Ns2 wormhole attack jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 ns2 wormhole attack jobs found, pricing in USD

    Step 5: Capture and Analyze Network Traffic Another skill that you will need as the network engineer for BallotOnline is being able to capture network traffic. It’s important to analyze network traffic to find and troubleshoot network issues. This method is commonly used to identify a malfunctioning network device or to detect a possible network issue, such as an ongoing network attack. Normally, this process can take hours, days, or even weeks, depending on the size of the network and the specific traffic that you are trying to capture and analyze. In this scenario, you will be provided with a captured network traffic and you will be directed to look for specific network packets. You will use Wireshark, a popular open-source network traffic capture and analysis tool. To a...

    $28 (Avg Bid)
    $28 Avg Bid
    5 bids

    We have an existing Wordpress site that was attacked by hackers and then quarantined by InMotion Hosting. Any files within the home/softer6/public_html folder would have been moved to the quarantine folder so that they are not live on the site and able to do whatever malicious stuff they were trying to do. I need a developer who can review these files and clean them up from malicious scripts then move them back to public_html and bring the site back to live. Wordpress theme will need to be updated too because this hasn't been done for a couple of years. Please note that it is a small site that has 4-5 static pages including a contact form. The mobile version is nearly identical to the desktop one.

    $163 (Avg Bid)
    $163 Avg Bid
    63 bids

    I need web developer that have knowledge in IT iwth more than 10 years of experience to remove Malicious code, deceptive code, malware, virus and redirecting problem from the file site. I also need developer with IT knowledge in wordpress and codeignitor to secure server with tighter security to prevent from future attack. Also need to have knowledge in Plesk linux . There are several site on the server that got attack and it need to remove plishing code, malicious code from file and server. It need to make sure that it did not harm the site

    $145 (Avg Bid)
    $145 Avg Bid
    28 bids

    Need to develop a b2b web platform with android and iphone mobile app I will prefer developer from delhi or nearby delhi and must ...will be in 3 part 1st part beginner - budget have 100000 2nd part api and app creation - budget have Rs150000 3rd part Advance configuration in app as well in web (need to complete the project ) - Rs150000 All work need with testing and bug free (and should be standard coding and UI/UX design) , with high level security ( can't be scrapped data, or can't be inject malware or low probability of attack) , need to design db and need to code in such a way that crores data can be handled and monthly millions traffic can be handled. Later maintenance work will be given to the same or (against maintenance work , we can offer some partnership s...

    $3005 (Avg Bid)
    $3005 Avg Bid
    15 bids

    Security (and the maintenance of security) is an issue that many companies have to consider, often constantly, in order to protect both corporate and user data, assets, and other general information. Breaches of this security have happened in the past, at many different levels. A breach often has many effects, affecting both the consumer and the company. This report should cover topics such as: - An example of an SDL model, with appropriate justification and explanation as to why this model should have been followed (or was not followed) and how it would have affected the breach. - The security level of the system at the time of the breach - both at a technical and practical level. Was the system updated regularly? Were users afforded all possible protections? - How effectively risks were ...

    $64 (Avg Bid)
    $64 Avg Bid
    24 bids

    Hi Deborah K., I am Shylaja again. The final piece has a lot of changes. so I want you to do just a random check. My brother met with a minor heart attack so was hospitalized and returned home yesterday. Hence the delay in final product. The publishers did their bit of change. so here it is . I just want you to a random check thats all. Thats all. Please reply if it can be done. Thanks shylaja

    $15 (Avg Bid)
    $15 Avg Bid
    1 bids

    ...broken window]  Is now a target for those who hate us simply for our faith  They are trying to change our places of worship to places of unease      [Animation Visual: Short clips of IMO attack interspersed with police lights, News Reels, etc]  An Islamophobic attack on the IMO mosque in Toronto,  robbed us of Mohammed-Aslim Zafis: an innocent soul  And it deprived all of us of a sense of security      [Animation Visual:Clips of the funeral of the Quebec attack victims, as well as people consoling]  Groups that engage in such hate crimes have been emboldened as of late  The same ideologies that fuelled the 2017 attack on ...

    $441 (Avg Bid)
    Featured Urgent NDA
    $441 Avg Bid
    24 bids

    ...online between now and August 2021. It would be great to have a valuable trusted resource for our team as wee roll out additional servers and products. Current Project Request: WHMCS Development Provisioning and configuration of ns1. & for cpanel account to hosting plans and completed system added to shopping cart. Current Project Website * Issue - When a customer searches and adds the domain name to the cart the server configuration is shown, but if a customer adds one of the created hosting packages the ns1. and ns2. are not configured. Requested Milestones: 1. Domain Names, Hosting Packages and Other Services to be automatically configured so that it is a seamless request throughout the process. 2. Check and verify server setting in configuration

    $48 / hr (Avg Bid)
    $48 / hr Avg Bid
    7 bids

    DETECTION PROCESS ON NS2 CODE FOR SINKHOLE ATTACK AND AODV PROTOCOL IN NS2 AND THEN DETECTION

    $149 (Avg Bid)
    $149 Avg Bid
    1 bids

    Hi I'm looking for someone who can mod a game for me by adding new 3D models and new attack animations to the game. This is a small project I wanted to start for a long time now. The name of the game is Digimon Story Cyber Sleuth: Complete Edition on pc. I want to add more digimons in the game and a new main protagonist character model. Additionally, I'd like to add new attack animations for the new digimons. Well, adding models has three main issues: 1. Understanding the model format (people did some research but I think it's not complete yet) 2. Writing a converter for a standard format to the game format 3. Finding or creating a model to import (i have some of the 3D models i want to put inside the game) More info about the modding tool of this game, plea...

    $148 (Avg Bid)
    $148 Avg Bid
    4 bids

    I need to develop a communication protocol (routing) for Wireless Sensor Networks (WSN) using Machine Learning particularly Reinforcement Learning algorithms. The routing can be either reactive or proactive type of protocol but has to fulfill requirements of a ad hoc networks kind, in particular, the WSN. The developed protocol then need to be tested and verified through simulation...kind, in particular, the WSN. The developed protocol then need to be tested and verified through simulation and real implementation (if needed) for its performance, for instance, in terms of energy efficiency, network lifetime, and packet delivery rate. I would prefer if the implementation is done using C or C++ language and simulated using either TinyOS TOSSIM, OMNet++ Castalia, Contiki Cooja, or NS2 s...

    $91 (Avg Bid)
    $91 Avg Bid
    3 bids

    ...auto-adaptive on the fly, unlike normal versions release candidates. The aim is not to take away from relevant authorities or agencies, but to give back to them by devolution and bringing Judging someone, then issuing a punishment back into the community/society. This will impact on your life so please seriously consider what you want from joining and how you will protect yourself from initial and ongoing attack. You will be expected to disclose personal details and provide a portfolio of previous work. It is preferable if you can work solo and in a team; both at the same time. Having no regular family interaction or dependents is desirable in case of Crisis or Disaster events. You will not be named or applauded for your work until you pass away. There is no room for ego or seeki...

    $3452 (Avg Bid)
    $3452 Avg Bid
    11 bids

    requirements for the developer - it is desirable to have experience in creating models similar to those we need and you can see previous work what we need - humanoid characters, fully rigged, a few references: state - 2 or 3 variations - he could stand with the arms crossed on his chest, tapping a foot - hands in his pockets, rocking from toes to heels - just standing, hands down, kind of rocking a little bit 2 running 3 dashing (and getting ready to dash - like pulling in the Sling Kong game) at the bully for hero mode 4 victory dance / dances 5 hero being repelled / tossed away by a bully when attack is wrong animations can be taken ready on sites like mixamo, if there are those that fit the description it is necessary to know approximately how much it will cost

    $854 (Avg Bid)
    $854 Avg Bid
    11 bids

    requirements for the developer - it is desirable to have experience in creating models similar to those we need and you can see previous work what we need - humanoid characters, fully rigged, a few references: https://...variations - he could stand with the arms crossed on his chest, tapping a foot - hands in his pockets, rocking from toes to heels - just standing, hands down, kind of rocking a little bit 2 running 3 dashing (and getting ready to dash - like pulling in the Sling Kong game) at the bully for hero mode 4 victory dance / dances 5 hero being repelled / tossed away by a bully when attack is wrong animations can be taken ready on sites like mixamo, if there are those that fit the description it is necessary to know approximately how much it...

    $7899 (Avg Bid)
    $7899 Avg Bid
    9 bids

    Hi Mayank Kumar K., Do u have any idea of dos attack Can u help me find keylogs of a website Quite hacking

    $50 (Avg Bid)
    $50 Avg Bid
    1 bids

    Hey , i have an fivem gaming server and i want to protect it from UDP , TCP ddos attacks , if anyone can protect it ill pay for him The server is on an windows server.

    $25 (Avg Bid)
    $25 Avg Bid
    5 bids

    I am author the following Heart Health related books. 1. Stop Heart Attack Now => 2. Heart Healthy Drinks => => I want to sell copies of paperbacks in bulk. => I need you to setup deal with wholesale buyers of paperback books. So that they can order and buy the copies of paperback books regularly. If you have sold bulk copies of paperback books then you are the one I am looking for! Open for ideas, suggestions etc.. Regards, Senthil.

    $27 (Avg Bid)
    $27 Avg Bid
    4 bids

    ...wing for a standard SOC (Security Operations Center). The SOC keeps analytics on the current trends within the network. Your team will be assigned a current issue that has been seen at the border of the network, trying to infiltrate the organizations network/systems. Upon being assigned your item, it will be your job to go out and search OSINT (Open Source Intelligence) for more information on the attack being observed. This could be a single port number, a series of attacks that has been identified, or an IP address to research and identify; your professor will assign this. Find sources, if possible, source code of attacks that are known to exploit this weakness and break down the code. List known services on the affected ports that are associated and current attacks being perf...

    $96 (Avg Bid)
    $96 Avg Bid
    19 bids

    A simple 3rd person Unity game where a player needs to accept a quest from a NPC and defeat a goblin for rewards. Once the loot from defeating goblin is returned to NPC the quest should be complete. Players should have combat behavior and enemies should attack when player gets close. A small map is enough for the quest. Check the doc file for more information.

    $198 (Avg Bid)
    $198 Avg Bid
    4 bids

    ...will be provided as well as animations. Background art will also be provided as well as attack animations/descriptions. Requirements: A passionate game developer with a love for RPGs :), a skilled 2D artist/animator, and great communication skills. Tasks: Art polishing and adding more frames to make the attacks more dynamic(Please refer to attack animation doc) -Attack Art Projectile Animation(Please refer to attack animation doc) -Character Standard Attack Animation polishing(Please refer to attack animation doc) -Character Art Animation Polishing -Characters' faces don’t show when they are at the top of the screen. *Bug Fix - Boss AI for Characters - Game Layout UI(MP Gauge needs to look way better, Attack & Charge But...

    $1080 (Avg Bid)
    $1080 Avg Bid
    12 bids

    Machine Learning Techniques to be implemented in NS2 / NS3 Environment

    $30 - $250
    $30 - $250
    0 bids

    Looking for experienced developer, who is able to build out a buy now, pay later app such as the mentioned (afterpay, quadpay, splitit, viabill) or others; See link: Secured strong domain, would like to attack it head on at this time. Not sure what skillset would be needed for this type of task. I understand that this isn't just code, considering it will require many other factors, but all in all -- I am looking for a builder today, and in the future. Let me know your thoughts, let's connect and talk.

    $1541 (Avg Bid)
    $1541 Avg Bid
    25 bids

    Hello, I need to make changes to an Open Source application USEFUL LINKS: ----------------- 3 STEP -------------------------------------------------- -------------------------------------------------- -------------------------------------------------- ----------------- Add a BIND server, it needs to generate 2 NS names Example of how it will be displayed in the Web application after entering the domain: Set NS names: to be set on godaddy or similar This BINB server, will configure the SPF, DKIM, RETURN PATH and MX configurations -------------------------------------------------- -------------------------------------------------- -------------------------------------------------- -----------------

    $158 (Avg Bid)
    $158 Avg Bid
    5 bids

    ...Attacking, buffing, party buffing, resurrecting, weapon switching The bot is able to detect your weapons automatically and switch to the correct one based on the skills you add. This includes resurrecting players with a different weapon. Monster Luring Luring monsters allows you to walk outside the training area to bring monsters into the attack area. A skill such as "Howling Shout" can be cast to bring monsters to you. This is perfect for botting an entire party. Attack Log The bot has a log of players that have recently attacked you. This can be useful when you are botting in the "Job Cave" area where there are Hunters and Thieves. Player Gear Spy On the "Players" tab is a complete list of a players items. It allows you to see their gear, av...

    $350 (Avg Bid)
    $350 Avg Bid
    1 bids

    ...Virtualisation platforms. The deployments and the integrations between software-defined networking in the data-centres and telecommunication companies have many benefits such as dynamic and agile system, application layer network monitoring and comprehensive network data analytics. On the other hand, software-defined networking has security vulnerabilities and weaknesses. It becomes much easier to attack and target the control layer (SDN controller) by using Denial of Service (DoS) attacks, data manipulation. In this report, you need to discuss in depth the following topics: • Security challenges with SDN deployments and integrations • Discuss the types of security attacks that target the SDN controller and the data plane layer. • Mitigation methods to avoid imp...

    $24 (Avg Bid)
    $24 Avg Bid
    4 bids

    I want a project on IoT botnet detection attack using various machine learning algorithms. I will provide a link for the dataset that will be used in this.

    $91 (Avg Bid)
    $91 Avg Bid
    7 bids

    Hello, Since the first of October (don't know if it is a coincidence) and a server update (WHM/CPANEL), numeric strings appear next to <type="text/javascript">. For example What it is?<type="a73c5a4bb569ca5f80c52d7b-text/javascript">. The string changes with each refresh. What could it be? Have you seen something like this? Did I suffer a hacker attack? What do you advise me to do? I need someone to solve this?

    $22 (Avg Bid)
    $22 Avg Bid
    9 bids

    need a security expert to fix ddos attack or traffic overloading problem

    $62 (Avg Bid)
    $62 Avg Bid
    7 bids

    You are required to complete this challenge in iLabs. Challenge: Identify all the nodes, workstations, servers, domain controllers, web servers, Linux machines, Windows machines, web applications, firewalls, IDS, etc. Create a blueprint of Spectre Holdings’ IT infrastructure and identify attack paths (entry points) to the organization. You have to present: IP addresses of all the machines Operating systems and their versions Open ports in all the machines Services running in all the open ports Your scope of work in this challenge is limited to the scanning methodology. Note: Use Pen Testing Reports to record all the information collected in this challenge. Collect as much information as possible while conducting the pen test. Take screenshots of all the tasks you are pe...

    $57 (Avg Bid)
    $57 Avg Bid
    12 bids

    Hi Everyone, - We are looking for a 2D Character Designer and Animator. - We need total 12 2D characters. (Check the document for reference) - We need 3 animations for every character - "Walk", "Attack" and "Die". - All characters should fit into the below game

    $128 (Avg Bid)
    $128 Avg Bid
    6 bids

    Hello, I have Interview questions that shall be with a cybersecurity expert for a research purpose. The title of the research is “Assessing the Impacts of Artificial Intelligence in Cyber Defence Preference and Attack Advantage of Offensive Artificial Intelligence: A Case of Qatar Banking Sector”. Let me know if you are the expert that I am looking for so I can send it to you. Thanks and waiting for your response. Best Regards Khalifa AL-Dosari

    $100 (Avg Bid)
    $100 Avg Bid
    1 bids

    Hello, I have Interview questions that shall be with a cybersecurity expert for a research purpose. The title of the research is “Assessing the Impacts of Artificial Intelligence in Cyber Defence Preference and Attack Advantage of Offensive Artificial Intelligence: A Case of Qatar Banking Sector”. Let me know if you are the expert that I am looking for so I can send it to you. Thanks and waiting for your response. Best Regards Khalifa AL-Dosari

    $100 (Avg Bid)
    $100 Avg Bid
    1 bids

    My dentistry in San Fransisco has been having some problems lately due to a Ransomware attack on our server, I store client data on the server with software and now we don't have access to that, we need this solved immediately. Please send me your proposals and bids and timeframe

    $350 (Avg Bid)
    $350 Avg Bid
    6 bids

    Our server got hit by a DDOS attack, we want to find-out which domain hosted in server attracted the attack. It's Centos server running with DirectAdmin panel. If you are able to do this investigation in our server by digging the logs, just bid your best hourly rate.

    $4 / hr (Avg Bid)
    $4 / hr Avg Bid
    4 bids

    ...project what the company is and does without words. No skulls/draggers.....nothing tacky The martial arts being done is Krav Maga, which is a form of self defence.. Krav Maga means "contact combat" or "hand to hand" in Hebrew. Things to consider: It must be for men and women It must be 1 or 2 colours - to make it easier to print on T-Shirts etc Krav Maga it based on simultaneous defence and attack It's called krav maga Evolve because techniques are alwayss changing to improve and meet the needs of new problems. 360 degrees is an important technique in krav maga. It means that someone can defend themselves from all position in any direction. Words to think about. Protect Strike Hand Fist Guard Self Defence Defence Evolve 360 Defence Shield I ...

    $81 (Avg Bid)
    Guaranteed
    $81
    397 entries

    Need a write up with reference architecture diagrams on 1. DNS Tunelling attack post a DDOS attack on a DNS server of an enterprise Target Defense The mitigation action for the above 2 cases. Content would be checked for plagiarism.

    $11 (Avg Bid)
    $11 Avg Bid
    3 bids

    I have a project related to GPS Spoofing Attack Detection. The prior work was focusing only on either a theoretical or a statistical analysis for detecting or correcting single or multiple GSAs. This has led to either requiring additional hardware or impractical theoretical analysis. Moreover, a data-driven approach has not been provided in the literature. Our main objective is to develop a data-driven Deep Learning (DL) algorithm for detecting, identifying and correcting either single or multiple GSAs. Motivated by the current significant success of DL algorithms in anomaly detection and correction in different fields [23,24], in this paper, we propose a new methodology for GSAs detection, identification, and correction using DL. if you are an expert please bid for more details

    $20 - $167
    $20 - $167
    0 bids

    Predicting the next step of cyber attacks in cyber attack tracking system

    $400 (Avg Bid)
    $400 Avg Bid
    7 bids

    Hello, We are under attack which is using our MySQL database to capacity. Either Brute Force or a targeted attack. We need help urgently.

    $138 (Avg Bid)
    $138 Avg Bid
    5 bids

    Design AODV and Fuzzy logic protocols in ad hoc network

    $713 (Avg Bid)
    $713 Avg Bid
    5 bids

    Need a pure f2p character. Old runescape (osrs). - Always keep defence level 1! - (must) have experience in the game. You need to train it or have it allready Levels I want: Attack 40 Strength 99 Defence 1 Prayer 1 Range 70+ Magic 25 Interested? Let me know!

    $37 / hr (Avg Bid)
    $37 / hr Avg Bid
    1 bids

    ...and the application makes a suggestion on what doctor to see and what kind of checkup to do. As well as plot graphs on the charts on the application that will show if the blood pressure and sugar level are low, the risk of heart attack is low and similar. Nothing too crazy, it can be a simple 1 page dashboard that user can interact and change values and the graphs and charts will be updated accordingly. Must include: 1. Descriptive algorithm that will show a pie chart or a bar graph 2. Non-Descriptive algorithm that will display a chart showing the chance of heart attack going up and down based on user input. This is an open ended topic and you are welcome to make suggestions on how you can build it and I am open to suggestions. Below are some screenshot example on how I e...

    $456 (Avg Bid)
    $456 Avg Bid
    10 bids

    We have a Wordpress auction page for Cars. But this is very slow and security is not safe from hackers. It's important to protect our company from attack. So we should build fast and fast, safe and safe site. It's better to develop with React Javascript Framework. Steps: 1. Front page building based on WordPress 2. Back end page building based as our needs.- API should be REST API. 3. Maintenance and fix bugs while running sites after finish our task. It will take a few months or more. so we need serious and honest individual developers. we will prefer European. Please discuss the details on the chat.

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    7 bids

    I need someone to help me make a series of videos in which I will read material into the camera and put music in the background. The material is religious in nature, with the ultimate goal of making peace between Christianity and Judaism by finding unexpected common ground. But first I must attack some common misguided arguments that keep us apart, as in the example file entitled 400,000. This is an ongoing project, it's for 6 months aprox.

    $35 / hr (Avg Bid)
    Local
    $35 / hr Avg Bid
    10 bids

    I need you to develop in NS2 And Simulation for me. I would like this software to be develop.

    $442 (Avg Bid)
    $442 Avg Bid
    2 bids

    I am looking to do some animation for the below models. We want to merge this both character where the Human character is sitting on the bull/mammal. The animatio...looking to do some animation for the below models. We want to merge this both character where the Human character is sitting on the bull/mammal. The animations are below, Bull/Mammal: Running Character: - 2 melee attack (hand & Leg) - 4 weapon attack - 1 ideal Let me know the cost for the same?

    $105 (Avg Bid)
    $105 Avg Bid
    11 bids

    the wordpress backend is very slow, and so is the site, another developer informed it may be a malware infection. This needs to be resolved urgently. Site speed needs to be fixed.

    $56 (Avg Bid)
    $56 Avg Bid
    42 bids

    Hi, I am running a VPC instance on AWS....are: x.x.xx.x Multiple Nameservers ERROR: Looks like you have less than 2 nameservers. According to RFC2182 section 5 you must have at least 3 nameservers, and no more than 7. Having 2 nameservers is also ok by me. Missing nameservers reported by your nameservers You should already know that your NS records at your nameservers are missing, so here it is again: ns1.domain.com. ns2.domain.com. OA record No valid SOA record came back! WWW A Record ERROR: I could not get any A records for ! (I only do a cache request, if you recently added a WWW A record, it might not show up here.) I need an experienced programmer to help me resolve this the soonest. Access to WHM will be given to winning bid. Thanks in advanced.

    $26 (Avg Bid)
    $26 Avg Bid
    7 bids

    I need to simulate routing protocols using Ns2 or ns3 Request details protocols used are AODV and Fuzzy logic Deliverables Source code and results with graphs also datasets , all requirements will be submitted , protocols used are AODV and Fuzzy logic

    $90 (Avg Bid)
    $90 Avg Bid
    1 bids

    Hello I want to install cwp panel on contabo server. The domain is with namecheap. I have already installed cento os 7 on the server and added contabo nameservers to my domain on namecheap. I want someone to do a clean install PHP 7.4 Nameservers as and And fix all issues that show up during first installation of CWP like MOD security, firewall etc. Need this done fast. Please only message if you can install CWP.

    $14 (Avg Bid)
    $14 Avg Bid
    1 bids