Wordpress slug hackpekerjaan

Tapis

Carian terbaru saya
Tapis mengikut:
Bajet
hingga
hingga
hingga
Jenis
Kemahiran
Bahasa
    Status Pekerjaan
    2,000 wordpress slug hack tugasan ditemui, harga dalam USD
    Mind Hacker Tamat left

    ki tuhanu pta hai k mind v hack ho..janda hai... Mind os tra hack ni hunda jiwe facebook account and etc. eh tan jdo appa relax ho k koi chez read krni...ya kise kam nu mann lga k read

    $30 - $250
    $30 - $250
    0 bida
    web security Tamat left

    hai, laman web saya pernah di hack. boleh tak buatkan security untuk saya?

    $14 (Avg Bid)
    $14 Avg Bida
    1 bida

    ...stream me and my family to the internet, and stealing information. As a result, I have no control over my devices at this point. I am seeking an experienced professional who can assist me in removing the hackers from my systems and ensuring that my personal data is secured. Your primary focus must be on removing these hackers from the system. Key tasks include: - Investigating the extent of the hack and identifying vulnerabilities - Removing the hackers from the system entirely - Securing my personal data - Ensuring control over cameras and microphones is restored Ideal Skills and Experience: - Proven experience in cybersecurity and network security, particularly with Azure - Expertise in identifying and removing hackers from systems - Ability to secure personal data effecti...

    $45 / hr (Avg Bid)
    $45 / hr Avg Bida
    4 bida

    I need an apk security expert I hope there are no vulnerabilities in the database in my apk. Other people keep trying to hack my database

    $1051 (Avg Bid)
    $1051 Avg Bida
    25 bida

    I'm in need of an expert who can carry out a task that involves eavesdropping on Thuraya satellite communications using a Hack RF receiver. This task is for research and analysis purposes. Your main responsibilities will include: - Real-time eavesdropping on Thuraya satellite communications. - Extracting specific information including location data, voice communication, and details of data transfers. The ideal freelancer for this project should have: - Proficiency in working with satellite communication systems. - A strong understanding of Hack RF receivers. - Experience in data extraction and analysis. Please be sure to include any relevant experience in your proposal. This is a complex task that requires specialized skills, so relevant experience will be highly va...

    $539 (Avg Bid)
    $539 Avg Bida
    8 bida

    The below tag page is giving missing link error for en and x-default <link rel="alternate" hrefLang="ar" href={`${location?.pathname}`} /> the location?.pathname is adding ar/tag to slug which is fine for ar, but for en and x-default it should only have /tag with no ar import React from "react"; import { graphql } from "gatsby"; import Layout from "../components/Layout"; import { Helmet } from "react-helmet"; import PostLoop from "../components/PostLoop"; import Seo from "../components/Seo"; import { GatsbyImage, getImage } from "gatsby-plugin-image"; import { useTranslation } from "gatsby-plugin-react-i18next"; const Tag = ({ data, location }) => { const tag = ; co...

    $21 (Avg Bid)
    $21 Avg Bida
    14 bida
    Hreflang Missing Link Fix 3 hari left
    DISAHKAN

    The below tag page is giving missing link error for en and x-default <link rel="alternate" hrefLang="ar" href={`${location?.pathname}`} /> the location?.pathname is adding ar/tag to slug which is fine for ar, but for en and x-default it should only have /tag with no ar import React from "react"; import { graphql } from "gatsby"; import Layout from "../components/Layout"; import { Helmet } from "react-helmet"; import PostLoop from "../components/PostLoop"; import Seo from "../components/Seo"; import { GatsbyImage, getImage } from "gatsby-plugin-image"; import { useTranslation } from "gatsby-plugin-react-i18next"; const Tag = ({ data, location }) => { const tag = ; co...

    $16 (Avg Bid)
    $16 Avg Bida
    20 bida

    ...This task requires robust technical expertise, problem-solving abilities, and an innovative mindset to explore these systems. Key Requirements: - Profound understanding and experience in systems infrastructure - Solid experience manipulating operating systems, databases, and networks - Ability to penetrate systems with user-level access authentically and legally - Goals and Objectives: - The hack is for educational purposes only. Thus, the acquired knowledge will be used to further my understanding of the systems and will not be utilized for any unauthorized means. To the potential freelancer, your formal education or certifications in ethical hacking or a related field will be a significant advantage. However, if you're self-taught but can demonstrate your proficien...

    $27 / hr (Avg Bid)
    $27 / hr Avg Bida
    17 bida

    ...about what is needed: 1. Admin dashboard: I absolutely need an admin dashboard from where I’ll be able to edit the site (post new pages, add / remove ads, add / remove users, do SEO…). 2. Payment method: We need to implement a payment method, I will share the details later about which processor to integrate. 3. SEO: I need SEO on all pages, like there is on WordPress with the Yoast plugin (focus keyphrase, Google Preview, SEO title, slug…). 4. Multiple languages: We should have a plugin that will auto convert in multiple languages. Default language is French. Other languages to have: English, German, Italian, Spanish, Portuguese, Arabic, Russian, Chinese 5. Classified ad categories: We must have different ad features, depending on the ads category,...

    $2331 (Avg Bid)
    $2331 Avg Bida
    65 bida

    ...looking for a diligent and creative social media manager to regularly post dynamic content on Facebook, Instagram, and TikTok. This content will revolve around the theme of promoting a campaign for a hair education beauty summit. Key tasks will include: - Generating and posting engaging content randomly throughout the day. we want to post 2 to 3 times daily. - reels and just educational hack videos that shows what's to come; I have some script, but they would need to provide some script for us - Applying consistent branding and messaging across all platforms. Ideal candidates will have: we are promoting our @haireducationbeautysummit - Proven experience managing social media accounts for businesses, especially in the beauty and/or education sectors. ...

    $443 (Avg Bid)
    Segera
    $443 Avg Bida
    62 bida

    Hi Tanmay, could you please investigate this site for malware. I will supply login credentials in chat.

    $16 / hr (Avg Bid)
    $16 / hr Avg Bida
    1 bida

    I'm in need of an hacker to perform a thorough black-box penetration testing on a WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech...

    $93 (Avg Bid)
    $93 Avg Bida
    29 bida

    I'm in need of an hacker to perform a thorough black-box penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tec...

    $324 (Avg Bid)
    $324 Avg Bida
    23 bida

    ...vulnerabilities inherent in a WordPress site for both illustrative purposes and to help formulate a proof of concept for a security system. The features I require are: - A custom login page - The ability to track user activity - Integration with other platforms The project will also involve demonstrating a successful XSS hacking. To accompany this, I'll need detailed documentation created to outline the steps taken and the vulnerabilities exploited. Following the hack, I expect to have full administrative access to the WordPress site. Ideal candidates for this project have a deep understanding of WordPress, its vulnerabilities, and security concepts in general, coupled with experience in XSS hacking and documentation writing. Advanced technical ...

    $40 (Avg Bid)
    $40 Avg Bida
    28 bida

    Hi, we had an Mp3 Quran WordPress plugin which was removed from the WordPress team, on request to re-activate again plugin they sent me the below issues that need to be fixed. 4 issues mentioned below. please read the details. issues need to fix on anydesk only. 1- ## Undocumented use of a 3rd Party or external service We permit plugins to require the use of 3rd party (i.e. external) services, provided they are properly documented in a clear manner. We require plugins that reach out to other services to disclose this, in clear and plain language, so users are aware of where data is being sent. This allows them to ensure that any legal issues with data transmissions are covered. This is true even if you are the 3rd party service. In order to do so, you must update your re...

    $38 (Avg Bid)
    $38 Avg Bida
    25 bida

    As the owner and administrator of a Facebook page and multiple profiles, I am seeking an expert in Facebook's security protocol who can successfully and securely delete these accounts. This task is of utmost importance due to severe security concerns. There are no other platforms in need of attention; this job focuses solely on Facebook. Key requirements for this project are: -Legitimate knowledge of Facebook's security and deletion procedures - Experience in maintaining client privacy and confidentiality - Assurance that deleted data will not be recoverable - Proof of successful past experiences in similar tasks

    $39 (Avg Bid)
    $39 Avg Bida
    14 bida

    I urgently require help to predict a cryptographic-based random number generator, or RNG, which is used in a casino setting. I have output sequences of the RNG that can be utilized f...hopeful you can create an algorithm or a model to predict the next sequences. ## What You Should Have: - Extensive experience with RNGs, especially those that are based in cryptography, is absolutely crucial for this project. - Experience in creating predictive algorithms or models. - Good understanding of gambling methodologies would be a plus. - Understand that the goal is not to exploit or hack, but to generate effective gambling strategies. Persons with matched skills and experience, I look forward to your proposals. and also if you have some insights ....... it from "' �...

    $70 / hr (Avg Bid)
    $70 / hr Avg Bida
    5 bida

    ...Modeling Requirements: MSGARCH Model Configuration: The analysis requires the implementation of a MSGARCH model to capture the dynamic volatility of each cryptocurrency. The model must accommodate two distinct regimes: High-Volatility Regime (Regime 1): Characterized by periods surrounding significant market events expected to induce heightened market volatility. Examples include the Coincheck Hack (January 2018), the 2018 Cryptocurrency Market Crash, Black Thursday (March 2020), the 2021 Chinese Cryptocurrency Mining Ban, the Collapse of TerraUSD and LUNA (May 2022), and the FTX Bankruptcy (November 2022). Low-Volatility Regime (Regime 2): Represents periods of relative market stability, with lower volatility not significantly influenced by immediate external shocks. The model...

    $138 (Avg Bid)
    $138 Avg Bida
    18 bida

    ...Modeling Requirements: MSGARCH Model Configuration: The analysis requires the implementation of a MSGARCH model to capture the dynamic volatility of each cryptocurrency. The model must accommodate two distinct regimes: High-Volatility Regime (Regime 1): Characterized by periods surrounding significant market events expected to induce heightened market volatility. Examples include the Coincheck Hack (January 2018), the 2018 Cryptocurrency Market Crash, Black Thursday (March 2020), the 2021 Chinese Cryptocurrency Mining Ban, the Collapse of TerraUSD and LUNA (May 2022), and the FTX Bankruptcy (November 2022). Low-Volatility Regime (Regime 2): Represents periods of relative market stability, with lower volatility not significantly influenced by immediate external shocks. The model...

    $594 (Avg Bid)
    $594 Avg Bida
    33 bida

    Looking for a Skilled Web Developer with knowledge of API and web hack stuff which can get done the task easily , its not a simple job for a fresher we need someone who can get gone the task in any way

    $96 (Avg Bid)
    $96 Avg Bida
    64 bida

    I'm in need of a specialist who can design an anti-hack solution integrated with Unity for Android and iOS platforms. The solution must: - Identify all applications running in the background. Essential skills: knowledge of Android and iOS system processes, experience with app behavior and detection. - Capture a complete screenshot of the cellphone and not only the game. - Collect data and generate a report upon detection of suspicious applications running in the background. This requires data collection, analysis, and reporting skills. Ideal candidates should have previous experience with similar projects, exclusively handling anti-hack measures, specifically on Unity. Strong understanding of both Android and iOS platforms is a must.

    $366 (Avg Bid)
    $366 Avg Bida
    56 bida

    We have several hightail charts that we need to convert to responsive for modern websites. These are from a 3rd party so we can't create the chart differently. My hope is that an expert developer can look at our code and understand how to create a solution / hack. The charts update automatically. Example sizes of the same chart attached. It will not allow me to paste Also, image versions of the chart could work too.

    $12 / hr (Avg Bid)
    $12 / hr Avg Bida
    23 bida

    Buscamos persona especialista en SEO para apoyo directo en: - Análisis y mejora de estructura de cada producto. - Revisión y optimización de imágenes individualmente - Estudio de palabras claves para cada producto - Frase clave objetivo y Legibilidad - Mejora de Slug de cada producto - Meta descripción de cada producto Objetivos a trabajar, primeramente: Revisión de SEO página principal Mejora en palabras claves Mejora descripción corta del sitio Recomendaciones de puntos visuales para mejorar experiencia de usuario Configuración del Site Kit de Google Configuración de los siguientes recursos Search Console Analytics PageSpeed Insights Optimize Análisis y corrección de mejoras para a Jetpack SEO ...

    $66 (Avg Bid)
    $66 Avg Bida
    61 bida

    ...job: - Strong experience in IT support - Knowledge of network setup and configuration - Proficiency in software and hardware installation - Solid background in ethical hacking and internet security. Let's ensure the security of my home network! I have a small home business where I work with sensitive client information. My internet provider is Google Fiber. I’m looking for someone to ethically hack my home internet to view all incoming/outgoing data & provide me with a detailed list of 4-5 days of information. This will help me to understand what kind of information others would be able to see on my home internet if they had intermediate/advanced hacking knowledge. Then I’ll be able to fix that & patch any needed areas. Need: 4-5 full days of dat...

    $151 (Avg Bid)
    $151 Avg Bida
    17 bida

    I need a professional with strong experience dealing with hacked WordPress websites. Under this project, your responsibilities would include: - Cleaning and restoring my hacked WordPress website from the recently available backup. - Enhancing the post-recovery security to prevent further hacking attempts. - Potentially identifying areas most impacted by the hack, as I'm unsure of specific areas. General skills and experience: - Proven track record with WordPress. - Specific experience dealing with recovery from hacking attacks. - Knowledgeable about preventative measures against hacking. - Experience in website backups and restoration.

    $179 (Avg Bid)
    $179 Avg Bida
    43 bida

    ...Pulldown One Arm Lat Pulldown One Arm Seated Cable Row Cable Pull Through Cable Kickback Cable Lateral Raise Cable Reverse Fly Face Pull Cable External Rotation Cable Crunch Cable Woodchopper Cable Shrug Chest Press Machine Chest Fly Seated Dip Machine Machine Tricep Extension Machine Bicep Curl Machine Row Machine Back Extension Sled Leg Press Horizontal Leg Press Leg Extension Seated Leg Curl Hack Squat Lying Leg Curl Machine Calf Raise Vertical Leg Press Seated Calf Raise Hip Abduction Hip Adduction Sled Press Calf Raise Machine Shoulder Press Machine Reverse Fly Machine Lateral Raise Machine Seated Crunch...

    $211 (Avg Bid)
    $211 Avg Bida
    59 bida

    I'm in search for an experienced illustrator to complete a project for a 28 page children's picture book intended for preschool-aged children (1-5 years old). Its a zany, rhyming book about a slug invading a little girls room at night and no one can catch it. Key requirements: - You should be proficient in watercolor-style illustrations that are appealing to young children. Task Details: - Color scheme is currently open for creative suggestions as per the story’s demand. Ideal Skills: - Past experience illustrating children’s picture books, specifically targeting preschooler age group. - Expertise in creating watercolor illustrations. - Strong communication skills to understand and follow the narrative and character requirements. This ...

    $1461 (Avg Bid)
    $1461 Avg Bida
    81 bida

    WordPress Publishing We are publishing courses in WordPress for education and training. The content is fine and being sourced - I don't have problems with the content. We have been successfully publishing in print and pdfs/e-books etc. The contract/job will last for a long time as the content is completed so the work will be ongoing but not full-time. Coding - this is avoided as I wanted all plug-ins to be version-managed and upgraded as required. Coding will be managed and signed off after a review of the impact on other plug-ins. Outline: WordPress hosted and managed on AWS. This will be solely the customer's site and DEV will work off this site. Elements: a/ Newspaper theme - to be used for general layout. b/ Lessons are arranged and accessed in ei...

    $22 / hr (Avg Bid)
    $22 / hr Avg Bida
    223 bida

    I run a B2B website that currently needs solid IP blocking strategies to prevent unauthorized access. I've recently noticed some suspicious activities that indicate hack attempts. Given these factors, I am after a seasoned web security expert who can: - Assess the situation and recommend viable solutions - Implement an IP blocking solution to prevent these unauthorized access attempts - Create a strategy to routinely monitor for and address such threats Ideal skills and experiences would include a strong background in website security, experience with B2B websites, and familiarity with preventing hack attempts.

    $130 (Avg Bid)
    $130 Avg Bida
    21 bida

    ...corporation's headquarters which is out of state to meet diversity requirements? 2) Hacking into a privately owned website and placing malware on the site: The corporation's motive was to squash public knowledge of their illegal and unethical behavior which the plaintiff's website shared plus give pointers of how to best sue defendant if there was cause. 3) Civil rights issues because the website hack restricted the site owner's free speech as users' anti-malware software prevented them from visiting it or adversely affected their computers 4) Conspiracy charges because in a large corporation there must have been >1 person approving, planning and hacking. 5) Way of stating/showing sufficient proof for “preponderance of evidence” when al...

    $259 (Avg Bid)
    $259 Avg Bida
    23 bida

    Hi. I want to remove lazyload on I tried the following - tried motion effects per field - tried elementor settings - lazyload inactive - tried javascript hack - tried add_filter( 'wp_lazy_loading_enabled', '__return_false' ); If you know how to do this, please start with the words lazyload There is also an a zoom hover effect close to the footer. I know i could just remake this as columns, but prefer to disable the zoom animation for now if you know how to do this.

    $19 (Avg Bid)
    $19 Avg Bida
    18 bida

    I'm encountering an issue with the URLs of my website that I just developed. The slug starts with , and I don't understand why. My hosting is with OVH.

    $29 (Avg Bid)
    $29 Avg Bida
    33 bida

    I urgently need assistance in dealing with a suspected Japanese keyword hack issue in my Laravel app. Noticed the problem following a sudden dip in Google search rankings, and unfortunately, I haven't made any progress in addressing it. Here are some key user requirements: - Full administrative access to the system will be granted to troubleshoot and resolve this issue. - Efficiently identifying and eliminating the Japanese keyword hack issue. - Insuring minimal downtime during the mitigation process. Ideal skills and expertise: - Extensive experience in Laravel application security. - Prior experience dealing with Japanese keyword hacks. - Proficiency in analyzing and rectifying Google search rankings related issues. - Should have good Laravel application server mana...

    $32 (Avg Bid)
    $32 Avg Bida
    6 bida

    For our Hack the North 2022 submission, the rise of Web3 lead us to explore a new topic in web development that all of us were unfamiliar with. We created Receipt3.0, a full-stack application that allows businesses to create digital receipts that exist on the Ethereum blockchain. The idea of the project focused on decentralization, where individuals had ownership of their own receipts, and can use it to refund their bought products. These receipt tokens would exist on the user's MetaMask wallet. We built smart contracts using Solidity and tested everything on the Ganache network. The frontend was created using React and Chakra-UI, while the backend used Express, Node, and MongoDB to store data. Here is code: For now my previous developer can't working

    $51 / hr (Avg Bid)
    $51 / hr Avg Bida
    39 bida

    ...23 HOURS I'm currently grappling with a redirection hack on two of my WordPress websites. Visitors are being redirected to unintended pages, likely due to malware infection. The malware's specifics, however, are still unclear to me. I'm seeking a freelancer with expertise in malware removal and website security to address and resolve this issue promptly. Key Requirements: - *Malware Analysis & Removal:* Identify and fully remove all traces of the redirection hack and any other potential threats from both sites. - *WordPress Security Hardening:* Implement measures to enhance the security of my websites, preventing future attacks. - *Website Restoration:* Ensure that my websites return to their original functioning state before the hac...

    $154 (Avg Bid)
    $154 Avg Bida
    76 bida

    Estoy desarrollando un videojuego estilo Pixel Art, metroidvania, hack n' slash, pero estoy buscando programadores y/o artistas que sepan del estilo Pixel Art

    $11 / hr (Avg Bid)
    $11 / hr Avg Bida
    9 bida

    ...eliminate the need for third party involvement. Registration requirements: Centralized exchanges require customers to comply with Know Your Customer regulations enforced by the U.S. Treasury, while decentralized exchanges do not require this. Security: Centralized exchanges are more frequent targets of malicious actors, whereas the decentralized nature of DEXs makes them relatively difficult to hack. Privacy: Decentralized exchanges do not share transaction data with any third party. DEX users also do not disclose any personal information. Trading volume: Trading activity on centralized exchanges still far outweighs the trading volume on DEXs. Decentralized exchanges currently account for only about 5% of the global crypto trading volume. Number of supported tokens: Decentralized...

    $1237 (Avg Bid)
    $1237 Avg Bida
    57 bida

    From time to time, the wordpress php files will be hacked and overwritten. I have recovered website but would like to find out the root cause of the hack place so that it doesn't happen again.

    $104 (Avg Bid)
    $104 Avg Bida
    108 bida

    I'm seeking a skilled mobile app developer to hack my Candy Crush on Android. This special modification should enable two primary features: unlocking all game levels and facilitating free in-game purchases. The timeline is tight, and I need it done within a week. **Key Requirements:** - Expertise in Android app development and modification. - Previous experience with game hacks or similar projects. - Ability to work swiftly and efficiently, completing the project in under a week. - Strong understanding of Candy Crush game mechanics is a plus. **Project Deliverables:** - A reliable hack that unlocks all levels in Candy Crush for Android. - Enable free in-game purchases without affecting game performance or stability. - Ensure the solution is discreet and minimizes th...

    $19 (Avg Bid)
    $19 Avg Bida
    6 bida

    I'm looking for a tech-savvy and reliable professional who can design and implement advanced features for the Rave application. Key Responsibilities: - Design effective hack strategies to wrest leadership from other active rooms in Rave - Incorporate additional operation options in existing Rave features Ideal Skills and Experience: • Extensive experience in application development • Familiarity with the Rave app's architecture and features • Excellent problem-solving abilities • Proven track record of successful application hacks The goal is to create a superior user experience via additional in-app features. Please be prepared to showcase similar projects or hacks in your portfolio. The ideal candidate will deliver this project in a timely, re...

    $556 (Avg Bid)
    $556 Avg Bida
    64 bida

    I'm looking for a skilled ethical hacker to embark on a unique project, aimed not just at identifying security vulnerabilities but for reasons beyond the usual scope. My priority is to approach this project with a fresh perspective, focusing on safeguarding our systems in innovative ways. **Objectives** - Beyond traditional security checks, this project craves innovation in protecting our digital frontier. - The omission of enhancing data privacy, ensuring compliance, or improving our security posture doesn't mean these aren't under consideration; our approach, however, prioritizes pioneering methodologies. **Timeline** - Completion is set within a month, providing sufficient time to delve deep while ensuring opportunistic threats are mitigated promptly. **Ideal Skills an...

    $73 (Avg Bid)
    $73 Avg Bida
    4 bida

    I'm currently grappling with a redirection hack on two of my WordPress websites. Visitors are being redirected to unintended pages, likely due to malware infection. The malware's specifics, however, are still unclear to me. I'm seeking a freelancer with expertise in malware removal and website security to address and resolve this issue promptly. Key Requirements: - **Malware Analysis & Removal:** Identify and fully remove all traces of the redirection hack and any other potential threats from both sites. - **WordPress Security Hardening:** Implement measures to enhance the security of my websites, preventing future attacks. - **Website Restoration:** Ensure that my websites return to their original functioning state before the hack...

    $142 (Avg Bid)
    $142 Avg Bida
    64 bida

    I'm seeking a mobile security expert to ensure my iPhone is free from any hacks and to implement measures to prevent future compromises. My phone currently shows signs of being hacked, highlighted by receiving strange messages or calls. Despite not recalling the installation of suspicious apps recently, I need professional help to address and rectify these concerns. **Key Responsibilities:** - Conduct a thorough security audit of my iPhone - Identify any malicious software or activity - Remove any identified threats securely - Advise and implement preventive measures against future hacking attempts **Ideal Skills & Experience:** - Proficient in iOS security protocols - Experienced in malware detection and removal on iOS - Knowledgeable in securing devices against unauthorized ac...

    $270 (Avg Bid)
    $270 Avg Bida
    20 bida

    We are seeking 15-20 + years of experienced CORE PHP, Laravel developer. **Requirements:** - **Strong Proficiency in Laravel/ core php:** . - **Experience in fixing SQL Injections and security of php files: ** Demonstrable experience in fixing SQL injections and making sure the website is hack-proof - **Experience in Project Upgrades: ** Demonstrable experience in upgrading existing projects, making them more efficient, and integrating new functionalities seamlessly. **Ideal Skills and Experience:** - In-depth knowledge of PHP and Laravel framework. - Proficient in problem-solving and debugging. - Experience in performance tuning. - Ability to handle feature development from conceptualization to deployment. - Strong communication skills in ENGLISH - MUST be available for di...

    $6 / hr (Avg Bid)
    $6 / hr Avg Bida
    126 bida

    ...With an emphasis on elevating performance, squashing bugs, and introducing new features, the successful candidate will play a key role in steering our project towards excellence. **Requirements:** - **Strong Proficiency in Laravel/ core php:** . - **Experience in fixing SQL Injections and security of php files:** Demonstrable experience in fixing SQL injections and making sure the website is hack-proof - **Experience in Project Upgrades:** Demonstrable experience in upgrading existing projects, making them more efficient, and integrating new functionalities seamlessly. **Scope of Work:** **Ideal Skills and Experience:** - In-depth knowledge of PHP and Laravel framework. - Proficient in problem-solving and debugging. - Experience in performance tuning. - Ability to handle...

    $11 / hr (Avg Bid)
    $11 / hr Avg Bida
    55 bida

    I’m looking for a skilled cybersecurity professional or ethical hacker to thoroughly test the API of our mobile application for vulnerabilities. The API is custom-built using our own PHP framework, and the goal is to strengthen our app by identifying potential security flaws. **What You'll Do:** - Conduct comprehensive vulnerability scanning and penetration testing on our mobile app’s API. - Utilize creative hacking techniques to uncover any weak spots or potential security loopholes. **Access Provided:** - You will be granted full access to the API for the purpose of this assessment. It’s important that you handle this access responsibly and ethically. **Report Requirements:** - Upon completion of your testing, I expect a summary report of vulnerabilities discove...

    $73 (Avg Bid)
    $73 Avg Bida
    13 bida

    I need a few lines of code hacking for adding variables to CMS contents of prestashop

    $23 (Avg Bid)
    $23 Avg Bida
    15 bida

    ...plaintiff in federal court change the address of the defendant corporation from in-state to out of state to meet diversity requirements? 2) Hacking into a privately owned website and placing malware there. Their motive was to squash public knowledge of their illegal and unethical behavior plus give pointers of how to best sue them if there was cause. 3) Civil rights issues because the website hack restricted the site owner's free speech as users' anti-malware software prevented them from visiting it or adversely affected their computers 4) Conspiracy charges because in a large corporation there must have been >1 person approving, planning and hacking. 5) Way of stating/showing sufficient proof for “preponderance of evidence” when all evidence of the h...

    $243 (Avg Bid)
    $243 Avg Bida
    24 bida

    ...interfaces. Here’s what I’m looking for: I am looking for a Mobile Web and a Web page for the two links below. The pictures do not need to match. Feel free to use 3rd party images. Here is the link to the web pages that needs to be redesigned: **Visual Appeal Improvements:** - **Color Scheme:** Freshen up the website with a new, cohesive color palette that aligns with our brand and attracts our target audience. - **Typography:** Implement modern, readable font choices that enhance the overall look and feel. - **Images and Graphics:** Introduce high-quality, relevant visuals that complement the content

    $150 (Avg Bid)
    Segera Dijamin
    $150
    71 penyertaan

    A recent hack, identified through user complaints, has crippled my WordPress website with several users reporting loss of access to their accounts. I'm seeking an experienced IT professional to restore the site's security and functionality. Key tasks include: - repair damaged files and remove new hacker files - Restore user account access to dashboard - add new user and passwords Ideal candidate should have provable expertise in WordPress site security and excellent troubleshooting skills. Knowledge of preventive cybersecurity strategies will be a plus. Speedy resolution of this issue is crucial.

    $193 (Avg Bid)
    $193 Avg Bida
    96 bida