Fix asp cross site scripting attack functionemplois

Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    14,263 fix asp cross site scripting attack function travaux trouvés au tarif de EUR
    Scripting in Blender S'est terminé left

    développer un script pour blender pour générer un baking

    €154 (Avg Bid)
    €154 Offre moyenne
    2 offres

    Bonjour, Nous souhaitons réaliser une application cross-platform ou native (iOS + Android) + un site Web basé sur le même concept (Optionnel). (Front + Back) Cette application intègre une carte sur laquelle l’on peut ajouter des objets contenant des photos. On devra pouvoir superposer des images au dessus de ces photos. Un système de ...

    €4685 (Avg Bid)
    €4685 Offre moyenne
    15 offres

    Bonjour, Nous sommes trois étudiants et nous sommes à la recherche d’un développeur pour developper une application mobile sur android et ios (en cross plateform par Xamarin, Rubymotion voir titanium) L'application s'apparente à wallapop (je vous met le lien à la fin du message) en plus spécifique, donc une application en gros d...

    €5940 (Avg Bid)
    €5940 Offre moyenne
    11 offres
    Cross Cultural Management S'est terminé left

    As discussed.....=)

    €40 (Avg Bid)
    €40 Offre moyenne
    1 offres
    Cryptography. woo and lam Pi 6 jours left
    VERIFIÉ

    I need you to write a report for something. I have a question and answer, I need you to check the answer as well as rewrite it so ...question and answer, I need you to check the answer as well as rewrite it so that it is more professional and makes sense. Woo and lam Pi is a attack which can be carried out and naming flaw is a flaw within the attack.

    €13 / hr (Avg Bid)
    €13 / hr Offre moyenne
    4 offres

    ...[se connecter pour voir l'URL]'[se connecter pour voir l'URL] Again with animations: - Move - Idle - Attack (beak or front paws/talons) - Combat Art (beak of talons, the other one ;) - As you kindly offered, i would be happy about a dying animation As discussed, bonus for the last

    €110 (Avg Bid)
    €110 Offre moyenne
    1 offres
    ss7 attack Guide 6 jours left
    VERIFIÉ

    Im need perfect learn about Ss7 attack to call and sms

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres
    Bash scripting 6 jours left
    VERIFIÉ

    I need some help to rebuild a bash script

    €24 (Avg Bid)
    €24 Offre moyenne
    5 offres
    C++ Program 6 jours left

    ...each round beside the human loses 1/2 a heart The GP: The GP has 2 actions and 2 health Search for a AC to steal all the art They move as rapidly as possible to the human AC Attack the AC Once within 2 squares of a human they attempt to Steal all the Art for themselves 2 squares away: 65% chance of stealing a piece of art. If they successfully steal art

    €32 (Avg Bid)
    €32 Offre moyenne
    9 offres
    Maya Python Scripting 6 jours left
    VERIFIÉ

    You have to know Maya and Python, both of them From simple script lines to test skills, to more complex in the future

    €24 (Avg Bid)
    €24 Offre moyenne
    4 offres

    Our Goals - We are looking for someone experienced in Python Scripting who can use utilise the Python scripting options available in our software applications to custom make scripts to do a number of currently manual based tasks. These include: The import/load/ingest of video media automatically from 'watch folders' Place video media on

    €47 / hr (Avg Bid)
    Local LDN
    €47 / hr Offre moyenne
    26 offres

    Hi there, I am looking to hire a writer to write articles for my ... I am looking to hire a writer to write articles for my blog and write an e-book. My website and blog is [se connecter pour voir l'URL] What would be your recommended plan of attack and budget moving forward? I have suggested a fixed price budget for an initial article. Can you write

    €65 (Avg Bid)
    €65 Offre moyenne
    1 offres

    ...brochure here [se connecter pour voir l'URL] - Old website can be viewed here: [se connecter pour voir l'URL] (content only, old design and plugins was lost/reset in a recent malware attack) - Deliver a professionally presented responsive WordPress site that must have consistent look for desktop and mobile devices. - Must use Evolve Plus WordPress

    €330 (Avg Bid)
    €330 Offre moyenne
    46 offres

    Challenges and Strategies Opportunities for Singapore firms doing business with other countries (excluding USA and east asian countries). Talk about Resources, Peoples, Cultures, Institutions. Using a national culture framework (such as Hofstede’s) describe and assess the principal dimensions of the chosen culture. Further details will be provided upon appectance, regarding on the format of ...

    €67 (Avg Bid)
    €67 Offre moyenne
    63 offres

    I need you to develop some software for me. I would like this software to be developed for [se connecter pour voir l'URL] scripting

    €25 (Avg Bid)
    €25 Offre moyenne
    4 offres
    cross domain tracking code 4 jours left
    VERIFIÉ

    I want to install a tracking code and build a cross domain between my sites and my booking engine provider to follow up conversions from the beginning up to the end of the session.

    €480 (Avg Bid)
    €480 Offre moyenne
    14 offres
    Trophy icon Create logo + style 4 jours left

    ...yellow The colors of the *Snake: Turquoise, dark blue and yellow eyes. * We prefer that the snake will have a more friendly face, instead of a mouth with is open and in the attack position. The Cobra is a sign of awareness and meditation, so please take that into consideration please. Example pictures Fenix and Cobra snake. [se connecter pour voir l'URL]

    €99 (Avg Bid)
    Garanti
    €99
    29 propositions

    Hello, I need a hybrid app that must work for both Android and IOS environment. It must reside on Android marketplace as well as Apple store. Please share examples of your previous work to be considered.

    €2094 (Avg Bid)
    €2094 Offre moyenne
    45 offres

    ...integration with bank account. Applying pre-testing for all website modules to ensure high level of security to eliminate any kind of cyber-attack such as sql-injection, XSS, CSRF, password dictionary attack or brute-force attack. Finally; for those interested please write a proposal and quote me a rough price in order to have more discussion about the readiness

    €202 (Avg Bid)
    €202 Offre moyenne
    84 offres
    Trophy icon Logo Design :2 7 heures left

    Design a logo for me - The Theme Of Logo is: Heart Attack- Call > Ambulance>Hospital. Choice to have a 3D Logo. Heart Attack > Call > Ambulance & Hospital Feel. Thanks

    €11 (Avg Bid)
    Garanti
    €11
    22 propositions

    ...they have a drop down list with the type of malware that they wish to launch (Trojan Horse, AdWare, DDoS, etc.) 3. They can then select the type of attack and then launch it 4. Upon selecting the attack, the backend will be responsible for launching the respective types of attacks with that category. Ex: If chosen "Trojan Horse", the backend coordinates

    €172 (Avg Bid)
    €172 Offre moyenne
    4 offres

    ...Godinterest was originally launched on December 2, 2012, then discontinued and later recreated after the website was purchased in April 2014 by Dean Jones. The site was hit with a series of DDoS attack soon afterwards. Godinterest founder Dean Jones refers to himself as a media publisher, dad, Christian, designer, and project manager. On December 20, 2017

    €107 (Avg Bid)
    €107 Offre moyenne
    27 offres

    I need someone to build a cross platform native app that will include the following features: -Custom keyboard available inside and outside the app -Text message interception / reading -Contacts integration -Data Syncing to Cloud Database(does not have to be real-time) -Push Notifications -State the phrase "Onibara" to show you've read the description

    €726 (Avg Bid)
    €726 Offre moyenne
    23 offres

    I’m looking for a Developer who have coding and scripting experience with Python and Shell Scripting ( Bash Scripts, Python and R ) . Should be quick in writing codes.

    €18 (Avg Bid)
    €18 Offre moyenne
    12 offres

    ...servers and it must be fixed correctly. I haven’t logged on to my server for long time so not sure what’s happening. It’s a voice chat site with active users so you must be very careful. Also there is another issue, site is on SSL certificate , it should forward to https on its own, it hasn’t been working all the times, when a first time user type the

    €39 (Avg Bid)
    €39 Offre moyenne
    6 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    I need a windows application in C# that involves preventing ARP spoofing attack according to an algorithm that i will send to you (a flow chart) The idea depends on building a trusted ARP table at the server PC and then distributing that trusted ARP table among other clients. The clients PCs will start to enter static ARP entries to their ARP Cache

    €237 (Avg Bid)
    €237 Offre moyenne
    6 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...finding from web server log file and writing an algorithm. Detail - The 3 web server log files will be provided to you. 1) Normal users log data 2) Robots log data 3) Malicious/Attack log data. You need to find out features of mentioned web attacks from web log file which will differentiate it from robot log data and from normal users' log data. Based upon

    €112 (Avg Bid)
    €112 Offre moyenne
    6 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres