Directly attack php site työt

Suodata

Viimeisimmät hakuni
Suodatusperuste:
Budjetti
asti
asti
asti
Tyyppi
Taidot
Kielet
    Työn tila
    7,193 directly attack php site työtä löytyi, hinnoittelu EUR
    C++ Program 6 päivää left

    ...each round beside the human loses 1/2 a heart The GP: The GP has 2 actions and 2 health Search for a AC to steal all the art They move as rapidly as possible to the human AC Attack the AC Once within 2 squares of a human they attempt to Steal all the Art for themselves 2 squares away: 65% chance of stealing a piece of art. If they successfully steal art

    €25 (Avg Bid)
    €25 Keskimäär. tarjous
    7 tarjoukset

    1. Someone who has multiple years of experience in setting up and monitoring Google Ad accounts (search, display, shopping, RDA, Video and analytics connections) across all types of industries and all/multiple Google Certifications 2. Someone who understands how to determine if something should be added as a negative keyword. That is, someone who has enough English fluency to recognize what doesn&...

    €11 / hr (Avg Bid)
    €11 / hr Keskimäär. tarjous
    10 tarjoukset
    Project for plane4you 8 päivää left

    Hi there, I am looking to hire a writer to write articles for my ... I am looking to hire a writer to write articles for my blog and write an e-book. My website and blog is [kirjaudu nähdäksesi URL:n] What would be your recommended plan of attack and budget moving forward? I have suggested a fixed price budget for an initial article. Can you write

    €65 (Avg Bid)
    €65 Keskimäär. tarjous
    1 tarjoukset

    ...brochure here [kirjaudu nähdäksesi URL:n] - Old website can be viewed here: [kirjaudu nähdäksesi URL:n] (content only, old design and plugins was lost/reset in a recent malware attack) - Deliver a professionally presented responsive WordPress site that must have consistent look for desktop and mobile devices. - Must use Evolve Plus WordPress

    €330 (Avg Bid)
    €330 Keskimäär. tarjous
    46 tarjoukset
    Trophy icon Create logo + style 5 päivää left

    ...yellow The colors of the *Snake: Turquoise, dark blue and yellow eyes. * We prefer that the snake will have a more friendly face, instead of a mouth with is open and in the attack position. The Cobra is a sign of awareness and meditation, so please take that into consideration please. Example pictures Fenix and Cobra snake. [kirjaudu nähdäksesi URL:n]

    €99 (Avg Bid)
    Taattu
    €99
    28 työtä
    Build and design e-commerce website 4 päivää left
    VARMENNETTU

    ...hand-on experience in PHP, PCI-DSS background, web-hosting, web-firewall IPS setting and configuration, web integration with bank account. Applying pre-testing for all website modules to ensure high level of security to eliminate any kind of cyber-attack such as sql-injection, XSS, CSRF, password dictionary attack or brute-force attack. Finally; for those

    €203 (Avg Bid)
    €203 Keskimäär. tarjous
    84 tarjoukset
    Trophy icon Logo Design :2 15 tuntia left

    Design a logo for me - The Theme Of Logo is: Heart Attack- Call > Ambulance>Hospital. Choice to have a 3D Logo. Heart Attack > Call > Ambulance & Hospital Feel. Thanks

    €11 (Avg Bid)
    Taattu
    €11
    22 työtä
    Build me a Penetration Testing Tool 4 päivää left
    VARMENNETTU

    ...they have a drop down list with the type of malware that they wish to launch (Trojan Horse, AdWare, DDoS, etc.) 3. They can then select the type of attack and then launch it 4. Upon selecting the attack, the backend will be responsible for launching the respective types of attacks with that category. Ex: If chosen "Trojan Horse", the backend coordinates

    €172 (Avg Bid)
    €172 Keskimäär. tarjous
    4 tarjoukset
    Create a Press Release for Godinterest 4 päivää left
    VARMENNETTU

    ...Godinterest was originally launched on December 2, 2012, then discontinued and later recreated after the website was purchased in April 2014 by Dean Jones. The site was hit with a series of DDoS attack soon afterwards. Godinterest founder Dean Jones refers to himself as a media publisher, dad, Christian, designer, and project manager. On December 20, 2017

    €107 (Avg Bid)
    €107 Keskimäär. tarjous
    27 tarjoukset

    ...servers and it must be fixed correctly. I haven’t logged on to my server for long time so not sure what’s happening. It’s a voice chat site with active users so you must be very careful. Also there is another issue, site is on SSL certificate , it should forward to https on its own, it hasn’t been working all the times, when a first time user type the

    €39 (Avg Bid)
    €39 Keskimäär. tarjous
    6 tarjoukset
    Project for Anudeep K. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Gili L. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for macitaytac 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    I need a windows application in C# that involves preventing ARP spoofing attack according to an algorithm that i will send to you (a flow chart) The idea depends on building a trusted ARP table at the server PC and then distributing that trusted ARP table among other clients. The clients PCs will start to enter static ARP entries to their ARP Cache

    €237 (Avg Bid)
    €237 Keskimäär. tarjous
    6 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Hashem A. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Saikumar U. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Features Finding and Algorithm Writing 2 päivää left
    VARMENNETTU

    ...finding from web server log file and writing an algorithm. Detail - The 3 web server log files will be provided to you. 1) Normal users log data 2) Robots log data 3) Malicious/Attack log data. You need to find out features of mentioned web attacks from web log file which will differentiate it from robot log data and from normal users' log data. Based upon

    €112 (Avg Bid)
    €112 Keskimäär. tarjous
    6 tarjoukset
    Project for Ahmed M. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Miftahul A. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Meenoy S. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Kemal H. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Robert Y. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Xiaodong C. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Joan A M. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Daniyal A. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Yuan N. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Aqeel F. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Xiaoqi D. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Chunyan Y. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Jin C. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €500 (Avg Bid)
    €500 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €488 (Avg Bid)
    €488 Keskimäär. tarjous
    1 tarjoukset

    ...Wordpress based and seem to have quite a few frequent attacks. What I would like to resolve is having you trying to attack in to my website and for example, injecting some code into my Wordpress blog. For a test, I will provide a test site for you. If you manage, I would like to work with you on a lot more projects to help us enhance. Please let me know

    €186 (Avg Bid)
    €186 Keskimäär. tarjous
    22 tarjoukset

    Hi, I've a big project that needs checking a function(10k-12k) lines of code and identify the vulnerabilities in the software. And also come up with solution to mitigate such risks. I will give detail to shortlisted candidates. Will hire 1 or 2 testers. Thanks!

    €19 / hr (Avg Bid)
    €19 / hr Keskimäär. tarjous
    13 tarjoukset

    Animation loops for the Airdrop Hunter 3D character for move and attack actions in 8 directions : top, top right, right, bottom right, bottom, bottom left, left and top left, with specific camera angle and shadow.

    €80 (Avg Bid)
    €80 Keskimäär. tarjous
    1 tarjoukset

    ...using this technique: [kirjaudu nähdäksesi URL:n] • The animations I would like you to do are an Idle, Walk, Attack stance and Attack. Please see this video for how a Funnel Web goes into an Attack Stance and Attacks: [kirjaudu nähdäksesi URL:n] • I will upload the fbx file to you when I award you the job. Thanks....

    €137 (Avg Bid)
    €137 Keskimäär. tarjous
    22 tarjoukset
    Facebook marketing 4 tuntia left

    ...prevent deseases and improve your health.... ** It will help with : Diabetes High blood pressure Kidneys Lupus Anemia Cancer Pain Insomnia (lock of sleep) Stroke Heart attack etc: ** WE ALSO HAVE ADDITIONAL SUPPLEMENTS * EYE LUTEN: FOR BLURRED VISION, WATERY EYES , DRY EYES... * SAW PALMETTO: FOR PROSTATE CANCER, PROSTATE INFLAMMATION

    €152 (Avg Bid)
    €152 Keskimäär. tarjous
    25 tarjoukset
    Trophy icon Book Cover Graphic Design Loppunut left

    ...with bulletproof vests and assault rifles. From coast to coast, America comes under brutal attack and the terrorists are just getting started. Further attacks take place at grocery stores, as people try and stockpile food. "Black Friday" becomes the bloodiest attack in American history. Graphic Ideas and Thoughts - I want to create a bold but simple

    €88 (Avg Bid)
    Kiireellinen Taattu
    €88
    173 työtä

    ...net/2f44/i/2013/265/7/e/[kirjaudu nähdäksesi URL:n] [kirjaudu nähdäksesi URL:n] Again with four animations: - Move - Idle - Attack - Combat Art (Corpse Eating on the ground, it is healing itself by that) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian

    €109 (Avg Bid)
    €109 Keskimäär. tarjous
    1 tarjoukset

    Animation loops for the hacker 3D character for move and attack actions in 8 directions : top, top right, right, bottom right, bottom, bottom left, left and top left, with specific camera angle and shadow.

    €80 (Avg Bid)
    €80 Keskimäär. tarjous
    1 tarjoukset

    Texturing of the 3D character "Miner" + animations loop of attack and walk and turntable

    €120 (Avg Bid)
    €120 Keskimäär. tarjous
    1 tarjoukset

    Attack and move animations loops for the scammer 3d character. Delivery in 6 intermediate positions.

    €80 (Avg Bid)
    €80 Keskimäär. tarjous
    1 tarjoukset