File security jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    9,878 file security jobs found, pricing in USD

    ...override, path traversal, business logic, file download test, etc.), data validation class (SQL injection, cross station Scripting, code injection, URL jump, file upload test, etc.), system application vulnerabilities and other content testing and [login to view URL] are better of a black hat 2. Use the Business Security Assessment Tool to exploit vulnerabilities

    $33035 (Avg Bid)
    $33035 Avg Bid
    23 bids

    ...and visible on the screen prior to logging the student out. □   Multiple versions of the final exam will be used and different versions assigned randomly to students. Exam Security: □   The Exam becomes available only after student comples ALL modules. □ During test  Students cannot access the course content, videos and supplemental materials except

    $605 (Avg Bid)
    $605 Avg Bid
    23 bids

    ...email client, file sharing and calendar among other nextcloud services. This is mostly for learning purposes as a personal hobby and there won't be any critical data or information at risk. I will set up a clean installation of Opensuse leap 15 with ssh enabled and teamviewer for us. also experience doing the project with proper security procedures implemented

    $151 (Avg Bid)
    $151 Avg Bid
    12 bids

    Required a hardening script for RHEL v7 and ubuntu 16.04 to fulfill CIS benchmark requirements. Please...24 hours. URGENT This should include auditing script that should check compliance with latest CIS standards and include top aspects regarding security and all this results should store in a single file... Documentation should also be included

    $126 (Avg Bid)
    $126 Avg Bid
    5 bids
    DRUPAL Support 3 days left

    Nee...Sites. Occasional updates, security patches and troubleshooting. Right now I am experiencing an issue on one particular site that needs to be fixed: [login to view URL] Please see error messages on home page and let me know the cost and time required to fix this issue. I will keep your info on file for future assignments.

    $30 (Avg Bid)
    $30 Avg Bid
    3 bids

    Hello Freelancers! This project requires a critical analysis of an existing system and risk management to improve security practices. You can find full description within ATTACHED doc file. This projects' deadline is 20 August. Also documentation is needed so I would prefer an english fluent proffesional for this one. Kindly review and let me know

    $27 (Avg Bid)
    $27 Avg Bid
    10 bids

    We need a logo for our new secure file transfer service. https://sft.mbmltd.co.uk. It needs to depict security, data, movement, global reach, ease-of-use, etc. We’d like it to pick-up on the yellow colour used on our site and, ideally, be square.

    $114 (Avg Bid)
    Featured Guaranteed
    $114
    172 entries

    We use ...professional PHP security auditor who has worked with FCKEditor ver 2.6.4.1 or later. we had several incident in the past with FCKEditor and we need to know to what extent can this version be used. we expect from you to demonstrate to us how vulnrable is FCKeditor 2.6.4.1 and if uploading a php file can be done despite our security configs.

    $18 (Avg Bid)
    $18 Avg Bid
    3 bids

    ...Surfing company, Spy company, Security company Keywords: Trace, Wind, Beach, Surfing, Surf, Beach, Vacation, spying, security, decryption Domain: [login to view URL] Possible Business uses: A solution provider, consulting company, Math Coaching company, Security company Keywords: Swift, solve, fast, solution, consulting, math, security, decryption Domain: TeamOrgan...

    $114 (Avg Bid)
    $114 Avg Bid
    26 bids

    ...consultation on security and provide recommendations. Using Microsoft® Word, write a 1-page document explaining how the username and password are extracted from the password file. Describe what would happen if the script fails to open the password file. Recommend and provide additional code that would better handle cases where the password file might not

    $25 (Avg Bid)
    $25 Avg Bid
    4 bids
    bruteLogin Recommendations 1 day left
    VERIFIED

    ...Penetration Testers and Security Engineers. You have been hired by a company to provide consultation on security and provide recommendations. Using Microsoft® Word, write a 1-page document explaining how the username and password are extracted from the password file. Describe what would happen if the script fails to open the password file. Recommend and provide

    $133 (Avg Bid)
    $133 Avg Bid
    1 bids

    Hi Jaroslav N., You have previously worked on a project with me to fix a prestashop cart problem. I woul...[PrestaShop] Fatal error in module affinityitems: Class 'CategorySynchronize' not found and this Warning on line 1684 in file /home/lilyhipp/public_html/[login to view URL] [2] curl_exec() has been disabled for security reasons.

    $20 (Avg Bid)
    $20 Avg Bid
    1 bids

    ...BLOCKCHAIN RELATED JOB BEFORE PLEASE DO NOT BID. THIS JOB IS NOT FOR YOU. AND IF YOU DO NOT AGREE TO ALL THE FEATURES PLEASE DO BID. PROJECT TASKS: (See Full Details in the attached file) IMPORTANT: You must he NODE.JS Developer. We want to revamp our existing Cryptocurrency (ICO) website, optimize it and upgrade to the latest modern site and technology. There

    $674 (Avg Bid)
    NDA
    $674 Avg Bid
    14 bids

    ...screen recordings if possible. I would like to see the process from very beginning to end of setting up the email server, and nextcloud services including the email client, file sharing and calendar among other nextcloud services. This is mostly for learning purposes as a personal hobby and there won't be any critical data or information at risk. I

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    7 bids

    ...:( can you help me? Linux systems keep user account information in the passwd file and the encrypted password in the shadow file. The passwd file containing account information might look like this: smithj:x:1001:1001:John Smith:/home/smithj:/bin/bash The shadow file containing password and account expiration information for users might look like

    $60 (Avg Bid)
    $60 Avg Bid
    1 bids

    • Configure small local storage • Configure File and Share Access • DNS • DHCP • EXCHANGE • CENTRALISED BACKUP , CENTRALISED DATE SECURITY-- CENTRALISED SECURITY-------one location for all users account, gropus and computers. Eg paasword are the same for all PC • Syncronisation of 30 USER accounts . All user data held centrally. •

    $227 (Avg Bid)
    $227 Avg Bid
    30 bids

    ...must include the following features: One-Click Installers to install Mod Packs, and plugins for the games hosted on the panel, Google 2-Factor Authentication for security, a Custom File Manager with FTP Access, Sub Users for clients to create so they can give access to the panel to their friends whilst being able to configure the permissions these

    $8124 (Avg Bid)
    $8124 Avg Bid
    30 bids

    ...from them. So with the WSDL an client has to be generated which should be able to send commands to the API Server (using “OASIS Open” and “WSS” for security signing the message). We have a PFX file containing the public key and private key which are required for the signing process. When the API Client works, we will require you to build an extra

    $601 (Avg Bid)
    $601 Avg Bid
    17 bids