...shall allow Paula Reyes (owner/site admin) to limit the number of devices (cellphone, tablet, computer, etc.) allowed per account. This custom code shall: 1. restrict the number of devices associated with each membership. 2. allow the member to manage (add or remove) specific devices from their membership 3. Allow Owner/site admin to review the device history
Want to develop a piece of software that clients can pay for access to operate via web browser or mobile devices. Software would walk clients through all hazards, risk, vulnerability, and threat assessments. For Cyber and Physical Security. Clients would pay via credit card and would set up logins to use it. User management interface to close accounts
Name - 2 types of log dataset creation Description - Type -1 = Crawlers, bots, spiders or robots data Type -2 = Malicious users data using automated web vulnerability scanners i.e. (TypAcunetix/Netsparker/W3AF) Type-1 traffic - An external traffic that is open to the internet is needed. In detail, log files should contain crawling data collected
Please bid only...and generate a report for the same. namely heyi .. in how much can you provide a website that checks for these Website Fingerprinting version based vulnerability detection SQL injection Cross-site scripting Remote command execution Discover sensitive files Have a look at [login to view URL] . Need to build something like that.
More details will provide over the chat.
We want to implement the below security for sessions on our website. (Vb.net,ASP.net) User Session Recreation Vulnerability Regenerate session tokens after a period of time, after certain number of requests, prior to any significant transactions. Application should only issue session ID’s of newly generated sessions to users after they have successfully
...server has been hacked, and multiple sites affected. We need the entire server cleaned, the vulnerability identified and removed from the server and all the wordpress websites. All sites, are currently on ONE USERNAME on the Dreamhost Shared Server. We need each site to be to moved onto their own username accounts on the server to mitigate risk. Will pay
...settings only from the specified perimeter. 2. check the hardening and the permissions of the operating system user and the container environment (Linux SE) 3. use of a vulnerability scanner on the IP address of [login to view URL] 4. checking the malware detection (Watering Hole / HIDS) 5. segmentation of the application according to the DMZ scheme
...need you to develop an analytics platform/application using AWS stack - the platform must be highly integrable with other common technologies such as Cisco firewall and vulnerability management solutions such as Qualys and must be able to ingest logs from other cloud platform or enterprises using API. The platform must be highly restricted and secure
...cause to the website, its visitors and other customers until the cause of the issue has been identified and resolved How has this happened? Often this is caused by a vulnerability somewhere in your website's code which has allowed an attacker to inject malicious scripts into your website. Normally this is possible via exploitable vulnerabilities in
Customer reporting portal Purpose Present customer with vulnerability information about their infrastructure in a delicate and easy user web interface with options for exporting raw data and access governed by roles. Function Some examples of views that shall be available: Pie chart distributing vulnerabilities by severity, critical/high/medium
Want to develop a piece of software that clients can pay for access to operate via web browser or mobile devices. Software would walk clients through all hazards, risk, vulnerability, and threat assessments. Clients would pay via credit card and would set up logins to use it. User management interface to close accounts or block access needed Storage
... 1) To detect vulnerability by examining web log files 2) To develop methodology in R to detect and accurately distinguish normal user, crawlers (or bots, spiders or robots), and malicious users using automated web vulnerability scanners (TypAcunetix/Netsparker/W3AF) 3) Real-time detection 4) Other than SQLI and XSS vulnerability such as CSRF should
Hello, I have a Wordpress website which has been quarantined because its was compromised and 'hacks' due to vulnerability in the website software hosted on the account or a weak CMS password. Simply, I want to clean and secure it and back to live again and make sure that issue doesn't happen again in the future You'll work directly on the website
...traffic being sent to the target of the DoS attack (in this case, Google IP addresses were the targets of the DoS, and your EC2 Instances were remotely used to DoS them). The vulnerability is caused by allowing *Inbound Traffic* from anywhere in the world (0.0.0.0/0) to all ports (0 - 65535) in your security groups configuration (which are attached to your
Identify and explain the significance o...family Describe the risk and protective factors in the scenario Supported by research, discuss how the risk factors could impact on parenting capacity and increase the vulnerability of children to risk of harm Outline the concept of resilience, and how this could be supported for each family member Case study:
...Flask/Django that does the following: Definitions: Operator - the individual performing the actions on the site. userid/username(full name) - the staff member /object being handled by the site. 1) Requires an operator to log in before accessing the site. There will only be one username/password, and the credentials can be hard coded. 2) Once an operator
HI , i am building an app and i want to evaluate the security of the features based on...A V Comparatives report of how vulnerable my app will be in comparison to other known security phone apps i need to evaluate the score based on criteria of phone device vulnerability such as microphone access permission can be used for attack on phone for instance
The below are the errors my site have Critical Errors Canonical link check: Canonical link point on page with http status code: 0 Alternate link check: Alternate link point on page with http status code: 0 Alternate link check: Alternate link point on page with http status code: 301 Alternate link check: Alternate link point on page with http status
...spectrum of people, process and technology enabling them to proactively defend against advanced cyber attacks. Our Services Strategic Consulting SOC Services Audit, Vulnerability & Risk Management Penetration Testing, Red Team & Advanced Adversary Simulations Digital Forensics Investigations Expert Witness Services Industrial Control Systems
...the full spectrum of people, process and technology enabling them to proactively defend against advanced cyber attacks. Our Services Strategic Consulting SOC Services Vulnerability & Risk Management Penetration Testing, Red Team & Advanced Adversary Simulations Digital Forensics Investigations Industrial Control Systems Security Incident Response
...recipients who share the folder. *Script must remain secure. Basically a script or tool inside Google apps (GSuite) that does not expose it to any outside third party vulnerability, of course, but does the following: Allows us to enable/disable Google Drive folder/file change notifications. So if a file is created, added or changed in a particular
...txt or upload a Word/PDF/etc and send it to the third party system via API. PHP or other code must be built using bank-grade methodologies and pass Acunetix or similar vulnerability scan. This includes designing the main website, the user interface as well as the backend code. Basically, everything to make this a fully operational business. Programmer
...implementation of security concepts in the MS environment o Experience in the connection to HP SM and SIEM o Experience in the area of security of standard technologies and vulnerability elimination on web servers o Knowledge in MS Hyper-V/VM-Ware architecture/application, as well as Domain Controller, Exchange and Citrix o Conception and operation of
...Mainframe SRG and/or STIGs as updates are released, and report changes with the potential to have significant impact. • Analyze DoD and DISA directives and orders, and provide vulnerability reports • Review and validate the installation and configuration of cyber tools on UNISYS assets and report deficiencies. • Participate in A&A process activities, including
we need a website content will cover the below: IT Support: Business, Home Website desig...content will cover the below: IT Support: Business, Home Website design Cloud solution: Office 365, Microsoft Azure and Amazone aws Security: Penetration test, Forensic, Vulnerability assessment ERP solution: Accounting, invoicing, Purchase, Inventory, HR, POS
Hi We are looking for a long term contract (renewed annually based on quality of service) for 4 times an year VAPT penetration testing i..e. report every 3 months for our web application. Below are the quick details: - 12-15 dynamic pages - Web based custom developed application (Ngnix, Phython, MySql, Linux) • Single installation on a server if hosted on Cloud (It is 3 tier architecture We...
Hi Mudassar, good day!. I need your help for a project, it consists of a new Vulnerability Assessment of my website [login to view URL], which I changed its hosting provider. In addition to this I need a security analysis for 3 landing pages that are in the same hosting, one of them is built in Wordpress, but the other two are built in html (AMP) The landing
I want one win...which is able to scan URL and find vulnerabilities and generate report after penetration testing. I want it for black box security audit which will be able to categorized vulnerabilities from OWASP top 10, also it will able to update its vulnerability database from OWASP, For reference, you can check Acuntix web vulnerability scanner.
...these versions should be compared to the CVE database to see if there are any Critical or vulnerabilities with the version Output of this should be, if there is a Critical vulnerability, to the PCI-notification slack channel (channel needs to be created) Each month a new Jira ticket is automatically created with this task. I would like this task to be able
We are a s...and we are looking for a technical writer to provide content for the corporate documentation, mainly: - Description and Methodology of the services ( Penetration tests, vulnerability assessments, Wireless and Mobile app Assessment, etc) - Proposal documents and SOW. - Content for the corporate brochure . Knowledge of IT security services
...nosql, app engine), Google Earth Engine, Google Map, - Paypal for payments of storage hosting, capacity upgrades, renewals subscription - OWASP top 10 web application vulnerability scanning e.g. github - JSON for multi language website (initially just English and Spanish) - Developer is overall responsible for configuring Google Cloud Platform to
Hi Risky Pathak, I am Andrew. We worked together years ago with a C+ project ... I need a to combine a number of scripts i have to work together. This project is for me and my friends to have a private website that will have a number of IP tools, vulnerability Testing tools and more. Are you interested? IF SO_ lets talk a price. Thanks in advance.
...testing, vulnerability assessment, vulnerability scanning, server hardening, installing firewall etc. It is a wordpress/woocommerce site so likely to be vulnerable. This is for a site in testing stage. You will secure the whole website and prepare for the pentest. If all succeed you will give all possible support you can in terms of making the site safe
I already have a on page php code which is vulnerable and only uploads 1 image. I need 1) for it to upload up to three images 2) max files size limit and err message 3)...it to upload up to three images 2) max files size limit and err message 3) file type limit and err message 4) reCAPTCHA integration and verification of any other basic vulnerability
...vulnerabilities, and what is the causes and impact. is there a work around solution? you need to explain and write. It would be good if you can attach screenshot If you can find different kind of vulnerabilities from different vulnerabilities assessment tool. please help to write. because this is a bonus for me. **Do not Copy anything from the internet**
I have a vulnable prolog file that has structures. Create at least five queries from the feature lists and make sure the tables & sample data match...have a vulnable prolog file that has structures. Create at least five queries from the feature lists and make sure the tables & sample data match what the existing Prolog vulnerability database contains.
...issues coming to it while uploading it to playstore ... Read below issues or may be few more are there, you need to resolve them all. 1. Hostname verifier. 2. Security Vulnerability Issues. Check for other issues & send us back the working codes. 5 star guaranteed & we want you to get this done by tomorrow 1pm MAX... BID only when you can do it on
I have a site that was hacked with this exploit: [login to view URL] There's a wordpress, a magento, and a vbulletin site on this host. I just restored from a backup, and was hacked again. I restored from yet another backup, and want someone to go through and let me know if there
Vulnerability Assessment tool: Nessus Operating System: Debian 6(Squeeze) Scope of the Paper (Why you need to do this scan?)explain A world global leading energy sector...(Please help to write with your experience and creativity, base on vulnerability assessing the client) Summary of Finding We will be performing three type of vulnerabilities assessment