How safe is your online communications? Here are simple tips on how to get started on encryption.
Hello, we need stop We need set on cloudflare X-Requested-With Headers / XMLHttpRequest , we set already, but not stop all api requests Access-Control-Allow-Origin = Cross-Origin-Resource-Policy = same-origin thanks
In urgent need of a QR-based authentication system. 1) Flutter app that takes one-time user registration/updates it to the database and then acts as a QR Scanner 2) Web app which is connected to the same database and used for Login 3) Login Verification with QR that is generated through AES or any other base of encryption code 4) Flutter app's QR scanner has the decryption code which validates the login info with the database This is the product outline. For detailed information on the product ping me. The time constraint is I need it done in less than 5 days.
We are a cyber security agency and looking for 3 ethical hackers who have experience in cyber security, malware detection, IP tracking, phone number tracking, email tracking, and so on. Note: we are looking for a long-term partner not only a one-time project, if you are looking for a regular job this is for you. Please read the requirements before bidding thanks
*** ONLY BID if you have experience in SSH/RSA keys and CA certs *** Specifically, we need someone to provide a list of bash commands to accomplish the following. All you need to do is provide working bash/command line commands. We will integrate the commands into our system. Goal of Project: We need to provide users the ability to connect to our Linux server via git using SSH (we know how to configure git, and users will have 'git-shell' as their shell, they do not need bash exec abilities). We do NOT want to save every user (thousands of them) in ~/.ssh/authorized_keys, as this will be unmanageable under our customer count. Instead, we will use a private CA to generate a signed PEM file and provide them to our users. These users will then use this PEM file to ssh/git onto...
deploy a VM instance eexternal ip firewall rules turn off vm, edit, turnm on shilding, secure boot, screenshot ability, http and https communication. set up new WP instance restore AIObackup harden server
This project must build as a separate software or plugin for any existing IDEs. This project should be able to detect the source code vulnerabilities at the coding level. Project should be developed using machine learning techniques. I have a proposed methodology in the attached files, or feel free to come up with better solutions we will discuss and conclude the methodology. Project has two main phases. 1. Vulnerable code segment detection and 2. Correct the detected vulnerable code segments / suggest the corrected code. 1. Vulnerable code segment detection These vulnerable code segments should be related to the information security. For example, code segments which helps to make Cross site scripting attacks, Buffer overflows, SQL Injection etc. I have found an existing data set from thi...
We need a consultant´s professional services, and are looking for someone with proved experience, expert graphic designer, web/App developer & animator with creative technical expertise in Adobe Photoshop or Adobe Illustrator after effects. The scope of work included a user-friendly, attractive-looking draft English website built up in WORDPRESS meliorating pictures and videos issued by the Client. Once completed, for comments and approvals the draft website would be presented in two meetings sharing WORDPRESS screens through online meetings held through ZOOM, TEAM, or similar. Available information consists of: a) For posts, pictures and texts (Spanish) in POWERPOINT slides b) Logo b) Four short YOUTUBE videos. c) Categories and keywords. d) List of PLUGINS.
I need an OSCP certified who can help me to prepare for the Offensive Security Certified Professional (OSCP).
We are looking for a fullstack developer with good e-wallet integration skills on a platform, for a social network development project combined with a marketplace. Having developed a social network in the past would be an advantage. The mock-ups of the site are already available. You can see some examples here. To learn more about the project, please follow this link. If you are interested in the project, we will give you access to all the interfaces so you can give us your price and work time. But, let's stress right away that we have a very limited budget.
We need to implement on Apache server configuration for content security policy for a wordress site.
We already have a theme and we would like someone to build a website for us where it can cater for (but not limited to) - people can register their interests - the information will feed into a form - Login page for clients and candidates - Application process
Strictly 1 HOUR PROJECT! I want someone who can quickly identify and remove some malware/virus in my Cpanel which is redirecting my Websites and Scripts to some funny external site () I have noticed, the malware seems to be altering my files and .htaccess files by putting some line of code there. i need urgent help
Hello, we want install anticlickjack on magento 2.4.2, because, we have hackers that burns ads google campaigns that generating automated traffic identified by fingerprints. thanks For avoid that hacker uploading website on server like iframe and do fraud click Also need you do other modify like x frame and also csf for block them We need set on cloudflare X-Frame-Options "DENY" Content-Security-Policy "frame-ancestors 'none';" thanks
The overall objective is to appoint a consultant to perform a full security risk assessment and make appropriate recommendations and to write a report to enhance the currents security systems and policies in accordingly.
I am in need of assistance, I have an IP address from a phone scan report (170k pages) that is responsible for hacking the device. I need the IP address to be associated with an actual person/profile to be able to present evidence of hack. In addition, I need to gain access to an email I do not own the domain of in order to send two documents via a google folder. My apologies in advance but I am on a limited budget and realize this project may require additional software tools so I please ask that you already have access to these tools before inquiring. I would need the project completed by Friday. If interested please reach out. I appreciate your time and Thank You.
I need help tracing an IP address that I have from a phone scan report and associating someone with it. I also need help accessing an email that I do not own the domain so I can share a couple documents via a google folder. I realize that there may need to be software tools purchased in order to do this but I ask that you inquire if you have the software needed as I only have a limited budget, my apologies. I appreciate any help with this. Thank you.