Linux attack server jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    6,588 linux attack server jobs found, pricing in USD

    ...normal flow or anormal flow I mean there is attack or non attack network flow. This dataset is really huge so I have small part of this dataset and you can work on it . you can see attached this dataset.(Excel format). My expectation is that createing a neral network classifier to decide whether there is attack or not. I am not looking perfect classifier

    $68 (Avg Bid)
    $68 Avg Bid
    12 bids
    Clean and secure WP website 6 days left
    VERIFIED

    My website [login to view URL] needs about 40 seconds to load and it is due to some PHP process that is running on background and to few malwar...net and some other scans. The work is about cleaning this website (hosted on an economy shared-hosting on [login to view URL] and with Cloudflare) and to secure it to avoid any other attack. Thank you

    $139 (Avg Bid)
    $139 Avg Bid
    57 bids
    Trophy icon Design a Logo 6 days left

    ...specialise in antivirus and ransomware protection for businesses, offering state of the art monitoring and fortification solutions to suit your budget. WannaCry ransomware attack was one of the biggest and well know that’s why our name is going to be Wannasmile I want the logo to be sharp and edgy maybe with a smile of sort incorporated in the logo

    $51 (Avg Bid)
    Guaranteed
    $51
    71 entries

    I need to help with implementing an Intrusion deduction for WSN using Cooja/ Contiki and also based on RPL protocol. This IDS should detect Sinkhole attack and contains central agents in the sink and distributed agents to monitor the network. the propose of this work is to evaluate this architecture. it is needed withen 2 months at most.

    $1000 (Avg Bid)
    $1000 Avg Bid
    1 bids

    I need help with implementing an Intrusion detection system that detects sinkhole attack in WSN using Cooja / Contiki. The IDS architecture contains centralised agent and distributed agents based on RPL protocol. The distributed agents assigned based on the specific algorithms. The purpose of this work is to evaluate the performance and efficiency

    $1200 (Avg Bid)
    $1200 Avg Bid
    1 bids
    Push Alert Android like alarm 3 days left
    VERIFIED

    ...three alerts, 1: General Alarm: that sounds when our entire guild are being attacked. 2: Shield Alarm: that sounds when the shield of an member ends and he are vulnerable 3: attack Alarm: that sounds when the guild member are being attacked, so he need to enter fastly to the game and put shield. the alarm sound need to be different and need to sound

    $199 (Avg Bid)
    $199 Avg Bid
    7 bids

    HI , i am building an app and i want to evaluate the security of the features based on A V Comparatives report of how vulnerable my app will be in...comparison to other known security phone apps i need to evaluate the score based on criteria of phone device vulnerability such as microphone access permission can be used for attack on phone for instance

    $137 (Avg Bid)
    $137 Avg Bid
    7 bids

    I need you to create me a vulner...to SQLi that can can edit, add, view the table. There should be an button where it shows the table of the database that can be penetrated. There should be a button with an attack scenario where the code for adding,deleting, editing the table. There's should be reset button where it resets it back to the beginning.

    $20 (Avg Bid)
    $20 Avg Bid
    3 bids

    ...opponent, formation used etc.). ~What time of the game the team has scored/conceded, the goal type (set-piece such as penalty, free-kick or corner, established play, counter attack or cross from left/right) - THE FILTERING OF THE STATS: For the player stats I'd like to filters such as competition, home/away/neutral, starter/substitute, time of day the

    $157 (Avg Bid)
    $157 Avg Bid
    9 bids

    ...each stage is contains 2 waves of enemies and in the final wave you face the boss. Each character will have a basic attack (sword, gun shot, or magic attack) and you will be able to fill up an energy bar then unleash a special attack. I play alot of mobile games and alot of them are boring since they are just collect random heroes and play a random

    $35 / hr (Avg Bid)
    $35 / hr Avg Bid
    9 bids

    DDOS attack Monitoring, Analyses, Detection and Defence

    $110 (Avg Bid)
    $110 Avg Bid
    10 bids
    SQL injection 1 day left
    VERIFIED

    Demonstrate a network or web application attack such as such as DNS poisoning, Session hijacking, Cross-site scripting, SQL injection or buffer overflow using DVWA or WebGoat.

    $22 (Avg Bid)
    $22 Avg Bid
    3 bids

    ...for a person who has the background of the control theory and engineering or applied mathematics with expertness in Network Control System with power system or smart grid ( attack, detection, prevention, and stability). I want to write an article. So I need your help to implement existing problems as well as mathematical calculation and MATLAB simulation

    $147 (Avg Bid)
    $147 Avg Bid
    7 bids

    ...opponent, formation used etc.). ~What time of the game the team has scored/conceded, the goal type (set-piece such as penalty, free-kick or corner, established play, counter attack or cross from left/right) ~I'd attach some screen shots from my excel sheets at the moment to give you a rough guidance of how I'd expect the sheet to sort of look like. But

    $134 (Avg Bid)
    $134 Avg Bid
    8 bids

    My website is under attack. From some days, it is continually deleted. Once I restore it and change admin and cpanel and ftp password, it is deleted anyway. I would someone delete this threat and change all the password, and help me to keep the website safe for the future, checking and fixing vulnerabilityes.

    $130 (Avg Bid)
    $130 Avg Bid
    42 bids

    We need to design low poly graphics for the game(in below link). You can see attached file for referance [login to view URL] Here is the layout of the game... 1. UI buttons and menus * Home Screen * GamePlay Screen * Challenge Screen * Setting Screen * Profile Screen 2. Backgrounds

    $124 (Avg Bid)
    $124 Avg Bid
    5 bids

    We would to develop a software in C/C++ for Linux/OpenWrt to capture probe requests received from WiFi for marketing purposes. Capturing "probe request" is simple by setting the WiFi interface in "monitor mode" and capture traffic via tcpdump. However, randomization of MAC addresses made by many Apple and Android operating systems, causes various problems

    $1422 (Avg Bid)
    $1422 Avg Bid
    7 bids

    I need someone who is great at working with machine learning algorithms to predict the next location and the time of terrorism attack

    $387 (Avg Bid)
    $387 Avg Bid
    19 bids

    C++ program - stop slowloris and other dos programs to attack it!

    $218 (Avg Bid)
    $218 Avg Bid
    9 bids

    Hi Farid, next creature i need is a sabr...jpg [login to view URL] Again with four animations: - Move - Idle - Attack - Combat Art (be creative ;) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian

    $127 (Avg Bid)
    $127 Avg Bid
    1 bids

    I have an existing system , I want to someone to clean up code Review existing code and Improve performance. My system is too slow. And also prvent Cross site scripting attack. This system is in Asp.Net MVC with C# and Mssql

    $4 / hr (Avg Bid)
    $4 / hr Avg Bid
    27 bids

    My website is under attack. From some days, it is continually deleted. Once I restore it and change admin and cpanel and ftp password, it is deleted anyway... furthermore on chrome it's appeared the message that my website is trying to load unverified script. I would someone delete this threat and change all the password, and help me to keep the website

    $129 (Avg Bid)
    $129 Avg Bid
    48 bids

    ...be done about the various incidents. 2. Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented. 3. Discuss the importance of user technology security education within organizations. What topics

    $57 (Avg Bid)
    $57 Avg Bid
    51 bids

    I have someone working for 3d and 2d, right now I need a designer to create a card with special effects to represents the spells of that character. The cards will have an attack power, hp, trait, description of the character, spell, and its ultimate move. The special effects will be required for the spell and ultimate move. If you can finish within

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    15 bids

    Using kali Linux and VM, need to do surface attack and vulnerability check. Must have good knowledge in kali Linus and other computer security related softwares.

    $98 (Avg Bid)
    $98 Avg Bid
    3 bids

    Need someone who understands servers, and prestashop.

    $128 (Avg Bid)
    $128 Avg Bid
    10 bids

    ...other creative uses; note that most organisations will have multiple use cases for their devices 4. Define your likely opponent(s): a. Typical Opponent Profiles b. Likely attack vector c. Mode of operations 5. Detail the policy itself, and explain your rationale. You may want to consider: a. Is BYOD Allowed? b. Physical Security c. Do you have

    $57 (Avg Bid)
    $57 Avg Bid
    12 bids

    Need a blog post around 750-1000 words on the Maersk cyber attack. If this one is written well, I will need another 5 blog posts. for reference: [login to view URL]

    $40 (Avg Bid)
    $40 Avg Bid
    35 bids

    Need Bot Expert to help alleviate bot attack, need somebody very knowledgeable to help

    $141 (Avg Bid)
    $141 Avg Bid
    5 bids

    ...opponent, formation used etc.). ~What time of the game the team has scored/conceded, the goal type (set-piece such as penalty, free-kick or corner, established play, counter attack or cross from left/right) ~I'd attach some screen shots from my excel sheets at the moment to give you a rough guidance of how I'd expect the sheet to sort of look like. But

    $119 (Avg Bid)
    $119 Avg Bid
    15 bids

    i need to install ddos protection and run firewall. please help me.

    $148 (Avg Bid)
    $148 Avg Bid
    30 bids

    ...make the connection with Laravel Forge [login to view URL] Here is the email Digital Ocean sent me: **** Hi there, We've detected an outgoing Denial of Service attack ([login to view URL]) originating from your Droplet. Specifically, we have detected inbound traffic exceeding 0.08 Mb/s and outbound traffic exceeding 676.75 Mb/s. Due to

    $128 (Avg Bid)
    $128 Avg Bid
    6 bids

    ...UI The gameplay UI will 4 tabs at the bottom: - Home: go back to main screen - Skill tree: choose talents for heroes when they level up - Upgrades: buy some upgrades like 2x attack damage, or immune damage - Shop: same shop screen The requirements might change ( added or reduced) with progress. Please only original work, I know there alot of cheap

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    12 bids

    ...Local file inclusion. Arbitrary file inclusion. Remote file inclusion. HTTPS. GENERAL CONSIDERATIONS Cross-site scripting. SQL injection. Path disclosure. Denial-of-service attack. Arbitrary code execution. Memory corruption. Cross-site request forgery. Data breach (information disclosure)....

    $5558 (Avg Bid)
    $5558 Avg Bid
    26 bids

    I need some one to setup Cloudflare account to stop cyber attack and ddos.

    $50 (Avg Bid)
    $50 Avg Bid
    4 bids

    ... 2018-10-02 we received an udp amplification attack from: x.x.x.x udp port 53 (dns) to: [login to view URL] This seems a udp dns amplification attack [1] originating from a misconfigured dns server which is exploited by spoofed packets coming to the server in your network. IMPORTANT: Maybe the traffic rate you can see

    $50 (Avg Bid)
    $50 Avg Bid
    22 bids

    An app connecting hospitals, enabling quick transfer of patiets with heart attack to hospitals with catheterization capabilities.

    $266 (Avg Bid)
    $266 Avg Bid
    14 bids

    EXPERTS Only Wikipedia experts ONLY!!! My Wikipedia page for my name what taken down we have all the sources and content to be accepted however I believe this was an attack. this happened about 6 months ago or longer. I'm looking for an EXPERT for will not waist time and GUARANTEE inclusion into Wikipedia. [REMOVED BY FREELANCER.COM ADMIN - PLEASE

    $422 (Avg Bid)
    $422 Avg Bid
    7 bids

    EXPERTS Only Wikipedia experts ONLY!!! My Wikipedia page for my name what taken down we have all the sources and content to be accepted however I believe this was an attack. this happened about 6 months ago or longer. I'm looking for an EXPERT for will not waist time and GUARANTEE inclusion into Wikipedia. I would also like to be able to communicate

    $474 (Avg Bid)
    $474 Avg Bid
    10 bids

    Looking for a person who has the background of the control theory and engineering with expertness in power system and smart grid security analysis ( attack, detection, prevention, and stability). I want to write articles with your new ideas, mathematical calculation and MATLAB simulation results. You must have the experience to publish articles on

    $212 (Avg Bid)
    $212 Avg Bid
    29 bids

    Hi everyone, I need a little research about DoS attack then prepare it in presentation power point, between 5 to 10 slides, what is Dos, how can protect... etc. the presentation should be between 5 to 10 minutes.

    $97 (Avg Bid)
    $97 Avg Bid
    41 bids

    ...measure the success of my designs. For my print work, I look at customer satisfaction, brand loyalty and overall cost savings.” I never take design criticism as a personal attack. I know clients want the best possible end result, so I actively listen and use the feedback as a way to not only iterate and perfect the design, but also to grow as a graphic

    $28 (Avg Bid)
    $28 Avg Bid
    4 bids

    I need a specialiste in servers protectio who is able to defend against DDOS attacks and Hackers attack on server's ports.

    $53 (Avg Bid)
    $53 Avg Bid
    4 bids

    Design some simple 2d stick figures with medieval theme and animate it to walk attack and cripple with no leg. I need a simple soldier with one handed sword, an archer with a robinhood hat and a bow with animation, a priest with a staff and animation of raising both hands for healing its allies, a knight with helmet and metal armor with double handed

    $114 (Avg Bid)
    $114 Avg Bid
    10 bids

    I would like the sketch to be of 2 armored men dueling, and one landing a powerful blow against the other. It should be inspired by Dungeons and Dragons or fantasy games in general so the weapons and armor should be unique and not resemble historical gaurd armor.

    $30 (Avg Bid)
    Guaranteed
    $30
    8 entries

    I have a character in unity with stock animations, idle run. I need some 3D animator to create 3 different attack animations for the main character of the game. More info once we hire.

    $164 (Avg Bid)
    $164 Avg Bid
    3 bids

    ...websites on a VM based server running Windows, Windows Server 2012 (64 bit) ColdFusion 11 PHP 7 MySQL 5 SmarterMail We URGENTLY need an expert in configuring and maintaining the security for our server. Top priority is analyzing and configuring our server to prevent and stop SYN Flood attacks. Our server has been under attack for the last 3 days

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    20 bids

    ...Each player will have a deck containing 40 cards - The first round each player will take 5 cards from its own deck - In the first round of the game, the player won't be to attack but only place a card. - The player can only place 1 card per turn and its a must. If the field is full of cards which are limited to 5, the player will be able to replace

    $123 (Avg Bid)
    $123 Avg Bid
    5 bids

    I am looking for an image showing ember attack on a home, how embers travel and fly onto the roofs of homes.

    $45 (Avg Bid)
    $45 Avg Bid
    5 bids