There is some issue with apache in centos. Its a very small issue though. I am expecting somebody to fix it and provide me a couple of hours troubleshooting of Apache. The budget is $10. So, its basically targeted to the freelancers who are new to this platform. Many more projects on pipe line & we can go a long mile together. So, please feel free to
There is requirement of finding all possible footprints/keywords/features of attacks performed on web application and get stored in access log file. The attacks are - SQL injection, XSS, CSRF, Brute Force, RFI, LFI After this there is need to write an algorithm which will analyse this log file based on these features to find the attack entries and
Hello, I need someone who knows how to DDOS. I would like to turn off a router for a certain period of time. I have the address. No IP. I need someone who knows how to DDOS or turn off a router without and IP adress, just a house address. THIS IS FOR PENETRATION TEST PURPOSES ONLY
Hello my website is down wordpress nginx plesk Might be plug in issue, impacting business need this fixed within the next hour
...global payment method adding wallet 3- Merchant, customer and reseller dashboard and customer area 4- our E-Wallet api integration file we need be have 5- Securety Firewall for ddos and hacking tools 6- Crypto exchange sell and buy or convert to real exchange 7- mobile version and mobile app include This project we need 1 MONTH who can do with high
I have a small project, I have both apache docker image on centos7 as base and tomcat image on alpine as base.. the task is to Combine httpd and tomcat to one image on centos 7. As I already have 2 running but separate images, we can use my existing apache as base image configure tomcat on top of it using supervisord (whatever you suggest) to club
We are currently being bombarded by bots creating fake accounts for fishing schemes. We currently have the magento captcha but it is not stoppin...magento captcha but it is not stopping the bots. We also have google captcha on our contact form but it is also not stopping the bots. We need someone that is able to stop these attacks on our magento site.
I am looking for someone to do the following: 1) provide ways and strategies in which my idea can be patented in a utility patent. I already have a few specific ways that it may be patented. 2) search for current patents in the United States. The project involves getting someone to use a QR code, be scheduled in a calendar according to a straight forward and simple algorithm, criteria to decide ...
I have an excel file, which I want to share for a limited time (like a trial period of "x" days). Users should be able to use the excel file until the time is over. When time is over it should say that trial period is over and make the excel file useless. During the period the file is usable, users cannot edit or go into the cells or modify/copy, etc. This has to work even if the users s...
I need to create a unique encrypted usb key (Dongle) to run an application on Centos. You can visit this Link, to have an idea of the product: [log masuk untuk melihat URL] If you speak Spanish, it would be good to treat us, but it is not mandatory.
I need a eth Hacker who is able to give me a solution i can use it to attack some spamers vps who attacks my system Thanks
...takes data from a typical site [log masuk untuk melihat URL] send me a notification on telegram according to football matches in the world, if they occur: shots corner kiks attacks possession of the ball etc and PRE MATCH data for ex: goal facts goals conceded Ranking etc send me a message of the match on telegram data must be taken from sites
I am getting following since last few days - Using username "centos". Server refused our key centos@[log masuk untuk melihat URL]'s password: It appeared after I changed permission of /home/centos. Anyone who is really expert in this and have fixed it multiple times can apply for this job.
...Target Defense (MTD) solution approaches for cellular devices and predict the possible outcomes that could occur for a number of possible scenarios of security and privacy attacks against cellular networks. This research will develop the science of MTD effect analysis for the optimal deployment of MTDs in relation to the resource and security requirements
I am looking for a freelancer who are expert in system administrator in linux system. I have got a problem with install the certificate on my server, because I am getting "Unable to find a virtual host listening on port 80 which is currently needed for Certbot to prove to the CA that you control your domain. Please add a virtual host for port 80.". If you can be able to help to have a lo...
...down attack, forward attack, neutral attack, up aerial attack, down aerial attack, forward aerial attack, back aerial attack, neutral aerial attack. All the attacks are grounded and aerial attacks are when the character is airborne. - The drawing should be made in pixel art. - Animations should be sliced frame by frame, not in one sprite sheet. - All
...download all of my past history (4,081 pages). I need someone that can write a simple script to go through all pages and download them but set a slow pace so they don't trigger a DDoS attack response from the server. I made a screencast video showing the site and what needs to be done: [log masuk untuk melihat URL]
Intrusion Detection Using Machine Learning Classification to Detect DDoS Attacks Steps • Use Wireshark data (.Pcap) with machine learning tool WEKA to classify. • Need to convert to .arff file or .csv file in readable format for WEKA tool • Identify relevant (most shootable) machine learning algorithm. • Use machine learning algorithm to Classify
Intrusion Detection Using Machine Learning Classification to Detect DDoS Attacks Steps • Design a Network using GNS3 network simulator • Generate traffic for DDoS attacks and use Ostinato traffic generator several times • Measure distance (eg. A to B) source and destination points • Use Wireshark and save .Pcap file • Analyze with Wireshark (...
I already install docker xibo its work but only on my public ip i want to see it on my domain name like [log masuk untuk melihat URL] not on 0.0.0.0:81 for more information contact me
wordpress job: 2019 invoices start with n * 1, and that they are sent automatically when the order is completed. automate the status of orders, once payment is receiv...order must pass completed after a couple of hours. in general optimization of the system and make the site compliant with the gdpr, and some basic security against viruses and attacks
!! READ the REQUIREMENTS before you knock !! 1. You are expected to have good knowledge on areas such as; blockchain attacks/crypto-threats/solidity/Smart-contract/Hash-Algorithms/51% attacks/Sybil attack/. 2. You will need to figure out a security issue in the blockchain network. We can help you with that. Some issues can be 51% attack, Sybil attack
!! READ the REQUIREMENTS before you knock !! You are expected to have good knowledge on areas such as; blockchain attacks/crypto-threats/solidity/Hyperledger/Smart-contract/Hash-Algorithms/51% attacks/Sybil attack/. You will be provided with any online books/Journals/articles that you will ask for regardless of how expensive they are. Programming
Centos Webpanel on a server Issues. I have a CWP on a web panel. There some websites on these server. Issues: Emails from this server are going to spam and. We use cloudflare for ssl but in websites we don't see https . Security setup is not set. Jobs: 1. DKIM and SPF must be setup or checked to pass spam filter. [log masuk untuk melihat URL] why https has Issue and resolve
I want the code in c++ with detect process running packed by vmprotect software it can detect all version of vmprotect. thank you and regard.
Project description: Migration of 200 web sites from sixteen Redhat 3.0 to four CentOS 7 servers. After migration you must insure all services are fully operational and repair what is needed. Scope: - 200 websites running on: o apache o html (http/https) o php o perl o tomcat o mysql o vsftp - create ftp user accounts - create and configure sites
WE HAVE CENTOS 6.2 AND WE GET KERNELL PANIC ON BOOT: mount: wrong fs type , bad option. bad superblock on /dev/mapper/VolGroup-lv_root missing codepage or helper program ,mor other error. Kernel panic - not syncing: Attempted to kill innit! Pid: 1, comm: init Tainted: G. W ----------- 2.6.32-504.8.1.el6.x86_64 Call trace: ? panic+0xa7/0x16f
...before you knock !! Key Factors: - You are expected to have good knowledge on areas such as; blockchain/crypto-threats/solidity/Hyperledger/Smart-contract/Hash-Algorithms/51% attacks. - You will probably need to spend 90-130 hours per month to do the required tasks. ( For instance; an experienced person, in the related area, may do the required job
I am hosting 5 domains on a hosting service and I have been affected by some sort of malware. 4 out of 5 domains now redirect...now redirect to some other website. I would like help in - removal of any malware or any other traces of attack - updates and installation of any patches to prevent future attacks Any other suggestions are welcome. Thanks!
...structure and wholly anonymous transactions. The fully distributed ledger processes transactions with a twelve-second average block time and is secure against majority hashrate attacks. Dero will be the first CryptoNote blockchain to have smart contracts on its native chain without any extra layers or secondary blockchains. DERO hass now launched Smart Contracts
Salutare , caut un scripter de FiveM care sa scriptere serverul meu de FiveM , primeste Rank Administrator, 50% din donatii ! Promovari la...FiveM care sa scriptere serverul meu de FiveM , primeste Rank Administrator, 50% din donatii ! Promovari la youtuberi cunoscuti cumparate , host 32slots / 10GB Ram , protectii DDOs cumparate ipfw , ipf si layer 7
For Australian writers: What are the innovations required to better protect global home loan borrowers from negative equity and assist with their recovery? Length: 2000 words. I require you to include issues covered in the content of this Amazon eBook Negative Equity - What the Banks Don't Tell You: How to Take Control of Your Home Loan Repayments
Tengo un VPS con Centos 6. Necesito actualizar la version de mysql actual de 5.5 a la 5.6, para instalar una moodle 3.6 y me pide como requisito esa version de mysql. Actualmente tengo una moodle 3.2, pero necesito actualizar la version de mysql.
Have...someone to do this for me so I get it done right. Also I tried using one of those free submission services and it has some populated yet and all I got was a media malware attacks. I need this done right away I also could use some follow-up work and improving my text, making my site mobile friendly, adding a comment section and polling section.
I have a HID based USB caller id device which i want to use to get caller id on my pstn and inject the callers number and date and time in mysql database . If you can do that please bid this will be only on centos7 linux environment and it needs to run 24/7 on the server if it fails anytime it needs to try and reconnect or send failur email to admin/root
I need a script on my page so that in the event someone steals my landing page it redirects their swapped out links to my own links 10% of the time. Pretty straight forward but obviously i want it as undetectable as possible.
Have a web s...(portal site) and our web site added in this portal site. Need up vote to OUR site + add 5 stars comment, down vote to opponent and add 1 stars bad to our opponent This all protect make with gmail account or facebook account. I work always same project first start for 1.000 up vote and and 5 stars good comment us Budget is not so much
Move Magento 2 website from cpanel server to centos 7 server and make sure magento is working and set up magento crons on new server.
If you want to send a proposal, Please include "JOB345" so I know you have read the description. Our website has been hacked, the hacker has added images ...for someone to: - clean up the website, deleting all the new information added - ensure the site is loading quickly again - take measures to secure the website from further attacks. Thank you.
We need immediately someone to install JIRA CORE + JIRA SOFTWARE on our subdomain Server Config Centos + WHM Cpanel + Nginx + Mysql Root access to server wont be granted, instead will be done on screen sharing if needed. Take Project only if u have done this earlier and not waste time in troubleshooting