell me which access data you would need. The hosting provider said, they think the database is infected. Looking forward to your offers!

    $140 (Avg Bid)
    $140 Avg Bid
    67 bids

    I am looking for READY script of MLM system. I need an MLM system for shop. So users can join through referral and when they make sell, then the referrer gets a certain commission. We'll have it upto few levels. I plan to have ebook and some physical products. Please apply if you already have a ready script that we can use directly or with minimum modifications. I do not want WordPress. I prefer Laravel or Node

    $505 (Avg Bid)
    $505 Avg Bid
    123 bids

    ...the referrer is blocked. If the IP is found to be OK when compared to the "Blocked IP List", then the incoming URL is then compared to another list that we will call a "Block URLs List". The "Block URLs List" is a pre-determined (we will manually create this list) list of URLs and if there is a match that the referrer is blocked from the site and the incoming IP of this referrer is to be written to the "Blocked IP List" mentioned above. I'm not sure if the above can be achieved just by using htaccess so any solution you might have would be considered as long as it does the job. For example if the incoming URL is: /home1/mysite/public_html/wordpress and the "Blocked URLs List" contains an entry called: /hom...

    $38 (Avg Bid)
    $38 Avg Bid
    17 bids

    ...free Second screen browser notification when block if user didnt pay or cancel subscription notification send "your device is at risk" In manu - cancel subscription contact Not lame webview version build browser from start ! 3rd party s2s pixel!! i will send users to apple store with ids in the url for example : if user install the app you need to take 34565543345 from the url and fire it in pixel with payout=0 for example : the pixel is : If user subscribe for the 3days trail you need to fir the pixel with payout=1 for ex: for example : the pixel is : if user cancel

    $544 (Avg Bid)
    $544 Avg Bid
    51 bids

    I'm currently in need for assistance in the setup of DKIM, DMARC, and SPF records for multiple domains (between 2 to 5), specifically on Office 365. The project's details are as follows: 1. DKIM, DMARC, SPF Setup: A professional who can efficiently set up these email authentication methods, ensuring all our outgoing emails are verified — curtailing email spoofing and phishing attacks. 2. Policy Development: I'm not sure whether there's an existing policy for DKIM, DMARC, and SPF or a new one will need to be created, hence part of your role would involve assessing the current state and subsequently formulate a suitable policy if required. Ideal skills and experience: - Proficiency with Office 365 email service, godaddy, active campaign, wordpress - An u...

    $63 (Avg Bid)
    $63 Avg Bid
    26 bids

    I am in need of qualified professionals who possess deep expertise in litigation support and an authoritative understanding of researching law cases. Specifically, I am currently in the midst of a litigation process where I require related assistance. Key Responsibilities: - Facilitating evidence collection: Careful and accurate data collection is paramount in...critical, hence having previous experience in doing so would be beneficial. Please note, this project may require comprehensive knowledge about the law – experienced legal professionals (lawyers, paralegals etc.) are especially encouraged to bid. Task: We need to find 3 or 4 or more trials of cases where docusign was used to enforce contracts fraudlently signed by illicitly accessing emails and ip spoofing and or th...

    $40 (Avg Bid)
    $40 Avg Bid
    27 bids

    ...project is Force Images and Videos to the android Camera spoofing, where the application should be able to spoof the camera in real-time while using the camera on an Android smartphone. Ideal Skills and Experience: - Strong knowledge of Android development and camera functionality - Experience with image and face detection and recognition algorithms - Proficiency in image processing and manipulation - Familiarity with real-time video processing and rendering - Ability to integrate the camera spoofer functionality seamlessly into the Android smartphone's camera app - Prior experience in developing similar camera spoofing applications is a plus The application should be user-friendly, reliable, and able to deliver high-quality face spoofing results. Additional...

    $391 (Avg Bid)
    $391 Avg Bid
    32 bids

    Website must have the following features. 1. Completely auction based 2. Platform for both sellers & buyers 3. Auction process details * Sellers must have the option to set a price for the acceptable offer price. * Three ch...& buyers 3. Auction process details * Sellers must have the option to set a price for the acceptable offer price. * Three chances for bidding by buyers * Bidder must have the option to contact the seller 4. Option to get the vehicle inspection reports (Third party service) 5. Car 360° view like 6. Car Health report or history Make a proper flow from where we are starting from. Make a proper wireframe and lets start this project ASAP.

    $678 (Avg Bid)
    $678 Avg Bid
    51 bids

    ...the following: - Real-time face detection: It should have the capability to immediately detect and recognise faces saving users time during the login process. - High accuracy: The system must ensure precision in identifying the correct user and reduce the possibility of false identifications. - Robust against spoofing attacks: As the app will be dealing with sensitive financial information, it is vital to ensure the facial recognition software is resilient against potential spoofing attacks. The ideal freelancer should have demonstrated experience in developing similar mobile applications, notably with secure facial recognition features. A comprehensive understanding of security measures to uphold user confidentiality and protect user data is paramount. Proficiency in ...

    $45931 (Avg Bid)
    $45931 Avg Bid
    50 bids

    ...website layout is to be based on the draft example provided but you can add design features of your own: You will have to build the following • Landing page (based on the draft layout) • Contact us page • About Us page • Passed Clients Page • Sub Our Services Page (7 Pages) • Services Page (20 pages, basically the same style but different text and photos) • Blog News Page • Client form. Please referrer to structure page provided. The building process will be as follows. 1. All the pages are to be drafted and a pdf copy is to be produced and issued by the builder (milestone 1) 2. The draft will then be checked and given back to the builder to amend, the builder will then correct any edits. 3. When the amendments are complete final draft ...

    $1147 (Avg Bid)
    $1147 Avg Bid
    271 bids

    Job Details: DKIM and SPF record for all Domains also at the Plesk DNS Template for may future domains. Secure with them the email spoofing problem

    $25 (Avg Bid)
    $25 Avg Bid
    1 bids

    Jobdetails: make DKIM and SPF record on all Domains because email spoofing problems. Change the DNS Template on Plesk to have those problems dont at the future

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    Project Description: Creating Minimalist Illustrations for a Website Template - I am in need of a talented illustrator who can create minimalist illustrations for a website template. Ideal solution: - A set of vector images which match in colour and design - Take the website It has some graphics already and would like to replace these. You can customise or create completely bespoke images. I’m looking for improvements to all of the assets. Please inform which of the assets and the scope of the work which you can provide. Using stock images is acceptable as long as the aesthetics match all other assets. - The illustrations should be clean, simple, and have a modern aesthetic. - Images should be colour agnostic. - The style should be minimalist

    $19 (Avg Bid)
    Guaranteed
    $19
    10 entries