Tweet attacksemplois

Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    2,000 tweet attacks travaux trouvés au tarif de EUR

    Realization of security attack simulations on SDN (Software defined networks) on a virtual environment using kali linux Attacks like Dos, arp poisoning... the important thing is to have the steps to follow up in order to perform an attack on SDN It's possible to exploit the openflow protocol vulnerabilities on this simulation It's for my bachelor project !!! On network security field Thank you

    €218 (Avg Bid)
    €218 Offre moyenne
    3 offres
    airdrops free money for all S'est terminé left

    ...exemple rejoindre un groupe Telegram, aimer une page Facebook ou retweeter un tweet Les prérequis pour participer à un airdrop C’est une liste non exhaustive des choses qui sont demandée régulièrement Posséder un compte : Facebook Telegram Twitter Discord Avoir une adresse ETH avec un minimum de coin dessus.  Cette adresse doit être ERC20 compatible (pas d’adresse d’exchange) vous pouvez créer gratuitement une adresse sur .myetherwallet etc.. Quelques astuces Concernant les airdrops où l’on vous demande de Retwitter un tweet  , faites-le en laissant systématiquement un commentaire. En effet quand vous devrez fournir le lien de votre tweet si vous ne...

    €308 (Avg Bid)
    €308 Offre moyenne
    1 offres

    ...(visuel du grand palais, tweet, Instagram). Cette page est envoyé a un player (logiciel Ines) et c’est ces players (branché en RJ45) qui sont connecté aux écrans et parse les images. Nous avons 1 formulaires () qui nous permettent de configuré le wall qui est affiché par - - Le code semble fonctionner mais on a une souci quand même sur les délais d'affichage. Je vais essayé de l’expliqué par écris mais le plus simple serais de s’avoir au téléphone 5 à 10 min. L’idée c’est que la personne voit son tweet alors qu’elle est encore

    €19 (Avg Bid)
    €19 Offre moyenne
    2 offres

    Développer en php et mise en place cron (sur 1&1 Unlimited) d'un système simple d'automatisation de tweet à partir d'une liste contenu dans un fichier .txt en utilisant l'API de Twitter. Je souhaite, à partir d'une liste de phrases (retour à la ligne à chaque phrase) contenus dans un fichier .txt, publier toutes les heures un tweet sur mon compte twitter. Il faut aussi me permet de dupliquer facilement ce système pour d'autre comptes Twitter.

    €134 (Avg Bid)
    €134 Offre moyenne
    9 offres

    ...Enterrement de vie de celibataire. Osez ! Description produits : Sili3D innove et vous presente Penis3D, le premier moule a gateau tri-dimmensionel. En une seule fournee, realisez votre dessert 3D prêt a etre decore et servit. Flexible, surface anti-adesive et facile a laver 100% Silicone alimentaire Disponible maintenant sur Cuisinez et partagez vos photos. Obtenez 500 j'aime ou tweet, rendez vous sur ... Faites vous rembourser le moule sous 48h Pleins de nouvelles formes sont en project, contactez nous et donnez votre avis ! Decouvrez nous, suivez nous. Patagez recettes, photos, videos, news......

    €26 (Avg Bid)
    €26 Offre moyenne
    13 offres
    API Twitter Auto-Tweet S'est terminé left

    Bonjour à vous, Je cherche un programmeur pour créer une API Twiter ou plugin WordPress qui tweet automatiquement une phrase prise au hasard dans un fichier texte. Cette liste serait modifiable à tout moment par FTP. Et mieux, depuis mon panel Admin WordPress. Le script Tweeterait aléatoirement ces phrases toutes les 3 heures. C'est tout. Le script doit être simple de programmation (rapide et léger), et simple d’utilisation. Il n’a pas besoin d’être esthétique ou d’avoir beaucoup de configurations. Il doit seulement Tweeter un message tiré au hasard dans mon fichier, aux jours et heures prévues :) Seriez-vous capable de faire cela ? Si oui, j'attends vos propo...

    €21 (Avg Bid)
    €21 Offre moyenne
    2 offres
    Plugin WordPress pour Twitter S'est terminé left

    Bonjour à vous, Je recherche un programmeur pour créer un petit plugin WordPress qui tweet automatiquement une phrase au hasard dans une liste prédéfinie. Cette liste serait sous forme de fichier *.txt modifiable à tout moment depuis mon panel Admin WordPress, ainsi que par FTP. Le script Tweeterait aléatoirement ces phrases aux moments que j'aurais choisi dans la configuration du plugin (jours, heures et minutes prédéfinies.) Le script doit être simple de programmation (rapide et léger), et aussi simple d’utilisation. Il n’a pas besoin d’être esthétique ou d’avoir beaucoup de configurations. Il doit seulement Tweeter un message tiré au hasard dans mon...

    €34 (Avg Bid)
    €34 Offre moyenne
    3 offres

    We are in urgent need of an OVH Server Security Specialist to address recurring security issues with our server. Our server has been frequently compromised by viruses, resulting in the creation of malicious files and folders across directories. Additionally, these viruses have been generating .htaccess files that block access to internal pages of o...environment and business needs. 3- Configure and optimize server settings, firewall rules, and access controls to enhance security posture and prevent future breaches. 4- Install and configure robust antivirus and malware detection solutions to proactively identify and remove malicious software. If you have the expertise and experience to secure our OVH server and protect websites from malicious attacks, please apply to this post. Be...

    €11 / hr (Avg Bid)
    €11 / hr Offre moyenne
    9 offres

    I need a versatile programmer who can work with Python, C or any other programming language to develop a system for identifying Distributed Denial of Service (DDoS) attacks with the help of machine learning algorithms. Skills and Experience: - Extensive experience in Python, C, or similar programming languages - Knowledge of Machine Learning algorithms - Experience in network security would be beneficial - Proven track record in detecting cyber threats in a small network environment. Your success will be judged by your ability to create a reliable, data-driven system capable of efficiently detecting DDoS attacks in a small-scale network.

    €176 (Avg Bid)
    €176 Offre moyenne
    12 offres

    ...skilled cyber security professional who can assist with ensuring the integrity and safety of our systems. The ideal candidate should have expertise in network security, application security, and data security. Key project components include: - Conducting a thorough vulnerability assessment to identify potential weaknesses in our current systems. - Performing penetration testing to simulate cyber-attacks and evaluate the effectiveness of our security measures. - Executing a comprehensive security audit to ensure that our systems are aligned with industry best practices and compliant with HIPAA, GDPR, and PCI DSS. Your role will be crucial in ensuring our organization is not only secure from cyber threats, but also in compliance with relevant regulations. Experience with these c...

    €12 / hr (Avg Bid)
    €12 / hr Offre moyenne
    6 offres

    First, please note that I don't do business with low-ballers. This document contains all of the details of the project. I went over it extensively with the assistance of Gemini AI to make sure it was complete and thorough. So if you plan to place a low-ball price in order to get me to talk with you so you can give me your real, higher price later, don't waste your time bidding at all because...add functionality for: Capturing an image for each garden space Triggering email sending functionality 8. Security Considerations: The developer should implement security measures throughout the application: Secure storage of SMTP server credentials within a bundled configuration. Input validation for user-entered data (e.g., email address). Sanitize user input to prevent potential injec...

    €539 (Avg Bid)
    €539 Offre moyenne
    100 offres

    ...is to find the most viral tweet from the previous week. Key Features: - The bot should be able to identify the tweet with the highest 'views to followers' ratio. The higher the ratio, the more viral the tweet is considered to be. - It should be able to scrape and analyze tweets from the past week. - The bot should be capable of differentiating between tweets based on their views to followers ratio and identify the 'most viral' one. Ideal Skills & Experience: - Proficient in creating Twitter bots. - Strong understanding of Twitter API and scraping tools. - Familiarity with tweet analytics and calculations. - Ability to extract and process data efficiently. The end goal of this project is to have a functional tool that can accurately...

    €144 (Avg Bid)
    €144 Offre moyenne
    37 offres

    I'm in need of an expert to analyze our Joomla website's recent spike in traffic. I'm concerned whether this is genuine or bot-generated. This is a high-priority task for me, and I need immediate action. Key Tasks: - Verify i...bot-generated - Implement necessary security measures to prevent future bot traffic - Restore the website online and ensure it can handle an increased traffic load Ideal Freelancer: - Proficient in Joomla and its security features - Experienced in analyzing web traffic and differentiating bot-generated traffic from genuine - Familiar with implementing security measures to protect websites from bot attacks - Available to tackle this issue urgently If you're confident in your abilities to address these requirements promptly and effectivel...

    €123 (Avg Bid)
    €123 Offre moyenne
    64 offres

    I'm in need of a cybersecurity expert who is well-versed with Microsoft Office 365. I've recently received an O365 login repo...with detailed written feedback. The questioned application activity is highlighted in red. - I do not require ongoing monitoring, so this will be a one-time project. Ideal Skills & Experience: - Proficiency in Microsoft Office 365 is a must. You should have deep understanding of the platform and its security features. - Extensive experience in cybersecurity, particularly in dealing with shell attacks and access logs. - Strong analytical and reporting skills. You have to be able to translate your findings into a comprehensive, detailed report. Your analysis and insights will be crucial for me to ensure the security of my systems. Looking forw...

    €67 (Avg Bid)
    €67 Offre moyenne
    16 offres

    I'm in need of an hack...penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are crucial for ...

    €93 (Avg Bid)
    €93 Offre moyenne
    16 offres

    I'm currently facing potential malware attacks causing unexpected slowdowns, particularly affecting my website load times. Hence, I'm in urgent need of a knowledgeable cyber security professional who can identify and rectify issues within my server files. Key Responsibilities: - Investigate the root cause for the slowdown of the website load times - Pinpoint potential malware in server files - Advance and fortify the security system to prevent future occurrences Ideal Skills: - Proficiency in cybersecurity - Solid understanding of server operations, particularly SQL - Experience in malware detection and prevention Your task: Use your expertise to bring back operational efficiency and bolster my domains server's security. If you can catch the malware predator an...

    €103 (Avg Bid)
    €103 Offre moyenne
    8 offres

    ...conscious organization, we're hiring a cybersecurity expert for a comprehensive penetration testing on our Linux-based system. Emphasis lies primarily on our web-based applications, with the aim to identify and eradicate any potential vulnerabilities. Key Tasks: - Perform Open Source Intelligence (OSINT) - Port scanning - Man-in-the-middle (MiTM) attack simulation - Focus intensively on injection attacks (SQL, XSS) - Authentication and session management puncturing - Cross-Site Scripting (XSS) evaluation The ideal freelancer will have: - Strong experience in cybersecurity and penetration testing - Excellent knowledge and experience with Linux-based systems - Proven experience in web application security testing - Firm understanding of SQL, XSS and authentication vulnerabil...

    €582 (Avg Bid)
    LDN
    €582 Offre moyenne
    13 offres

    ...hashing and the use of access tokens, to prevent unauthorized access. 5. Input Validation and Sanitization: To mitigate the risk of security vulnerabilities, the application will implement strict input validation and sanitization techniques. This section emphasizes the importance of validating user input to prevent common vulnerabilities, such as SQL injection and cross-site scripting (XSS) attacks. 6. Secure Transaction Processing: The application will incorporate secure transaction processing mechanisms to ensure the integrity and confidentiality of financial transactions. This section discusses the implementation of secure communication protocols, such as HTTPS, to protect sensitive data during transit. It also highlights the need for transaction validation and auditin...

    €269 (Avg Bid)
    €269 Offre moyenne
    10 offres

    ...crucial project, we aim to significantly improve the cybersecurity of data stored on the Google Cloud Platform (GCP), using cutting-edge artificial intelligence methods. Our main goals are as follows: - Use Machine Learning and Deep Learning to detect and mitigate any potential cyber threats before they occur. - Utilize AI to predict and intercept Unauthorized Access, Data Breaches, and Malware Attacks, thereby bolstering our defense mechanisms. The ideal candidate will be proficient in AI, specifically Machine Learning and Deep Learning, and have extensive knowledge of cybersecurity on clouds. Experience with GCP would be a valuable advantage. It's essential for the chosen freelancer to be adept at translating complex AI algorithms into practical cybersecurity solutions. ...

    €1098 (Avg Bid)
    €1098 Offre moyenne
    48 offres
    Long-term v2x Security Research S'est terminé left

    ...within the v2x technology landscape. This position is for a 3-year period and will focus on the following areas: - Threat Detection: The primary objective is to identify and analyze potential threats to v2x systems. Specifically, I am concerned about Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. The ideal candidate should have: - A strong background in v2x security research, with a focus on threat detection. - Extensive knowledge and experience in Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. - Experience presenting and publishing research at conferences like USENIX and NDSS. - The ability to produce high-quality research papers and practical solutions. - Affiliation with a research institute to e...

    €1162 (Avg Bid)
    €1162 Offre moyenne
    9 offres

    ...intermediate level phishing environment. The purpose is for security training, so the focus is on creating realistic simulations of phishing attacks. Key Requirements: - Simulating Email, Spear, and Direct Phishing Attacks: I aim to cover a wide range of scenarios to better prepare my team for potential threats. - Intermediate Level Difficulty: The environment should challenge my team without being too overwhelming, ensuring effective learning outcomes. Skills and Experience: - Prior experience in setting up phishing environments; specifically, experience in creating intermediate level simulations would be a plus. - In-depth knowledge of different types of phishing attacks and their characteristics. - Understanding of cybersecurity best practices and knowledge of ...

    €58 (Avg Bid)
    €58 Offre moyenne
    5 offres

    ...communication tools like email and messaging apps enhances communication among individuals in the workplace and beyond. 3. **Time Saving:** Technology allows tasks to be accomplished more quickly, saving valuable time that can be used for other activities. **Challenges:** 1. **Cybersecurity Threats:** With increased reliance on technology, individuals and organizations are exposed to risks of cyber-attacks and data breaches. 2. **Social Isolation:** Overreliance on technology can lead to social isolation and a loss of genuine personal interaction. 3. **Work-Life Balance:** Increased access to technology may make it challenging to set boundaries between work and personal life, negatively impacting the balance between them. **Additional Challenges and Benefits:** 4. **Change...

    €13 / hr (Avg Bid)
    €13 / hr Offre moyenne
    31 offres
    Implement SPF & DKIM for Gmail S'est terminé left

    I'm in need of a skilled professional who can help me set up SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) for my Gmail account. Key Tasks: - Set up SPF: I need you to authenticate my emails using SPF to prevent spoofing and phishing attacks. - Configure DKIM: Implementing DKIM will ensure that my emails are not tampered with in transit and that my domain is not being abused by spammers. Requirements: - Proficient in email authentication protocols. - Experience with DNS settings and domain authentication. - Familiarity with Gmail's email authentication systems. - Ability to explain the process clearly and concisely. Please provide a brief overview of your relevant experience in the field.

    €105 (Avg Bid)
    €105 Offre moyenne
    30 offres

    ...future protection, ensuring my website remains secure and protected from potential threats. Key requirements: - Immediate automatic removal of existing malware: I need the malware on my site to be removed straightaway to ensure my site is clean and safe for visitors. - Firewall protection: I am specifically looking to implement a strong firewall to prevent any future malware infiltrations or attacks on my WordPress site. It's important for me to find a freelancer who has a proven track record in dealing with malware removal on WordPress sites and can effectively set up and manage a reliable firewall system. Your expertise and experience in website security will be highly valued in this project. Please quote the reference "WPMalware" when applying for this projec...

    €37 (Avg Bid)
    €37 Offre moyenne
    77 offres

    We are an e-commerce company with a WooCommerce store. We are looking for an experienced freelancer with expertise in WooCommerce and internet security to analyze our store and protect it from attacks. **Liabilities:** - Analysis of current WooCommerce store security. - Proposals and implementation of improvements to increase security. - Installation and configuration of security plugins. - Provide training to staff for optimal use of security tools. **Requirements:** - Experience in the field of e-commerce and specifically WooCommerce. - Expertise in network and web security. - Ability to easily communicate with our staff and provide training and support. - Ability to provide evidence-based suggestions and solutions. If you believe you have the necessary experience and skills fo...

    €63 (Avg Bid)
    €63 Offre moyenne
    66 offres
    NFC BRIDGE S'est terminé left

    necesito un puente entre lector y emulador, el lector debe ser apk para android y el emulador puede ser para windows aqui un ejemplo:

    €171 (Avg Bid)
    €171 Offre moyenne
    10 offres

    I'm seeking a professional PHP developer to create a custom CMS that not o...allow clients to customize meta tags, including title tags, meta descriptions, and keywords for each page. - XML Sitemap Generation: The CMS should automatically generate and update an XML sitemap, making it easier for search engines to crawl and index the site. Security Features: - Vulnerability Protection: Ensure the CMS is robust against common web vulnerabilities like SQL injection and XSS attacks. Skills and Experience: - Strong PHP and CMS development background. - Proficiency in implementing SEO best practices. - Experience in web security and vulnerability protection. - Excellent communication skills and ability to understand and incorporate client requirements effectively. Budget is not mo...

    €491 (Avg Bid)
    €491 Offre moyenne
    60 offres

    ...and trends. Key Skills and Experience: - Proficient in PHP/SQL: You should have proven experience in PHP and SQL to create a robust, secure and user-friendly script. - Review System Development: A good understanding of how review capturing and redirection works will be crucial. - Web Security: An understanding of web security practices as the script will need to be robust against potential attacks....

    €104 (Avg Bid)
    €104 Offre moyenne
    40 offres

    Cyber warfare allows a state to conduct foreign policy in a more ethical way than traditional war.

    €50 (Avg Bid)
    €50 Offre moyenne
    20 offres
    Veeam Expert Engineer S'est terminé left

    ...comprehensive documentation of Veeam configurations, procedures, and best practices. Share knowledge with team members through training sessions, technical presentations, and knowledge base articles to foster skill development and operational excellence. Security and Compliance: Implement security best practices to safeguard backup data against unauthorized access, data breaches, and ransomware attacks. Ensure compliance with relevant regulatory requirements and industry standards. Qualifications: Bachelor’s degree in Computer Science, Information Technology, or a related field (or equivalent work experience). Extensive experience (X years) working with Veeam Backup and Replication solutions in enterprise environments. Proficiency in designing, implementing, and managing V...

    €277 (Avg Bid)
    €277 Offre moyenne
    4 offres

    ...interest in "Side channel" detection. Skills and Experience: - Solid Python programming ability -Familiarity with collecting micro architectural traces - Familiarity with cybersecurity concepts - Experience in creating machine learning algorithms for detecting malware - Comprehensive knowledge in dealing with Side Channel attacks. Ideal candidates must have: - Proven experience in Python programming - Prior work in malware detection, particularly Side Channel attacks - A solid understanding of the different types of malware - The ability to work efficiently and deliver results in a timely manner. The goal is to create an efficient model that can detect various types of malware, with a particular interest in Side channel detection. The ideal candidate shoul...

    €955 (Avg Bid)
    €955 Offre moyenne
    24 offres
    Game Concept Art S'est terminé left

    Is a sunny day, on a plateau, in the clouds a burning plane crashes and goes beyond the screen, the shot drops in altitude and stops on the...and behind them we glimpse some civilians running away. We continue and arrive at the edge of the dam, we jump down and land in a stream with water at mid-waist that runs through a dark forest. This time the main character has to continue towards the right, for the first few seconds he is slowed down by the water but shortly after he comes out of it, we meet some wild boars and a bear who attacks us while the wild boars run away... after a short while the forest ends, we find ourselves at the open to the sun in the middle of the fields, we don't even have time to get used to it before after a few moments of being outdoors and con...

    €30 (Avg Bid)
    €30 Offre moyenne
    1 offres

    It's unfortunate we've...malware attack on our WordPress website. We believe it's due to code injections, though we can't rule out other possibilities. As a result, we're looking to onboard a professional with relevant experience in swiftly identifying and effectively resolving such issues. Skills & Experience: - Proven experience in dealing with WordPress malware attacks - Proficient in identifying and resolving code injections - Strong security strategy for preventing future attacks Your application should demonstrate your previous experience in handling similar situations. Evidence of your ability to work quickly and effectively is crucial to this emergency! Let's secure our website and prevent this from happening again. Your expertise...

    €388 (Avg Bid)
    €388 Offre moyenne
    153 offres

    I'm looking for an ethical hacker to test and secure my web application, focusing on specific vulnerabilities and conduct a thorough background verification. - Web Application Security: - Focus on existing vulnerabilities - Emphasis on Injection attacks, XSS, and other potential weaknesses - Particularly interested in vulnerabilities related to social media integrations - Background Verification: - Criminal records checks - Education and credential verification - Character check Ideal Skills: - Proficient in ethical hacking - Strong experience in web application security - Knowledge of common web vulnerabilities - Competency in conducting background checks - Attention to detail and thoroughness in their work. Please bid if you have the necessary skills and exper...

    €95 (Avg Bid)
    €95 Offre moyenne
    8 offres

    ...against future incidents(will release milestone after 10 days), and I won't buy sitelock or sucuri these kind of service, but I will like long term serivce. Key tasks include: - Identify and remove malware: Addressing the specific malware identified - Website restoration: Ensuring the site is fully functional post-malware removal - Warranty: Offer a guarantee/warranty against further malware attacks Ideal freelancers should have: - Proven experience in WordPress website security and malware removal - Experience in working with E-commerce websites - Ability to provide a warranty for future protection - Strong communication skills, as I prefer instant messaging for updates and progress tracking. Overall, I am looking for a reliable and efficient developer who can ensure th...

    €24 (Avg Bid)
    €24 Offre moyenne
    74 offres

    I'm seeking a specialist to enable Web A...against web threats and ensure robust protection of our sensitive data from unauthorized access. While we're not currently aware of any explicit vulnerabilities or security issues, we're proactive in our efforts to ward off potential threats. You'd be expected to deliver the following functionalities with the WAF: - Protection against SQL injection - Prevention of Cross-Site Scripting (XSS) attacks - Blocking zero-day exploits Ideal candidates should have significant experience in network and web security, a strong working knowledge of Citrix Gateway, and fundamental understanding of industry regulations. Prior expertise with WAF enabling will be greatly valued.

    €135 (Avg Bid)
    €135 Offre moyenne
    4 offres

    ...and NGINX like WAF to prevent unauthorized access and malicious activities. - Malware Detection: An efficient malware detection mechanism needs to be integrated to scan for and eliminate threats within my setup. - DDoS Prevention: The implementation should include tools and configurations to mitigate risks related to DDoS attacks. Specific OWASP Top 10 Concerns: - Injection: I'm concerned about potential vulnerabilities that could lead to code or data injection attacks. - Cross-Site Scripting (XSS): The setup must effectively protect against any XSS vulnerabilities. - Insecure Direct Object References: I need to ensure that proper protection is in place to avoid any object reference issues. Ideal Candidate: - Proficient in Docker and NGINX - Strong background in im...

    €88 (Avg Bid)
    €88 Offre moyenne
    9 offres

    ...of the bot is to allow users to manually enter their contributions, which will be stored and displayed. - Leaderboard Tracking: The bot should also have a leaderboard tracking feature that ranks users based on their contributions. This can be done in real-time or on a scheduled basis. Additionally, the bot needs to have the ability to connect to the member's Twitter account, and automatically tweet their contributions. This is a key feature that should be integrated seamlessly. I'm looking for a developer who is proficient in Discord bot development, has experience in creating similar projects, and is comfortable working with integrating Twitter API. The ideal candidate should be able to understand the concept of community management and implement it effectively in t...

    €157 (Avg Bid)
    €157 Offre moyenne
    18 offres
    Real-Time Link Tracker Web App S'est terminé left

    I'm in need of a skilled individual to develop a web-based application that allows me to track the status of links I share. Key Features: - Real-Time Notification: The app should be able to notify me immediately once the shared link is opened by the recipient. So for example if I share a Facebook post / profile link or a tweet link - I want to know if the person who the link has been sent to has opened the link Ideal Skills & Experience: - Proficient in Web Application Development - Strong familiarity with Real-Time Notification Systems - Experience with User Dashboard Design

    €214 (Avg Bid)
    €214 Offre moyenne
    54 offres

    ...against unauthorized transfers. Ownership Verification: Develop methods for verifying ownership of a specific NFT by a given Ethereum address. Provide public access to ownership data of NFTs. Metadata Handling: Ability to store metadata of NFTs, such as images, descriptions, links to external resources, etc. Support for the ERC-721 standard for metadata. Security: Ensure contract security against attacks and vulnerabilities, including protection against stack overflow, recursive calls, and other known threats. Gas Limitations: Optimize gas usage for transactions related to the creation, transfer, and ownership verification of NFTs. Auditing: Document code with detailed comments explaining the logic and structure of the contract. Provide auditing information to ensure contrac...

    €6 / hr (Avg Bid)
    €6 / hr Offre moyenne
    28 offres

    ...(CBT) approach. Key Details: - The therapist should be specialized in CBT with substantial experience applying this approach. - You will provide online sessions, so the ability to be engaging and effective through remote communication is essential. - A critical part of the role will involve designing CBT treatment plans and implementing them during therapies. - Main issues are Anxiety panic attacks attention deficit and depression Ideal Skills and Experience: - Licensed Psychologist - Experienced in Cognitive Behavioral Therapy - Proficient in delivering online therapy - Strong communication skills Your ultimate goal as part of this project will be to assist in promoting mental health wellness through online therapy sessions. The ability to create a secure and comfor...

    €17 / hr (Avg Bid)
    €17 / hr Offre moyenne
    11 offres

    ...ads complying with the policies, they're regularly disapproved due to 'circumventing systems policy'. I need a Google Ads expert who understands this error and knows how to resolve it, ensuring my ads comply with Google's policies. • False Compromise Alert I'm getting false warnings of a 'compromised website'. My website is secure without any unauthorized access or signs of malware or phishing attacks. I'm looking for someone with experience in dealing with such false positives who can rectify this issue. Ideal Skills: • Extensive experience with Google Ads • Knowledge of Google's advertising policies • Ability to troubleshoot and resolve conflict errors • Experience dealing with website security issues, ...

    €86 (Avg Bid)
    €86 Offre moyenne
    20 offres

    I'm looking for an ethical hacker with specialization in network security, web application security, and social engineering attacks to protect vital medical records online. The Job's Purpose: - Scrutinize medical records to identify errors or discrepancies - Make crucial edits and effectively remove them from a specific website Why? Simply put, it’s about maintaining utmost confidentiality. Here are the ideal skills the job requires; Key Skills: - Substantial experience in cybersecurity; network and web application security in particular - Familiarity with social engineering attacks is a plus - Feeled capcacity to review, edit and ethically hack medical records online - Sharp eye to detect discrepancies in such records If you possess the aforementioned ca...

    €21 / hr (Avg Bid)
    €21 / hr Offre moyenne
    23 offres

    I'm looking for a skilled animator to create a cybersecurity video tailored for all employees in my company. This video will serve as a tool to raise awareness about common cyber threats, educate on how to recognize and prevent cyber attacks, and provide guidelines for secure online behavior. Requirements: - Proficiency in creating animated explainer videos. - Strong understanding of cybersecurity concepts. - Ability to convey technical information in a simple, engaging manner. - Prior experience in creating educational videos preferred. The ideal freelancer should be able to blend creativity and technical knowledge to deliver a compelling video that will effectively inform and engage our diverse workforce.

    €119 (Avg Bid)
    €119 Offre moyenne
    79 offres
    Malware Removal for WordPress Site S'est terminé left

    My WordPress website is redirecting to unknown sites and showing signs of injected Javascript. I've experienced this issue despite keeping my WordPress and plugins up to date. Key Requirements: - Identify the malware and its entry point - Remove all malware and traces of injected Javascript - Restore website to its original, clean state - Provide recommendations to prevent future attacks I have full access to my website's hosting environment. Ideal candidates should have proven experience in malware removal for WordPress sites and possess a strong understanding of web security best practices. Please share your approach and experience in your bid.

    €32 (Avg Bid)
    €32 Offre moyenne
    58 offres

    ...experience in creating smart contracts on the Ethereum blockchain. Key Requirements: - Develop a multisend smart contract that supports ERC20 tokens. The contract should allow for the distribution of ERC20 tokens to multiple recipients in a single transaction. - Implement pause functionality as a security feature. This is crucial to protect the contract from any potential vulnerabilities or attacks. - We would like to be able to interact with the contract if possible (on etherscan) Ideal skills and experience: - Proficiency in Solidity, the programming language used for Ethereum smart contracts. - Prior experience in developing multisend contracts and incorporating pause functionality. - Knowledge of best practices for smart contract security. - Ability to deliver a secure an...

    €140 (Avg Bid)
    €140 Offre moyenne
    10 offres

    I'm in urgent need of an expert in malware removal to assist me with cleaning up more than 5 of my websites. The affected websites are a mix of e-commerce and blog sites. The malware has caused significant issues on these sites, including: - Phishing attacks - All sites showing a white page and appearing to be disabled Your primary task will be to conduct a thorough clean-up of these sites, ensuring all malware is removed and that the sites are restored to their original state. Ideal Skills and Experience: - Proven experience with malware removal, particularly for multiple websites - Familiarity with e-commerce and blog sites - Ability to conduct a thorough clean-up without causing any additional damage - Knowledge of security best practices to prevent future incidents

    €82 (Avg Bid)
    €82 Offre moyenne
    45 offres

    ...implementing security measures within AWS, particularly leveraging AWS WAF, AWS IP Reputation, and AWS CloudTrail. Key Responsibilities: - Implement rigorous access control policies to ensure only authorized personnel can access our resources. - Configure and fine-tune AWS WAF to establish robust web application firewall rules, block specified IP addresses, and provide protection against DDoS attacks. - Set up and monitor AWS IP Reputation, ensuring that any malicious IP addresses are effectively blocked from our system. Skills and Experience: - Proven experience in implementing AWS security measures, particularly with AWS WAF, AWS IP Reputation, and AWS CloudTrail. - Strong understanding of encryption protocols and access control policies within AWS. - Experience with monitor...

    €428 (Avg Bid)
    €428 Offre moyenne
    18 offres

    I am seeking a knowledgeable freelancer to deliver a well structured and robust report on Malware, Phishing, and Ransomware cyber attacks that occur prominently in Australia. This report is aimed at the general public and should therefore be written in a comprehensible and digestible manner. The goal is to provide a surveillant scan of key issues, impacts, and potential precautions, giving readers a thoughtful understanding of these cyber threats. To accomplish this project optimally, the required skills and experience include: - Proficiency in Cybersecurity and related topics - Extensive knowledge about Malware, Phishing, and Ransomware attacks - Strong research skills, with a keen focus on Australia - Excellent writing and communication skills, with experience in makin...

    €19 (Avg Bid)
    €19 Offre moyenne
    35 offres