Checking compromised linux serverpekerjaan

Tapis

Carian terbaru saya
Tapis melalui:
Bajet
hingga
hingga
hingga
Jenis
Kemahiran
Bahasa
    Status Pekerjaan
    6,880 checking compromised linux server tugasan ditemui, harga dalam USD

    My website was created in with Laravel framework. It has a logic for sending an email automatically if someone doesn't respond. I need to make sure the logic works. Also, I need someone to run me through how to change the code in Laravel on pages where there is some text. Lastly, I need someone to help me change the description in Google when we search for the website. Additional advice inclu...

    $15 / hr (Avg Bid)
    $15 / hr Avg Bida
    43 bida

    work will be given via sheet..you need to compare original file and edited file and need to do corrections

    $89 (Avg Bid)
    $89 Avg Bida
    29 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    Hi There We are looking for someone who has good experience in editing and writing fresh content for a Behavioural Train...Brochure content that we have built. B. Editing our Corporate Profile Content that we have built. C. Editing & Adding relevant content for our website. Quality shall not be compromised. Only people with good experience apply.

    $84 (Avg Bid)
    $84 Avg Bida
    21 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $251 (Avg Bid)
    $251 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $568 (Avg Bid)
    $568 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $555 (Avg Bid)
    $555 Avg Bida
    1 bida

    Client website was compromised by hackers and needs to be restored. They have disabled access to the wp-admin & wp-login pages. I tried to put up a backup but made things worse. [log masuk untuk melihat URL]://[log masuk untuk melihat URL]

    $170 (Avg Bid)
    $170 Avg Bida
    61 bida

    I have an anroid app which requires to login via username and pincode of 4 chars. I have the apk, more info via chat!

    $532 (Avg Bid)
    Ditampilkan Segera
    $532 Avg Bida
    36 bida

    Hi All, We're are looking for professional subtitling/close ...conversation (less than even 50%) because of the nature of the videos and they're HD digital quality videos. Turnaround time for each assignment will be 24 hours. Quality won't be compromised and we're looking only for experienced people who are comfortable working on adult video content.

    $309 (Avg Bid)
    $309 Avg Bida
    39 bida

    I have an approximately 40,000 word document with 437 in-text references that need to be checked one by one against the Australian Guide to Legal Citation Third Edition (AGLC). It’s imperative that this style is used and NOT another style (Harvard or APA or whatever). I have the endnote file with all the required details and the word document is linked to the endnote file. Theoretically my...

    $328 (Avg Bid)
    $328 Avg Bida
    22 bida

    d...blanks or duplicates 3/. check for missing dates and missing data 4/. check for out of sequence, for example the dates rows that are not in order also, ideally instead of checking each one individually, all the files in the folder can be checked and results produced into one report. i have 50+ files to check each with about 300 rows thanks Excel

    $32 (Avg Bid)
    $32 Avg Bida
    19 bida

    d...blanks or duplicates 3/. check for missing dates and missing data 4/. check for out of sequence, for example the dates rows that are not in order also, ideally instead of checking each one individually, all the files in the folder can be checked and results produced into one report. i have 50+ files to check each with about 300 rows thanks Excel

    $32 (Avg Bid)
    $32 Avg Bida
    29 bida

    I have a data analysis task. Quality analysis for American mortgage loan forms, conventional, condominium, multifamily etc

    $21 (Avg Bid)
    $21 Avg Bida
    2 bida

    Michael, It appears that your server has been compromised and is attacking other servers on the Internet; this degrades your service, as well as others, and is a large consumer of resources overall. The following files were found to be suspected of malware, which should be reviewed and removed:

    $57 / hr (Avg Bid)
    $57 / hr Avg Bida
    50 bida

    hi, plz check the app quality of our current app...ios and android in native language, swift in ios. quality check coding standard unneccary code [log masuk untuk melihat URL]

    $17 / hr (Avg Bid)
    $17 / hr Avg Bida
    40 bida

    Our business is called New Leaf. It is a non-profit organisation compromised of volunteers who are working towards aiding in the rehabilitation of those who have committed criminal offences. Our aim is to ensure that those who have offended are given a chance to move forward with their lives so that they can re-integrate and become contributing members

    $105 (Avg Bid)
    $105 Avg Bida
    94 bida
    $5 / hr Avg Bida
    1 bida

    has an existing wordpress website using Sahifa , need wordpress programmer for security checking & clean Malware

    $122 (Avg Bid)
    $122 Avg Bida
    24 bida

    We have developed an ios application and we wish to test it in iP...other iphone models but fails in Client's iPhone6+. So we are looking for one or two people who could install the app in his iPhone, test it as per our instructions (simple checking, not full-fledged test), and share the videos grab. Those who are willing and can do it now, please bid

    $16 (Avg Bid)
    $16 Avg Bida
    5 bida

    i have shop in market placed, if my shop banned by the market, my shop will be never show the product, if my shop not banned, my product will be show all. i need script for check product in the market (he banned or no) better its will be run on php thank

    $26 (Avg Bid)
    $26 Avg Bida
    2 bida

    We have a Google Sheet that we use for customer management and shipping. We have a SQL Server product database. We want to query the database and retrieve product data based on the item number input by the Google Sheet user and put product data into certain columns. We have the SQL query written that retrieves the proper details, but we need to code

    $150 (Avg Bid)
    $150 Avg Bida
    21 bida

    a new photo gallery for my WEEBLY SITE- I LIKE something like this,, https://www...2. when you click on a specific image they are all the same size 3. all the images in the gallery , the thumbnails are all uniform and same size 4. the pictures are not compromised or cropped this is my current website . [log masuk untuk melihat URL]

    $428 (Avg Bid)
    $428 Avg Bida
    9 bida

    Connecting to IDEX exchange with api keys, checking highest bid and highest ask for specific coin(should scan each few seconds), checking my order sell and buy rate(should scan each few seconds), placing and canceling order for specific coin all must be written in python , only through freelancer

    $66 (Avg Bid)
    $66 Avg Bida
    6 bida

    I have an open-source MATLAB code that computes a metric for checking if a given image is in focus and I would like the same code implemented in C++ so that it can be deployed on Android smartphones. Key requirements are as follows: 1. Use open-source libraries only. 2. The MATLAB code is not efficient, so we are looking for someone to not just port

    $101 (Avg Bid)
    $101 Avg Bida
    7 bida

    A software that detects if port 9339 is open on the machine on local ip and if not then check if the server application is running or not then kills it and restarts the application. Application are multiple dotnet .dlls projects

    $32 (Avg Bid)
    $32 Avg Bida
    11 bida