Wormhole attack prevention jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    9,515 wormhole attack prevention jobs found, pricing in USD

    ...originally launched on December 2, 2012, then discontinued and later recreated after the website was purchased in April 2014 by Dean Jones. The site was hit with a series of DDoS attack soon afterwards. Godinterest founder Dean Jones refers to himself as a media publisher, dad, Christian, designer, and project manager. On December 20, 2017, Godinterest introduced

    $120 (Avg Bid)
    $120 Avg Bid
    22 bids
    All About Pets 6 days left

    ...lovers choose the right pets for their homes and family, you will also be providing top of the line pet care tips (declawing canines, grooming, feeding, vaccination, obesity prevention, exercise) and reviewing different types of pet products and accessories, such as: • Pet food • Toys • Medicines • Pet GPS trackers • Leashes • Wee wee pads • Poop bags ...

    $5708 (Avg Bid)
    $5708 Avg Bid
    16 bids

    ...basically give them a white page connection refused, so that need to be fixed as well and any other security issues. I do get daily drops and attacks someone been trying to hack attack daily for more than 2 years. If you do get the project you must take care of all the above issues and monitor the server for 10 days and solve any issues related, if these

    $44 (Avg Bid)
    $44 Avg Bid
    6 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    I need a windows application in C# that involves preventing ARP spoofing attack according to an algorithm that i will send to you (a flow chart) The idea depends on building a trusted ARP table at the server PC and then distributing that trusted ARP table among other clients. The clients PCs will start to enter static ARP entries to their ARP Cache

    $270 (Avg Bid)
    $270 Avg Bid
    6 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $251 (Avg Bid)
    $251 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...finding from web server log file and writing an algorithm. Detail - The 3 web server log files will be provided to you. 1) Normal users log data 2) Robots log data 3) Malicious/Attack log data. You need to find out features of mentioned web attacks from web log file which will differentiate it from robot log data and from normal users' log data. Based upon

    $126 (Avg Bid)
    $126 Avg Bid
    7 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $568 (Avg Bid)
    $568 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    $555 (Avg Bid)
    $555 Avg Bid
    1 bids

    A lot of my websites are Wordpress based and seem to have quite a few frequent attacks. What I would like to resolve is having you trying to attack in to my website and for example, injecting some code into my Wordpress blog. For a test, I will provide a test site for you. If you manage, I would like to work with you on a lot more projects to help

    $219 (Avg Bid)
    $219 Avg Bid
    18 bids

    Hi, I've a big project that needs checking a function(10k-12k) lines of code and identify the vulnerabilities in the software. And also come up with solution to mitigate such risks. I will give detail to shortlisted candidates. Will hire 1 or 2 testers. Thanks!

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    12 bids

    I want to 51% attack BTCP Without double spending. If you feel that you are good fit for blockchain and bitcoin, please bid. I will discuss with you the method and payment method. if you want hourly work, please provide me fixed price. Happy bid. Thank you.

    $806 (Avg Bid)
    $806 Avg Bid
    16 bids

    Animation loops for the Airdrop Hunter 3D character for move and attack actions in 8 directions : top, top right, right, bottom right, bottom, bottom left, left and top left, with specific camera angle and shadow.

    $90 (Avg Bid)
    $90 Avg Bid
    1 bids

    ...using this technique: [login to view URL] • The animations I would like you to do are an Idle, Walk, Attack stance and Attack. Please see this video for how a Funnel Web goes into an Attack Stance and Attacks: [login to view URL] • I will upload the fbx file to you when I award you the job. Thanks....

    $156 (Avg Bid)
    $156 Avg Bid
    22 bids

    ...prevent deseases and improve your health.... ** It will help with : Diabetes High blood pressure Kidneys Lupus Anemia Cancer Pain Insomnia (lock of sleep) Stroke Heart attack etc: ** WE ALSO HAVE ADDITIONAL SUPPLEMENTS * EYE LUTEN: FOR BLURRED VISION, WATERY EYES , DRY EYES... * SAW PALMETTO: FOR PROSTATE CANCER, PROSTATE INFLAMMATION

    $173 (Avg Bid)
    $173 Avg Bid
    25 bids
    Trophy icon Book Cover Graphic Design Ended

    ...with bulletproof vests and assault rifles. From coast to coast, America comes under brutal attack and the terrorists are just getting started. Further attacks take place at grocery stores, as people try and stockpile food. "Black Friday" becomes the bloodiest attack in American history. Graphic Ideas and Thoughts - I want to create a bold but simple

    $100 (Avg Bid)
    Urgent Guaranteed
    $100
    173 entries

    ...net/2f44/i/2013/265/7/e/[login to view URL] [login to view URL] Again with four animations: - Move - Idle - Attack - Combat Art (Corpse Eating on the ground, it is healing itself by that) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian

    $124 (Avg Bid)
    $124 Avg Bid
    1 bids

    Animation loops for the hacker 3D character for move and attack actions in 8 directions : top, top right, right, bottom right, bottom, bottom left, left and top left, with specific camera angle and shadow.

    $91 (Avg Bid)
    $91 Avg Bid
    1 bids

    Texturing of the 3D character "Miner" + animations loop of attack and walk and turntable

    $136 (Avg Bid)
    $136 Avg Bid
    1 bids

    Quick I need a "minimal cost to run" ecommerce website built using wordpress + woocommerce + payment gateway (e.g. paypal). Domain registration has been organised,...paypal). Domain registration has been organised, and you need to be familiar with how to use . It needs and inventory system, discount codes, postage cost calculators, spam prevention.

    $168 (Avg Bid)
    $168 Avg Bid
    100 bids

    Attack and move animations loops for the scammer 3d character. Delivery in 6 intermediate positions.

    $91 (Avg Bid)
    $91 Avg Bid
    1 bids

    I want a project containing the introduction and report( will be 2 pages ). And I will make the conclusion

    $39 (Avg Bid)
    $39 Avg Bid
    28 bids
    Unity fighting game 8 hours left
    VERIFIED

    ...Different stats based on this -attack, defense, health, agility -8 different characters: animals ex lion, shark, whale. Can mix and match legs, body and head of each character -unlock characters body parts by your level or purchasing in game currency -1v1 battle -Pokémon style fighting turn based -each attack uses certain amount of energy

    $876 (Avg Bid)
    $876 Avg Bid
    34 bids
    Unity game 7 hours left
    VERIFIED

    ...Different stats based on this -attack, defense, health, agility -8 different characters: animals ex lion, shark, whale. Can mix and match legs, body and head of each character -unlock characters body parts by your level or purchasing in game currency -1v1 battle -Pokémon style fighting turn based -each attack uses certain amount of energy

    $598 (Avg Bid)
    $598 Avg Bid
    14 bids

    ...from host - Access control policies - User ID management - Inscription of data at rest & in motion - Physical backups policies - Capacity management - Malware monitoring/prevention/removal - Incident management - RTO & RPO with auditing and monitoring tools - Perimeter security controls - Business continuity management with IT disaster recovery - Penetration

    $10332 (Avg Bid)
    $10332 Avg Bid
    63 bids

    ...-Leaderboards win/loss record -In game currency -In game store -each user has a level -Create a character customize his head body and legs. Different stats based on this -attack, defense, health, agility -8 different characters: animals ex lion, shark, whale. Can mix and match legs, body and head of each character -unlock characters body parts

    $593 (Avg Bid)
    $593 Avg Bid
    18 bids