...it following the instructions on [login to view URL] or [login to view URL], It finishes to install but nothing works correctly, the resulting web page does not open, if I try to solve the pages does not update correctly the Vicidial/Asterisk
We require something that can finish our current website, it is a classifieds based site for adult services for the Australian Market. The site is close to being complete from the last freelancer but then they failed to communicate and the site was never finished Freelancer must be ok working with adult content The site is made using the theme Listify by austoundify, we have purchased the themes p...
...android store). We’re building a Software product for healthcare, I require the data and use information secure. The app is about to run into a pilot and would like to have a penetration test run prior to going live on 19 November. Is this something you can help me with? Have you worked with apps as well?...
I have been in the process of creating a blog site on Wordpress. I am brand new in the world of coding, website building, developing, etc. I have been working really hard for days to get this site configured properly, including the right plug ins, security, and basic sitemapping of my site. I also need help figuring out some specifics in my domain account...it's also brand new and barely conf...
i'll give you a topic and you need to build a large list of popular social media groups and message boards
I need to bids to redesign a Word-based fact sheet template which has pie-charts and text boxes. Need an advanced Word designer.
i need a location based dating app to be built. budget 800. NO BIDS FROM INDIAPAK please. I will provide a pdf with detailed specifications. This is for an android app with backend on my linux dedi. Please bid only if you can stay inside budget, and if you can deliver on time and you have experience with this type of apps. Not for beginners.
explore and evaluate the vulnerabilities of wireless devices through researching existing literature articles, journals, white papers, and practical experiments with use of screenshots. once experiments complete explore mitigation techniques that can be employed.
I need someone with a strong english language background, who also knows at least one european lang...little kids learn as they grow up, think SIMPLE, don't get carried away with unnecessary complexities or irrelevant words like 'caterpillar' or 'zebra'. Bids only from US/UK/Europe. ABSOLUTELY NO BIDS FROM INDIA OR RELATED COUNTRIES PLEASE. Budget $40
...carefully and then scribble on paper what you visualize the app to look like , and once we understand each other clearly we can start the project. budget is $50. NO BIDS FROM INDIA. NO OUT OF BUDGET BIDS This is the style and color system i like. Vivid colors with white background , gray used cleverly. THIS NEEDS TRUE TALENT AND SKILL. [login to view URL]
Hello Folks, We are information security startup who provide following services 1. Web application penetration testing 2. Mobile application penetration testing 3. Network va pt 4. Thick client penetration testing We follow following methodologies 1. Sans 2. Owasp top 10 we require unique content for our new website.
Job description with correct format is attached. Required skills: - arduino IDE + Arduino Uno + Mega - windows development (vba or java) Project: 1 - develop arduino uno and mega sketches to communicate with a PC thru the usb/serial port, change pin output status and detects changes on inputs. The pin configurations are predefined as inputs or outputs. The sketch manages an internal unsigned lo...
We would like a penetration test and report (including recommendations) for an installation of our media asset management system on one of our public facing servers. The system manages videos, stills, audio and other files for its customers. Metadata associated with these files is also stored in the system. It would be useful to see if these media
...can work on Open source siberian CMS , you can ﬁne the details in that attached ﬁle below, once you go through it then let me know can you able to do it or not. only genuine bids in preferred to the fastest one preferred to most good reviews and best bidders in new freelancer also accepted. all project proceeding will takes place on freelancer dont ask
...can work on Open source siberian CMS , you can ﬁne the details in that attached ﬁle below, once you go through it then let me know can you able to do it or not. only genuine bids in preferred to the fastest one preferred to most good reviews and best bidders in new freelancer also accepted. all project proceeding will takes place on freelancer don't
Project Theme/ Project Title: FRAP...networks (OSN) such as Facebook, twitter, Instagram etc has however led to the increase in privacy and security concerns. Main Deliverable: Java or Python programming for penetration testing Secondary Deliverable: Theoretical studies of password protection, data & app security and understanding of data encryption
Looking for a professional penetration tester to test my server in order to determine if it's vulnerable to any attack
I am looking for someone who can a) Perform penetration testing of our crypto exchange b) Provide long term support & maintenance of the exchange - Regular health checks - Providing assistance and fixing bugs in case of any issues Skills required: Experience with Laravel 5.6, CSS, MySQL 5.7, Web Sockets, PHP & Event sourcing If
Website SEO Work. Only Experienced and Result Oriented Bids Invited Apart from Onsite and Offsite SEO ACTIVITIES WE NEED Following Also: 1) On page and Off page seo for website. website is Appx 9 year Old. 2) Web audit needed before starting the work to understand The Errors and Current Voids preventing to Get more optimised. also Monthly Webaudit
I am an experienced electronic engineer and company man...companies as well. I am partially retired and have been designing electronic products for model railroaders. I need to reduce manufacturing costs by having printed circuit boards assembled (surface mount components) overseas. First step is to find the sources (Taiwan? China?) and get quotes.
I am looking for a penetration tester for periodic assessments against company networks. The person should be very familiar with Metasploit CLI interface (MSFConsole). If you are familiar with additional tools that is great. The tests will be performed using MSFConsole over a WebEx for observation and assistance. You must be able to create reports of
...enabling them to proactively defend against advanced cyber attacks. Our Services Strategic Consulting SOC Services Audit, Vulnerability & Risk Management Penetration Testing, Red Team & Advanced Adversary Simulations Digital Forensics Investigations Expert Witness Services Industrial Control Systems Security Incident Response & Remediation
... 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Scope You are to plan and execute a penetration test of the computer system hosted in the VM, following a formal, recognised methodology. Which methodology you choose is up to
We are a software company that have a web app that we need to have some PEN tests carried out on. This is a web only system and we need software testing not server security. We want to arrange an independent test to see if the web software system security is good, bad, or ugly and find weaknesses and vulnerabilities. We can give login name and passwords
...levels of speed and data integrity. 6. Security: Experience implementing security considerations to protect sensitive user data. Experience with server hardening and penetration testing. If you don't meet at least 4 of the requirements listed above, don't apply. Please don't send a cover letter. Just make sure your profile is updated with relevant
...technology enabling them to proactively defend against advanced cyber attacks. Our Services Strategic Consulting SOC Services Vulnerability & Risk Management Penetration Testing, Red Team & Advanced Adversary Simulations Digital Forensics Investigations Industrial Control Systems Security Incident Response & Remediation Cyber Security
Don't bid if your price does not match. Price is fixed won't change it. Image 1 to 4 will design one HTML responsive page for each. 5 to 6 will be designed in same HTML responsive page. Dropdown menu design and integration to the landing page. Please check attachment for design view. There is no photoshop file. you will create from scratch. We will provide text and images. You need to ...
...given operating system for vulnerabilities. 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Preparation You are given a VMWare virtual machine containing a potentially vulnerable operating system. The coursework is to apply the
You must be familiar with C BGAPI library from Silicon Labs and Simplicity Studio Development environment. ...Labs and Simplicity Studio Development environment. You must be familiar with Bluetooth 5 and use of the coded phy. You must have access to WSTK development boards and EFR32 or BGM13P radio boards. Hourly rate work to support a development.
Hi, I am looking for a program that can check Socks4/Socks5 validity from a [login to view URL] and then expose port 5566 as a proxy to be used by other penetration testing tools. and change proxy each 1min. So now i can run [login to view URL] with different socks4/5 each 1min a new one.
...(LTE-A) release 10 standard [7, 8, 9]. Indeed, using Mobile Relays (MRs) within the highspeed railway enhances the cellular coverage and overcome the moderate to high vehicle penetration loss (VPL)[10, 11] and also help to group handover procedures of (UE) devices, mobile relay also suffer from frequent handover. For example assume the train travailing with
...one-off infrastructure to test website that is currently in beta - and allow on-going testing as various changes occur. End to end testing of responsive website is required for desktop, tablet and mobile on various popular browsers: Should be familiar with automated testing and tools ( eg from amongst the usual suspects such as GhostInspector, Selenium
Web Security and Penetration Test I am looking for a great team to complete my project. you have even penetrated server of a big website, then received Bounty!!! for example facebook、google、Microsoft and so on. This is very important . If you don't have the abilities, don't bid. Thanks. Because it is a very very difficult project. Challenge it , you
Scope You are to plan and execute a penetration test of the computer system hosted in the VM, following a formal, recognised methodology. Which methodology you choose is up to you, but you must give a brief rationale as to why you have selected it. The scope of the test is limited to the IP address of the VM, and to any discovered open ports.
We are looking for someone experienced with flex PCB design to help us write a "how to" page for flexible printed circuit boards. Things we are looking for would include: 1. Applications 2. Industries served 3. Basic and advanced design tips 4. Common stack-ups 5. Benefits/properties of flexible PCB We would like 3 images. These may include graphs
** NO AUTOMATIC BIDS ** When bidding, use "I am not a robot" in the reply PLEASE. This project allows a client to access a website and upload images to specific folders. Clients have their own login, and can access only the folders for their account Clients can upload, download and delete images in accessible folders Admins can upload, download