Adware attacks jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    5,431 adware attacks jobs found, pricing in USD

    ...documentation on steps needed to create new vhosts quickly in including paths, permissions and users We control access to wordpress admin by IP filter server wide to limit attacks. I would need something similar in ngix. <FilesMatch "^wp-login"> order deny,allow deny from all allow from [login to view URL] allow from [login to view URL] allow from 102.102

    $122 (Avg Bid)
    $122 Avg Bid
    14 bids
    Clean Hacked WordPress Site 5 days left
    VERIFIED

    I have a 2-page WordPress site that has been hacked twice now. I would like to have it cleaned and I would like to know how the attacks took place and how they can be prevented in future. Freelancer should also be able to advise on how to keep the site protected.

    $135 (Avg Bid)
    $135 Avg Bid
    67 bids
    Work c++./ 5 days left
    VERIFIED

    ...and diagonally. Movement consumes one action per square. All attacks take one action. You and the pirates may not occupy the same square. That's the game basics. Please note that some of the code I'll be showing will be windows specific. Additionally Extra credit Any additional attacks for the Pirates and the Art Collector (if and only if you have

    $40 (Avg Bid)
    $40 Avg Bid
    7 bids

    Which are the features/keywords of these attacks in web server access log file. So that these features will prove that this attack has done. Budget - 30 USD

    $27 (Avg Bid)
    $27 Avg Bid
    6 bids

    ...and diagonally. Movement consumes one action per square. All attacks take one action. You and the pirates may not occupy the same square. That's the game basics. Please note that some of the code I'll be showing will be windows specific. Additionally Extra credit Any additional attacks for the Pirates and the Art Collector (if and only if you have

    $167 (Avg Bid)
    $167 Avg Bid
    10 bids

    At MetaFact we are developing AI powered tools to protect organisations from disinformation attacks. We developed MVP and need to do more training to get relevant results.

    $394 (Avg Bid)
    $394 Avg Bid
    6 bids

    I need Bitcoin Node to be installed with API key. The whol...able to send and receive payments, Node must be automatically transferring funds from node wallet to a cold / hardware wallet. Server must be protected against brute force attacks. Server must be installed in a way where we can also use it as pool in future to increase the transaction speed.

    $378 (Avg Bid)
    $378 Avg Bid
    9 bids

    ...customise basic penetration testing tools like Burp Suite, sql lite, nikto, I know how to use metasploit, I know how to check network traffic on tcpdump for the traces of attacks etc. Of course I will do my part and do my homework, will not expect all the work from you but you must be able to guide me step by step all along for reading/practicing on

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    4 bids

    Short Description - Requirement of web attacks' features (keywords) finding from web server log file and writing an algorithm. Detail - The 3 web server log files will be provided to you. 1) Normal users log data 2) Robots log data 3) Malicious/Attack log data. You need to find out features of mentioned web attacks from web log file which will differentiate

    $135 (Avg Bid)
    $135 Avg Bid
    3 bids
    Crypto analyst expert 1 day left
    VERIFIED

    I am looking for crypto analysis for an existing work. I am looking for help to improve crypto security analysis of an existing system by defining or determining 5-6 attacks that are defeated by the design with well justification and professional explanation which includes entropy and mathematics solid knowledge . Please contact me for further details

    $76 (Avg Bid)
    $76 Avg Bid
    6 bids
    C++ Program 19 hours left

    ...and diagonally. Movement consumes one action per square. All attacks take one action. You and the pirates may not occupy the same square. That's the game basics. Please note that some of the code I'll be showing will be windows specific. Additionally Extra credit Any additional attacks for the Pirates and the Art Collector (if and only if you have

    $36 (Avg Bid)
    $36 Avg Bid
    10 bids

    Security analysis for an existing work. I am looking for help to improve security analysis of an existing system by defining or determining 5-6 attacks that are defeated by the design with well justification and professional explanation. Please contact me for further details.

    $40 (Avg Bid)
    $40 Avg Bid
    21 bids

    Our Center - is located in "Golden Sands" resort area on the Black Sea Coast of Bulgaria and offers unparalleled comfort of living combined with individual treatment appro...they need to overcome their addiction. Our Specialty - is treatment of drug addiction, alcoholism, compulsive gambling, internet addiction, depression, phobias and panic attacks.

    $38 (Avg Bid)
    $38 Avg Bid
    4 bids

    ...Horse, AdWare, DDoS, etc.) 3. They can then select the type of attack and then launch it 4. Upon selecting the attack, the backend will be responsible for launching the respective types of attacks with that category. Ex: If chosen "Trojan Horse", the backend coordinates (with the malware database), there may be ~50 type o "Trojan Horse" attacks that must

    $196 (Avg Bid)
    $196 Avg Bid
    4 bids

    ...type the url without https it basically give them a white page connection refused, so that need to be fixed as well and any other security issues. I do get daily drops and attacks someone been trying to hack attack daily for more than 2 years. If you do get the project you must take care of all the above issues and monitor the server for 10 days and

    $49 (Avg Bid)
    $49 Avg Bid
    5 bids

    ...Seller app would require regular updation of entries to server securely. Entries would include texts and images. App needs to be user friendly in UI and fully secure from attacks. Seller will also update their location using google maps. Buyer app is complex. When client opens the app he should be able to make search query throughout our database

    $883 (Avg Bid)
    $883 Avg Bid
    17 bids

    A lot of my websites are Wordpress based and seem to have quite a few frequent attacks. What I would like to resolve is having you trying to attack in to my website and for example, injecting some code into my Wordpress blog. For a test, I will provide a test site for you. If you manage, I would like to work with you on a lot more projects to help

    $210 (Avg Bid)
    $210 Avg Bid
    28 bids

    ...reload=9&v=UvjRA0gqhWo • The animations I would like you to do are an Idle, Walk, Attack stance and Attack. Please see this video for how a Funnel Web goes into an Attack Stance and Attacks: [login to view URL] • I will upload the fbx file to you when I award you the job. Thanks....

    $156 (Avg Bid)
    $156 Avg Bid
    22 bids

    I am suffering hacking attacks on my site and are using a method to generate income with adsense illegally, I need an expert to make the report of the accounts and to close them for violation of the adsense policies.

    $10 - $30
    Featured
    $10 - $30
    0 bids
    Trophy icon Book Cover Graphic Design Ended

    ...attacked by terrorists with bulletproof vests and assault rifles. From coast to coast, America comes under brutal attack and the terrorists are just getting started. Further attacks take place at grocery stores, as people try and stockpile food. "Black Friday" becomes the bloodiest attack in American history. Graphic Ideas and Thoughts - I want to create

    $100 (Avg Bid)
    Urgent Guaranteed
    $100
    173 entries

    We are looking for a liveness / anti-spoofing feature to prevent still images or video attacks for login, to be implemented in our Android App. ***Only apply if you already have it and can send us APK for testing***

    $1502 (Avg Bid)
    $1502 Avg Bid
    34 bids

    If you had an opportunity to write the final chapter of a book that starts after the terrorist attacks of 9/11, how would you write the history? What events would you include and why? Using the year 2010 as a starting point, construct a timeline essay of 6 successive, related events culminating with a current event that you believe has shaped the nation

    $97 (Avg Bid)
    $97 Avg Bid
    34 bids

    ...level or purchasing in game currency -1v1 battle -Pokémon style fighting turn based -each attack uses certain amount of energy -each body part has its own attack so 3 attacks per battle -rest option to regain energy -make it so we can set all the attack, defense, health and agility per body part and it will add them up for the current user

    $876 (Avg Bid)
    $876 Avg Bid
    34 bids

    ...level or purchasing in game currency -1v1 battle -Pokémon style fighting turn based -each attack uses certain amount of energy -each body part has its own attack so 3 attacks per battle -rest option to regain energy -make it so we can set all the attack, defense, health and agility per body part and it will add them up for the current user

    $598 (Avg Bid)
    $598 Avg Bid
    14 bids

    I need Bitcoin Node to be installed with API key. The whol...able to send and receive payments, Node must be automatically transferring funds from node wallet to a cold / hardware wallet. Server must be protected against brute force attacks. Server must be installed in a way where we can also use it as pool in future to increase the transaction speed.

    $398 (Avg Bid)
    $398 Avg Bid
    12 bids

    I need Bitcoin Node to be installed with API key. The whole server must be install securely and should be penetrate able. Server must run a full node with API access. API...able to send and receive payments, Node must be automatically transferring funds from node wallet to a cold / hardware wallet. Server must be protected against brute force attacks.

    $352 (Avg Bid)
    $352 Avg Bid
    16 bids

    we are looking for a high skill security person to secure our SQL and Nginx Server to Prevent Security Attacks and DDOS Attacks. reduce load, monitoring block all kinda of security Attacks. Alart us any extra load to servers. Cisco Certified Internetwork Expert, or CCIE will be the right candidate for this job however we can consider anyone with high

    $385 (Avg Bid)
    $385 Avg Bid
    22 bids

    Hey, do you know how to protect against BIG ddos attacks?

    $50 (Avg Bid)
    $50 Avg Bid
    1 bids

    ...trying to understand possible threats to an application: the mobile application structure, the data, identifying threat agents and methods of attack, and controls to prevent attacks. With those aspects in mind, you can create a threat model, which consists of an outline or checklist of items that need to be documented, reviewed, and discussed when developing

    $105 (Avg Bid)
    $105 Avg Bid
    14 bids
    Trophy icon MindKnow-how Ended

    ...enclosed spaces, visiting the dentist, flying, public speaking etc. • Weight loss • Addictions e.g. stopping smoking • Low self-confidence and poor self-esteem • Anger • Panic attacks • Bad habits e.g. nail biting etc. Clients will generally phone or message me for a consultation and this will be followed with hypnotherapy sessions which will be done on

    $37 (Avg Bid)
    Guaranteed
    $37
    23 entries

    I need secure authentication system made that isn't susceptible to man in the middle attacks to falsify a response from the server. The application authenticates using a push request to the web server and can receive a number of responses. The application is C# and the authentication is PHP. After some research I've found information about RSA and Nonce

    $77 (Avg Bid)
    $77 Avg Bid
    7 bids

    Evaluation of different block cipher modes like ctr, cbc etc. under different attacks like cpa, cca and prove that how they are secure or insecure under different attacks. Generalized example is ctr mode is cpa secure, but we need the theoretical and mathematical proof. There would be approximately six to seven modes.

    $556 (Avg Bid)
    $556 Avg Bid
    7 bids

    ...Your Goals And Objectives (Y/N) -Interpersonal Effectiveness Skills: --Skill 9 DEARMAN: Describe, Express, Assert, Reinforce (Y/N) --Skill 10 DEARMAN: Broken Record, Ignore Attacks, Appear Confident, Negotiate (Y/N) --Skill 11 Relationship Effectiveness: Factors That Reduce Effectiveness (Y/N) --Skill 12 GIVE: Gentle, Interested, Validate, Easy Manner

    $639 (Avg Bid)
    $639 Avg Bid
    5 bids

    ...Crypto Currencies including a HOT AND COLD wallet system. • Referral Program • Android – iOS Apps and Update support • Security Aspects – CloudFlare – to mitigate DDoS attacks • Blog • Notification Ticker • Day and Light UI mode • Data Center Requirements and Deployment support. • It should be noted that - since Security a...

    $7701 (Avg Bid)
    $7701 Avg Bid
    33 bids

    SQLiGoT: Detecting SQL Injection Attacks using Graph of Tokens and SVM

    $205 (Avg Bid)
    $205 Avg Bid
    6 bids

    We have the web design (front-end) of our new page [login to view URL] we need the following: 1) The design (front-end) must be ...have webpage caching (cache 1 day) and a url to clean the cache of the entire site 5) maximum load time should be maximum of 5 seconds 6) You must have security to avoid DDOS attacks or some other attack.

    $200 (Avg Bid)
    $200 Avg Bid
    13 bids

    ...features – 1. 2 or 4 Level encryption for saving passwords ( Depend of server you are buying ) 2. Security feature to block Cross site scripting attacks 3. Security features to block SQL injection attacks 4. SEO for images 5. Future proof and Flexible development process Technology – PHP Timeline - 15 Days...

    $8 (Avg Bid)
    $8 Avg Bid
    1 bids

    ...features – 1. 2 or 4 Level encryption for saving passwords ( Depend of server you are buying ) 2. Security feature to block Cross site scripting attacks 3. Security features to block SQL injection attacks 4. SEO for images 5. Future proof and Flexible development process Technology – PHP Timeline - 15 to 20Days ...

    $383 (Avg Bid)
    $383 Avg Bid
    18 bids

    ...The Gurew product provides cyber security data to clients and helps prevent cyber attacks. Certain elements of the product could be highlighted in the design: a) It provides an "active defence", i.e. rather than just reporting cyber attacks, it can also stop attacks. b) It provides protection from inside AND outside the company's network. Usually,

    $111 (Avg Bid)
    $111 Avg Bid
    82 bids

    ...upgrade/update to Debian 8 but this was not helping. login to ISPConfig is not possible because mysql is not running. maybe our server was attacked. in the log files we saw multiple attacks on the server and database. We also want the have blocked some hosts form outside Europe, so that they can't attack anymore. maybe the ISP config Database is also hacked

    $134 (Avg Bid)
    $134 Avg Bid
    19 bids

    I need a Live project on IOT with AWS (IOT based Smart parking system using AWS ) or using the IOT to predict heart attacks and cancer .

    $71 (Avg Bid)
    $71 Avg Bid
    2 bids

    ...features – 1. 2 or 4 Level encryption for saving passwords ( Depend of server you are buying ) 2. Security feature to block Cross site scripting attacks 3. Security features to block SQL injection attacks 4. SEO for images 5. Future proof and Flexible development process Technology – PHP Timeline - 15 to 20Days ...

    $2978 (Avg Bid)
    $2978 Avg Bid
    13 bids

    We do have 3 Servers where is ISPConfig installed. One Server is the Main Server who is managing the other servers. The MySqL is not ...upgrade/update to Debian 8 but this was not helping. login to ISPConfig is not possible because mysql is not running. maybe our server was attacked. in the log files we saw multiple attacks on the server and database.

    $76 (Avg Bid)
    $76 Avg Bid
    4 bids

    The concept of my project is a virus created by men that overpowered them and attacks constructions, it "eats" the buildings and grows bigger and faster each day. Its organic form contrasts with the rectangular buildings. Whats required is a 3D organic model with more than two entities linked to each other with "webs" shapes and to the ground too (like

    $220 (Avg Bid)
    $220 Avg Bid
    9 bids

    Mitigation of Denial of service attacks on robot

    $22 (Avg Bid)
    $22 Avg Bid
    5 bids
    Trophy icon Logo creation Ended

    ...companies. The focus of the service is to ensure low latency (ping) for players and DDoS protection for servers - this is to ensure that servers do not crash when receiving attacks. So it would be interesting if the brand image passed the idea of speed and safety. The initial idea to logo would be elements related to programming, shield, networks, internet

    $10 (Avg Bid)
    Guaranteed
    $10
    27 entries

    Hello, we have a network in Datacenter and our Router (Mikrotik RB2011UiAS) The cpu usage becoming sometimes 100% because of firewall service. We need an expert to config...(Mikrotik RB2011UiAS) The cpu usage becoming sometimes 100% because of firewall service. We need an expert to configure the router best performance and safest protect for attacks.

    $57 (Avg Bid)
    $57 Avg Bid
    4 bids

    ...the AdBlockers to hide the ads on the website. Content Protection Protect your website content from copying. Intelligent Pattern Recognition Detects Unknown and Zero-Day Attacks and Exploits. Ban System Block and redirect Visitors / Users (IP Addresses), Countries, IP Ranges, Operating Systems, Browsers, Internet Service Providers (ISP) and Referrers

    $201 (Avg Bid)
    $201 Avg Bid
    12 bids

    three questions 1. Question 1; Choose one case of the following and what would...case of the following and what would you do? (3 points) 2. Question 2; Apply ethics in IT Professional environments? (3 points) 3. Question 3; Mention some cases of cyber attacks in kingdom of saudi arabia and anti-cyber attack law in kingdom of saudi arabia? (4 points

    $65 (Avg Bid)
    $65 Avg Bid
    42 bids

    ...with similar formula): Weight = 1, 10 attacks per minute. Weight = 2, 9 attacks per minute. Weight = 3, 8 attacks per minute. Weight = 4, 7 attacks per minute. Weight = 5, 6 attacks per minute. Weight = 6, 5 attacks per minute. Weight = 7, 4 attacks per minute. Weight = 8, 3 attacks per minute. Weight = 9, 2 attacks per minute. Wei...

    $35 (Avg Bid)
    $35 Avg Bid
    24 bids