Everyone uses the Internet for research. Unfortunately, it's full of malicious sites. Here's how to avoid them while you work.
Hi freelancers, i need malware removal and security implementation for my wordpress website. freelancer should have knowladge about web security, paylaod & malware removal from websites. please bid now. thanks
Need to recover docs on an url. But the access is forbidden.
We are looking for website security audit report by CERT Empaneled agency
I want a hacker to hack my website and tell me the 'open doors' so that I can fix those. It should be detailed hacking. You should be a good hacker who can hack website. Website is in PHP. We will host the website on a demo server for hacking. You will not get access to code.
Hello Dimtiry! I am an network engineer and I need to extract protocol descriptions from a binary file. It probably uses protobuf to pack messages. I need those discoveries to setup firewall in our infrastructure. Your goal would be to extract all mesage types and their payloads from the binary file that is used in TCP communication. The binary file is compiled C++ program for Linux or Windows. Let me know if you're interested!
The protocol is implemented using ECC based PKI scheme. I have to evaluate the scheme in terms of complexity (operations in each phase) and security (how it will resist certain attacks)
1-3 year Experience required: Python or Ruby or C Language Depth Information of TCP/IP Academic Writing, Technical Report Writing (Documentation) Configuring and Maintaining IDS:- Snort, Suricata Firewall Rules, IPTABLES Checking Vulnerabilities WINDOWS, LINUX. Knowledge of DNS LOOKUP Tools
I AM LOOKING FOR NETWORK ENGINEER WHO CAN HELP ME WITH LUMINATI TOOLS AND APPLICATIONS [login to view URL]
I need person who check website error and tell me the solution. I must fix this by myself. Before applying for this project be aware that i am not awarding project, until my problem is fixed. If person dont accept condition then please dont apply for this project.
My PCI Compliance has failed on 2 counts - can someone help me resolve this? See below.... 1. "This web server is reachable through a reverse HTTP proxy." 2. "According to its banner, the version of OpenSSH running on the remote host is prior to 7.6. It is, therefore, affected by a file creation restriction bypass vulnerability related to the 'process_open' function in the file 'sftp-server.c' that allows authenticated users to create zero-length files regardless of configuration.<br/><br/>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number."
I need someone with high coding skills or someone that wants to show off his hacking skills, i've been testing hundreds of hack already and made a lot of Top Globals with them in many games without getting banned or even someone be suspicious at me, so i wanna see what you are all about, private cheats are said to be the best but i think if only they are made by a proffessional.
Hello, I have a security problem with my website; I believe it is a SQL injection. Some data may have already been lost. I have details from the bug finder. More details can be provided. Please apply if you are well versed in security/hacking issues. Thanks
The report will include DR and BCP, and risk analysis of the identified risks and threats.
The Australian Physiotherapy Council (Council or APC) is the only accreditation authority to guarantee the standards for physiotherapy in Australia. We achieve this by accrediting Physiotherapy Education Programs in Australia. Another big part of our work comes from assessing overseas candidates who wish to come and practice physiotherapy in Australia. APC's main application is hosted on Azure Virtual Machines. The environment requires to be setup for increased security. Apply if you are a security expert with Azure and Windows expertise. If you are serious about applying your application will contain the words APC and "Azure Security Expert".
I am planning to build a project on Security Analysis for User online behavior on any web application. Computer science and Security documentation skills are needed.
We are a Tech Support Company, with over 150 employees. We're looking for professional teams to generate and manage a regular call volume for our Sales Team. Regions: USA, Canada, Australia, UK. Call volume: Currently we need an additional 500-700 calls per day, with a capacity to expand to over 2000 calls. Awaiting suitable proposals for the campaign. Regards, Saurabh Khanna.
Security researching with heavy expertise in analyzing software and developing software.
1. developing a secure hack for PUBG game includes player ESP, Player Health, Player Distance, Items ESP, Aimbot, Norecoil and no sway. 2. Bypass BE antihack engine 3. should have knowledge in dll injections and external overlays
The project involves setting up a linux servers, firewall, web servers, virtualization host, VPN and implement security measures for a private cloud. Total of 3/4 servers.
Empleo Digital es un proyecto para personas que quieran reinventarse en nuevas profesiones digitales para que se puedan incorporar al mercado laboral DIGITAL y mejorar su empleabilidad. Se necesita a docente para impartir curso presencial de Ciberseguridad en LUGO dando comienzo la formación a finales de Mayo 2018 hasta Octubre 2019 en horario de mañana de 9:00 a 15:00. El formador debe impartir la formación asignada, los materiales tanto del alumno como del docente ya están diseñados y se proporcionaran al comienzo del curso. La participación de la formación tiene que ser eminentemente práctica.
Wear-IT-All is a department store chain which is evolving in textile market due to its trend setter clothing products. The company has recently decided to host a web server in their network to account for an online shopping portal in order to cater increased demand for products and to strengthen its market. The company deployed a flexible, popular and open source http server - Apache 2.0, which can also make use of server-side scripting tools so as to facilitate dynamic web contents, on a CentOS Linux Server. The implementation was carried out by a system administrator trainee who had a very little understanding about server and network security. As part of testing he connected the web server to the internet and after a few days of monitoring he noticed that someone from a trusted IP address has been conducting TCP scans on the network. So, the company is worried that someone might be planning to attack the web server in the nearfuture. As a senior network systems administrator, your task is to propose a secure solution by implementing and configuring appropriate security tools so as to secure the server and network from potentially malicious activities. The company’s CIO requires your solution design to cover below requirements: Implementing ModSecurity with rules in place to protect the apache web server against SQL injection and Cross site scripting. (ModSecurity rules must be configured and included in the device configuration summary table.) Identifying at least 6 possible threats towards the CentOS Linux Server. You must also provide solutions to those threats. Identifying at least 6 threats towards the Apache web servers (other than SQL injection and Cross site scripting which is part of the first requirement). You must also provide solutions to those threats. Identifying at least 4 threats towards the network and protecting the network by implementing security solutions Including at least one test machine in your design to be able to test your security design.
New Project implementation of networking, all kind of network devices. Project of new company network and security setups. • Configuration and Implementations and monitoring Firewall TZ600, NSA 2600, 3600, 5600 FortiGate Firewall 300C and 500D • Configuration of the networking devices of Cisco 1921,2911, 4300. • HP Switches 1910, 1920 ,5500, 5100, Cisco switch 3600. • Implemented Aruba Wi-Fi With Airwave. • Implementation Network Monitoring tool MOTADATA for Monitoring Network devices, Servers and Wi-Fi. • Configuration routing protocol (Static routing) BGP, OSPF for MPLS link. • Network design MPLS, LAN and WAN Network. • Configuration of load balancing with ratio traffic will goes through multiple ISP and by automatically failover has been done on the SonicWALL TZ 600 , NSA5600, NSA3600, and NSA2600 Fortigate 50E , 500D firewall (Active – Active) • Implementation of GMS Server for managing and monitoring the uses access data of users wise. • Project of DATACENTER Shifted from Sify to IBM. • Migrated of Entire network infrastructure from Sify to TCL. • Network monitoring tool MOTADATA • Knowledge for implementation of DMZ environment. • Knowledge for implementation of Website hosting on cloud