Arp spoofing projectemplois

Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    1,259 arp spoofing project travaux trouvés au tarif de EUR

    Realization of security attack simulations on SDN (Software defined networks) on a virtual environment using kali linux Attacks like Dos, arp poisoning... the important thing is to have the steps to follow up in order to perform an attack on SDN It's possible to exploit the openflow protocol vulnerabilities on this simulation It's for my bachelor project !!! On network security field Thank you

    €220 (Avg Bid)
    €220 Offre moyenne
    3 offres

    I am looking for an experienced computer networking expert who can assist me in enhancing my understanding of network protocols, routing and switching, and network security. I am going to have an online at home test at 3pm EST(Eastern Standard Time) to 5pm on April 18th so I need just two hours of your time. The lect...plane - Section 5.5 (5.5.1, 5.5.2, 5.5.3, 5.5.4) - ICMP: The Internet control message protocol Section 5.6 >> The link layer and LANs: Chapter 6 - Introduction to link layer - Section 6.1 - Error detection and correction techniques Section 6.2. - Multiple access links and protocols Section 6.3. - Switched local area networks - Section 6.4 - Link Layer addressing and ARP 6.4.1 - Ethernet - section 6.4.2 - Link layer switches...

    €98 (Avg Bid)
    €98 Offre moyenne
    14 offres

    ...skilled professional to conduct a network security test on our workstations using ARP poisoning techniques. The focus of this project is to identify vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someone with...

    €60 (Avg Bid)
    €60 Offre moyenne
    15 offres

    I'm looking for an expert in email spoofing for an intriguing project. I need someone who can send an email to me that appears from a specific domain or address I provide. The ideal candidate would be someone who can disguise the email source skillfully yet ethically. The email should contain detailed, specific information. Highlights of this project include: - Using a specific domain or email address to hide the real source - Crafting an email with specific data and information You should have: - Skills in ethical spoofing methods - Understanding of email protocols - Exceptional copywriting abilities to write engaging, detailed emails. This project can be a fun challenge for those who enjoy working with specifics and puzzles within the realm ...

    €117 (Avg Bid)
    €117 Offre moyenne
    45 offres
    Swift UI Face Anti-Spoofing App S'est terminé left

    I need a skilled iOS professional to develop a Swift UI mobile application centralized on face anti-spoofing. The app must include: - Facial recognition: The app should successfully recognize and capture faces. - Liveness detection: The software should be able to distinguish between an actual person and a face in a photograph, video, or mask. - Anti-spoofing detection: The application should include mechanisms to detect and prevent fraudulent face representation. Can use this Python project for what we need for the application. It needs to detect a Real face versus a fake face in real-time and if it is a Real Face, take a selfie. Please note the app is exclusive for iOS, so knowledge in the specific platform is crucial. The ideal candidate

    €1117 (Avg Bid)
    €1117 Offre moyenne
    74 offres

    I'm seeking an IT expe...The main objective of this project is to elevate my email deliverability. I'm completely new to DMARC, (Domain-based Message Authentication, Reporting & Conformance) policy, so I need someone patient, communicative, and adept to walk me through it. Job Responsibilities: - Application of DMARC policy to my Gmail DNS - Enhance email deliverability by preventing email spoofing and bolstering email security Ideal Candidate: - This job requires notable experience in handling DNS systems, particularly Gmail - Thorough understanding of DMARC policy application is a must - Excellent communication skills to explain the steps taken, in a way that is understandable to a beginner in DMARC policy. Shape the future of my email security and j...

    €107 (Avg Bid)
    €107 Offre moyenne
    17 offres
    ARP Network Troubleshooting S'est terminé left

    I need a skilled network analy...skilled network analyst who can examine an ARP request and reply message within my network. The purpose of this project is network troubleshooting. - Use Wireshark - Focus on personal computers - Generate a report outlining patterns or oddities - You should be knowledgeable about detecting intrusion, maintaining network security, and problem-solving in complex network environments. Experience with the Wireshark tool is essential. Your goal is to give a clear snapshot of the situation with the ARP request and reply messages. Here are the deliverables: - ARP request and reply messages log - A detailed report about these ARP messages and potential problems Please, only bid if you have a concrete understanding of Wiresh...

    €31 (Avg Bid)
    €31 Offre moyenne
    5 offres

    I am in need of an advanced face recognition web ...url or anyway to integrate a existing PHP app) or API (by sending photo) for purposes of liveness detection. Key features for this project should include liveness detection utilizing facial movements and eye blinking as anti-spoofing measures - this will contribute to robust security. Once the identity verification is successful, the application should send the image by POST passing arguments to identify the user. Experience in creating highly secure web applications, as well as a comprehensive understanding of facial recognition technologies and anti-spoofing techniques free and open source, will be essential for the successful completion of this project. Moreover, a tested ability to integrate API features...

    €73 (Avg Bid)
    €73 Offre moyenne
    10 offres

    ...to be developed aims to provide facial recognition and anti-spoofing capabilities to integrate into already existing applications. It will focus on being a hybrid component compatible with Flutter, allowing its use on both iOS and Android devices. Importantly, no significant effort will be required in creating an elaborate user interface, as the SDK will be integrated into another pre-existing application. Instead, the emphasis will be on ensuring that face detection, face comparison, and anti-spoofing features work optimally and are easily integrated into the main application workflow. i need somone who could work on it quick please Key Features Required: * Face detection * Face recognition * Liveness detection * Anti-spoofing capabilities Ideal Skills and Exper...

    €146 (Avg Bid)
    €146 Offre moyenne
    20 offres

    This project demands the structuring of a beginner-level tutorial that expands comprehension on the concept and theory underlying spoofing emails and text messages. The ultimate aim is to harness the knowledge for the purposes of ethical hacking. Key focus areas: - Fundamentals of Email and Text Message Spoofing. - Core Concepts that Govern Ethical Hacking. - Understanding the Interface between Spoofing and Ethical Hacking. A potential candidate for this project will ideally have: - Extensive experience in cybersecurity and ethical hacking. - Innovative teaching skills to simplify complex concepts. - Proficiency in course structure and creation. Your assignment is to enlighten beginners with zero experience about the theory behind spoofing, im...

    €22 / hr (Avg Bid)
    €22 / hr Offre moyenne
    20 offres

    Creating a Bluestacks emulator like a real Android device while meeting the specified requirements involves several technical steps. Below is a step-by-step guide to achieve this: Spoofing Methodology: Develop or find an app-based or Play Store-based spoofing solution. This involves creating or finding an application that can manipulate device information such as IMEI, Android ID, device model, etc. The spoofing solution should preferably work at the system level to provide a more comprehensive emulation of a real Android device. Android Version Selection: Configure the Bluestacks emulator to run either Android 7 or Android 9. You may need to use custom ROMs or images compatible with Bluestacks for these versions. Root and Xposed Bypass: Implement a solution that d...

    €82 (Avg Bid)
    €82 Offre moyenne
    5 offres

    I don't accept cloning apps like appcloner. 1-Spoofing will be app based and play store based or fully system based. 2-We prefer android 7 but if not possible android 9 is fine too. 3-we need no root and no xposed solution if available 4-We need to bypass app based safetynet can use any safetynet checker app to check your settings. 5-We need an app for changing android fingerprints and hiding root, hiding xposed if you use can suggest us apps instead of creating them or you can inject codes to the 'll consider economic solutions for the apps you suggest. 6-The app name we will use is no matter for can check your settings via test apps. 7-Solution will be for multi bluestacks instances and will work for a long time.

    €522 (Avg Bid)
    €522 Offre moyenne
    36 offres

    As a cybersecurity enthusiast looking to deepen my understanding, I need an expert with strong skills and experience in email spoofing, CNAME record manipulation, mailing setup, and domain configuration. Key Objectives: - Successful demonstration of email spoofing for educational purposes - Setting up mailing system and DNS configuration - Detailed walkthrough of CNAME record manipulation Professional Requirements: The ideal candidate should demonstrate a comprehensive understanding of the following areas: - Email spoofing techniques - CNAME record manipulation - Mailing system setup - Domain configuration This project is purely intended for knowledge acquisition and educational purposes, therefore, any advice or demonstration should comply with ethical gui...

    €106 (Avg Bid)
    €106 Offre moyenne
    13 offres
    Resolve Fortnite PC HWID Ban S'est terminé left

    ...**Efforts Already Made:** - Attempted basic troubleshooting myself, including: - Reinstalling Fortnite - Changing some hardware components - Using various VPN services **Ideal Skills and Experience:** - Proficient in handling and resolving HWID bans for PC games, especially Fortnite. - Familiarity with the intricacies of gaming security and anti-cheat mechanisms. - Experience in modifying or spoofing hardware IDs securely without compromising system stability. - Knowledge of network security practices to advise on the safe use of VPNs or similar technologies to avoid future issues. - Ability to provide a step-by-step plan on how to avoid such bans in the future, emphasizing safe and fair gameplay practices. I'm looking forward to collaborating with someone who can gu...

    €141 (Avg Bid)
    €141 Offre moyenne
    7 offres

    I'm searching for a proficient SIP/Asterisk engineer who has ample experience in performing the following tasks: - Setting up and configuring an Asterisk server - Ensuring that the server is set up for high security and can support telemarketing or sales calls - Adding a specific function of calling and spoofing numbers, to be used exclusively for telemarketing and sales purposes Ideal skills and experience for the job: - Extensive experience with Asterisk and SIP protocols - Past-experience in setting up IVR systems - Understanding of server security measures - Familiarity with telemarketing systems Please provide a summary of your relevant work experience and your approach to this task in your bid.

    €594 (Avg Bid)
    €594 Offre moyenne
    16 offres
    AWS Expert S'est terminé left

    ...container service, Lambda, Elastic beanstalk, S3, EFS, Storage gateway, Glacier, VPC, Direct connect, Transit Gateway, ELB, Auto Scaling, ACM, Cloud Front, Cloud Formation, Cloud Watch, Cloud Trail, SNS, SES, SQS, SWF, IAM, RDS, DynamoDB, Elasticache, Redshift, AWS Backup · Operating Systems: UNIX, Redhat LINUX, Windows · Networking & Protocols: TCP/IP, Telnet, HTTP, HTTPS, FTP, SNMP, LDAP, DNS, DHCP, ARP, SSL, IDM 6.0 and 7.0 · DevOps Tools: Puppet, Chef, Subversion (SVN), GIT, Jenkins, Hudson, Puppet, Ansible, Docker and Kubernetes · Scripting Languages: UNIX Shell Scripting (Bourne, Korn, C and Bash), Python, Perl Scripting, · Database: Oracle, Amazon Aurora, MySQL, MariaDB, PostgreSQL, Microsoft SQL Server · Version Controlling ...

    €7 / hr (Avg Bid)
    €7 / hr Offre moyenne
    1 offres

    ...presence in a virtual training environment. Interested candidates, please submit your resume, a brief summary of your experience with serverless architectures and threat modeling, and samples of previous training outlines or materials you have developed. Awaiting your professional proposals. Additionally as a screening round , provide answer to below questions while applying for this project: 1. **Which of the following best describes a serverless architecture?** A. Architecture where the server is hidden from developers B. Architecture where the server management is outsourced C. Architecture where the management of servers is on-demand and scalable D. Architecture without the use of servers for any computation 2. **What is a primary ben...

    €35 / hr (Avg Bid)
    €35 / hr Offre moyenne
    3 offres
    Boost Email Deliverability Today S'est terminé left

    ...Skills and Experience:** - Proficiency in configuring email authentication methods, particularly with Gmail. - Expertise in DNS management and modification. - Solid understanding of email security standards, including DKIM and DMARC. - Experience in troubleshooting and improving email deliverability. This project demands meticulous attention to detail to ensure that both DKIM and DMARC are set up correctly, not only to increase email deliverability but also to safeguard against email spoofing. Freelancers with prior experience in enhancing email security and deliverability, especially within Gmail environments, are encouraged to bid....

    €135 (Avg Bid)
    €135 Offre moyenne
    13 offres

    I need a camera spoofing app like the attached video. I don't need ID card feature, just live feed spoofing. I should be able to select a verification video (short clip holding the verification pose) when Tinder prompts me to verify. I need this app working on Tinder, bumble, and badoo

    €579 (Avg Bid)
    €579 Offre moyenne
    60 offres

    ...skills and a strong presence in a virtual training environment. Interested candidates, please submit your resume, a brief summary of your experience with serverless architectures and threat modeling, and samples of previous training outlines or materials you have developed. Rate: $40-$60 per hour Additionally as a screening round , provide answer to below questions while applying for this project: 1. Which of the following best describes a serverless architecture? A. Architecture where the server is hidden from developers B. Architecture where the server management is outsourced C. Architecture where the management of servers is on-demand and scalable D. Architecture without the use of servers for any computation 2. What is a primary benefit of serverless comput...

    €47 / hr (Avg Bid)
    €47 / hr Offre moyenne
    1 offres

    In this project, we aims to create a website or application that leverages multiple cloud servers worldwide to process user searches across various geographical regions, with a primary focus on shopping queries sourced from Google Shopping. Users will select different locations, and their search phrases will be queried as if from those destinations, aggregating and displaying results on a single page. To begin, our Minimum Viable Product (MVP) will simulate server locations using address spoofing methods, such as those utilized by ' ', to conduct searches on Google and present consolidated results.

    €20 / hr (Avg Bid)
    LDN
    €20 / hr Offre moyenne
    44 offres

    Desarrrollo de un SDK para flutter para realizar el reconocimiento facial en tiempo real para aplicaciones hibridad ios y android. no se necesita hacer tanta complejidad de la interfaz ya que el sdk se integrara en otra app ya desarrollada. Solo se debe desarrollar el reconocimiento, de ids, nombres de las personas. * Desarrollado en flutter ...flutter para realizar el reconocimiento facial en tiempo real para aplicaciones hibridad ios y android. no se necesita hacer tanta complejidad de la interfaz ya que el sdk se integrara en otra app ya desarrollada. Solo se debe desarrollar el reconocimiento, de ids, nombres de las personas. * Desarrollado en flutter para reconocimiento facial 1:N. * Si es posible que el reconocimiento tenga anti-spoofing * Uso infinito en N aplicaciones...

    €470 (Avg Bid)
    €470 Offre moyenne
    30 offres

    ...developing an automated scheduling system for attendance marking. **What I Need:** - Development of a method to bypass or emulate fingerprint authentication effectively. - Implementation of location spoofing that satisfies app requirements without manual intervention. - Creation of an automation scheduler to perform attendance tasks at predetermined times. **Ideal Skills and Experience:** - Proficiency in mobile application development, particularly in Android or iOS platforms, depending on my device. - Experience with security features such as fingerprint authentication and GPS location spoofing. - Knowledge in automation and scripting to facilitate scheduling tasks within the application's needs. - Capability to provide a robust, user-friendly solution that integr...

    €23 (Avg Bid)
    €23 Offre moyenne
    2 offres
    Restore Authenticity: IG Help -- 2 S'est terminé left

    I urgently require a savvy Instagram expert to address a pressing issue – my account is being spoofed, and it's affecting my follower count. - **Main Goal**: Implement measures to prevent altering the visual representation of my followers count. This spoofing issue presents with erratic loss and gains, not reflective of genuine follower interactions. - **Challenges**: - Addressing follower count discrepancies - Preventing unauthorized spoofing activities - **Skills Needed**: - Proficiency in Instagram's security features - Experience with social media analytics - Understanding of Instagram's algorithm regarding follower engagement - Strong problem-solving abilities related to social media issues - **Expected Outcomes**: A restored and sec...

    €508 (Avg Bid)
    €508 Offre moyenne
    19 offres
    Secure Zoho Email ASAP S'est terminé left

    I need expert assistance to bolster my email defense mechanisms. My goal is to rapidly integrate top-tier email authentication standards with my Zoho mail to minimize the risk of phishing and spoofing attacks. **Essentials:** - Implement SPF, DKIM, and DMARC protocols. - Expect completion within a week. - Requires basic Zoho configuration. **Skills Needed:** - Proficient in email security protocols. - Experienced with Zoho Suite. - Strong understanding of DNS configurations. Do you have the expertise to tighten my email security without delay? Reach out and let's fortify my Zoho mail system.

    €20 / hr (Avg Bid)
    €20 / hr Offre moyenne
    40 offres
    Restore Authenticity: IG Help S'est terminé left

    I urgently require a savvy Instagram expert to address a pressing issue – my account is being spoofed, and it's affecting my follower count. - **Main Goal**: Implement measures to prevent altering the visual representation of my followers count. This spoofing issue presents with erratic loss and gains, not reflective of genuine follower interactions. - **Challenges**: - Addressing follower count discrepancies - Preventing unauthorized spoofing activities - **Skills Needed**: - Proficiency in Instagram's security features - Experience with social media analytics - Understanding of Instagram's algorithm regarding follower engagement - Strong problem-solving abilities related to social media issues - **Expected Outcomes**: A resto...

    €465 (Avg Bid)
    €465 Offre moyenne
    24 offres

    I'm looking for a knowledgeable professional to assist in improving my email deliverability. Your task will involve enhancing the security and authenticity of my emails, to ensure they land safely in the recipients' inbo...legitimacy of my emails. - Google Workspace: My business currently uses Google Workspace as our email service provider. Familiarity with this platform is crucial for successful implementation of the aforementioned protocols. Skills and Experience: - Advanced understanding of DMARC, DKIM, and SPF - Proven experience with Google Workspace - Expertise in improving email deliverability and preventing spoofing. Through your work, we aim to minimize the occasions when our emails end up categorized as 'spam'. A proven track record in such impro...

    €33 / hr (Avg Bid)
    €33 / hr Offre moyenne
    20 offres
    Email Compliance Overhaul S'est terminé left

    ...with clients hosted on servers I rent. Several of the clients have either Mail Chimp or Constant Contact. I want to learn how to add the proper CNAME, TXT DNS settings so their emails follow new standards and compliance for delivery. I know the basics, but want to have a more clear understanding of: - Implement DKIM: Configure DomainKeys Identified Mail to validate outbound emails, preventing spoofing. - Set up DMARC: Deploy Domain-based Message Authentication, Reporting, and Conformance to specify how receiving servers handle unauthenticated emails. - Ensure Policy Enforcement: Adjust policies for strict compliance adherence and report on email traffic. - Guidance on Best Practices: Advice on maintaining and updating security protocols. - rau IDEAL CANDIDATE: - Proficient in ...

    €32 / hr (Avg Bid)
    €32 / hr Offre moyenne
    6 offres
    Partialspoofed audio detection S'est terminé left

    I'm seeking an AI expert to develop a system focused on the detection of partially spoofed audio signals. The objective is not merely to recognize tampering but to ensure authenticity in audio streams, possibly for security or proprietary content protection. Key Aspects of the Project: - Implement cutting-edge algorithms designed to detect audio spoofing. - Integrate the AI with existing systems for seamless operation. - Prioritize accuracy and reliability in detection. Ideal Skills: - Proficiency in AI and machine learning, especially in audio analysis. - Experience in signal processing and anomaly detection. - Ability to implement solutions that can perform with a high degree of precision. - Familiarity with real-time processing is a plus, given the lack of clarity o...

    €79 (Avg Bid)
    €79 Offre moyenne
    2 offres

    ...skilled freelancer to immensely improve our existing project. This involves enhancing the functionality of an AI Audio Spoofing Detection System. Work primarily entails updating the current code and implementing the revamped system effectively. Here's a little more about what's needed: - Code Enhancement: You'll be tasked with refining our current system. It's been written in Python, and we expect you to be proficient in this language and ideally experienced in AI/ML projects. - System Implementation: After updating our code, your second task will be to integrate the improved system ensuring top-notch performance. Ideal candidates should possess skills and experience in Python, AI/ML, and have a sound understanding of audio spoofing detect...

    €486 (Avg Bid)
    €486 Offre moyenne
    9 offres
    Precision Location Privacy Enhancer S'est terminé left

    I'm seeking a specialized freelancer to create a highly accurate wifi geolocation spoofing tool for Android to bolster my location privacy. Your expertise will help me keep my whereabouts concealed for personal privacy. Ideal Candidate Skills: - Proficient in Android app development - Knowledgeable in geolocation technologies - Experienced in VPN/spoofing techniques - Understanding of privacy and security protocols Requirements: - Develop an Android-compatible geolocation spoofing app. - Ensure high accuracy in spoofed locations. - Prioritize privacy and undetectability. - Offer a user-friendly interface. Expectations: - Work within set deadlines. - Communicate progress regularly. - Provide post-development support for troubleshooting. I'm looking forward...

    €121 (Avg Bid)
    €121 Offre moyenne
    9 offres

    Dear professionals in the field of programming and artificial intelligence, My name is Jorge Moreno, General Manager of SELLO ARP, S.L., a pioneering and leading company in quality certifications for online training programs. At SELLO ARP, we are undergoing a digital transformation process aimed at optimizing our audit system. Our goal is to implement an artificial intelligence-based solution capable of autonomously evaluating whether an online course meets our rigorous quality standards. This AI will need to perform the following tasks: Precise and Strict Analysis: Accurately and thoroughly evaluate each course, ensuring adherence to our quality standards. Constructive Feedback: Provide clear feedback and recommendations to help course providers continuously impr...

    €2045 (Avg Bid)
    €2045 Offre moyenne
    20 offres

    "I am seeking an ethical hacker specialized in email security. My Outlook email has been compromised, and I have currently lost all access. I suspect it might be the result of unauthorized access, phishing attempts, or email spoofing. Your job is to help me regain control of my email account. Skills and Experience: 1. Email Security: Extensive experience in ethical hacking and email security protocols. 2. Outlook Familiarity: Proficiency in Outlook platform and its security aspects is critical."

    €28 / hr (Avg Bid)
    €28 / hr Offre moyenne
    6 offres

    ...doesn't get filled everytime.....like i want my bid to fill just once or twice in two three days so that tensor doesn't count my bid as spoofing. In order to accommodate my requirements, the successful freelancer should have extensive experience in bot creation, a strong understanding of decentralized exchanges, and specific familiarity with Tensor and Solana protocols. I'm also looking for a developer to design a user-friendly, web-based interface for the bot. This will ensure I can easily manage the bot's functions without needing extensive technical knowledge. Thus, web design experience is also desirable. To summarise, the ideal candidate for this project should have the following skills and experience: - Bot development - Knowledge of Solana p...

    €312 (Avg Bid)
    À la une Urgent
    €312 Offre moyenne
    6 offres
    Mikrotik Router BGP Issue S'est terminé left

    ...and BGP #VLAN, VTP, STP, HSRP, GLBP, VRRP, SPAN, RSPAN, DHCP Snooping, Dynamic ARP Inspection, ARP ACL. #CISCO nexus 9k and CISCO ACI solution like BD, VRF, EPG, Tenant, L4-L7 graph etc. #ACL, NAT, Transparent Mode, Multiple context and Failover (Active/Active, Active/Standby) Site-to-Site VPN, Remote Access VPN and SSL VPN, Intrusion policy, AVC, Malware & File Policy etc in Cisco ASA, Next Generation Firewall and Firepower Management Center (FMC) #F5 BIG-IP Local Traffic Manager (LTM) and Application security manager (WAF). #Cisco CUCM 9.0 and 12.4, CISCO WSA and ESA, CISCO ISE. #OSPF, BGP, NAT, DHCP, L2TP, IPSEC, PPP, Firewall etc in mikrotik router. So you are requested to first discuss the project and requirements and after being satisfied please a...

    €28 (Avg Bid)
    €28 Offre moyenne
    1 offres
    Email Compliance & Security Setup S'est terminé left

    ...establishing these authentication protocols. Here's what I need from you: - **DKIM Configuration**: Set up DomainKeys Identified Mail (DKIM) records to ensure that the emails sent from my domain are authenticated and trusted by recipient email servers. - **DMARC Implementation**: Implement Domain-based Message Authentication, Reporting & Conformance (DMARC) policies to protect my domain against email spoofing and to align with authentication standards. - **Compliance Check**: Verify that the DKIM and DMARC implementations are correct and meet the necessary compliance standards. IDEAL SKILLS AND EXPERIENCE: - Experience with 123 reg email services - Background in email security and authentication protocols - Proven track record in improving email deliverability throug...

    €148 (Avg Bid)
    €148 Offre moyenne
    26 offres
    Batch Scraper System Development S'est terminé left

    Batch Scraper System Development Project Overview: We are seeking an experienced programmer to develop a system for scraping a Gig App (Ask for Details). The goal of this project is to create a tool that can efficiently retrieve and display available Batches from the Gig App/platform. The bot needs to do this within a few tenths of a second. In some warehouses, this process can be too long, so additional scripting needs to be done to minimize computations and delays to beat out other scripts without using too many resources. Getting Routes (Batches) in these stores can be impossible unless there are more batches than Scripts or those batches come out at the last minute, preventing drivers that are not close by from accepting them. Key Responsibilities: Scraping Batch Da...

    €31 / hr (Avg Bid)
    €31 / hr Offre moyenne
    76 offres

    ...duration and amout. So they can identify how sensitive the PIR requires to be. - if you assume a ARP-based presence detection, the users, shall be able to trigger a "smartphone" wifi logon - if the presence is detected, the corresponding actor shall be triggered and be visualized to the end user. Timeline: - this is for now a setup project of the simulator for our premise. Based on the pace and quality of delivery we will like to integrate you into the process of implementing our ideas in a simulator. Frequency of assistance: - Assistance will be needed on an as-needed basis If you are a node-RED expert with the necessary skills and experience, please reach out to discuss further details and project requirements. The milestones you bid on now: MS1: - ...

    €18 / hr (Avg Bid)
    €18 / hr Offre moyenne
    14 offres

    ...efficiently set up these email authentication methods, ensuring all our outgoing emails are verified — curtailing email spoofing and phishing attacks. 2. Policy Development: I'm not sure whether there's an existing policy for DKIM, DMARC, and SPF or a new one will need to be created, hence part of your role would involve assessing the current state and subsequently formulate a suitable policy if required. Ideal skills and experience: - Proficiency with Office 365 email service, godaddy, active campaign, wordpress - An understanding and hands-on experience in setting up DKIM, DMARC and SPF records. - Good knowledge of email security and policy formulation. This project is key and as such, I need an expert who can deliver in a timely and efficient manner....

    €59 (Avg Bid)
    €59 Offre moyenne
    26 offres

    I am in need of qualified professionals who possess deep expertise in litigation support and an authoritative understanding of researching law cases. Specifically, I am currently in the midst of a litigation process ... and solid experience in data collection and legal research will set you apart from others. Effectively navigating through a litigation process is critical, hence having previous experience in doing so would be beneficial. Please note, this project may require comprehensive knowledge about the law – experienced legal professionals (lawyers, paralegals etc.) are especially encouraged to bid. Task: We need to find 3 or 4 or more trials of cases where docusign was used to enforce contracts fraudlently signed by illicitly accessing emails and ip spoofing an...

    €37 (Avg Bid)
    €37 Offre moyenne
    27 offres
    Android Camera Spoofer S'est terminé left

    Project Title: Android Camera Spoofer Description: I am looking for an experienced Android developer to create an Android Camera Spoofer application for personal use. The main requirement for this project is Force Images and Videos to the android Camera spoofing, where the application should be able to spoof the camera in real-time while using the camera on an Android smartphone. Ideal Skills and Experience: - Strong knowledge of Android development and camera functionality - Experience with image and face detection and recognition algorithms - Proficiency in image processing and manipulation - Familiarity with real-time video processing and rendering - Ability to integrate the camera spoofer functionality seamlessly into the Android smartphone's camera app - P...

    €367 (Avg Bid)
    €367 Offre moyenne
    32 offres

    ...the following: - Real-time face detection: It should have the capability to immediately detect and recognise faces saving users time during the login process. - High accuracy: The system must ensure precision in identifying the correct user and reduce the possibility of false identifications. - Robust against spoofing attacks: As the app will be dealing with sensitive financial information, it is vital to ensure the facial recognition software is resilient against potential spoofing attacks. The ideal freelancer should have demonstrated experience in developing similar mobile applications, notably with secure facial recognition features. A comprehensive understanding of security measures to uphold user confidentiality and protect user data is paramount. Proficiency in ...

    €43016 (Avg Bid)
    €43016 Offre moyenne
    50 offres
    DNS Records S'est terminé left

    Job Details: DKIM and SPF record for all Domains also at the Plesk DNS Template for may future domains. Secure with them the email spoofing problem

    €23 (Avg Bid)
    €23 Offre moyenne
    1 offres
    DNS DKIM and SPF records S'est terminé left

    Jobdetails: make DKIM and SPF record on all Domains because email spoofing problems. Change the DNS Template on Plesk to have those problems dont at the future

    €234 (Avg Bid)
    €234 Offre moyenne
    1 offres

    ...and in a voice call you will guide me all options available to configure. You will advise me to make things available to setup our test environment before starting practical learning. Here are menu options that I can see in HP and we will be exploring: - Device ○ Port Management ○ Port Mirroring ○ RMON ○ SNMP - Network ○ VLAN ○ VLAN Interface ○ MSTP ○ Link Aggregation ○ LACP ○ LLDP ○ ARP Management ○ ARP Anti Attack ○ IGMP Snooping ○ MLD Snooping ○ IPv4 Routing ○ DHCP ○ Service ○ Diagnostic Tools - Authentication ○ 802.x ○ Port Security ○ AAA ○ Radius - Secuirty ○ Port Isolate Group ○ Authorized IP ○ Loopback Detection - QoS ○ Time Range ○ ACL IPv4 and more What I want to setup: I have 2 Static IPs on single Ethernet connection from ISP, I want to build separate VLA...

    €37 (Avg Bid)
    €37 Offre moyenne
    13 offres

    The purpose of this activity is to help you enumerate and model the security of your system architecture by looking at it from the point of view of threats. According to the Microsoft Threat Modeling methodology, we treat the word "threat" as a class of exploits. They fall into the following categories (STRIDE): • Spoofing • Tampering • Repudiation • Information Disclosure • Denial of Service • Elevation of Privilege ACTIVITY Today, let's model a cloud-based storage system. Store a file in a folder on your desktop, and it gets immediately uploaded to the server. Users can share folders, allowing other users or the public view the files. The context level diagram of the file sharing system is represented in Figure 1: Context Level Dia...

    €56 (Avg Bid)
    €56 Offre moyenne
    2 offres

    I am in need of a freelancer who can help me set up SPF and DKIM for ...Knowledge of DNS settings and email authentication protocols - Familiarity with Gmail's email service provider Project Requirements: - Set up SPF (Sender Policy Framework) for my Gmail account to ensure email deliverability and prevent spoofing - Configure DKIM (DomainKeys Identified Mail) authentication to verify the authenticity of outgoing emails from my domain - Provide clear instructions and guidance on how to implement the necessary DNS changes for SPF and DKIM setup - Ensure that my domain, , is correctly configured to send emails from my willdesk account Please note that I have some knowledge of SPF and DKIM but require assistance in setting it up properly. The project is for a singl...

    €26 (Avg Bid)
    €26 Offre moyenne
    5 offres
    voip with spoof function S'est terminé left

    I am looking for a VoIP expert who can create a system with spoofing capabilities specifically for caller ID spoofing. The project requirements are as follows: - VoIP service with caller ID spoofing capabilities - No additional functions are required apart from spoofing - The ideal candidate should have experience in VoIP development and be familiar with caller ID spoofing techniques.

    €102 (Avg Bid)
    €102 Offre moyenne
    14 offres

    As an expert with a high level of technical knowledge in the field of GPS spoofing and jamming, I'm looking for a reliable solution for accurately tracking my phone's GPS without risking unauthorized access. To that end, I'd like to have my phone scanned to ensure it's protected against such incidents. I'm open to both manual and automatic solutions, as long as the end result is a secure, consistent, and accurate tracking of my device's location.

    €132 (Avg Bid)
    €132 Offre moyenne
    8 offres