...2010 Enterprise to Sharepoint 2013 Standard. We are almost certain we are not actively using any enterprise features and if we are those items can be decommissioned. The 2010 site is currently branded and we would like to maintain a similar look and feel if possible while taking advantage of some of the newer design features. I can build new database
...primary mission is to provide our clients with knowledge and expertise to defend their enterprises against advanced cyber attacks. Our capabilities and methodologies are based on over a decade of defending enterprises against targeted attacks and sophisticated threat actors. For over a decade, our team has helped clients evolve their capabilities across the
A website which will promote sport for development projects all round the world. How vulnerable people managed to achieve some of their life goals through sport or how they discovered new life goals though sport. I would like in the word goals instead of an "o" to have a football
I'm looking for a video editor to assemble a final movie of my adventure to Iceland. I shot several videos in 4K with my iPhone and camera, now it's time to assemble it to a professional video with soundtrack. I started walking from the northest point in Iceland, the lighthouse of Hranhafnartangi, right below the artic circle. I walked 620Km through the highlands, climbed Askja, crossi...
Hello, we create video material with drones and cameras. We create building shots, landscape shots, vehicle shots and make control flights of forests, objects, etc. Furthermore, we also create material for image films. Whatever the customer wishes, we create it. Photo and video. Now we are looking for someone who works on our photo and video material to maturity. Post-processing and editing, creat...
...system. 3. Produce a report summarizing your penetration testing processes and findings. Preparation You are given a VMWare virtual machine containing a potentially vulnerable operating system. The coursework is to apply the techniques discussed in lectures and labs over previous weeks to find and exploit as many vulnerabilities as you can. You
...and Android. User will be able to video chat with any other person available on the app. The technology stack should be 1) Android / iOS swift 2) Or React Native is you have cross platform skills. 3) Twilio API. 4) Backend of your choice. Top level features: 1) Random video calling between the users. 2) In App purchase. 3) Adding user as a friend. 4)
...CTS response message which we derive the true global MAC address of that device. Instead of a localization attack, we are using RTS/CTS exchanges to perform derandomization attacks". In essence we would get a CSV file with the following data of the device present in the area: date and time in microseconds of probe request reception, MAC addresses received
Gallery Division in Montreal is looking for someone who would be capable of doing scripting programming to enable automation between two quicktime videos containing art works. The idea would be that the programmed script would automatically launch the two vides to play at their designated time.
...you how to get the data for all the fields if you don’t know. Do not select channels with a bunch of different types of videos. For example, if the topic is "wild animal attacks", a channel that has videos of car crashes, gaming videos, or other topics should not be included. Do not give more than 5 channels on a single topic. For example, if you you’ve
...provide recommendations on what should be done about the various incidents. 2. Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented. 3. Discuss the importance of user technology security education
I need a bash/shell script to cross compile the Windows Binaries for Krugercoin 0.9.3 on a standard Vultr or DigitalOcean Ubuntu 14.04 x64 server. The source code is found at; - [login to view URL] The Bitcoin Talk Forum; - [login to view URL] Additional resources; Building headless Bitcoin
...order for you to adjust your quote the way you should. Our current website is in a pretty bad shape (the original version was developed in WordPress, but after a number of attacks that took place a while ago, all the customization+other features has gone). Therefore we re looking for a brand new website, preferably but not necessarily in wordpress, with
...These lights can be changed by sending messages to the device about how to behave. The first script you are to write (which you must decompose into smaller scripts/functions) is to allow a user of your script to manipulate the leds on your pi. When the script starts up, it will scan the contents of /sys/class/leds to get a list of the leds on the system
We need a single dedicated part time resource on Shell scripting, power bi, Apache hive and Apache spark to give support for US people on weekdays morning around 90 minutes IST 6 00 am to 8 00 am will provide 20000 per month minimum 4+ years of experience candidates only eligible for the bid.
This is a joint effort (of course I won't hover around). You will be working with me to help me write a research paper on the above topic. My focus will be on Africa and Europe... Project to be discussed in detail. If you have any interest in the digitization of healthcare, E-Health, M-Health then this will be for you.
...networks which is infrastructure less and adaptive in nature. Vampire attacks is the type of resource depletion attacks in which a malicious node create and send the message with node. Vampire attacks choose the longest path and loss the battery power. We can reduce the vampire attacks with the help of clustering technique. Clustering is the process that
We are a UK-based agency working with multiple clients to produce varied promotional campaigns. We are seeking an experienced and/or very capable copywriter, mainly to script promotional videos for our clients. You will be fully briefed and provided with examples from the team here. Exceptional English Language and time management skills are required
I am looking at expert of Adobe Photoshop CC 2018 scripting. The task is to parse psdt file and get all informations regarding attached format such as smart object validation, font validation,etc You can use any posssible framework for this project. In private chat, I will discuss more.
We are currently making a mobile game and we are looking for someone to create all the icons in game (battle, special attacks, store, in-game purchases, inventory, etc.). The mobile game is set in a cyberpunk universe where heroes enter a Battle Royale to win and be the last survivor team! The winner of the contest will be chosen to continue
An application for Android and ioS Platform.
Cross-browser extension for data extraction. Extracts information from a website following the website where the user is, if the user is on a Twitter profile, the extension retrieves the profile information of the person such as his username, his description, number of tweets, subscriptions. if the user is on another website, the extension retrieves
Hi I’m a PhD student and my project is in the field of business management. My project is about Innovation Management. What I need now is to make a cross case analysis using thematic analysis or use NVIVO if you could use it and then present it as if you did thematic analysis for interviews related to 6 cases (projects). I need someone who could analys
I need a script or url where i can upload my excel file And that script or URL will be coded according to some conditions so that it will delete some rows according to the conditions and than give me the process file. Thanks Nidhi
Develop an app for nightlife where a user can see the musical events and entertainment around him on the map APP similar to this [login to view URL] [login to view URL] Further details after signing a NDA. One of the main features of the app will be to sell "TICKETS" for an event and store it as a "PASSKIT". It has to sync with a remote DB. It has to interact with some map ...
Looking for someone who has excellent knowledge on SQL scripting in Qlikview Sense, would need to complete and assist to develop a project with one-on-one interaction. This would be a couple hours job - can extend for upto two or three days. This would be on a very fast pace.
...Program. The Project: • 1 x Landing Page (3 to 4 A4 pages in length, targeted to middle aged WOMEN), plus a video script running for 5 to 8 minutes. • 1 x Landing Page (3 to 4 A4 pages in length, targeted to middle aged MEN), plus a video script running for 5 to 8 minutes. The successful applicant will have the following high skill level and experience
I need to re-create the effects that's called Digital Ambience "Amount" and "Size" from Alicia's Keys pia...Kontakt Factory Library. I can upload the libraries for you, but it is preferrable that you already have them both. The task is really small for those who can do Kontakt scripting. Only add a couple of effects to a separate tab in Concert Grand.
We are looking for a reliable and accurate translator for written blog content in various industries. Specific needs are for 60 pieces of content about 1000 words on average each to be translated. Needs to be done in a timely fashion. If successful plenty of other work to follow.
We are a fast paced mobile software development firm that's lo... etc - bonus points if you have REST API hands on Expectations - help setup robust automation processes/framework for future use - code reviews for team members - work on-site off our Bengaluru office. We can talk if this is not possible every day of the week (for the right candidate).
...whole setup doesn’t get compromised. So, we are looking at the following aspects: 1. Backup -cron jobs scheduling for the linux OS 2. Automatic update (via cron) 3. DDOS attacks 4. Anti Spam (Akismet?) 5. Web Crawlers filtering 6. Detecting and stopping heavy traffic 7. IP filtering 8. Firewalls 9. Malware protection 10. Disabling unnecessary services
I need a bash/shell script to cross compile the Windows Binaries for Datacoin-core on any of the following standard Vultr/DigitalOcean servers : Ubuntu 14.04 x64 or Ubuntu 16.04 x64 The latest source code is found at; [login to view URL] The Bitcoin Talk Forum [login to view URL]
Wowonder script will be customised according to following spects: [login to view URL], source code of this social network script will be provided. It is writtten on core php . With this script a new social network dedicated to crytocurrency in which people provide their crypto currency related information too. There is a step wise sign up process
I need a cross-platform app which can import sketch file and parse it how it has done in Abstract version controlling application. I need to has the same set of features for my internal projects. Refer to this application: [login to view URL]
The project is a finance application which runs across three platforms, Windows, macOS and iOS (iPad only). The application architecture is designed for maximum code re-use and portability between the platforms but some platform specific code does exist. On Windows this is the WPF presentation layer. On macOS this is the presentation layer delivered by Xamarin Mac. On iPad this is the presentati...
...Crypto Currencies including a HOT AND COLD wallet system. • Referral Program • Android – iOS Apps and Update support • Security Aspects – CloudFlare – to mitigate DDoS attacks • Blog • Notification Ticker • Day and Light UI mode • Data Center Requirements and Deployment support. • It should be noted that - since Security a...
...Integrating Cometchat is required If you haven't done this before DO NOT apply for this Job. I need someone to integrate cometchat into my site. You will need to know how to do 1) Setting up cometchat in a website 2) Cross domain editing of the [login to view URL] 3) Connecting two people up by chat using the Get Friend list I will need examples of where
...management (purchased sim cards, prepaid recharge cards) 23- hide/show numbers 22- Module to change IMEI number of dongles. setup security rules to avoid automated bruteforce attacks on server to gain sip authentication....