Attack joomla sites jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    6,771 attack joomla sites jobs found, pricing in USD

    using java programming language implement the frequency analysis attack to break vigenere cipher that is using a key of length 2.

    $60 (Avg Bid)
    $60 Avg Bid
    1 bids

    using java programming language implement the frequency analysis attack to break vigenere cipher that is using a key of length 2.

    $60 (Avg Bid)
    $60 Avg Bid
    1 bids
    cryptography 6 days left

    1) Using any programming language of your choice implement the Frequency analysis attack to break a vigenere cipher that is using a key of length 2. 2) Specifications: The program should take one input file which contains the text to decrypt. Assuming that the Vigenere cipher is repeating a key of length 2, write the code to break the cipher and output

    $22 (Avg Bid)
    $22 Avg Bid
    1 bids

    ...[login to view URL] Use this Color Code for Primary Color: #71C9E1 1. Will need a placeholder for a logo. Top: What would the total cost of a successful cyber attack be on your business? Bottom: Cyber Security Facts - 43 percent of cyber attacks are aimed at small businesses. - 58 percent of SMBs have experienced a data breach in the

    $80 (Avg Bid)
    $80
    3 entries

    Looking for Ddos Attack solution i am using shared hosting linux and i dont want to use cloud and my website still under DDOS Attack. Looking for best and easy solution

    $25 (Avg Bid)
    $25 Avg Bid
    12 bids

    1-)The project requires detection of distributed denial of service attack in sdn environment by using s-flow(sample flow) technology. 2-)The project should be performed with ONOS Controller and it is necessary to communicate multiple ONOS clusters. Two of them are sufficient. 3-) Distributed clusters should be able to send ping request from one host

    $279 (Avg Bid)
    $279 Avg Bid
    4 bids

    ...Physics).. * Game Features : Very Attractive UI/UX. Should have the Old Physics for the Ball. More Obstacles, challenging obstacles. Solo Carrier mode through levels, Time attack, in settings hard mode, easy mode, and (If possible Multiplayer through Local WIFI or Internet Multiplayer). A lot of Levels, and (in Future Updates Actively Multi Levels

    $351 (Avg Bid)
    $351 Avg Bid
    8 bids

    Hi Janki we make Games and Animations and are looking to work with an artist for all our projects. The current requirement is a female char...projects. The current requirement is a female character sprite sheet. We have designed the character, we need only the Character sprites to be designed (like run , jump, attack etc) . Best Regards Vinay

    $84 (Avg Bid)
    $84 Avg Bid
    1 bids

    I need a proof of ...following: one running hidden service with a bad configuration which will lead to the leak of the public ip using the attack showed in the video. I need to know the case where it can happen, how to execute the attack and how to prevent the attack. I have a vulnerable test site up, if you can do this job I will give you the details

    $272 (Avg Bid)
    $272 Avg Bid
    4 bids

    Hey, i have been attacked and most of my sites display this screen shot message.I need a fixer urgently to fix this kind of attack

    $35 (Avg Bid)
    $35 Avg Bid
    6 bids

    ...(first) log file will be mixed (attack + robot + normal) log file. Next, 5 log files which I have downloaded from internet will be provided to you. Here, you need to classify entries in these each log file as per given 6 attacks. The same algorithm will find how many IP numbers are there in each file for each attack and percentage of it. Note - one

    $500 (Avg Bid)
    $500 Avg Bid
    1 bids
    software development 3 days left
    VERIFIED

    buffer overflow attack which has six tasks

    $22 (Avg Bid)
    $22 Avg Bid
    2 bids

    There is requirement to identify all footprints/patterns of brute force attack from any web server log file. Algorithm is required to write in python/R language and it is required to test on given few log files.

    $166 (Avg Bid)
    $166 Avg Bid
    7 bids

    ...protect it, 1 in front, 1 on the left and 1 on the right) 5) After the game is over results are recorded on user account Other: - Every character should have 3 attacks. A basic attack and then 2 different attacks that cool down over time. - After a game, each player of the winning team receives 100 gold. While the losing team gets 10 gold. - Leaderboard

    $1367 (Avg Bid)
    $1367 Avg Bid
    29 bids

    A big recipes blog is looking for a killer SALES expert to help us reach our ambitious goals. We see huge potential with many angles to attack.

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    12 bids

    ...Facebook, Twitter and Instagram to be managed with weekly post or two post per week. This position will start in March. Now I just want to meet someone who can devise a plan of attack for when March begins so we can hit ground running. This is a salary position at $100/month + potential monthly bonus for starters. If you have more experience then pay is

    $123 (Avg Bid)
    $123 Avg Bid
    33 bids

    Malware attacked our servers and decrypted our entire [login to view URL] to restore oyr data.

    $519 (Avg Bid)
    $519 Avg Bid
    1 bids
    Mikrotik Configuration 1 day left
    VERIFIED

    I need a Network administrator to monitor and edit my current configurations and see if I have vulnerability and stop any attack from happening. and manage my current bandwidth and share it with users.

    $188 (Avg Bid)
    $188 Avg Bid
    27 bids

    ...using given log files), accuracy of algorithm (based on 1 mix log file) 8) 6 log files will be provided. Among these files, 1 log file will be mixed (attack + robot + normal) log file. I have created attack log file by using DVWA application and applying 3 scanners, I have downloaded another robot file and normal file from web. I need to mix this, or you

    $781 (Avg Bid)
    $781 Avg Bid
    6 bids

    Server have got an phishing attack report and needs to be cleaned. Also e-mail service have stopped regular with 3-5 days between. Exim restarted with no help. Server restart fix issued. All need to be report with cause and fix.

    $133 (Avg Bid)
    $133 Avg Bid
    14 bids

    - In this lab,...twodimensional, viscous and turbulent. The effect of variation of the angle of attack has on the lift and drag characteristics of the aerofoil are the main object of this lab as well as the utilizationof different turbulence models when separation occurs for high angles of attack. Additional details and the geometry will be provided.

    $67 (Avg Bid)
    $67 Avg Bid
    8 bids

    Hello, I need a Website where we can predict possible cyber attack based on the previous dataset. I need you to come up or find out dataset and based on that we can decide how the output will look like.

    $113 (Avg Bid)
    $113 Avg Bid
    6 bids

    Hey, i dont know how to pm you. My question: i need some1 who can write me a bo...protect from melee/ranged and magic. What i need is that my bot client will automaticaly detect what the monsters are gonna do and then to use the protection prayer against the attack from the monster. The minigame is Called "infernal cape". Waiting for a answer. Thanks

    $9 (Avg Bid)
    $9 Avg Bid
    1 bids

    ...of Ddos, I would look for someone to configure a firewall via iptables or other so that the ddos ​​does not pass. Of course you have to test before I have friends who can attack. My host has a 100gbps protection that is not enough: / He told me that an itpable configuration should be enough [Removed by Freelancer.com Admin] Thank you in advance

    $159 (Avg Bid)
    $159 Avg Bid
    11 bids

    i need a model for IoT network intrusion detection system just 3 attack detection model is enough. attack likes hello flood, black hole, wormhole, etc..

    $185 (Avg Bid)
    $185 Avg Bid
    10 bids

    We want to check our email server's security and do penetration test on it . As per the results, we want to find the errors, backdoors and unsecure stuff and secure them.

    $156 (Avg Bid)
    $156 Avg Bid
    11 bids

    ...pixel art. Each character will be: - Unique design (as per Vector example that will be given) - Idle (standing) animation - Passive Attack animation punch/stab - depending on the character design - Special Attack animation - unique to each character. For example may be animating shooting a bow. - All 8 direction versions required For now I have

    $28 (Avg Bid)
    $28 Avg Bid
    4 bids

    I have a wordpress website which was functioning well Suddenly the hosting company suspended my account due to some hackers attack. I have un-blocked the website but need to fix the gaps and make some security checks and fixes to avoid it in future

    $142 (Avg Bid)
    $142 Avg Bid
    57 bids

    Need to fix this issue asap. If you can help, please chat me

    $100 (Avg Bid)
    $100 Avg Bid
    10 bids

    Hello. I need help with a small task, i'm barely a beginner in machine learning. If someone can help me out with designing a protocol and attack using ml and python. Please inbox me

    $26 (Avg Bid)
    $26 Avg Bid
    2 bids

    ...kali linux on Virtual machine Wifi adapter, realtek rtl8812au Wifi adapter, ralink rt2870/rt3070 Methodology: any of following plans Plan A: create an auto script of krack attack Link: [login to view URL] Plan B: update fluxion script to allow clients to auto connect to fake AP. Link: [login to view URL]

    $107 (Avg Bid)
    $107 Avg Bid
    3 bids

    hello currently have two sites under attack 1. [login to view URL] seems ok but once you go to [login to view URL] theres a weird page that pops up. 2. [login to view URL] seems ok also but once in a while, the same error will show up.

    $140 (Avg Bid)
    $140 Avg Bid
    33 bids

    Simulate some types of attacks related to Lora technology (MIMT, Jamming, Network Flooding, Beacon Synchronization, ACK Spoofing, Down-link Routing Attack, etc..)

    $20 (Avg Bid)
    $20 Avg Bid
    5 bids

    ...building a new MMORPG and are looking for a long-term relationship with professional modelers. All models must be high quality and include around 10 animations (walk, run, some attack, die, etc.). -Character Models: These must be HIGH POLYGON (think Overwatch game quality). We'll need around 12-14. -Item Models: Each character will have 5 sets of armor

    $27989 (Avg Bid)
    $27989 Avg Bid
    23 bids

    ...Shoot any enemies nearby. 3) Recover The Flag The tank has to recover the captured flag and return to base. Shoot any enemies encountered 4) Engage Enemy The tank has to attack the enemies nearby. Shooting doesn't have to be fancy. Just shoot some spheres!! Use A* or any other effective solution. Navigation to waypoints using wheel colliders is

    $149 (Avg Bid)
    $149
    4 entries

    ...recognise at a glance. Some of these icons will be elemental classifications (such as Earth, Air, Fire, etc), while others will be physical statistics (such as Health Points, Attack, Defence, etc.) If you are interested, then please send me a message to discuss the project in further detail (Due to the number of offers I receive, only artists who contact

    $96 (Avg Bid)
    $96 Avg Bid
    44 bids

    ...SECURITY EXPERT to apply all security suggested to run a production server. I have many articles relating to what Im looking for: [login to view URL]@nodepractices/were-under-attack-23-node-js-security-best-practices-e33c146cb87d [login to view URL]@tkssharma/secure-node-js-apps-7613973b6971 [login to view URL]

    $190 (Avg Bid)
    $190 Avg Bid
    16 bids

    I would like to apply adversarial attack based on enegy based neural network. Increasinf energy would make classifier fool

    $182 (Avg Bid)
    $182 Avg Bid
    8 bids

    Negative seo attack

    $487 (Avg Bid)
    $487 Avg Bid
    15 bids

    Single character, flour sack...inject some life into a characters primary movement set: Crawl, Walk, Jog, Run, Short Jump, High Jump, Ledge Grab, Throw Punch, Uppercut, Swimming, 3 weapon attack animations, 3 spell attack animations (we'll supply fx, 3d model (skeleton already in), just need character movements). This would be for commercial release.

    $26 / hr (Avg Bid)
    $26 / hr Avg Bid
    39 bids

    ...The features should not be based upon any one or two log files. You can use python or R programming for coding this algorithm. You can use available online payloads for each attack. Accuracy of finding attacks from an algorithm should be good. (5 to 6 log files will be provided to check the algorithm and accuracy). Remember that payloads are not similar

    $145 (Avg Bid)
    $145 Avg Bid
    8 bids

    ...Five-Step Marketing Research Approach and discuss the importance of research in marketing. Describe each step of the Marketing Research Approach in detail and create a plan of attack to explain how each stage should be implemented. Define the target market that you are striving to bring into this organization and describe the methods of research that you

    $112 (Avg Bid)
    $112 Avg Bid
    49 bids

    ...master key for iclass/(se), please contact me for further info. Ex. how to get standard card key The first attack exploits a total of four weaknesses in the cipher, key diversification algorithm and implementation. In order to execute this attack the adversary first needs to eavesdrop one legitimate authentication session between card and reader. Then

    $716 (Avg Bid)
    $716 Avg Bid
    1 bids

    ...back to the pool. - To switch the AUTH - To refresh the IPs - Ability to purge all tokens - POSTMAN interface for the REST API Firewall Should prevent from DOS attack. Should limit the no. of connections per IP. Should stop any unwanted connections. Troubleshooting Tools - Check the sanity of a server, it's DNS and all it's IP ranges

    $669 (Avg Bid)
    $669 Avg Bid
    59 bids

    I need a logo designed. I’m a young writer and I need a logo for my comic my comic is called Sword Attack a fantasy/comedy

    $24 (Avg Bid)
    $24 Avg Bid
    31 bids

    I am looking for an expert on linux server security to check and prevent any ddos attack. Install any good firewall or tools for that.

    $26 (Avg Bid)
    $26 Avg Bid
    11 bids

    I would like two bits of health related research. First some data that shows the reduction in smoking related diseases since the 1964 S...report, but more importantly some graphs that show the increase in people who have become overweight or obese and the increase in deaths from obesity related diseases like heart attack, diabetes and stroke. Cheers

    $95 (Avg Bid)
    $95 Avg Bid
    36 bids

    I need a eth Hacker who is able to give me a solution i can use it to attack some spamers vps who attacks my system Thanks

    $112 (Avg Bid)
    $112 Avg Bid
    8 bids

    Website has been hacked with Malware > Clear all malicious files/code from your account; > Update/upgrade all applications and their extensions to the latest available versions; > Remove the applications/extensions/templates that you are not using;

    $108 (Avg Bid)
    $108 Avg Bid
    36 bids