Attack joomla sites työt

Suodata

Viimeisimmät hakuni
Suodatusperuste:
Budjetti
asti
asti
asti
Tyyppi
Taidot
Kielet
    Työn tila
    6,679 attack joomla sites työtä löytyi, hinnoittelu EUR
    Work c++./ 6 päivää left
    VARMENNETTU

    ...round beside the human loses 1/2 a heart The GP: The GP has 2 actions and 2 health Search for a AC to steal all the art They move as rapidly as possible to the human AC Attack the AC Once within 2 squares of a human they attempt to Steal all the Art for themselves 2 squares away: 65% chance of stealing a piece of art. If they successfully steal

    €27 (Avg Bid)
    €27 Keskimäär. tarjous
    4 tarjoukset

    Which are the features/keywords of these attacks in web server access log file. So that these features will prove that this attack has done. Budget - 30 USD

    €24 (Avg Bid)
    €24 Keskimäär. tarjous
    6 tarjoukset
    Project for Darius J. 9 päivää left

    Hi Darius J., I have tried to contact yuo on whatsapp and free...contact yuo on whatsapp and freelancer in relation to the Openrwt work you carried out. Please can you confirm f you have been paid? I have been off work due to a small heart attack. We would like to pay you anything owed plus an additional amunt for your incovneience. many thanks Ben

    €9 / hr (Avg Bid)
    €9 / hr Keskimäär. tarjous
    1 tarjoukset

    I need help in this project which need to implement Cross-Site Request Forgery (CSRF) Attack Lab (Web Application), i need doc that contains explanation and screenshots of the solutions and the code (everything should be mentioned in the doc file) deadline 3 days Note: I do not accept ready solution from the internet. Thank you

    €177 (Avg Bid)
    €177 Keskimäär. tarjous
    5 tarjoukset

    ...help in this project which need to implement Cross-Site Request Forgery (CSRF) Attack Lab (Web Application), i need doc that contains explanation and screenshots of the solutions and the code (everything should be mentioned in the doc file) find the link below for (CSRF) Attack Lab [kirjaudu nähdäksesi URL:n]~wedu/seed/Labs_16.04/Web/Web_CSRF_Elgg/Web_CSRF_Elgg

    €44 (Avg Bid)
    €44 Keskimäär. tarjous
    1 tarjoukset

    ...each round beside the human loses 1/2 a heart The GP: The GP has 2 actions and 2 health Search for a AC to steal all the art They move as rapidly as possible to the human AC Attack the AC Once within 2 squares of a human they attempt to Steal all the Art for themselves 2 squares away: 65% chance of stealing a piece of art. If they successfully steal art

    €147 (Avg Bid)
    €147 Keskimäär. tarjous
    10 tarjoukset

    Hi, we are looking for a livery design to make our time attack RX7 more recognizable and stand out at the track. my team phase 50 motorsports has recently partnered with yokohama tire and idemitsu. we would like a logo designed for phase 50 motorsports and that logo to be incorporated in the livery design. we are looking to have primary colors red,

    €88 (Avg Bid)
    Taattu
    €88
    117 työtä
    Adjustments to 5.1 surround track 4 päivää left
    VARMENNETTU

    I have a sound track for a short film. I need a few tweaks to it, including creating a different monster attack sound. Then need the music track i have for the short film mixed in. The short is 16 minutes long. Must be able to mix 5.1 surround sound. Will need a stereo mix as well. I have $50 to spend.

    €45 (Avg Bid)
    €45 Keskimäär. tarjous
    9 tarjoukset

    ...finding from web server log file and writing an algorithm. Detail - The 3 web server log files will be provided to you. 1) Normal users log data 2) Robots log data 3) Malicious/Attack log data. You need to find out features of mentioned web attacks from web log file which will differentiate it from robot log data and from normal users' log data. Based upon

    €119 (Avg Bid)
    €119 Keskimäär. tarjous
    3 tarjoukset

    The eight queens puzzle is a well-known problem proposed in 1848. It is a problem of placing eight queens in a chessboard such that no two queens can attack each other. That means no two queens can share the same row, column or diagonal. In the classic problem of eight queens puzzle, we are looking for all possible solutions. However, in this project

    €637 (Avg Bid)
    €637 Keskimäär. tarjous
    3 tarjoukset
    Cryptography. woo and lam Pi 1 päivä left
    VARMENNETTU

    I need you to write a report for something. I have a question and answer, I need you to check the answer as well as rewrite it so ...question and answer, I need you to check the answer as well as rewrite it so that it is more professional and makes sense. Woo and lam Pi is a attack which can be carried out and naming flaw is a flaw within the attack.

    €9 / hr (Avg Bid)
    €9 / hr Keskimäär. tarjous
    8 tarjoukset

    ...[kirjaudu nähdäksesi URL:n]'[kirjaudu nähdäksesi URL:n] Again with animations: - Move - Idle - Attack (beak or front paws/talons) - Combat Art (beak of talons, the other one ;) - As you kindly offered, i would be happy about a dying animation As discussed, bonus for the last

    €110 (Avg Bid)
    €110 Keskimäär. tarjous
    1 tarjoukset
    ss7 attack Guide 1 päivä left
    VARMENNETTU

    Im need perfect learn about Ss7 attack to call and sms

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    2 tarjoukset
    C++ Program 1 päivä left

    ...each round beside the human loses 1/2 a heart The GP: The GP has 2 actions and 2 health Search for a AC to steal all the art They move as rapidly as possible to the human AC Attack the AC Once within 2 squares of a human they attempt to Steal all the Art for themselves 2 squares away: 65% chance of stealing a piece of art. If they successfully steal art

    €32 (Avg Bid)
    €32 Keskimäär. tarjous
    10 tarjoukset
    Project for plane4you 3 päivää left

    Hi there, I am looking to hire a writer to write articles for my ... I am looking to hire a writer to write articles for my blog and write an e-book. My website and blog is [kirjaudu nähdäksesi URL:n] What would be your recommended plan of attack and budget moving forward? I have suggested a fixed price budget for an initial article. Can you write

    €64 (Avg Bid)
    €64 Keskimäär. tarjous
    1 tarjoukset

    ...here [kirjaudu nähdäksesi URL:n] - Old website can be viewed here: [kirjaudu nähdäksesi URL:n] (content only, old design and plugins was lost/reset in a recent malware attack) - Deliver a professionally presented responsive WordPress site that must have consistent look for desktop and mobile devices. - Must use Evolve Plus WordPress template I've

    €329 (Avg Bid)
    €329 Keskimäär. tarjous
    45 tarjoukset

    ...integration with bank account. Applying pre-testing for all website modules to ensure high level of security to eliminate any kind of cyber-attack such as sql-injection, XSS, CSRF, password dictionary attack or brute-force attack. Finally; for those interested please write a proposal and quote me a rough price in order to have more discussion about the readiness

    €202 (Avg Bid)
    €202 Keskimäär. tarjous
    84 tarjoukset

    ...they have a drop down list with the type of malware that they wish to launch (Trojan Horse, AdWare, DDoS, etc.) 3. They can then select the type of attack and then launch it 4. Upon selecting the attack, the backend will be responsible for launching the respective types of attacks with that category. Ex: If chosen "Trojan Horse", the backend coordinates

    €172 (Avg Bid)
    €172 Keskimäär. tarjous
    4 tarjoukset

    ...originally launched on December 2, 2012, then discontinued and later recreated after the website was purchased in April 2014 by Dean Jones. The site was hit with a series of DDoS attack soon afterwards. Godinterest founder Dean Jones refers to himself as a media publisher, dad, Christian, designer, and project manager. On December 20, 2017, Godinterest introduced

    €107 (Avg Bid)
    €107 Keskimäär. tarjous
    26 tarjoukset

    ...basically give them a white page connection refused, so that need to be fixed as well and any other security issues. I do get daily drops and attacks someone been trying to hack attack daily for more than 2 years. If you do get the project you must take care of all the above issues and monitor the server for 10 days and solve any issues related, if these

    €43 (Avg Bid)
    €43 Keskimäär. tarjous
    5 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    I need a windows application in C# that involves preventing ARP spoofing attack according to an algorithm that i will send to you (a flow chart) The idea depends on building a trusted ARP table at the server PC and then distributing that trusted ARP table among other clients. The clients PCs will start to enter static ARP entries to their ARP Cache

    €237 (Avg Bid)
    €237 Keskimäär. tarjous
    6 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Jin C. Loppunut left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €499 (Avg Bid)
    €499 Keskimäär. tarjous
    1 tarjoukset

    A lot of my websites are Wordpress based and seem to have quite a few frequent attacks. What I would like to resolve is having you trying to attack in to my website and for example, injecting some code into my Wordpress blog. For a test, I will provide a test site for you. If you manage, I would like to work with you on a lot more projects to help

    €184 (Avg Bid)
    €184 Keskimäär. tarjous
    28 tarjoukset

    Hi, I've a big project that needs checking a function(10k-12k) lines of code and identify the vulnerabilities in the software. And also come up with solution to mitigate such risks. I will give detail to shortlisted candidates. Will hire 1 or 2 testers. Thanks!

    €20 / hr (Avg Bid)
    €20 / hr Keskimäär. tarjous
    14 tarjoukset

    Animation loops for the Airdrop Hunter 3D character for move and attack actions in 8 directions : top, top right, right, bottom right, bottom, bottom left, left and top left, with specific camera angle and shadow.

    €80 (Avg Bid)
    €80 Keskimäär. tarjous
    1 tarjoukset

    ...using this technique: [kirjaudu nähdäksesi URL:n] • The animations I would like you to do are an Idle, Walk, Attack stance and Attack. Please see this video for how a Funnel Web goes into an Attack Stance and Attacks: [kirjaudu nähdäksesi URL:n] • I will upload the fbx file to you when I award you the job. Thanks....

    €137 (Avg Bid)
    €137 Keskimäär. tarjous
    22 tarjoukset
    Facebook marketing Loppunut left

    ...prevent deseases and improve your health.... ** It will help with : Diabetes High blood pressure Kidneys Lupus Anemia Cancer Pain Insomnia (lock of sleep) Stroke Heart attack etc: ** WE ALSO HAVE ADDITIONAL SUPPLEMENTS * EYE LUTEN: FOR BLURRED VISION, WATERY EYES , DRY EYES... * SAW PALMETTO: FOR PROSTATE CANCER, PROSTATE INFLAMMATION

    €148 (Avg Bid)
    €148 Keskimäär. tarjous
    27 tarjoukset
    Trophy icon Book Cover Graphic Design Loppunut left

    ...with bulletproof vests and assault rifles. From coast to coast, America comes under brutal attack and the terrorists are just getting started. Further attacks take place at grocery stores, as people try and stockpile food. "Black Friday" becomes the bloodiest attack in American history. Graphic Ideas and Thoughts - I want to create a bold but simple

    €88 (Avg Bid)
    Kiireellinen Taattu
    €88
    173 työtä

    ...net/2f44/i/2013/265/7/e/[kirjaudu nähdäksesi URL:n] [kirjaudu nähdäksesi URL:n] Again with four animations: - Move - Idle - Attack - Combat Art (Corpse Eating on the ground, it is healing itself by that) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian

    €109 (Avg Bid)
    €109 Keskimäär. tarjous
    1 tarjoukset

    Animation loops for the hacker 3D character for move and attack actions in 8 directions : top, top right, right, bottom right, bottom, bottom left, left and top left, with specific camera angle and shadow.

    €80 (Avg Bid)
    €80 Keskimäär. tarjous
    1 tarjoukset

    Texturing of the 3D character "Miner" + animations loop of attack and walk and turntable

    €119 (Avg Bid)
    €119 Keskimäär. tarjous
    1 tarjoukset

    Attack and move animations loops for the scammer 3d character. Delivery in 6 intermediate positions.

    €80 (Avg Bid)
    €80 Keskimäär. tarjous
    1 tarjoukset
    Unity fighting game Loppunut left

    ...Different stats based on this -attack, defense, health, agility -8 different characters: animals ex lion, shark, whale. Can mix and match legs, body and head of each character -unlock characters body parts by your level or purchasing in game currency -1v1 battle -Pokémon style fighting turn based -each attack uses certain amount of energy

    €769 (Avg Bid)
    €769 Keskimäär. tarjous
    34 tarjoukset
    Unity game Loppunut left

    ...Different stats based on this -attack, defense, health, agility -8 different characters: animals ex lion, shark, whale. Can mix and match legs, body and head of each character -unlock characters body parts by your level or purchasing in game currency -1v1 battle -Pokémon style fighting turn based -each attack uses certain amount of energy

    €525 (Avg Bid)
    €525 Keskimäär. tarjous
    14 tarjoukset
    Unity game project Loppunut left

    ...-Leaderboards win/loss record -In game currency -In game store -each user has a level -Create a character customize his head body and legs. Different stats based on this -attack, defense, health, agility -8 different characters: animals ex lion, shark, whale. Can mix and match legs, body and head of each character -unlock characters body parts

    €521 (Avg Bid)
    €521 Keskimäär. tarjous
    18 tarjoukset
    Computer Networks Loppunut left

    ...A research paper on how game servers work  paper on Network Security/Forensics  a paper about NYC subway signal reception  hacking and cyber security  Man in the middle attack  Database system based on SQL  Sniffing unsecured network with a promiscuous NIC  Paper on network security in business  Security protocols for creatin a network  Create

    €90 (Avg Bid)
    €90 Keskimäär. tarjous
    13 tarjoukset
    NS-3 LTE module Loppunut left

    Design an LTE module in NS-3 simulator where we need to analyze resource depletion attack and defense mechanism and ddos attack and defense mechanism. We also need to analyze the energy utilization of the mobile device. Resource depletion mechanism parameters - bandwidth, latency, throughput.

    €119 (Avg Bid)
    €119 Keskimäär. tarjous
    2 tarjoukset

    Hi, I've some small projects that needs checking a function(10-12) lines of code and identify the vulnerabilities in the software. And also come up with solution to mitigate such risks. I will give detail to shortlisted candidates. Thanks!

    €22 / hr (Avg Bid)
    €22 / hr Keskimäär. tarjous
    9 tarjoukset

    ...Introduction. 2. Do not simply summarize papers. Write about a topic, and use papers to illustrate or prove points that you would make anyway. You may describe several studies that attack a problem in different ways, or compare studies that come to different conclusions about something, or choose a handful of really interesting studies that reveal something

    €92 (Avg Bid)
    €92 Keskimäär. tarjous
    27 tarjoukset

    Texturing and pose of 2 3D models + animation sprites of the attack and idle.

    €119 (Avg Bid)
    €119 Keskimäär. tarjous
    1 tarjoukset

    I need approximately 15 objects (all 32x32 except some), 10 of these should be composed ...of two sprites (a little animation) and then I need a character that simply moves up/down/right/left (so 9 sprites in total), and two characters that have same moves plus an attack (2 sprites animation). I'll put the style in attachment so you can see how it is.

    €163 (Avg Bid)
    €163 Keskimäär. tarjous
    30 tarjoukset