Database attacks mysql php jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    4,376 database attacks mysql php jobs found, pricing in USD

    ...cornerstone and an accordion layout. This has worked well but the owner is happy to change to a different method if it works well. 7. The site has previously been open to DDoS attacks so needs to be secured from this, it currently is monitored by Sucuri. However, plugins etc can be installed that help in this area provided use of site is not impeded 8. The

    $1458 (Avg Bid)
    $1458 Avg Bid
    140 bids

    ...Crypto Currencies including a HOT AND COLD wallet system. • Referral Program • Android – iOS Apps and Update support • Security Aspects – CloudFlare – to mitigate DDoS attacks • Blog • Notification Ticker • Day and Light UI mode • Data Center Requirements and Deployment support. • It should be noted that - since Security a...

    $7366 (Avg Bid)
    $7366 Avg Bid
    29 bids
    Java developers needed 6 days left
    VERIFIED

    SQLiGoT: Detecting SQL Injection Attacks using Graph of Tokens and SVM

    $170 (Avg Bid)
    $170 Avg Bid
    6 bids

    We have the web design (front-end) of our new page [login to view URL] we need the following: 1) The design (front-end) must be ...have webpage caching (cache 1 day) and a url to clean the cache of the entire site 5) maximum load time should be maximum of 5 seconds 6) You must have security to avoid DDOS attacks or some other attack.

    $200 (Avg Bid)
    $200 Avg Bid
    13 bids

    ...saving passwords ( Depend of server you are buying ) 2. Security feature to block Cross site scripting attacks 3. Security features to block SQL injection attacks 4. SEO for images 5. Future proof and Flexible development process Technology – PHP Timeline - 15 Days...

    $8 (Avg Bid)
    $8 Avg Bid
    1 bids

    ...saving passwords ( Depend of server you are buying ) 2. Security feature to block Cross site scripting attacks 3. Security features to block SQL injection attacks 4. SEO for images 5. Future proof and Flexible development process Technology – PHP Timeline - 15 to 20Days ...

    $398 (Avg Bid)
    $398 Avg Bid
    5 bids

    ...The Gurew product provides cyber security data to clients and helps prevent cyber attacks. Certain elements of the product could be highlighted in the design: a) It provides an "active defence", i.e. rather than just reporting cyber attacks, it can also stop attacks. b) It provides protection from inside AND outside the company's network. Usually,

    $111 (Avg Bid)
    $111 Avg Bid
    82 bids

    ...managing the other servers. The MySqL is not running anymore and could not be started anymore we did a upgrade/update to Debian 8 but this was not helping. login to ISPConfig is not possible because mysql is not running. maybe our server was attacked. in the log files we saw multiple attacks on the server and database. We also want the have blocked some

    $134 (Avg Bid)
    $134 Avg Bid
    19 bids

    I need a Live project on IOT with AWS (IOT based Smart parking system using AWS ) or using the IOT to predict heart attacks and cancer .

    $107 (Avg Bid)
    $107 Avg Bid
    1 bids

    ...saving passwords ( Depend of server you are buying ) 2. Security feature to block Cross site scripting attacks 3. Security features to block SQL injection attacks 4. SEO for images 5. Future proof and Flexible development process Technology – PHP Timeline - 15 to 20Days ...

    $2948 (Avg Bid)
    $2948 Avg Bid
    14 bids

    We do have 3 Servers where is ...managing the other servers. The MySqL is not running anymore and could not be started anymore we did a upgrade/update to Debian 8 but this was not helping. login to ISPConfig is not possible because mysql is not running. maybe our server was attacked. in the log files we saw multiple attacks on the server and database.

    $76 (Avg Bid)
    $76 Avg Bid
    4 bids
    VIR[TUAL]US 1 day left

    The concept of my project is a virus created by men that overpowered them and attacks constructions, it "eats" the buildings and grows bigger and faster each day. Its organic form contrasts with the rectangular buildings. Whats required is a 3D organic model with more than two entities linked to each other with "webs" shapes and to the ground too (like

    $220 (Avg Bid)
    $220 Avg Bid
    9 bids

    Mitigation of Denial of service attacks on robot

    $22 (Avg Bid)
    $22 Avg Bid
    5 bids

    ...swallowing it, and moving to the next chunk. simplified chess: no pawns, no check, no checkmate, no stalemate play until you take the king. design legalMoves/3: attacks(r,f,P): pT := pieceType(r,f,P) /* if pT == 'b': // piece is a bishop return attacksBishop(r,f,P) else if pT == 'k': // piece is a knight return

    $10 (Avg Bid)
    $10 Avg Bid
    1 bids

    Hello, we have a network in Datacenter and our Router (Mikrotik RB2011UiAS) The cpu usage becoming sometimes 100% because of firewall service. We need an expert to config...(Mikrotik RB2011UiAS) The cpu usage becoming sometimes 100% because of firewall service. We need an expert to configure the router best performance and safest protect for attacks.

    $57 (Avg Bid)
    $57 Avg Bid
    4 bids

    ...the AdBlockers to hide the ads on the website. Content Protection Protect your website content from copying. Intelligent Pattern Recognition Detects Unknown and Zero-Day Attacks and Exploits. Ban System Block and redirect Visitors / Users (IP Addresses), Countries, IP Ranges, Operating Systems, Browsers, Internet Service Providers (ISP) and Referrers

    $198 (Avg Bid)
    $198 Avg Bid
    12 bids

    three questions 1. Question 1; Choose one case of the following and what would...case of the following and what would you do? (3 points) 2. Question 2; Apply ethics in IT Professional environments? (3 points) 3. Question 3; Mention some cases of cyber attacks in kingdom of saudi arabia and anti-cyber attack law in kingdom of saudi arabia? (4 points

    $65 (Avg Bid)
    $65 Avg Bid
    42 bids

    ...with similar formula): Weight = 1, 10 attacks per minute. Weight = 2, 9 attacks per minute. Weight = 3, 8 attacks per minute. Weight = 4, 7 attacks per minute. Weight = 5, 6 attacks per minute. Weight = 6, 5 attacks per minute. Weight = 7, 4 attacks per minute. Weight = 8, 3 attacks per minute. Weight = 9, 2 attacks per minute. Wei...

    $35 (Avg Bid)
    $35 Avg Bid
    24 bids

    ...in one single bot! Inferior bots only allow access to one exchange and one trading pair per bot and they store your API keys in their own database and servers which are susceptible to hacks and pump and dump attacks. Your API key protection and security is a high priority and WolfpackBOT is the only Trading Bot that gives you full control and security

    $80 (Avg Bid)
    $80 Avg Bid
    2 bids

    Hello, I want to have a bitcoin lottery site, I would like to have a login & register option on this page and an integrated bitc...minus 10% for me. The site will be run by a VPS provider & connected to an onion domain, the site should also be DDOS protected and well protected against hackers or other attacks. Can you do something like that for me?

    $29 / hr (Avg Bid)
    $29 / hr Avg Bid
    1 bids

    Hello, I want to have a bitcoin lottery site, I would like to have a login & register option on this page and an integrated bitc...minus 10% for me. The site will be run by a VPS provider & connected to an onion domain, the site should also be DDOS protected and well protected against hackers or other attacks. Can you do something like that for me?

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    1 bids

    Hello, I want to have a bitcoin lottery site, I would like to have a login & register option on this page and an integrated bitc...minus 10% for me. The site will be run by a VPS provider & connected to an onion domain, the site should also be DDOS protected and well protected against hackers or other attacks. Can you do something like that for me?

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    We are onlinebased team and we welcome highly motivated sellers to market our merchandise in [login to view URL], [login to view URL], [login to view URL] [login to view URL] business preposition applies to seller...don't ship from China, Japan or other exotic country. Please make sure to provide your ebay ID when contacting us - we simply need to avoid the enormous spam and phishing atta...

    $485 (Avg Bid)
    $485 Avg Bid
    15 bids

    Hi I am Kira, and i have some VPS host that i use to reshare tv cards services with those VPS but some compititors attacks my host and always the server go down I hope talk to you to see if you can help Thanks

    $160 (Avg Bid)
    $160 Avg Bid
    6 bids

    ...encryptions especially the quantum resistance encryption as layer such as [login to view URL] I need the most advanced ios system to make it unhackable and unbreakable from any type of larg attacks. This is the main point. We need it to be very different and no one at all even me or anyone can do anything even if he got access in the server. The app must NOT store any

    $7782 (Avg Bid)
    $7782 Avg Bid
    33 bids

    ...done mobile game development to be able to have a good idea of what needs to be completed here. Because its turn based, that means dice based rolls for engine that controls attacks and defense and how power, health, etc. is affected. THIS MUST be done in GoDot game engine and development, no other game engine and development tools. All sprite and art

    $1268 (Avg Bid)
    $1268 Avg Bid
    36 bids

    ...small rifles: grant invisibility for a short moment Avenger: shadow sword that is possessed by the spirit of a powerful samurai that can empower the user and aid him in attacks Moleclaw: Fistclaw weapon that allow the user to easily burrow underground to ambush attackers The Other Side: A pocket mirror that can summon monsters Phobia: A flask

    $70 (Avg Bid)
    Featured Guaranteed Sealed NDA
    $70
    115 entries

    Hello, I'm looking to have a code block created to prevent xss injections on my site. I have a site that has forms an...I have a site that has forms and a searchbox the code block will also need to block URL injection also. I've looked into OWASP and was only able to prevent the searchbox attacks but couldn't get the URL to decode for URL injection

    $56 (Avg Bid)
    $56 Avg Bid
    6 bids

    Hi everyone, I'm...similar to Flappy Bird except that I'm a paratrooper and I just jumped off my warplane and into enemy territory. They are firing at me and I have to tilt the phone to dodge the attacks. The longer into the game the harder to dodge. Other than this, please keep everything else similar to Flappy Bird including the crappy graphics ;-)

    $555 (Avg Bid)
    $555 Avg Bid
    11 bids

    For this assignment, you are to create a PHP web app that lets a single user log in and manage (i.e. view, add, remove, and modify) the contents of a table stored in a MySQL database. The default idea is to create a “collection manager” to manage some collection of objects (i.e. coins, vinyl, blog posts, etc.) The Data Table Your table must have at

    $17 (Avg Bid)
    $17 Avg Bid
    11 bids

    ...primary mission is to provide our clients with knowledge and expertise to defend their enterprises against advanced cyber attacks. Our capabilities and methodologies are based on over a decade of defending enterprises against targeted attacks and sophisticated threat actors. For over a decade, our team has helped clients evolve their capabilities across the

    $40 (Avg Bid)
    Urgent Guaranteed
    $40
    53 entries

    ...primary mission is to provide our clients with knowledge and expertise to defend their enterprises against advanced cyber attacks. Our capabilities and methodologies are based on over a decade of defending enterprises against targeted attacks and sophisticated threat actors. For over a decade, our team has helped clients evolve their capabilities across the

    $60 (Avg Bid)
    Urgent Guaranteed
    $60
    232 entries

    ...CTS response message which we derive the true global MAC address of that device. Instead of a localization attack, we are using RTS/CTS exchanges to perform derandomization attacks". In essence we would get a CSV file with the following data of the device present in the area: date and time in microseconds of probe request reception, MAC addresses received

    $1422 (Avg Bid)
    $1422 Avg Bid
    7 bids

    ...you how to get the data for all the fields if you don’t know. Do not select channels with a bunch of different types of videos. For example, if the topic is "wild animal attacks", a channel that has videos of car crashes, gaming videos, or other topics should not be included. Do not give more than 5 channels on a single topic. For example, if you you’ve

    $12 (Avg Bid)
    $12 Avg Bid
    11 bids

    ...provide recommendations on what should be done about the various incidents. 2. Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented. 3. Discuss the importance of user technology security education

    $57 (Avg Bid)
    $57 Avg Bid
    51 bids

    defense in depth and awareness from cyber attacks protecting national infrastructure

    $38 (Avg Bid)
    $38 Avg Bid
    44 bids

    ...order for you to adjust your quote the way you should. Our current website is in a pretty bad shape (the original version was developed in WordPress, but after a number of attacks that took place a while ago, all the customization+other features has gone). Therefore we re looking for a brand new website, preferably but not necessarily in wordpress, with

    $9 (Avg Bid)
    $9 Avg Bid
    1 bids

    ...networks which is infrastructure less and adaptive in nature. Vampire attacks is the type of resource depletion attacks in which a malicious node create and send the message with node. Vampire attacks choose the longest path and loss the battery power. We can reduce the vampire attacks with the help of clustering technique. Clustering is the process that

    $378 (Avg Bid)
    $378 Avg Bid
    1 bids

    We are currently making a mobile game and we are looking for someone to create all the icons in game (battle, special attacks, store, in-game purchases, inventory, etc.). The mobile game is set in a cyberpunk universe where heroes enter a Battle Royale to win and be the last survivor team! The winner of the contest will be chosen to continue

    $50 (Avg Bid)
    Featured Guaranteed Top Contest
    $50
    15 entries

    Wowonder script will be customised according to following spects: [login to view URL], source code of this social network script will be provided. It is writtten on core php . With this script a new social network dedicated to crytocurrency in which people provide their crypto currency related information too. There is a step wise sign up process

    $6 / hr (Avg Bid)
    $6 / hr Avg Bid
    8 bids

    ...Crypto Currencies including a HOT AND COLD wallet system. • Referral Program • Android – iOS Apps and Update support • Security Aspects – CloudFlare – to mitigate DDoS attacks • Blog • Notification Ticker • Day and Light UI mode • Data Center Requirements and Deployment support. • It should be noted that - since Security a...

    $16911 (Avg Bid)
    $16911 Avg Bid
    42 bids

    ...cards. 19- database to store dongle imei and imsi of simcards an relationship between them. 20-auto remove non present dongles. 21- database to for inventory management (purchased sim cards, prepaid recharge cards) 23- hide/show numbers 22- Module to change IMEI number of dongles. setup security rules to avoid automated bruteforce attacks on server

    $719 (Avg Bid)
    $719 Avg Bid
    6 bids

    An App connecting hospitals to ensure transport of patients with heart attacks to the hospitals that provide catheterization services.

    $656 (Avg Bid)
    $656 Avg Bid
    53 bids

    ...three people injured and a cheese factory and several homes in ruins. An Israeli military spokesman confirmed the attacks, describing them as a response to a Palestinian rocket that landed in Israel on Thursday. Israel said the attacks had targeted factories producing weapons....

    $3 / hr (Avg Bid)
    $3 / hr Avg Bid
    17 bids

    ...Creating custom WooCommerce sites • Maintain existing eCommerce platforms (WooCommerce and Shopify) and administer changes to user interface and/or back-end data architecture database • Design and develop new functionality enhancements for eCommerce web sites • Identify and resolve systems issues • Perform quality assurance tests and ascertain the cause

    $31 / hr (Avg Bid)
    $31 / hr Avg Bid
    81 bids

    Hi we have a vps centos w...installed on Godaddy service, We need help with our security, we are receving ddos attacks and i cannot trace and find where the security hole is and close it, at the same time install a firewall that restricts the connection peer IP in order to get ride of any attacks with the same IP.. Thanks i appreciate your offers

    $137 (Avg Bid)
    $137 Avg Bid
    6 bids

    I need a specialiste in servers protectio who is able to defend against DDOS attacks and Hackers attack on server's ports.

    $53 (Avg Bid)
    $53 Avg Bid
    4 bids

    ...based server running Windows, Windows Server 2012 (64 bit) ColdFusion 11 PHP 7 MySQL 5 SmarterMail We URGENTLY need an expert in configuring and maintaining the security for our server. Top priority is analyzing and configuring our server to prevent and stop SYN Flood attacks. Our server has been under attack for the last 3 days and our hosting company

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    20 bids