Server attack jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    5,980 server attack jobs found, pricing in USD

    ...* The source code must be open and right will be given to us. This is to ensure for future possible editing ( not selling ) * System must be tested against all well known attack methods to ensure the security * System provider will include it 12 month support to its bid. This is the initial phase of the project to colect several serious offers.

    $2641 - $6339
    Sealed NDA
    $2641 - $6339
    6 bids
    Artificial intelligence -- 2 6 days left
    VERIFIED

    Using the lstm and python predict heart attack chances in children using sine wave

    $26 (Avg Bid)
    $26 Avg Bid
    4 bids

    Hi, I wanted to implement research work on the AES(Advnaced Encryption Standard) algorithm and differential scan attack on the same to retriever secret key. In addition, the prevention mechanism against such attack has to be developed. Coding and simulation in verilog(Xilinix-ISE/Modelsim) will be fine. Also, requires documents for the implementation

    $1027 (Avg Bid)
    $1027 Avg Bid
    5 bids
    crypto protocols 5 days left

    ...collection/transmission. - Ads and analytics services used: which data they collect, security measures they apply. - Vulnerabilities: weak passwords, online bruteforcing, etc - Attack trees with possible attacks and proof of concepts. - COPPA Compliance (you can read more about COPPA from: [url removed, login to view]

    $99 (Avg Bid)
    $99 Avg Bid
    2 bids

    i have an article from new england journal of medicine , i would like to make power point presentation with 25-30 slides more or less to presented in fron...point , in a word file a paragraph explain this slide in simple english word (good explanation because i need to understand what i am going to talk about ) i am going to attack the journal club

    $69 (Avg Bid)
    $69 Avg Bid
    32 bids

    ...of the 8x8 squares possibly specifies (at a particular Level of recursion) whether it: 1] contains a Queen, 2] is under attack from a Queen, 3] is not under attack but previously failed for placing a Queen, or 4] is not under attack and available for placing a Queen) Must use vector (within the above Class object) for Chessboard state storage Must

    $124 (Avg Bid)
    $124 Avg Bid
    21 bids

    ...of the 8x8 squares possibly specifies (at a particular Level of recursion) whether it: 1] contains a Queen, 2] is under attack from a Queen, 3] is not under attack but previously failed for placing a Queen, or 4] is not under attack and available for placing a Queen) Must use vector (within the above Class object) for Chessboard state storage Must

    $36 (Avg Bid)
    $36 Avg Bid
    12 bids

    ...Proof-of-Stake? - IOTA: The Blockchain for IoT - What is Link (LSK)? - What is the Blockchain? - How to accept Bitcoin Payments - How to store digital Money? - What is a 51% Attack and how dose it work? - How dose Ether-Mining Working? - Where can I pay with Bitcoin? - What dose Proof-of-Work mean? - What are Smart-Contracts? - What is an ICO? -

    $229 (Avg Bid)
    $229 Avg Bid
    22 bids

    ...IMPORTANT! The host server is custom, not made with Unity! You can make your own test server in any language you want for testing. Requirements: You must cover all possible actions, the packets must be custom for each and readable on custom server end. In other words it should send connect, login, user, password, movement, position, attack, click on npc

    $135 (Avg Bid)
    $135 Avg Bid
    6 bids

    ...is a simple website for a small agency. I quite like this approach, telling a story across a handful of pages: http://webfire.co.uk. I haven't decided exactly on a plan of attack but I'm keen to start over from scratch. I can get things together pretty quickly. I use Sketch to create mockups - can you work from that (or the .pngs / .pdfs that I export)

    $15 / hr (Avg Bid)
    $15 / hr Avg Bid
    1 bids

    I am masters student I have a project for the this subject to implement a recent attack on android OS there are two parts of project but i just need to implement the attack part of the project please see the deadline is 27th November and attack should be based on emulators isolated from the network. Thank you.

    $93 (Avg Bid)
    $93 Avg Bid
    8 bids

    ...character design 2. Each animated character's fighting animation, around two type of normal strikes. 3. Each animated character's enraged fighting animation, mad raged jumping attack. 4. Each animated character's win animation or pose. 5. Each animated character's death animation. 6. Each animated character's idle animation. 7. Each animated character'...

    $2578 (Avg Bid)
    $2578 Avg Bid
    50 bids

    ...the solution files on my server [url removed, login to view] The archive also contains the file "[url removed, login to view]" which gives an overview over the relevant files and classes as well as the two FBX animations in question (Base@Walk Without Root [url removed, login to view], Base@Jump Right Attack [url removed, login to view]). This task may

    $598 (Avg Bid)
    $598 Avg Bid
    12 bids

    ...able to kill the boss with out dying, it would make more sense for 1 hit kill but that would be boring, i never miss, mobs can't evade or guard, always crit = 2x damage, max attack speed, have unlimited orbs if possible and unlimited spina (in game cash). I hope you are willing to do this for me for free and i don't blame you if you don't want to do

    $10 - $10
    $10 - $10
    0 bids

    ...The source code must be open and right will be given to us. This is to ensure for future possible editing ( not selling ) * System must be tested against all well known attack methods to ensure the security * System provider will include it 12 month support to its bid. This is the initial phase of the project to colect several serious offers

    $4565 (Avg Bid)
    $4565 Avg Bid
    8 bids

    ...* The source code must be open and right will be given to us. This is to ensure for future possible editing ( not selling ) * System must be tested against all well known attack methods to ensure the security * System provider will include it 12 month support to its bid. This is the initial phase of the project to colect several serious offers

    $8088 (Avg Bid)
    $8088 Avg Bid
    40 bids
    Need malware removed fast! 1 day left
    VERIFIED

    Hello, I recently got under attack by some scumbag who keeps hacking me! I was hacked as of 2 hours ago, I need someone to get in fast before damage is done. i will pay no more that $50. here is a list of infected files. ----------- SCAN SUMMARY ----------- Known viruses: 2008448 Engine version: devel-clamav-0.99-beta1-632-g8a582c7 Scanned directories:

    $89 (Avg Bid)
    $89 Avg Bid
    42 bids

    I need you to write a report for something. My partner died of a heart attack in 2015 aged 57. An old friend of his who told me he hates me in 2006 and we had not seen since turned up at his funeral and convinced my family who did not know him to sign with his firm to process probate behind my back He stole all the money in the estate and hopes to

    $360 (Avg Bid)
    $360 Avg Bid
    26 bids
    Port Scanning(SYN Scan) 21h left
    VERIFIED

    Code to create a port-scanning or SYN scan using Python. Also write Snort rules to defend the attack or port-scanning.

    $33 (Avg Bid)
    $33 Avg Bid
    4 bids

    ...liven up a technical conference presentation about IT security of a system called Kubernetes. The title of the presentation is: "Shipping in pirate-infested waters: practical attack and defense in Kubernetes". It uses two characters to present the topic: one is a ships captain, the other a pirate. Illustrations for: 1. Title slide: some sort of pirate

    $93 (Avg Bid)
    $93 Avg Bid
    22 bids