Online text based games exploits jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    1,119 online text based games exploits jobs found, pricing in USD

    Write a report of 7000 words (+ 10% max). This report will reflect on experiences gained throughout the MA. This report will be a post-mortem followed by a critical reflection on the game development focussing on one or more of the following; production, marketing, sales/reception or aesthetic dimensions of the product and your impressions of the project as a whole. The report is an academi...

    $392 (Avg Bid)
    $392 Avg Bid
    21 bids

    Hi, I have a mail exploit sending via cgi/php injection exploiting Exim/cpanel cong on my server. Need the configuration set tight on CSF and Exim to stop exploits.

    $34 (Avg Bid)
    $34 Avg Bid
    5 bids

    I need an iPhone app. I would like it designed and built. Seek a proof of concept iOS app which exploits the iPhone 7 plus dual camera 'portrait mode depth effect' to automatically change the photo blurry background (only) with preloaded image, producing image with focused foreground intact with new background. Assume image processing skills key

    $1204 (Avg Bid)
    $1204 Avg Bid
    84 bids

    Hi, I have a mail exploit sending via cgi/php injection exploiting Exim/cpanel cong on my server. Need the configuration set tight on CSF and Exim to stop exploits.

    $50 (Avg Bid)
    $50 Avg Bid
    6 bids

    We work with takeaway's and restaurants offering our integrated rewards/loyalty and online ordering platform. Our unique concept and technology covers any place where people eat out, so we make it easy for food businesses to sell more and build loyal customers. We're having substantial interest and we need to step up our development. We are looking

    $51 / hr (Avg Bid)
    Featured Urgent
    $51 / hr Avg Bid
    167 bids

    Looking for someone who has experience with exploits. Regards

    $188 (Avg Bid)
    $188 Avg Bid
    16 bids

    ...the best 3 ideas (from the 50+), for each of the 3, describe in 60-80 words: 1) The product / service, customer, technology and facilities. 2) The opportunity the business exploits. 3) The resources you think would be necessary to execute this venture. Step 4: Rank-order the 3 ideas so that the best one is #1, the second best is #2, etc. This would

    $91 (Avg Bid)
    $91 Avg Bid
    8 bids

    I need someone to download the contents of an online MySQL database into excel. Nothing financially related. Only contact information of newly created companies from various company formation websites. You need to well versed in internet security and specifically on mysql exploits.

    $22 (Avg Bid)
    $22 Avg Bid
    20 bids

    ...third-party APIs (Google, Facebook, Twitter etc) * Experience in integrating third-party payment gateways like Rajorpay. * Strong knowledge of the common PHP or web server exploits and their solutions * Demonstrable knowledge of web technologies including HTML, CSS, Javascript, AJAX etc Above all we required person having ability to handle Project

    $814 (Avg Bid)
    $814 Avg Bid
    36 bids

    ...what we are looking for: - Wordpress installation and management. - Ability to harden Wordpress security and minimize exploits. - Backup Wordpress websites and follow procedures. - Scan current client websites for malware and exploits. - Ability to remove malware if found. - Ability to communicate with project managers and other team members. - Open

    $408 (Avg Bid)
    $408 Avg Bid
    21 bids

    I have a site that my webhost quarantined because of some exploited hacks that were detected. i have a list of the files that need to be replaced with the original wordpress files and reinstall all images and database.

    $152 (Avg Bid)
    $152 Avg Bid
    19 bids

    ...websites urls NO duplicate NO dead urls NO invaild urls ALL is Alive urls and working platform needed : - Article Platforms Blog Comments Directories Exploits Forums Guestbooks Image Comments Microblogs Pingbacks Referrers RSS Social Bookmarks Social Networks Trackbacks Urls Shortners Web 2.0 Wikis Image

    $71 (Avg Bid)
    $71 Avg Bid
    18 bids

    Our Magento site has been hacked. It is sending out spam email. We currently use Magento for an online store. We have a few modules installed. One for purchasing & paying with credits and one for using multiple vendors. There have been many custom modifications made to this code to make the modules work together correctly. We need a Magento security

    $488 (Avg Bid)
    $488 Avg Bid
    72 bids

    ...millions websites urls NO duplicate NO dead urls NO invaild urls ALL is Alive urls and working platform needed : - Article Platforms Blog Comments Directories Exploits Forums Guestbooks Image Comments Microblogs Pingbacks Referrers RSS Social Bookmarks Social Networks Trackbacks Urls Shortners Web 2.0 Wikis Image Comment video

    $438 (Avg Bid)
    $438 Avg Bid
    10 bids

    I need someone who is proficient in Delphi to redesign and...this must be made so that it not longer looks or can be recognized as cheat engine. Here is a post with useful information: [url removed, login to view] Please only serious requests

    $138 (Avg Bid)
    $138 Avg Bid
    9 bids

    ...is blacklisted by a spam filtering service Severity: Critical Status New Your IP address appears on the Spamhaus Exploits Block List (XBL) which is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits. You can find out more by visiting the URL: [url removed, login to view] I have spoken with the web security expert

    $75 (Avg Bid)
    $75 Avg Bid
    1 bids

    ...he/she will be responsible for managing back-end services and the interchange of data between the server and the users .* Strong knowledge of the common PHP or web server exploits and their solutions * Demonstrable knowledge of web technologies including HTML, CSS, JavaScript, AJAX etc Above all we required person having ability to handle Project individually

    $416 (Avg Bid)
    $416 Avg Bid
    34 bids

    Hi I have some source code from [url removed, login to view] I need to reskin and changing package name, class name vs things. Here is the list : [url removed, login to view] [url removed, login to view] [url removed, login to view] [url removed, login to view] [url removed, login to view] I m not expecting the change every slide and image inside this game. But you should chang...

    $312 (Avg Bid)
    $312 Avg Bid
    41 bids

    Cheat engine is an open source. I need someone to reb...this must be made so that it not longer looks or can be recognized as cheat engine. Here is a post with useful information: [url removed, login to view] Please only serious requests,

    $172 (Avg Bid)
    $172 Avg Bid
    16 bids

    ...kaloyan13. im wondrering if you have heard of Metasploitable 2, which is a Linux based VM? If you have, what i need done is: Gather as much information as possible about the Virtual machine, find the services running and enumerate those. Scan for vulnerabilities and then run exploits. You then need to produce a report that explains all the problems found with

    $150 (Avg Bid)
    $150 Avg Bid
    1 bids