Tcp syn attack ns2Kazi

Kichujio

Utafutaji wangu
Chuja ukitumia:
Bajeti
hadi
hadi
hadi
Aina
Ujuzi
Lugha
    Jimbo la Kazi
    2,000 tcp syn attack ns2 kazi zimepatikana, bei imeletwa USD

    I'm having some issues with my network connection dropping and I need an expert in network analysis, specifically using Wireshark, to help me troubleshoot. Specifically, the project will entail: - Analyzing TCP traffic - Identifying and addressing the root cause of the persistent connection disruptions - Providing detailed reports on findings and recommendations for solutions Ideal skills and experience for this job: - Extensive experience with Wireshark and other network analysis tools - Knowledge of TCP - Expertise in troubleshooting connection drops - Strong report and documentation skills If you've successfully performed similar network troubleshooting tasks in the past, I'd love to hear from you.

    $140 (Avg Bid)
    $140 Wastani wa Zabuni
    4 zabuni

    ...specific expertise in creating intuitive user interfaces and seamless user experiences. The task at hand involves crafting the UI/UX for a cutting-edge platform dedicated to attack surface management. Project Overview: Our goal is to develop a user-friendly platform that enables efficient management of attack surfaces, empowering users to identify, assess, and mitigate potential vulnerabilities effectively. As such, we require a designer who can translate complex functionalities into visually appealing and easy-to-navigate interfaces. Key Requirements: - Strong background in UI/UX design - Experience designing for attack surface management or other cybersecurity platforms - Proficient in creating interactive visualizations, intuitive navigation, and real-time moni...

    $442 (Avg Bid)
    $442 Wastani wa Zabuni
    92 zabuni

    I am in need of a professional who can efficiently handle an RS485 device that requires reconfiguration. The scope of this project includes: - The procurement of a ready-made RS485 to TCP/IP Ethernet serial server converter - Installation and configuration of the converter with the RS485 device - Ensuring smooth and effective communication between the RS485 device and the TCP/IP Ethernet serial server Preferred skills and experience: - Proficient in working with RS485 devices - Strong knowledge of TCP/IP Ethernet serial servers and hardware programming - Prior experience with Modbus TCP - Familiarity with Arduino, Raspberry Pi, and ESP8266 Your responsibility will strictly be focused on setup and reconfiguration; no modifications on the RS485 device will be...

    $125 (Avg Bid)
    $125 Wastani wa Zabuni
    18 zabuni

    I need an expert in Natural Language Processing, specifically in sentiment analysis and text classification, to assist with my project. While I haven't chosen a programming language for this task, I am open to suggestions. It's currently unclear if I will need a pre-trained or custom NLP model, so both options should be explored. Best fit for the job would include: - Extensive experience in NLP, especially sentiment analysis and text classification - Ability to provide insights on different programming languages for the task - Experience with both pre-trained and custom NLP models.

    $330 (Avg Bid)
    $330 Wastani wa Zabuni
    34 zabuni

    I'm in need of an expert to perform important adjustments on my Fortigate router. Your main task would be to: - Open both TCP and UDP ports. - Focus specifically on the common email ports, IMAP, POP3, and SMTP – essential for a smooth function of our mail server. - Additionally, set up our mail server in the DMZ. The ideal freelancer for this project should have substantial knowledge and experience in network and server configuration, especially with Fortigate routers and email servers. Familiarity with DMZ setup is also required. Your ability to ensure the privacy and security of our mail server in the DMZ setup is paramount. we have recently relocated office and need to pass through traffic to our mail/webserver

    $103 (Avg Bid)
    $103 Wastani wa Zabuni
    9 zabuni

    My current project involves creating a GSM Man-In-The-Middle (MITM) system using OpenBSC and OsmocomBB. I need an expert to help me complete this project by intercepting calls and messages. Key requirements include: - Extensive knowledge and experience using OpenBSC, OsmocomBB and USRP B210 - Ability to work with the Motorola C118 phone - Solid understanding of MITM attack methodologies and GSM vulnerabilities - Familiarity with network security and testing procedures - Ability to provide a basic setup and operation guide upon completion The project is already in partial implementation stage, and I need someone to help finalize it, and ensure it can effectively intercept calls and messages. This will involve a combination of software and hardware work, so experience in both areas ...

    $2396 (Avg Bid)
    $2396 Wastani wa Zabuni
    15 zabuni

    ...problem-solving skills - Extensive experience in dealing with timeout errors during initialization Error Message: ``` ResourceInitializationError: unable to pull secrets or registry auth: execution resource retrieval failed: unable to retrieve ecr registry auth: service call has been retried 3 time(s): RequestError: send request failed caused by: Post "": dial tcp 3.17.137.97:443: i/o timeout. Please check your task network configuration. ``` Resources: - Everything is managed via Terraform - Flowlogs and Cloudtrail are already configured The goal is to clear these timeout errors and to ensure smooth initialization of the ECS task. Your role would be to identify the root cause of the issue, recommend an action plan, and potentially implement the solution

    $15 - $25 / hr
    Imefichwa
    $15 - $25 / hr
    6 zabuni

    I'm currently in an urgent situation where my website has seemingly vanished and a malware infection has been detected. The public PHP file has been modified which I discovered within the last 24 hours. Unfortunately...last 24 hours. Unfortunately, I have not been able to recover any data or files from my website. I'm looking for a skilled specialist with experience in: - Website restoration - Malware removal and prevention - PHP recovery and security The ideal freelancer would be someone who can help recover my lost data, restore the functionality of my website, mitigate the effect of the current malware attack, and ensure the robust constitution of the website to prevent future breaches. Quick turnaround is of essence due to the critical nature of this situation.

    $42 (Avg Bid)
    $42 Wastani wa Zabuni
    23 zabuni

    ...on network technologies, best practices, and troubleshooting techniques. Qualifications: Bachelor’s degree in Computer Science, Information Technology, or a related field (or equivalent experience). X years of experience working as a network engineer, with a proven track record of designing and managing complex network infrastructures. Expertise in network protocols and technologies, including TCP/IP, VLANs, OSPF, BGP, MPLS, VPNs, and DNS. Hands-on experience with network hardware from leading vendors such as Cisco, Juniper, Palo Alto Networks, and Arista. Strong understanding of network security principles, including access control, encryption, authentication, and security policies. Certifications such as Cisco Certified Internetwork Expert (CCIE), CompTIA Network+, or Ce...

    $688 (Avg Bid)
    $688 Wastani wa Zabuni
    10 zabuni

    I am in need of a proficient C/C++ Network Programmer, two key aspects of this project are extensive knowledge of TCP/IP and HTTP protocols and socket programming. An ideal candidate must be experienced in implementing these skills on Windows, Linux, and MacOS. Key Responsibilities: - Socket programming - Familiarity with TCP/IP & HTTP - Implement RSA Network Security on client server model - Cross-platform compatibility I encourage experienced network programmers with a solid understanding of these platforms and technologies to bid. Having experience from previous similar projects will be advantageous.

    $19 / hr (Avg Bid)
    $19 / hr Wastani wa Zabuni
    32 zabuni

    I'm looking for a skilled developer well-versed in both NodeJS / javascript and networking to create a TCP proxy server client for my project. Key Features: * The TCP proxy server client must support HTTP/HTTPs. * Ensure it's cross-compatible and functions seamlessly on both Android and iOS and desktop. Additional Requirements: * The client should have strong capabilities to handle multiple simultaneous connections. * Previous experience in load balancing and traffic monitoring would be a definite advantage. Please bid only if you have extensive experience with both Flutter and networking. Your bid should include any similar projects you've completed. *More details about the project: I will include both a golang & java based client side proxy server fo...

    $179 (Avg Bid)
    $179 Wastani wa Zabuni
    35 zabuni

    ...network simulation and coding to assist with my research project. My project is based on a computer network, WSN specifically, which needs to be accurately simulated and further customized. The network topology itself may be open to your suggestions, and I'm looking forward to discussing this in detail. Ideal Skills and Experience: - Expertise in Computer Network Simulation, specifically with NS2/NS3 - Strong coding skills to implement new variables into the simulation - Experience in research-oriented projects would be a plus. The successful completion of this project will involve developing a realistic network simulation, and then implementing custom variables to test specific research-related scenarios. The ability to create a detailed, efficient, and accurate simul...

    $221 (Avg Bid)
    $221 Wastani wa Zabuni
    4 zabuni

    It's unfortunate we've found ourselves under a malware attack on our WordPress website. We believe it's due to code injections, though we can't rule out other possibilities. As a result, we're looking to onboard a professional with relevant experience in swiftly identifying and effectively resolving such issues. Skills & Experience: - Proven experience in dealing with WordPress malware attacks - Proficient in identifying and resolving code injections - Strong security strategy for preventing future attacks Your application should demonstrate your previous experience in handling similar situations. Evidence of your ability to work quickly and effectively is crucial to this emergency! Let's secure our website and prevent this from happening again....

    $419 (Avg Bid)
    $419 Wastani wa Zabuni
    153 zabuni

    I'm looking for a skilled developer well-versed in both Flutter and networking to create a TCP proxy server client for my project. Key Features: * The TCP proxy server client must support HTTP/HTTPs. * Ensure it's cross-compatible and functions seamlessly on both Android and iOS and desktop. Additional Requirements: * The client should have strong capabilities to handle multiple simultaneous connections. * Previous experience in load balancing and traffic monitoring would be a definite advantage. Please bid only if you have extensive experience with both Flutter and networking. Your bid should include any similar projects you've completed. *More details about the project: I will include both the proxy server and the client side that I made in golang. The ...

    $165 (Avg Bid)
    Il'ohusishwa
    $165 Wastani wa Zabuni
    18 zabuni

    ...y Prometheus. Adiciona el "Bastión" como recurso a ser monitoreado. 2. Configuración de Conectividad y Seguridad con Ansible: Interfaz oym: En el "Bastión", solo permite acceso al puerto 22. Interfaz servicio: Habilita la comunicación entre el "Bastión" y el "Servidor de Monitoreo" para el uso de puertos específicos del servicio de monitoreo. Interfaz backup: Solo permite acceso al puerto 5040/TCP. Permite el tráfico desde el "Bastión" para ejecutar un script de respaldo diario en el "Servidor de Monitoreo". 3. Implementación de Respaldos con Script y Log: Implementa un script en el "Bastion”, que realice un respaldo diario de una carpeta y archi...

    $148 (Avg Bid)
    $148 Wastani wa Zabuni
    5 zabuni

    I'm in need of a professional who can assist me in increasing the TCP traffic on our AS number as part of our network optimization plan. Key Project Details: - Purpose: The goal of this project is to optimize our network through increasing TCP traffic on our AS number. - Content: The traffic will consist of web applications, so the professional must have experience with handling high traffic loads for such content. Ideal Skills and Experience: - Profound knowledge and experience in network optimization. - Proven background in generating high TCP traffic. - Experience with load testing and scaling web applications. - Excellent understanding of Content Delivery Networks (CDN). - Ability to deliver a significant increase in traffic, more than 100%. - Strong commun...

    $2699 (Avg Bid)
    $2699 Wastani wa Zabuni
    8 zabuni

    ...communication and document scanning. Key Functionalities: - **Network Communication**: The Windows service should support both TCP/IP and HTTP/HTTPS protocols for flexible and reliable data transfer. - **Document Scanning**: This involves two distinct functionalities: - *Physical Document Scanning*: The service should be able to interface with a scanner device to scan physical documents and process them. - *Web Application Document Scanning*: The service should be able to scan documents from a web application, processing them as required. Ideal Skills: - Proficient in C# and Windows Service Development - Strong understanding of network communication protocols, particularly TCP/IP and HTTP/HTTPS - Experience with integrating and controlling scanner devices from with...

    $2 - $22 / hr
    Imefichwa
    $2 - $22 / hr
    8 zabuni
    Trophy icon Health & Safety Poster Creation Imeisha left

    I'm in need of a graphic designer who can draft a visually engaging and easy-to-understand training poster focused on safety specific to the security team Key features include: - The focal point: Highlighting Pre Attack Indicators (PAINs) . - Target audience: The security team - Content: A visual reminder of the different PAINs (Pre Attack Indicators) that they should be aware of when working. Company Name: 3D Academy of Applied Security The poster will be blown up and posted in our office (36 inches high x 24 inches wide) Would imagine it may be easier to have different squares for each PAIN, but will leave that up to designer As a bonus, would like to have something consistent on 2 pages that could be incorporated into a PowerPoint presentation. The righ...

    $183 (Avg Bid)
    Imehakikishiwa
    $183
    151 wasilisho

    I need a cybersecurity expert who can conduct penetration testing and data encryption tasks for me. Key Tasks: - **Penetration Testing:** This involves assessing the security of a system by simulating an attack from an external source. You need to be able to identify vulnerabilities, weaknesses and potential threats. I'm not sure whether I need comprehensive testing of my system or a specific target, so you should be able to advise on this. - **Data Encryption:** I would also need assistance with encrypting my data. This is crucial to protect sensitive information from unauthorized access. Reporting: - **Reporting Detail:** After the penetration testing and data encryption tasks are completed, I require a comprehensive report. This should include both an executive summary...

    $854 (Avg Bid)
    $854 Wastani wa Zabuni
    12 zabuni

    I am in need of a proficient C/C++ Network Programmer, two key aspects of this project are extensive knowledge of TCP/IP and HTTP protocols and socket programming. An ideal candidate must be experienced in implementing these skills on Windows, Linux, and MacOS. Key Responsibilities: - Socket programming - Familiarity with TCP/IP & HTTP - Implement RSA Network Security - Cross-platform compatibility I encourage experienced network programmers with a solid understanding of these platforms and technologies to bid. Having experience from previous similar projects will be advantageous.

    $30 / hr (Avg Bid)
    $30 / hr Wastani wa Zabuni
    21 zabuni

    I'm in need of an experienced Java Developer with an emphasis in networking. This project focuses on establishing efficient and smooth client-server communications via TCP/IP protocol. Key Project Features: - Client-Server Communication: You'll design a robust system for interaction between clients and servers. Skills and Experience: - Strong Java development skills: proficient with Java-based network functions. - Extensive experience in client-server networking. - Knowledge and understanding of TCP/IP protocol and how to apply it to real-world client-server communications. Your application to this project signifies your confidence in creating a Java project centered around complex networking tasks. Thank you for considering my project.

    $141 (Avg Bid)
    $141 Wastani wa Zabuni
    37 zabuni

    ...input / output material flow within our equipment should also make data available on MODBUS TCP. The successful candidate should: - Design and implement a solution for: - Data Monitoring: and making it available real-time to align with our process control requirements. - Unit Load Material Handling: a process whereby the equipment handles load capacities one unit at a time. - Monitor key performance data, specifically: - Speed: The rate of movement of our material in the process. - Load Capacity: The equipment's capacity to hold materials. - Material in process: To maintain an efficient flow and avoid operational lags. - Have experience with Delta PLC, HMI, and MODBUS TCP protocols. Proficiency in control system engineering, programming and...

    $312 (Avg Bid)
    $312 Wastani wa Zabuni
    12 zabuni

    I'm going to attack Freelancer and expose how you guys are crooks. The entire Freelancer community will know who you are. I give you 72 hours to give me my paid work. I paid you, and I have the receipts, but as of today, I can't get anything for work. It's a scam. I will shout your name and your techniques very loudly

    $266 (Avg Bid)
    $266 Wastani wa Zabuni
    1 zabuni

    ...with crafting or construction businesses. - Be proficient in graphic design software. - Understand brand identity. - Have a good sense of typography and alignment. - Have a good color sense. Tips on getting the bag: Creativity, simplistic, Original, with a touch of pride. Add a simple touch of usa or florida flag element Simplistic is the foundation.. U got 13 days so please research..plan...and attack this with patience. I m taken my time and will hire to create brand stuff in future. Super Tip...if ur good at old vintage looking authentic wooden signs from old westerns(without bullet holes please) then u will have my attention. Carpenters dont use actual trees or logs or axes etc... Thats more arborists...or landscaping.. We use by products of wood..plywood..2*4s etc... If...

    $100 (Avg Bid)
    Imehakikishiwa
    $100
    1596 wasilisho

    ...paper discuss the current event you have selected, specifying the counterterrorism activity that was carried out and the specific terrorist activity that was directly prevented from being carried out, as a result of the actions of the individuals involved in the prevention of the attack. Include a summary of the major points presented in the selected news source, including what activity was prevented, how that activity was prevented, who was involved in preventing the attack, and who attempted to perpetuate the attack. Close by discussing the global efforts in counterterrorism and how these efforts affect the presence of terrorist activity. Include sub-headers for all sections of your paper. Include at least five (5) scholarly sources, three of which must be peer-re...

    $73 (Avg Bid)
    $73 Wastani wa Zabuni
    52 zabuni

    ...Management: Manage and display user statuses such as online, offline, busy, invisible, etc. o Message Transfer: Implement message sending and receiving between users, including text, images, audio, video, and other formats. o Data Storage: Supports more intuitive viewing of accounts under groups. o Network Communication: Manage network connections between clients and servers, usually using TCP/IP protocol, sometimes combined with technologies such as HTTP/WebSocket. o Push Notifications: Notify users of new messages when the application is not running in the foreground. o Encryption & Security: Ensure the security of message transmission, common encryption technologies include TLS/SSL, end-to-end encryption, etc. o Synchronization: Synchronize messages and u...

    $1444 (Avg Bid)
    $1444 Wastani wa Zabuni
    74 zabuni

    I need to create a console project in C# Net Framework that I can listen the data from an equipment Mindray BC-20s and / or BC-30s. Using Ethernet configuration and HL7. The data that comes from the clinical equipment needs to be save it on txt file. The configuration is using TCP/IP and I need - Port for every equipment Any questions? I made a console project but I could no be able to get the results from those equipments. I need a person who had been working with HL7.

    $145 (Avg Bid)
    $145 Wastani wa Zabuni
    25 zabuni

    Posiadam kod gry klient i serwer ktory wysyla i odbiera dane, komunikuje sie przez protokuÅ‚ TCP. Chcialbym przepisac komunikacje tak aby client i serwer dzialalo tylko na UDP, interesuje mnie przepisanie tak aby nie bylo problemów z dziaÅ‚aniem.

    $132 (Avg Bid)
    $132 Wastani wa Zabuni
    5 zabuni

    I'm in need of a skilled Nginx expert to help me configure a server for my application. Some key details about the project are as follows: - I'm looking to implement Load Balancing and SSL termination for my TCP traffic. - On the UDP side, I would like to have the server configured for Streaming Media and DNS Resolving. In addition, the Nginx should be set up on a Linux-based operating system. Ideal skills for this project include: - Proficiency in Nginx configuration and management - Strong understanding of TCP and UDP protocols - Experience with Load Balancing, SSL, Streaming Media and DNS - Linux server administration I'm open to suggestions for the best approach in setting up these features, so good communication and problem-solving skills are a...

    $27 / hr (Avg Bid)
    $27 / hr Wastani wa Zabuni
    5 zabuni

    I'm looking for a tutor who can guide me through my college course on computer organization. This course covers a wide range of topics including permission models, system architecture, concurrency, virtual memory, cryptographic primitives, and TCP/IP networking. I need a tutor who can help me understand difficult concepts and prepare for exams. Key Requirements: - Should be knowledgeable in all the topics listed. - Ability to explain past exam solutions. - Experience tutoring in computer organization or related subjects. - Able to communicate via instant messaging for convenience. - help in exam preparation Here is a list of all the topics covered in this course Building and Introduction - Basics of .o, .a, .so files, dynamic/static linking, and makefiles. Accounts and Permi...

    $128 (Avg Bid)
    $128 Wastani wa Zabuni
    8 zabuni

    Game Requirement Character : Male, full animation: Idle, run, attack, jump, die… Provide full UI and Game Asset Provide full sound and effect Number Map: 8 Number Boss: 8 Enemy for each map: 4-5 ( with full animation: idle, run, attack, die… ) Provide Game icon. Intergrate with Admob in game Intergrate shop IAP in game. Game can run on Mobile and PC also. Game resolution: Hozirontal 1920x1080

    $25 (Avg Bid)
    $25 Wastani wa Zabuni
    7 zabuni

    I am currently in need of a freelancer proficient in Omnet++ VEINS network simulator. The backbone of the project is Artificial Intelligence (AI), with a specific interest in: - Network Protocols Simulation - IoT Devices Interconnection - Performance Analysis I am also in need of simulation for specific network protocols: - TCP/IP - UDP Whilst applicants should be experienced in network simulators, a strong background in Omnet++ and AI is a must. It is paramount that the freelancer can effectively integrate AI into the simulation, and that they are capable of interconnecting IoT devices. Studies or experience in computer networking would be advantageous.

    $516 (Avg Bid)
    $516 Wastani wa Zabuni
    31 zabuni

    Software will listen to some tcp messages. When the message arrives, decode the message. Write the encoded message in a mysql table. Write the decoded information in 2 tables. Total fields to be decoded is less than 10. We provide the NodeJs version (attached) of the decoder, you will have to make the python version

    $83 (Avg Bid)
    $83 Wastani wa Zabuni
    20 zabuni

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $29 (Avg Bid)
    $29 Wastani wa Zabuni
    8 zabuni

    ...the time the systems administrators discovered the nature of the attack, it was largely too late. Critical files all across the AvantPharm network had been encrypted and were unusable. To make things worse, the backup system in place was unmonitored and had been failing backup jobs for months, so they did not have a reliable way to restore the encrypted data. AvantPharm narrowly averted complete disaster by paying the attackers one of the largest ransomware payments in history; 25 million dollars. However, they nearly lost the business when the attacker took 2 full weeks to return control of their data as well, so the impact was further damaging to profitability and reputation. In the end, the company barely weathered the attack and resumed operations at reduced capacity o...

    $19 (Avg Bid)
    $19 Wastani wa Zabuni
    95 zabuni

    I require a reliable and experienced developer to assist me in implementing a Content Security Policy (CSP) in my JavaScript application. Key Details: - Purpose: The primary goal of this CSP implementation is to prevent Cross-Site Scripting Attacks within the application. - Target Sources: The CSP should be configured to allow only self-hosted scripts...permitted. - Integrate the CSP seamlessly with the existing application architecture, ensuring no disruptions in functionality. Ideal Skills and Experience: - Proficiency in JavaScript and web application security. - Prior experience with Content Security Policy implementations. - Understanding of and its usage in specifying content sources. - Knowledge of common Cross-Site Scripting (XSS) attack vectors and mitigation strategies.

    $12 (Avg Bid)
    $12 Wastani wa Zabuni
    12 zabuni
    Trophy icon Sermon Series Graphic Design Imeisha left

    Our church will be starting a new sermon series titled: A Synoptic View of Jesus. I'd like to get some different sermon series graphics for it. This is some notes from the Pastor: Syn = together with Optic = seeing Synoptic Gospels = Gospels with a similar view of Jesus. So your graphic might have something with eyes in it. The Sermon Series graphic should include the title text A Synoptic View of Jesus. Feel free to get creative, as I do not have much other direction for the sermon series graphics. Past sermon series I have been able to find sermon series graphics that I could modify to work with his series, but this time I was not able to find one. I would like the Illustrator or Photoshop file format for the file I choose as the winne...

    $50 (Avg Bid)
    Il'ohusishwa Imehakikishiwa
    $50
    57 wasilisho

    ...Layer, Chapter 2 from the text book. - Please look at the applications and note whether they are client-server based or peer-to-peer - Note which kind of transport layer are they using. You don't need to memorize message formats etc. No programming questions will be given on the exam. >> Transport Layer - Chapter 3 from the textbook: - Please look at basic functionality of UDP and TCP, - shown in fields of their headers, basic segment structure and connection establishment. Which one is fair, which one has congestion control? >>Network layer: Data plane: Chapter 4 - Overview of the network layer - 4.1. (all subsections within this section) - What is inside of router - 4.2 with 4.2.1 - The Internet Protocol IP: IPv4, Addressing, I...

    $105 (Avg Bid)
    $105 Wastani wa Zabuni
    14 zabuni

    ...vulnerabilities, severity levels, and recommended remediation measures. Collaborate with our development team to prioritize and address security issues. Requirements: Proven experience in penetration testing for Magento 2 websites and AWS environments. Proficiency in industry-standard tools and techniques for vulnerability assessment. Strong understanding of web application security principles and common attack vectors. Excellent communication skills. Deliverables: Detailed penetration testing report. Regular progress updates and communication. How to Apply: Please submit your proposal with details of your experience, approach to penetration testing, and proposed timeline and cost estimates. Additionally, include any relevant certifications or references. Thank you for your i...

    $178 (Avg Bid)
    $178 Wastani wa Zabuni
    21 zabuni

    We recently experienced a malware attack on our system and we're seeking an expert who can ensure this doesn't happen again in the future. We don't require data recovery services; our main priority is to make sure it never happens again. Ideal candidates should possess: - In-depth experience in counteracting malware attacks - Mastery in various security domains such as network, application, and endpoint security - Proven track record in enhancing system security

    $127 (Avg Bid)
    $127 Wastani wa Zabuni
    19 zabuni

    I need an effective solution to manage and balance DNS traffic over UDP and TCP on my Linux server. The solution needs a graphic user interface for easy management and real-time monitoring. This project suits professionals with experience managing backend servers, programming Linux interfaces, as well as knowledge of TCP/UDP DNS traffic load balancing on Linux Servers. PROJECT IS MARKED URGENT

    $148 (Avg Bid)
    Il'ohusishwa Dharura
    $148 Wastani wa Zabuni
    14 zabuni

    EL bot debe poder operar en varios DEX usando flashloans como caracteristica pricipal, las oportunidades de las transacciones las debe buscar en los mempool de los contratos inteligentes de cada DEX. Tambien debe poder hacer frontrunning de las transsacciones The bot must can operate on many DEX using flashloans like principal function, the oportunities of transaction have to l...caracteristica pricipal, las oportunidades de las transacciones las debe buscar en los mempool de los contratos inteligentes de cada DEX. Tambien debe poder hacer frontrunning de las transsacciones The bot must can operate on many DEX using flashloans like principal function, the oportunities of transaction have to look for in the mempool of the Contratcs of the DEX. must can do frontrunning,and sandwich ...

    $149 (Avg Bid)
    $149 Wastani wa Zabuni
    21 zabuni

    What is the IP address and TCP port number used by the client computer (source) that is transferring the file to To answer this question, it’s probably easiest to select an HTTP message and explore the details of the TCP packet used to carry this HTTP message, using the “details of the selected packet header window”.

    $7 / hr (Avg Bid)
    $7 / hr Wastani wa Zabuni
    3 zabuni

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $12 (Avg Bid)
    $12 Wastani wa Zabuni
    6 zabuni

    I need a com...comprehensive PowerPoint presentation comparing various types of Internet-based end-to-end protocols. Your job will be to research and compile the most relevant information about each protocol. Highlight the unique characteristics and use-cases of each, and facilitate understanding through clear and engaging slides. Key responsibilities will include: - Comprehensive research on Internet-based UDP,TCP and RPCend-to-end protocols - Bringing forward key differences and similarities among them - Creating visually appealing and informative slides Ideal skills and experience: - Strong in Internet protocols and networking - Experience in creating professional PowerPoint presentations - Excellent research skills - Ability to present complex information in an easy-to-unde...

    $14 (Avg Bid)
    $14 Wastani wa Zabuni
    24 zabuni

    I'm seeking the expertise of a data scientist or machine learning engineer to develop a model for classifying various types of attacks on a KDD dataset. The ideal candidate will have extensive knowledge in the use of autoencoders for feature extraction and GRU models. Key project elements include: * Professionals will need to implement an autoencoder for feature extraction with the core goal of reducing data dimensionality. Prior experience in working with high-dimensional data and in deploying autoencoders is necessary. * Subsequently, the system built should be capable of classifying Denial of Service (DoS), User to Root (U2R), and Probe attacks within the KDD dataset. Good working knowledge of GRU models and the mentioned attacks is required. * The project includes steps to ensure...

    $34 (Avg Bid)
    $34 Wastani wa Zabuni
    8 zabuni

    As the primary user of a Windows 11 Pro PC acting as a server for a SQL based car dealership software, EasyDeal, I require technical support to resolve my ongoing issue. The main problem I encounter is that various devices are struggling to maintain a connection to the software, indicating a "Connection Timeout" TCP errors, "could not locate server" error message. Key Tasks: * Troubleshoot and repair the connection issues on the server and other devices * Ensure stable, reliable connection between the devices and server Ideal Skills & Experience: * Proven experience with EasyDeal software * Excellent knowledge and skills in SQL and network troubleshooting * Familiarity with Windows 11 Pro and server management.

    $102 (Avg Bid)
    $102 Wastani wa Zabuni
    12 zabuni

    Our main domain is also used as the DNS domain for ns1/ns2. Currently, we are experiencing difficulties accessing our website due to alleged DNS issues according to the PLESK system. The configuration should be adjusted so that the domain correctly points to the right directory despite using DNS ns1/ns2, without causing other domains that utilize these ns1/ns2 of the main domain to cease functioning. Please note that we only accept genuine offers. Post-negotiations or negotiations within the chat conversation are not desired.

    $66 (Avg Bid)
    $66 Wastani wa Zabuni
    12 zabuni

    I'm looking for a skilled professional to assist with an embedded software project that involves working with microc...embedded software project that involves working with microcontrollers. Requirements: RTU shall be connected to following ETHERNET TCP IP/ MODBUS TCP IP/ SERIAL/ DNP3.0 SERIAL/ DNP 3.0 IP, etc. The ports Profibus and Profinet used protocol converter RTU connections GPRS link over DNP3 /Mod Bus TCP/IP /GSM GPRS servers. The RTU having functionalities analog input, analog output, digital input, digital output. RTU communication protocol: DNP3 level 4 & MQTT Both RTU Serial Comm Protocol: DNP3 level 4 Master/slave and peer-to-peer, Slave, Modbus Master/Slave DNP3 level 4 in TCP Master/Slave, UDP Master/Slave and peer-to-peer, Modbus T...

    $11 / hr (Avg Bid)
    $11 / hr Wastani wa Zabuni
    11 zabuni

    ...are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you should connect with ibm quantum computer. 4- all requirement should be delivered in three days. ...

    $293 (Avg Bid)
    $293 Wastani wa Zabuni
    27 zabuni