Tapis

Carian terbaru saya
Tapis melalui:
Bajet
hingga
hingga
hingga
Jenis
Kemahiran
Bahasa
    Status Pekerjaan
    5,094 compromised tugasan ditemui, harga dalam USD

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    Hi There We are looking for someone who has good experience in editing and writing fresh content for a Behavioural Train...Brochure content that we have built. B. Editing our Corporate Profile Content that we have built. C. Editing & Adding relevant content for our website. Quality shall not be compromised. Only people with good experience apply.

    $84 (Avg Bid)
    $84 Avg Bida
    21 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $251 (Avg Bid)
    $251 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $568 (Avg Bid)
    $568 Avg Bida
    1 bida

    ...Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack

    $555 (Avg Bid)
    $555 Avg Bida
    1 bida

    Client website was compromised by hackers and needs to be restored. They have disabled access to the wp-admin & wp-login pages. I tried to put up a backup but made things worse. [log masuk untuk melihat URL]://[log masuk untuk melihat URL]

    $170 (Avg Bid)
    $170 Avg Bida
    61 bida

    Hi All, We're are looking for professional subtitling/close ...conversation (less than even 50%) because of the nature of the videos and they're HD digital quality videos. Turnaround time for each assignment will be 24 hours. Quality won't be compromised and we're looking only for experienced people who are comfortable working on adult video content.

    $309 (Avg Bid)
    $309 Avg Bida
    39 bida

    Michael, It appears that your server has been compromised and is attacking other servers on the Internet; this degrades your service, as well as others, and is a large consumer of resources overall. The following files were found to be suspected of malware, which should be reviewed and removed:

    $57 / hr (Avg Bid)
    $57 / hr Avg Bida
    50 bida

    Our business is called New Leaf. It is a non-profit organisation compromised of volunteers who are working towards aiding in the rehabilitation of those who have committed criminal offences. Our aim is to ensure that those who have offended are given a chance to move forward with their lives so that they can re-integrate and become contributing members

    $105 (Avg Bid)
    $105 Avg Bida
    94 bida
    $5 / hr Avg Bida
    1 bida

    We have a Google Sheet that we use for customer management and shipping. We have a SQL Server product database. We want to query the database...important, so we want to make sure the connection is secure and that the product data is only accessible by Google Sheets and that data, including SQL connection details, is not compromised during transmission

    $150 (Avg Bid)
    $150 Avg Bida
    21 bida

    a new photo gallery for my WEEBLY SITE- I LIKE something like this,, https://www...2. when you click on a specific image they are all the same size 3. all the images in the gallery , the thumbnails are all uniform and same size 4. the pictures are not compromised or cropped this is my current website . [log masuk untuk melihat URL]

    $428 (Avg Bid)
    $428 Avg Bida
    9 bida

    ...a website is compromised in this way, additional 'backdoors' could be injected and hidden amongst the site's normal code to allow an attacker to compromise it again in the future. It is therefore important that every trace of malicious code is identified and removed before the site can be brought back online. Cleaning up compromised websites is unfortunately

    $158 (Avg Bid)
    $158 Avg Bida
    26 bida

    Hello, I have a Wordpress website which has been quarantined because its was compromised and 'hacks' due to vulnerability in the website software hosted on the account or a weak CMS password. Simply, I want to clean and secure it and back to live again and make sure that issue doesn't happen again in the future You'll work directly on the website

    $36 (Avg Bid)
    $36 Avg Bida
    27 bida

    ...cleaned is: Code: [HEX]obfuscated_php_414 [12/05/18] /home/gpstrbde12m/public_html/wp-admin/images/[log masuk untuk melihat URL] The js files listed in the previous reply also appear to be compromised or modified. There are several ways to clean the website's files. 1. You can do it manually be removing the malicious code from the infected files. Their source code can

    $11 (Avg Bid)
    $11 Avg Bida
    2 bida

    ...said there might be infected files on my website. They sent this: "During a routine scan, we detected suspicious contents that suggest your 'erandall38' account has been compromised. We have temporarily suspended your website to protect your website visitors from getting impacted and also preventing the impact on your website reputation as well as our

    $33 (Avg Bid)
    $33 Avg Bida
    10 bida

    ...cleaned is: Code: [HEX]obfuscated_php_414 [12/05/18] /home/gpstrbde12m/public_html/wp-admin/images/[log masuk untuk melihat URL] The js files listed in the previous reply also appear to be compromised or modified. There are several ways to clean the website's files. 1. You can do it manually be removing the malicious code from the infected files. Their source code can

    $9 (Avg Bid)
    $9 Avg Bida
    4 bida

    ...cleaned is: Code: [HEX]obfuscated_php_414 [12/05/18] /home/gpstrbde12m/public_html/wp-admin/images/[log masuk untuk melihat URL] The js files listed in the previous reply also appear to be compromised or modified. There are several ways to clean the website's files. 1. You can do it manually be removing the malicious code from the infected files. Their source code can

    $26 (Avg Bid)
    $26 Avg Bida
    8 bida
    Fix a website Tamat left

    We have a current website that got compromised via the contact form that was done improperly. Need corrective action to eliminate the issue.

    $24 (Avg Bid)
    $24 Avg Bida
    26 bida

    ...was impacted involved “potential data” used for sales analysis. Data from the ABC Company had been placed on laptops while some diagnostics were being carried out. • Compromised data could have included customer or retailer information from 2002-2014 consisting of names, address, bank account data or credit card numbers, SKU product numbers, descriptions

    $124 (Avg Bid)
    $124 Avg Bida
    28 bida

    HI I am looking for a content writer who is good in English can help create content do forma...Ability to help format content in headings, introduction - Adds basic images as in the sample content - Formatting of the content font size, details quality etc should not be compromised Pl share your best bid and if you are looking for ongoing content work

    $114 (Avg Bid)
    $114 Avg Bida
    26 bida

    ...* I do not make payments in advance * Must be a totally serious person and be committed to the project * I NEED 100% MODERN AND VISIBLE DESIGNS * I NEED TO BE A TOTALLY COMPROMISED AND CAPABLE DESIGNER If you are able to do this project and you meet the requirements, write me and answer the following: 1) Final price 2) development time 3) milestone

    $75 (Avg Bid)
    $75 Avg Bida
    19 bida

    BUDGET IS $50!!! Please don't bid if you want more than $50. There is NO BACKUP. The data looks like it's still in the database but the site is highly compromised. Can you restore the site?? wp_config has been hacked and the only thing displayed is "Error establishing a database connection"

    $61 (Avg Bid)
    $61 Avg Bida
    28 bida

    I got a notification that one of my sites has been "compromised. It appears to host or distribute malicious software". WordFence is reporting some files that need to be repaired. Need a wordpress security expert that can repair, remove, clean and fix everything. Please bid only if you have experience in this and can start the work right away. Thanks

    $150 (Avg Bid)
    $150 Avg Bida
    36 bida

    ...[log masuk untuk melihat URL] and do everything that insures the SEO of the current Google ranking of all my webpages and images is not compromised. The developer is responsible to include the Google search function presently in 4 of my [log masuk untuk melihat URL] web pages and in each of my 3 [log masuk untuk melihat URL] subdomains

    $2220 (Avg Bid)
    $2220 Avg Bida
    59 bida

    ...Ability to help format content in headings, introduction - Adds basic images as in the sample content - Formatting of the content font size, details quality etc should not be compromised Should not be: - Part of any agency / Company Suited for those looking for - Flexible with the rates looking for the best price Sample Article here . New article would

    $19 (Avg Bid)
    $19 Avg Bida
    30 bida

    Artikel Komuniti compromised Teratas