J'ai des travaux en continu concernant notre projet précédent 'Membership setting and security assessment'
We need expert trainers who can record 20 hours of training micro courses in following technologies to launch and use it in the Training Marketplace AI/ML,,Python,Deep Leaning, Machine Learning,Reinforcement Learning, IoT, Robotics, Emotional Intelligence, Blockchain and Ethereum.
...one of 3 servers that are using on AWS (## Blocked outbound HTTP/S traffic). I am looking for an expert to help consult with our team on serveral different issues including security, PHP setup of these sites, and performance. We are using Updraft as the backup method for the sites---so if you have additional skills in this area, let me know this as well
i need help from someone with skills in python 3 specialized in building tools in the cybersecurity field especially data science. this a weekly tasks for 2 months
I need help in writing a plan for securing a small sensor device. All aspects must me addressed including software and hardware components. I am attaching PPT of the small device. English must be perfect and the plan must include original figures (not copied).
Wanted to hire an expert in cybersecurity to write a research paper on How to improve the security of an IOT device using device hardening techniques? I have uploaded the guidelines to follow. Please get back to me as soon as possible. Thank you.
How Internet of Things IoT manufacturers can integrate device hardeni...hardening on the IoT devices to provide an added protection layer against malware attacks to ensure real time intrusion detection, reporting and protection to ensure cyber security improvement in an organization’s network? i have uploaded the guidelines that has to be followed.
We need a logotype for a website containing articles about personal security, both digital and physical. It also has tests and comparisons of various security products. For this website we would now like a logotype. The website is not yet created, so you are not bound to any theme or colors, but we have in mind black/grey and blue/red/orange as possible
...looking for an AWS specialist to collaborate and advise on AWS services, patterns and architecture. The project is under active development and we’re looking for an initial security and configuration review/audit, followed several weeks later by more reviews so that we’re production ready by July 2019. This will require online meetings to discuss progress
We need someone who is expert in making downloadable CD of multiple choice questions/answers, just like CBT (computer based tests) for students to help them learn and alongside take tests. Huge volume of work is available for the right freelancer.
My website is hosted on Linux Droplet from Digital Ocean...Droplet from Digital Ocean. I have hosted multiple WordPress websites. Recently, my websites were attacked by hackers and I have regained the access. I want someone to take security measures. so my websites cannot be hacked. Note:- Need proof of past projects. Budget is just the place holder.
The aim of this task is not to cause any damage, rather demonstrate that 51% technique can be carried out on low hashing coins. The project involves carrying out a 51% technique on PoW. The URL below is exactly what to be done for this task and instructs how to carry out a 51% technique successfully. [se connecter pour voir l'URL] Your job will be; 1. Go through the URL and understand w...
...provide security to me. This is my sample website [se connecter pour voir l'URL] with dummy data which i uploaded on my server which is i want someone to hack it and then tell me what security required for my firm and website.... This is just a task and if anyone done this and make me satisfied with your work then my 4 organization security things will
I have an existing "GUEST" SSID that is currently being abused by users because the password is shared among them. I need this to change. Below is what i am looking for: 1. Users need to self-register to get login details before being granted access to the internet. 2. Access is only for 1 hour 3. Login details are temporary (Just like in airports and restaurants) 4. No downloading/adul...
The aim of this task is not to cause any damage, rather demonstrate that 51% technique can be carried out on low hashing coins. The project involves carrying out a 51% technique on PoW. The URL below instructs how to carry out the this technique successfully. [se connecter pour voir l'URL] Your job will be; 1. Go through the url and understand what is expected. 2. Choose a low hashing ...
Hi, Please refer to the attached documents. I need the sub-headings with word requirement filled up with proper research. Please do not copy and paste from the website straight. No plagiarism more than 15% Proper APA citation needs to be done., and weblink placed under the 'resources' Need this within 4 hours from my job award to you.
I want to secure my android app made with android studio and bakend is on the php and mysql. I want someone who can help in making my app sour...can help in making my app source code encrypted, making my app secure using AES, or any other encryption technique. If Anyone having a good Knowledge of php, android, java security then only take this project
I am looking for Master Holder in cybersecurity , computer network. Where he has a good experience with the research paper. the job is to prepare a long professional literature review
Tool to extract forensic information from a PC. This project is security-sensitive and details of the tool will only be provided to the selected candidate. This is an evaluation project to engage with candidates for long term work in forensic and PT developments. Please, apply ONLY if you are an individual freelancer. Agencies / groups will not be
[se connecter pour voir l'URL] We manage Police in all country and have authorization to sell security systems to cellphones to all country Authorization of presidency
I need a logo for my company : information security, data protection and privacy management. The name of the company is iCircle
...On a regular basis (e.g. 1, 2 or more time-s per day) the user gets a message "all ok?" before a given time (e.g. 1st time before 12 am, 2nd time before 10 pm). He then has 30 minutes to enter a code (e.g. 1234) to confirm that all is ok, or a different code (6543) if he needs help. Note: User can chose how many times in a day and by what time he wish
We need a cybersecurity professional to develop articles and training materials for our customers that would teach them on how to detect security breaches using logs and security events. These training materials should include technical write-ups, processes, tools, etc. I need these write up 3 times a week.
I received from the cloud company a report that my server is part of a botnet and is sending unwanted requests to other sites. I need an experienced professional to resolve this situation as soon as possible. Log send it Abuse Team - Comvive Servidores SL 2019-03-12 04:21:11 Hi, We have detected a network attack from an IP ( [se connecter pour voir l'URL] ) from your network, a computer co...
...developer who can implement security features and a few other minor functions in an already existing project of mine. The project is a localhost user system in MVC structure without the usage of a [se connecter pour voir l'URL] includes a login system and diffrent functions for Users and Admins. I already tried to implement some of the security features but am unsure ...
I need somebody expert to help with data security project where need data received from source need to validate then print with an UID, store on local and remote server in encrypted form with origin, date/time stamp, in way hard to edit/modify/delete and any kind of data manipulation. Apply only with reference also you need to support in creating documentation
...web application which will have a qr code security. The application should be build using Python coding and django framework. The concept is the like normal atm transaction, the web application will act as a atm machine having card and cardless transaction options. In case of cardless transaction the user will provide his acc. no. and registered
Card Validation using Java SOAP WebService & WS Security Need a write a Java API client to consume SOAP WebService 1. WSDL End Point URL will be provided 2. Input details will be provided Output Expected 1. A Java Client to validate Card and expose as REST API
spring security working in local host but not in vps,want to solve this issues
Hello, I just started using Kali Linux. I am a major newbie. I live in Sacramento, CA. My project should be super easy and fairly quick to do. I want someone to put Security Ain't free tool se-smser together for me. It spies on Android phones. All I need is the persons IP Address which I do have. This rugby tool along with Kali Linux Metasploit is what