Filtre

Son aramalarım
Şuna göre filtrele:
Bütçe
ile
ile
ile
Tür
Beceri
Diller
    İş Durumu
    7,148 the dao attack iş bulundu, ücretlendirmeleri EUR

    Here is the issue: I have to deliver in 10 hours max. I have started a freelancer but he may cannot deliver so we have to choices: 1. either to create it all by your self or with your team (if you have some part ready it would be the best) ($90-$100) 2. only add the labyrinths, the multiplayer and the armor/accuracy/attack on the code of the...

    €90 (Avg Bid)
    €90 Ortalama Teklif
    4 teklifler

    ...Astro Boy). I would like the clip to focus a single central character trying to get through a dark, windy and rainy city at night, in an attempt to get to a beautiful, lush, green, sunny pasture that the viewer can see from time to time throughout the clip. I would really like there to be a twist at the end of the clip, but I've not come up with

    €264 (Avg Bid)
    €264
    2 girdi

    I am looking for a concept drawing for a medium attack vehicle, Would like to base it off the Fire King wildfire truck, but also articulate like a franna crane and have water jets and a water cannon like the bulldog fire truck

    €269 (Avg Bid)
    €269 Ortalama Teklif
    6 teklifler

    Project Overview The purpose of this engagement is to improve upon an already capable web application security product through a combination of data science research and implementation. The technology stack consists of a combination of Jupyter Notebooks, Python and associated libraries for research plus Apache Flink with Java or Python sidecars for

    €43 / hr (Avg Bid)
    €43 / hr Ortalama Teklif
    22 teklifler

    ...non Residential,lately we have come across a customer which is an organization having a problem of bees which are attacking one of the wooden shade close to the main gate,they always come and go and sometimes they attack [login to view URL] Nature that surrounds this place is a bushland and thickets so they need a scientific report based on observation and

    €54 (Avg Bid)
    €54 Ortalama Teklif
    23 teklifler

    need someone who is good in cryptography and cryptanalysis as well as in matlab and maple. have to implement "differential-linear attack" on dummy structure of 4 or 8 bit cipher in matlab or maple. at the end i need a brief report and source code with comments. you have to do everything by yourself.

    €410 (Avg Bid)
    €410 Ortalama Teklif
    11 teklifler

    ...turn-based game for two to six players. The standard version is played on a board depicting a political map of the Earth, divided into forty-two territories, which are grouped into six continents. The object of the game is to eliminate the other players by occupying every territory on the board. Players use armies to attack and defend territories...

    €205 (Avg Bid)
    €205 Ortalama Teklif
    7 teklifler
    Project for Ritu G. 16 hours left

    ... Our Project is 2 Fold the 1st is a restyling of our CSS Style Sheet. The second part is Updating of our API [login to view URL] we would like to add to its function. we would like to add if its a weapon and the roll is a sucess then check if the feat dice is higher than the weapon edge score you may have a piercing attack. also we would like if a

    €9 (Avg Bid)
    €9 Ortalama Teklif
    1 teklifler

    The application will be about Dormitories in Turkey. Users will be able to register in this application using their mobile number, a confirmation code will be sent to them. After Successful registration, users will be able to select their 1- Dormitory Name ( Dormitory Names will be provided in an Excel file), 2- Block number 3- Room number 4- University

    €1045 (Avg Bid)
    €1045 Ortalama Teklif
    5 teklifler

    ...components such as adding new enemy into the game, the Enemy must move in an interesting way different than the existing [login to view URL] must react to being attacked by the player. Secondly, add a special weapon for the player, Special weapon must be able to attack and damage or destroy enemies in a unique way different from the standard weap...

    €678 (Avg Bid)
    €678 Ortalama Teklif
    19 teklifler
    Trophy icon Sketch of a sneak attack 2 days left

    ...It will be used in my game Heir to Dragonsfall The game is a Dungeons and Dragons style deckbuilding game. I would prefer someone being sneak attacked by a Rouge type character. We are using uncolored sketches for art in the game. I will try to post a picture similar to the style we are using below (the attached file is not mine, it is just for style

    €26 (Avg Bid)
    Özellikli Garantili
    €26
    17 girdi

    Hello i need someone to do Ns2 simulation and write a well-detailed documentation. Contact me for more details

    €39 (Avg Bid)
    €39 Ortalama Teklif
    4 teklifler

    ...weapon, and we add 4) legs and 5) arms. We have these images. - it is needed to create animation (only skeleton path, not images) while character stands (in fight-ready mood), attack, defend, death (only becomes black and dissepear) + minor animations of ultimate skills like moving dragon head breathing fire + some other animations you would suggest we

    €434 (Avg Bid)
    €434 Ortalama Teklif
    19 teklifler

    Windows server was compromised due to due to SynAck ransomware attack We need to Decrypt a MS SQL Server 2008 database .mdf & .ldf file (2files)

    €21 (Avg Bid)
    €21 Ortalama Teklif
    8 teklifler

    ...SEO ARTICLE, Just write naturally. NOTE: The articles must be UNIQUE & Original, it will be thoroughly checked for scraping and spinning ============= Overview: Please read this content brief until the end, every detail is important and we will be checking against this brief when approving or refusing the content. Title: [How Do Lizards Escape From

    €31 (Avg Bid)
    €31 Ortalama Teklif
    21 teklifler

    having had a recent attack on website, Google shows as site may be hacked, need someone to verify to google, and poss some seo work, to help get ranking back on form

    €72 (Avg Bid)
    €72 Ortalama Teklif
    16 teklifler

    Hi Farid, next creature i need is a Yeti, a giant, hairy and muscular creature of the snow. Three impressions can be seen here: [login to view URL] [login to view URL] https://pre00.deviantart.n

    €108 (Avg Bid)
    €108 Ortalama Teklif
    1 teklifler

    ...launched later this year. The style is sci fi, future soldier, tech, digital art. Aiming for $200 budget. 1. Attack Card: A future soldier aiming and shooting. Crop from the thighs up with the rest of the body showing. No background needed. 2. Move Card: A future soldier running. Crop from the thighs up with the rest of the body showing....

    €129 (Avg Bid)
    €129 Ortalama Teklif
    31 teklifler

    I have a wordpress site that has been subject to a hacker attack. I have cleaned up most of the files but now when I log in to the site I am directed to spam sites

    €28 (Avg Bid)
    €28 Ortalama Teklif
    34 teklifler

    ...documentation talk about introduction social Engineering and phishing attack It should contain investigate level threats and awareness Our scenario is We create fake web page and email then we send emails to 2000 person in Company between staff and client. 1500 from them visit the web site and login with same account details for company And no one

    €53 (Avg Bid)
    €53 Ortalama Teklif
    5 teklifler

    ...ser desacoplado do back-end Java, inclusive com unidades de implantação distintas. - O que já temos: - Framework back-end (estrutura de classes para persistência e algumas DAO); - Modelo de dados; - Obs: Caso o desenvolvedor já tenha um template de arquitetura(estrutura de classes), podemos negociar a utilização da mesma(mediante aprova&c...

    €1059 (Avg Bid)
    €1059 Ortalama Teklif
    14 teklifler

    I need word documentation talk about awareness cyber security Introduction to Social Media and Phishing attack The document should contains a Graphics (Figures) and the methodology to investigate level to threats and a awareness The documentation has a scenario i will provide it to you

    €38 (Avg Bid)
    €38 Ortalama Teklif
    19 teklifler

    i have some work related to NS2 and details will be shared in chat

    €61 (Avg Bid)
    €61 Ortalama Teklif
    2 teklifler

    Urgent: Need to build a script or chrome extension to follow the website link that is protected by cloudflare I'm Under Attack mode and get the final re-directed URL. Final URL has to be captured and writen to the text file on server or if it is on chrome extension then that final url has to be split into different slices based on condition and it has

    €3 / hr (Avg Bid)
    €3 / hr Ortalama Teklif
    9 teklifler

    Hi Dao Anh Vu D., I noticed your profile and would like to offer you my project. We can discuss any details over chat.

    €7 (Avg Bid)
    €7 Ortalama Teklif
    1 teklifler

    So, my website just had malware attack until my hosting account deactivated. So i've cleaned it and the account back to active again. But, i still suspect there's malware there, because there are some unwanted redirection to other websites. So i need you to clean it accordingly 100%, i do have backup but it might be infected as well. then, after i

    €85 (Avg Bid)
    €85 Ortalama Teklif
    39 teklifler

    ...collection cards of many different characters. The game is working around the crypto-related world (Bitcoin, Mining...). It will be a Clash Royale like, so I think you can easily understand what it has to look like; A simple border, design inside (that can be view in small size) and a place to write the cost of the card, no more. Design have to look a litlle

    €99 (Avg Bid)
    Garantili
    €99
    7 girdi

    ...take part in frequent calls (sometimes daily) to discuss the overall progress of the project and its milestones. This role requires both front and back end development to be able to create a Woocommerce Store from the ground up. No future on-going support will be required so it is crucial that the chosen WooCommerce Developer is confident in their ability

    €14 / hr (Avg Bid)
    €14 / hr Ortalama Teklif
    56 teklifler

    ...Encryption is the encryption process in cryptography. Make sure that the data is safe while traveling through the unsafe channel and that it can only be read by the person who is meant to use the keys that are rewritten in a legible form. In this paper I have handled a bit of history of cryptography, modern cryptography , cryptosystem, crypto attack sys...

    €162 (Avg Bid)
    €162 Ortalama Teklif
    33 teklifler

    My name is Ibrahim, am doing masters in Network Security, i need to write a documentation about detection of Denial of Service attack in VANETs. The documentation should be about 8-10 thousand words

    €254 (Avg Bid)
    €254 Ortalama Teklif
    9 teklifler

    ...able to get fornightly reports and be able to chat on the phone if needed. Also be able to answer the following questions: What e-commerce business’s have you worked for in the past? How have you scaled these businesses? What health-related businesses have you worked with? How would you attack this company Facebook ad strategy, what would you do

    €8081 (Avg Bid)
    €8081 Ortalama Teklif
    31 teklifler

    hi i want to add protect in my website protect it by captcha because there is many bots attack my database and take much cpu from my dedicated server because auto register and auto bad requests i want to stop this all bots please

    €276 (Avg Bid)
    €276 Ortalama Teklif
    46 teklifler

    On our prestashop back end we appear to have the JSCoinminer virus and we are trying to get rid of this, each time we load a page in our back end we get norton telling us that it blocks a web attack from the JScoinminer Website. So we are after someone to quickly and securely remove that. Thank you Work will be paid in milestones.

    €87 (Avg Bid)
    €87 Ortalama Teklif
    21 teklifler

    ...will be based on the following case study: Verizon 2017, Data Breach Digest: Perspective is Reality, 'An Executive Doxxing Match', pp. 21-22, [login to view URL] Answer the following questions in relation to the case study: 1. Describe the attack that occurred according

    €26 (Avg Bid)
    €26 Ortalama Teklif
    37 teklifler

    The issues are as follows: The main issue: Approximately one year ago a very negative video, targeted at our business was uploaded to YouTube. This video consistently outranks us on YouTube search and more importantly on Google Search. The video shows either as a standalone [login to view URL] result or as the first of three in a videos carousel in Google

    €1944 (Avg Bid)
    €1944 Ortalama Teklif
    23 teklifler

    ...will be based on the following case study: Verizon 2017, Data Breach Digest: Perspective is Reality, 'An Executive Doxxing Match', pp. 21-22, [login to view URL] Answer the following questions in relation to the case study: Describe the attack that occurred according

    €19 (Avg Bid)
    €19 Ortalama Teklif
    9 teklifler

    I'm looking for a sci-fi aficionado to help me iron out the core mechanics and name each card appropriately. Allow me to elaborate... The game in a nutshell. Characters must complete a story-driven campaign. Each campaign is broken up into individual missions. Missions consist of a variety of the three different Event Cards: Encounter, Obstacle, and

    €17 / hr (Avg Bid)
    €17 / hr Ortalama Teklif
    16 teklifler

    i need to analyze the big data of soccer inplay stat which i already have about 1 year records (eg. dangerous attack, shoot on target, asian handicap, match goal over, ...). To find the best strategy for winning betting.

    €189 (Avg Bid)
    €189 Ortalama Teklif
    15 teklifler

    This project is for a logo design for the gaming product called "Barrage". Logo name: The Barrage ( it represents and refers to "being under attack or taking fire, it represents being inundated and immersed in the Entertainment Experience") The sub slogan is going to be "Full Effects Simulation" We want the colors to include r...

    €26 (Avg Bid)
    €26 Ortalama Teklif
    1 teklifler

    ...that exist on hardware-encrypted devices with a 'secure element' security chip, such as iPhone). Features required: Primary requirement Open source Use of latest technology by the developer Simplest User Interface (UI) with great User Experience (UX) Spend tokens without waiting for a confirmation Touch ID support Tons of easy to use functionality Transaction

    €814 (Avg Bid)
    €814 Ortalama Teklif
    16 teklifler

    I will need to check if a specific website is secure against hacker attack.

    €112 (Avg Bid)
    €112 Ortalama Teklif
    31 teklifler

    Hello, I'm looking for some articles related to Cloud Backup, for now, based on next topics, that are the three principal features of a new app for the Cloud Backup Unlimited Storage Ransomware Attack Detection Complimentary 24/7 Assisted Recovery

    €116 (Avg Bid)
    €116 Ortalama Teklif
    8 teklifler

    i just want the performance measurement results of preventing and blocking the dos attack, also showing the difference between the normal and malicious traffic. would be more better if its used by PFsense

    €131 (Avg Bid)
    €131 Ortalama Teklif
    8 teklifler

    Hi Farid, next creature i need is a Giant Snake (Cobra like head, i...[login to view URL] Again with four animations: - Move - Idle - Attack (Bite) - Spell/Combat Art (Tail Lash) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian

    €109 (Avg Bid)
    €109 Ortalama Teklif
    1 teklifler

    demonstration of NFC based relay attack using android and MIFARE Ultralight, then build a simple application to prevent the attack, the idea is to create a simple host-based IPS for prevention of NFC relay attack for android mobile

    €167 (Avg Bid)
    €167 Ortalama Teklif
    9 teklifler

    ...allow third party venders to retrieve information. The problem is other people are using these string to attack and steal information from our site. I need to secure these strings so that only people I allow to use the query string can use it. I do not want un authorized access being used with the query string. I would also like to show an encrypted

    €185 (Avg Bid)
    €185 Ortalama Teklif
    51 teklifler

    ...got the job, but I have a weird letter thank you letter that needs to be done. So.. here is the story..I showed up for the interview on the wrong day and time. However, she was able to interview me that day. While waiting for her, I knew that I was not going to get the job and had a panic attack during the interview. I couldn't focus on <...

    €71 (Avg Bid)
    €71 Ortalama Teklif
    43 teklifler

    Some more advanced research measurements , for example the performance measurements of the dos attack

    €9 / hr (Avg Bid)
    €9 / hr Ortalama Teklif
    1 teklifler

    I need to do a simulation of an attack of the men-in-the-middle on a connected car considered like a connected object by programming the code of the attack with c ++ and using the NS3 software and I need someone who integrated the code and the simulation in my laptob via teamviewer

    €581 (Avg Bid)
    €581 Ortalama Teklif
    7 teklifler

    ...YOURSELF) Graphs and Charts Please look at the website and read a little about the subject.. When there are multiple designs we like we pick multiple winners! What also is something what would be of ouir interest is an info graphic about owasp top 10 ( look it up ) When having any questions please ask.. Ps..the points are examples DO YOUR OWN RESEARCH

    €44 (Avg Bid)
    Özellikli Garantili
    €44
    9 girdi