Estamos buscando un desarrollador para una herramienta que facilite la gestión de un DryCleaning. Esta, debe poder generar un ticket electrónico del pedido del cliente (prendas ingresadas), poder actualizar el estado de la prenda (por ejemplo, por procesar o lista), enviar al cliente un mensaje SMS (email o WhatsApp) cuando las prenda se encuentre lista, tener una base de datos de los clientes con información de contacto e historial de órdenes y debe existir una sección administrativa donde se puedan visualizar el cierre de caja, datos estadísticos (por ejemplo, número de prendas ingresadas) y filtros. Entre otros. Lo anterior, debe poder visualizarse por tienda/sucursal. Para el cliente, una sección donde pueda realizar y pagar u...
Me gustaría un curso de varias clases de programación RUST, al principio con los conceptos más básicos y aumentando el nivel con cada clase, empezando desde cero y terminando con conceptos más avanzados, para aprender y comprender completamente el lenguaje de programación y sus aplicaciones. La duración mínima total del videocurso con todas las clases es de 2 horas. Obligatorio idioma ESPAÑOL.
I wrote a proposal to develop a technique to protect web app from attacks. I need a freelancer to help me a mend it.
I need help in understanding ethical hacking and cyber security
*This project is in consideration and is a low budget request The project consists of attempting an encryption attack on cipher text data. The data will be provided via .CSV and the task is to crack the text to plain text. This is for testing security of an application. This project will be staged by "Levels" in which the hiree will be provided more information at each level to promote a succesful attack. Level 1: Hiree will be given basic information on the subject of the ciphertext data. And be alloted 48 hours to attempt a crack. Level 2: Hiree will be provided information on the encryption alogrithm used to encrypt the data. Allotted 48 hours to attempt a crack. Level 3: Hiree will be given all information regarding subject of the data, type of the data, etc. And will...
I have a WP website and my gsuite email (google business email) doesn't receive firm submissions from customers who contact me through the website contact us form... Google suggested me to do this: the servers that you are using your email are trying to validate that all of your emails are sign with an SPF record, this means that your email its been authenticated like sending an email. point to point, since this domain is managed by you, you also need to manage the DNSA settings, this implies that you also configure these settings. The help article that I'm sending contains the instructions to comply with this security protocol with a basic SPF record.
My Wordpress website has reported back a large number of 'pages' - according to Google search console - that were not created by me. Somehow my website has been compromised and I don't know how, or where these pages / URL's have been created. I cannot see these pages within my Wordpress, only in Google Search Console (see attached screenshot - none of these URL's were created be me). I am looking for someone to find and remove what has happened here. Upon completion of the work I will require a report of what was done to solve the issue.
I need help from a Cyber Security expert to collect attacks related to MANET, VANET, and Protocols. ? Prepare a table that summarizes all attacks and how to mitigate them. ? Find unsolved problems or unmitigated attacks if any
My wordpress website is randomly creating false urls. As soon as new post is created muliple random urls are created. And those urls are getting indexed in google. URLs are created something like. / Knowing the root cause of spam links generation.
-> Perform a Black Box penetration test for a single web application -> Only one website application -> Document techniques, methodology, vulnerabilities found and exploited
The project is basically to set up a vm that will be equipped with all necessary tools for the analysis(flare vm inclusive ), and then get malwares readily available online to analyze. A flowchart should be developed on suitable guidelines in addressing the malwares in future. The link above explains the dissertation
Hello, We looking for CodeIgniter Need expert for SQL Injection and XSS attacks Our site is in Code ignitor, You can review our code and lets know what is loophole that need to be fix list and you going to fix them all. Database security and Code security as we getting attack both side. Please write in details your expertise for this. will discuss more details on PM. Thanks!
Hello Entire server of multiple websites has been hacked, username keeps being changed to Annoymous Fox, and websites going down, fake email accounts being added in cpanel right now error on websites is like -- Fatal error: Cannot redeclare http_get_contents() (previously declared in /home/skynutrition/public_html/(1) : eval()'d code(16) : eval()'d code:1) in /home/skynutrition/public_html/(2) : eval()'d code(16) : eval()'d code on line 1 or on wordpress - Fatal error: Cannot redeclare http_get_contents() (previously declared in /home/cobweb/public_html/(1) : eval()'d code(16) : eval()'d code:1) in /home/cobweb/public_html/(2) : eval()'d code(16) : eval()'d code on line 1
I am under cyber attack and need someone to create firewalls, eliminate penetration points, recommend protection on all of my online systems (3 email accounts, images, dark web, business url, social media accoints <facebook, instagram>, 6-8 hard drives of old computers, current and 2 old cell phones), identify, eliminate and sanitize any planted content or unknown areas of entry, remove me from the dark web, change passwords, plus set up or recommend inpenetrable security. Also to go through 6-8 hard drives from old computers and review content with me. The is a security and content irganization/clean up project. Ideally, this may involve two people with different skill sets.
Hey, I wanted to get rid of squarespace and started to rebuild my website via Wordpress. I purchased this theme from themeforest: It was what looked the most similar that I could find. Unfortunately I’m not an expert. I can not code but I want to get this thing up as soon as possible so I'm looking for help. 1. Make this site: .. look exactly like this: The main page is this media gallery. I won't share the urls here because I first want to find the right person I can trust. With exactly I really mean it. Everything should stay as minimalistic as it is. Black background, white text, same font (Source Code Pro), same sizes (text and pictures should load the same way, same arrangement, also optimized for zooming in- and out). Same underlines, loading animations. It nee...
Our website and bizmail is hosted on yahoo small business hosting( now called verizon.) As our company cybersecurity measures requirement, we would like to implement the following controls: 1) Two-Factor authentication must be enforced on all cloud services access, including access to cloud-based email. 2A) The Third Party must implement Sender Policy Framework (SPF) technology on the mail server. 2B) The Third Party must enforce Sender Policy Framework (SPF) feature on Saudi Aramco email domains: and Aramco.com.sa. 2C) The Third Party must publish the SPF record in the DNS server. Regards,
securing website against Interval HTTP-Header based vulnerability
Hello, I want help to Add DDoS and Brute-Force Protection to My Hetzner Server. If you know how hetzner server works, then please apply. I want you to add a way to make it brute-attack and ddos proof. I also found some script fro github which can do so if you are familiar with it. please write it in proposal! Thanks
Hi, This is a technical and report writing task. The main objectives are below: (1) First collect a substantial number of profiles of both fake and legitimate Likers using linkage and honeypot approaches, (2) Analyze the characteristics of both types of Likers & geographical mapping of Facebook fake likers. (3) Identify effective features exploiting the learned characteristics and apply them in supervised learning models, and (4) Thoroughly evaluate their performances against three baseline methods and under two attack models. Please bid who are experts or can handle this project. We want to make long-term relations with the perfect freelancer. Waiting for a quick response.
This is a one-time project to fix a Linkedin account restriction issue. Project responsibilities: - Understand Linkedin account issue - Strategize a solution for the issue - Inform how to prevent issues in the future Note: The account isn't restricted for now, but we need to find a safe way to log in without getting restricted. Please let me know if you have done something similar in the past or you are familiar with how Linkedin account restrictions work.
We have an Ionic 4 app, and need to add YouTube videos on page by using parameter links.
We need a highly skilled servers admin who can make our website that can only be accessed by VPN. Please do not reply if you are not highly skilled in Thor and have done this type of project before
We need a highly skilled servers admin who can make our website that can only be accessed by VPN. Please do not reply if you are not highly skilled in Thor and have done this type of project before.
we are looking for someone who can help us check all website related security threats and setup against bot and DDoS protection
We are getting unusual traffic on our website as per the google analytics report. It shows daily 3k visitors from indonesia . However, our website is providing services in India only. kindly suggest what's need to be done
Plebbit is a theoretical design for a Reddit alternative built partly using IPFS' experimental pubsub feature. View the whitepaper. One of the design that needs to be tested is how big can the pubsub network scale, and how much spam resistance does the captcha service over pubsub provides. Multiple scenarios should be tested: How much time does it take on average to complete a full captcha challenge request-answer-validation exchange. What is the maximum amount of posts per minute that can be published without breaking. Can the captcha service successfully prevent attackers from spamming captcha challenge requests. Can the captcha service successfully prevent attackers from spamming captcha challenge answers that are incorrect. Deliverables The "captcha puzzle" doesn...
We have recently built a mobile application and want an experience security expert to perform a thorough security testing of our mobile app and lets us know security gaps and help us fix them . YOu must be aware about Cloud , AWS and DevSecOps
Hello. There is a problem of opening access to SP-API Restricted roles for working with customer addresses. The questionnaire contains questions that need to be answered correctly in order for Amazon to open access to customers' private information. I need someone who has had a successful experience with this. Here are the questions: Describe the network protection controls used by your organization to restrict public access to databases, file servers and desktop/developer endpoints. Describe how your organization individually identifies employees who have access to Amazon Information and restricts employee access to Amazon Information on a need-to-know basis. Describe the mechanism your organization has in place to monitor and prevent Amazon Information from being accessed ...
OPERATING SYSTEM SECURITY PROJECT LINUX KERNEL VULNERABILITY AND EXPLOITATION Project Description: The purpose of this project is to learn to find vulnerabilities in modern operating systems and master the art of exploitation. You are required to research the Linux Kernel vulnerability CVE-2019-14814, and then build or install a kernel image with the same vulnerability. You will then illustrate using an appropriate exploit how to violate the security of the vulnerable image.