|I would like to hire a Grant Writer
||We work to empower more than 10000 vulnerable youth in different cities of Colombia.
||PHP, Ödenek Yazısı, HTML, Kaynak Yaratma
||Sep 20, 2017
|Child Safe Guarding Training
||We would like to have an in house training session for the church volunteers and teachers that work with children, young people and vulnerable people. It is a group of about 15 people.
||Sep 18, 2017
||Sep 18, 20174g 4s
|Update and secure website
||Custom site using PHP pages. Not word press. This site was created a while ago and needs to be updated and secured so that it is not vulnerable. Also the contact us page needs a capcha or what ever is considered a good bot deterrent.
Do not try to call the number on the site. I will come back to this posting in 5 hours to see what bids are here. Give samples of what you would do and how I can ...
||Sep 14, 2017
||Sep 14, 20178s 18a
|Project for Charles K. -- 59919
||Times new roman 12 point font single spaced, APA format 1 page for each question due Wednesday by [url kaldırıldı, görüntülemek için giriş yapın] way things should be done is:
What are the goods or the advantages.
What are the bads?
Where do I stand and what I should do about it?
ESSAY QUESTIONS:(1 page single spaced for each question at least, with cur...
||Muhasebe, Rapor Yazma, Yerine Yazma, Finans, Araştırma Yazarlığı,
||Sep 11, 2017
||Sep 11, 201716s 27a
|Cyber Security Vulnerabilities
||Please Select 2 out of the 3 topics, and write 2/3 paragraphs for EACH TOPIC. APA format.
Topic 1 – Emerging Cybersecurity Vulnerabilities
Emerging vulnerable areas for cybersecurity include; Social Networks, mobility, remote hostile takeovers, and the Smart grid. Select one vulnerable area and review threats and effective management policies to counter the risks within that area.
||Bilgisayar Güvenliği, Akademik Yazı
||Sep 11, 2017
||Sep 11, 2017Bitti
||What’s your opinion so far about the Australian healthcare system? Do you think it’s functional? Or dysfunctional?
Do you think Australia’s healthcare system is financially unsustainable? Why or why not?
Which ethical theory – utilitarianism or deontology – appeals to you the most? Or is there an alternative theory you prefer? Explain why.
In your opinion, is enoug...
||Sep 11, 2017
||Sep 11, 2017Bitti
|Design a network diagram
||You are tasked with designing a company network that must be defended from attackers. Defending a computer network from a breach is all about defense-in-depth and layered security. You need to create a network diagram that shows how best to defend against intruders stealing customer secrets from the database. The network diagram must include the following:
1. A node donating the internet (usual...
||Sistem Yöneticisi, Web Güvenliği, Bilgisayar Güvenliği, Ağ Yönetimi, İnternet Güvenliği
||Sep 6, 2017
||Sep 6, 2017Bitti
||(#1) In 1987, Denning wrote that the development of a real-time intrusion-detection system is motivated by four factors:
1) most existing systems have security flaws that render them susceptible to intrusions, penetrations, and other forms of abuse; finding and fixing all these deficiencies is not feasible for technical and economic reasons;
2) existing systems with known flaws are not easily ...
||Java, Algoritma, Yazılım Mimarisi, , Yazılım Geliştirme, Programlama
||Sep 4, 2017
||Sep 4, 2017Bitti
|Build a Website
||You are required to develop a web interface and some bash scripts (or other language to agree) that allow, specificated web site from users, to produce an online report with statistics containing security information (cipher ssl used, unmanaged web server version, vulnerable wordpress plugin, etc.).
The project will take a long time, but it can be developed part time.
The project will be dev...
||PHP, Web Sitesi Tasarımı, Grafik Tasarımı, MySQL, HTML
||Aug 25, 2017
||Aug 25, 2017Bitti
|anwer the questions
||Obtain the 2015-16 financial statements of (i) Westpac Bank; and (ii) AMP.
a) Prepare the following schedule:
Description of the top 5 assets (in descending order of % of total assets)
5. Amount and % of total asset Description of the top 5 assets (in descending order of % of total assets)
5. Amount and % of total as...
||Aug 20, 2017
|Project for tanujchugh -- 2
Hope you are fine
People renting to us the server say
- Server is vulnerable for DNS amplifications ..... So people can abuse our DNS ...
http support simpledns com/kb/a203/[url kaldırıldı, görüntülemek için giriş yapın]
please have a look at it and inform me if it's worth obeying to those guidelines ...
- for RDT ( standard ) port 3389 is still open a...
||PHP, Linux, MySQL, , Web Hosting, E-posta Pazarlama
||Aug 18, 2017
||Aug 18, 2017Bitti
||I need my website re-configured. I have a wordpress tour agent website, and it is being targeted for hacking for some reason, somone is hacking the website and deface it and even delete the website files from the server anf i'm restoring an off-site backup each time but i can't stop him.
So, i need to know how could this guy get control over my website and if there is any malicious or vu...
||Sistem Yöneticisi, WordPress
, MySQL, Shopify
||Aug 12, 2017
||Aug 12, 2017Bitti
|Write some software
||I need you to develop a software for me. I would like this software to be developed for Linux using Python. Build a Deceive-Detect-Deter type of Network Intrusion Detection System that will route a malicious attack such as Malware or Hackers. The plan is to lure anything malicious to make shift workstations that look vulnerable. Once rerouted, isolate the threat and delete the fake workstations...
||Python, Linux, Yazılım Mimarisi
||Aug 11, 2017
||Aug 11, 2017Bitti
|I need some Graphic Design
The Texas Diaper Bank is looking for a graphic designer to help us design a logo for our upcoming annual fundraiser, "Every Baby Deserves A Change". We are looking for this logo to be in Vector format.
Just to give you some background for who we are and what we do:
We are a small non-profit based out of San Antonio, Texas. We provide clean diapers and incontinence produc...
||Aug 10, 2017
||Aug 10, 2017Bitti
|Write some Software PHP
||I WANT TO UPDATE ON WEBSITE LINKS
THE MD5 algorithms will no longer be accepted by the MasterCard Payment Gateway. Merchants currently using MD5 algorithms will need to upgrade to SHA256 algorithms to avoid interruption to service after this point.
SO ON MY WEBSITE [url kaldırıldı, görüntülemek için giriş yapın] AND SOME OTHER WEBSITE IS SAME CODE INSTALED NOW I WANT ...
||PHP, Web Güvenliği, Yazılım Mimarisi, Web Sitesi Yönetimi, webMethods
||Jul 31, 2017
||Jul 31, 2017Bitti
|Self-Taught Learning to Deep Networks
||we are going to detect/predict multi-stage attack based on intrusion alerts, the dataset used is DARPA 2000 (MIT Lincoln Laboratory, 2000).
This dataset consists of two simulated multistage attack scenarios, LLDDOS1.0 and LLDOS2.0 of Distributed Denial of Services (DDoS) network attack, in two different networks [the Demilitarized Zone (DMZ) and Inside Networks].
The LLODS1.0 scenario can be di...
||Bilimsel Araştırma, Algoritma, Makine Öğrenimi, R Programlama Dili, Yapay Zeka
||Jul 30, 2017
||Jul 30, 2017Bitti
I had posted about this project just yesterday but I wanted to clarify that I'm looking for someone to help my proofread and correct my essay
This is the prompt:
Explain and assess the strengths and weaknesses in European approaches to helping different vulnerable populations. In your answer, compare at least two countries and address at least the poor and the immigran...
||Düzeltme/Tashih, Rapor Yazma
||Jul 27, 2017
||Jul 27, 2017Bitti
|beauty & health
||Skin is one of the largest organs of the body. Because of this, caring for your skin can directly affect your overall health. Your skin acts as a protective shield and is most vulnerable to outside elements. It’s affected by more factors than you may [url kaldırıldı, görüntülemek için giriş yapın] we must take care of our [url kaldırıldı, görüntülemek i&c...
||Metin Yazarlığı, Yerine Yazma, Article Writing, İçerik Yazımı
||Jul 25, 2017
||Jul 25, 2017Bitti
|technical report - urgently
||Choose a security vulnerability. Develop a test environment to demonstrate the chosen vulnerability
Main activities to do :
1. Choose a significant and a most relevant CVE (vulnerability), we prefer a CVE of 2016 or 2017. Include the details about things like impact etc.
2. Briefly explain and document the source of the chosen vulnerability and the causes in one page roughly(A direct copy of...
||Linux, Bilgisayar Güvenliği, Rapor Yazma, İnternet Güvenliği
||Jul 25, 2017
||Jul 25, 2017Bitti
||I need a logo designed. Logo required for safety radiator cover business called congardo. Product is aimed at healthcare market and protects vulnerable people from injury on hot radiators and pipework.
A modern logo is required conveying security, strength and reliability.
||Grafik Tasarımı, Logo Tasarımı
||Jul 24, 2017
||Jul 24, 2017Bitti