THIS IS A CHANGE TO THE NORMAL.... LOOKING FOR WEB DESIGNER WHO CAN DESIGN STRAIGHT INTO DIVI Looking for a web designer who can create b...LOOKING FOR WEB DESIGNER WHO CAN DESIGN STRAIGHT INTO DIVI Looking for a web designer who can create beautiful web page mockups, but instead of using photoshop, build them in directly into wordpress plugin DIVI
There is a requirement of main 4 web attacks' entries generation in web server log file. 150 different IP addresses should be used for this purpose. Ready made downloaded website, web server will be provided. Budget - 40 USD
Space class The game requires a Space class, which repres...Space Each representing a different type of space, and need to have a special action for the player to interact with. It can be opening the door to another space, or maybe attack the monster, or turn on the light switch, or sing a song to please the king. The game must have at least 6 space
We're looking for a long term Adwords and remarketing expert. We're looking for the right partner long term. To be SUCESSFUL we would love: * Keywords *Action plan *Plan of attack - How can we get people to sign up to our website? [login to view URL] [login to view URL] - Learn more About Our Website/Service [login to view URL]
I require a Fluent analysis of the model, mainly Aerodynamic analysis at 3 different speeds of 6 m/s, 10 m/s and 14 m/s for angle of attack of 0,3,6,9,12 and 15 degrees for each speed. Its pretty straightforward and all you will have to do is change the values I presume.
...net/tg-new-site we need the following: 1) The design (front-end) must be 100% responsive, improve the current UX 2) Convert the code and use Laravel 3) Invoke our API REST (json) to make the site dynamic, we already have the services built 4) The site must have webpage caching (cache 1 day) and a url to clean the cache of the entire site 5) maximum
...1 - Horried crocodile: It will jump and fly over the screen and through fire shoots over player. 2 - Honey Bee will fly on the screen with a strong sound of bizzzzz and attack with its stink player has to escape from its range or can kill by throwing hammers on it. 3 - Rolling Cat: Cat will roll like a ball and hit the player he has to jump over
Hi, I need 1 artist UI game for game 2D. Requirement 1. Main UI - Joystick - HP/ ...Requirement 1. Main UI - Joystick - HP/ MP - Popup chat - Icon - Tile - Background 2. 2 Characers - Include animation (idle, run, fly, die) - Can change equipment. - Can attack (normal) - Can attack skill 3. 1 NPC - UI talking with NPC - Has a menu for choose option.
Please check my description BEFORE you apply. After a recent malware attack I have updated all my wordpress plug-ins. As a result one of the processes on website has became REALLY slow or hangs altogether. I need to get it working the way it was before. I don't know if it is caused be the plug-in updates or the malware. The website is wordpress
...need is a Manticor, a winged lion chimera with a scorpion tail. You can decide, whether it moves by flying or walking (it can fly, but its not necessary that it does). For the attack and combat art, you can choose freely from paws, wing-talons (if any), bite and scorpion tail. A few impressions can be seen here: [login to view URL]
We do have 3 Servers where is ISPConfig installed. One Server is the Main Server who is managing the other servers....our server was attacked. in the log files we saw multiple attacks on the server and database. We also want the have blocked some hosts form outside Europe, so that they can't attack anymore. maybe the ISP config Database is also hacked
...KYOKO BAERTSOEN - known for her work with Lunascape and Hooverphonic (for full song, please PM us; lyrics below). The song is a dark triphop sound, think of moby / masstive attack / faithless but a bit darker and rougher to make it more edgier and real. Some examples of people we worked with in the past, where we exposed their work to our fans. - https://www
Hi Guys, I have about 20+ characters I will like to animate in Spine. [login to view URL] I will...[login to view URL] my characters are created similar to the artwork in the video I will need animations for each character - idle - walk - attack - hard attack My budget is $10 per character for 20 characters? Thanks
Hi everyone! My name's Tom and I'm looking forward to hiring someone to perform a research on Airbnb. I need to find as many host's phone as possible in a specific location (Japan). We also need to associate each of the leads you find to an Airbnb page. If the quality of the leads is good enough, we would be looking to perform the exact same research on 4 more locations all over J...
...to increase the risk of an electronic attack on the rail infrastructure, as it brings more systems under centralised control. Consequently, the railway industry and government identified a need to understand the security implications of the new technology. structured as follows: Introduction, Main threats, Attack scenarios, Countermeasures, Conclusion
...called "Save Your Nuts". We are looking for a 3D artist to the modelization for a Raccoon (cartoon style), with 4 textures and 6 animations (idle, run, horizontal attack, vertical attack, jump, dig). We provide art direction with character illustration and examples of others character already integrated into the game. Video and details of the game:
...to continue. This would not be a problem because I paid for it. However, the check fails frequently due to problems on the developer's system (I'm not sure, he is under ddos attack, his system it's simply not working well) and my users suffer a lot from this issue. I need two things: 1) Remove the obfuscation 2) Remove the queries to the developer's
Hi Farid, next creature i need is a scarab, a co...ers:fixed_height(100,100):origin()/pre00/cd89/th/pre/i/2007/273/8/3/[login to view URL] Again with four animations: - Move - Idle - Attack - Combat Art (a defensive one, not an attack) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian
...for us and created the system, and threated to sabotarge it. So we assume the hacker knows the complete source code of the server. Probably some kind of code/SQL injection attack. I've resetted the hosting account password and cPannel/FTP password since we took the server back several months ago. So only me and another Freelancer who is making an alternative
This is for a cyber exercise scenario. I wanted to have a scenario where a malicious hacker is able to alter the applications program of payment system to cause dis...masked out and non-identifiable. There must be end to end steps description how this can be done, including what are the processes and what parameters to be set to enable such attack.
...Foxes will keep dropping from the Helicopters, and your job is to shoot them before they get you. The massive game play trailer opens with a gag as the foxes preparing for the attack while the bunnies are taking positions on the ground. The intro part requires a bit more serious read, imagine that you are doing a low-key sport broadcast on radio. The rest
...takes a URL as an input and then checks the other site for security vulnerabilities. And gives the output as a result which contains all the flaws the input URL site has and possible ways to improve it. It would be preferred if the built site could later be integrated into an android app. The site which you have to build needs to check if following
...network from the HQ site. 2. Implement a SOC at the HQ site for all locations. 3. The ability to restrict employees from specific internet sites and types of traffic. 4. Select a more secure method of cross site communication. 5. Design wireless networks to be secure as possible. 6. Design security so they can monitor any attack. 7. Insure outside traffic
...FEMALE for casting (superhero and enemy roles). You have to be liberal, creative, open minded and cooperative. The acting will be for a cinematic movie talking about aliens who attack earth and the rise of superhero. The story, storyboard, technical info will be provided later. The procedure is as following: 1- You bid 2- We discuss details on freelancer
three questions 1. Question 1; Choose one case of the following and what would you do? (3 points) 2. Question 2; Apply ethics ...points) 2. Question 2; Apply ethics in IT Professional environments? (3 points) 3. Question 3; Mention some cases of cyber attacks in kingdom of saudi arabia and anti-cyber attack law in kingdom of saudi arabia? (4 points
We are looking for the scrip that takes our website users directly to the cart from a collections page. The checkout process is skipped and the user is take directly to the cart where they can provide their payment method.
...DPM and APM numeric value). Basically some math will need to be done to get these values based on the following. if the weight is 1, he can attack 10 times per minute. for each extra weight, he can attack one time fewer as shown in the following (defense works with similar formula): Weight = 1, 10 attacks per minute. Weight = 2, 9 attacks per minute
...the result of what is known as a reflection / amplification denial of service (DoS) attack. What this means is that certain ports (in this case, UDP Port 111) can be made to respond to a malicious request, with a lot of traffic being sent to the target of the DoS attack (in this case, Google IP addresses were the targets of the DoS, and your EC2 Instances
Hi Farid, next creature i need is...com/originals/54/ab/49/[login to view URL] [login to view URL] Again with four animations: - Move - Idle - Attack - Combat Art (be creative ;) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian
...animations and simple gun, bat or knife particle type cut or gun shot shown on eitehr you as your hit or the computer. 5.) You or the Computer draw a weapon card, that has an attack attribute. Either a Knife, a Bat, a Hand Gun, or a Machine Gun. This is the weapon card you have the duration of that game instance. 6.) Knife can cause 5 damage points, bat
Looking for a professional penetration tester to test my server in order to determine if it's vulnerable to any attack
...will choose between male or female character, just one of each to start. You will have a base health, base intellgence, base attack and defense. Weapon and defense cards are pulled during the game to be able to help with attack and help with defense. 8. You fight to win a street corner. You fight to won both corners and therefore own the street. 9.
...normal flow or anormal flow I mean there is attack or non attack network flow. This dataset is really huge so I have small part of this dataset and you can work on it . you can see attached this dataset.(Excel format). My expectation is that createing a neral network classifier to decide whether there is attack or not. I am not looking perfect classifier
My website https://www.ortope...about 40 seconds to load and it is due to some PHP process that is running on background and to few malware identified by [login to view URL] and some other scans. The work is about cleaning this website (hosted on an economy shared-hosting on [login to view URL] and with Cloudflare) and to secure it to avoid any other attack. Thank you
Similar to [login to view URL], but in Arabic and a simpler version of the site. Basically, people should be able to post articles (requires approval) under their own name (author name and bio). Others should be able to comment, like, share and give a star rating to the article. This is an ARABIC blog for ARABIC writers. So, everything should be in ARABIC.
...specialise in antivirus and ransomware protection for businesses, offering state of the art monitoring and fortification solutions to suit your budget. WannaCry ransomware attack was one of the biggest and well know that’s why our name is going to be Wannasmile I want the logo to be sharp and edgy maybe with a smile of sort incorporated in the logo
I need an application with php page where i can send push alerts to our guild members. The reason of this project is because we need it for a guild in an android game, where if you are not using the phone, you can be attacked and your troops killed. so as guild we need an alert application easy to use to our members, basically we need three alerts