The project is to write an article for publication in local newspapers in the area of ICT, IS or Computer Science. The proposed topic is: Using Mobile Telephony in Fog Computing for processing real-time crime data. Traditionally, the internet via broadband, cable or dsl has been the mode by which we process information. I am studying the prospects
We can offer diagnostic tests at extremely discounted prices for customers. But they can only be as medical camps. Hence we need business devel...can offer diagnostic tests at extremely discounted prices for customers. But they can only be as medical camps. Hence we need business development professionals who can plan and organize medical camps for us
Login required in to 3 systems as an exercise
...performing Security Incident Response and Forensics evaluation with SIEM Tools. A minimum of three (3) years of experience in conducting static code and dynamic application analysis using code analysis tools such as Fortify, AppScan, Veracode, SonarQube and penetration testing utilities Analyze and define security requirements for Multilev...
...following main threats: - Breaking into the database - Data leakage between customers or users - Unauthorized actions on the API The testing will need to be performed using the Black Box methodology to expose security weaknesses on the application level such as: SQL Injection XSS (Cross Site Scripting) CSRF (Cross Site Request XPATH Injection
...IT security consultancy were are offering services like penetration testing, social engineering, security assessments of various systems. The characters are ment to be printed on stickers and t-shirts and distributed as freebees at conferences and tradeshows to attract new employees and increase brand awareness of CSPi. We like your styl...
We need to get Penetration Testing done for our platform. It has two parts: a Web App and a Mobile App Web App is used by User Role A and Mobile App is used by User Role B. User Role A uses the Web App to send messages to User Role B, which B views through the Mobile App. The message transmission is one way. The messages have fields similar to
Somos una empresa de desarrollo de software que estamos finalizando el armado de un sitio web en tecnología .Net con SQL Server, y el cliente nos pide que un tercero realice un análisis de seguridad y vulnerabilidades del mismo para aprobar su instalación. Se esperan reportes de análisis con herramientas automaticas y sobre todo un ataque/análisis de vulnerabili...
...such as MySQL, MSSQL, Oracle, PostgreSQL, and particularity. 2, familiar with the infiltration test steps, methods, processes, proficiency in various penetration test tools. 3, have host, network or Web security penetration test related project implementation experience. 4, master the security hole discovery and utilization methods, have a certain amoun...
...is Siddhanth and i am an freelancer although i am planning on making new company related to cyber-security & Technology. In order to do so i am hiring an team who can spare their time to work with each other and earn more profit and some respect.I am stating the requirements below:- Requirements: [login to view URL] member must be living in mumbai and mu...
Hello, I have a simple Android App (.apk file) which needs to be penetration tested / scanned on vulnerabilities. Note that only running an automated vulnerability scan will not be considered as sufficient, since the report should at least contain a conclusion on the OWASP Mobile Top 10 ([login to view URL]), of
Content writers specifically with vast knowledge in the technology realm and penetration testing. The content should be fresh and should be free of grammatical errors. The writer should be up to date with recent news and updates about security. You will be required to write about 2-7 articles per week.
...Machine Learning and Artificial Intelligence. I will be PROVIDING YOU EACH WEEK WHAT TO WRITE WITH TITLE AND KEYWORDS. You should include all the appropriate keywords and not limited to my keywords only. I want the articles to be written from a technical perspective with data. BLOG WITHOUT DATA LIKE %, x OUT OF y, MARKET PENETRATION ETC. WILL NOT BE
...Machine Learning and Artificial Intelligence. I will be PROVIDING YOU EACH WEEK WHAT TO WRITE WITH TITLE AND KEYWORDS. You should include all the appropriate keywords and not limited to my keywords only. I want the blogs to be written from a technical perspective with data. BLOG WITHOUT DATA LIKE %, x OUT OF y, MARKET PENETRATION ETC. WILL NOT BE
Big-money hire: [web penetration tester] senior programmer white hat 1. Master one or more mainstream database structures such as MySQL, MSSQL, Oracle and PostgreSQL, as well as their particularities. 2. Familiar with the steps, methods and procedures of penetration testing, and familiar with various penetration testing tools. 3. Have experie...
...INDONESIA My company assist customers in identifying and managing cyber security risks. Our services are security assessment; including penetration testing, vulnerability assessment and security testing for compliance, intrusion analysis, incident response and digital forensics. (IT Security Company) note : - send to...
I want the following testing done to my web application. Penetration testing Load testing Performance testing Security testing for 4 user profiles Integration testing with Paypal, Stripe URL to the web app and username/password will be available on request
...size, market penetration and viability of Aquaponics in the UK. The following possibilities should be part of the conclusions of the report: 1) Incumbent Aquaponics market size and players - is this a fragmented industry or consolidated? If fragmented, is consolidation an option? Is Private Equity active in this segment, is so who and how? What is the
Hello, I am looking for people w...looking for people with extensive knowledge in networking,cyber security,web security,computer security,vulnerability analysis,penetration testing. White,grey,black hats everyone is [login to view URL] is ongoing and i require people with whom i can have long term commitments,so bid wisely and no spam please...
We have a website to conduct a penetration testing as we found recently a basic vulnerability already solved. If you have know-how on this type of projects, please let us know. We need a 1st round with of tests with a detailed report so that our developing team can solve all issues and a 2nd round of tests to confirm that all is ok. The website is
...Learn Hacking With Raspberry Pi From Scratch Course subject This course is about using the Raspberry Pi for Penetration Testing, now in the course i have covered using it to hack Wi-Fi network and also using it to hack Windows and Linux OS's, Course description please check this link to see the content of the course: [login to view URL]
We need some help setting up and configuring SNORT for a client who is having an internal penetration test being done on May 30th. We are hoping to have SNORT detect the activity. After the test we would like to continue to run it as an IDS.
Please, continue reading only if you have experience in development of SIRI (SIRI-Kit) and are proven developer for Object C. Furthermore we expect understanding of container-based apps like Cordova is compiling. Please, do not place any offer without ALL of that skills because we will ignore it! Introduction Prosper Intelligence has developed its
...ranking in Google (1st page), which is the search engine with more penetration in my region (LATAM). It is an small store with few products (men clothing), so I want to be ranked specificaly for my country, there is not a lot of competence. All the content is in spahish. Kw research and competitor analysis are a plus. It is desirable if the freelancer
We need an experienced fella in the Field of Technical Sales for the co...Field of Technical Sales for the company CYAGENCY. CYAGENCY is a startup of Vulnerability Assessment and Penetration Testing (VAPT) or in simple terms , finding and reporting bugs to the companies. We need an experienced person to approach clients and make strategies with us.
I need a penetration tester for my small site quite fast!
- first design high penetration of pv and connect it with main grid (at least 1 mw to see the effect ) - investigate the impact of pv in the system( the impact of PV in the voltage and harmonics of the system, we have to see the impact of PV on the system for the voltage will be out of the standard some time when we vary the radiation ( out of standard
...improve the performance and profitability of the company. As the marketing executive , you are directed to translate this vision of the top management . You perceived that this vision can be attained through possible growth opportunists like new product development(NPD) , product innovation (Penetration) , new market creation , and diversification.
...clients with better service and raise our guarantees, we are looking to bring a security specialist to our team. More precisely, we are looking for an ethical hacker, with certiﬁcations or extensive hands on equivalent experience. If you are interested, get in touch with us to know more details profile: Ethical hacker Security Specialist Bug bounty
we need an ssh server for a website, you will preform penetration testing on the server and report the vulnerabilities to us documented and with screen shots and even videos , also you have to fix those vulnerabilities , it does not have to be very hard just a few threats like 10 and thats all
Create any simple projects (example: penetration testing) that runs on three virtual machines and document the project (video) from the first to the final step.
We’re a small team looking for a security automation specialist to work closely with us to help build out our security automation processes. You will have a great deal of influence on the direction of the project whilst working in collaboration directly with the production team. We would like to have the project completed by the end of May 2018.
Hi, I am looking for Mentor at-least 6-12 months duration to guide me for the following skills : Core Java Selenium Webd...guide me for the following skills : Core Java Selenium Webdriver - Framework Appium - Android/iOS Jmeter - Automation Web Service Automation for SOAP and REST Protractor Penetration Testing CI Tools - Jenkins Python
...perform the required responsibilities and activities of direct sales in the United States market and possibly other related countries. GGateway is the first Information Technology (ICT) social enterprise in the Gaza Strip-Palestine; started as initiative in 2012 inside United Nation for Relief and Work Agency (UNRWA), and spinned off as an independent non-profit
...Work as penetration testers with 2.5 years of experience. - currently work at pentesting companies, cybersecurity companies, infosec auditing, computer intelligence, vulnerability research, malware research. Note: we are aiming for people who work in technical positions, not administrative. - people who studied computer engineering, computer science