Cyber coders işler
Need a presentation ppt on the topic of cyber security. *It should be within 8-13 slides. *Easily understandable *Attractive presentation design *not copied from google/youtube
A telegram bot is to be created for verification systems in telegram group. I need coders that are fast and experienced to work on my project. You should be familiar with databases and telegram bot functions.
A telegram bot is to be created for verification systems in telegram group. I need coders that are fast and experienced to work on my project. You should be familiar with databases and telegram bot functions.
Currently a cyber security major and want to build a Crypter for runtime, need to develop it in C languages and good clean and easy to use GUI please text me if you can do this!
Hi we will add a couple updates to my EA. I will pay hourly for this work. I do a lot of ongoing projects and I am always looking for quality coders. Thanks!
Hi Cyber Afinity., I noticed your profile and would like to offer you my project. We can discuss any details over chat.
Using the tool Elastic Dump after importing data and following the steps which will be given upon signing a contract. Further steps would be analysing and identifying cyber attacks using cyber kill chain and MITRE attack.
We need to create a minting contract for the nfts attached. There are 2465 and they need to be deployed on the Fantom Chain. There are different rarities as outlined here: We need a button added on the front page of and then an additional minting page which has a button to mint, the price, some basic info about the nfts, and highlights the 5 rarest nft's
It should be a 6 slide (excluding one cover slide) MS PowerPoint presentation. Case: Analyze the Cyber Security market in US Government space: Cover the following 1. Spend Trend by the government in cyber security space 2. Competitive analysis of top 3 competitors 3. Major Programs run by government
Hi coders, Please read below and view the screenshot before bidding. This program will run at all times, and starts running when the computer boots. Stays active in the system tray. It will send and retrieve data from an MYSQL database. The program edits batch files based on the database fields. It will then run the batch file and display the Command Prompt output in a new window. There is the option to set a time to have the batch files run and ended at certain hours. Setup packaging is also needed to install and set up software on Windows machines. Can set timers to run and stop batch files. What's needed: Edits batch file and updates text based on database fields ability to set schedule for batch file exectution Runs batch file and embeds cmd output in a window Pa...
Hi Cyber Afinity., I noticed your profile and would like to offer you my project. We can discuss any details over chat.
I want one good Cyber security project with in the topics of operating system security, hypervisors, Keylogger Systems, SQL injection virtualization security, storage security, hardware security modules, crypto processors, cloud and IoT security My Budget is $100-$150. We shall discuss it .
Szukamy developerów do naszego teamu White Label Coders to grupa inżynierów, specjalistów IT, projektantów i kierowników projektów doświadczonych w projektowaniu i tworzeniu zaawansowanych aplikacji internetowych. Realizujemy projekty dla klientów z firmami z USA, Kanady, Wielkiej Brytanii, Holandii, Australii, Singapuru, czy Polski. Obecnie rozwijamy dwa zespoły. Jeden z nich będzie tworzyć rozwiązania informatyczne we współpracy z partnerem z Singapuru, drugi dla partnera z UK. Nasz Zespół obecnie jest jednym z najprężniej rozwijających się w Polsce. Dążymy, aby był topowy. Zresztą widniejemy na 23 miejscu w Clutch 100 co moim zdaniem mówi samo za siebie.
I have list of data which need to fetch live with the help of API. Python coders will be given first preference. My budjet is 10$ to 50$.
The websites purpose is to serve as a resource for my cyber sec study. It is meant to be an Instagram copy, that is already written and stylized and will serve as a practice ground for my Phising module showcase. - The website is not live. - The website will not be used in any illegal activities. Task: - Make the website responsive for mobile devices.
Looking for a talented pixel artist with great experience in designing and drawing cyberpunk style arts for website. Need a creative artist with rich experience in cyberpunk field. Can be long-term cooperation. Please add cyber to the first line of your proposal for checking if you read carefully. Thanks.
I have installed centos7 on hardware and configured static IP Now This will be my requirement 1. Custom Nameserver + Custome Hostname 2. When we add a nameserver on the domain and create an account on the cyber panel then it should auto-setup the mail setting 3. Migration of 1 WordPress website + Help us if other migrations face any issue 4. PHP versions should be available from 5.6 to the latest on the cyber panel 5. Free SSL Certificate Installation 6. 1 Click WordPress Installation config 7. Email configuration including PTR 8. Custom Server Root Login URL + SSL installed on it
...implementations that could be used to provide protection against a tangible threat in the domain of cybersecurity. Describe a use-case scenario where your implementation is usable; it should provide a step-by-step implementation and usage guide. Choose from the following: 1. Wireless Security. In this topic, you will have to implement a defensive mechanism that will be applied on wireless infrastructure. 2. Cloud Security. Implement a defensive mechanism for an open-source cloud solution, such as Devstack ( ). 3. Information Security. Take the necessary measures in protecting information by using a combination of physical and electronic/cyber tools, ensuring authorized access and GDPR policies. 4. Resource Provisioning . This topic evaluates
Hello, I would need the assistance of a skilled cyber expert to help me in resolving a current issue. Looking forward to your reply
Hi GOAT CODERS PVT. LTD., I noticed your profile and would like to offer you my project. We can discuss any details over chat.
I need someone to do a review and update specs for a project requiring NIST 800 must have experience working with the government familiar with NIST 800 and other government requirements. Deliverables. Updated Specs Guidelines to bidders on equipment requirements to meet cyber security requirements. Answer questions at 90% comments and 100% comments. May be required to attend 2 meetings. Via teams. Must be a US Citizen
Lütfen detayları görmek için Kaydolun ya da Giriş Yapın.
Hello everyone, We are a cyber security and intelligence company. We want to hire a content developer and want to work with him/her continuously. We have some expectations from candidates and you can find them below. - Every month we will create 16 different blog posts ( 4 content per week ) - All blog posts should be SEO compatible - All blog posts should have min 1000 keywords - All blog posts should have a table of content - All blog posts should have a minimum 2 illustrations or compatible image - Every month we will discuss the topics and agree on it If we find the best person, we can work together full time in our company. Some example topics are below: Top 5 Black Markets in Dark web Top 5 TOR Browsers What is Malware as a Service? What is Ransomware as a Service? Last ...
I have a blog that I want to use to highlight a few of my whitepapers and misc cyber security content. I want to add some organization and a good visual framework as I add additional whitepapers and videos. Ill leave it up to you general creativity. My only requirements are: -Easy posting of whitepapers and they automatically appear in navigation bars. (using tags or whatever other strategy you decide) -multilevel navigation bar Logo is already created so, you don't need to worry about that.
...essentially entails rewriting, rephrasing and recreating existing articles based on the structure and guidelines provided by us. 2) The topics, niches & nature of the content you create will never be the same, you could be writing on the '10 Best Gifts For Potterheads' for Buzzfeed in the morning, with a casual narrative and style, while ending the day with 'IIOT For CNC Machines - Dealing With Cyber-Security Threats' for AmericanMachinist. 3) You will be provided with a topic, along with instructions regarding the tone, style, and the overall structure, comprised of various subheaders and subsections. 4) We will also be providing you with resources from where you will be required to analyze relevant information, before reproducing them in your own wo...
Need a Professional who can make a copy of the course using the exiting course outline, overview, objectives, material and give a new update with new graphic, background theme and something creative which is suitable to the logo, add subtitles in English with the lady voice. List of Courses 1. Business Accounting and Taxation 2. Software Testing and Automation 3. Cyber Security 4. Machine Learning 5. Product Management 6. Data Analyst 7. Advance Flutter 8. Advance React Native 9. Ethical Hacking Also, if you have any suggestion/doubt regarding the course please let me know and will discuss it with you.
Hi CYBER TEKI, I noticed your profile and would like to offer you my project. We can discuss any details over chat.
I need a complete website. With 2-3 pages. Employ ReactJs, Bootstrap and NodeJs. Responsiveness and clean code should be a priority. It is all about an online cyber where a client can place an order and I will have a group of employees say 5 who will have the order done and returned to the clients.
We are an IT solution company. I need someone who helps us to get projects and manage the clients. We are currently providing these services. Mobile Apps Development: - -> iOS APPS...eCommerce. -> CMS (CONTENT MANAGEMENT SYSTEM). -> API & BACKEND. -> CUSTOM DEVELOPMENT. Software Development: - ->CUSTOMIZED SOFTWARE DEVELOPMENT. Graphics and Designing: - -> LOGO & BRANDING. -> WIREFRAME. -> UI/UX DESIGN. Digital Marketing: - -> SEARCH ENGINE OPTIMIZATION. -> EMAIL MARKETING. -> CONTENT & BLOG WRITING. -> SOCIAL MEDIA OPTIMIZATION. ->SOCIAL MEDIA PAGE HANDLING. Penetration Testing & Cyber Security: - -> VULNERABILITY ASSESMENT & PENETRATION TESTING. -> NETWORK PENETRATION TESTING. -> MOBILE APPLICATION PENETRATION TE...
We are looking for coders who can do iOS and Android apps plus web
Hi CYBER TEKI, I noticed your profile and would like to offer you my project. We can discuss any details over chat.
Lütfen detayları görmek için Kaydolun ya da Giriş Yapın.
Submit the screenshots/samples of your past work. I have a blog as part of this requirement, you are required to set up the best theme. Which blog platform do you recommend me to have (WordPress/Ghost/etc). I already have access to a WordPress host where the blog can be published immediately. Note: 1) Blog is about Technology and Cyber Security etc, Show me the most attractive and creative blog theme. 2) Blog platform should have secure coding practices to avoid any compromise/breach.
Hello We are looking for someone who is team player and can install script into my client domains. we would like the following installed We want it install with Cyberpanel VPS, WE DONT USE CPANEL, we use Cyber Panel
Hi I require your services for an security job test I'm having next week (Thursday April 21, 2022 - 6-9pm Eastern time zone) for a pro it should take 45 minutes to 1:30 hrs. Is this something you are interested in. The job test is an introduction to - Information System Security. The job test has multiple choice questions and a few written answers. We can work here or through whats app, and I will send you the snapshots of the questions. Please let me know. Thank you
Customed DayZ server, primarily focused on fast-paced, hard core PVP & raiding. Looking to hire modders, coders to assist in the ground floor build up of the server. Also looking to hire GFX artists on a continuing commission basis.
Look for cyber security SME to answer questions about startup business for cyber security You must have knowledge about the following : -red team operations -blue team operations -reports -general business -minimum requirement of cyber security company - an overview of providing a service to XYZ company from A to Z -what reports to provide for a client
Hi CYBER TEKI, I noticed your profile and would like to set up a session of 1 hour zoom meeting where we could discuss some of the questions I have regarding ransomware and cloud security. I've done many researches about them and I need a specific IT specialist perspective therefore I wanted to contact you. Would you be comfortable If I share a document of questions I will ask you?
Cyber Gun Is Gun Lase Created By Me In Specialize for Roblox studios
I need review on a cyber security topic. I will give send you a picture having instructions. It need not to be hight level I just need a mid level that too just 2 pages. I need this one with in april 15th.
Hi CYBER TEKI, I noticed your profile and would like to set up a session of 1 hour zoom meeting where we could discuss some of the questions I have regarding ransomware and cloud security. I've done many researches about them and I need a specific IT specialist perspective therefore I wanted to contact you. Would you be comfortable If I share a document of questions I will ask you?
Edit grades Info technology fund: final grade B, midterm B Cyber Vulnerability: final grade C, midterm B African American history: final grade A, midterm A pgh/past-present: final grade A, midterm B TERM GPA: 3.125
Cyber security project. Cyber offense project. I want to start it immediately.
...people who would be real members. I had to stop all new members from joining. Question is: How to stop these attacks. I cannot block the IP address, because each bogus member has a different IP address. I can not block them by country, because they only change to a different country location. And I already have a Captcha working. Have worked to stop this kind of attack? I am only interested in coders who have successfully stopped these human-assisted bot attacks. ...
Need a web scraper script built to scrape data from 6 wordpress sites - script to be installed on my server and data should output a google sheet - only scrape data i specify from 01 february 2022 onwards, i dont want older post data. - the script should auto run every 12 hours to pull any new content and insert into sheet. - script should be build to be scalable, use popular code so that other coders in future can update - images scraped will be stored in a google drive folder and referened with correct image path in sheet - script should generate a daily report to tell us what has been added, error, etc. - the script will fully belong to us once coded. And tests will be run and u will be responsibile for fixing any scraping errors. this isnt anything challenging as the 6 sourc...
...larger project at the University of Bristol looking at making software development more user-friendly. In this study, we are looking at permission systems in mobile operating systems to understand developers’ challenges in integrating permissions smoothly into their projects. We would greatly appreciate your insights as someone with mobile programming experience. Thanks very much, Bristol Cyber Security Group...
Hi, I need a cyber security report for my : MERN ( node, Recat web app )
...application usually built by prominent vendors like SAP, Oracle, etc. 6,375.00 Product Line (Cloud Security Assessment) AUD Small Organisations (under 100 employees) 2,500.00 Medium Organisations (100-500 employees) 4,500.00 Large Organisations (500+ employees) 8,000.00 GRC Services Product Line (Maturity Assessment) AUD Express Assessment (GDPR//UK-Cyber-Essentials/ISO/PCI/ISR/Etc.) 3,400.00 Detailed (GDPR/UK-Cyber-Essentials/ISO/PCI/ISR/Etc.) 6,375.00 Product Line (ISMS Implementation) AUD Small Organisations 16,000.00 Large Organisations 32,000.00 Materials for Pre-sales (to be confirmed after partnership agreements are signed) Presales Scoping Sheets Proposal Inserts Opportunity Pipeline Mechanisms ...
...share a common set of code, features and content. We need an independent developer (NOT a company) to be part of our small international team of 2 engineers to work on new features and improvements to existing code. We're currently transitioning from fully native apps to shared code written in Scheme with SQLite, using native view wrappers on iOS and Android and are looking for experienced Scheme coders to help us. We are looking for an independent developer, who loves good code and best practices. We use modern tools and invest in modern techniques like Test Driven Development (TDD) and Continuous Integration (CI). We obsess over quality and help each other with pair programming, code reviews and architecture design. This is a great position for a passionate developer (p...