Dos attack programm jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 dos attack programm jobs found, pricing in USD

    I'm looking for an expert in openbsc, osmocombb, and openbts GSM to help me with a project that includes the following key aspects: - **GSM Man-in-the-Middle (MITM):** The project also involves GSM man-in-the-middle functionality. This includes capabilities such as intercepting and analyzing GSM communications, modifying GSM network traffic, and manipulating GSM network authentication. Ideal Skills and Experience: - Proven experience with openbsc, osmocombb, and openbts GSM. - In-depth knowledge of GSM network setups, including voice calls, SMS, and base station capabilities. - Proficiency in network monitoring and analysis tools. - Previous experience with GSM man-in-the-middle implementations. - Excellent problem-solving skills to address any performance requirements that may ari...

    $2296 (Avg Bid)
    $2296 Avg Bid
    26 bids

    Game Requirement Character : Male, full animation: Idle, run, attack, jump, die… Provide full UI and Game Asset Provide full sound and effect Number Map: 8 Number Boss: 8 Enemy for each map: 4-5 ( with full animation: idle, run, attack, die… ) Provide Game icon. Intergrate with Admob in game Intergrate shop IAP in game. Game can run on Mobile and PC also. Game resolution: Hozirontal 1920x1080

    $20 (Avg Bid)
    $20 Avg Bid
    6 bids

    I'm looking for a highly skilled machine learning expert to develop a solution that leverages supervised learning techniques to detect different types of side channel attacks . The solution should ideally be capable of adapting to various datasets. Key Responsibilities: - Development of detection model using supervised learning. - The model should be designed to adapt and learn from different datasets. - collecting data from Hardware level Ideal Skills & Experience: - Expertise in Machine Learning is mandatory, specifically in supervised learning techniques. - A strong understanding of cybersecurity and side channel attacks is required. - Familiarity with various datasets and hands-on experience in working with them. - A strong understanding of Microarchitecture analysis (reg...

    $467 (Avg Bid)
    $467 Avg Bid
    31 bids

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $29 (Avg Bid)
    $29 Avg Bid
    8 bids

    ...the time the systems administrators discovered the nature of the attack, it was largely too late. Critical files all across the AvantPharm network had been encrypted and were unusable. To make things worse, the backup system in place was unmonitored and had been failing backup jobs for months, so they did not have a reliable way to restore the encrypted data. AvantPharm narrowly averted complete disaster by paying the attackers one of the largest ransomware payments in history; 25 million dollars. However, they nearly lost the business when the attacker took 2 full weeks to return control of their data as well, so the impact was further damaging to profitability and reputation. In the end, the company barely weathered the attack and resumed operations at reduced capacity o...

    $19 (Avg Bid)
    $19 Avg Bid
    95 bids

    I require a reliable and experienced developer to assist me in implementing a Content Security Policy (CSP) in my JavaScript application. Key Details: - Purpose: The primary goal of this CSP implementation is to prevent Cross-Site Scripting Attacks within the application. - Target Sources: The CSP should be configured to allow only self-hosted scripts...permitted. - Integrate the CSP seamlessly with the existing application architecture, ensuring no disruptions in functionality. Ideal Skills and Experience: - Proficiency in JavaScript and web application security. - Prior experience with Content Security Policy implementations. - Understanding of and its usage in specifying content sources. - Knowledge of common Cross-Site Scripting (XSS) attack vectors and mitigation strategies.

    $12 (Avg Bid)
    $12 Avg Bid
    13 bids

    ...vulnerabilities, severity levels, and recommended remediation measures. Collaborate with our development team to prioritize and address security issues. Requirements: Proven experience in penetration testing for Magento 2 websites and AWS environments. Proficiency in industry-standard tools and techniques for vulnerability assessment. Strong understanding of web application security principles and common attack vectors. Excellent communication skills. Deliverables: Detailed penetration testing report. Regular progress updates and communication. How to Apply: Please submit your proposal with details of your experience, approach to penetration testing, and proposed timeline and cost estimates. Additionally, include any relevant certifications or references. Thank you for your i...

    $178 (Avg Bid)
    $178 Avg Bid
    21 bids

    We recently experienced a malware attack on our system and we're seeking an expert who can ensure this doesn't happen again in the future. We don't require data recovery services; our main priority is to make sure it never happens again. Ideal candidates should possess: - In-depth experience in counteracting malware attacks - Mastery in various security domains such as network, application, and endpoint security - Proven track record in enhancing system security

    $127 (Avg Bid)
    $127 Avg Bid
    20 bids

    Marketing digital e gerenciamento de impulsionamento para dupla de música sertaneja que possui carreira de 10 anos. Tem um projeto super diferente do que está no mercado atual de sua concorrência. Um dos integrantes é parente de um cantor famoso do segmento. Já tiveram presença em diversos meios de comunicação. A dupla está voltando ao mercado após um hiato. Precisa de gerenciamento de impulsionamento digital para aumento efetivo de sua presença digital face ao seu segmento. Conhecimentos de impulsionamento em redes sociais, Youtube, Spotify e blogs do segmento. Campanhas virais e memes. Gerenciamento e inteligência de orçamento otimizado para impulsionamento. Amadores, ou aventureiros da &aac...

    $1714 (Avg Bid)
    $1714 Avg Bid
    14 bids

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $11 (Avg Bid)
    $11 Avg Bid
    7 bids

    ...of autoencoders for feature extraction and GRU models. Key project elements include: * Professionals will need to implement an autoencoder for feature extraction with the core goal of reducing data dimensionality. Prior experience in working with high-dimensional data and in deploying autoencoders is necessary. * Subsequently, the system built should be capable of classifying Denial of Service (DoS), User to Root (U2R), and Probe attacks within the KDD dataset. Good working knowledge of GRU models and the mentioned attacks is required. * The project includes steps to ensure the accuracy and reliability of both the autoencoder and GRU model. This includes: 1. Hyperparameter Tuning: Applicant should be dexterous in practicing various optimization techniques to increase the per...

    $34 (Avg Bid)
    $34 Avg Bid
    8 bids

    I'm seeking an experienced animator to create a 2D logo animation for my brand. This shouldn't just be an ordinary animation, it should convey professionalism and trust, leaving a memorable impression on anyone who encounters it. Key dos and don'ts for the project: - Please use neutral colors that gel well with the ethos of my brand. - Ensure the animation is smooth and clean, signifying the professional style we're after. - The animation should be simple, not overly complex or flashy. Subtlety is key in reaching the professional and trust-worthy feel. - Keep in mind the purpose of this logo animation is to evoke a sense of trust in our audience. Ideal freelancer should have: - Proven experience in 2D animation, especially in logo animations. - A strong eye ...

    $66 (Avg Bid)
    $66 Avg Bid
    25 bids

    ...are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you should connect with ibm quantum computer. 4- all requirement should be delivered in three days. ...

    $293 (Avg Bid)
    $293 Avg Bid
    27 bids

    I'm looking for a skilled professional to conduct a network security test on our workstations using ARP poisoning techniques. The focus of this project is to identify vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someone with signifi...

    $64 (Avg Bid)
    $64 Avg Bid
    15 bids

    I'm looking to modify the SAAS-BOILERPLATE open-source project to create an interactive membership website for indie filmmakers and film students. NOTE: MOST of the required functions are already implemented in the boilerplate. You do NOT need to connect Stri...for webdesigner collaboration (squarespace has an interesting version that is attached below to the project) IDEAL FREELANCER PROFILE: - Have previous experience with backend development using Laravel PHP - security-focused emphasis on security against attacks on webapps - experience minimizing the attack surface of webapps - Understand how to integrate video hosting in SaaS

    $553 (Avg Bid)
    Featured
    $553 Avg Bid
    64 bids

    I am seeking a skilled freelancer to help me create a data collection tool for an intrusion detection system. This system's main purpose is to collect data for analysis, focusing on network traffic. Key tasks include: - Designing a new normal and attack dataset using Mininet WiFi - The focus is on detecting Denial of Service (DoS) and Man-in-the-Middle (MitM) attacks Ideal candidates should have experience: - Building intrusion detection systems - Working with Mininet WiFi - Handling network traffic data - Familiarity with DoS and MitM attacks This tool will greatly aid in identifying and preventing future network attacks by providing structured data for our analysis team.

    $350 (Avg Bid)
    $350 Avg Bid
    3 bids

    I'm looking for a highly skilled web designer to create a beautiful, user-friendly wedding website for my special day. Key Features: - Romantic pastel color palette - Incorporation of essential pages including: - Event Details - An editable RSVP form - Wardrobe Planner - Tuck Shop - Places to visit nearby - Dos & Don'ts - Photo Gallery - A visually pleasing countdown timer The perfect candidate should have a great eye for design, outstanding technical skills, and prior experience in wedding website creations. Familiarity with interactive features is a must. Let's make this dream a reality!

    $186 (Avg Bid)
    $186 Avg Bid
    14 bids

    We are looking for a experienced agency to help us with our lead generation campaign, to help us attract small and medium business outside Qatar who are interested to expand their ecommerce business to Qatar, (More about t...proper targeting channels for this campaign, including the following scope: Understanding the target audience, defining the appropriate channels to use, create a budget per target audience, doing a keyword search based on the search intent , assess the initial Budget spent, content production, campaign performance monitoring. Budget is allocated for the service fee of managing the campaign, and dos not include the media buying fees that will be assessed and budgeted based on the plan. Open to suggestions regarding which marketing channels to utilize for the ...

    $394 (Avg Bid)
    $394 Avg Bid
    40 bids

    Necesitamos a dos personas que consigan videollamadas para nuestro negocio. Proporcionaremos nosotros los leads. EL horario es flexible Consistirá en realizar llamadas a negocios que pueden necesitar nuestros servicios, se le proporcionará los contactos con su información. Pagaremos una comisión de 12 euros por videollamada, será por las mañanas. La persona debe de ser Española. We need two people to get video calls for our business. We will provide the leads. The schedule is flexible. It will consist of making calls to businesses that may need our services, you will be provided with the contacts and their information. We will pay a commission of 12 euros per video call, it will be in the mornings. The person must be Spanish.

    $514 (Avg Bid)
    $514 Avg Bid
    3 bids

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    $208 (Avg Bid)
    $208 Avg Bid
    12 bids

    Que hable español indispensable Experiencia demortrable en wordpress Experincia demostrable en administración de sistemas (linux, bases de datos, infraestructura en la nube)

    $158 (Avg Bid)
    $158 Avg Bid
    82 bids

    Soy trader profesional y estoy buscando alguien que me cree 1-2 videos profesionales para captar capital de terceros que quieran invertir en una cuenta regulada y con bajo riesgo. Beneficios realistas...realistas y no lo que venden los gurus. El detalle del contenido importante se puede ampliar por mensaje o contacto directo de los interesados en participar. Los videos serian de 1 minuto o menos y estan destinados a ser promocionados en redes sociales, por lo que deben ser creados con música sin derechos de autor y que luego no de problemas en la promoción pagada. Se dará mayor peso a quien cree dos vídeos si estos son de buena calidad, pero un solo vídeo claramente mejor que los demás también puede ganar el premio siempre que cumpla ...

    $65 (Avg Bid)
    Featured Guaranteed
    $65
    13 entries

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $17 (Avg Bid)
    $17 Avg Bid
    5 bids

    Wordpress site not opening need to fix now may be attack?

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    81 bids

    Please Sign Up or Login to see details.

    Featured Sealed Top Contest NDA
    Trophy icon Diseño de Logo Ended

    ...de futbol para niños. La razon social: BUFORD SOCCER ACADEMY (BSA) Nombre Comercial: Lions BSA Me gustaria que tuviera el logo de la figura de un Leon, tambien estoy abierto a considerar otros animales como Zorro FOX o incluso algun otro. Colores de preferencia: Negro, Azul, Rojo, Dorado, Blanco (Necesito dos de preferencia, pero me gustaria incluir el dorado en algun lugar aun que sea pequeño) Necesito dos colores por que cuando mande a diseñar las camisetas de futbol necesitare dos colores primarios para cuando juguemos de Local o de Visitante. IMPORTANTE: Que en el logo aun que sea en una parte pequeña diga BUFORD SOCCER ACADEMY y darle mas enfasis a Lions BSA. Tal vez podria incluir algun balon de futbol podria ser una opcion. M...

    $100 (Avg Bid)
    Guaranteed
    $100
    470 entries

    I'm on the lookout for a season...expertise in computer security. Key Project Objectives: - Assessment and improvement of network security - Implementation of secure protocols, with a specific focus on http3 - Thorough analysis and counteracting of cyber security threats - Network traffic analysis under attack conditions Ideal Skills and Experience: - Profound knowledge in network security and cyber security - An adept understanding and experience in http3 - Proven experience in security threat mitigation - Prior experience handling network traffic analysis under attack conditions Please note that only candidates with expert-level experience in the above-mentioned fields will be considered. This project demands the highest level of proficiency and professional acumen...

    $28 / hr (Avg Bid)
    $28 / hr Avg Bid
    21 bids

    I am in need of a skilled cybersecurity professional with specific experience in DDoS threats. The purpose of this project is to capture and analyze DDoS attack traffic from our corporate network. With your help, I aim to: - Identify patterns that indicate a potential DDoS threat - Understand our network's vulnerabilities to these specific attacks - Develop a proactive defense system through learned network behavior Please note, this project requires experience with corporate network environments, analysis of DDoS network traffic, and a deep understanding of network defense systems.

    $224 (Avg Bid)
    $224 Avg Bid
    11 bids

    You will extract pages from large PDF and make smaller ones, then name them and save to a folder. You will get an Excel with URL and page numbers in a PDF to extract. These are financial documents and you will be getting the presentations out of them. You have to: - Have Acrobat pro etc to edit PDFs - Experience doing accurate work by following an Excel sheet with to dos. Flexible hours and no crazy deadlines. You have to be 100% perfect though.

    $6 / hr (Avg Bid)
    $6 / hr Avg Bid
    290 bids

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $66 (Avg Bid)
    $66 Avg Bid
    8 bids

    Título del Proyecto: Rompiendo...Tenga en cuenta que este título es tentativo y sujeto a cambios según el diseño final. Autor: Bernardo Vicente Sanchez (sujeto a cambio en el diseño final) Animamos el uso de colores como el naranja, negro y blanco, pero estamos abiertos a la interpretación creativa del diseñador. El diseño frontal debe incorporar una fotografía de cabeza del autor, que se proporcionará al contratar. Se puede enviar dos variantes una sin foto del autor y una con foto. El diseño final debe entregarse en un formato listo para imprimir, adhiriendo a las especificaciones del editor. NOTA: De ser elegido tu diseño, se proveerá el título y subtítulo final y la foto del...

    $188 (Avg Bid)
    Guaranteed Sealed
    $188
    203 entries

    I'm urgently in search of a certified and empanelled vendor who can perform a comprehensive scan for both my web and mobile applications. Key Tasks: - Conduct thorough scans to identify any potential vulnerabilities. - Draw up a comprehensive report detailing any findings. Ideal Candidate: - Comprehensive knowledge of different attack vectors is mandatory, even though no specific concern is prioritized for this project. - Proven experience as an empanelled vendor is compulsory. - Must be able to work under tight deadlines, as the completion of this project is ASAP.

    $340 (Avg Bid)
    $340 Avg Bid
    11 bids

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $66 (Avg Bid)
    $66 Avg Bid
    7 bids

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $82 (Avg Bid)
    $82 Avg Bid
    14 bids

    Per country analysis of Distributed Denial of Service attacks We have been collecting data on UDP reflection based Distributed Denial of Service attacks since 2014. There are significant differences in attack patterns between countries (time of day, day of week, target of attack) and in response to global interventions targeting DDoS. This project would involve drilling down in to the per-country data to understand what is going on and why.

    $137 (Avg Bid)
    $137 Avg Bid
    28 bids

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $37 (Avg Bid)
    $37 Avg Bid
    11 bids

    Hi Shayan T., I hope all is well with you, I have another Convert Orcad PCB II/ OR PCB386+ dos file version (I have *.brd and *.BD1, to Cadence Allegro or Autocad or other free viewer.

    $21 (Avg Bid)
    $21 Avg Bid
    1 bids

    I'm looking for someone to re-write an old DOS desktop inventory application written in QBasic with an expected timeline of 2-3 months. The entire application needs to re-written in a modern environment, and I'm open to suggestions for improvement. The person I hire should have experience developing desktop applications and must be able to interpret old QBasic code (approx. 2,000 lines) and convert it to a high quality product that meets the requirements and timeframe.

    $697 (Avg Bid)
    $697 Avg Bid
    32 bids

    I have a small website running on Zencart that apparently suffered a DDoS attack 3 days ago and the website is still down. Now my clients can't visit the site, I've contacted Hostgator (I have a shared server account there) and I've been told I have "web bots crawling my site at unmanaged speeds"... I tried to set longer crawl delays and installed the CloudFlare but the website is still down... Any ideas how to bring the website up and running again?

    $23 (Avg Bid)
    $23 Avg Bid
    15 bids

    ...Configure the URL and endpoint within PHP and AWS. Learn how to run the PHP and DB. Two Git Repos with what is thought to be the latest code. Make a list of to-dos of blockers and changes to rectify these blockers. Run Postman after DB is configured and document results with Postman configurations. Update the API documentation. Note: We need the current PHP code installed on this AWS (PHP admin, API, and associated DB, and Data fill). This means a full review of the PHP code, updates to the API document, admin database fill of DB, a full configuration and install of API PHP system document, list of to-dos with Blocker and non-blocker section document and being able to run the mobile apps making API calls like the production. Of course, we are not fully ...

    $13 / hr (Avg Bid)
    $13 / hr Avg Bid
    83 bids

    I'm seeking a seasoned Java developer for an immediate project involving the construction of a Spring Boot filter. The main task centres on the creation and implementation of a filter for all incoming requests to the controller, specifically designed to combat XSS attacks and remove Zero Width Space (ZWSP) characters. Key Project Requirements: - Develop a Spring Boot application filter. - The filter must effectively handle and block all potentials XSS attacks. - The filter must efficiently remove all encountered ZWSP characters. - The developed filter must suitably plug into a Spring Boot application. - The filter should be designed to handle high networking traffic smoothly. Test Cases Require to Cover: - Scenarios of filtering XSS attacks. - Scenarios that deal with the removal o...

    $139 (Avg Bid)
    $139 Avg Bid
    7 bids

    I require a comprehensive analysis of various attack surface management companies. The major areas to focus on include: 1. Features: This includes an exhaustive evaluation of the following: - Vulnerability scanning - Asset discovery - Risk assessment - Configuration management 2. Pricing: Provide a detailed overview of each company's pricing structure along with proof. 3. Effectiveness: I'm interested in a thorough evaluation of the effectiveness of each company's software/services. The ideal freelancer for this job should possess an in-depth understanding of cybersecurity software and services. Experience in writing reviews and comparisons of software is a bonus. The review is to be delivered in a concise, easy-to-comprehend report. Please include C...

    $108 (Avg Bid)
    $108 Avg Bid
    25 bids

    ...diseño para poder configurar y adaptar el diseño y funcionalidades del plugin "Events Manager Pro" en una web de membresía con "Paid Membership Pro". Información sobre el sitio web: Plataforma: WordPress Tema usado: Tema hijo de Twenty Twenty-Four Plugins principales: Paid Membership Pro y Events manager Pro Hosting: Siteground Tareas principales a realizar: - Crear diseño para los eventos en dos columnas y adaptarlo al del sitio web. - Mostrar la lista de los asistentes a los eventos (esto se hace con placeholders ) - Configurar varios formularios de registro dependiendo del evento y si el usuario es miembro (está loguado o no). - Crear diseño de la página donde aparezcan todos los eventos. (Pr&oac...

    $160 (Avg Bid)
    $160 Avg Bid
    87 bids

    Estoy buscando Voice over en de locutores para varios videos, son 3 videos, uno de 1 minuto 30 seg, otro de 40 segundos y otro de 40 segundos. total 2 minutos 50 segundos, requerio de dos voces en ingles masculinas y una femenina en español nativa. I need Voice over from announcers for 3 videos, one of 1 minute 30 seconds, another of 40 seconds and another of 40 seconds. total 2 minutes 50 seconds, required two male English voices and one female native Spanish voice.

    $125 (Avg Bid)
    $125 Avg Bid
    52 bids

    We require an individual capable of crafting a comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, N...comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, Networks, Infrastructures, and Active Directories. 2) Social Engineering Assessments. 3) Physical Security Evaluations. 4) Red Teaming Exercises. 5) Purple Teaming Collaborations. 6) Attack Surface Management. 7) Source Code Analysis. 8) Software Composition Analysis (SCA). 9) Dynamic Application Security Testi...

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    22 bids

    Necesitamos contratar la creacion y edicion de tres videos diferentes para una campaña de Facebook e Instagram ADS, cada video debe ir en los dos formatos diferentes que acepta Meta (1080x1080 px y 1920x1080 px). Cada vídeo debe llevar subtítulos. Nosotros haremos entrega de los guiones y las escenas de cada video. PD. Favor enviar muestra y cotización del trabajo antes de contratar. Escogeremos el trabajo de más calidad y de mejor precio.

    $15 (Avg Bid)
    Guaranteed
    $15
    6 entries

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    $895 (Avg Bid)
    $895 Avg Bid
    12 bids

    I want to get a topic in Ransomware and write on Ransomware attack effects on IT Businesses.

    $117 (Avg Bid)
    $117 Avg Bid
    53 bids

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    $2465 (Avg Bid)
    $2465 Avg Bid
    26 bids