...makes it easy to publish articles on a daily basis. The process to publish new news articles will need to be fully documented so that someone with basic computer knowledge can post an article. The article pages should follow the sire theme and be able to display text as well as pictures, charts and tables. The page should have a static pane/frame
...smart watch to detect body vitals like: heart rate, ECG monitoring, blood pressure, blood glucose and blood oxygen. The app will monitor the user vital signs such as heart attack, cardiac arrest, (high - low) blood pressure, (high –low) blood glucose or low level of blood oxygen. Also the system detect location of the users . The system have 2 users
...loan. We are in need or a experienced marketer and brander that can make print material and online ads. We were given a huge grant from the USDA and have money to spend on ads and marketing and want someone experienced to guide us. We want someone who can create a plan of attack so every each year we have marketing channels to get people interested
...a monthly retainer basis. I already have the server running and your first job would be to secure it / put in place everything required to prevent BRUTEFORCE attack of my SIP, SSH and other usual attacks on those type of servers. Once this is done, I will pay you monthly to do maintenance on my server and from time to time a few adjustments. I
Very small project (Linux expert can do within 2-3 hours) Need to compromise the vm linux box and attain root level privileges. Additionally there are five flags, these flags are represented as values and are awarded at each point of system compromise. Look for them in home directories, web pages etc. Tips are given to gain 5 flags. Just need some one
You are to write a report outlining each test / attack run against the system and the result. You must follow a process, which should be defined prior to the commencement of testing. Your report should include the flags as well as any credentials you uncover as part of your hacking endeavours
Describe at least 5 different tools or sites used during footprinting. What information can be found by each tool or site? How can the company protect itself from this information being available?
...conclusion of my PhD thesis, which I should receive today, maybe tomorrow, not later than Monday (I will have a heart attack if I do not get it by Monday). I just need it to be proofread, maybe to make a few small changes in text, so it can be more "readable". As my supervisor is American, and she has already improved it before, and I expect her to send
I need someone to help me to ensure my website is not hacked and listed as Malware in all browser, safari, google chrome, internet explorer, firefox, mobile interface and etc. Currently, the firefox browser and chrome browser is listed as Malware and also helps me to tighten the security so it will not be hacked again in future.
...will request a single one. If the quality is good others will be commissioned. Models will have to be low poly (3-4k max) and have 8 animations (Idle, walk, victory, defeat, attack, death, stunned and another one for a special move that will depend on gameplay). As the game is for mobile we will be most certainly be using an unlit material + baked AO
...their mouth, nose, eyes... then the caricature drawer exagerares that trait and makes it funny. Typically is done against politicians or celebrities, it is FUNNY, but is an attack. The success is in the similarity or resemblanse of the funny exageration of an identifiable person. It is necessary that the target person represented in the cartoon, be
...changes the name randomly on each order placing. SEO friendly DDos attack or hacking system. some pair as automatic exchange. More details can be discuss after the final. Please bid only that person. who have made already this type of exchange website. and if they can post their completed project link, will be batter to understand for me
...would very much appreciate any industry-based research I would like to provide an industry-level analysis which I can only prepare from independent research. Also, there was a report released claiming Amazon are possibly going to attack the pharmaceutical industry as they already have signed up a pharmacist to be their ‘entry’ point into the Australian
...features are in excel format. 4. Thus I have 2 separate excel files containing features extracted for a particular user and his attacker. 5. Attacker features may vary because attack could be performed by different individual. But Authorized user features will have some consistency as they are extracted for the same person each time. I will combine
Design new beginner friendly color coded 5e character sheets. Design an "Actions in Com...components should be color coded. for instance; on the "Actions in Combat" sheet, one of the options will be to make an attack. The text on the "Actions In Combat" sheet should be highlighted in the same color as the Weapons/Attack section on the character sheet.
The participants (we) are presented with a so called Capture the Flag (CTF), in the form of a simulated, virtualized network. Our job is to hack it! The participants don’t attack each other, their task is to hack and break the different challenges presented for them. There is no active defensive side. Instead your job is to penetrate into the (rather
The participants are presented with a so called Capture the Flag (CTF), in the form of a simulated, virtualized network. Your job is to hack it! The participants don’t attack each other, their task is to hack and break the different challenges presented for them. There is no active defensive side. Instead your job is to penetrate into the (rather passive)