Ns2 wormhole attack jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 ns2 wormhole attack jobs found, pricing in USD

    Instructions: 1. Create a youtube video: 100 KARENs Attack 2. Create a 10min video of 100 clips of Karens attacking people at walmart, parkinglots, parks, restaurants, etc 3. - Make the video as short and fast as possible 4. Upload as .mp4 *****Make sure videos are copyright or youtube A.I free

    $15 (Avg Bid)
    Guaranteed
    $15
    13 entries

    Instructions: 1. Create a youtube video: 100 Octapus's attack in 2 minutes!!! 2. Create a 2min or so video of 100 clips of Octapus's attacking prey and enemies 3. - Make the video as short and fast as possible 4. Upload as .mp4 *****Make sure videos are copyright or youtube A.I free

    $15 (Avg Bid)
    Guaranteed
    $15
    12 entries

    Instructions: 1. Create a youtube video: 100 Hyenas attack in 2 minutes!!! 2. Create a 2min or so video of 100 clips of Hyenas attacking prey and enemies 3. - Make the video as short and fast as possible 4. Upload as .mp4 *****Make sure videos are copyright or youtube A.I free

    $12 (Avg Bid)
    Guaranteed
    $12
    5 entries

    Instructions: 1. Create a youtube video: 100 leopards attack in 2 minutes!!! 2. Create a 2min or so video of 100 clips of leopards attacking prey and enemies 3. - Make the video as short and fast as possible 4. Upload as .mp4 *****Make sure videos are copyright or youtube A.I free

    $13 (Avg Bid)
    Guaranteed
    $13
    10 entries

    Instructions: 1. Create a youtube video: 100 Wild dogs attack in 2 minutes!!! 2. Create a 10min video of 100 clips of wild african dogs attacking prey - Make the video short and fast as possible 3. Upload as .mp4 *****Make sure videos are copyright or youtube A.I free

    $14 (Avg Bid)
    Guaranteed
    $14
    14 entries

    Instructions: 1. Create a youtube video: 100 lions attack!!! 2. Create a 10min video of 100 lions attacking - enemies (Hyena, leopards, cheetahs, baboons, hogs, tigers, bears, etc) Don't choose weak prey, like a zebra or a gizelle 3. - Make the video as short and fast as possible 4. Upload as .mp4 *****Make sure videos are copyright or youtube A.I free

    $15 (Avg Bid)
    Guaranteed
    $15
    13 entries

    Hi there, I have had malware attack my website. I can't access my website. See attached for what is happening when attempting to access website.

    $95 (Avg Bid)
    $95 Avg Bid
    19 bids

    ...Attacks leveraging this vulnerabilty would lead to the loss of the SSH session. According to CPNI Vulnerability Advisory SSH: If exploited, this attack can potentially allow an attacker to recover up to 32 bits of plaintext from an arbitrary block of ciphertext from a connection secured using the SSH protocol in the standard configuration. If OpenSSH is used in the standard configuration, then the attacker's success probability for recovering 32 bits of plaintext is 2^{-18}. A variant of the attack against OpenSSH in the standard configuration can verifiably recover 14 bits of plaintext with probability 2^{-14}. The success probability of the attack for other implementations of SSH is not known. SSH can be done using Counter (CTR) mode encryption. This mode ge...

    $14 / hr (Avg Bid)
    $14 / hr Avg Bid
    8 bids

    Step 5: Capture and Analyze Network Traffic Another skill that you will need as the network engineer for BallotOnline is being able to capture network traffic. It’s important to analyze network traffic to find and troubleshoot network issues. This method is commonly used to identify a malfunctioning network device or to detect a possible network issue, such as an ongoing network attack. Normally, this process can take hours, days, or even weeks, depending on the size of the network and the specific traffic that you are trying to capture and analyze. In this scenario, you will be provided with a captured network traffic and you will be directed to look for specific network packets. You will use Wireshark, a popular open-source network traffic capture and analysis tool. To a...

    $28 (Avg Bid)
    $28 Avg Bid
    5 bids

    We have an existing Wordpress site that was attacked by hackers and then quarantined by InMotion Hosting. Any files within the home/softer6/public_html folder would have been moved to the quarantine folder so that they are not live on the site and able to do whatever malicious stuff they were trying to do. I need a developer who can review these files and clean them up from malicious scripts then move them back to public_html and bring the site back to live. Wordpress theme will need to be updated too because this hasn't been done for a couple of years. Please note that it is a small site that has 4-5 static pages including a contact form. The mobile version is nearly identical to the desktop one.

    $163 (Avg Bid)
    $163 Avg Bid
    63 bids

    I need web developer that have knowledge in IT iwth more than 10 years of experience to remove Malicious code, deceptive code, malware, virus and redirecting problem from the file site. I also need developer with IT knowledge in wordpress and codeignitor to secure server with tighter security to prevent from future attack. Also need to have knowledge in Plesk linux . There are several site on the server that got attack and it need to remove plishing code, malicious code from file and server. It need to make sure that it did not harm the site

    $145 (Avg Bid)
    $145 Avg Bid
    28 bids

    Need to develop a b2b web platform with android and iphone mobile app I will prefer developer from delhi or nearby delhi and must ...will be in 3 part 1st part beginner - budget have 100000 2nd part api and app creation - budget have Rs150000 3rd part Advance configuration in app as well in web (need to complete the project ) - Rs150000 All work need with testing and bug free (and should be standard coding and UI/UX design) , with high level security ( can't be scrapped data, or can't be inject malware or low probability of attack) , need to design db and need to code in such a way that crores data can be handled and monthly millions traffic can be handled. Later maintenance work will be given to the same or (against maintenance work , we can offer some partnership s...

    $3005 (Avg Bid)
    $3005 Avg Bid
    15 bids

    Security (and the maintenance of security) is an issue that many companies have to consider, often constantly, in order to protect both corporate and user data, assets, and other general information. Breaches of this security have happened in the past, at many different levels. A breach often has many effects, affecting both the consumer and the company. This report should cover topics such as: - An example of an SDL model, with appropriate justification and explanation as to why this model should have been followed (or was not followed) and how it would have affected the breach. - The security level of the system at the time of the breach - both at a technical and practical level. Was the system updated regularly? Were users afforded all possible protections? - How effectively risks were ...

    $64 (Avg Bid)
    $64 Avg Bid
    24 bids

    Hi Deborah K., I am Shylaja again. The final piece has a lot of changes. so I want you to do just a random check. My brother met with a minor heart attack so was hospitalized and returned home yesterday. Hence the delay in final product. The publishers did their bit of change. so here it is . I just want you to a random check thats all. Thats all. Please reply if it can be done. Thanks shylaja

    $15 (Avg Bid)
    $15 Avg Bid
    1 bids

    ...broken window]  Is now a target for those who hate us simply for our faith  They are trying to change our places of worship to places of unease      [Animation Visual: Short clips of IMO attack interspersed with police lights, News Reels, etc]  An Islamophobic attack on the IMO mosque in Toronto,  robbed us of Mohammed-Aslim Zafis: an innocent soul  And it deprived all of us of a sense of security      [Animation Visual:Clips of the funeral of the Quebec attack victims, as well as people consoling]  Groups that engage in such hate crimes have been emboldened as of late  The same ideologies that fuelled the 2017 attack on ...

    $441 (Avg Bid)
    Featured Urgent NDA
    $441 Avg Bid
    24 bids

    ...online between now and August 2021. It would be great to have a valuable trusted resource for our team as wee roll out additional servers and products. Current Project Request: WHMCS Development Provisioning and configuration of ns1. & for cpanel account to hosting plans and completed system added to shopping cart. Current Project Website * Issue - When a customer searches and adds the domain name to the cart the server configuration is shown, but if a customer adds one of the created hosting packages the ns1. and ns2. are not configured. Requested Milestones: 1. Domain Names, Hosting Packages and Other Services to be automatically configured so that it is a seamless request throughout the process. 2. Check and verify server setting in configuration

    $48 / hr (Avg Bid)
    $48 / hr Avg Bid
    7 bids

    DETECTION PROCESS ON NS2 CODE FOR SINKHOLE ATTACK AND AODV PROTOCOL IN NS2 AND THEN DETECTION

    $149 (Avg Bid)
    $149 Avg Bid
    1 bids

    Hi I'm looking for someone who can mod a game for me by adding new 3D models and new attack animations to the game. This is a small project I wanted to start for a long time now. The name of the game is Digimon Story Cyber Sleuth: Complete Edition on pc. I want to add more digimons in the game and a new main protagonist character model. Additionally, I'd like to add new attack animations for the new digimons. Well, adding models has three main issues: 1. Understanding the model format (people did some research but I think it's not complete yet) 2. Writing a converter for a standard format to the game format 3. Finding or creating a model to import (i have some of the 3D models i want to put inside the game) More info about the modding tool of this game, plea...

    $148 (Avg Bid)
    $148 Avg Bid
    4 bids

    I need to develop a communication protocol (routing) for Wireless Sensor Networks (WSN) using Machine Learning particularly Reinforcement Learning algorithms. The routing can be either reactive or proactive type of protocol but has to fulfill requirements of a ad hoc networks kind, in particular, the WSN. The developed protocol then need to be tested and verified through simulation...kind, in particular, the WSN. The developed protocol then need to be tested and verified through simulation and real implementation (if needed) for its performance, for instance, in terms of energy efficiency, network lifetime, and packet delivery rate. I would prefer if the implementation is done using C or C++ language and simulated using either TinyOS TOSSIM, OMNet++ Castalia, Contiki Cooja, or NS2 s...

    $91 (Avg Bid)
    $91 Avg Bid
    3 bids

    ...auto-adaptive on the fly, unlike normal versions release candidates. The aim is not to take away from relevant authorities or agencies, but to give back to them by devolution and bringing Judging someone, then issuing a punishment back into the community/society. This will impact on your life so please seriously consider what you want from joining and how you will protect yourself from initial and ongoing attack. You will be expected to disclose personal details and provide a portfolio of previous work. It is preferable if you can work solo and in a team; both at the same time. Having no regular family interaction or dependents is desirable in case of Crisis or Disaster events. You will not be named or applauded for your work until you pass away. There is no room for ego or seeki...

    $3452 (Avg Bid)
    $3452 Avg Bid
    11 bids

    requirements for the developer - it is desirable to have experience in creating models similar to those we need and you can see previous work what we need - humanoid characters, fully rigged, a few references: state - 2 or 3 variations - he could stand with the arms crossed on his chest, tapping a foot - hands in his pockets, rocking from toes to heels - just standing, hands down, kind of rocking a little bit 2 running 3 dashing (and getting ready to dash - like pulling in the Sling Kong game) at the bully for hero mode 4 victory dance / dances 5 hero being repelled / tossed away by a bully when attack is wrong animations can be taken ready on sites like mixamo, if there are those that fit the description it is necessary to know approximately how much it will cost

    $854 (Avg Bid)
    $854 Avg Bid
    11 bids

    requirements for the developer - it is desirable to have experience in creating models similar to those we need and you can see previous work what we need - humanoid characters, fully rigged, a few references: https://...variations - he could stand with the arms crossed on his chest, tapping a foot - hands in his pockets, rocking from toes to heels - just standing, hands down, kind of rocking a little bit 2 running 3 dashing (and getting ready to dash - like pulling in the Sling Kong game) at the bully for hero mode 4 victory dance / dances 5 hero being repelled / tossed away by a bully when attack is wrong animations can be taken ready on sites like mixamo, if there are those that fit the description it is necessary to know approximately how much it...

    $7899 (Avg Bid)
    $7899 Avg Bid
    9 bids

    Hi Mayank Kumar K., Do u have any idea of dos attack Can u help me find keylogs of a website Quite hacking

    $50 (Avg Bid)
    $50 Avg Bid
    1 bids

    Hey , i have an fivem gaming server and i want to protect it from UDP , TCP ddos attacks , if anyone can protect it ill pay for him The server is on an windows server.

    $25 (Avg Bid)
    $25 Avg Bid
    5 bids

    I am author the following Heart Health related books. 1. Stop Heart Attack Now => 2. Heart Healthy Drinks => => I want to sell copies of paperbacks in bulk. => I need you to setup deal with wholesale buyers of paperback books. So that they can order and buy the copies of paperback books regularly. If you have sold bulk copies of paperback books then you are the one I am looking for! Open for ideas, suggestions etc.. Regards, Senthil.

    $27 (Avg Bid)
    $27 Avg Bid
    4 bids

    ...wing for a standard SOC (Security Operations Center). The SOC keeps analytics on the current trends within the network. Your team will be assigned a current issue that has been seen at the border of the network, trying to infiltrate the organizations network/systems. Upon being assigned your item, it will be your job to go out and search OSINT (Open Source Intelligence) for more information on the attack being observed. This could be a single port number, a series of attacks that has been identified, or an IP address to research and identify; your professor will assign this. Find sources, if possible, source code of attacks that are known to exploit this weakness and break down the code. List known services on the affected ports that are associated and current attacks being perf...

    $96 (Avg Bid)
    $96 Avg Bid
    19 bids

    A simple 3rd person Unity game where a player needs to accept a quest from a NPC and defeat a goblin for rewards. Once the loot from defeating goblin is returned to NPC the quest should be complete. Players should have combat behavior and enemies should attack when player gets close. A small map is enough for the quest. Check the doc file for more information.

    $198 (Avg Bid)
    $198 Avg Bid
    4 bids

    ...will be provided as well as animations. Background art will also be provided as well as attack animations/descriptions. Requirements: A passionate game developer with a love for RPGs :), a skilled 2D artist/animator, and great communication skills. Tasks: Art polishing and adding more frames to make the attacks more dynamic(Please refer to attack animation doc) -Attack Art Projectile Animation(Please refer to attack animation doc) -Character Standard Attack Animation polishing(Please refer to attack animation doc) -Character Art Animation Polishing -Characters' faces don’t show when they are at the top of the screen. *Bug Fix - Boss AI for Characters - Game Layout UI(MP Gauge needs to look way better, Attack & Charge But...

    $1080 (Avg Bid)
    $1080 Avg Bid
    12 bids

    Machine Learning Techniques to be implemented in NS2 / NS3 Environment

    $30 - $250
    $30 - $250
    0 bids

    Looking for experienced developer, who is able to build out a buy now, pay later app such as the mentioned (afterpay, quadpay, splitit, viabill) or others; See link: Secured strong domain, would like to attack it head on at this time. Not sure what skillset would be needed for this type of task. I understand that this isn't just code, considering it will require many other factors, but all in all -- I am looking for a builder today, and in the future. Let me know your thoughts, let's connect and talk.

    $1541 (Avg Bid)
    $1541 Avg Bid
    25 bids

    Hello, I need to make changes to an Open Source application USEFUL LINKS: ----------------- 3 STEP -------------------------------------------------- -------------------------------------------------- -------------------------------------------------- ----------------- Add a BIND server, it needs to generate 2 NS names Example of how it will be displayed in the Web application after entering the domain: Set NS names: to be set on godaddy or similar This BINB server, will configure the SPF, DKIM, RETURN PATH and MX configurations -------------------------------------------------- -------------------------------------------------- -------------------------------------------------- -----------------

    $158 (Avg Bid)
    $158 Avg Bid
    5 bids

    ...Attacking, buffing, party buffing, resurrecting, weapon switching The bot is able to detect your weapons automatically and switch to the correct one based on the skills you add. This includes resurrecting players with a different weapon. Monster Luring Luring monsters allows you to walk outside the training area to bring monsters into the attack area. A skill such as "Howling Shout" can be cast to bring monsters to you. This is perfect for botting an entire party. Attack Log The bot has a log of players that have recently attacked you. This can be useful when you are botting in the "Job Cave" area where there are Hunters and Thieves. Player Gear Spy On the "Players" tab is a complete list of a players items. It allows you to see their gear, av...

    $350 (Avg Bid)
    $350 Avg Bid
    1 bids

    ...Virtualisation platforms. The deployments and the integrations between software-defined networking in the data-centres and telecommunication companies have many benefits such as dynamic and agile system, application layer network monitoring and comprehensive network data analytics. On the other hand, software-defined networking has security vulnerabilities and weaknesses. It becomes much easier to attack and target the control layer (SDN controller) by using Denial of Service (DoS) attacks, data manipulation. In this report, you need to discuss in depth the following topics: • Security challenges with SDN deployments and integrations • Discuss the types of security attacks that target the SDN controller and the data plane layer. • Mitigation methods to avoid imp...

    $24 (Avg Bid)
    $24 Avg Bid
    4 bids

    I want a project on IoT botnet detection attack using various machine learning algorithms. I will provide a link for the dataset that will be used in this.

    $91 (Avg Bid)
    $91 Avg Bid
    7 bids

    Hello, Since the first of October (don't know if it is a coincidence) and a server update (WHM/CPANEL), numeric strings appear next to <type="text/javascript">. For example What it is?<type="a73c5a4bb569ca5f80c52d7b-text/javascript">. The string changes with each refresh. What could it be? Have you seen something like this? Did I suffer a hacker attack? What do you advise me to do? I need someone to solve this?

    $22 (Avg Bid)
    $22 Avg Bid
    9 bids

    need a security expert to fix ddos attack or traffic overloading problem

    $62 (Avg Bid)
    $62 Avg Bid
    7 bids

    You are required to complete this challenge in iLabs. Challenge: Identify all the nodes, workstations, servers, domain controllers, web servers, Linux machines, Windows machines, web applications, firewalls, IDS, etc. Create a blueprint of Spectre Holdings’ IT infrastructure and identify attack paths (entry points) to the organization. You have to present: IP addresses of all the machines Operating systems and their versions Open ports in all the machines Services running in all the open ports Your scope of work in this challenge is limited to the scanning methodology. Note: Use Pen Testing Reports to record all the information collected in this challenge. Collect as much information as possible while conducting the pen test. Take screenshots of all the tasks you are pe...

    $57 (Avg Bid)
    $57 Avg Bid
    12 bids

    Hi Everyone, - We are looking for a 2D Character Designer and Animator. - We need total 12 2D characters. (Check the document for reference) - We need 3 animations for every character - "Walk", "Attack" and "Die". - All characters should fit into the below game

    $128 (Avg Bid)
    $128 Avg Bid
    6 bids

    Hello, I have Interview questions that shall be with a cybersecurity expert for a research purpose. The title of the research is “Assessing the Impacts of Artificial Intelligence in Cyber Defence Preference and Attack Advantage of Offensive Artificial Intelligence: A Case of Qatar Banking Sector”. Let me know if you are the expert that I am looking for so I can send it to you. Thanks and waiting for your response. Best Regards Khalifa AL-Dosari

    $100 (Avg Bid)
    $100 Avg Bid
    1 bids

    Hello, I have Interview questions that shall be with a cybersecurity expert for a research purpose. The title of the research is “Assessing the Impacts of Artificial Intelligence in Cyber Defence Preference and Attack Advantage of Offensive Artificial Intelligence: A Case of Qatar Banking Sector”. Let me know if you are the expert that I am looking for so I can send it to you. Thanks and waiting for your response. Best Regards Khalifa AL-Dosari

    $100 (Avg Bid)
    $100 Avg Bid
    1 bids

    My dentistry in San Fransisco has been having some problems lately due to a Ransomware attack on our server, I store client data on the server with software and now we don't have access to that, we need this solved immediately. Please send me your proposals and bids and timeframe

    $350 (Avg Bid)
    $350 Avg Bid
    6 bids

    Our server got hit by a DDOS attack, we want to find-out which domain hosted in server attracted the attack. It's Centos server running with DirectAdmin panel. If you are able to do this investigation in our server by digging the logs, just bid your best hourly rate.

    $4 / hr (Avg Bid)
    $4 / hr Avg Bid
    4 bids

    ...project what the company is and does without words. No skulls/draggers.....nothing tacky The martial arts being done is Krav Maga, which is a form of self defence.. Krav Maga means "contact combat" or "hand to hand" in Hebrew. Things to consider: It must be for men and women It must be 1 or 2 colours - to make it easier to print on T-Shirts etc Krav Maga it based on simultaneous defence and attack It's called krav maga Evolve because techniques are alwayss changing to improve and meet the needs of new problems. 360 degrees is an important technique in krav maga. It means that someone can defend themselves from all position in any direction. Words to think about. Protect Strike Hand Fist Guard Self Defence Defence Evolve 360 Defence Shield I ...

    $81 (Avg Bid)
    Guaranteed
    $81
    397 entries

    Need a write up with reference architecture diagrams on 1. DNS Tunelling attack post a DDOS attack on a DNS server of an enterprise Target Defense The mitigation action for the above 2 cases. Content would be checked for plagiarism.

    $11 (Avg Bid)
    $11 Avg Bid
    3 bids

    I have a project related to GPS Spoofing Attack Detection. The prior work was focusing only on either a theoretical or a statistical analysis for detecting or correcting single or multiple GSAs. This has led to either requiring additional hardware or impractical theoretical analysis. Moreover, a data-driven approach has not been provided in the literature. Our main objective is to develop a data-driven Deep Learning (DL) algorithm for detecting, identifying and correcting either single or multiple GSAs. Motivated by the current significant success of DL algorithms in anomaly detection and correction in different fields [23,24], in this paper, we propose a new methodology for GSAs detection, identification, and correction using DL. if you are an expert please bid for more details

    $20 - $167
    $20 - $167
    0 bids

    Predicting the next step of cyber attacks in cyber attack tracking system

    $400 (Avg Bid)
    $400 Avg Bid
    7 bids

    Hello, We are under attack which is using our MySQL database to capacity. Either Brute Force or a targeted attack. We need help urgently.

    $138 (Avg Bid)
    $138 Avg Bid
    5 bids

    Design AODV and Fuzzy logic protocols in ad hoc network

    $713 (Avg Bid)
    $713 Avg Bid
    5 bids

    Need a pure f2p character. Old runescape (osrs). - Always keep defence level 1! - (must) have experience in the game. You need to train it or have it allready Levels I want: Attack 40 Strength 99 Defence 1 Prayer 1 Range 70+ Magic 25 Interested? Let me know!

    $37 / hr (Avg Bid)
    $37 / hr Avg Bid
    1 bids

    ...and the application makes a suggestion on what doctor to see and what kind of checkup to do. As well as plot graphs on the charts on the application that will show if the blood pressure and sugar level are low, the risk of heart attack is low and similar. Nothing too crazy, it can be a simple 1 page dashboard that user can interact and change values and the graphs and charts will be updated accordingly. Must include: 1. Descriptive algorithm that will show a pie chart or a bar graph 2. Non-Descriptive algorithm that will display a chart showing the chance of heart attack going up and down based on user input. This is an open ended topic and you are welcome to make suggestions on how you can build it and I am open to suggestions. Below are some screenshot example on how I e...

    $456 (Avg Bid)
    $456 Avg Bid
    10 bids