Detect firewall jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    37,275 detect firewall jobs found, pricing in CAD

    We have receiving something like that on server. Its on WHM, and same on different accounts in same server. Need to find the reason, and fix. Time: Tue Aug 2 09:17:27 2022 +0100 PID: 26355 (Parent PID:24019) Account: eds Uptime: 26542 seconds Executable: /usr/local/cpanel/3rdparty/perl/532/bin/perl Command Line (often faked in exploits): spamd child Network connections by the process (if any): tcp: -> udp: -> 5.9.124.53:24441 udp: -> 1.1.1.1:53 tcp: -> Files open by the process (if any): /dev/null /usr/local/cpanel/logs/spamd_error_log /usr/local/cpanel/logs/spamd_error_log /usr/local/cpanel/3rdparty/perl/532/bin/spamd /home/eds/.razor/ /var/cpanel/locale/ /usr/local/cpanel/3rdparty/perl/532/lib/perl5/cpanel_lib/Net/DNS/Resolver/ Memory maps by th...

    $246 (Avg Bid)
    $246 Avg Bid
    15 bids

    I have one python file that detect and crop from template image. I need expert can convert it to java.

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    19 bids

    ...to the proxy server, you can also check for blocks. The proxy server can output this information and show you what is being sent by your phone (refresh blocks) and what is sent by the Amazon Flex server (block information). Some people check this information daily to ensure that no changes are made. If your program responds with information formatted in an old way, Amazon could pick that up and detect that you are using a script....

    $789 (Avg Bid)
    $789 Avg Bid
    33 bids

    I need someone who can develop a WHMCS module similar to what ExtraVM is using for their IP management on OVH servers The module should be able to let the user configure their OVH IP address and do the following: - Enable/disable permanent mitigation. - Configure firewall rules, enable/disable firewall. - Enable disable ddos attack notifications. (via discord webhook)

    $39 (Avg Bid)
    $39 Avg Bid
    1 bids

    ...insiders; Compared with those previous studies, The previous studies follow many other ways to solve the problem of insider threats. some research by using a machine learning approach and other approaches which depend on monitoring internal logs and system commands. On the other hand, there are some approaches that try to monitor users’ behaviour and detect any non-normal activities. As far as I know, I could not find any similar research trying to detect intrusion by monitoring file content. the problem facing me now is how to validate the work of my model. I could not find any previous model to compare my model to and prove it can make improvements. and what is the parameter that the model enhances? I need one to help me finish this work. Please contact me if ...

    $1370 (Avg Bid)
    $1370 Avg Bid
    20 bids

    Use Ethracer to detect Event-ordering bugs and modify the source code of Ethracer to investigate branch coverage of the dynamic symbolic execution . Dataset contains front-running attacks in Ethereum history. Text me for details

    $731 (Avg Bid)
    Featured
    $731 Avg Bid
    39 bids

    Project Deadline: Within 1 Day Project Budget: $150 Server Type: Linux Ubuntu Project Overview: Migrate existing Apache Server to Ngnix - to Ngnix - Project Requirements: 1) Seamless transition to Ngnix with minimal downtime 2) Configuration & optimize Nginx & PHP-FPM for high performance and to handle the maximum number of PHP request 3) Old SSL certificates 4) Install new SSL & ensure is working 5) Install a firewall to mitigate against DDOS 6) Ensure server and existing website, API & database are working correctly 7) Remove apache 5 STAR FEEDBACK WILL BE LEFT FOR YOU

    $239 (Avg Bid)
    $239 Avg Bid
    16 bids
    Call Center Analytics 5 days left
    VERIFIED

    Contact Center is a very important touch point for customer service. Customers interact with the contact center for a variety of services fulfillment, information about products and services, complaints, feedback, and interactions. For enhancing the contact center service levels, the customer interactions need to be analyzed and need to be ma...for various Indian Languages Call recordings with mixed languages such as Hindi + English, English + Marathi, etc. Provide sentiment analysis from the call center recordings Centralized dashboard for Bank to understand different KPIs for customer satisfaction Provide better analytics on the call center queries and questions Evaluation Parameter: Accuracy from voice to text, vocabulary and detect Indian languages Realtime centralized d...

    $40 / hr (Avg Bid)
    $40 / hr Avg Bid
    7 bids

    -Analyze the program -Make a method to detect it when it is executed

    $116 (Avg Bid)
    $116 Avg Bid
    10 bids

    The router must be configured to be an access point and have an internet connection. Local network: IP range: Accessible by wifi (DHCP) and ethernet port Internet Connection through wifi (second wifi-module) or, if there is...(). - The GSM module has it's own webpage (). From the local network this page must be accessible. - When plugin in an USB device, a network device will get a name like eth0, eth1, wlan0, wlan1. The USB module and the USB name is not automatically persistent. The configuration must be made so that a USB device will always get the same name. - firewall is working - local network has DHCP I don't expect you to have the hardware, so I will have to support you in testing the configuration.

    $192 (Avg Bid)
    $192 Avg Bid
    13 bids

    Set up an OpenVPN server with a firewall that works as follows: There must be administrators who are allowed access to all nodes. There should be pools of different sites, and nodes included in them, each of which has its own VPN certificate and VPN address. Within these pools, access between nodes is open but can be restricted if needed. There are also companies that can combine pools of several sites. In other cases, there is no direct connection between the pools of different sites. Pools of organizations and their nodes should be pulled automatically from the JSON file, and the rights to the pool should be automatically issued to the node based on the contents of this file, while administrators, as mentioned, should always have access to all nodes. JSON example: { "...

    $207 (Avg Bid)
    $207 Avg Bid
    9 bids

    I have an email list that have many trash mails that I want remove using AI for detect trash mails. I know that are many software that check if an email is valid, but that software are not working good because show many mails as valids but if you look the mails we can be sure that are 99.9% TRASH. So I need a software that check all mails and show is look like trash or look like valid mails. IMPORTANT: I ttached an example image that what i need. Thanks you!

    $189 (Avg Bid)
    $189 Avg Bid
    19 bids

    I need someone who can develop a WHMCS module similar to what ExtraVM is using for their IP management on OVH servers The module should be able to let the user configure their OVH IP address and do the following: - Enable/disable permanent mitigation. - Configure firewall rules, enable/disable firewall. - Enable disable ddos attack notifications.

    $26 / hr (Avg Bid)
    $26 / hr Avg Bid
    11 bids

    ...looking good according to the theme of the current dashboard. About the application: - This application will track the most overbought and oversold stocks in the stock market, requiring to gather data from stock market API's as well as scraping from sites such as Finviz and Finscreener. - Application will take short or long positions on stocks listed and track the realtime price - Application will detect unusual option flow and dark pool data - Application will check stock technical data using You must understand how stocks work as well so you understand what you are building. This application will get more advanced as time goes on, budget may go up if we decide to continue development. You will need to finish a test task before you are awarded the job. This task will r...

    $10006 (Avg Bid)
    $10006 Avg Bid
    33 bids

    Use Ethracer to detect Event-ordering bugs and modify the source code of ethracer . Text me for details

    $1388 (Avg Bid)
    Featured
    $1388 Avg Bid
    36 bids
    Machine learning project 3 days left
    VERIFIED

    can you help me with deep learning project? Wanna to detect vehicle using background subtraction model with maskrcnn file contain project requirement details... We need to use MS coco dataset It must contain 3 vehicle classes car truck and bus We need to train model and classified these three classes

    $607 (Avg Bid)
    $607 Avg Bid
    29 bids

    deploy a VM instance eexternal ip firewall rules turn off vm, edit, turnm on shilding, secure boot, screenshot ability, http and https communication. set up new WP instance restore AIObackup harden server

    $64 / hr (Avg Bid)
    $64 / hr Avg Bid
    18 bids

    This project must build as a separate software or plugin for any existing IDEs. This project should be able to detect the source code vulnerabilities at the coding level. Project should be developed using machine learning techniques. I have a proposed methodology in the attached files, or feel free to come up with better solutions we will discuss and conclude the methodology. Project has two main phases. 1. Vulnerable code segment detection and 2. Correct the detected vulnerable code segments / suggest the corrected code. 1. Vulnerable code segment detection These vulnerable code segments should be related to the information security. For example, code segments which helps to make Cross site scripting attacks, Buffer overflows, SQL Injection etc. I have found an existing data set f...

    $750 (Avg Bid)
    $750 Avg Bid
    6 bids
    Azure vm design -- 2 3 days left
    VERIFIED

    design a diagram Azure VM with ubuntu docker environment for application hosting public facing the diagram design must explain all requirement ..firewall. Permissions azure b2b

    $45 (Avg Bid)
    $45 Avg Bid
    6 bids

    We have an existing employee performance application developed in C++ for windows. We need to improve the application by adding necessary code so that it can detect if the user in a meeting session using below applications: -- Zoom -- MS Teams -- Webex -- Google Meet -- Skype One potential ideal way to achieve this is to put a hook to the network traffic so that one of those applications are doing streaming. Only expert C++ developers need apply please.

    $914 (Avg Bid)
    $914 Avg Bid
    23 bids

    We would like someone to help us configure the following on our Cisco FirePower 1010 Firewall: 1. Allow access to particular users (IPs) via our secondary Internet line 2. AD integration (allow customised access as per username) 3. Show and explain the steps to us

    $26 (Avg Bid)
    $26 Avg Bid
    7 bids

    An algorithm was created to detect Brain Metastasis in mRI images. I have attached a powerpoint to better describe the current research project and challenges . Last year accuracy of detection was 85% now accuracy dropped to 50%. Need an expert in AI/ML, data science and medical image expert ( MS or PhD in data science) to look at the algorithm to optimize it and solve few other issues . Must have prior work experience with AI/ML, MRI images, need familiarity with DICOM meta data, DICOM viewer

    $652 (Avg Bid)
    NDA
    $652 Avg Bid
    35 bids

    Want Skeleton tracking program (Source Code), program need skeleton real time detect user's body joints points (reading 3D X, Y , Z position values) using 2D Web Camera. Body joints point tracking: head, neck, left shoulder, center shoulder, right shoulder points, left hand and right hands, hand palms, and hand center points ...etc. Here is a YouTube video for example Development platform: prefer Visual Studio 2013 Language: C# (Windows Desktop Program) Application: WPF , Windows Presentation Foundation

    $115 (Avg Bid)
    $115 Avg Bid
    2 bids

    ...Videos, Information, Designs, Icons, Pages, Article, Functions and absolutely nothing will be exempt at the Admin Back End Control, provided the features existed in the website. All Web Pages will be unlimited and will be linked to each other. Frequently and resent page views integration. Website Domain name: My Company Logo will be animated displaying. Anti Virus and Firewall will be integrated at the Back End and front end Platform, to Block Scam and spam Messages and every form of Viruses and malicious software and files, against security breaches. Freelancer that accept this project will take responsibilities in developing functional features of this website as an expert, knowing the right features to develop and integrate at the right positions. This is full web

    $2883 (Avg Bid)
    $2883 Avg Bid
    85 bids

    I need an algorithm in python, with a trained model (OPEN CV) that can detect the axle of a car (or its entire back). I want as input a random mp4/avi video on which to apply the code and create the region of interest. If the car is too far away and not in the ROI, I don't want anything to happen. If the car being filmed is too close, I want a message displayed on the screen.

    $152 (Avg Bid)
    $152 Avg Bid
    6 bids

    Project aims to incorporate facial expressions recognition needs and applications. This is a technology which use biometric marks and detect emotions of a human face and mental state, where human expression is displayed by face and felt by brain is detected by the system.

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    15 bids
    Administrador servidor Linux 1 day left
    VERIFIED

    Control de accesos IP, firewall, respaldos, monitoreo de recursos del sistema. Virtualización Proxmox, OS Centos, aplicativos y MySQL/DB.

    $26 / hr (Avg Bid)
    Local
    $26 / hr Avg Bid
    17 bids

    ...launch of my music software product. The right candidate has experience in marketing online products related to music and software. It would be an advantage if you play electric guitar also. You must be able to understand and appreciate this product so feel free to take a look at the website, to find out all about it. The software is a real-time effects processor, which can detect frequencies at the input and process them according to the user's choices. The audio filters in the application are so precise, they can isolate individual harmonics of musical notes. One of the functions of the application is a powerful digital audio equalizer. There is a landing page for this, should anyone wish to market this specific function. You can use keywords, "digital equalizer so...

    $67 (Avg Bid)
    $67 Avg Bid
    7 bids

    baseline - post-treatment fMRI analysis. Looking to detect change in BOLD activation between the 2 timepoints. Only 6 participants, 4 runs at each session alternating between neutral and stimulating images

    $157 (Avg Bid)
    $157 Avg Bid
    12 bids

    ...gets uploaded 2 part - a regular resizing of pics already in the storage on the phone processes: User opens the app for the first time, on the automatic side of the app, selects what size they want for all of the future pictures they take with their camera once the app is closed. Now without opening the app again, they take pictures with their camera, the app running in the background would detect that a pic was taken or the size of their storage has changed and resized each one of the new pics to the size that was selected in the app at the beginning, it all should happens automatically without re-opening the app other features: Create a popup notification telling the user how many pics/videos were resized automatically every 2 weeks Adding Admobs to the notifications/po...

    $1291 (Avg Bid)
    $1291 Avg Bid
    81 bids

    In this project , I use tracking shield sim 900 from Rhydoz lab which is a development board designed for tracking .It consists of GPS/GSM/GPRS in it .The main idea is to detect location and interface it with google maps so that we get location details of a vehicle to which it is set ,the location is sent as message to the mobile number programmed .But the problem is that I'm getting latitude and longitude but I'm not getting message to the prgrammed mobile number nor AT commands is working .so i need help in this project who have a good knowledge in embedded c

    $129 (Avg Bid)
    $129 Avg Bid
    15 bids
    Azure vm design 1 day left
    VERIFIED

    Look for someone to help me design a linux ununtu enviroment for application hosting the diagram must explain dns ..firewall..permisions b2b connect sftp ports vm in question will be publicly accesible.

    $51 (Avg Bid)
    $51 Avg Bid
    4 bids
    Mac os Tray Icon Development 1 day left
    VERIFIED

    ...(application side) (completed) 2. File Execution (Completed) 3. Recon installation process (shell) progress (completed) 4. Enterprise Recon Installation Confirmation (Development Target) - Checking for File Presence - Check process execution status - Delete moved files on failure 5. Create a Tray Icon - Create Tray Icon (Completed) - Check process execution status (Development target) - Check firewall open status (Developed to - Telnet equivalent) - Display image/text such as version information when clicking the icon (Developed target) Restrictions: 1) Must be deployed as Jamf-Pro > Create as a .pkg file > Apple notarized (we can proceed) > Background installation process > Unable to automatically restart the system after installation 2) Must be written in App form ...

    $781 (Avg Bid)
    $781 Avg Bid
    8 bids

    I require a Safari Web Extension for iPadOS that will detect when a PDF has opened in Safari and then automatically open that PDF in the Safari print dialog without any user action. This is so the user does not need to use the Print function on the Safari Share action list but can select their printer and print options before printing the PDF.

    $436 (Avg Bid)
    $436 Avg Bid
    15 bids
    succuri disable firwall 12 hours left
    VERIFIED

    Hi, i need help of a freelancer who is able to disable succuri firewall for my website with cloudflare. thank you, Ghulam Yaseen

    $9 / hr (Avg Bid)
    $9 / hr Avg Bid
    6 bids

    I have build the firewall, but I need assistance on configuring routing internal and external

    $53 (Avg Bid)
    $53 Avg Bid
    10 bids
    Spam detect/fix/terminate. Ending left
    VERIFIED

    We have receiving something like that on server. Its on WHM, and same on different accounts in same server. Need to find the reason, and fix. Time: Tue Aug 2 09:17:27 2022 +0100 PID: 26355 (Parent PID:24019) Account: eds Uptime: 26542 seconds Executable: /usr/local/cpanel/3rdparty/perl/532/bin/perl Command Line (often faked in exploits): spamd child Network connections by the process (if any): tcp: -> udp: -> 5.9.124.53:24441 udp: -> 1.1.1.1:53 tcp: -> Files open by the process (if any): /dev/null /usr/local/cpanel/logs/spamd_error_log /usr/local/cpanel/logs/spamd_error_log /usr/local/cpanel/3rdparty/perl/532/bin/spamd /home/eds/.razor/ /var/cpanel/locale/ /usr/local/cpanel/3rdparty/perl/532/lib/perl5/cpanel_lib/Net/DNS/Resolver/ Memory maps by th...

    $163 (Avg Bid)
    $163 Avg Bid
    24 bids

    Project To be completed in next 1-2 days: We have Lidar and Radar mounted on a vehicle. We need to detect Object using Lidar and Radar Data in ROS Noetic workspace. Following are the details provided: 1. Odometry Data in rosbag file (db3 format) for transformation of Sensor data to World Coordinate System 2. Point Cloud2 format of Lidar and Radar Data in rosbag file (db3 format) 3. file will be uploaded here provides information about the coordinate frames and transforms between the sensor and the vehicle 4. Location of Rosbag file: Will be provided one agreed with the project Perform the required Sensor Processing and use the best appropriate algorithms for Object Detection. Explain the purpose of each technique of Sensor processing and why particular algorithm was selected

    $417 (Avg Bid)
    Urgent
    $417 Avg Bid
    7 bids

    Bad developer I hired installed and set up. But it caused issue as below. 1. can not reset password ( even though it showed 12 + 1 calculation human check, there was no field for the answer) 2. after login, it will redirect to custom login url page for backend *by his setting up, wp-login url was changed to custom login url, but I thought it was only for backend login So now, I disabled all security features but still have below issue 1. not redirect to /my-account/ page after I reset password or login, it will redirect to wp-login I need to separate front login and backend login. For backend, I want to use custom login url For frontend ( for customer ), use /my-account/ Anyone who can work for this issue now? I require

    $192 (Avg Bid)
    Urgent
    $192 Avg Bid
    80 bids

    ...electrical components and sensors of the magnetometer array). I am looking for high sensitivity and building an array of sensors that will work through one (or multiple) usb connections to a laptop. I can handle the software side with my team's expertise (or we could discuss you doing that too), but I am primarily interested in a parts list and schematic for a functioning magnetometer array to detect large ferrous targets from a maximum distance (identifying disturbances to background magnetism). Ideally, I am looking to establish some directionality of a target using an array of sensors and have some ability to monitor (live and recorded) sensor readings via usb connection on a laptop. I will build the housing for the magnetometer, but I want expertise in getting the right ...

    $207 (Avg Bid)
    $207 Avg Bid
    9 bids

    Please i need to configure load balance on a fortigate 100d firewall and a Mikrotik Router board.

    $188 (Avg Bid)
    $188 Avg Bid
    28 bids

    I want the following 1. Read the attached paper. (Earlier stage for straggler detection and handling using combined CPU test and LATE methodology). a) Implement the methodology used in the paper. b) i) Write a program to detect/identify intermediate results (from the map phase) above 64Mb/128Mb and compare with (a) using same metrics to show which is a better method. OR ii) Improvement on the methodology used in (a) that will produce a better result. 2. Find a suitable paper on replication of data in hadoop mapreduce framework. a) Implement the methodology used in the paper b) i) Write a program to split identified intermediate results from (1 b(i)) appropriately into 64Mb/128Mb and compare with 2(a) using same metrics to show which is a better method. OR ii) Improvement on ...

    $203 (Avg Bid)
    $203 Avg Bid
    5 bids

    Make app to detect specific subfolders and replace content of files in it Make app detect list of domain names in file content and only perform replace if any there is a match Make sure app is works continuously & realtime as content replacement is to happen multiple times, in multiple directories

    $46 (Avg Bid)
    $46 Avg Bid
    13 bids

    In order to carry out a research project, we need a Python script that can calculate points in an interior room hall using OpenCV and AI (or any other technology in Python) and determine its coordinates by drawing markers in 2D in the picture. The points in question are as follows: 1. The corners of the floor 2. A point of the ceiling 3. Accurate calculation of corners that are hidden behind other objects The main challenge of this project is that in the input images, sometimes a corner of the wall corner may be hidden behind an object and cannot be seen, for example, furniture that blocks the corner from being seen, and the system must guess the exact location of the corner. picture number 3) The second challenge is that the points must be calculated accurately and without errors (this ...

    $1664 (Avg Bid)
    $1664 Avg Bid
    28 bids

    hi I want to debug my asterisk who have no ring back tone. It also not able to detect IVR like before. I want some one with more experience to debug it

    $255 (Avg Bid)
    $255 Avg Bid
    8 bids

    My requirement is to configure the alerts for Database and App Service using Azure Sentinel. For this I need KQL(Kusto query language) queries to set the alert rule logic, so that the query can g...Azure Sentinel. For this I need KQL(Kusto query language) queries to set the alert rule logic, so that the query can get the logs of the resource from 'log analytic workspace' which is configured to Microsoft sentinel. I need the KQL query logic for the following alerts: For" DATABASE": Maximum CPU Percentage alert Failed connections to the Database alert Dtu used capacity alert Deadlocks alert Firewall blocked alert Data IO percentage alert For "APP SERVICE": App Service Identity CPU Time alert HTTP 5xx alert HttpResponseTime alert Requests in the Applicati...

    $226 (Avg Bid)
    $226 Avg Bid
    3 bids

    My requirement is to configure the alerts for Database and App Service using Azure Sentinel. For this I need KQL(Kusto query language) queries to set the alert rule logic, so that the q...Sentinel. For this I need KQL(Kusto query language) queries to set the alert rule logic, so that the query can get the logs of the resource from 'log analytic workspace' which is configured to Microsoft sentinel. I need the KQL query logic for the following alerts: For" DATABASE": Maximum CPU Percentage alert Failed connections to the Database alert Dtu used capacity alert Deadlocks alert Firewall blocked alert Data IO percentage alert For "APP SERVICE": App Service Identity CPU Time alert HTTP 5xx alert HttpResponseTime alert Requests in the Applicatio...

    $183 (Avg Bid)
    Urgent
    $183 Avg Bid
    2 bids

    My requirement is to configure the alerts for Database and App Service using Azure Sentinel. For this I need KQL(Kusto query language) queries to set the alert rule logic, so that the query can...Azure Sentinel. For this I need KQL(Kusto query language) queries to set the alert rule logic, so that the query can get the logs of the resource from 'log analytic workspace' which is configured to Microsoft sentinel. I need the KQL query logic for the following alerts: For" DATABASE": Maximum CPU Percentage alert Failed connections to the Database alert Dtu used capacity alert Deadlocks alert Firewall blocked alert Data IO percentage alert For "APP SERVICE": App Service Identity CPU Time alert HTTP 5xx alert HttpResponseTime alert Requests in the Applicatio...

    $24 - $203
    $24 - $203
    0 bids

    Hello, we would need support regarding the security aspects of two PBXAct instances installed in the Cloud. We also have some small problems to fix. The clients we use are SangomaConnect, Zulu, Sip Phone (Sangoma Provisioning). The technologies used are VMWare VSphere, Sophos XG (firewall). If you are interested in this, I will provide you with more details. It could start with a day (8/h) of joint activity and evaluate further developments. Best Regards, Stefano

    $26 / hr (Avg Bid)
    $26 / hr Avg Bid
    1 bids

    I've developed a python scrapper with pyppeteer that is throwing this kind of warnings randomly: Traceback (most recent call last): File "/home/qamar/.local/lib/python3.9/site-packages/pyppeteer/", line 153, in _close_process self._loop.run_until_complete(()) File "/usr/lib/python3.9/asyncio/bas...RuntimeError('Event loop is closed') RuntimeError: Event loop is closed sys:1: RuntimeWarning: coroutine '' was never awaited RuntimeWarning: Enable tracemalloc to get the object allocation traceback The script is very simple: check if a website is online, if it's online keep checking but if it's offline send a telegram message Sometimes the program is getting stuck so it doesn't detect that the website is no longer availabl...

    $27 (Avg Bid)
    $27 Avg Bid
    4 bids