Kichujio

Utafutaji wangu
Chuja ukitumia:
Bajeti
hadi
hadi
hadi
Aina
Ujuzi
Lugha
    Jimbo la Kazi
    1,262 arp spoofing kazi zimepatikana, bei imeletwa USD

    I'm seeking a seasoned software tester who, equipped with an understanding of ONT and OLT, can deliver detailed, meticulous results on manual testing for several protocols on Nokia products. The project requires: - Strong knowledge of several protocols, notably RIP and OSPF, which are the principal focus of this project. Familiarity with DHCPV4, ARP, VLAN, and SNMP is also important. - High proficiency in smoke testing, regression testing, and non-regression testing. - Experience in manual testing between ONT and OLT from varying vendors, especially Nokia. - Do note that this project is for personal use. Therefore, reliable and precise work is paramount. Your commitment to the project and expertise in testing will be invaluable to achieving the desired results. Your input ...

    $11 / hr (Avg Bid)
    $11 / hr Wastani wa Zabuni
    4 zabuni

    ...able to detect faces in a live setting. - Anti-spoofing: The app should be able to distinguish between a live face and a photo or video. - Face Matching: The application should be able to compare the detected face with a reference photo, and provide a match. Your responsibilities will include: - Developing the mobile application for both iOS and Android platforms. - Integrating the necessary software components for live face detection. - Building the anti-spoofing measures to ensure the app is secure. - Implementing the face matching algorithm with the provided reference photo. Ideal Skills: - Proficient in both iOS and Android app development. - Experience with bio-metric systems or face recognition technology. - Knowledge of anti-spoofing measures. - Skilled in...

    $2578 (Avg Bid)
    $2578 Wastani wa Zabuni
    26 zabuni

    I'm in need of a skilled professional who can help me set up SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) for my Gmail account. Key Tasks: - Set up SPF: I need you to authenticate my emails using SPF to prevent spoofing and phishing attacks. - Configure DKIM: Implementing DKIM will ensure that my emails are not tampered with in transit and that my domain is not being abused by spammers. Requirements: - Proficient in email authentication protocols. - Experience with DNS settings and domain authentication. - Familiarity with Gmail's email authentication systems. - Ability to explain the process clearly and concisely. Please provide a brief overview of your relevant experience in the field.

    $113 (Avg Bid)
    $113 Wastani wa Zabuni
    30 zabuni

    I am looking for an experienced computer networking expert who can assist me in enhancing my understanding of network protocols, routing and switching, and network security. I am going to have an online at home test at 3pm EST(Eastern Standard Time) to 5pm on April 18th so I need just two hours of your time. The lect...plane - Section 5.5 (5.5.1, 5.5.2, 5.5.3, 5.5.4) - ICMP: The Internet control message protocol Section 5.6 >> The link layer and LANs: Chapter 6 - Introduction to link layer - Section 6.1 - Error detection and correction techniques Section 6.2. - Multiple access links and protocols Section 6.3. - Switched local area networks - Section 6.4 - Link Layer addressing and ARP 6.4.1 - Ethernet - section 6.4.2 - Link layer switches...

    $105 (Avg Bid)
    $105 Wastani wa Zabuni
    14 zabuni

    I'm looking for a skilled professional to conduct a network security test on our workstations using ARP poisoning techniques. The focus of this project is to identify vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someon...

    $64 (Avg Bid)
    $64 Wastani wa Zabuni
    15 zabuni

    I'm looking for an expert in email spoofing for an intriguing project. I need someone who can send an email to me that appears from a specific domain or address I provide. The ideal candidate would be someone who can disguise the email source skillfully yet ethically. The email should contain detailed, specific information. Highlights of this project include: - Using a specific domain or email address to hide the real source - Crafting an email with specific data and information You should have: - Skills in ethical spoofing methods - Understanding of email protocols - Exceptional copywriting abilities to write engaging, detailed emails. This project can be a fun challenge for those who enjoy working with specifics and puzzles within the realm of cyber communicatio...

    $123 (Avg Bid)
    $123 Wastani wa Zabuni
    44 zabuni

    I need a skilled iOS professional to develop a Swift UI mobile application centralized on face anti-spoofing. The app must include: - Facial recognition: The app should successfully recognize and capture faces. - Liveness detection: The software should be able to distinguish between an actual person and a face in a photograph, video, or mask. - Anti-spoofing detection: The application should include mechanisms to detect and prevent fraudulent face representation. Can use this Python project for what we need for the application. It needs to detect a Real face versus a fake face in real-time and if it is a Real Face, take a selfie. Please note the app is exclusive for iOS, so knowledge in the specific platform is crucial. The ideal candidate

    $1200 (Avg Bid)
    $1200 Wastani wa Zabuni
    73 zabuni

    ...Domain is through GoDaddy. The main objective of this project is to elevate my email deliverability. I'm completely new to DMARC, (Domain-based Message Authentication, Reporting & Conformance) policy, so I need someone patient, communicative, and adept to walk me through it. Job Responsibilities: - Application of DMARC policy to my Gmail DNS - Enhance email deliverability by preventing email spoofing and bolstering email security Ideal Candidate: - This job requires notable experience in handling DNS systems, particularly Gmail - Thorough understanding of DMARC policy application is a must - Excellent communication skills to explain the steps taken, in a way that is understandable to a beginner in DMARC policy. Shape the future of my email security and join me ...

    $114 (Avg Bid)
    $114 Wastani wa Zabuni
    17 zabuni

    I need a skilled network analy...skilled network analyst who can examine an ARP request and reply message within my network. The purpose of this project is network troubleshooting. - Use Wireshark - Focus on personal computers - Generate a report outlining patterns or oddities - You should be knowledgeable about detecting intrusion, maintaining network security, and problem-solving in complex network environments. Experience with the Wireshark tool is essential. Your goal is to give a clear snapshot of the situation with the ARP request and reply messages. Here are the deliverables: - ARP request and reply messages log - A detailed report about these ARP messages and potential problems Please, only bid if you have a concrete understanding of Wireshark Net...

    $33 (Avg Bid)
    $33 Wastani wa Zabuni
    5 zabuni

    I am in need of an advanced face recognition we...a url or anyway to integrate a existing PHP app) or API (by sending photo) for purposes of liveness detection. Key features for this project should include liveness detection utilizing facial movements and eye blinking as anti-spoofing measures - this will contribute to robust security. Once the identity verification is successful, the application should send the image by POST passing arguments to identify the user. Experience in creating highly secure web applications, as well as a comprehensive understanding of facial recognition technologies and anti-spoofing techniques free and open source, will be essential for the successful completion of this project. Moreover, a tested ability to integrate API features seamlessly wi...

    $75 (Avg Bid)
    $75 Wastani wa Zabuni
    9 zabuni

    ...to be developed aims to provide facial recognition and anti-spoofing capabilities to integrate into already existing applications. It will focus on being a hybrid component compatible with Flutter, allowing its use on both iOS and Android devices. Importantly, no significant effort will be required in creating an elaborate user interface, as the SDK will be integrated into another pre-existing application. Instead, the emphasis will be on ensuring that face detection, face comparison, and anti-spoofing features work optimally and are easily integrated into the main application workflow. i need somone who could work on it quick please Key Features Required: * Face detection * Face recognition * Liveness detection * Anti-spoofing capabilities Ideal Skills and Exper...

    $154 (Avg Bid)
    $154 Wastani wa Zabuni
    20 zabuni

    ...beginner-level tutorial that expands comprehension on the concept and theory underlying spoofing emails and text messages. The ultimate aim is to harness the knowledge for the purposes of ethical hacking. Key focus areas: - Fundamentals of Email and Text Message Spoofing. - Core Concepts that Govern Ethical Hacking. - Understanding the Interface between Spoofing and Ethical Hacking. A potential candidate for this project will ideally have: - Extensive experience in cybersecurity and ethical hacking. - Innovative teaching skills to simplify complex concepts. - Proficiency in course structure and creation. Your assignment is to enlighten beginners with zero experience about the theory behind spoofing, imparting them the tools necessary to utilize this know...

    $24 / hr (Avg Bid)
    $24 / hr Wastani wa Zabuni
    20 zabuni

    Creating a Bluestacks emulator like a real Android device while meeting the specified requirements involves several technical steps. Below is a step-by-step guide to achieve this: Spoofing Methodology: Develop or find an app-based or Play Store-based spoofing solution. This involves creating or finding an application that can manipulate device information such as IMEI, Android ID, device model, etc. The spoofing solution should preferably work at the system level to provide a more comprehensive emulation of a real Android device. Android Version Selection: Configure the Bluestacks emulator to run either Android 7 or Android 9. You may need to use custom ROMs or images compatible with Bluestacks for these versions. Root and Xposed Bypass: Implement a solution that d...

    $88 (Avg Bid)
    $88 Wastani wa Zabuni
    5 zabuni

    I don't accept cloning apps like appcloner. 1-Spoofing will be app based and play store based or fully system based. 2-We prefer android 7 but if not possible android 9 is fine too. 3-we need no root and no xposed solution if available 4-We need to bypass app based safetynet can use any safetynet checker app to check your settings. 5-We need an app for changing android fingerprints and hiding root, hiding xposed if you use can suggest us apps instead of creating them or you can inject codes to the 'll consider economic solutions for the apps you suggest. 6-The app name we will use is no matter for can check your settings via test apps. 7-Solution will be for multi bluestacks instances and will work for a long time.

    $557 (Avg Bid)
    $557 Wastani wa Zabuni
    36 zabuni

    As a cybersecurity enthusiast looking to deepen my understanding, I need an expert with strong skills and experience in email spoofing, CNAME record manipulation, mailing setup, and domain configuration. Key Objectives: - Successful demonstration of email spoofing for educational purposes - Setting up mailing system and DNS configuration - Detailed walkthrough of CNAME record manipulation Professional Requirements: The ideal candidate should demonstrate a comprehensive understanding of the following areas: - Email spoofing techniques - CNAME record manipulation - Mailing system setup - Domain configuration This project is purely intended for knowledge acquisition and educational purposes, therefore, any advice or demonstration should comply with ethical guidelines...

    $113 (Avg Bid)
    $113 Wastani wa Zabuni
    13 zabuni

    ...**Efforts Already Made:** - Attempted basic troubleshooting myself, including: - Reinstalling Fortnite - Changing some hardware components - Using various VPN services **Ideal Skills and Experience:** - Proficient in handling and resolving HWID bans for PC games, especially Fortnite. - Familiarity with the intricacies of gaming security and anti-cheat mechanisms. - Experience in modifying or spoofing hardware IDs securely without compromising system stability. - Knowledge of network security practices to advise on the safe use of VPNs or similar technologies to avoid future issues. - Ability to provide a step-by-step plan on how to avoid such bans in the future, emphasizing safe and fair gameplay practices. I'm looking forward to collaborating with someone who can gu...

    $151 (Avg Bid)
    $151 Wastani wa Zabuni
    7 zabuni

    I'm searching for a proficient SIP/Asterisk engineer who has ample experience in performing the following tasks: - Setting up and configuring an Asterisk server - Ensuring that the server is set up for high security and can support telemarketing or sales calls - Adding a specific function of calling and spoofing numbers, to be used exclusively for telemarketing and sales purposes Ideal skills and experience for the job: - Extensive experience with Asterisk and SIP protocols - Past-experience in setting up IVR systems - Understanding of server security measures - Familiarity with telemarketing systems Please provide a summary of your relevant work experience and your approach to this task in your bid.

    $634 (Avg Bid)
    $634 Wastani wa Zabuni
    16 zabuni
    AWS Expert Imeisha left

    ...container service, Lambda, Elastic beanstalk, S3, EFS, Storage gateway, Glacier, VPC, Direct connect, Transit Gateway, ELB, Auto Scaling, ACM, Cloud Front, Cloud Formation, Cloud Watch, Cloud Trail, SNS, SES, SQS, SWF, IAM, RDS, DynamoDB, Elasticache, Redshift, AWS Backup · Operating Systems: UNIX, Redhat LINUX, Windows · Networking & Protocols: TCP/IP, Telnet, HTTP, HTTPS, FTP, SNMP, LDAP, DNS, DHCP, ARP, SSL, IDM 6.0 and 7.0 · DevOps Tools: Puppet, Chef, Subversion (SVN), GIT, Jenkins, Hudson, Puppet, Ansible, Docker and Kubernetes · Scripting Languages: UNIX Shell Scripting (Bourne, Korn, C and Bash), Python, Perl Scripting, · Database: Oracle, Amazon Aurora, MySQL, MariaDB, PostgreSQL, Microsoft SQL Server · Version Controlling ...

    $8 / hr (Avg Bid)
    $8 / hr Wastani wa Zabuni
    1 zabuni

    ... Third-party services 4. **Which phase in the development lifecycle is threat modeling most effective?** A. Requirement gathering B. Design C. Implementation D. Deployment 5. **What does the ‘STRIDE’ methodology stand for in threat modeling?** A. Spoofing, Tampering, Repudiation, Information Disclosure, Elevation of Privilege B. Security, Tracing, Reliability, Isolation, Debugging, Encoding C. Scalability, Transferability, Reliability, Integration, Development, Efficiency D. Spoofing, Tracing, Refactoring, Information Disclosure, Denial of Service, Encryption 6. **Which of the following is not a characteristic of serverless computing?** A. Stateful applications B. Event-driven execution C. Auto-provisioning o...

    $37 / hr (Avg Bid)
    $37 / hr Wastani wa Zabuni
    3 zabuni

    ...particularly with Gmail. - Expertise in DNS management and modification. - Solid understanding of email security standards, including DKIM and DMARC. - Experience in troubleshooting and improving email deliverability. This project demands meticulous attention to detail to ensure that both DKIM and DMARC are set up correctly, not only to increase email deliverability but also to safeguard against email spoofing. Freelancers with prior experience in enhancing email security and deliverability, especially within Gmail environments, are encouraged to bid....

    $144 (Avg Bid)
    $144 Wastani wa Zabuni
    13 zabuni

    I need a camera spoofing app like the attached video. I don't need ID card feature, just live feed spoofing. I should be able to select a verification video (short clip holding the verification pose) when Tinder prompts me to verify. I need this app working on Tinder, bumble, and badoo

    $624 (Avg Bid)
    $624 Wastani wa Zabuni
    59 zabuni

    ...Internal staff D. Third-party services 4. Which phase in the development lifecycle is threat modeling most effective? A. Requirement gathering B. Design C. Implementation D. Deployment 5. What does the ‘STRIDE’ methodology stand for in threat modeling? A. Spoofing, Tampering, Repudiation, Information Disclosure, Elevation of Privilege B. Security, Tracing, Reliability, Isolation, Debugging, Encoding C. Scalability, Transferability, Reliability, Integration, Development, Efficiency D. Spoofing, Tracing, Refactoring, Information Disclosure, Denial of Service, Encryption 6. Which of the following is not a characteristic of serverless computing? A. Stateful applications B. Event-driven execution C. Auto-provisioning of resourc...

    $50 / hr (Avg Bid)
    $50 / hr Wastani wa Zabuni
    1 zabuni

    In this project, we aims to create a website or application that leverages multiple cloud servers worldwide to process user searches across various geographical regions, with a primary focus on shopping queries sourced from Google Shop...servers worldwide to process user searches across various geographical regions, with a primary focus on shopping queries sourced from Google Shopping. Users will select different locations, and their search phrases will be queried as if from those destinations, aggregating and displaying results on a single page. To begin, our Minimum Viable Product (MVP) will simulate server locations using address spoofing methods, such as those utilized by ' ', to conduct searches on Google and present consolidated results.

    $21 / hr (Avg Bid)
    Makubaliano ya Kutotoa Taarifa
    $21 / hr Wastani wa Zabuni
    44 zabuni

    Desarrrollo de un SDK para flutter para realizar el reconocimiento facial en tiempo real para aplicaciones hibridad ios y android. no se necesita hacer tanta complejidad de la interfaz ya que el sdk se integrara en otra app ya desarrollada. Solo se debe desarrollar el reconocimiento, de ids, nombres de las personas. * Desarrollado en flutter ...flutter para realizar el reconocimiento facial en tiempo real para aplicaciones hibridad ios y android. no se necesita hacer tanta complejidad de la interfaz ya que el sdk se integrara en otra app ya desarrollada. Solo se debe desarrollar el reconocimiento, de ids, nombres de las personas. * Desarrollado en flutter para reconocimiento facial 1:N. * Si es posible que el reconocimiento tenga anti-spoofing * Uso infinito en N aplicaciones...

    $505 (Avg Bid)
    $505 Wastani wa Zabuni
    29 zabuni

    ...developing an automated scheduling system for attendance marking. **What I Need:** - Development of a method to bypass or emulate fingerprint authentication effectively. - Implementation of location spoofing that satisfies app requirements without manual intervention. - Creation of an automation scheduler to perform attendance tasks at predetermined times. **Ideal Skills and Experience:** - Proficiency in mobile application development, particularly in Android or iOS platforms, depending on my device. - Experience with security features such as fingerprint authentication and GPS location spoofing. - Knowledge in automation and scripting to facilitate scheduling tasks within the application's needs. - Capability to provide a robust, user-friendly solution that integr...

    $25 (Avg Bid)
    $25 Wastani wa Zabuni
    2 zabuni

    I urgently require a savvy Instagram expert to address a pressing issue – my account is being spoofed, and it's affecting my follower count. - **Main Goal**: Implement measures to prevent altering the visual representation of my followers count. This spoofing issue presents with erratic loss and gains, not reflective of genuine follower interactions. - **Challenges**: - Addressing follower count discrepancies - Preventing unauthorized spoofing activities - **Skills Needed**: - Proficiency in Instagram's security features - Experience with social media analytics - Understanding of Instagram's algorithm regarding follower engagement - Strong problem-solving abilities related to social media issues - **Expected Outcomes**: A restored and sec...

    $542 (Avg Bid)
    $542 Wastani wa Zabuni
    19 zabuni

    I need expert assistance to bolster my email defense mechanisms. My goal is to rapidly integrate top-tier email authentication standards with my Zoho mail to minimize the risk of phishing and spoofing attacks. **Essentials:** - Implement SPF, DKIM, and DMARC protocols. - Expect completion within a week. - Requires basic Zoho configuration. **Skills Needed:** - Proficient in email security protocols. - Experienced with Zoho Suite. - Strong understanding of DNS configurations. Do you have the expertise to tighten my email security without delay? Reach out and let's fortify my Zoho mail system.

    $21 / hr (Avg Bid)
    $21 / hr Wastani wa Zabuni
    40 zabuni

    I urgently require a savvy Instagram expert to address a pressing issue – my account is being spoofed, and it's affecting my follower count. - **Main Goal**: Implement measures to prevent altering the visual representation of my followers count. This spoofing issue presents with erratic loss and gains, not reflective of genuine follower interactions. - **Challenges**: - Addressing follower count discrepancies - Preventing unauthorized spoofing activities - **Skills Needed**: - Proficiency in Instagram's security features - Experience with social media analytics - Understanding of Instagram's algorithm regarding follower engagement - Strong problem-solving abilities related to social media issues - **Expected Outcomes**: A resto...

    $496 (Avg Bid)
    $496 Wastani wa Zabuni
    24 zabuni

    I'm looking for a knowledgeable professional to assist in improving my email deliverability. Your task will involve enhancing the security and authenticity of my emails, to ensure they land safely in the recipients' inbo...legitimacy of my emails. - Google Workspace: My business currently uses Google Workspace as our email service provider. Familiarity with this platform is crucial for successful implementation of the aforementioned protocols. Skills and Experience: - Advanced understanding of DMARC, DKIM, and SPF - Proven experience with Google Workspace - Expertise in improving email deliverability and preventing spoofing. Through your work, we aim to minimize the occasions when our emails end up categorized as 'spam'. A proven track record in such impro...

    $35 / hr (Avg Bid)
    $35 / hr Wastani wa Zabuni
    20 zabuni

    ...with clients hosted on servers I rent. Several of the clients have either Mail Chimp or Constant Contact. I want to learn how to add the proper CNAME, TXT DNS settings so their emails follow new standards and compliance for delivery. I know the basics, but want to have a more clear understanding of: - Implement DKIM: Configure DomainKeys Identified Mail to validate outbound emails, preventing spoofing. - Set up DMARC: Deploy Domain-based Message Authentication, Reporting, and Conformance to specify how receiving servers handle unauthenticated emails. - Ensure Policy Enforcement: Adjust policies for strict compliance adherence and report on email traffic. - Guidance on Best Practices: Advice on maintaining and updating security protocols. - rau IDEAL CANDIDATE: - Proficient in ...

    $34 / hr (Avg Bid)
    $34 / hr Wastani wa Zabuni
    6 zabuni

    I'm seeking an AI expert to develop a system focused on the detection of partially spoofed audio signals. The objective is not merely to recognize tampering but to ensure authenticity in audio streams, possibly for security or proprietary content protection. Key Aspects of the Project: - Implement cutting-edge algorithms designed to detect audio spoofing. - Integrate the AI with existing systems for seamless operation. - Prioritize accuracy and reliability in detection. Ideal Skills: - Proficiency in AI and machine learning, especially in audio analysis. - Experience in signal processing and anomaly detection. - Ability to implement solutions that can perform with a high degree of precision. - Familiarity with real-time processing is a plus, given the lack of clarity on the e...

    $84 (Avg Bid)
    $84 Wastani wa Zabuni
    2 zabuni

    ...improve our existing project. This involves enhancing the functionality of an AI Audio Spoofing Detection System. Work primarily entails updating the current code and implementing the revamped system effectively. Here's a little more about what's needed: - Code Enhancement: You'll be tasked with refining our current system. It's been written in Python, and we expect you to be proficient in this language and ideally experienced in AI/ML projects. - System Implementation: After updating our code, your second task will be to integrate the improved system ensuring top-notch performance. Ideal candidates should possess skills and experience in Python, AI/ML, and have a sound understanding of audio spoofing detection. Demonstrated ability to handle sim...

    $519 (Avg Bid)
    $519 Wastani wa Zabuni
    9 zabuni

    I'm seeking a specialized freelancer to create a highly accurate wifi geolocation spoofing tool for Android to bolster my location privacy. Your expertise will help me keep my whereabouts concealed for personal privacy. Ideal Candidate Skills: - Proficient in Android app development - Knowledgeable in geolocation technologies - Experienced in VPN/spoofing techniques - Understanding of privacy and security protocols Requirements: - Develop an Android-compatible geolocation spoofing app. - Ensure high accuracy in spoofed locations. - Prioritize privacy and undetectability. - Offer a user-friendly interface. Expectations: - Work within set deadlines. - Communicate progress regularly. - Provide post-development support for troubleshooting. I'm looking forward...

    $129 (Avg Bid)
    $129 Wastani wa Zabuni
    9 zabuni

    Dear professionals in the field of programming and artificial intelligence, My name is Jorge Moreno, General Manager of SELLO ARP, S.L., a pioneering and leading company in quality certifications for online training programs. At SELLO ARP, we are undergoing a digital transformation process aimed at optimizing our audit system. Our goal is to implement an artificial intelligence-based solution capable of autonomously evaluating whether an online course meets our rigorous quality standards. This AI will need to perform the following tasks: Precise and Strict Analysis: Accurately and thoroughly evaluate each course, ensuring adherence to our quality standards. Constructive Feedback: Provide clear feedback and recommendations to help course providers continuously impr...

    $2184 (Avg Bid)
    $2184 Wastani wa Zabuni
    20 zabuni

    "I am seeking an ethical hacker specialized in email security. My Outlook email has been compromised, and I have currently lost all access. I suspect it might be the result of unauthorized access, phishing attempts, or email spoofing. Your job is to help me regain control of my email account. Skills and Experience: 1. Email Security: Extensive experience in ethical hacking and email security protocols. 2. Outlook Familiarity: Proficiency in Outlook platform and its security aspects is critical."

    $30 / hr (Avg Bid)
    $30 / hr Wastani wa Zabuni
    6 zabuni

    ...familiarity in the Solana ecosystem, to create a tensor bot for me. This bot will be used on the Tensor(). The bot's core functionalities will consist of: - Bidding on NFTs. - Listing NFTs for sale. -Adjusting bid according to the top bid so it doesn't get filled everytime.....like i want my bid to fill just once or twice in two three days so that tensor doesn't count my bid as spoofing. In order to accommodate my requirements, the successful freelancer should have extensive experience in bot creation, a strong understanding of decentralized exchanges, and specific familiarity with Tensor and Solana protocols. I'm also looking for a developer to design a user-friendly, web-based interface for the bot. This will ensure I can easily manage the bot's fun...

    $333 (Avg Bid)
    Il'ohusishwa Dharura
    $333 Wastani wa Zabuni
    6 zabuni

    ...Packet Tracer. Technical Skills: =============== Good understanding and knowledge of TCP/IP, OSI Layer. Practical experience in configuring in CISCO 800, 1900, 2900, 2800, 2800, ISR 4300, 4100, ASR 1000 series and catalyst 2960, 9300, layer3 switches, nexus switch. #Static, RIP, RIPv2, EIGRP, OSPF, OSPFv3 and BGP #VLAN, VTP, STP, HSRP, GLBP, VRRP, SPAN, RSPAN, DHCP Snooping, Dynamic ARP Inspection, ARP ACL. #CISCO nexus 9k and CISCO ACI solution like BD, VRF, EPG, Tenant, L4-L7 graph etc. #ACL, NAT, Transparent Mode, Multiple context and Failover (Active/Active, Active/Standby) Site-to-Site VPN, Remote Access VPN and SSL VPN, Intrusion policy, AVC, Malware & File Policy etc in Cisco ASA, Next Generation Firewall and Firepower Management Center (FMC) #F5 BIG-I...

    $30 (Avg Bid)
    $30 Wastani wa Zabuni
    1 zabuni

    ...establishing these authentication protocols. Here's what I need from you: - **DKIM Configuration**: Set up DomainKeys Identified Mail (DKIM) records to ensure that the emails sent from my domain are authenticated and trusted by recipient email servers. - **DMARC Implementation**: Implement Domain-based Message Authentication, Reporting & Conformance (DMARC) policies to protect my domain against email spoofing and to align with authentication standards. - **Compliance Check**: Verify that the DKIM and DMARC implementations are correct and meet the necessary compliance standards. IDEAL SKILLS AND EXPERIENCE: - Experience with 123 reg email services - Background in email security and authentication protocols - Proven track record in improving email deliverability throug...

    $158 (Avg Bid)
    $158 Wastani wa Zabuni
    26 zabuni

    ...user-friendly interface that allows users to easily navigate and interact with the scraped information. Scalability: Design the system to be scalable, accommodating potential changes to the Gig platform and handling a growing user base. What needs to be done: Full website design (Front-Back End) Dashboard for Admin Server configuration Payment Integration Bot Development (Script) Geolocation Spoofing Web App Ideal Skills and Experience: - Experience in web scraping and data extraction. - Proficiency in programming languages such as Python or Java. - Knowledge of HTML and CSS for website design. - Familiarity with scraping tools and libraries such as Beautiful Soup or Scrapy, Selenium. - Experience in developing systems with real-time functionality. - Knowledge of secure authe...

    $33 / hr (Avg Bid)
    $33 / hr Wastani wa Zabuni
    76 zabuni

    ...- the persons, who will later test your work, are typically not engineers. They have a good understanding of simulating or entering sensor values. - based on this sensor values, the actors shall trigger and display on the UI. E.g. if you have simulated PIR, the persons shall activate a PIR detection duration and amout. So they can identify how sensitive the PIR requires to be. - if you assume a ARP-based presence detection, the users, shall be able to trigger a "smartphone" wifi logon - if the presence is detected, the corresponding actor shall be triggered and be visualized to the end user. Timeline: - this is for now a setup project of the simulator for our premise. Based on the pace and quality of delivery we will like to integrate you into the process of implementi...

    $19 / hr (Avg Bid)
    $19 / hr Wastani wa Zabuni
    14 zabuni

    I'm currently in need for assistance in the setup of DKIM, DMARC, and SPF records for multiple domains (between 2 to 5), specifically on Office 365. The project's details are as follows: 1. DKIM, DMARC, SPF Setup: A professional who can efficiently set up these email authentication methods, ensuring all our outgoing emails are verified — curtailing email spoofing and phishing attacks. 2. Policy Development: I'm not sure whether there's an existing policy for DKIM, DMARC, and SPF or a new one will need to be created, hence part of your role would involve assessing the current state and subsequently formulate a suitable policy if required. Ideal skills and experience: - Proficiency with Office 365 email service, godaddy, active campaign, wordpress - An u...

    $63 (Avg Bid)
    $63 Wastani wa Zabuni
    26 zabuni

    I am in need of qualified professionals who possess deep expertise in litigation support and an authoritative understanding of researching law cases. Specifically, I am currently in the midst of a litigation process where I require related assistance. Key Responsibilities: - Facilitating evidence collection: Careful and accurate data collection is paramount in...critical, hence having previous experience in doing so would be beneficial. Please note, this project may require comprehensive knowledge about the law – experienced legal professionals (lawyers, paralegals etc.) are especially encouraged to bid. Task: We need to find 3 or 4 or more trials of cases where docusign was used to enforce contracts fraudlently signed by illicitly accessing emails and ip spoofing and or th...

    $40 (Avg Bid)
    $40 Wastani wa Zabuni
    27 zabuni

    ...project is Force Images and Videos to the android Camera spoofing, where the application should be able to spoof the camera in real-time while using the camera on an Android smartphone. Ideal Skills and Experience: - Strong knowledge of Android development and camera functionality - Experience with image and face detection and recognition algorithms - Proficiency in image processing and manipulation - Familiarity with real-time video processing and rendering - Ability to integrate the camera spoofer functionality seamlessly into the Android smartphone's camera app - Prior experience in developing similar camera spoofing applications is a plus The application should be user-friendly, reliable, and able to deliver high-quality face spoofing results. Additional...

    $391 (Avg Bid)
    $391 Wastani wa Zabuni
    32 zabuni

    ...the following: - Real-time face detection: It should have the capability to immediately detect and recognise faces saving users time during the login process. - High accuracy: The system must ensure precision in identifying the correct user and reduce the possibility of false identifications. - Robust against spoofing attacks: As the app will be dealing with sensitive financial information, it is vital to ensure the facial recognition software is resilient against potential spoofing attacks. The ideal freelancer should have demonstrated experience in developing similar mobile applications, notably with secure facial recognition features. A comprehensive understanding of security measures to uphold user confidentiality and protect user data is paramount. Proficiency in ...

    $45931 (Avg Bid)
    $45931 Wastani wa Zabuni
    50 zabuni
    DNS Records Imeisha left

    Job Details: DKIM and SPF record for all Domains also at the Plesk DNS Template for may future domains. Secure with them the email spoofing problem

    $25 (Avg Bid)
    $25 Wastani wa Zabuni
    1 zabuni

    Jobdetails: make DKIM and SPF record on all Domains because email spoofing problems. Change the DNS Template on Plesk to have those problems dont at the future

    $250 (Avg Bid)
    $250 Wastani wa Zabuni
    1 zabuni

    ...and in a voice call you will guide me all options available to configure. You will advise me to make things available to setup our test environment before starting practical learning. Here are menu options that I can see in HP and we will be exploring: - Device â—‹ Port Management â—‹ Port Mirroring â—‹ RMON â—‹ SNMP - Network â—‹ VLAN â—‹ VLAN Interface â—‹ MSTP â—‹ Link Aggregation â—‹ LACP â—‹ LLDP â—‹ ARP Management â—‹ ARP Anti Attack â—‹ IGMP Snooping â—‹ MLD Snooping â—‹ IPv4 Routing â—‹ DHCP â—‹ Service â—‹ Diagnostic Tools - Authentication â—‹ 802.x â—‹ Port Security â—‹ AAA â—‹ Radius - Secuirty â—‹ Port Isolate Group â—‹ Authorized IP â—‹ Loopback Detection - QoS â—‹ Time Range â—‹ ACL IPv4 and more What I want to setup: I have 2 Static IPs on single Ethernet connection from ISP, I want to build separate VLA...

    $40 (Avg Bid)
    $40 Wastani wa Zabuni
    13 zabuni

    The purpose of this activity is to help you enumerate and model the security of your system architecture by looking at it from the point of view of threats. According to the Microsoft Threat Modeling methodology, we treat the word "threat" as a class of exploits. They fall into the following categories (STRIDE): • Spoofing • Tampering • Repudiation • Information Disclosure • Denial of Service • Elevation of Privilege ACTIVITY Today, let's model a cloud-based storage system. Store a file in a folder on your desktop, and it gets immediately uploaded to the server. Users can share folders, allowing other users or the public view the files. The context level diagram of the file sharing system is represented in Figure 1: Context Level Dia...

    $60 (Avg Bid)
    $60 Wastani wa Zabuni
    2 zabuni

    ...Gmail account so that I can send emails from my domain, on my Willdesk. Skills and Experience Needed: - Prior experience in setting up SPF and DKIM - Knowledge of DNS settings and email authentication protocols - Familiarity with Gmail's email service provider Project Requirements: - Set up SPF (Sender Policy Framework) for my Gmail account to ensure email deliverability and prevent spoofing - Configure DKIM (DomainKeys Identified Mail) authentication to verify the authenticity of outgoing emails from my domain - Provide clear instructions and guidance on how to implement the necessary DNS changes for SPF and DKIM setup - Ensure that my domain, , is correctly configured to send emails from my willdesk account Please note that I have some knowledge of SPF and DKIM but re...

    $28 (Avg Bid)
    $28 Wastani wa Zabuni
    5 zabuni