Simple Tips to Get Started on Encryption
How safe is your online communications? Here are simple tips on how to get started on encryption.
My files were encrypted by a hacker. I cannot do anything with the files. I want these files to be made available.
Hello, I'm looking for peneration testing partner; who can assist in professionaly "pentesting report" and provide helpfull knowledge to complete the report with not-less than 10-15 vulnerability with explaining. This is a test app where there is many of vulnerability inside it, so we need between 10 / 15 vulnerability to include it in our report, the report layout and description...
Hey. Ihave my binance bot working on a VPS Server. There are spamming issues to my bot. So I need to have strong settings firewall and ssl certified domain to use my vps server.
Research paper for Graphical password authentication for children
I would like someone to show me how to set up and run evilginx 2
Fix security and spam issues with open cart webstite
Hi, need trainers to prepare training material for the below technology NETWORKING & CYBER SECURITY CCNA, CCNP, Ethical Hacking
My company is a technology start up that sells cyber anti virus and internet privacy software to individuals and SMBs. My project includes building a website equipped with shopping cart that will enable users to download software for installation on their devices. The site will be built to withstand heavy traffic, easy to navigate and extremely user friendly.
There is a existing bug in my website. I need someone capable of Penetration Testing to to tell me why and how the Bug is happening.
I need a WEB Penetration Tester to to find a bug. Send me a msg to discuss more details.
I am not looking for indepth analysis - I need an independent audit in order to apply for a tender....need to satisfy the requirement and good to get your input... Need independent assessment of IT security - including security controls, security protocols, password management, system access, data security, data encryption, audit trail, audit logging.
Per the auditor's request, we need to perform a vulnerability assessment for the whole company. We have two servers (1 Windows Server 2016, 1 Linux) and around 10 Workstations (Windows 10). I want to hire a freelancer for providing the report.
MY PHOTOS GOT CORRUPTED/REPAIRED I CANT SEE MY PHOTOS IN MY LAPTOP/MOBILE/ANYWHERE. I WILL GIVE SAMPLE IMAGE FOR REPAIR. THOSE WHO DO THAT SAMPLE WORK DONE I WILL AWARD YOU AND CREATE MILESTONE TO GET REPAIR OF MY 20000 PHOTOS. KINDLY HELP ME TO REPAIR MY PHOTOS.
I HAVE BEEN AFFECTED BY KUUS VIRUS AND MY PHOTOS ARE GETTING DAMAGED BY VIRUS AND ENCRYPTED THROUGH ONLINE ID, CAN I GET THOSE PHOTOS DECRYPTED AND REMOVE ALL MY VIRUS FROM PC ?
c++ language, Linus, hack, buffer overflow, game debuting,
I would like to build a currency for people with a Graham's number USD (2021).
I need someone to do the following: - Scan the entire website for any malware, spam bots .... etc and remove them - Apply htaccess , or other things to make it difficult to scrape content from the website. - Applying CAPTCHA if user sends more than 2 requests within 10 seconds or less If you are interested in this project. Please write the following phrase " I am interested and capable o...
Need help migrating email from Outlook to Gmail.
There is a redirect virus that affects wordpress by creating and modifying the site's .htaccess files. When this happens we can easily restore the site since we have it versioned with GIT. The problem is that the virus always comes back and you always have to remove it manually. Bearing in mind the above we need to reinforce the security gaps that may exist in the page / server so that said ...
A complete VAPT OWASP for our application is required.
Hello , I had lost access to my email (Yahoo) , And i try to reset the password but i get this message , (Uh-oh... We can’t sign you in right now. Please try again in a while.)
Looking for a freelancer who is familiar with a reverse proxy on windows with GUI that can do the following tasks: 1. install SSL for an internal website which the website domain is [login to view URL] 2. install SSL on a reverse proxy that point to the local server and also change and rewrite the URL to [login to view URL] So the scenario will be like this Internal user>>access websi...
The questions should be from the following topics. Ensure there is no plagiarism. Cyber Security Networking Basic programming VAPT & SOC
Site contains 18+ content, only apply if you're okay with that! We are looking for a system administrator from the US, Canada or Australia so our team would cover a 24/7 monitoring service in case of any problem with our sites. We need a system administrator who is able to manage our existing Magento 2 e-commerce site on a new, dedicated server. Initially we'd like you to recommend a ...
*****Looking for a product designer**** For the first task I am looking for a product design for 1 product to see the quality and to see how we work together, if i feel like your are a good fit we can continue to work together in the future I'm starting a makeup company and i need more realist images with the measurements to send to the factories. I will also be needing a logo design ...
SSL website issue wont work for htpps//[login to view URL] LOOKING TO GET THIS FIXED WITHIN NEXT 2 HOURS
Hello everyone I am looking for a freelance nodejs developer that is able to do sniff website requests, and develop in node js. If you are you able to do this please bid
Responsibilities * Research and oversee security initiatives/programs to improve and enhance detect and response/recovery capability within the organization. * Act as the primary point of contact with the Managed Security Services Partner in response to the threats and possible attacks and intrusions. This includes conduct of root cause analysis of security incident and ensure control measures imp...
You have to protect screenshot and screenrecording on my website
The program btcrecover implements wallet password cracking for a variety of bitcoin wallets but not coinomi. Looking for someone to implement this for coinomi's AES wallet password NOT the seed phrase recovery. [login to view URL] Seed Phrase (Mnemonic) Recovery for the following wallets Electrum (1.x, 2.x, 3.x and 4.x) (For Legacy and Segwit Wallets. Set --bip32-path "m/0'/0...
I need you to help me fix my hacked opencart site. It all started when I uploaded a two factor authentication module. That broke my site but fixed it. I had a developer help me with the two factor authentication issue and she had me show her my config file so she saw my db username and password. So, I think she hacked it. I changed the DB password and I noticed that after I changed the DB password...
My task is for educational purposes, and I have been offered the challenge from a friend, however, I'm stuck on this question: This task may be fun for some folks. But basically, I think it's AES. The input: G9S4DZ2 or 35419946942 (which is just base10 of first variable) output: OTAwSEt5SitUU3F2YnlhTk5wSEpYQT090 which is base64 for: 900HKyJ+TSqvbyaNNpHJXA== From there, I have no ...
I need someone with strong skills regarding website security issues such as scrapping presentation, ddos attacks.. preventing spammy posts .... etc Currently I am facing problem from people using bots to scrap pages of my site. I need to solution to this problem.
SLR in cyber security in critical infrastructure for master degree student
I need someone with strong skills regarding website security issues such as scrapping presentation, ddos attacks.. preventing spammy posts .... etc Currently I am facing problem from people using bots to scrap pages of my site. I need to solution to this problem.
anyone here who is expert in kali Linux operating system please tell me i will give peoject details.
Hello I am looking for a freelance nodejs developer that is able to do sniff website requests, and develop in node js. Are you able to do this if so please bid
I have created an HTML form, it's already validated with Javascript. I will capture 6-20 data points, I need two forms, one short version, and one long-version. The short version will be added to capture name, email address, and phone number, the longer one will capture, name, address, email, #'s, work#, and a few other data points. The goal is to send this data to php. No DESIGN WILL BE...
Must have good communication skills Must have great knowledge with splunk configuration SIEM knowldge/experience must
I need someone with strong skills regarding website security issues such as scrapping presentation, ddos attacks.. preventing spammy posts .... etc Currently I am facing problem from people using bots to scrap pages of my site. I need to solution to this problem.
I have a plugin the is conflicting with cloudflare firewall. The issue is with : /wp-json/wc/v3/pos_orders/ being blocked . I have created a rule to allow this path but it still seem to be blocking it . I do not want any security levels decreasing, I only want to find a way to allow this certain url . Thank You
looking for someone who can help me of taking a proxy call for Cybersecurity/Information Security
Hi, Our merchant account is suspended due to "misrepresentation" - we need this error fixed and want our ads running asap.
Urgently Need A Computer Hacking Forensic Investigator (CHFIv10) or a Forensic Investigator. Rest of the Details I will DM you
A classified business software that enable people do business together
Hello Team, We are looking for a Guy. who has good knowledge or Expert in Server Security.
Looking for a freelancer to look into cybersecurity(Social media,IP Address) matter.
i am looking for dealing with Real World Practices for Cyber [login to view URL] you have strong background bid please
Meddco Online Doctor Appointment app for you to book & consult with the city's top doctors online safely from home. Book an appointment with just a single click or call Take a look at our website so that you can get an idea. Visit: [login to view URL]
How safe is your online communications? Here are simple tips on how to get started on encryption.
Google has blocked an extensive number of Wordpress-based sites due to a malware attack by SoakSoak.ru
Building a web application is easy - building one that meets all security requirements is hard. This article covers the 5 popular security practices.