Attacks pix 515e jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 attacks pix 515e jobs found, pricing in CAD

    ...machine learning system aimed at predicting heart risk issues for patients. This system is intended to primarily benefit doctors, patients, and admin workers in the medical field. Key Responsibilities: 1. Developing Predictive Models: The main objective of this system is to efficiently predict the likelihood of a patient having heart-related issues, specifically coronary artery disease, heart attacks, and arrhythmia. Expertise in machine learning algorithms and predictive modelling is crucial. 2. Integration of Data Sets: The system must be able to handle vast sources of patient data to generate accurate predictions. These include patient's medical history, lifestyle information, as well as real-time health data. Extensive knowledge in data integration and management is n...

    $200 (Avg Bid)
    $200 Avg Bid
    20 bids

    I'm looking for a knowledgeable and experienced individual to review my technical project, specifically focusing on network security, cyber attacks, and comprehensive testing. Key Requirements: - In-depth knowledge of network security, cyber attacks, and testing methodologies - Proven experience in identifying vulnerabilities and protecting against cyber attacks - Ability to conduct comprehensive testing and provide detailed reports - Experience working with Raspberry Pi and understanding its security concerns The ideal candidate will have a strong background in cyber security and will be able to provide insights and recommendations to enhance the security of the project.

    $238 (Avg Bid)
    $238 Avg Bid
    15 bids

    We are in urgent need of an OVH Server Security Specialist to address recurring security issues with our server. Our server has been frequently compromised by viruses, resulting in the creation of malicious files and folders across directories. Additionally, these viruses have been generating .htaccess files that block access to internal pages of o...environment and business needs. 3- Configure and optimize server settings, firewall rules, and access controls to enhance security posture and prevent future breaches. 4- Install and configure robust antivirus and malware detection solutions to proactively identify and remove malicious software. If you have the expertise and experience to secure our OVH server and protect websites from malicious attacks, please apply to this post. Be...

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    9 bids

    I need a versatile programmer who can work with Python, C or any other programming language to develop a system for identifying Distributed Denial of Service (DDoS) attacks with the help of machine learning algorithms. Skills and Experience: - Extensive experience in Python, C, or similar programming languages - Knowledge of Machine Learning algorithms - Experience in network security would be beneficial - Proven track record in detecting cyber threats in a small network environment. Your success will be judged by your ability to create a reliable, data-driven system capable of efficiently detecting DDoS attacks in a small-scale network.

    $260 (Avg Bid)
    $260 Avg Bid
    12 bids

    ...skilled cyber security professional who can assist with ensuring the integrity and safety of our systems. The ideal candidate should have expertise in network security, application security, and data security. Key project components include: - Conducting a thorough vulnerability assessment to identify potential weaknesses in our current systems. - Performing penetration testing to simulate cyber-attacks and evaluate the effectiveness of our security measures. - Executing a comprehensive security audit to ensure that our systems are aligned with industry best practices and compliant with HIPAA, GDPR, and PCI DSS. Your role will be crucial in ensuring our organization is not only secure from cyber threats, but also in compliance with relevant regulations. Experience with these c...

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    7 bids

    First, please note that I don't do business with low-ballers. This document contains all of the details of the project. I went over it extensively with the assistance of Gemini AI to make sure it was complete and thorough. So if you plan to place a low-ball price in order to get me to talk with you so you can give me your real, higher price later, don't waste your time bidding at all because...add functionality for: Capturing an image for each garden space Triggering email sending functionality 8. Security Considerations: The developer should implement security measures throughout the application: Secure storage of SMTP server credentials within a bundled configuration. Input validation for user-entered data (e.g., email address). Sanitize user input to prevent potential injec...

    $796 (Avg Bid)
    $796 Avg Bid
    100 bids

    I'm in need of an expert to analyze our Joomla website's recent spike in traffic. I'm concerned whether this is genuine or bot-generated. This is a high-priority task for me, and I need immediate action. Key Tasks: - Verify i...bot-generated - Implement necessary security measures to prevent future bot traffic - Restore the website online and ensure it can handle an increased traffic load Ideal Freelancer: - Proficient in Joomla and its security features - Experienced in analyzing web traffic and differentiating bot-generated traffic from genuine - Familiar with implementing security measures to protect websites from bot attacks - Available to tackle this issue urgently If you're confident in your abilities to address these requirements promptly and effectivel...

    $182 (Avg Bid)
    $182 Avg Bid
    64 bids

    I'm in need of a cybersecurity expert who is well-versed with Microsoft Office 365. I've recently received an O365 login repo...with detailed written feedback. The questioned application activity is highlighted in red. - I do not require ongoing monitoring, so this will be a one-time project. Ideal Skills & Experience: - Proficiency in Microsoft Office 365 is a must. You should have deep understanding of the platform and its security features. - Extensive experience in cybersecurity, particularly in dealing with shell attacks and access logs. - Strong analytical and reporting skills. You have to be able to translate your findings into a comprehensive, detailed report. Your analysis and insights will be crucial for me to ensure the security of my systems. Looking forw...

    $98 (Avg Bid)
    $98 Avg Bid
    17 bids

    I'm in need of an hack...penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are crucial for ...

    $137 (Avg Bid)
    $137 Avg Bid
    16 bids

    I'm currently facing potential malware attacks causing unexpected slowdowns, particularly affecting my website load times. Hence, I'm in urgent need of a knowledgeable cyber security professional who can identify and rectify issues within my server files. Key Responsibilities: - Investigate the root cause for the slowdown of the website load times - Pinpoint potential malware in server files - Advance and fortify the security system to prevent future occurrences Ideal Skills: - Proficiency in cybersecurity - Solid understanding of server operations, particularly SQL - Experience in malware detection and prevention Your task: Use your expertise to bring back operational efficiency and bolster my domains server's security. If you can catch the malware predator an...

    $152 (Avg Bid)
    $152 Avg Bid
    8 bids

    ...conscious organization, we're hiring a cybersecurity expert for a comprehensive penetration testing on our Linux-based system. Emphasis lies primarily on our web-based applications, with the aim to identify and eradicate any potential vulnerabilities. Key Tasks: - Perform Open Source Intelligence (OSINT) - Port scanning - Man-in-the-middle (MiTM) attack simulation - Focus intensively on injection attacks (SQL, XSS) - Authentication and session management puncturing - Cross-Site Scripting (XSS) evaluation The ideal freelancer will have: - Strong experience in cybersecurity and penetration testing - Excellent knowledge and experience with Linux-based systems - Proven experience in web application security testing - Firm understanding of SQL, XSS and authentication vulnerabil...

    $858 (Avg Bid)
    NDA
    $858 Avg Bid
    13 bids

    ...hashing and the use of access tokens, to prevent unauthorized access. 5. Input Validation and Sanitization: To mitigate the risk of security vulnerabilities, the application will implement strict input validation and sanitization techniques. This section emphasizes the importance of validating user input to prevent common vulnerabilities, such as SQL injection and cross-site scripting (XSS) attacks. 6. Secure Transaction Processing: The application will incorporate secure transaction processing mechanisms to ensure the integrity and confidentiality of financial transactions. This section discusses the implementation of secure communication protocols, such as HTTPS, to protect sensitive data during transit. It also highlights the need for transaction validation and auditin...

    $396 (Avg Bid)
    $396 Avg Bid
    10 bids

    ...crucial project, we aim to significantly improve the cybersecurity of data stored on the Google Cloud Platform (GCP), using cutting-edge artificial intelligence methods. Our main goals are as follows: - Use Machine Learning and Deep Learning to detect and mitigate any potential cyber threats before they occur. - Utilize AI to predict and intercept Unauthorized Access, Data Breaches, and Malware Attacks, thereby bolstering our defense mechanisms. The ideal candidate will be proficient in AI, specifically Machine Learning and Deep Learning, and have extensive knowledge of cybersecurity on clouds. Experience with GCP would be a valuable advantage. It's essential for the chosen freelancer to be adept at translating complex AI algorithms into practical cybersecurity solutions. ...

    $1620 (Avg Bid)
    $1620 Avg Bid
    48 bids

    ...within the v2x technology landscape. This position is for a 3-year period and will focus on the following areas: - Threat Detection: The primary objective is to identify and analyze potential threats to v2x systems. Specifically, I am concerned about Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. The ideal candidate should have: - A strong background in v2x security research, with a focus on threat detection. - Extensive knowledge and experience in Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. - Experience presenting and publishing research at conferences like USENIX and NDSS. - The ability to produce high-quality research papers and practical solutions. - Affiliation with a research institute to e...

    $1716 (Avg Bid)
    $1716 Avg Bid
    9 bids

    ...intermediate level phishing environment. The purpose is for security training, so the focus is on creating realistic simulations of phishing attacks. Key Requirements: - Simulating Email, Spear, and Direct Phishing Attacks: I aim to cover a wide range of scenarios to better prepare my team for potential threats. - Intermediate Level Difficulty: The environment should challenge my team without being too overwhelming, ensuring effective learning outcomes. Skills and Experience: - Prior experience in setting up phishing environments; specifically, experience in creating intermediate level simulations would be a plus. - In-depth knowledge of different types of phishing attacks and their characteristics. - Understanding of cybersecurity best practices and knowledge of ...

    $86 (Avg Bid)
    $86 Avg Bid
    5 bids

    ...communication tools like email and messaging apps enhances communication among individuals in the workplace and beyond. 3. **Time Saving:** Technology allows tasks to be accomplished more quickly, saving valuable time that can be used for other activities. **Challenges:** 1. **Cybersecurity Threats:** With increased reliance on technology, individuals and organizations are exposed to risks of cyber-attacks and data breaches. 2. **Social Isolation:** Overreliance on technology can lead to social isolation and a loss of genuine personal interaction. 3. **Work-Life Balance:** Increased access to technology may make it challenging to set boundaries between work and personal life, negatively impacting the balance between them. **Additional Challenges and Benefits:** 4. **Change...

    $19 / hr (Avg Bid)
    $19 / hr Avg Bid
    31 bids

    Hello, I am looking for someone with some knowledge about LeiaPix. The idea is to convert 2D image in video. I run a technology company for the real estate sector, creating and selling digital solutions for real estate professionals. I'm currently working on a project to create a platform that would enable estate agents to transform their photos into video using AI. Have a look on attach file. So I'm looking for people who know how to use LeiaPix and who can create quality effects to transform photos into video. My clients generally have between 8 and 15 photos per property.

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    12 bids

    I'm in need of a skilled professional who can help me set up SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) for my Gmail account. Key Tasks: - Set up SPF: I need you to authenticate my emails using SPF to prevent spoofing and phishing attacks. - Configure DKIM: Implementing DKIM will ensure that my emails are not tampered with in transit and that my domain is not being abused by spammers. Requirements: - Proficient in email authentication protocols. - Experience with DNS settings and domain authentication. - Familiarity with Gmail's email authentication systems. - Ability to explain the process clearly and concisely. Please provide a brief overview of your relevant experience in the field.

    $154 (Avg Bid)
    $154 Avg Bid
    30 bids

    ...future protection, ensuring my website remains secure and protected from potential threats. Key requirements: - Immediate automatic removal of existing malware: I need the malware on my site to be removed straightaway to ensure my site is clean and safe for visitors. - Firewall protection: I am specifically looking to implement a strong firewall to prevent any future malware infiltrations or attacks on my WordPress site. It's important for me to find a freelancer who has a proven track record in dealing with malware removal on WordPress sites and can effectively set up and manage a reliable firewall system. Your expertise and experience in website security will be highly valued in this project. Please quote the reference "WPMalware" when applying for this projec...

    $55 (Avg Bid)
    $55 Avg Bid
    77 bids

    We are an e-commerce company with a WooCommerce store. We are looking for an experienced freelancer with expertise in WooCommerce and internet security to analyze our store and protect it from attacks. **Liabilities:** - Analysis of current WooCommerce store security. - Proposals and implementation of improvements to increase security. - Installation and configuration of security plugins. - Provide training to staff for optimal use of security tools. **Requirements:** - Experience in the field of e-commerce and specifically WooCommerce. - Expertise in network and web security. - Ability to easily communicate with our staff and provide training and support. - Ability to provide evidence-based suggestions and solutions. If you believe you have the necessary experience and skills fo...

    $93 (Avg Bid)
    $93 Avg Bid
    66 bids

    I'm seeking a professional PHP developer to create a custom CMS that not o...allow clients to customize meta tags, including title tags, meta descriptions, and keywords for each page. - XML Sitemap Generation: The CMS should automatically generate and update an XML sitemap, making it easier for search engines to crawl and index the site. Security Features: - Vulnerability Protection: Ensure the CMS is robust against common web vulnerabilities like SQL injection and XSS attacks. Skills and Experience: - Strong PHP and CMS development background. - Proficiency in implementing SEO best practices. - Experience in web security and vulnerability protection. - Excellent communication skills and ability to understand and incorporate client requirements effectively. Budget is not mo...

    $724 (Avg Bid)
    $724 Avg Bid
    60 bids

    ...combobox for select a single product and also a datepicker for select a single day or range. This information are used to populate cards and chart 3- Balance In balance it will show the bank balance, pending balance and also a card for ask withdraw. 4- Configurations This will have a button to logout and 2 sliders for notification settings (when sale paid and when generated a new bankslip/invoice or Pix(this is a brazilian qr code for payment) 5- My Account Here will have inputs for Name, Phone, Email, Current password and newpassword (so, it will allow to change password) Notifications this is the priority need. I need to be able to send notifications in real time. For notifications, if it is necessary, we could use some library or service. We could talk for choose the bette...

    $567 (Avg Bid)
    $567 Avg Bid
    84 bids

    ...and trends. Key Skills and Experience: - Proficient in PHP/SQL: You should have proven experience in PHP and SQL to create a robust, secure and user-friendly script. - Review System Development: A good understanding of how review capturing and redirection works will be crucial. - Web Security: An understanding of web security practices as the script will need to be robust against potential attacks....

    $153 (Avg Bid)
    $153 Avg Bid
    40 bids

    Cyber warfare allows a state to conduct foreign policy in a more ethical way than traditional war.

    $74 (Avg Bid)
    $74 Avg Bid
    20 bids

    ...comprehensive documentation of Veeam configurations, procedures, and best practices. Share knowledge with team members through training sessions, technical presentations, and knowledge base articles to foster skill development and operational excellence. Security and Compliance: Implement security best practices to safeguard backup data against unauthorized access, data breaches, and ransomware attacks. Ensure compliance with relevant regulatory requirements and industry standards. Qualifications: Bachelor’s degree in Computer Science, Information Technology, or a related field (or equivalent work experience). Extensive experience (X years) working with Veeam Backup and Replication solutions in enterprise environments. Proficiency in designing, implementing, and managing V...

    $409 (Avg Bid)
    $409 Avg Bid
    4 bids

    ...interest in "Side channel" detection. Skills and Experience: - Solid Python programming ability -Familiarity with collecting micro architectural traces - Familiarity with cybersecurity concepts - Experience in creating machine learning algorithms for detecting malware - Comprehensive knowledge in dealing with Side Channel attacks. Ideal candidates must have: - Proven experience in Python programming - Prior work in malware detection, particularly Side Channel attacks - A solid understanding of the different types of malware - The ability to work efficiently and deliver results in a timely manner. The goal is to create an efficient model that can detect various types of malware, with a particular interest in Side channel detection. The ideal candidate shoul...

    $1409 (Avg Bid)
    $1409 Avg Bid
    24 bids

    Is a sunny day, on a plateau, in the clouds a burning plane crashes and goes beyond the screen, the shot drops in altitude and stops on the...and behind them we glimpse some civilians running away. We continue and arrive at the edge of the dam, we jump down and land in a stream with water at mid-waist that runs through a dark forest. This time the main character has to continue towards the right, for the first few seconds he is slowed down by the water but shortly after he comes out of it, we meet some wild boars and a bear who attacks us while the wild boars run away... after a short while the forest ends, we find ourselves at the open to the sun in the middle of the fields, we don't even have time to get used to it before after a few moments of being outdoors and con...

    $44 (Avg Bid)
    $44 Avg Bid
    1 bids

    It's unfortunate we've...malware attack on our WordPress website. We believe it's due to code injections, though we can't rule out other possibilities. As a result, we're looking to onboard a professional with relevant experience in swiftly identifying and effectively resolving such issues. Skills & Experience: - Proven experience in dealing with WordPress malware attacks - Proficient in identifying and resolving code injections - Strong security strategy for preventing future attacks Your application should demonstrate your previous experience in handling similar situations. Evidence of your ability to work quickly and effectively is crucial to this emergency! Let's secure our website and prevent this from happening again. Your expertise...

    $573 (Avg Bid)
    $573 Avg Bid
    153 bids

    I'm looking for an ethical hacker to test and secure my web application, focusing on specific vulnerabilities and conduct a thorough background verification. - Web Application Security: - Focus on existing vulnerabilities - Emphasis on Injection attacks, XSS, and other potential weaknesses - Particularly interested in vulnerabilities related to social media integrations - Background Verification: - Criminal records checks - Education and credential verification - Character check Ideal Skills: - Proficient in ethical hacking - Strong experience in web application security - Knowledge of common web vulnerabilities - Competency in conducting background checks - Attention to detail and thoroughness in their work. Please bid if you have the necessary skills and exper...

    $141 (Avg Bid)
    $141 Avg Bid
    8 bids

    ...against future incidents(will release milestone after 10 days), and I won't buy sitelock or sucuri these kind of service, but I will like long term serivce. Key tasks include: - Identify and remove malware: Addressing the specific malware identified - Website restoration: Ensuring the site is fully functional post-malware removal - Warranty: Offer a guarantee/warranty against further malware attacks Ideal freelancers should have: - Proven experience in WordPress website security and malware removal - Experience in working with E-commerce websites - Ability to provide a warranty for future protection - Strong communication skills, as I prefer instant messaging for updates and progress tracking. Overall, I am looking for a reliable and efficient developer who can ensure th...

    $36 (Avg Bid)
    $36 Avg Bid
    74 bids

    I'm seeking a specialist to enable Web A...against web threats and ensure robust protection of our sensitive data from unauthorized access. While we're not currently aware of any explicit vulnerabilities or security issues, we're proactive in our efforts to ward off potential threats. You'd be expected to deliver the following functionalities with the WAF: - Protection against SQL injection - Prevention of Cross-Site Scripting (XSS) attacks - Blocking zero-day exploits Ideal candidates should have significant experience in network and web security, a strong working knowledge of Citrix Gateway, and fundamental understanding of industry regulations. Prior expertise with WAF enabling will be greatly valued.

    $200 (Avg Bid)
    $200 Avg Bid
    4 bids

    ...and NGINX like WAF to prevent unauthorized access and malicious activities. - Malware Detection: An efficient malware detection mechanism needs to be integrated to scan for and eliminate threats within my setup. - DDoS Prevention: The implementation should include tools and configurations to mitigate risks related to DDoS attacks. Specific OWASP Top 10 Concerns: - Injection: I'm concerned about potential vulnerabilities that could lead to code or data injection attacks. - Cross-Site Scripting (XSS): The setup must effectively protect against any XSS vulnerabilities. - Insecure Direct Object References: I need to ensure that proper protection is in place to avoid any object reference issues. Ideal Candidate: - Proficient in Docker and NGINX - Strong background in im...

    $130 (Avg Bid)
    $130 Avg Bid
    9 bids

    ...against unauthorized transfers. Ownership Verification: Develop methods for verifying ownership of a specific NFT by a given Ethereum address. Provide public access to ownership data of NFTs. Metadata Handling: Ability to store metadata of NFTs, such as images, descriptions, links to external resources, etc. Support for the ERC-721 standard for metadata. Security: Ensure contract security against attacks and vulnerabilities, including protection against stack overflow, recursive calls, and other known threats. Gas Limitations: Optimize gas usage for transactions related to the creation, transfer, and ownership verification of NFTs. Auditing: Document code with detailed comments explaining the logic and structure of the contract. Provide auditing information to ensure contrac...

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    28 bids

    ...(CBT) approach. Key Details: - The therapist should be specialized in CBT with substantial experience applying this approach. - You will provide online sessions, so the ability to be engaging and effective through remote communication is essential. - A critical part of the role will involve designing CBT treatment plans and implementing them during therapies. - Main issues are Anxiety panic attacks attention deficit and depression Ideal Skills and Experience: - Licensed Psychologist - Experienced in Cognitive Behavioral Therapy - Proficient in delivering online therapy - Strong communication skills Your ultimate goal as part of this project will be to assist in promoting mental health wellness through online therapy sessions. The ability to create a secure and comfor...

    $25 / hr (Avg Bid)
    $25 / hr Avg Bid
    11 bids

    ...ads complying with the policies, they're regularly disapproved due to 'circumventing systems policy'. I need a Google Ads expert who understands this error and knows how to resolve it, ensuring my ads comply with Google's policies. • False Compromise Alert I'm getting false warnings of a 'compromised website'. My website is secure without any unauthorized access or signs of malware or phishing attacks. I'm looking for someone with experience in dealing with such false positives who can rectify this issue. Ideal Skills: • Extensive experience with Google Ads • Knowledge of Google's advertising policies • Ability to troubleshoot and resolve conflict errors • Experience dealing with website security issues, ...

    $128 (Avg Bid)
    $128 Avg Bid
    20 bids

    I'm looking for an ethical hacker with specialization in network security, web application security, and social engineering attacks to protect vital medical records online. The Job's Purpose: - Scrutinize medical records to identify errors or discrepancies - Make crucial edits and effectively remove them from a specific website Why? Simply put, it’s about maintaining utmost confidentiality. Here are the ideal skills the job requires; Key Skills: - Substantial experience in cybersecurity; network and web application security in particular - Familiarity with social engineering attacks is a plus - Feeled capcacity to review, edit and ethically hack medical records online - Sharp eye to detect discrepancies in such records If you possess the aforementioned ca...

    $31 / hr (Avg Bid)
    $31 / hr Avg Bid
    23 bids

    I'm looking for a skilled animator to create a cybersecurity video tailored for all employees in my company. This video will serve as a tool to raise awareness about common cyber threats, educate on how to recognize and prevent cyber attacks, and provide guidelines for secure online behavior. Requirements: - Proficiency in creating animated explainer videos. - Strong understanding of cybersecurity concepts. - Ability to convey technical information in a simple, engaging manner. - Prior experience in creating educational videos preferred. The ideal freelancer should be able to blend creativity and technical knowledge to deliver a compelling video that will effectively inform and engage our diverse workforce.

    $175 (Avg Bid)
    $175 Avg Bid
    79 bids

    My WordPress website is redirecting to unknown sites and showing signs of injected Javascript. I've experienced this issue despite keeping my WordPress and plugins up to date. Key Requirements: - Identify the malware and its entry point - Remove all malware and traces of injected Javascript - Restore website to its original, clean state - Provide recommendations to prevent future attacks I have full access to my website's hosting environment. Ideal candidates should have proven experience in malware removal for WordPress sites and possess a strong understanding of web security best practices. Please share your approach and experience in your bid.

    $48 (Avg Bid)
    $48 Avg Bid
    58 bids

    ...experience in creating smart contracts on the Ethereum blockchain. Key Requirements: - Develop a multisend smart contract that supports ERC20 tokens. The contract should allow for the distribution of ERC20 tokens to multiple recipients in a single transaction. - Implement pause functionality as a security feature. This is crucial to protect the contract from any potential vulnerabilities or attacks. - We would like to be able to interact with the contract if possible (on etherscan) Ideal skills and experience: - Proficiency in Solidity, the programming language used for Ethereum smart contracts. - Prior experience in developing multisend contracts and incorporating pause functionality. - Knowledge of best practices for smart contract security. - Ability to deliver a secure an...

    $206 (Avg Bid)
    $206 Avg Bid
    10 bids

    I would like a skilled Laravel developer to integrate PagSeguro's payment gateway into my website, including Boleto bancário and Pix. Key Project Requirements: - Integrate Boleto Bancário: The system should generate boleto slips, track boleto payments, and handle the necessary validations. - Include Pix: The system should support payments via Pix, a new and increasingly popular payment method in Brazil. Ideal Skills and Experience: - Proven experience with integrating payment gateways into Laravel applications. - Familiarity with PagSeguro's API and requirements. - Knowledge of Boleto Bancário and Pix payment systems. - Strong understanding of Laravel best practices. The project needs to be completed within a month. Please let m...

    $794 (Avg Bid)
    $794 Avg Bid
    44 bids

    I'm in urgent need of an expert in malware removal to assist me with cleaning up more than 5 of my websites. The affected websites are a mix of e-commerce and blog sites. The malware has caused significant issues on these sites, including: - Phishing attacks - All sites showing a white page and appearing to be disabled Your primary task will be to conduct a thorough clean-up of these sites, ensuring all malware is removed and that the sites are restored to their original state. Ideal Skills and Experience: - Proven experience with malware removal, particularly for multiple websites - Familiarity with e-commerce and blog sites - Ability to conduct a thorough clean-up without causing any additional damage - Knowledge of security best practices to prevent future incidents

    $122 (Avg Bid)
    $122 Avg Bid
    45 bids

    ...implementing security measures within AWS, particularly leveraging AWS WAF, AWS IP Reputation, and AWS CloudTrail. Key Responsibilities: - Implement rigorous access control policies to ensure only authorized personnel can access our resources. - Configure and fine-tune AWS WAF to establish robust web application firewall rules, block specified IP addresses, and provide protection against DDoS attacks. - Set up and monitor AWS IP Reputation, ensuring that any malicious IP addresses are effectively blocked from our system. Skills and Experience: - Proven experience in implementing AWS security measures, particularly with AWS WAF, AWS IP Reputation, and AWS CloudTrail. - Strong understanding of encryption protocols and access control policies within AWS. - Experience with monitor...

    $632 (Avg Bid)
    $632 Avg Bid
    18 bids

    I am seeking a knowledgeable freelancer to deliver a well structured and robust report on Malware, Phishing, and Ransomware cyber attacks that occur prominently in Australia. This report is aimed at the general public and should therefore be written in a comprehensible and digestible manner. The goal is to provide a surveillant scan of key issues, impacts, and potential precautions, giving readers a thoughtful understanding of these cyber threats. To accomplish this project optimally, the required skills and experience include: - Proficiency in Cybersecurity and related topics - Extensive knowledge about Malware, Phishing, and Ransomware attacks - Strong research skills, with a keen focus on Australia - Excellent writing and communication skills, with experience in makin...

    $29 (Avg Bid)
    $29 Avg Bid
    35 bids

    I am currently seeking a highly experienced cryptocurrency technician to manage the entirety of my hosting needs. This role will involve not just the set-up of my hosting, but also its ongoing maintenance and troubleshooting. The ideal candid...provide robust security measures and effective monitoring of the system. Key requirements include: - Expertise in cryptocurrency technologies, with a proven track record of past work in similar projects. - Ability to set up and install new hosting systems, as well as maintain and troubleshoot existing systems. - Strong security skills, including the ability to anticipate and prevent potential attacks or breaches. - Experience in monitoring systems and responding to incidents promptly and effectively. Let’s Make money together serious ...

    $717 (Avg Bid)
    $717 Avg Bid
    79 bids

    ...devices (desktop, mobile, tablet). Secure and reliable platform. 2. Easy navigation allows users to find the information they need. 3. The website page should be designed as per the prototype prepared on our side. The prototype shall include Images and Content for the website. 4. The project includes Database configuration and setup. 5. Security features that defend the website against brute force attacks and malware infection will be configured and set up. 6. Sitemap configuration 7. WhatsApp floating icon integration Pages on the website: It is required to develop approximately 10 (ten) pages for the website. Content in General: 1. Introduction 2. About Us 3. Access to the knowledge base 4. Support 5. Location 6. Pricing 7. Training 8. Webinar Websites for reference (Simil...

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    13 bids

    University Assignment: Flask Web Application for Secure Authentication System ONLY BID IF YOU CAN DO IT. Go to Template Folder to see the code and use Docker to run it. It should take 2-3 hours to do it. Need it ASAP. Project O...authentication (2FA) using a popular service like Google Authenticator. - Enforce session security with HTTPS and consider HTTP Strict Transport Security (HSTS) for enhanced security. - Implement CAPTCHA verification to prevent automated attacks and manage session rate limiting effectively. Recovery Options: - Generate recovery keys using () with at least 20 bits of entropy. - Ensure recovery keys are delivered securely and are single-use. - Hash recovery keys using Argon2 with individual salts. - Explore implementing HSTS to prevent downgrade attac...

    $33 (Avg Bid)
    $33 Avg Bid
    31 bids

    I have a AWS Infrastructure setup project requiring expertise in Cloudfront NLB and protection using WAF. As the goal is targeted at content distribution and load balancing, proficiency in these areas is crucial...website on EC2 IIS with custom ports like 8080, 5440 etc and not standard 80 or 443. User will be providing url with port number and on IIS different website is binded with different port number. For WAF, protective measures against DDoS attacks, SQL injections, and XSS attacks are necessary. Thus, an understanding of these areas is also needed. Skills and experience: - Proficient in AWS services (Amazon EC2, ELB, Cloudfront and Amazon S3) - Knowledge of Cloudfront NLB - Experience with WAF - Understanding of DDoS attacks, SQL injections, and XSS attack...

    $206 (Avg Bid)
    $206 Avg Bid
    31 bids

    ...add excessive bloat. 2.4 - Use a CDN to distribute the load, reduce latency, and improve the speed of content delivery globally. 2.5 - Regularly clean the database to remove unnecessary data and keep the website running smoothly. 3. Security Measures 3.1 - Implement SSL certificate. 3.2 - Install and configure a reputable security plugin to protect against common threats, such as brute force attacks, malware, and hacks. 3.3 - WordPress theme should not be without license 3.4 - Regular backup plugin should be added 4. Testing and Quality Assurance 4.1 - We will check compatibility and responsive design before handover. 4.2 - Website should be 95% + compatible and good as per GTmetrix and Google PageSpeed Insights and we will not take handover until and unless these terms are m...

    $439 (Avg Bid)
    $439 Avg Bid
    92 bids

    I require a reliable and experienced developer to assist me in implementing a Content Security Policy (CSP) in my JavaScript application. Key Details: - Purpose: The primary goal of this CSP implementation is to prevent Cross-Site Scripting Attacks within the application. - Target Sources: The CSP should be configured to allow only self-hosted scripts and elements. These are specified in the file. - Application Language: The application is developed in JavaScript. Your Responsibilities: - Review the current application setup and assess the specific requirements for the CSP. - Implement the CSP accordingly, ensuring that only self-hosted scripts and elements are permitted. - Integrate the CSP seamlessly with the existing application architecture, ensuring no disruptions in functi...

    $17 (Avg Bid)
    $17 Avg Bid
    11 bids