Fixing cross site scripting attack php jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    14,262 fixing cross site scripting attack php jobs found, pricing in USD

    ...brochure here [login to view URL] - Old website can be viewed here: [login to view URL] (content only, old design and plugins was lost/reset in a recent malware attack) - Deliver a professionally presented responsive WordPress site that must have consistent look for desktop and mobile devices. - Must use Evolve Plus WordPress

    $459 (Avg Bid)
    $459 Avg Bid
    19 bids

    ...with a Japanese style nothing very explicit but even a nude. The breakdown is as follows Art of a full body character in 4 situations: idle costumes idle nude attack costumes naked attack -Video title cover. I remain attentive to the consultations and budget proposals. It is for a project presentation therefore there is the possibility of a continuity

    $144 (Avg Bid)
    $144 Avg Bid
    20 bids
    Trophy icon Amai Cafe Banner Stand design x2 6 days left

    ...characters that I would like to be included in the two designs: 1- Naruto (Naruto) 2- Edward (Full Metal Alchemist) 3- Luffy (One Piece) 4- Midoriya (Hero Academia) 5- Mikasa (Attack on Titan) 6- Detective Conan 7- Gintoki (Gintama) 8- Saitama (One punch man) 9- Souma (Shokugeki no soma) 10- Goku (Dragon Ball) 11- Killua (Hunter X Hunter) 12- Kuoko (Kuroko

    $100 (Avg Bid)
    Guaranteed
    $100
    1 entries

    ...someone with direct experience in this setup will save me a lot of time. The primary requirement is vhosts and efficient memory usage for fast TTFB Requirements Centos7 NGIX PHP 7 PHP-FMP Setup for vhosts (support multiple websites, 1 IP address) vhost pub html path = /var/www/vhosts/[domainname]/httpdocs (easy transition from legacy servers) vhost logs

    $122 (Avg Bid)
    $122 Avg Bid
    14 bids

    I need an app for ios and android and a web site, all 3 need to have a single database that can be edited,

    $2408 (Avg Bid)
    $2408 Avg Bid
    116 bids
    Work c++./ 5 days left
    VERIFIED

    ...round beside the human loses 1/2 a heart The GP: The GP has 2 actions and 2 health Search for a AC to steal all the art They move as rapidly as possible to the human AC Attack the AC Once within 2 squares of a human they attempt to Steal all the Art for themselves 2 squares away: 65% chance of stealing a piece of art. If they successfully steal

    $40 (Avg Bid)
    $40 Avg Bid
    7 bids

    Which are the features/keywords of these attacks in web server access log file. So that these features will prove that this attack has done. Budget - 30 USD

    $27 (Avg Bid)
    $27 Avg Bid
    6 bids

    Hi Darius J., I have tried to contact yuo on whatsapp and free...contact yuo on whatsapp and freelancer in relation to the Openrwt work you carried out. Please can you confirm f you have been paid? I have been off work due to a small heart attack. We would like to pay you anything owed plus an additional amunt for your incovneience. many thanks Ben

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    1 bids

    We need and IOS and Android social app. ReactNative, Firebase, Ruby

    $4007 (Avg Bid)
    NDA
    $4007 Avg Bid
    92 bids

    WE NEED YOU TO TAKE TWO PICTURES IN TWO POSES IN FORM FITTING CLOTHES AND THEIR BODY MEASUREMENTS FORM FITTING CLOTHES MEN TOP - FRENCHIE/VEST BOTTOM- ATHLETIC TIGHTS SUCH AS SWIMMING TRUNKS INSTRUCTIONAL VIDEO,SAMPLE GARMENT PHOTO IS ATTACHED BODY MEASUREMENTS REQUIRED CHEST- AROUND ARM HOLE (NIPPLE) SHOULDERS-FROM BACK NECK- AROUND ADAMS APPLE BELLY- ACROSS NAVEL WAIST- FROM WHERE PANT IS WOR...

    $81 (Avg Bid)
    $81 Avg Bid
    8 bids

    I need help in this project which need to implement Cross-Site Request Forgery (CSRF) Attack Lab (Web Application), i need doc that contains explanation and screenshots of the solutions and the code (everything should be mentioned in the doc file) deadline 3 days Note: I do not accept ready solution from the internet. Thank you

    $201 (Avg Bid)
    $201 Avg Bid
    5 bids

    ...Kindly i need help in this project which need to implement Cross-Site Request Forgery (CSRF) Attack Lab (Web Application), i need doc that contains explanation and screenshots of the solutions and the code (everything should be mentioned in the doc file) find the link below for (CSRF) Attack Lab [login to view URL]~wedu/seed/Labs_16.04/Web/Web_

    $50 (Avg Bid)
    $50 Avg Bid
    1 bids

    I am looking for someone to write a cross platform app (IOS & Android) like this with major expansions and modifications:

    $598 (Avg Bid)
    $598 Avg Bid
    14 bids

    ...each round beside the human loses 1/2 a heart The GP: The GP has 2 actions and 2 health Search for a AC to steal all the art They move as rapidly as possible to the human AC Attack the AC Once within 2 squares of a human they attempt to Steal all the Art for themselves 2 squares away: 65% chance of stealing a piece of art. If they successfully steal art

    $167 (Avg Bid)
    $167 Avg Bid
    10 bids

    Hi, we are looking for a livery design to make our time attack RX7 more recognizable and stand out at the track. my team phase 50 motorsports has recently partnered with yokohama tire and idemitsu. we would like a logo designed for phase 50 motorsports and that logo to be incorporated in the livery design. we are looking to have primary colors red,

    $100 (Avg Bid)
    Guaranteed
    $100
    127 entries

    I have a sound track for a short film. I need a few tweaks to it, including creating a different monster attack sound. Then need the music track i have for the short film mixed in. The short is 16 minutes long. Must be able to mix 5.1 surround sound. Will need a stereo mix as well. I have $50 to spend.

    $51 (Avg Bid)
    $51 Avg Bid
    9 bids

    Need a cross platform quiz application (NO UNDER VALUED TO QUOTES TO INITIATE DISCUSSION - I WILL BE INITIATING DISCUSSION ONLY TO SERIOUS PEOPLE WITH A GOOD PORTFOLIO) Background The admin side is done in php / mysql and we can just share the source-code. Whatever else needs to be prepared to connect to that should be done by you. This is a Bible

    $724 (Avg Bid)
    $724 Avg Bid
    8 bids
    Help in Bash Scripting 2 days left
    VERIFIED

    I have a bash script. I am stuck at a point in comparision. I need help to get this resolved.

    $24 (Avg Bid)
    $24 Avg Bid
    29 bids

    Need someone to help with some scripting issues on a wordpress site.

    $383 (Avg Bid)
    $383 Avg Bid
    75 bids

    ...finding from web server log file and writing an algorithm. Detail - The 3 web server log files will be provided to you. 1) Normal users log data 2) Robots log data 3) Malicious/Attack log data. You need to find out features of mentioned web attacks from web log file which will differentiate it from robot log data and from normal users' log data. Based upon

    $135 (Avg Bid)
    $135 Avg Bid
    3 bids

    The eight queens puzzle is a well-known problem proposed in 1848. It is a problem of placing eight queens in a chessboard such that no two queens can attack each other. That means no two queens can share the same row, column or diagonal. In the classic problem of eight queens puzzle, we are looking for all possible solutions. However, in this project

    $725 (Avg Bid)
    $725 Avg Bid
    3 bids

    * Ideal outcome 1) Complete to develop mobile app with core functions (Keep upgrading an app in the long term) 2) Test it for the real market ==> MUST be working ...any change/delay, tell us immediately) 4) High Quality Product (Quality is the most important) 5) Weekly checklist to make sure the right progress/pace 6) 30 days bug/issue fixing period

    $1916 (Avg Bid)
    $1916 Avg Bid
    86 bids
    Cryptography. woo and lam Pi 15 hours left
    VERIFIED

    I need you to write a report for something. I have a question and answer, I need you to check the answer as well as rewrite it so ...question and answer, I need you to check the answer as well as rewrite it so that it is more professional and makes sense. Woo and lam Pi is a attack which can be carried out and naming flaw is a flaw within the attack.

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    8 bids

    ...[login to view URL]'[login to view URL] Again with animations: - Move - Idle - Attack (beak or front paws/talons) - Combat Art (beak of talons, the other one ;) - As you kindly offered, i would be happy about a dying animation As discussed, bonus for the last

    $125 (Avg Bid)
    $125 Avg Bid
    1 bids
    ss7 attack Guide 14 hours left
    VERIFIED

    Im need perfect learn about Ss7 attack to call and sms

    $250 (Avg Bid)
    $250 Avg Bid
    2 bids
    C++ Program 8 hours left

    ...each round beside the human loses 1/2 a heart The GP: The GP has 2 actions and 2 health Search for a AC to steal all the art They move as rapidly as possible to the human AC Attack the AC Once within 2 squares of a human they attempt to Steal all the Art for themselves 2 squares away: 65% chance of stealing a piece of art. If they successfully steal art

    $36 (Avg Bid)
    $36 Avg Bid
    10 bids
    Maya Python Scripting 6 hours left
    VERIFIED

    You have to know Maya and Python, both of them From simple script lines to test skills, to more complex in the future

    $29 (Avg Bid)
    $29 Avg Bid
    3 bids

    Our Goals - We are looking for someone experienced in Python Scripting who can use utilise the Python scripting options available in our software applications to custom make scripts to do a number of currently manual based tasks. These include: The import/load/ingest of video media automatically from 'watch folders' Place video media on

    $54 / hr (Avg Bid)
    Local NDA
    $54 / hr Avg Bid
    26 bids

    Hi there, I am looking to hire a writer to write articles for my ... I am looking to hire a writer to write articles for my blog and write an e-book. My website and blog is [login to view URL] What would be your recommended plan of attack and budget moving forward? I have suggested a fixed price budget for an initial article. Can you write

    $73 (Avg Bid)
    $73 Avg Bid
    1 bids

    ...brochure here [login to view URL] - Old website can be viewed here: [login to view URL] (content only, old design and plugins was lost/reset in a recent malware attack) - Deliver a professionally presented responsive WordPress site that must have consistent look for desktop and mobile devices. - Must use Evolve Plus WordPress

    $375 (Avg Bid)
    $375 Avg Bid
    45 bids

    Challenges and Strategies Opportunities for Singapore firms doing business with other countries (excluding USA and east asian countries). Talk about Resources, Peoples, Cultures, Institutions. Using a national culture framework (such as Hofstede’s) describe and assess the principal dimensions of the chosen culture. Further details will be provided upon appectance, regarding on the format of ...

    $77 (Avg Bid)
    $77 Avg Bid
    67 bids

    I need you to develop some software for me. I would like this software to be developed for [login to view URL] scripting

    $28 (Avg Bid)
    $28 Avg Bid
    4 bids

    I want to install a tracking code and build a cross domain between my sites and my booking engine provider to follow up conversions from the beginning up to the end of the session.

    $528 (Avg Bid)
    $528 Avg Bid
    15 bids

    Hello, I need a hybrid app that must work for both Android and IOS environment. It must reside on Android marketplace as well as Apple store. Please share examples of your previous work to be considered.

    $2413 (Avg Bid)
    $2413 Avg Bid
    47 bids

    ...hand-on experience in PHP, PCI-DSS background, web-hosting, web-firewall IPS setting and configuration, web integration with bank account. Applying pre-testing for all website modules to ensure high level of security to eliminate any kind of cyber-attack such as sql-injection, XSS, CSRF, password dictionary attack or brute-force attack. Finally; for those

    $230 (Avg Bid)
    $230 Avg Bid
    84 bids

    ...they have a drop down list with the type of malware that they wish to launch (Trojan Horse, AdWare, DDoS, etc.) 3. They can then select the type of attack and then launch it 4. Upon selecting the attack, the backend will be responsible for launching the respective types of attacks with that category. Ex: If chosen "Trojan Horse", the backend coordinates

    $196 (Avg Bid)
    $196 Avg Bid
    4 bids

    ...Godinterest was originally launched on December 2, 2012, then discontinued and later recreated after the website was purchased in April 2014 by Dean Jones. The site was hit with a series of DDoS attack soon afterwards. Godinterest founder Dean Jones refers to himself as a media publisher, dad, Christian, designer, and project manager. On December 20, 2017

    $122 (Avg Bid)
    $122 Avg Bid
    26 bids

    I need someone to build a cross platform native app that will include the following features: -Custom keyboard available inside and outside the app -Text message interception / reading -Contacts integration -Data Syncing to Cloud Database(does not have to be real-time) -Push Notifications -State the phrase "Onibara" to show you've read the description

    $830 (Avg Bid)
    $830 Avg Bid
    22 bids

    I’m looking for a Developer who have coding and scripting experience with Python and Shell Scripting ( Bash Scripts, Python and R ) . Should be quick in writing codes.

    $19 (Avg Bid)
    $19 Avg Bid
    13 bids

    ...servers and it must be fixed correctly. I haven’t logged on to my server for long time so not sure what’s happening. It’s a voice chat site with active users so you must be very careful. Also there is another issue, site is on SSL certificate , it should forward to https on its own, it hasn’t been working all the times, when a first time user type the

    $49 (Avg Bid)
    $49 Avg Bid
    5 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    I need a windows application in C# that involves preventing ARP spoofing attack according to an algorithm that i will send to you (a flow chart) The idea depends on building a trusted ARP table at the server PC and then distributing that trusted ARP table among other clients. The clients PCs will start to enter static ARP entries to their ARP Cache

    $270 (Avg Bid)
    $270 Avg Bid
    6 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids