Attack mysql server jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    5,919 attack mysql server jobs found, pricing in USD

    ...ads. We were given a huge grant from the USDA and have money to spend on ads and marketing and want someone experienced to guide us. We want someone who can create a plan of attack so every each year we have marketing channels to get people interested and qualified for the incubator program. We are located in California East Bay and if someone is local

    $91 / hr (Avg Bid)
    $91 / hr Avg Bid
    11 bids

    ...a monthly retainer basis. I already have the server running and your first job would be to secure it / put in place everything required to prevent BRUTEFORCE attack of my SIP, SSH and other usual attacks on those type of servers. Once this is done, I will pay you monthly to do maintenance on my server and from time to time a few adjustments. I

    $216 (Avg Bid)
    $216 Avg Bid
    7 bids
    website issue 4 days left

    Hi, My website is in Joomla and on of the sudden due to the malware attack my complete site is now down. I need a technical person who can fix the issue. It's bit urgent. For more details please reach me through the mail.

    $28 (Avg Bid)
    $28 Avg Bid
    11 bids
    Linux VM box Compromising 4 days left
    VERIFIED

    ...one who capable with kali linux environment. This is just for leaning experience and vm box has designed for learning outcomes. Need abrief report outlining each test / attack run against the system and the result. Basically how you gain access to each flags. Note : You must compromise the system over the network, local, physical or other attacks

    $94 (Avg Bid)
    $94 Avg Bid
    1 bids

    You are to write a report outlining each test / attack run against the system and the result. You must follow a process, which should be defined prior to the commencement of testing. Your report should include the flags as well as any credentials you uncover as part of your hacking endeavours

    $112 (Avg Bid)
    $112 Avg Bid
    39 bids

    Describe at least 5 different tools or sites used during footprinting. What information can be found by each tool or site? How can the company protect itself from this information being available?

    $4 / hr (Avg Bid)
    $4 / hr Avg Bid
    2 bids

    I am waiting to get back the introduction and conclusion of my PhD thesis, which I should receive today, maybe tomorrow, not later than Monday (I will have a heart attack if I do not get it by Monday). I just need it to be proofread, maybe to make a few small changes in text, so it can be more "readable". As my supervisor is American, and she has already

    $42 (Avg Bid)
    $42 Avg Bid
    64 bids

    I need someone to help me to ensure my website is not hacked and listed as Malware in all browser, safari, google chrome, internet explorer, firefox, mobile interface and etc. Currently, the firefox browser and chrome browser is listed as Malware and also helps me to tighten the security so it will not be hacked again in future.

    $26 (Avg Bid)
    $26 Avg Bid
    34 bids

    ...will request a single one. If the quality is good others will be commissioned. Models will have to be low poly (3-4k max) and have 8 animations (Idle, walk, victory, defeat, attack, death, stunned and another one for a special move that will depend on gameplay). As the game is for mobile we will be most certainly be using an unlit material + baked AO

    $221 (Avg Bid)
    $221 Avg Bid
    48 bids
    Design project -- 2 9h left
    VERIFIED

    ...their mouth, nose, eyes... then the caricature drawer exagerares that trait and makes it funny. Typically is done against politicians or celebrities, it is FUNNY, but is an attack. The success is in the similarity or resemblanse of the funny exageration of an identifiable person. It is necessary that the target person represented in the cartoon, be

    $30 (Avg Bid)
    $30 Avg Bid
    19 bids

    ...verification or email. user have rating discount on exchanges. for western union or money gram orders changes the name randomly on each order placing. SEO friendly DDos attack or hacking system. some pair as automatic exchange. More details can be discuss after the final. Please bid only that person. who have made already this type of exchange

    $1169 (Avg Bid)
    $1169 Avg Bid
    15 bids

    ...would like to provide an industry-level analysis which I can only prepare from independent research. Also, there was a report released claiming Amazon are possibly going to attack the pharmaceutical industry as they already have signed up a pharmacist to be their ‘entry’ point into the Australian market. Their model is different (online) however their

    $88 (Avg Bid)
    $88 Avg Bid
    34 bids

    ...features are in excel format. 4. Thus I have 2 separate excel files containing features extracted for a particular user and his attacker. 5. Attacker features may vary because attack could be performed by different individual. But Authorized user features will have some consistency as they are extracted for the same person each time. I will combine

    $38 (Avg Bid)
    $38 Avg Bid
    3 bids

    Design new beginner friendly color coded 5e character sheets. Design an "Actions in Com...components should be color coded. for instance; on the "Actions in Combat" sheet, one of the options will be to make an attack. The text on the "Actions In Combat" sheet should be highlighted in the same color as the Weapons/Attack section on the character sheet.

    $40 (Avg Bid)
    $40 Avg Bid
    3 bids

    The participants (we) are presented with a so called Capture the Flag (CTF), in the form of a simulated, virtualized network. Our job is to hack it! The participants don’t attack each other, their task is to hack and break the different challenges presented for them. There is no active defensive side. Instead your job is to penetrate into the (rather

    $185 (Avg Bid)
    $185 Avg Bid
    11 bids

    The participants are presented with a so called Capture the Flag (CTF), in the form of a simulated, virtualized network. Your job is to hack it! The participants don’t attack each other, their task is to hack and break the different challenges presented for them. There is no active defensive side. Instead your job is to penetrate into the (rather passive)

    $20 (Avg Bid)
    $20 Avg Bid
    3 bids

    ...core functions will auto code everything for them including server side so that each package gets sent to each client without the creator having to code anything . There will be many stages to this project. Requirements: As of now I will need the server side client side connection server easily deployed auto port forwarded and running on anyone's

    $1285 (Avg Bid)
    $1285 Avg Bid
    15 bids

    1. We use many different types of ...attached Project description. you will create a report for your "boss" identifying the threats to your systems/assets in the scenario, who the attackers are, how they will attack (using STRIDE), and will make recommendations for security controls (use your textbook, too). Threat Modeling with STRIDE [url removed, login to view]

    $130 (Avg Bid)
    $130 Avg Bid
    8 bids