Tweet attacks jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    5,000 tweet attacks jobs found, pricing in USD

    ...implementation of a filter for all incoming requests to the controller, specifically designed to combat XSS attacks and remove Zero Width Space (ZWSP) characters. Key Project Requirements: - Develop a Spring Boot application filter. - The filter must effectively handle and block all potentials XSS attacks. - The filter must efficiently remove all encountered ZWSP characters. - The developed filter must suitably plug into a Spring Boot application. - The filter should be designed to handle high networking traffic smoothly. Test Cases Require to Cover: - Scenarios of filtering XSS attacks. - Scenarios that deal with the removal of ZWSP characters. - Scenarios involving combined filtering of XSS attacks and removal of ZWSP characters. Ideal Skills and Experi...

    $105 (Avg Bid)
    $105 Avg Bid
    2 bids

    As someone requiring immediate assistance, I need an expert who can efficiently pull together a spreadsheet filled with numerical data. Your skills and experience should ideally extend to: - Profound understanding of spreadsheets. - Experience in dealing with numerical datasets. - Ability to complete the task on a quick turnaround. The spreadsheet will be based no this tweet;

    $3 / hr (Avg Bid)
    $3 / hr Avg Bid
    40 bids

    ...for embedded youtube videos - no auto-play - when thumbnail is clicked only then load embed code - default 1080p, sound 100%, with controls 4) Add support for reddit hosted videos - no auto-play - with controls 5) Add support for reddit image gallery 6) When a thread isn't loaded widen thread list so it takes up 100% width - When a thread is loaded slide it in from the right to the left - Above Tweet button place X button to close thread 7) Add new property 'Regex' for each subreddit added - For example, filter out threads that have a specific word in their title 8) Move from JSON to SQL using () 9) Add discard button for threads so they are no longer visible at all (thread id would be saved in db and never allow that thread to be shown) 10) Archive

    $161 (Avg Bid)
    $161 Avg Bid
    88 bids

    In this project, I am seeking the services of an experienced White Hat Hacker with a well-rounded knowledge of the cybersecurity arena. The following are the key objectives and tasks required: Key Objective: • Identify security vulnerabilities in the system • Improve overall system security where needed • Test the system’s resistance to various forms of cyber attacks Key Tasks: • Conduct network vulnerability testing • Carry out web application security testing • Perform social engineering testing Targets: • Websites • Mobile applications • Network infrastructure The ideal candidate should have significant experience in conducting similar tasks and a strong understanding of network security, web application security and social e...

    $272 (Avg Bid)
    $272 Avg Bid
    9 bids

    I need a seasoned developer who can extract specific data from Twitter. The specific data to be extracted includes: - Tweets from specific users. This is the main requirement, the users will be provided. - For each of these tweets, the data needed includes: date-time, text of the tweet, number of views it received, how many replies, retweets, and likes it got. Previous experience with Twitter API and data extraction is desirable for this task. You should be able to ensure accurate retrieval of details and to respect Twitter's usage policies. Proficiency in Python or similar language is also needed. Understanding of data scraping as well as knowledge in working with JSON data is highly beneficial. Please only bid if you can fulfill these requirements and deliver quality re...

    $160 (Avg Bid)
    $160 Avg Bid
    31 bids

    ...Django SSL Redirect: To enforce the use of HTTPS, I used the django-ssl-redirect middleware. It automatically redirects HTTP requests to HTTPS. 2 - Django Rest Framework (DRF): DRF includes various authentication classes, permission classes, and throttling classes to help secure your API endpoints. 3 - Brute Force Protection: django-axes will help our website protect against brute force attacks by tracking failed login attempts and blocking suspicious IPs. 4 - CORS Headers: Our Backed serves APIs and needs to handle cross-origin resource sharing (CORS), It will help to set the appropriate headers. 5 - Django Security: Django provides a set of security-related settings that I have used on your website. These include settings like SECURE_BROWSER_XSS_FILTER, SECURE_CONTENT...

    $557 (Avg Bid)
    $557 Avg Bid
    55 bids

    I'm currently facing significant issues on my WordPress site, likely due to the JS/Agent Trojan. The symptoms include: - Slow website performance - Unexpected pop-ups and redirects - Discovery of suspicious files/ code changes - Enhancement of anti-virus blocking mechanisms Efforts have been made to mitigate this including scanning my website with antivirus software, updating Word...significant experience in WordPress security and malware removal, to completely clean my website from this Trojan. This project requires a meticulous professional who is well-versed in current Trojan methods, removal techniques, and best practices for website security moving forward. The ultimate goal is to restore my website to its pre-infection state, and to enhance its security to prevent any future ...

    $136 (Avg Bid)
    $136 Avg Bid
    56 bids

    I’m in urgent need of a capable professional who can safeguard my website from DDoS attacks. Specifically, I’m interested to implement an IP reputation scoring mechanism that effectively distinguishes between genuine and malicious interaction. While real-time assessment of the website's IP reputation score would be ideal, the frequency isn't my primary concern. Therefore, the candidate with profound expertise in IP reputation management to discourage DDoS breaches will find themselves at an advantage in undertaking this task. I look forward to comprehensive solutions from you all.

    $475 (Avg Bid)
    $475 Avg Bid
    15 bids

    I require an expert in WordPress operations, specifically hosting on HostPapa, who could help me improve my website's performance and enhance its security. The tasks would involve: 1. Optimizing my website: - Increasing PHP memory limit - Rectifying slow loading speed - Updating outdated content 2. Strengthening Security: preventing attacks on on WP Sites - Installing the Wordfence security plugin - Disabling XML-RPC in WordPress - Addressing vulnerability related to malware infections 3 insufficient website optimizations - You need to optimize all your websites. Delete unwanted plugins and themes, update what needs to be updated to the latest version. 4) Use caching plugins for your site, you can use one of the following plugins that will best fit...

    $150 (Avg Bid)
    $150 Avg Bid
    145 bids

    I'm experiencing a concerning security issue with my VPS hosting to the extent that my server is the source of outgoing attacks against third parties. Notably, I need a skillful and experienced professional who can dig in, identify the problems, and mitigate these security threats immediately. Scope of the Assignment: - Examine the server for any signs of unauthorized access. - Identify any infected files or services that may be causing issues. Remove them accordingly. - Secure the server from future potential attacks. Ideal Candidates Should Have: - Extensive experience in similar projects. - Exceptional skills in malware identification and removal. - Good understanding of DDoS protection measures. - Proficiency in server administration. In your application, kindl...

    $43 (Avg Bid)
    $43 Avg Bid
    18 bids

    My server reportedly is being used to initiate attacks on other servers using bruteforcelogin, please see attached file for more details. The strange thing is that everything seems normal; there's no unusual server behavior or unresponsive services. Existing on my server are several security measures, including a firewall and antivirus software. ImmunifyAV shows NO malware. Here's what you need to do for this project: * Inspect the server for possible vulnerabilities or breaches * Identify the source of the problem * Implement necessary corrections or improvements on the current security configuration * Get my IP unblocked Preferably, the selected freelancer should have: * Extensive experience in server security management * Proficiency in firewall and antivirus softw...

    $122 (Avg Bid)
    $122 Avg Bid
    33 bids

    I am looking for a seasoned Cybersecurity Professional experienced in conducting realistic attack simulations and incident reports. The goal is to understand how our systems respond against: - DDoS (Distributed Denial of Service) attacks - Malware attacks - Ransomware attacks These simulations should include our Network Servers, four VMs, and Files. Ideal Skills: - Proficiency in conducting DDoS, Malware, and Ransomware attack simulations - Experience in handling and securing network servers and virtual machines - Practical knowledge about file-based attacks and their prevention The final deliverable should be a detailed report that includes a thorough technical analysis of the attack simulations' results. The report should help us identify vulnerabilit...

    $56 (Avg Bid)
    $56 Avg Bid
    15 bids

    I'm looking for a Python script where I can pass a tweet URL to it and it will download the video(s) that are attached to the tweet similar to this:

    $27 (Avg Bid)
    $27 Avg Bid
    20 bids

    Job description: I am looking for a WordPress developer who can migrate my current WordPress website which is hosted on VPS to Hostinger. My website currently gets malware attacks very often and the developer has to ensure the security is good enough to prevent malware attacks.

    $139 (Avg Bid)
    $139 Avg Bid
    149 bids

    ...for embedded youtube videos - no auto-play - when thumbnail is clicked only then load embed code - default 1080p, sound 100%, with controls 4) Add support for reddit hosted videos - no auto-play - with controls 5) Add support for reddit image gallery 6) When a thread isn't loaded widen thread list so it takes up 100% width - When a thread is loaded slide it in from the right to the left - Above Tweet button place X button to close thread 7) Add new property 'Regex' for each subreddit added - For example, filter out threads that have a specific word in their title All values including 'Regex' need to be able to be imported/exported via "Import Data" and "Export Data" button on left bottom navbar Project must remain as a portable htm...

    $174 (Avg Bid)
    $174 Avg Bid
    39 bids

    I need a skillful Laravel developer to convert my old website. You will be required to preserve specific aspects through the transition, and also focus on boosting the security of the site. Key project requirements: - Expertise in Laravel, website conversions, and security measures. - Well-versed in protecting against SQL injection attacks. On this job, you'll have to: - Migrate the website into Laravel without losing its current features. - Implement anti-SQL injection measures. - Fortify the overall security of the website. A thorough understanding of website security is crucial for this role. Please share any similar projects you've completed. Let's build a safer web experience.

    $44 (Avg Bid)
    $44 Avg Bid
    19 bids

    My website was compromised last week, and I need the damage from the malicious code injection assessed and repaired immediately. Unfortunately, I do not have a recent backup to rely on. The perfect professional for this job would: - Have extensive experience in WordPress security - Be capable of identifying and mitigating these attacks promptly - Have a strong understanding of the latest threats and malware activities that can impact a WordPress website - Provide guidance on keeping my site secure moving forward Given the lack of backup, a keen attention to detail is necessary to ensure minimal data loss. Upon completion, I would like a detailed report of the attack and the measures taken to rectify the situation.

    $21 (Avg Bid)
    $21 Avg Bid
    31 bids

    ...Sniping: Ability to snipe any token as soon as liquidity is added. Be the first to buy any coin. Supported pools should be Raydium AMM, Jupiter, ORCA, Raydium CLMM, Flux. * Should be computer and mobile friendly so that I may use on my computer or Mobile device. * Be able to Maximize profits by exploiting positive arbitrage opportunities. Also the ability to frontrun and execute sandwiching attacks if need be. * MEV Protection: Ability to send transactions privately and avoid getting frontrun * Also need ability to completely control access to the bot. So if I wish to give access to someone else for testing i can control timeframe they have access via license keys that can be auto generated and expire after any timeframe that I set. Either they can link their personal S...

    $592 (Avg Bid)
    $592 Avg Bid
    22 bids

    I require an expert in networ...system capable of vigilant surveillance of all activities on medical IoT devices. - Attack Recognition: The device must be able to recognize "man in the middle" attacks. Familiarity with the dynamics of such attacks will be key. - Response Mechanism: This aspect was not specified, so I suggest a system that blocks network traffic as a preliminary standard. Skills and Experience: - Proficient in AI and machine learning algorithms - Knowledge of IoT devices, particularly medical ones. - Strong experience in Network security - Understanding of intrusion detection system mechanisms - Prior experience with "man in the middle" attacks is mandated. - expert in mininet wifi Your strategic suggestions and proactive inter...

    $570 (Avg Bid)
    $570 Avg Bid
    11 bids

    I want 10 users to tweet one industry news. Pictures and content will be provided.

    $30 (Avg Bid)
    $30 Avg Bid
    14 bids

    I'm looking for an expert in ghostwriting tweets. The primary focus of these tweets will be on industry trends. The tone I wish to capture is engaging - I don't just want to inform potential followers about the latest trends, but also captivate their interest and induce interaction. Experienced tweet ghostwriters with a comprehensive understanding of staying current and relevant in fast-paced industries are preferred. • Content Type: Tweets only (no replies/direct messages) • Subject Matter: Predominantly industry trends • Tone of voice: Needs to be engaging and captivating Ultimately, I need someone who can help me create a strong Twitter presence with tweets that not only inform but also engage my followers and promote interaction.

    $69 (Avg Bid)
    $69 Avg Bid
    37 bids

    I'm in urgent need of a professional who can help resto...urgent need of a professional who can help restore my personal blog website. It's currently redirecting to a malicious website - a problem I discovered after identifying infected files in the website's database. This is a critical situation that requires immediate attention. Key tasks will include: - Removing all infected files and malware from the website - Securing the website from future attacks - Restoring normal function and accessibility to the website The ideal freelancer for this job has significant familiarity and experience with blog website systems, a proven track record in malware removal, and solid knowledge of website security practices. The ability to work quickly and effectively under pres...

    $66 (Avg Bid)
    $66 Avg Bid
    55 bids

    ...location. Obtaining the contents of the proof files in any other way will result in loss of marks. 2. Technical Report Requirements You are required to write a professional report describing your exploitation process for each target. You must document all your attacks including all steps and commands issued. For each target machine you exploit, you must provide the target’s operating system name and IP address and detailed documentation to accompany the ethical hacking process. Your documentation should be thorough enough that your attacks can be replicated step-by-step by a technically competent reader....

    $184 (Avg Bid)
    $184 Avg Bid
    19 bids

    I am seeking an experienced UI/UX designer with a flair for vibrant and colorful aesthetics to build an app that exudes positivity and inclusivity. This app is aimed at individuals suffering from panic attacks and it will be designed for both the iOS and Android platforms. The core functionality of this app is to assist patients struggling with anxiety through targeted breathing and grounding exercises. Designed to provide relief and a sense of calm, the app should be intuitive, user-friendly, and highly accessible. Key Features: * Breathing Techniques: Incorporate the 4-7-8 and Progressive Muscle Relaxation breathing exercises as primary functions of the app. * Grounding Techniques: Implement the Body Scan and 5-4-3-2-1 grounding techniques as additional mechanisms for anxiety re...

    $51 (Avg Bid)
    $51 Avg Bid
    18 bids

    We're seeking a skilled Security Researcher/Ethical Hacker to identify and report vulnerabilities in our Jira Cloud application. The ideal candidate will have a proven track record ...problems have been resolved. Focus Areas Below is a list of some of the vulnerability classes that we are seeking reports for: Cross Instance Data Leakage/Access (Unauthorized data access between instances) Server-side Remote Code Execution (RCE) Server-Side Request Forgery (SSRF) Stored/Reflected Cross-site Scripting (XSS) Cross-site Request Forgery (CSRF) SQL Injection (SQLi) XML External Entity Attacks (XXE) Access Control Vulnerabilities (Insecure Direct Object Reference issues, etc) Path/Directory Traversal Issues ** Cross Instance Data Leakage/Access refers to unauthorized data access bet...

    $506 (Avg Bid)
    $506 Avg Bid
    28 bids

    ...runs around and kills monsters Game mechanics: and other similar 2D action RPG games that let you progress by chapters. Unlock new abilities every time you start a chapter Main tasks: - before applying, download and play for a bit so you understand how the game actually works. - after playing, estimate how much time will it take you to code the player attacks, monster attacks, talents, weapons, gear, etc. (no need for shop and other monetization) - follow the very detailed instructions provided to you inside our jira workbench (we have put every task in a very detailed and coherent description so that it will be easier for you to work) - constantly update us on your progress. - when applying your title should contain (I played and I understand the

    $3813 (Avg Bid)
    $3813 Avg Bid
    44 bids

    Developing an application on the Ryu controller in an SDN network. Initially, I aim to process data. Next, establish a AI agent for detecting and mitigating DDoS attacks. Finally, generate graphical curves to illustrate the results.

    $222 (Avg Bid)
    $222 Avg Bid
    9 bids

    I'm in need of a skilled Selenium developer with significant experience in enhancing internet security. You'll need to perform three key tasks: 1. Adjusting proxy settings 2. Enabling developer tools 3. Configuring privacy settings accordingly Ideal candidates should have a solid understanding of Selenium and browser security configurations. Experien...significant experience in enhancing internet security. You'll need to perform three key tasks: 1. Adjusting proxy settings 2. Enabling developer tools 3. Configuring privacy settings accordingly Ideal candidates should have a solid understanding of Selenium and browser security configurations. Experience in Chrome user agent configuration, cybersecurity, and expertise in dealing with SQL injection attacks and da...

    $22 (Avg Bid)
    $22 Avg Bid
    6 bids

    Our WordPress website urgently requires a skilled professional for malware removal and restoring all files without loss of data. In addition, our desired resolution includes the installation of effective security plugins to prevent future attacks. Key Project Elements: - Malware Removal: Our website is currently redirecting to unknown sites, running at reduced speeds and exhibiting the appearance of unsolicited pop-up advertisements. An experienced freelancer is required to efficiently eradicate these issues. - Restoration: Alongside the removal of the harmful software, ensure all files and data are completely restored. - Security Plugin Installation: After successful removal and restoration, install the Wordfence Security plugin. This has been chosen for its comprehensive fea...

    $44 (Avg Bid)
    $44 Avg Bid
    61 bids

    ...training-and-readiness-solutions/ 3. LinkedIn Application that integrates into the Job Opportunities user flow. 4. Review why the site fonts may have not gotten the right update in previous Wordpress theme updates. Fix fonts so they're not too small and implement responsive design for desktop, mobile and tablets. 5. Update the “Contact Us” page so that it is functional and free from robot attacks. 6. Review the Wordpress backend admin settings and verify that Wordpress and associated plugins are up to date. Make recommendations for security updates. 7. Review the possibility of adding a CDN layer in front of the site (Such as Cloudflare) for added site protection and features. If the needs are there and the team agrees, implement it. This allow for the conf...

    $89 (Avg Bid)
    $89 Avg Bid
    62 bids

    Are you looking for a WordPress malware removal and cybersecurity expert who offers great quality and affordable pricing? You have come to the right place. I will remove WordPress malware and fix your hacked WordPress site within 24 hours. I will also do comprehensive security hardening on your site so that it will be protected from future malware attacks and black hat hackers. My service includes: - Removal of malware from hacked WordPress site - Fix website redirecting to other site - Full website and database backup - Removal of backdoors and phishing scripts - Removal of fake admin accounts added by hackers - Updating all plugins and themes - Improving login security - Optimized configuration of security plugins - Protection against malware and im...

    $75 (Avg Bid)
    $75 Avg Bid
    1 bids

    I have a WordPress-based portfolio website currently riddled with malicious sites and ads. I'm also experiencing slow loading speed which is negatively affecting user experience. I need a professional with the following skills and experience: - Strong expertise in malware detection and removal - Deep understanding of WordPress security and encryption to prevent repeated attacks - Proficiency in optimizing WordPress for improved loading speed Specific tasks expected to be performed: - Comprehensive scan and removal of malicious sites and unwanted ads on my website - Implement robust encryption to ensure the original developers can't regain access - Identify and resolve issues causing slow page loading times Your approach to solving these issues should prioritize data s...

    $72 (Avg Bid)
    $72 Avg Bid
    68 bids

    ...understanding of database and server-level exploits is preferable, with the potential malware affecting more than just the website's frontend. • Backup Restoration: Since a backup of the website is available, experience with backup restorations is necessary. • Proactive Fortification: We need to ensure this issue doesn't recur. Your skills should extend to securing the website from future malware attacks. If you have a proven track record dealing with similar issues, possess the skills outlined above, and can work proficiently to secure my site, I'd welcome your bid. Let's fortify my website together....

    $40 (Avg Bid)
    $40 Avg Bid
    26 bids

    ...particularly in the area of DDOS attacks. Having basic understanding myself, I am looking for a professional who can create a simulation for me to learn from. The ideal freelancer for this project will: - Have a deep understanding of cybersecurity and DDOS attacks - Have the ability to create clear, educational, and interactive simulations - Be equipped to provide a detailed report on the simulation, detection, and mitigation process Additionally, being able to thoroughly explain the steps involved would be essential, as it would aid my understanding of the subject matter. Other keys to comprehending the nuances would be strong communication skills and patience. In summary: - Set up a DDOS attack simulation - Teach detection and mitigation of said attacks - Prov...

    $321 (Avg Bid)
    $321 Avg Bid
    8 bids

    I'm seeking a profic...group define text filters to choose which tokens to snipe. * Sniping: Ability to snipe any token as soon as liquidity is added. Be the first to buy any coin Supported pools should be Raydium AMM, Jupiter, ORCA, Raydium CLMM, Flux * Should be computer and mobile friendly * Be able to Maximize profits by exploiting positive arbitrage opportunities. Also the ability to frontrun and sandwiching attacks * MEV Protection: Ability to send transactions privately and avoid getting frontrun Ideal Skills and Experience: * Python Development * Blockchain Technology * Deep Understanding of Quantitative Strategies Algorithms and trading strategies * Familiarity with Solana network I value open communication, and look forward to working together on this ex...

    $250 - $750
    Sealed
    $250 - $750
    14 bids

    Currently using GoDaddy as my email provider, I am exploring options to enhance the security of my system. I am mainly facing challenges with malware attacks and am interested in identifying a robust solution. While I'm not certain if a cloud-based email security solution suits my needs best, I am open to suggestions. Key aspects for a potential candidate to consider: - Proven experience in handling email security problems, preferably with GoDaddy. - Knowledge of both cloud-based and non-cloud email security solutions. - Skills in diagnosing and resolving malware issues. - Ability to advise on the best course of action based on my individual circumstances. The project's successful conclusion will involve a secure email environment with significantly reduced malware th...

    $25 / hr (Avg Bid)
    $25 / hr Avg Bid
    39 bids

    ...breaches. Expansion on the tasks at hand: 1. Malware Analysis: Identify and analyze any malicious software that our Mac OS system may have been exposed to. Your analysis should provide insights into the malware's origin, functionality, and damage. 2. Incident Response: Assist me with managing this potential hacking incident. Implement effective strategies to limit the damage, preempt further attacks, and lead recovery efforts. 3. Computer Investigation: Carry out a detailed investigation of potentially hacking. You should be adept at uncovering information about the hacker’s identity, location, and techniques used. Ideally, candidates should have significant experience in cyber forensics, particularly with Mac OS. Additionally, expertise in malware analysis, incid...

    $561 (Avg Bid)
    $561 Avg Bid
    19 bids

    I'm in need of an accomplished web scraper that can capture all tweets by a particular sin...tweets by a particular single user. This task requires fine attention to detail, thoroughness, and a firm knowledge of web scraping technologies. It involves: - Extracting all tweets from the user, including tweets where the user replied. - Not incorporating any retweets the user has made. Only source material from the user. - Not conducting any special keyword or hashtag filtering. Every single tweet (that isn't a retweet) is required. Although not obligatory, previous experience in Twitter's API would be beneficial. Please be prepared to discuss your process in the proposal. If you accomplish the goal, there might be more work of a similar nature in the future. Looking for...

    $154 (Avg Bid)
    $154 Avg Bid
    18 bids

    ...removed it but I need to make sure that's all I have to do. I don't know enough about this to know if that's it or if there's other ways in Preferred Candidate: - Expert knowledge of cybersecurity best practices. - Proven experience in tracing hackers. - Excellent understanding of real-time monitoring, firewalls, antivirus software, and log analysis. - Previous experience in handling severe cyber attacks. Acting swiftly and accurately is a primary concern of mine in this sensitive situation. Sadly I do not have a lot of money right now but I will in the coming months so I guess I'm just looking for advice and someone to give me info on what to do myself as i can't afford to pay anyone to do the work for me. I have called the police but they don&#...

    $278 (Avg Bid)
    $278 Avg Bid
    17 bids

    We have a web app and trying to display Twitter posts but having a CORS issue - see attached pdf and description below from developer who started to write cloud function... "We were getting the 404 on the production only Browsers enforce a security feature called CORS, which restricts web pages from making requests to domains outside of ...to use this kind of setup on a firebase hosted project so the solution for this is I write a server-side "proxy" script to make the request from code running on our server and change the code in our home page to call the proxy instead of the remote resource so I will be using firebase cloud functions to achieve this so now I wrote a cloud function to handle this and get the response and show the tweet in our home page ..." t...

    $29 (Avg Bid)
    $29 Avg Bid
    25 bids

    We have a mobile app called Academic Ballers that we are also turning into a web app There are some issues with the desktop views specifically with displaying Twitter tweets - see attached pdf for more detail And this is what the current developer is saying the issue is: "we were getting the 404 on the production o...to use this kind of setup on a firebase hosted project so the solution for this is I write a server-side "proxy" script to make the request from code running on our server and change the code in our home page to call the proxy instead of the remote resource so I will be using firebase cloud functions to achieve this so now I wrote a cloud function to handle this and get the response and show the tweet in our home page " Experience writing custo...

    $201 (Avg Bid)
    $201 Avg Bid
    28 bids

    U...result its showing in thai language and google has termed it as Sitelinks searchbox error. Ideal freelancer skills: - Expertise in javascript hacking mitigation - Knowledge of hacking prevention measures - Strong understanding of website security Expectations: - Analyze and understand the causes of potential action targets being misdirected - Upgrade security measures to prevent future attacks In summary, we want to go beyond just fixing the problem - we'd like to substantially boost our website's security to protect it from future threats. Now more than ever, we understand the need for strengthened security measures and that's precisely what we're looking for from this job. We're eager to work with someone who can guide us through this process a...

    $379 (Avg Bid)
    $379 Avg Bid
    22 bids

    ...Framework Alignment and Compliance Defense in Depth Incident Response and Recovery Continuous Monitoring and Threat Detection Education and Awareness Information Sharing and Collaboration Technology and Process Innovation Legal and Regulatory Compliance Assets to Protect: - IT systems - Industrial control systems - Intellectual property - Customer data Potential Threats/Risks: - Malware attacks - Phishing attacks - Insider threats - Unidentified threats (to be identified through a comprehensive safety dashboard) Ideal candidate should have proven experience in cybersecurity, especially in creating and implementing strategies for large companies. Knowledge of the energy sector and regulatory compliance is a strong advantage. Professional certifications like CISSP or CISM...

    $630 (Avg Bid)
    $630 Avg Bid
    14 bids

    ...ensure the security of personal and financial data. Ideal candidates should have: - Experience with Python web development. - Knowledge of subscription management features and secure payment gateway integrations. - Past experience in SaaS website development. i got the source for fitching in pythone identify fitching in web sites but doesnt block the attack i need to modifay the code to block the attacks while the software is active in addition to use my web payment gateway as safe payment gate way after doing verfication on the recipiant creditability not scamer and has license process verfied transactions all verfication process to be consedired from fruade if some body has some thing ready it would be nice to cut on time. Consultations prior to the start of the project wil...

    $537 (Avg Bid)
    $537 Avg Bid
    58 bids

    ...long. 3. Editing OpenAI Prompt: - Provide a text input field for users to edit the OpenAI prompt used for summarization. - This input should be sent to the backend and used when generating the summary. Security and Performance - Ensure secure file transfers using HTTPS. - Authenticate users before allowing file uploads or edits. - Sanitize file names and user input to prevent injection attacks. - Implement rate limiting and handle API quota limits for OpenAI and Google Sheets. Testing - Write unit and integration tests for each API endpoint. - Test the file upload and splitting functionality with various file sizes. - Validate the transcription and summarization accuracy. Documentation - Document all API endpoints with their expected inputs and outputs. - Provid...

    $750 - $1500
    Featured Sealed
    $750 - $1500
    36 bids

    I'm looking to create tutorial videos for the game, Clash of Clans. The primary focus will fall on aspects such as base building, attack ...video editing skills for creating clear and engaging tutorials. Key Topics to Cover: • Base Building: This should cover designing defensive structures for the base, optimizing resource placement for efficiency, and maximizing the base's defensive capabilities, to help players create an impregnable fortress. • Attack Strategies: Share beneficial strategies that will help players mount successful attacks on opponents. • Clan Management: Teach players how to properly manage a clan for successful gameplay. The goal is to create comprehensive, easy-to-follow videos for Clash of Clans players, aiming to improve their game st...

    $2 / hr (Avg Bid)
    $2 / hr Avg Bid
    3 bids

    I require urgent assistance to clean up and secure my WordPress webpage against drive-by attacks which it has recently experienced. I also need skilled implementation of on-page SEO for 6 specific keywords. Key tasks include: - Improving site loading speed - Fixing and preventing broken links - Enhancing page design/layout for better UX - Beefing up site security to prevent future drive-by attacks - Implementing on-page SEO for my chosen keywords (Rätsche/Rätschen, Holzrätsche/Holzrätschen, Holzratsche/Holzratschen, Ratsche/Ratschen) Ideal freelancers should have proven expertise in WordPress site cleanup, security enhancement, and on-page SEO optimization. Past experience in dealing with similar projects would be highly appreciated. Please include rel...

    $178 (Avg Bid)
    $178 Avg Bid
    65 bids

    ...the content layout as per the Figma design - Translating color schemes and typography styles into the website - Ensuring the website is responsive on both mobile and desktop platforms - Optimizing the site for SEO to guarantee visibility on Google search with suggested links - Ensuring rapid loading times for all pages - Installing security measures to keep the site secure and resistant to attacks. The project calls for professionals with a deep understanding of WordPress or Webflow, excellent skills in SEO, cybersecurity, and responsive design. Experience with different typography styles, color schemes, and content layouts is a must. Work needs to begin ASAP, so please only bid if you're ready to start immediately. Features: ⁠Mobile friendly •⁠ ⁠Responsive deve...

    $281 (Avg Bid)
    $281 Avg Bid
    56 bids