Can server attack jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    5,921 can server attack jobs found, pricing in USD

    ...makes it easy to publish articles on a daily basis. The process to publish new news articles will need to be fully documented so that someone with basic computer knowledge can post an article. The article pages should follow the sire theme and be able to display text as well as pictures, charts and tables. The page should have a static pane/frame

    $921 (Avg Bid)
    $921 Avg Bid
    5 bids

    ...smart watch to detect body vitals like: heart rate, ECG monitoring, blood pressure, blood glucose and blood oxygen. The app will monitor the user vital signs such as heart attack, cardiac arrest, (high - low) blood pressure, (high –low) blood glucose or low level of blood oxygen. Also the system detect location of the users . The system have 2 users

    $260 (Avg Bid)
    $260 Avg Bid
    11 bids

    ...loan. We are in need or a experienced marketer and brander that can make print material and online ads. We were given a huge grant from the USDA and have money to spend on ads and marketing and want someone experienced to guide us. We want someone who can create a plan of attack so every each year we have marketing channels to get people interested

    $91 / hr (Avg Bid)
    $91 / hr Avg Bid
    11 bids

    ...a monthly retainer basis. I already have the server running and your first job would be to secure it / put in place everything required to prevent BRUTEFORCE attack of my SIP, SSH and other usual attacks on those type of servers. Once this is done, I will pay you monthly to do maintenance on my server and from time to time a few adjustments. I

    $216 (Avg Bid)
    $216 Avg Bid
    7 bids
    website issue 4 days left

    Hi, My website is in Joomla and on of the sudden due to the malware attack my complete site is now down. I need a technical person who can fix the issue. It's bit urgent. For more details please reach me through the mail.

    $27 (Avg Bid)
    $27 Avg Bid
    11 bids
    Linux VM box Compromising 4 days left
    VERIFIED

    Very small project (Linux expert can do within 2-3 hours) Need to compromise the vm linux box and attain root level privileges. Additionally there are five flags, these flags are represented as values and are awarded at each point of system compromise. Look for them in home directories, web pages etc. Tips are given to gain 5 flags. Just need some one

    $94 (Avg Bid)
    $94 Avg Bid
    1 bids

    You are to write a report outlining each test / attack run against the system and the result. You must follow a process, which should be defined prior to the commencement of testing. Your report should include the flags as well as any credentials you uncover as part of your hacking endeavours

    $112 (Avg Bid)
    $112 Avg Bid
    39 bids

    Describe at least 5 different tools or sites used during footprinting. What information can be found by each tool or site? How can the company protect itself from this information being available?

    $4 / hr (Avg Bid)
    $4 / hr Avg Bid
    2 bids

    ...conclusion of my PhD thesis, which I should receive today, maybe tomorrow, not later than Monday (I will have a heart attack if I do not get it by Monday). I just need it to be proofread, maybe to make a few small changes in text, so it can be more "readable". As my supervisor is American, and she has already improved it before, and I expect her to send

    $42 (Avg Bid)
    $42 Avg Bid
    64 bids

    I need someone to help me to ensure my website is not hacked and listed as Malware in all browser, safari, google chrome, internet explorer, firefox, mobile interface and etc. Currently, the firefox browser and chrome browser is listed as Malware and also helps me to tighten the security so it will not be hacked again in future.

    $26 (Avg Bid)
    $26 Avg Bid
    35 bids

    ...will request a single one. If the quality is good others will be commissioned. Models will have to be low poly (3-4k max) and have 8 animations (Idle, walk, victory, defeat, attack, death, stunned and another one for a special move that will depend on gameplay). As the game is for mobile we will be most certainly be using an unlit material + baked AO

    $223 (Avg Bid)
    $223 Avg Bid
    49 bids
    Design project -- 2 Ending left
    VERIFIED

    ...their mouth, nose, eyes... then the caricature drawer exagerares that trait and makes it funny. Typically is done against politicians or celebrities, it is FUNNY, but is an attack. The success is in the similarity or resemblanse of the funny exageration of an identifiable person. It is necessary that the target person represented in the cartoon, be

    $30 (Avg Bid)
    $30 Avg Bid
    19 bids

    ...changes the name randomly on each order placing. SEO friendly DDos attack or hacking system. some pair as automatic exchange. More details can be discuss after the final. Please bid only that person. who have made already this type of exchange website. and if they can post their completed project link, will be batter to understand for me

    $1169 (Avg Bid)
    $1169 Avg Bid
    15 bids

    ...would very much appreciate any industry-based research I would like to provide an industry-level analysis which I can only prepare from independent research. Also, there was a report released claiming Amazon are possibly going to attack the pharmaceutical industry as they already have signed up a pharmacist to be their ‘entry’ point into the Australian

    $88 (Avg Bid)
    $88 Avg Bid
    34 bids

    ...features are in excel format. 4. Thus I have 2 separate excel files containing features extracted for a particular user and his attacker. 5. Attacker features may vary because attack could be performed by different individual. But Authorized user features will have some consistency as they are extracted for the same person each time. I will combine

    $38 (Avg Bid)
    $38 Avg Bid
    3 bids

    Design new beginner friendly color coded 5e character sheets. Design an "Actions in Com...components should be color coded. for instance; on the "Actions in Combat" sheet, one of the options will be to make an attack. The text on the "Actions In Combat" sheet should be highlighted in the same color as the Weapons/Attack section on the character sheet.

    $40 (Avg Bid)
    $40 Avg Bid
    3 bids

    The participants (we) are presented with a so called Capture the Flag (CTF), in the form of a simulated, virtualized network. Our job is to hack it! The participants don’t attack each other, their task is to hack and break the different challenges presented for them. There is no active defensive side. Instead your job is to penetrate into the (rather

    $185 (Avg Bid)
    $185 Avg Bid
    11 bids

    The participants are presented with a so called Capture the Flag (CTF), in the form of a simulated, virtualized network. Your job is to hack it! The participants don’t attack each other, their task is to hack and break the different challenges presented for them. There is no active defensive side. Instead your job is to penetrate into the (rather passive)

    $20 (Avg Bid)
    $20 Avg Bid
    3 bids