Router vulnerabilities list jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 router vulnerabilities list jobs found, pricing in USD

    The task is to tag for deletion, the cases on my data sheet that are settled, and where they sold the property, so I can perfect my data in my CRM (Go High Level), so we prospect opportunities. To do this, you need to look up the case number and required you can access the sites from your country of origin either directly of through the use of a VPN. No exceptions! I have attached a sample file so you can see the scale. Only detail oriented, highly organised persons will be considered. Let's see if we are a fit!

    $30 / hr (Avg Bid)
    $30 / hr Avg Bid
    32 bids

    ...developer with in-depth experience in creating smart contracts on the Ethereum blockchain. Key Requirements: - Develop a multisend smart contract that supports ERC20 tokens. The contract should allow for the distribution of ERC20 tokens to multiple recipients in a single transaction. - Implement pause functionality as a security feature. This is crucial to protect the contract from any potential vulnerabilities or attacks. - We would like to be able to interact with the contract if possible (on etherscan) Ideal skills and experience: - Proficiency in Solidity, the programming language used for Ethereum smart contracts. - Prior experience in developing multisend contracts and incorporating pause functionality. - Knowledge of best practices for smart contract security. - Abilit...

    $70 (Avg Bid)
    $70 Avg Bid
    5 bids

    I'm in search of an Expert Ethical Hacker to assist me with my project. This role requires someone with extensive experience in the field, ideally as a penetration tester or similar. The ideal candidate should be able to perform network penetration testing, effectively test web applications and ...Ethical Hacker to assist me with my project. This role requires someone with extensive experience in the field, ideally as a penetration tester or similar. The ideal candidate should be able to perform network penetration testing, effectively test web applications and conduct vulnerability assessments. I'm looking for someone who can think like a hacker in order to uncover and fix security vulnerabilities in my systems. Please include a detailed overview of your experience ...

    $314 (Avg Bid)
    $314 Avg Bid
    9 bids

    I'm seeking an expert researcher to build a comprehensive list of 3300 Chair of Governors from public secondary schools for me. Each secondary school has one, if a chair can not be found clerk of Governors acceptable. Site to help The budget is $100 no more - please send a sample of 10 to 20 Governors Key requirements include: - The list should be organized alphabetically by county/area - I need contact details to include email addresses and phone numbers. Your experience with web research, data mining and data entry will be crucial to successfully carry out this task. Knowledge of educational institutions and contact compilation is key. Please ensure that the details gathered adhere strictly to public

    $110 (Avg Bid)
    $110 Avg Bid
    74 bids

    Ideal Skills and Experience: - Proficient in navigating various databases and not limited to Google (main search engines). - Previous experience in compiling contact lists based on specific criteria. - Familiarity with job titles within the financial sector, particularly relevant to CPA firms.

    $21 (Avg Bid)
    $21 Avg Bid
    29 bids

    ...internet, and stealing information. As a result, I have no control over my devices at this point. I am seeking an experienced professional who can assist me in removing the hackers from my systems and ensuring that my personal data is secured. Your primary focus must be on removing these hackers from the system. Key tasks include: - Investigating the extent of the hack and identifying vulnerabilities - Removing the hackers from the system entirely - Securing my personal data - Ensuring control over cameras and microphones is restored Ideal Skills and Experience: - Proven experience in cybersecurity and network security, particularly with Azure - Expertise in identifying and removing hackers from systems - Ability to secure personal data effectively - Strong problem-solving ...

    $41 / hr (Avg Bid)
    $41 / hr Avg Bid
    7 bids

    I'm seeking a highly proficient professional to conduct a Tier 2 Security Assessment of our web application; specifically focusing on evaluating compliance with security standards. Your targets for this assessment include, but are not limited to: - Analyzing how our system handles user registration and authentication processes - Identifying potential vulnerabilities within these functionalities - Providing an actionable report on how to harden our security measures in conformity with the best industry standards. The ideal candidate will have extensive experience in web application security, specifically in auditing user registration and authentication procedures. Your practical insights into advanced security measures will be highly appreciated. Please provide us with example...

    $177 (Avg Bid)
    $177 Avg Bid
    24 bids
    New admin page to list users 6 days left
    VERIFIED

    ...content previously** We’re looking to create a simple admin page that will list all female users, with pagination. The purpose of this page is to allow us to mark users that we suspect are spammers This will involve adding a new marked_as_spammer boolean flag to the users table The page should have a title of “Spam Review” The page should have two tabbed sections. One labelled “To Review” and another labelled “Spammers” The “To Review” section should list all female users where marked_as_spammer is false, ordered by user creation date descending, paginated 50 per page The list of users should be in a table with each row having a checkbox and username Clicking on a username should login as that user Below ...

    $161 (Avg Bid)
    $161 Avg Bid
    109 bids

    I'm seeking an expert researcher to build a comprehensive list of 3300 Chair of Governors from public secondary schools for me. Each secondary school has one, if a chair can not be found clerk of Governors acceptable. The budget is $100 no more - please send a sample of 10 to 20 Governors Key requirements include: - The list should be organized alphabetically by county/area - I need contact details to include email addresses and phone numbers. Your experience with web research, data mining and data entry will be crucial to successfully carry out this task. Knowledge of educational institutions and contact compilation is key. Please ensure that the details gathered adhere strictly to public schools only. I expect high levels of accuracy, so skills in precision and a...

    $106 (Avg Bid)
    $106 Avg Bid
    45 bids

    ...connectivity through our OpenWrt-based router firmware. The successful candidate will be responsible for developing a robust VPN server software or internet gateway software that can authenticate the certificates, keys, or other authentication methods sent by our existing client software and grant internet access. The software should be compatible with both rented hosting solutions and in-house servers. Additionally, you will be tasked with creating comprehensive server software instructions to enable easy deployment and management by non-technical personnel. Key Responsibilities: 1. Develop secure and reliable Wireguard exit nodes and VPN server software. 2. Ensure seamless integration of the server software with our existing client software and VPN router firmware. 3...

    $42 / hr (Avg Bid)
    $42 / hr Avg Bid
    27 bids

    I am in immediate need of a skill...enhance the security of the application. - Modify CORS configuration to prevent misconfigurations and enhance security measures. I am looking for an expert who is well-versed in AWS, particularly in working with applications. The ideal freelancer for this job should have: - A thorough understanding of AWS services and its integration with Next.js. - Proficiency in addressing security vulnerabilities, in particular server banner disclosure and CORS misconfiguration. - Excellent troubleshooting skills, to quickly identify and rectify improper error handling. Time is of the essence and I need this project completed ASAP. If you are confident in your capacity to handle these issues promptly and effectively, I look forward to receiving your propos...

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    13 bids

    I need an apk security expert I hope there are no vulnerabilities in the database in my apk. Other people keep trying to hack my database

    $1035 (Avg Bid)
    $1035 Avg Bid
    27 bids

    I am looking for a detailed report focusing on how algorithms, particularly those of Facebook, can be manipulated to influence user engagement. Key...particularly in the context of social media platforms, is essential. - Research and Analysis: The ability to conduct in-depth research on the topic and present findings in a structured, coherent manner. - Social Media Knowledge: Familiarity with Facebook's algorithmic operations and the broader social media landscape would be a significant advantage. The report should not only identify potential vulnerabilities in these algorithms but also suggest ways in which such manipulation can be prevented or mitigated. This is a critical study that will help us better understand the potential risks associated with algorithmic corruption i...

    $22 (Avg Bid)
    $22 Avg Bid
    11 bids

    As a client, I'm in need of a skilled ReactJS developer with no less than 10 years of experience in the field who can help me develop a new web application from scratch. Essential Skills: - In-depth knowledge of React Component Development - Proficiency in Redux State Management - Experience with React Router Navigation The perfect candidate for this role should be well-versed in additional tools and technologies such as: - GraphQL - TypeScript - Jest testing framework. The main objective of this project is to build a robust and dynamic web application that meets our specific requirements and standards. Your role will be pivotal in designing, creating, testing and implementing this web application. So, if you're up for a challenge and willing to dedicate your time an...

    $8 / hr (Avg Bid)
    $8 / hr Avg Bid
    53 bids

    hello, i want to create this style of component for my website (). When clicking on an item in the list the image changed Example :

    $34 (Avg Bid)
    $34 Avg Bid
    50 bids

    ...seeking the expertise of a professional ethical hacker who specializes in: - Network security - Web application security - Wireless security Unfortunately, I forgot to mention whether I need penetration testing, vulnerability assessment, or both. I also didn't specify the exact purpose of this ethical hacking project. Ideally, you should possess a strong ability to uncover any underlying vulnerabilities and offer strategic direction on how to heighten security measures across different platforms. Your approach should not only identify these weaknesses but also provide solutions on how to rectify them. While it's not specified, it'd be beneficial if you could also assess the effectiveness of existing security measures and provide recommendations for improvement...

    $307 (Avg Bid)
    $307 Avg Bid
    15 bids

    I'm searching for an expert in web hacking and network penetration. The core task will involve identifying potential vulnerabilities within a website and working towards fixing these loopholes, while focusing on protecting and securing a database ID and password. A successful candidate should possess the following skills and experience: - Proficient understanding of web hacking and ethical hacking - Experience in network penetration testing to identify vulnerabilities - Knowledge of password recovery techniques - Proven record in enhancing website security The ultimate goal of this project is to strengthen the current security measures on my website, and to protect sensitive data. Your work will majorly revolve around securing the database ID and password. Please, com...

    $321 (Avg Bid)
    $321 Avg Bid
    13 bids

    I need assistance with PowerFX list expressions, specifically on formulas and data manipulation for PowerApps. Here are the specific requirements: - Assistance with PowerFX list expressions, focusing on formulas and data manipulation - Help building efficient and effective list expressions in PowerFX for PowerApps Ideal freelancer for this project should have: - Proficiency in PowerFX, specifically in the context of PowerApps - Experience in working with list expressions, formulas and data manipulation - Ability to communicate technical concepts effectively

    $13 / hr (Avg Bid)
    $13 / hr Avg Bid
    9 bids

    I'm seeking a skilled network expert to assist with setting up a GRE tunnel on our MikroTik router. The primary goal of this project is to seamlessly connect our multiple remote offices. Key Requirements: - Implementation of a MikroTik GRE tunnel configuration emphasizing on traffic routing - Ensuring optimal connectivity and data transmission between all connected offices Ideal Candidate: - Proficiency in MikroTik router configuration, particularly with GRE tunnels - Solid understanding and experience with network traffic routing - Prior experience with setting up connectivity for remote offices - Ability to ensure uninterrupted data transmission and network availability across multiple locations This is an urgent project, so I'm looking for someone who can sta...

    $19 / hr (Avg Bid)
    $19 / hr Avg Bid
    6 bids

    I'm looking for a tech-savvy individual who can help me set up my Google Nest Audio Wi-Fi speakers. Key tasks include: - Connecting the speakers to my home network - Troubleshooting any potential connection issues You should have prior experience with setting up Wi-Fi enabled speakers and be comfortable working through potential connectivity problems. Familiarity with Google Nest Audio in particular would be a huge plus. Look forward to working with a skilled individual on this small, yet crucial project.

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    8 bids

    ...triad in recent research? 5 IEEE papers (2019-present) Comparative table with key insights âš¡ Fast, expert research & delivery Order now & unlock cybersecurity knowledge! Tags: cybersecurity, research, CIA, IEEE, analysis, comparison - Identifying potential vulnerabilities in multiple IoT in smart city systems - Analyzing existing cybersecurity measures - Proposing enhanced security solutions The ideal candidate will understand A secure and Robust framework with threat modeling in a Mobile-government, their potential vulnerabilities, and possible solutions. Your role would also involve aiding in comparison and assessment of different cybersecurity measures. specific area of this topic: you will need to find it out of the 5 articles after you get them out of the...

    $100 (Avg Bid)
    $100 Avg Bid
    32 bids

    I'm looking for a skilled network engineer who can assist in setting up a GRE tunnel on my MikroTik router. Key Requirements: - The main intent of this setup is to expand my network, so you should have a good understanding of network expansion principles. - You should be able to properly configure the GRE tunnel on MikroTik using best practices and ensure the network's optimal functionality post-setup. The ideal freelancer for this job should have experience in setting up GRE tunnels on MikroTik routers and a good understanding of network expansion strategies. A certification in networking would be a plus, but not mandatory. Look forward to receiving bids from suitable candidates.

    $28 / hr (Avg Bid)
    $28 / hr Avg Bid
    4 bids

    Project Description: We are seeking a qualified freelancer to conduct a security assessment of our Learning Management System (LMS) website. This assessment will involve identifying potential vulnerabilities and recommending improvements to strengthen the overall security posture of the platform. Tasks: LMS Security Testing: Utilize your expertise to perform a comprehensive security assessment of our LMS website. This includes testing for vulnerabilities like XSS, CSRF, insecure data storage, and insecure third-party integrations specific to LMS functionalities. Tool Proficiency: We require a freelancer familiar with security testing tools like Burp Suite to conduct a thorough analysis of the website's code and functionalities. PII Identification: Identify any Personally...

    $83 (Avg Bid)
    $83 Avg Bid
    12 bids
    Website Penetration Test 4 days left
    VERIFIED

    I am looking for a skilled professional to conduct a comprehensive penetration test on my website. Key Objectives: - Identify vulnerabilities: I need to ensure that no exploitable weaknesses exist that could compromise the security of my website. - Assess compliance with security standards: My website must meet industry security standards to ensure data protection and user privacy. - Evaluate potential impact of a breach: It's crucial to understand the possible consequences of a successful security breach. - Bug identification: I would also like any bugs found to be highlighted so that they can be fixed. I have not conducted security testing on the website before, so this will be the first time and it's important that the expert I hire is thorough and experienced. Ide...

    $20 (Avg Bid)
    $20 Avg Bid
    15 bids

    ...seeking an experienced SharePoint developer to create a new SharePoint site and list for my team. This list should encompass both team member contact information and task assignments. Organisation of the list should be by both task category and project phase, for easy navigation and maximum efficiency. The significant aspect of this project is not only creating the SharePoint list, but also implementing Power Automate flow for seamless operation. Key Responsibilities: 1. Creation of a new SharePoint site and list 2. Inclusion of team member contact information and task assignments in the SharePoint list 3. Organizing the list by task category and project phase 4. Configuring Power Automate flow for the list Ideal freelancers sh...

    $179 (Avg Bid)
    $179 Avg Bid
    28 bids

    write a headless chrome python script which will visit given list of URLs/websites aftear each config delay in seconds. script will use different ip in each iteration of list urls visit. it will keep running untill ip list end .

    $30 (Avg Bid)
    $30 Avg Bid
    24 bids

    ...detailed analysis report on selected CVE vulnerabilities associated with WordPress. This report is specifically for an academic project. Here are the particular CVEs for review: 1. CVE-2023-32243 2. CVE-2023-0084 I can provide the older versions of those plugins with bugs you just need to execute and create output on docker environment and add screenshots of execution showing how it exploits security and then the share the proposed mitigations in the report. You must have to cover the below mentioned points in the reports: briefly describe the architecture of the web application/framework describe the type(s) of vulnerability that is considered describe the vulnerabilities in detail describe how to exploit the vulnerabilities describe how the vulnerabilitie...

    $45 (Avg Bid)
    $45 Avg Bid
    19 bids

    I'm in need of an experienced email marketing and web scraping professional to help me generate quality leads through email campaigns. - The primary goal of this project is to generate leads for my business. - The ideal candidate should have a track record of successful lead ...rates prior to creating lists. General emails be sent ie one email for all hairdressers or one email for all plumbers etc. We are IT agency so be targeting all niches but of course will need opt out etc so we don't email clients that request removal. Do not contact us asking us what you want us to do. This is project only for someone who can come in, generate lists, optimise, set up marketing list, create email for relevant target niche. Send email in bulk and must have proven record in generat...

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    36 bids

    I'm seeking the expertise of an experienced Ethical Hacker. Your primary task would be: - Conduct a comprehensive vulnerability ass...be: - Conduct a comprehensive vulnerability assessment of a mobile application Here's what you'll need for this role: - Proven understanding and experience with Local Area Network (LAN) systems - Expertise in conducting vulnerability assessments - Solid comprehension of mobile application structures and their potential security weak points. Your mission will be to identify loopholes and vulnerabilities that may exist, in order to uphold our commitment to providing a secure mobile application for our userbase. Your keen insight and detailed feedback on any potential weak points found will be instrumental to our ongoing development a...

    $98 (Avg Bid)
    $98 Avg Bid
    10 bids

    ...situation better: - **Specific Issue**: The issue is specific to Windows updates. When a computer is connected to the MikroTik network, it fails to download updates. However, when the same computer is connected to a different network (like a hotspot), the updates download without any issue. - **Nature of Issue**: The problem doesn't seem to be with the individual computers, but with the MikroTik router itself. - **Recent Changes**: While I'm not entirely sure of the network's recent changes, it appears that the previous IT administrator may have made changes that could be related to this issue. One such possibility is the intentional blockage of Windows updates. Your responsibilities would include: - Diagnosing the root cause of this Windows update issue. - ...

    $64 (Avg Bid)
    $64 Avg Bid
    13 bids

    I'm seeking a professional able to provide a detailed cutting list for contemporary style kitchen cabinets to be made out of particle board. This project requires: - Understanding of cabinet making - Knowledge of contemporary design elements - Ability to interpret design briefs to deliver precise cutting details. Ideal candidates will have previous experience in cabinet making and material estimation, especially in particle board usage for contemporary kitchen design. If you're an expert in the kitchen cabinetry construction who prides on attention to details, then this project is for you.

    $63 (Avg Bid)
    $63 Avg Bid
    19 bids

    I have a Network Forensics work that...a variety of sources. 3. Present findings to both executive and technical audiences. I will share more details and files. Ideal Skills and Experiences: • Extensive knowledge of network forensics • Proficient in vulnerability assessment • Experience handling both real-time and historical network data • Great adaptability in their investigative approach Objectives: • Identify potential vulnerabilities in our network • Offer actionable steps to improve network security • Provide a detailed report with findings and recommendations Your thorough understanding of network forensics and ability to produce a detailed analysis report is crucial for me. This report will serve as a guide to enhance my network'...

    $356 (Avg Bid)
    $356 Avg Bid
    13 bids

    ...abilities. - Teaching or training experience preferred but not essential - Ability to break down complex cyber security concepts. Experience: Minimum of 10 years' practical experience in cybersecurity, preferably with recognized companies. Proficiency with various cybersecurity tools and programming languages. Expertise in identifying and mitigating risks, threats, and vulnerabilities. Technical Skills: Hands-on experience with Security Information and Event Management (SIEM) tools. Proficiency in Python, Linux, and SQL. Knowledge of CIA Triad, governance, risk analysis, compliance, and business continuity planning. Familiarity with Linux and Windows server configuration, Active Directory, network architecture, operations,...

    $11 - $18 / hr
    Featured Sealed
    $11 - $18 / hr
    9 bids

    We require an ethical hacker with expertise in mobile game security. Focused specifically on player data handling, our project aims to identify vulnerabilities in our system, test the effectiveness of our security measures, and improve the overall security of our network. The ideal freelancer for this job should have: - Experience with ethical hacking. - In-depth knowledge of player data security measures. - A proven track record on mobile game security. Your duty will be to run exhaustive checks and tests to identify weaknesses and areas for improvement within our mobile game security system to ensure utmost data protection for our players.

    $35 / hr (Avg Bid)
    $35 / hr Avg Bid
    14 bids

    I'm looking for a professional who can conduct a comprehensive basic vulnerability scan on my mobile application, as well as set up continuous real-time monitoring. The project involves: - **Basic Vulnerability Scan**: The task at hand is to thoroughly investigate and identify any potential vulnerabilities in the mobile application. This requires expertise in mobile application security and penetration testing. - **Continuous Real-time Monitoring**: Following the vulnerability scan, the security expert will be responsible for setting up a real-time monitoring system. This will help in the prompt detection and mitigation of any future security threats or breaches. The ideal candidate should have: - Proven experience in cyber security, with a specific focus on mobile applicat...

    $1088 (Avg Bid)
    NDA
    $1088 Avg Bid
    16 bids

    I'm looking for a skilled ethical hacker to help with security testing on my Instagram account. I'm particularly interested in identifying any security vulnerabilities and testing the existing security measures in place. Key Requirements: - Experience in ethical hacking and security testing - Familiarity with Instagram's security protocol and common vulnerabilities - Ability to work with test accounts with limited permissions Ideally, you will provide a detailed report on the security of the account, with any vulnerabilities highlighted, recommended improvements, and confirmation of the effectiveness of current security measures. Your work will be instrumental in ensuring the safety and privacy of this account.

    $11 (Avg Bid)
    $11 Avg Bid
    4 bids

    I'm looking for a skilled penetration tester to evaluate the security of my website. - Tasks: - Perform a comprehensive security test to ensure my website is protected from potential threats. - Identify any vulnerabilities that may exist on the site. - Analyze the risks associated with the security of the website. - Key Requirements: - Expertise in website penetration testing. - Proficient in identifying and dealing with website vulnerabilities. - Able to provide a detailed report outlining the risks and necessary actions to enhance the security of the site. - Site Details: - The website is built on a Content Management System (CMS) like WordPress, Joomla, or Drupal. - The focus is primarily on identifying the admin username and password. I'm lo...

    $171 (Avg Bid)
    $171 Avg Bid
    22 bids

    I need a list of 5,000 unique contacts in the United States of Businesses that meet the following criteria: 1. Service Based (Consulting, Coaching, Accounting, Legal, Event Management, Engineering, Financial Services, Insurance) 2. Less than 5 years old 2. Less than 5 employees The file should contain: 1. Company Name 2. Industry 3. First Name 4. Last Name 5. Title 6. Phone Number 7. Email Address 8. City 9. State/Province

    $87 (Avg Bid)
    $87 Avg Bid
    13 bids

    ...crux of this project is to find and exploit certain vulnerabilities present in these games. The key vulnerabilities in focus are: - In-game currency manipulation - Item duplication glitch - Unauthorized access to admin controls The ideal candidate should be adept at JavaScript and have a keen eye for identifying and exploiting bugs in games. It would be beneficial if they've worked on a similar project in the past, as that can showcase their capability and provide some insight into their approach. In your application, I only require the referral of your past work. This will help me determine your suitability for the project. Demonstrate how your past work aligns with my project's goal of identifying and exploiting gaming vulnerabilities. In essence, ...

    $473 (Avg Bid)
    $473 Avg Bid
    38 bids

    ...triad in recent research? 5 IEEE papers (2019-present) Comparative table with key insights âš¡ Fast, expert research & delivery Order now & unlock cybersecurity knowledge! Tags: cybersecurity, research, CIA, IEEE, analysis, comparison - Identifying potential vulnerabilities in multiple IoT in smart city systems - Analyzing existing cybersecurity measures - Proposing enhanced security solutions The ideal candidate will understand Security Challenges and Privacy Concerns while using IoT in smart cities, their potential vulnerabilities, and possible solutions. Your role would also involve aiding in comparison and assessment of different cybersecurity measures. specific area of IoT: Applications of Internet of Things (IoT) , Guest_Editorial_Special_Issue_on_Empoweri...

    $137 (Avg Bid)
    $137 Avg Bid
    38 bids

    I'm in need of someone to source valid email contacts within the healthcare industry, primarily to facilitate a newsletter marketing campaign. The collected emails should be active and associated with healthcare professionals. Key Requirements: - Curate a substantial list of healthcare industry email contacts. - Ensure the emails are updated and currently in use. - Compile the list in a format that can be easily imported into newsletter software for outreach. Ideal Skills for the Job: - Proficient in email sourcing and list building. - Previous experience in healthcare industry targeting. - Familiarity with newsletter software and its requirements for email lists.

    $133 (Avg Bid)
    $133 Avg Bid
    19 bids

    I am looking for a skilled professional who can precisely configure my ISP connectivity on my MikroTik router. The ideal candidate for this task will have extensive knowledge and experience dealing with IPv6 connectivity, specifically with the Global Unicast addressing scheme. As the desired end result of this project is a seamlessly functioning and effectively configured ISP connectivity, expertise in MikroTik is crucial. This is an excellent project for a freelancer who understands the importance of configuring IPC6 to ensure smooth operation and secure internet connectivity. Skills and Experience: - MikroTik router configuration - Expert in IPv6 configuration using Global Unicast addressing scheme - Understanding of ISP connectivity settings and requirements

    $156 (Avg Bid)
    $156 Avg Bid
    13 bids

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be determined as part of this process.

    $347 (Avg Bid)
    $347 Avg Bid
    15 bids

    I'm in need of a tool that can convert PDF voter lists into Excel in a text format. Here's a breakdown of what I'm looking for: - Conversion Style: I'd like the tool to convert the PDF voter list by combining all columns into a single table. This will make it easier for me to work with the data in Excel. - Error Detection: It's important to me that the tool can automatically detect and correct errors in the text. Nevertheless, I also want to have the ability to manually review and correct the text to ensure its accuracy. - Language: In this case, the tool only needs to handle English language texts. You don't need to worry about incorporating multi-language support. Ideal Skills and Experience: - Proficiency in PDF extraction and conversion tools - ...

    $17 (Avg Bid)
    $17 Avg Bid
    63 bids

    ...primitives, and TCP/IP networking. I need a tutor who can help me understand difficult concepts and prepare for exams. Key Requirements: - Should be knowledgeable in all the topics listed. - Ability to explain past exam solutions. - Experience tutoring in computer organization or related subjects. - Able to communicate via instant messaging for convenience. - help in exam preparation Here is a list of all the topics covered in this course Building and Introduction - Basics of .o, .a, .so files, dynamic/static linking, and makefiles. Accounts and Permissions - POSIX permissions, user IDs, and sudo functionalities. Privilege and Exceptions - Kernel mode, system calls, and exceptions. Signals and Processes - Handling Unix signals, processes, and threads management (fork, exec). V...

    $120 (Avg Bid)
    $120 Avg Bid
    9 bids

    I require the expertise of a freelancer capable of securing a pre-existing mailing list. The list should contain the contacts for less than 1,000 podcast listeners, PREFERABLY AUSTRALIAN LISTENERS in the middle demographic, specifically engaged with news and current events. Key skills and experience: - Proven track record in data acquisition - Experience in media or entertainment industry is a plus - Understanding of podcast listener demographics General tasks include but are not limited to: - Purchase or obtain the said mailing list - Verify the authenticity and relevance of the list - Ensure data privacy and ethical sourcing are strictly adhered to.

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    15 bids

    I require the expertise of a freelancer capable of securing a pre-existing mailing list. The list should contain the contacts for less than 1,000 podcast listeners, PREFERABLY AUSTRALIAN LISTENERS in the middle demographic, specifically engaged with news and current events. Key skills and experience: - Proven track record in data acquisition - Experience in media or entertainment industry is a plus - Understanding of podcast listener demographics General tasks include but are not limited to: - Purchase or obtain the said mailing list - Verify the authenticity and relevance of the list - Ensure data privacy and ethical sourcing are strictly adhered to.

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    16 bids

    I am seeking a penetration tester to conduct comprehensive testing focused on network security, specifically on my servers and technology. The ideal candidate should possess the following skills: - A deep understanding of penetration testing methodologies - Proven experience conducting network security testing particularly on servers and technology - Proficiency in identifying vulnerabilities and devising strategies to address them Please specify your approach to penetration testing, including the tools and methodologies you will use, in your proposal. Your keenness for detail and efficacy in reporting security threats will be pivotal for this project. With your help, I aim to reinforce the security of my network, minimize threats, and maintain the integrity and performance of my ...

    $14 (Avg Bid)
    $14 Avg Bid
    12 bids

    I am doing a gut renovation of a 4-story townhouse in Washington, DC ...floor of the house. I would use those ethernet outlets to connect TVs that would stream content from the internet, and I'm also thinking of having a wireless access point on each floor to ensure strong wireless access throughout the house. I need help figuring out the exact equipment I should buy, and to confirm that my wiring plan will work as intended. I might also need help configuring the router and access points to make sure that I have one wireless network that my devices can easily use as I move throughout the house, switching to the strongest signal as I go. I think my electrician can do all the physical work, so I really just need a design and someone who I can turn to with questions as I setup...

    $172 (Avg Bid)
    $172 Avg Bid
    26 bids

    I'm looking for a professional in cybersecurity auditing, with a focus on web applications. Key Requirements: - Con...professional in cybersecurity auditing, with a focus on web applications. Key Requirements: - Conduct a thorough cybersecurity audit specifically for our web applications. - The primary goal of this audit is to improve our existing security measures. Ideal Skills and Experience: - Extensive experience in cybersecurity auditing, particularly of web applications. - Proven track record in identifying vulnerabilities and enhancing security measures. - Strong understanding of the latest cybersecurity trends and threats. - Any relevant certifications, such as Certified Ethical Hacker (CEH) or Certified Information Systems Security Professional (CISSP), would be a...

    $510 (Avg Bid)
    $510 Avg Bid
    46 bids