Ddos attacks jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    5,551 ddos attacks jobs found, pricing in USD

    Evaluation of different block cipher modes like ctr, cbc etc. under different attacks like cpa, cca and prove that how they are secure or insecure under different attacks. Generalized example is ctr mode is cpa secure, but we need the theoretical and mathematical proof. There would be approximately six to seven modes.

    $525 (Avg Bid)
    $525 Avg Bid
    7 bids
    DBT Journal App 5 days left

    ...Your Goals And Objectives (Y/N) -Interpersonal Effectiveness Skills: --Skill 9 DEARMAN: Describe, Express, Assert, Reinforce (Y/N) --Skill 10 DEARMAN: Broken Record, Ignore Attacks, Appear Confident, Negotiate (Y/N) --Skill 11 Relationship Effectiveness: Factors That Reduce Effectiveness (Y/N) --Skill 12 GIVE: Gentle, Interested, Validate, Easy Manner

    $639 (Avg Bid)
    $639 Avg Bid
    5 bids

    ...cornerstone and an accordion layout. This has worked well but the owner is happy to change to a different method if it works well. 7. The site has previously been open to DDoS attacks so needs to be secured from this, it currently is monitored by Sucuri. However, plugins etc can be installed that help in this area provided use of site is not impeded 8

    $1451 (Avg Bid)
    $1451 Avg Bid
    158 bids

    ...user's Crypto Currencies including a HOT AND COLD wallet system. • Referral Program • Android – iOS Apps and Update support • Security Aspects – CloudFlare – to mitigate DDoS attacks • Blog • Notification Ticker • Day and Light UI mode • Data Center Requirements and Deployment support. • It should be noted that...

    $7720 (Avg Bid)
    $7720 Avg Bid
    34 bids
    Java developers needed 2 days left
    VERIFIED

    SQLiGoT: Detecting SQL Injection Attacks using Graph of Tokens and SVM

    $196 (Avg Bid)
    $196 Avg Bid
    7 bids

    We have the web design (front-end) of our new page [login to view URL] we need the following: 1) The design (front-end) must be ...have webpage caching (cache 1 day) and a url to clean the cache of the entire site 5) maximum load time should be maximum of 5 seconds 6) You must have security to avoid DDOS attacks or some other attack.

    $200 (Avg Bid)
    $200 Avg Bid
    13 bids

    ...features – 1. 2 or 4 Level encryption for saving passwords ( Depend of server you are buying ) 2. Security feature to block Cross site scripting attacks 3. Security features to block SQL injection attacks 4. SEO for images 5. Future proof and Flexible development process Technology – PHP Timeline - 15 Days...

    $8 (Avg Bid)
    $8 Avg Bid
    1 bids

    ...features – 1. 2 or 4 Level encryption for saving passwords ( Depend of server you are buying ) 2. Security feature to block Cross site scripting attacks 3. Security features to block SQL injection attacks 4. SEO for images 5. Future proof and Flexible development process Technology – PHP Timeline - 15 to 20Days ...

    $369 (Avg Bid)
    $369 Avg Bid
    15 bids

    ...The Gurew product provides cyber security data to clients and helps prevent cyber attacks. Certain elements of the product could be highlighted in the design: a) It provides an "active defence", i.e. rather than just reporting cyber attacks, it can also stop attacks. b) It provides protection from inside AND outside the company's network. Usually,

    $111 (Avg Bid)
    $111 Avg Bid
    82 bids

    ...upgrade/update to Debian 8 but this was not helping. login to ISPConfig is not possible because mysql is not running. maybe our server was attacked. in the log files we saw multiple attacks on the server and database. We also want the have blocked some hosts form outside Europe, so that they can't attack anymore. maybe the ISP config Database is also hacked

    $134 (Avg Bid)
    $134 Avg Bid
    19 bids

    I need a Live project on IOT with AWS (IOT based Smart parking system using AWS ) or using the IOT to predict heart attacks and cancer .

    $70 (Avg Bid)
    $70 Avg Bid
    2 bids

    ...features – 1. 2 or 4 Level encryption for saving passwords ( Depend of server you are buying ) 2. Security feature to block Cross site scripting attacks 3. Security features to block SQL injection attacks 4. SEO for images 5. Future proof and Flexible development process Technology – PHP Timeline - 15 to 20Days ...

    $2970 (Avg Bid)
    $2970 Avg Bid
    13 bids

    We do have 3 Servers where is ISPConfig installed. One Server is the Main Server who is managing the other servers. The MySqL is not ...upgrade/update to Debian 8 but this was not helping. login to ISPConfig is not possible because mysql is not running. maybe our server was attacked. in the log files we saw multiple attacks on the server and database.

    $76 (Avg Bid)
    $76 Avg Bid
    4 bids

    The concept of my project is a virus created by men that overpowered them and attacks constructions, it "eats" the buildings and grows bigger and faster each day. Its organic form contrasts with the rectangular buildings. Whats required is a 3D organic model with more than two entities linked to each other with "webs" shapes and to the ground too (like

    $220 (Avg Bid)
    $220 Avg Bid
    9 bids

    Mitigation of Denial of service attacks on robot

    $22 (Avg Bid)
    $22 Avg Bid
    5 bids

    ...swallowing it, and moving to the next chunk. simplified chess: no pawns, no check, no checkmate, no stalemate play until you take the king. design legalMoves/3: attacks(r,f,P): pT := pieceType(r,f,P) /* if pT == 'b': // piece is a bishop return attacksBishop(r,f,P) else if pT == 'k': // piece is a knight return

    $10 (Avg Bid)
    $10 Avg Bid
    1 bids

    ...user to continue. This would not be a problem because I paid for it. However, the check fails frequently due to problems on the developer's system (I'm not sure, he is under ddos attack, his system it's simply not working well) and my users suffer a lot from this issue. I need two things: 1) Remove the obfuscation 2) Remove the queries to the developer's

    $110 (Avg Bid)
    $110 Avg Bid
    14 bids

    Hello, we have a network in Datacenter and our Router (Mikrotik RB2011UiAS) The cpu usage becoming sometimes 100% because of firewall service. We need an expert to config...(Mikrotik RB2011UiAS) The cpu usage becoming sometimes 100% because of firewall service. We need an expert to configure the router best performance and safest protect for attacks.

    $57 (Avg Bid)
    $57 Avg Bid
    4 bids

    ...work with people who has experience in CS GO websites, bots and Steam API. Main functionalities: - Login / Logout Steam Account ( All users will be added to the DataBase ) - DDOS Protection with CloudFlare. - English language by default. Let us the possibility to add other language by translating. - Possibility to ban some people by IP and Steam name

    $1013 (Avg Bid)
    $1013 Avg Bid
    24 bids

    ...work with people who has experience in CS GO websites, bots and Steam API. Main functionalities: - Login / Logout Steam Account ( All users will be added to the DataBase ) - DDOS Protection with CloudFlare. - English language by default. Let us the possibility to add other language by translating. - Possibility to ban some people by IP and Steam name

    $891 (Avg Bid)
    $891 Avg Bid
    23 bids

    ...the AdBlockers to hide the ads on the website. Content Protection Protect your website content from copying. Intelligent Pattern Recognition Detects Unknown and Zero-Day Attacks and Exploits. Ban System Block and redirect Visitors / Users (IP Addresses), Countries, IP Ranges, Operating Systems, Browsers, Internet Service Providers (ISP) and Referrers

    $198 (Avg Bid)
    $198 Avg Bid
    12 bids

    three questions 1. Question 1; Choose one case of the following and what would...case of the following and what would you do? (3 points) 2. Question 2; Apply ethics in IT Professional environments? (3 points) 3. Question 3; Mention some cases of cyber attacks in kingdom of saudi arabia and anti-cyber attack law in kingdom of saudi arabia? (4 points

    $65 (Avg Bid)
    $65 Avg Bid
    42 bids

    ...Will want references. Client requires me to obtain an NDA and Confidentiality Agreement. The web site must integrate with Hotjar. Will be adding themes for autobackup, DDOS prevention, webforms, video players, Youtube video. Will also want to add a Sucuri firewall. Already have web host and no desire to change. Web is hosted as a VPN on a

    $188 (Avg Bid)
    $188 Avg Bid
    35 bids

    ...slim or any api framework(micro or full framework) ReactJS/Node/Angular Query optimization/DB normalization API development experience good understanding of concepts like DDoS, sql injection and should know way to resolve such issues Javascript and CSS knowledge AWS understanding of instances, RDS, S3 bucket GIT(Bitbucket or any such repository)

    $837 (Avg Bid)
    $837 Avg Bid
    21 bids

    ...with similar formula): Weight = 1, 10 attacks per minute. Weight = 2, 9 attacks per minute. Weight = 3, 8 attacks per minute. Weight = 4, 7 attacks per minute. Weight = 5, 6 attacks per minute. Weight = 6, 5 attacks per minute. Weight = 7, 4 attacks per minute. Weight = 8, 3 attacks per minute. Weight = 9, 2 attacks per minute. Wei...

    $35 (Avg Bid)
    $35 Avg Bid
    24 bids

    ...only allow access to one exchange and one trading pair per bot and they store your API keys in their own database and servers which are susceptible to hacks and pump and dump attacks. Your API key protection and security is a high priority and WolfpackBOT is the only Trading Bot that gives you full control and security over your API keys. Wolvex is a new

    $80 (Avg Bid)
    $80 Avg Bid
    2 bids

    Hello, I want to have a bitcoin lottery site, I would like to have a login & register option on...always go directly to the winner minus 10% for me. The site will be run by a VPS provider & connected to an onion domain, the site should also be DDOS protected and well protected against hackers or other attacks. Can you do something like that for me?

    $29 / hr (Avg Bid)
    $29 / hr Avg Bid
    1 bids

    Hello, I want to have a bitcoin lottery site, I would like to have a login & register option on...always go directly to the winner minus 10% for me. The site will be run by a VPS provider & connected to an onion domain, the site should also be DDOS protected and well protected against hackers or other attacks. Can you do something like that for me?

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    1 bids

    Hello, I want to have a bitcoin lottery site, I would like to have a login & register option on...always go directly to the winner minus 10% for me. The site will be run by a VPS provider & connected to an onion domain, the site should also be DDOS protected and well protected against hackers or other attacks. Can you do something like that for me?

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    We are onlinebased team and we welcome highly motivated sellers to market our merchandise in [login to view URL], [login to view URL], [login to view URL] [login to view URL] business preposition applies to seller...don't ship from China, Japan or other exotic country. Please make sure to provide your ebay ID when contacting us - we simply need to avoid the enormous spam and phishing atta...

    $485 (Avg Bid)
    $485 Avg Bid
    15 bids

    I need you to write a research article on ddos attack on exchange server. it should be case study.

    $89 (Avg Bid)
    $89 Avg Bid
    34 bids

    Hi I am Kira, and i have some VPS host that i use to reshare tv cards services with those VPS but some compititors attacks my host and always the server go down I hope talk to you to see if you can help Thanks

    $160 (Avg Bid)
    $160 Avg Bid
    6 bids

    ...encryptions especially the quantum resistance encryption as layer such as [login to view URL] I need the most advanced ios system to make it unhackable and unbreakable from any type of larg attacks. This is the main point. We need it to be very different and no one at all even me or anyone can do anything even if he got access in the server. The app must NOT store any

    $7782 (Avg Bid)
    $7782 Avg Bid
    33 bids

    ...done mobile game development to be able to have a good idea of what needs to be completed here. Because its turn based, that means dice based rolls for engine that controls attacks and defense and how power, health, etc. is affected. THIS MUST be done in GoDot game engine and development, no other game engine and development tools. All sprite and art

    $1268 (Avg Bid)
    $1268 Avg Bid
    36 bids

    ...small rifles: grant invisibility for a short moment Avenger: shadow sword that is possessed by the spirit of a powerful samurai that can empower the user and aid him in attacks Moleclaw: Fistclaw weapon that allow the user to easily burrow underground to ambush attackers The Other Side: A pocket mirror that can summon monsters Phobia: A flask

    $70 (Avg Bid)
    Featured Guaranteed Sealed NDA
    $70
    115 entries

    I am looking for someone who can perform DDoS attack on my website so i can test security levels of my website. I will also expect you to teach me how to perform DDoS attack

    $143 (Avg Bid)
    $143 Avg Bid
    15 bids

    Hello, I'm looking to have a code block created to prevent xss injections on my site. I have a site that has forms an...I have a site that has forms and a searchbox the code block will also need to block URL injection also. I've looked into OWASP and was only able to prevent the searchbox attacks but couldn't get the URL to decode for URL injection

    $56 (Avg Bid)
    $56 Avg Bid
    6 bids

    Hi everyone, I'm...similar to Flappy Bird except that I'm a paratrooper and I just jumped off my warplane and into enemy territory. They are firing at me and I have to tilt the phone to dodge the attacks. The longer into the game the harder to dodge. Other than this, please keep everything else similar to Flappy Bird including the crappy graphics ;-)

    $555 (Avg Bid)
    $555 Avg Bid
    11 bids

    DDOS attack Monitoring, Analyses, Detection and Defence

    $110 (Avg Bid)
    $110 Avg Bid
    9 bids

    ...filled in. Security All parameters should be retrieved using the appropriate call to filter_input. All SQL queries should be prepared using parameters to avoid SQL Injection attacks. All exceptions and errors should be caught and handled gracefully. The user should never be exposed to a raw error or warning from the PHP interpreter....

    $17 (Avg Bid)
    $17 Avg Bid
    11 bids

    ...primary mission is to provide our clients with knowledge and expertise to defend their enterprises against advanced cyber attacks. Our capabilities and methodologies are based on over a decade of defending enterprises against targeted attacks and sophisticated threat actors. For over a decade, our team has helped clients evolve their capabilities across the

    $40 (Avg Bid)
    Urgent Guaranteed
    $40
    53 entries

    ...primary mission is to provide our clients with knowledge and expertise to defend their enterprises against advanced cyber attacks. Our capabilities and methodologies are based on over a decade of defending enterprises against targeted attacks and sophisticated threat actors. For over a decade, our team has helped clients evolve their capabilities across the

    $60 (Avg Bid)
    Urgent Guaranteed
    $60
    232 entries

    ...CTS response message which we derive the true global MAC address of that device. Instead of a localization attack, we are using RTS/CTS exchanges to perform derandomization attacks". In essence we would get a CSV file with the following data of the device present in the area: date and time in microseconds of probe request reception, MAC addresses received

    $1422 (Avg Bid)
    $1422 Avg Bid
    7 bids

    ...you how to get the data for all the fields if you don’t know. Do not select channels with a bunch of different types of videos. For example, if the topic is "wild animal attacks", a channel that has videos of car crashes, gaming videos, or other topics should not be included. Do not give more than 5 channels on a single topic. For example, if you you’ve

    $12 (Avg Bid)
    $12 Avg Bid
    11 bids

    ...provide recommendations on what should be done about the various incidents. 2. Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented. 3. Discuss the importance of user technology security education

    $57 (Avg Bid)
    $57 Avg Bid
    51 bids

    defense in depth and awareness from cyber attacks protecting national infrastructure

    $38 (Avg Bid)
    $38 Avg Bid
    44 bids

    ...publicly displayed. We focus on 100% transparency -Responsive Site, with a White-ish / Custom Theme (Creativity Encouraged!). -Some kind of protection against hackers and DDOS (CloudFlare?) -English and other languages -G2A Payment solution -Chat on every page (staff members can mute) -admin page -In the admin page. Must be able to see all activities

    $818 (Avg Bid)
    $818 Avg Bid
    28 bids

    ...order for you to adjust your quote the way you should. Our current website is in a pretty bad shape (the original version was developed in WordPress, but after a number of attacks that took place a while ago, all the customization+other features has gone). Therefore we re looking for a brand new website, preferably but not necessarily in wordpress, with

    $9 (Avg Bid)
    $9 Avg Bid
    1 bids

    ...networks which is infrastructure less and adaptive in nature. Vampire attacks is the type of resource depletion attacks in which a malicious node create and send the message with node. Vampire attacks choose the longest path and loss the battery power. We can reduce the vampire attacks with the help of clustering technique. Clustering is the process that

    $387 (Avg Bid)
    $387 Avg Bid
    1 bids

    Top ddos attacks Community Articles