Checking compromised linux serveremplois

Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    6,882 checking compromised linux server travaux trouvés au tarif de EUR

    My website was created in with Laravel framework. It has a logic for sending an email automatically if someone doesn't respond. I need to make sure the logic works. Also, I need someone to run me through how to change the code in Laravel on pages where there is some text. Lastly, I need someone to help me change the description in Google when we search for the website. Additional advice inclu...

    €13 / hr (Avg Bid)
    €13 / hr Offre moyenne
    43 offres

    work will be given via sheet..you need to compare original file and edited file and need to do corrections

    €79 (Avg Bid)
    €79 Offre moyenne
    28 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    Hi There We are looking for someone who has good experience in editing and writing fresh content for a Behavioural Train...Brochure content that we have built. B. Editing our Corporate Profile Content that we have built. C. Editing & Adding relevant content for our website. Quality shall not be compromised. Only people with good experience apply.

    €74 (Avg Bid)
    €74 Offre moyenne
    21 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €501 (Avg Bid)
    €501 Offre moyenne
    1 offres

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    €490 (Avg Bid)
    €490 Offre moyenne
    1 offres

    Client website was compromised by hackers and needs to be restored. They have disabled access to the wp-admin & wp-login pages. I tried to put up a backup but made things worse. [se connecter pour voir l'URL]://[se connecter pour voir l'URL]

    €150 (Avg Bid)
    €150 Offre moyenne
    61 offres

    I have an anroid app which requires to login via username and pincode of 4 chars. I have the apk, more info via chat!

    €470 (Avg Bid)
    À la une Urgent
    €470 Offre moyenne
    36 offres

    Hi All, We're are looking for professional subtitling/close ...conversation (less than even 50%) because of the nature of the videos and they're HD digital quality videos. Turnaround time for each assignment will be 24 hours. Quality won't be compromised and we're looking only for experienced people who are comfortable working on adult video content.

    €268 (Avg Bid)
    €268 Offre moyenne
    38 offres
    Citation checking - thesis S'est terminé left

    I have an approximately 40,000 word document with 437 in-text references that need to be checked one by one against the Australian Guide to Legal Citation Third Edition (AGLC). It’s imperative that this style is used and NOT another style (Harvard or APA or whatever). I have the endnote file with all the required details and the word document is linked to the endnote file. Theoretically my...

    €290 (Avg Bid)
    €290 Offre moyenne
    22 offres
    presentation S'est terminé left

    ...are raised which your team are required to consider and then answer in the team presentation: 1) Motivation amongst the workforce is low, and output quality may be being compromised. How might a greater understanding of motivation theory contribute to a more efficient workforce and organisation? 2) It has been reported that the administration team have

    €34 (Avg Bid)
    €34 Offre moyenne
    13 offres

    d...blanks or duplicates 3/. check for missing dates and missing data 4/. check for out of sequence, for example the dates rows that are not in order also, ideally instead of checking each one individually, all the files in the folder can be checked and results produced into one report. i have 50+ files to check each with about 300 rows thanks Excel

    €28 (Avg Bid)
    €28 Offre moyenne
    19 offres

    d...blanks or duplicates 3/. check for missing dates and missing data 4/. check for out of sequence, for example the dates rows that are not in order also, ideally instead of checking each one individually, all the files in the folder can be checked and results produced into one report. i have 50+ files to check each with about 300 rows thanks Excel

    €28 (Avg Bid)
    €28 Offre moyenne
    29 offres

    I have a data analysis task. Quality analysis for American mortgage loan forms, conventional, condominium, multifamily etc

    €19 (Avg Bid)
    €19 Offre moyenne
    2 offres

    Michael, It appears that your server has been compromised and is attacking other servers on the Internet; this degrades your service, as well as others, and is a large consumer of resources overall. The following files were found to be suspected of malware, which should be reviewed and removed:

    €50 / hr (Avg Bid)
    €50 / hr Offre moyenne
    50 offres
    app quality checking S'est terminé left

    hi, plz check the app quality of our current app...ios and android in native language, swift in ios. quality check coding standard unneccary code [se connecter pour voir l'URL]

    €15 / hr (Avg Bid)
    €15 / hr Offre moyenne
    40 offres

    Our business is called New Leaf. It is a non-profit organisation compromised of volunteers who are working towards aiding in the rehabilitation of those who have committed criminal offences. Our aim is to ensure that those who have offended are given a chance to move forward with their lives so that they can re-integrate and become contributing members

    €93 (Avg Bid)
    €93 Offre moyenne
    94 offres

    My computer has been compromised and I would like answers on who

    €4 / hr (Avg Bid)
    €4 / hr Offre moyenne
    1 offres

    has an existing wordpress website using Sahifa , need wordpress programmer for security checking & clean Malware

    €107 (Avg Bid)
    €107 Offre moyenne
    24 offres

    We have developed an ios application and we wish to test it in iP...other iphone models but fails in Client's iPhone6+. So we are looking for one or two people who could install the app in his iPhone, test it as per our instructions (simple checking, not full-fledged test), and share the videos grab. Those who are willing and can do it now, please bid

    €14 (Avg Bid)
    €14 Offre moyenne
    5 offres
    checking shop banned or not S'est terminé left

    i have shop in market placed, if my shop banned by the market, my shop will be never show the product, if my shop not banned, my product will be show all. i need script for check product in the market (he banned or no) better its will be run on php thank

    €23 (Avg Bid)
    €23 Offre moyenne
    2 offres

    We have a Google Sheet that we use for customer management and shipping. We have a SQL Server product database. We want to query the database and retrieve product data based on the item number input by the Google Sheet user and put product data into certain columns. We have the SQL query written that retrieves the proper details, but we need to code

    €132 (Avg Bid)
    €132 Offre moyenne
    21 offres

    a new photo gallery for my WEEBLY SITE- I LIKE something like this,, https://www...2. when you click on a specific image they are all the same size 3. all the images in the gallery , the thumbnails are all uniform and same size 4. the pictures are not compromised or cropped this is my current website . [se connecter pour voir l'URL]

    €378 (Avg Bid)
    €378 Offre moyenne
    9 offres

    Connecting to exchange through API Key, placing and canceling order and checking balance for specific coin Should be written in python, freelancer only here is some documentation: [se connecter pour voir l'URL]

    €160 (Avg Bid)
    €160 Offre moyenne
    7 offres

    Connecting to IDEX exchange with api keys, checking highest bid and highest ask for specific coin(should scan each few seconds), checking my order sell and buy rate(should scan each few seconds), placing and canceling order for specific coin all must be written in python , only through freelancer

    €58 (Avg Bid)
    €58 Offre moyenne
    6 offres