Tapis

Carian terbaru saya
Tapis mengikut:
Bajet
hingga
hingga
hingga
Jenis
Kemahiran
Bahasa
    Status Pekerjaan
    1,344 brute data tugasan ditemui, harga dalam USD

    ...different devices (desktop, mobile, tablet). Secure and reliable platform. 2. Easy navigation allows users to find the information they need. 3. The website page should be designed as per the prototype prepared on our side. The prototype shall include Images and Content for the website. 4. The project includes Database configuration and setup. 5. Security features that defend the website against brute force attacks and malware infection will be configured and set up. 6. Sitemap configuration 7. WhatsApp floating icon integration Pages on the website: It is required to develop approximately 10 (ten) pages for the website. Content in General: 1. Introduction 2. About Us 3. Access to the knowledge base 4. Support 5. Location 6. Pricing 7. Training 8. Webinar Websites for refere...

    $12 / hr (Avg Bid)
    $12 / hr Avg Bida
    14 bida

    ...Minify CSS, JavaScript, and HTML to reduce file sizes and improve loading times. Ensure the theme and plugins do not add excessive bloat. 2.4 - Use a CDN to distribute the load, reduce latency, and improve the speed of content delivery globally. 2.5 - Regularly clean the database to remove unnecessary data and keep the website running smoothly. 3. Security Measures 3.1 - Implement SSL certificate. 3.2 - Install and configure a reputable security plugin to protect against common threats, such as brute force attacks, malware, and hacks. 3.3 - WordPress theme should not be without license 3.4 - Regular backup plugin should be added 4. Testing and Quality Assurance 4.1 - We will check compatibility and responsive design before handover. 4.2 - Website should be 95% + compat...

    $315 (Avg Bid)
    $315 Avg Bida
    92 bida

    I am in need of a proficient security expert to help tackle my final project geared towards creating a low-interactive honeypot. This honeypot is intended to guard real networks by focusing on detection of Brute Force Attacks specifically. The honeypot should be designed for the Linux operating system and created to effectively emulate SSH. I require that you have: 1. the built should be on CML 2. Skill in SSH protocol 3. Experience in creating low-interactive honeypots 4. The ability to focus on detecting Brute Force Attacks 5. Should specific documentation design, developments, and testing : Chapter 4 — Design 4.1 Introduction 4.2 Interface Design 4.3 System Design 4.4 Summary -------------------- Chapter 5 — Development 5.1 Introduction 5.2 Interface De...

    $189 (Avg Bid)
    $189 Avg Bida
    4 bida

    I'm in need o...black-box penetration testing on a WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are crucial for this project. ...

    $93 (Avg Bid)
    $93 Avg Bida
    29 bida

    I'm in need of an hack...penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are crucial for this project. ...

    $324 (Avg Bid)
    $324 Avg Bida
    23 bida

    ...Minify CSS, JavaScript, and HTML to reduce file sizes and improve loading times. Ensure the theme and plugins do not add excessive bloat. 2.4 - Use a CDN to distribute the load, reduce latency, and improve the speed of content delivery globally. 2.5 - Regularly clean the database to remove unnecessary data and keep the website running smoothly. 3. Security Measures 3.1 - Implement SSL certificate. 3.2 - Install and configure a reputable security plugin to protect against common threats, such as brute force attacks, malware, and hacks. 3.3 - WordPress theme should not be without license 3.4 - Regular backup plugin should be added 4. Testing and Quality Assurance 4.1 - We will check compatibility and responsive design before handover. 4.2 - Website should be 95% + compat...

    $332 (Avg Bid)
    $332 Avg Bida
    124 bida

    I'm in need of a security expert to properly configure Fail2ban on my Ubuntu server that is dedicated to filter and protect my OpenVPN setup. Your task will be to ensure that Fail2ban effectively mitigates the threat of: - Brute force attacks - DDoS attacks - Unauthorized login attempts Ideal Skills Include: - Strong knowledge of Ubuntu - Experience setting up and configuring Fail2ban - Understanding of NGINX Note: I am running a NGINX service with free openvpn for a local and private tunnel between The Server and many clients from a script.

    $33 (Avg Bid)
    $33 Avg Bida
    10 bida

    ...humans die the game resets an picks a new player to be chosen as first on infected team (all players respawn together) and all players are awarded $1000 in game currency. $50 per kill when on human team, $100 on infected team. (Assets will be provided) -3 classes for infected team one being the sprinter, which has an ability to boost speed for 30 seconds by 35% with a 60 second cooldown, next being brute, which is a tank with an ability to reduce incoming damage by 25% with an hp increase of 25% for 35 seconds with an 80 second cooldown. Last class will be screecher, which will have an ability that slows all human team players in an x amount of radius by 25% movement speed for 10 seconds with a 60 second cooldown -Leveling system, players start at level 1 an get xp per kill an m...

    $2646 (Avg Bid)
    $2646 Avg Bida
    4 bida

    ...to beef up the security on my current website. The primary goal of my website is to provide information and resources, implying that securing user data is of utmost priority. the curreent used siftware does the following and i need extra features for securities 1 - Django SSL Redirect: To enforce the use of HTTPS, I used the django-ssl-redirect middleware. It automatically redirects HTTP requests to HTTPS. 2 - Django Rest Framework (DRF): DRF includes various authentication classes, permission classes, and throttling classes to help secure your API endpoints. 3 - Brute Force Protection: django-axes will help our website protect against brute force attacks by tracking failed login attempts and blocking suspicious IPs. 4 - CORS Headers: Our Backed serves APIs...

    $554 (Avg Bid)
    $554 Avg Bida
    58 bida

    ...with secure password practices - Familiarity with encryption algorithms (bcrypt preferred due to its robustness) - Ability to implement email verification systems for password resets Requirements: 1. Implement an effective password encryption mechanism, preferably using bcrypt, considering no specific encryption algorithm was chosen. The choice of bcrypt is due to its security features against brute-force attacks. 2. Develop a user-friendly password reset feature, enabling users to securely reset their passwords through email verification. This includes generating a secure, time-limited link that users can click to enter a new password. 3. Ensure the entire process adheres to best security practices, including but not limited to secure transmission of information, proper storage...

    $14 / hr (Avg Bid)
    $14 / hr Avg Bida
    74 bida

    ...accounts. 5. **Remember Me Feature:** Provide users with the option to stay logged in across sessions for seamless access. 6. **Login with Email or Username:** Allow users to log in using either their email address or username. 7. **Google reCAPTCHA on Registration:** Integrate Google reCAPTCHA to prevent automated bot registrations. 8. A**uthentication Throttling:** Implement measures to prevent brute-force attacks by locking user accounts after a certain number of incorrect login attempts. 9. **Interactive Dashboard:** Develop an intuitive and visually appealing dashboard for users to manage their accounts and access relevant information. 10. **Unlimited User Roles and Permissions:** Create a flexible role-based access control system with the ability to assign custom permission...

    $181 - $241
    Ditampilkan Segera Dimeterai
    $181 - $241
    11 bida

    ...expertise of a security proficient in both server and WordPress environments. I have a WordPress website operating on a virtual private server that requires further security measures. Key areas that require attention include: - Malware Protection: I need a specialist who can comprehensively scan for and remove any malicious software from my WordPress site and server. - Brute Force Protection: I need robust protection against brute force attacks. This may include recommending and implementing software or comprehensive security measures, like using a CDN. - Secure User Authentication: Enhancement of the user login process to ensure it's secure and resistant to unauthorized access is necessary. Experience in captcha incorporation, two-factor authentication, and othe...

    $53 (Avg Bid)
    $53 Avg Bida
    47 bida

    I'm seeking an advanced Python developer to write a script that will use the GPU to increase the rate of key generation. The purpose of the script is essentially for brute forcing private keys and seed phrase. Understanding cryptographic principles will be a definite plus. Here's an overview of my requirements: - Development of a Python script capable of running primarily on Windows - Utilization of GPU computing power to increase key generation speed - Have knowledge of how seed phrase and private keys work in blockchain on different chains - Significant experience with Python, particularly involving cryptographic operations, is non-negotiable. Understanding of using GPU power for complex computations is a must-have - Knowledge of common coding best practices is crucial ...

    $84 (Avg Bid)
    $84 Avg Bida
    3 bida

    I'm looking for a social media security expert to reinforce the security of my Instagram and Twitter accounts. I've recently experienced a breach...expert to reinforce the security of my Instagram and Twitter accounts. I've recently experienced a breach and need a professional to conduct an in-depth audit of potential attack vectors. Your tasks will include: - Investigating the recent breach - Auditing all possible attack vectors While no specific attack vectors are suspected currently, an understanding of common tactics, such as phishing, brute force attacks, and malware injections, would be beneficial. Key skills and experience: - Strong knowledge of Instagram and Twitter security features - Experience with social media account audits - Understanding of co...

    $155 (Avg Bid)
    $155 Avg Bida
    9 bida

    ...ip at the moment I have problem checks: CHECK THAT THERE IS NOT A MALICIOUS SCRIPT ON A MACHINE////// CHECK EXEMPLE PROBLEM / An abusive behaviour (Intrusion) originating from your IP ip-37[.]59[.]171[.]7 has been reported to or noticed by our Abuse Team. Technical details showing the aforementioned problem follow An IP address within your delegated space is currently involved in an ongoing brute force attack against the following services: * SSH (Secure Shell) We have observed more than 6 login attempts within a 6 hour period originating from the following IP address: We last observed a malicious login attempt from this IP address at 2024-01-16 05:59:54 UTC. SSH (Secure Shell) (16 total) Date Source IP Target IP 2024-01-16 05:59:54 203.28.238

    $44 (Avg Bid)
    $44 Avg Bida
    14 bida

    Your mission : 1. Comprehensive Web Application Security Assessment 2. Thorough Vulnerability Identification 3. Exploit Simulation and Risk Mitigation 4. Detailed Security Assessment Reports 5. Customized Recom...Mitigation 4. Detailed Security Assessment Reports 5. Customized Recommendations for Strengthening Defenses Your abilities : - Bypass Authentication, Code Execution - SQL injection - Security monitoring - XSS (Cross-site scripting) - HTML injection - LFI (Local Life Inclusion) attack - CSRF - Network Security, Backdoors - URL Redirection attack - Host header injection - No Re-direct attack - Brute force attack etc. Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP) would be an ...

    $156 (Avg Bid)
    $156 Avg Bida
    18 bida

    In this challenge lab we'll play the role of the hacker attempting to brute-force a captured database of user credentials including salted hashes of the user's passwords. The lab will involve brute forcing.

    $187 (Avg Bid)
    $187 Avg Bida
    8 bida

    ...accessibility via a browser on both mobile and desktop platforms. Technical Preferences -- Utilize front-end frameworks such as Bootstrap, Tailwind, Bulma, or Custom CSS. Backend preferences include Python (Django, FastAPI, Flask) or PHP if not overly complex. Additional Features -- Integrate features such as: Copy-to-clipboard Expiry notifications Link deletion upon expiration Security measures against brute-force attacks Delivery and Punctuality -- The finished product must be fully functional and user-friendly, ready to implement upon delivery. We're targeting a completion deadline, and punctuality is critical - late submissions may result in gig termination. Please proactively seek clarification on any unclear points before accepting the assignment. Candidate Interact...

    $178 (Avg Bid)
    $178 Avg Bida
    31 bida

    I am looking for a Wordpre...within 1-2 weeks. Skills and experience required: - Strong knowledge of Wordpress and experience in optimizing website speed and security - Familiarity with various speed optimization techniques such as caching, minification, and content delivery networks as well as using Pagespeed Insights to improve Desktop & Mobile versions of the site. - Proficiency in improving security measures to prevent brute force attacks, unauthorized logins, malware & steps to safely back up the site. - Experience in troubleshooting and resolving performance and security issues - Good communication skills and ability to work within a specified timeline Attached are screenshots of the website's speed issues I would like to improve. The website will be shared with...

    $102 (Avg Bid)
    $102 Avg Bida
    180 bida

    Hello, Nodered is going to be implemented on a Windows server A communication flow will be created with some plcs and several dashboards. We need to secure nodered with the following: -A user management module to be able to create and delete users with different permissions. -Limit login attempts with incorrect username and/or password (brute force attacks). -Do not allow 2 or more sessions from the same user, you can also force the session to close from the user management module. You could do it? It is not urgent but we would like to know the price and delivery time and what you propose to achieve the requirements.

    $326 (Avg Bid)
    $326 Avg Bida
    22 bida

    Hello, Nodered is going to be implemented on a Windows server A communication flow will be created with some plcs and several dashboards. We need to secure nodered with the following: -A user management module to be able to create and delete users with different permissions. -Limit login attempts with incorrect username and/or password (brute force attacks). -Do not allow 2 or more sessions from the same user, you can also force the session to close from the user management module. You could do it? It is not urgent but we would like to know the price and delivery time and what you propose to achieve the requirements.

    $139 (Avg Bid)
    $139 Avg Bida
    133 bida

    I am looking for a skilled developer to build an inverse logarithmic function in Python. The function should accurately calculate the inverse of a given logarithmic function. Requirements: - The inverse function should not use a brute force approach to calculate the inverse. - The function should be efficient and able to handle large inputs. Skills and experience needed: - Strong proficiency in Python programming. - Strong mathematics - Experience in working with logarithmic functions and their inverses. - Familiarity with efficient algorithms for calculating inverse functions. Programming language: Python.

    $128 (Avg Bid)
    $128 Avg Bida
    40 bida

    ...configured on the site) - Use secure api connections wherever possible. - Encrypt any sensitive user data at rest using industry standards (like AES-256) - Input Validation and Sanitization: The plugin should validate and sanitize user inputs to prevent SQL injection, cross-site scripting (XSS), and other common web vulnerabilities. - In the future, we'll need to perform regular Security Audits and Updates as needed to address bugs or vulnerabilities. - Error Handling: The system should handle errors without exposing sensitive information, such as system paths, database details, or other exploitable data. - Rate Limiting and Access Control: We may need to implement rate limiting to prevent brute force attacks and abuse, especially on login forms and API end...

    $3000 - $5000
    Ditampilkan Dimeterai
    $3000 - $5000
    28 bida

    1: Familiar with the programming languages used in iOS development, such as Objectiv...basic principles and technologies of network programming, such as HTTP protocol, TCP/IP protocol, etc., in order to communicate with the server and verify user identity. 4: Understand the security requirements and best practices for user authentication, such as password encryption, preventing brute force cracking, preventing session hijacking, etc. 5: Have good user interface design capabilities to provide a friendly login interface and interactive experience in the application. 6: Understand data storage methods and technologies to securely store user login information on the device or server. 7: Have the ability to test and debug applications to ensure the stability and security of th...

    $2175 (Avg Bid)
    $2175 Avg Bida
    69 bida

    I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify an...

    $48 (Avg Bid)
    $48 Avg Bida
    5 bida

    I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify an...

    $15 (Avg Bid)
    $15 Avg Bida
    4 bida

    I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify an...

    $51 (Avg Bid)
    $51 Avg Bida
    4 bida

    check all job Install nexcloud server add domain name or subdomain and ip ///question I would like this system to be hidden (what solution can you suggest) nexcloud installations on dedicated server with configuration, add SMTP messaging server add French language, firewall configuration, Brute force protection, SECURITY, AI (configurations) Machine learning based suspicious login detection testing the sca service works

    $37 (Avg Bid)
    $37 Avg Bida
    9 bida

    I have a crypto wallet with a small amount of coins in it. I have written down the seed phrase on paper and mistakenly omitted one word. Therefore the seed phrase has one word missing. I am sure all of the other words are in the correct order but I don't know the word that is missing. I think it should be possible to do a brute force dictionary restore of the seed phrase. I have seen this the below Reddit as an answer to the same problem I have which makes sense to me. "You need to run an automated application that will insert all possible words into the seed phrase. Worst case even if you don't know which word is forgotten and the rest are in order, that's only 2048x24=49,152 options. Looks like there are about 42k + combinations but really that isn’t a...

    $26 / hr (Avg Bid)
    $26 / hr Avg Bida
    12 bida

    ...expertise in these areas and are passionate about training others, we want to hear from you. Locations: Delhi NCR Duration per batch: 100 hours approximately 15-17 days Commercials per batch: Rs. 30,000 Topics you should be able to teach are: 1. Firewall and its types 2. Inspection Techniques 3. Layers, Protocols and Ports 4. Network Level Attacks and Detection Techniques 5. Brute Force Attack 6. Security Recommendations, Countermeasures and Security Baseline 7. Network Analysis and Monitoring 8. Cryptography and Cryptanalysis 9. Understanding Digital certificates and Signatures 10. Web Server & Application Security 11. Proxy Setup 12. Secure Coding Practices 13. Web Application Vulnerability Scanning Tools 14. Burp Sui...

    $346 (Avg Bid)
    $346 Avg Bida
    6 bida

    I am looking for a skilled penetration tester to assess the security of my web application. System/Network to be tested: - Web application. Areas of concern: - No specific vulnerabilities, just need a general assessment. Deliverables: - Report detailing...application. The attachment of screenshots is mandatory for the reporting. Description: I will provide a document in which we specify all the tests that needs to be performed. Other than the activities specified in the document, i also need to test the "Severity". The task will be only given after the applicant provides us evidences of an already performed penetration test example based on brute force. Indian, Pakistani and Chinese applicants will not be taken in consideration. We expect to receive the result of...

    $519 (Avg Bid)
    $519 Avg Bida
    29 bida

    Project Description: I am looking for a skilled freelancer who can help me disable/hide my competitors' Facebook pages during a 3-week campaign. My goal is to decrease competition and increase my brand visibility. Attention this is unethical work, if you don't feel comfortable please ignore it Requirements: - Hacking - Brute Force/Bypass - Experience in Facebook page management and administration - Knowledge of Facebook policies and guidelines - Ability to identify and disable/hide specific Facebook pages - Understanding of social media marketing and competition analysis Tasks: - Utilize the list of my competitors' Facebook pages that I will provide - Disable/hide their content on Facebook during the campaign - Ensure that their pages remain inaccessible to users ...

    $170 (Avg Bid)
    $170 Avg Bida
    7 bida

    ...am looking for a skilled freelancer to prepare a secure server for my Laravel website. The ideal candidate should have experience with Ubuntu Virtual Private Servers (AWS) , cloudflare, and be proficient in Laravel 8.83. Specific requirements for the project include: - Server Hosting: Virtual Private Server (VPS) - Security Measures: Firewall Setup, protect agains cyber attacks such as DDoS, brute force, no function level control. - mail server setup including DKIM,SPF, DMARC, antiMalware, antispam, antivirus, closing unnecessary ports - efficient control panel such web min - Laravel Version: 8.83 - configuration security apache, PHP, Laravel, DB server - securing from AWS infrastructure side. The freelancer should have expertise in VPS setup and configuration, as well as in ...

    $157 (Avg Bid)
    Perjanjian Kerahsiaan
    $157 Avg Bida
    34 bida

    I have a server bought from Linode. The server has Cent OS 7.0 installed with cpanel. There are multiple websites hosted on this server. Today I have received an email from Linode. We have received a report of Brute Force attempts originating from your Linode. This is most likely the result of a system compromise. If we have not heard from you in 24 hours, we may need to place network restrictions on your Linode to prevent further attacks. We want to fix this issue within 24 hours before they put restriction on my account Report Details from Linode is:

    $93 (Avg Bid)
    $93 Avg Bida
    11 bida

    ...& Samsung A20. The custom ROM should emphasize user privacy, security, and enhanced device controls. Key Features: Encrypted Local Storage: All data stored locally on the device should be encrypted. Lock Bootloader: Ensure the bootloader is locked to prevent unauthorized tampering. Remove Recovery System / Safe Mode: Eliminate options to access recovery mode or safe mode. Lock Firmware with Secure Keys: Ensure firmware can only be updated with secure keys. Isolated App Environment: Applications should run in isolated environments, ensuring inter-app security. Integrated VPN: A built-in VPN feature for secure browsing and data transmission. Brute Force Protection: Protection against password-guessing attacks. Remove all Third Party Apps: All pre-installed third...

    $750 - $1500
    Dimeterai Perjanjian Kerahsiaan
    $750 - $1500
    2 bida

    Cuento con un VPS el cual necesito que se actualice a AlmaLinux 8, asimismo, reforzar el tema de seguridad con la finalidad de minimizar los intentos de fuerza bruta registrados en los últimos días. Cabe destacar que, el complemento: cPHulk Brute Force Protection trabaja bien, sin embargo, a pesar de tener el 99% de los paises en la lista negra, se filtran intentos de fuerza bruta. Entonces, busco una persona con experiencia en Linux que pueda apoyarme con estas dos tareas.

    $28 / hr (Avg Bid)
    $28 / hr Avg Bida
    13 bida

    Project Des...homepage of my website now shows a skull, indicating that it has been compromised. Requirements: - Experience in website restoration and fixing after security attacks - Proficiency in WordPress platform - Knowledge of different types of attacks and their remedies - Ability to assess and identify the type of attack based on the symptoms - Familiarity with malware infections, DDoS attacks, and brute force attacks Deliverables: - Full restoration of the website to its previous state - Removal of any malicious code or malware - Implementation of security measures to prevent future attacks - Create Back-up & documentation of the steps taken to restore the website If you have experience in handling similar situations and can efficiently restore and fix websites, plea...

    $43 (Avg Bid)
    $43 Avg Bida
    41 bida

    I am looking for an experienced coder to help me code a bubble pop puzzle solver. I would prefer the programming language to be golang or javascript and I am open to the freelancer's suggestion on which algorithm or method to use for the solver. The deadline for completing the project is within two weeks. The game starts by filli...they are empty. Empty columns will be filled by the columns on the left shifting to the right. No bubbles are replaced during the levels. I found a script for a program that uses golang to open up the site, start the game, save a screenshot of the board and analyze the grid and turn it into values and find groups. However I don't know how to write a function that will find a random solution by brute force (since A* might get detected), which i...

    $14 (Avg Bid)
    $14 Avg Bida
    15 bida

    I have a text file containing emails sent and received between me and an ex-girlfriend in the mid-1990s. We recently reconnected and want to have a laugh/cry at what we wrote. On my university's Sun Solaris machine I used the "crypt" command to keep the contents from prying eyes.....header format), (2) possible words and names in the encrypted file, and (3) a short list of the likely (alphanumeric) passwords I might have used to encrypt it. (There is software called Crypt Breakers Workbench on Github if you are starting from scratch.) Up for the challenge? You'll see some salty post-breakup exchanges if you can decrypt this historical file! (If you can decrypt this file with "brute-force" and want to prove it with your bid, please provide the first n...

    $106 (Avg Bid)
    $106 Avg Bida
    3 bida
    METALLORRR Tamat left

    ...application to ensure that it is resilient against SQL injection attacks, where malicious SQL statements are inserted into data input fields. 3. Session Hijacking Testing: Assess the application's resistance to session hijacking, where an attacker steals a user's session identifier to impersonate them. 4. Input Validation: Review and enhance input validation mechanisms to ensure that user input is properly validated and sanitized, minimizing the risk of code injection or unexpected behavior. 5. Secure Authentication: Evaluate the authentication process to ensure it follows best practices, including strong password hashing, secure storage of user credentials, and protection against brute force attacks. 6. Cross-Site Request Forgery (CSRF) Protection: Implement...

    $297 (Avg Bid)
    $297 Avg Bida
    12 bida

    I am going to launch a cloud application. So I need a similar service like AWS Elastic Beanstalk in Digital Ocean My requirements are below: Low cost infracture Setup application for storage like s3 ( spaces) Enable WAF to prevent and create a ACL rule to protect against brute force and sql injection Enable port 443 and disable 80 ( domain DNS in Cloudflare ) Sequence backup and auto deletion after 7 days or archive data Digester management for immediate recover. The ideal candidate should have experience in setting up cloud infrastructure on Digital Ocean and deploying Web Applications on it. They should be able to provide detailed project proposals outlining the approach and timeline for the project.

    $31 (Avg Bid)
    $31 Avg Bida
    5 bida

    Hi freelancers, I have a issue with a site. I think it is a 500 error. This happened after what I think was a brute force attack on the server. I would like to talk to the freelancer before starting the job Thanks for all, joseph

    $20 (Avg Bid)
    $20 Avg Bida
    66 bida

    The database would be a simple local You would go to the website where it would ask you to enter a first name, last name and customer number. If what you entered matched exactly what is in the database there would be a green background page with the...last name and customer number. If what you entered matched exactly what is in the database there would be a green background page with the information entered saying it is valid. If it is not a red page with invalid would come up. If you entered information that did not exactly match the information in the database it would bring up a black page saying No information found. To stop people from brute forcing the database, I would like to put a CAPTCHA or a time limited (per ip) lockout after 2 wrong attempts (with the page coming up to ...

    $36 (Avg Bid)
    $36 Avg Bida
    21 bida

    I'm looking to build a Node + react SaaS boilerplate. Required features Subscription Payments a pre-built Stripe billing system. Users & Authentication Secure authentication with brute-force protection, account lockouts, and 2FA (email). Social Logins Social auth google , linkedin REST API Blazing fast REST API with token authentication and API keys. Database Option to easily integrate the framework with- Mongo, Postgres, SQL, etc User Management tab ( FT and BE ) User management dashboard with features to control user access, reset access credentials User Impersonation Option to Log into user accounts from the Roles / Multi-timer plans with user access option to set multi-tier plans and user access based on that Error & Event Logging Log errors and user event...

    $452 (Avg Bid)
    $452 Avg Bida
    46 bida

    ...set up a Ubuntu VPS server and install HomeslabOS. The server will be used for business/production purposes, so it must be secured and all necessary services prepared. The ideal candidate should have experience with VPS setup and security. 1. Secure VPS: - Review and update the VPS's firewall rules to only allow necessary ports and services - Install and configure fail2ban to protect against brute-force attacks - Set up SSH key-based authentication and disable password authentication - Install and configure automatic security updates 2. Set Up Domain Name: - Configure DNS settings to point the domain name to the VPS IP address - Set up an SSL certificate using Let's Encrypt 3. Install HomelabOS and Web Applications: - Install and configure HomelabOS according to the...

    $135 (Avg Bid)
    $135 Avg Bida
    2 bida

    ...a Ubuntu VPS server and install HomeslabOS. The server will be used for business/production purposes, so it must be secured and all necessary services prepared. The ideal candidate should have experience with VPS setup and security. 1. Secure VPS: - Review and update the VPS's firewall rules to only allow necessary ports and services - Install and configure fail2ban to protect against brute-force attacks - Set up SSH key-based authentication and disable password authentication - Install and configure automatic security updates 2. Set Up Domain Name: - Configure DNS settings to point the domain name to the VPS IP address - Set up an SSL certificate using Let's Encrypt 3. Install HomelabOS and Web Applications: - Install and configure HomelabOS a...

    $71 (Avg Bid)
    $71 Avg Bida
    5 bida

    Hello, kindly checking if there is any news about the result of the assignment.

    $10 (Avg Bid)
    $10 Avg Bida
    1 bida

    I am looking for a skilled Java programmer to write a program to solve the Pentomino puzzle. The ideal candidate should have experience in Java programming. Skills and Experience: - Strong proficiency in Java programming - Experience in solving the Pentomino puzzle - Familiarity with Backtracking and Brute Force algorithms - Ability to work within a tight deadline Project Timeline: - The project needs to be completed ASAP If you have the necessary skills and experience, please apply for this project.

    $28 (Avg Bid)
    $28 Avg Bida
    9 bida