Coldfusion shell hacking jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 coldfusion shell hacking jobs found, pricing in USD

    Project Description: We are seeking a highly skilled High-Performance Computing (HPC) Engineer with expertise in shell scripting and workflow automation to assist in the evaluation and enhancement of the Parallel Works platform. The successful candidate will need to execute various tasks involving cloud cluster management, running pre-installed workflows, and handling both basic and advanced system integrations. Experience with MPI (Message Passing Interface), Singularity containers, and batch scripting is crucial.

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    3 bids

    Project Description: We are seeking a highly skilled High-Performance Computing (HPC) Engineer with expertise in shell scripting and workflow automation to assist in the evaluation and enhancement of the Parallel Works platform. The successful candidate will need to execute various tasks involving cloud cluster management, running pre-installed workflows, and handling both basic and advanced system integrations. Experience with MPI (Message Passing Interface), Singularity containers, and batch scripting is crucial.

    $14 / hr (Avg Bid)
    $14 / hr Avg Bid
    5 bids

    ...mention whether I need penetration testing, vulnerability assessment, or both. I also didn't specify the exact purpose of this ethical hacking project. Ideally, you should possess a strong ability to uncover any underlying vulnerabilities and offer strategic direction on how to heighten security measures across different platforms. Your approach should not only identify these weaknesses but also provide solutions on how to rectify them. While it's not specified, it'd be beneficial if you could also assess the effectiveness of existing security measures and provide recommendations for improvements where necessary. Your in-depth understanding of ethical hacking and prior experience in a similar role will serve as an asset. Looking forward to discussing...

    $306 (Avg Bid)
    $306 Avg Bid
    16 bids

    I'm searching for an expert in web hacking and network penetration. The core task will involve identifying potential vulnerabilities within a website and working towards fixing these loopholes, while focusing on protecting and securing a database ID and password. A successful candidate should possess the following skills and experience: - Proficient understanding of web hacking and ethical hacking - Experience in network penetration testing to identify vulnerabilities - Knowledge of password recovery techniques - Proven record in enhancing website security The ultimate goal of this project is to strengthen the current security measures on my website, and to protect sensitive data. Your work will majorly revolve around securing the database ID and password. Plea...

    $321 (Avg Bid)
    $321 Avg Bid
    13 bids

    I'm looking for an expert in openbsc, osmocombb, and openbts GSM to help me with a project that includes the following key aspects: - **GSM Man-in-the-Middle (MITM):** The project also involves GSM man-in-the-middle functionality. This includes capabilities such as intercepting and analyzing GSM communications, modifying GSM ne...performance requirements that may arise during the project. Please provide examples of similar projects you've worked on in the past, especially those involving GSM networks and MITM configurations. Please review this paper and need to reproduce what they have done. I have all the hardware in the article. Https:// Here is a part of the modified code, you can refer to

    $2296 (Avg Bid)
    $2296 Avg Bid
    26 bids

    Looking for an experienced DevOps...backend (plus ensuring SSL/TLS self-renewing certs & snapshotted backups to an S3 bucket (on ) every time a new policy or secret added). You'll get sudo-level account access on all nodes which are already up and running on Contabo. You'll need to use the latest versions of Docker & Docker Compose. Your Experience + Multiple Docker-based Vault cluster deployments + Proficiency in Linux shell scripting and Docker Compose + Ability to document setup process clearly disaster recovery Summary acceptance criteria + I follow docs & rebuild cluster & recover existing backup + I retrieve secrets after degrading nodes Want more details? Look here: I look forward to receiving your proposals.

    $192 (Avg Bid)
    $192 Avg Bid
    20 bids
    Website Penetration Test 5 days left
    VERIFIED

    I am looking for a skilled professional to conduct a comprehensive penetration test on my website. Key Objectives: - Identify ...possible consequences of a successful security breach. - Bug identification: I would also like any bugs found to be highlighted so that they can be fixed. I have not conducted security testing on the website before, so this will be the first time and it's important that the expert I hire is thorough and experienced. Ideal skills and experience for this job would include: - Proficiency in ethical hacking and penetration testing methodologies - Experience in web security and compliance standards - Attention to detail for bug identification - Excellent communication skills to relay findings in a clear and actionable way Site -

    $20 (Avg Bid)
    $20 Avg Bid
    15 bids

    ...enquiries for bulk orders. - The website should have a branch locator page with Google maps integration. All stores should be marked with a red pinpoint, and customers should be able to view store details by clicking on the pinpoint. - Install Website backup plugin and inform us on taking weekly backups automatically. - The website should have high level security measures in place to prevent hacking and data breaches. - The website should be thoroughly tested for functionality, compatibility, security and on multiple devices before launch. - The website should be handed over to us upon completion with all the login details. Required skills and experience: - Proven record of successfully developing similar high-volume e-commerce websites. - Proficiency in Word Press and Wo...

    $1143 (Avg Bid)
    $1143 Avg Bid
    252 bids

    I have a research paper that I would like you to follow and create a finite element model for a pulley. The model should be based on beam theory, shell theory and thin shell theory. Key Requirements: - Develop a Finite Element Model: The model should be based on beam theory, shell theory and thin shell theory. - Stress Distribution Analysis: The most important output data from the model should be the stress distribution. This is crucial for this project. - Industry specific: The intended application of this pulley is for the mining industry, so you need to be able to ensure that the model is tailored to this industry. Ideal Skills and Experience: - Solid Understanding of Finite Element Modeling: You should be proficient in creating and analysing finite elemen...

    $87 (Avg Bid)
    $87 Avg Bid
    20 bids

    ...mentoring and guiding a student through various cybersecurity courses and projects. Requirements: - Experienced cybersecurity professional with preferable certifications such as Security+, CISSP, GSEC, SSCP, etc. - Outstanding communication skills and proficiency in English. - Strong teaching and mentoring experience. - Advanced knowledge in Network Security, Cryptography, and Ethical Hacking - Cybersecurity certification as mentioned below. - Outstanding communication abilities. - Teaching or training experience preferred but not essential - Ability to break down complex cyber security concepts. Experience: Minimum of 10 years' practical experience in cybersecurity, preferably with recognized companies. Proficiency with various cybersecu...

    $11 - $18 / hr
    Featured Sealed
    $11 - $18 / hr
    9 bids

    We require an ethical hacker with expertise in mobile game security. Focused specifically on player data handling, our project aims to identify vulnerabilities in our system, test the effectiveness of our security measures, and improve the overall security of our network. The ideal freelancer for this job should have: - Experience with ethical hacking. - In-depth knowledge of player data security measures. - A proven track record on mobile game security. Your duty will be to run exhaustive checks and tests to identify weaknesses and areas for improvement within our mobile game security system to ensure utmost data protection for our players.

    $34 / hr (Avg Bid)
    $34 / hr Avg Bid
    15 bids

    I'm looking for a skilled ethical hacker to help with security testing on my Instagram account. I'm particularly interested in identifying any security vulnerabilities and testing the existing security measures in place. Key Requirements: - Experience in ethical hacking and security testing - Familiarity with Instagram's security protocol and common vulnerabilities - Ability to work with test accounts with limited permissions Ideally, you will provide a detailed report on the security of the account, with any vulnerabilities highlighted, recommended improvements, and confirmation of the effectiveness of current security measures. Your work will be instrumental in ensuring the safety and privacy of this account.

    $11 (Avg Bid)
    $11 Avg Bid
    4 bids

    Looking for a cybersecurity expert experienced with Windows operating systems. Currently struggling with serious device cloning and hacking issues that have brought operations to a standstill. My personal data has been tampered with significantly. - The freelancer should ideally be skilled in: * Advanced Cybersecurity * Windows OS * Data Protection and Recovery - The project extends beyond just solving the problem, but also educating me on the best practices to maintain optimal PC security and prevent data alteration and unauthorized access in the future. Only individuals with robust experience in dealing with hacking and data theft situations should apply. Quick turnaround time is highly appreciated, given the severity of the issues faced.

    $143 (Avg Bid)
    $143 Avg Bid
    15 bids
    Linux Developer for Custom OS 4 days left
    VERIFIED

    We are an innovative tech company embarking on the creation of SnipeOS, a custom Linux operating system designed to revolutionize user interaction and productivity through a tailored user experience. Project Overview: We are t...Browser Configuration: Set the web browser's default homepage to and the default search engine to snipesearch.net. Include links to snipesearch, snipepay, snipesocial, auctionit, and TTWRITE in the web menu. Desired Skills and Qualifications: Proven experience in Linux system development, particularly with XFCE. Proficiency in programming languages such as C, C++, Python, and shell scripting. Familiarity with the configuration and deployment of the listed software applications. Experience in system branding and customization for Linux distributions.

    $128 (Avg Bid)
    $128 Avg Bid
    43 bids

    I'm looking for an experienced Java / ColdFusion developer to help with web development. We use ColdFusion 2016 which sits on top of Java. We are trying to integrate with Stripe Credit Card payment system, using their "Custom payment flow". They do not offer a ColdFusion backend but they do offer a Java backend. I am looking for someone to see if the Java backend they offer will work with ColdFusion, build an example cfm page, also advise us on how to get it working on ColdFusion.

    $160 (Avg Bid)
    $160 Avg Bid
    32 bids

    It’s Urgent! We need to write a shell script It’s too simple and not more than 2-3 hours job if candidate is good at shell script. It’s a small project but if we are satisfied we will give you more project in future . You thave to automate these task , Now i am doing this manually ---------------------------------------------------------------------------------------------------------- have to accept the subdomain as input and from backup Activate 2. change the name of to 3. add the alias domain 4. Add the prt for and cname record for @ cloudfare , now i do manually 5. create the ssl for and bdomain

    $111 (Avg Bid)
    $111 Avg Bid
    15 bids

    It’s Urgent! We need to write a shell script It’s too simple and not more than 2-3 hours job if candidate is good at shell script. It’s a small project but if we are satisfied we will give you more project in future . You thave to automate these task , Now i am doing this manually ---------------------------------------------------------------------------------------------------------- have to accept the subdomain as input and from backup Activate 2. change the name of to 3. add the alias domain 4. Add the prt for and cname record for @ cloudfare , now i do manually 5. create the ssl for and bdomain

    $87 (Avg Bid)
    $87 Avg Bid
    18 bids

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be determined as part of this process.

    $347 (Avg Bid)
    $347 Avg Bid
    15 bids
    Custom Starve.io Cheat Engine 3 days left
    VERIFIED

    I'm in need of a custom cheat engine for the game ''. The cheat engine needs to have several features and a high level of customization. It should be a separate software with user-def...the ability to toggle different cheats on and off. Customization: - Separate Software: The cheat engine should be a standalone software that can run alongside the game. - User-defined cheat intensity levels: Users should be able to adjust the intensity of the cheats to match their preferences. Ideal skills for this project include: - Proficiency in cheat engine development - Experience in game hacking and cheating software - Strong understanding of '' game mechanics - Ability to create a user-friendly and intuitive interface - Good communication skills for potential updates...

    $490 (Avg Bid)
    $490 Avg Bid
    19 bids

    We are searching for a Growth Hacker/ fractional CMO, to oversee 360 degree Marketing processes. Should be a seasoned professional who can setup the marketing strategy, and leverage our team to implement the strategy, generate sales growth and achieve expected results. The consultant should be willing to have their skin in the game. We are a growing remote bookkeeping and accounting business, service clients (B2B/SMBs) across US, Canada, Australia. Typical candidate profile we are looking at includes career sales profiles who can devote few hours per week beyond their regular job.

    $389 (Avg Bid)
    $389 Avg Bid
    9 bids

    ...deep understanding of network infrastructure and protocols, as well as the skills to spot and mitigate vulnerabilities. 2. Data Encryption and Secure Coding: You will need to exercise knowledge of data encryption standards and secure coding practices to ensure that the integrity of the system is maintained, while the necessary tasks are performed. Skills and Experience: - Proficient in ethical hacking - Solid experience with network security - Robust knowledge of data encryption - Expertise in secure coding Please note, there was the option to assist with either penetration testing or network monitoring but no response was given, so if you have experience in both, it would be beneficial. I need this task completed urgently, therefore those available to commence work ASAP wil...

    $50 / hr (Avg Bid)
    $50 / hr Avg Bid
    9 bids

    ...with in-depth knowledge and experience in hacking operating systems, databases, and networks. This task requires robust technical expertise, problem-solving abilities, and an innovative mindset to explore these systems. Key Requirements: - Profound understanding and experience in systems infrastructure - Solid experience manipulating operating systems, databases, and networks - Ability to penetrate systems with user-level access authentically and legally - Goals and Objectives: - The hack is for educational purposes only. Thus, the acquired knowledge will be used to further my understanding of the systems and will not be utilized for any unauthorized means. To the potential freelancer, your formal education or certifications in ethical hacking or a related field wi...

    $27 / hr (Avg Bid)
    $27 / hr Avg Bid
    17 bids

    I am seeking a professional who can provide spe...sent email edited or deleted from the recipient's mailbox. This is due to the email containing mistaken content. - I currently have no access to the recipient's email system. The successful freelancer will need to gain unauthorized access to the system, locate the email in question, and carry out the necessary action. Ideal skills for this project include: - Proficiency in email security and hacking techniques - Strong ethical and confidentiality standards - Excellent communication skills for reporting progress and seeking necessary info or permissions - Previous experience with similar email security projects would be a bonus I am looking for a professional who can handle this task efficiently, with respect to privacy an...

    $570 (Avg Bid)
    NDA
    $570 Avg Bid
    8 bids

    ...media management, and content creation. Key Responsibilities: * Oversee and manage all aspects of my website. * Handle all social media aspects, including content scheduling, community engagement, and strategic planning. * Create unique and engaging blog articles for my website. The primary goal of this role is to drive website traffic, so I'm looking for someone experienced in SEO and growth hacking techniques. Proficiency in social media platforms and blog-writing is crucial, as you will be responsible for creating high-quality blog articles. Your job will be to effectively boost our online presence via engaging content and strategic marketing. Required Skills and Experience: * Proven experience in digital marketing * Proficiency with social media platforms * Outsta...

    $48 (Avg Bid)
    $48 Avg Bid
    25 bids

    ...him so he stops harassing me with death and my life and identity theft of loans etc his ruining my life. Please only bid on this project if you have direct experience in dealing with similar cases and can provide the necessary support and assistance swiftly. I have a lot more to share and and don’t know what to file against this person . They also made Britney Spears non existent to me whilst hacking me coercively my body and all my devices. Pleasee can we get it together today now so I can put in a professional statement so that they can take it seriously because his a millionaire and there a well known figure they won’t believe but I have so many proofs and if they check cctvs they’ll go to grab him. URGENT I NEED TO GET THIS DONE TODAY at the moment b...

    $6 (Avg Bid)
    Guaranteed
    $6
    5 entries

    (NO AI) I’m looking for a logo for my swimwear brand VKINI. I want an simple with small details of like ocean elements or water such as a wave, a mermaid tail, a shell etc. the logo should include VKINI in all caps I’m open to different fonts as long as vkini is clear. The logo should be neutral warm colors such as a beige off white, light blue etc. PLEASE be creative I want a clean looking logo that is sleek but you can tell it’s a swimwear or beach wear logo. I’ve attached images of some cool icons that can be incorporated and the vibe that I’m looking for. I added some color ideas in the attachments!

    $50 (Avg Bid)
    Guaranteed
    $50
    248 entries

    I'm looking for an experienced 3D designer to create a detailed 3D STL file of a car body shell. This design is meant for 3D printing, so it needs to be thickened to .7mm. Key requirements: - The model should be optimized for 3D printing - Ensure the model is of high detail, as it is important for the final 3D print quality Ideal skills include: - Proficiency in 3D modeling software - Experience in 3D printing optimization - A strong portfolio of similar, high-detail 3D designs. Please provide examples of your previous work and relevant experience.

    $132 (Avg Bid)
    $132 Avg Bid
    44 bids

    We are looking for a skilled Flutter developer to create a video call application with specific features. The application will include live video calls, voice calls, and private video calls. Suppo...and private video calls. Supporters will register using their phone numbers and will be rated after each call. The application will also allow for invitations to be sent between hosts and supporters. We require a clear and easy-to-use control panel for managing the application. Payment gateways should be available for supporters from all countries. The application should be secure and prevent hacking attempts. Post-launch support will be necessary, along with ongoing maintenance. If you have experience in Flutter app development and building video call applications, we would like to hear...

    $232 (Avg Bid)
    $232 Avg Bid
    44 bids

    I'm needing a skilled 3D designer to create realistic and high-quality 3D models of various dry fruits - almonds, cashews, dates, walnuts, raisins, and pistachios. The models will be used for e-commerce product images. What I expect: - Realistic 3D ...job: - Proficient in 3D graphic design and modeling. - Experience creating e-commerce imagery. - Knowledge in food product modeling will be highly appreciated. - Portfolio of previously completed 3D model projects. Sum up the whole requirement again: 8 Dry fruit single models 8 Dry fruits group models 8 gif of single rotating dry fruit within a week dry fruits Almonds, Walnuts ( Shell and without Shell) , Raisins, Pistachios , Cashews, Dates , Cranberries, Blueberries I'm excited to see your work and possibl...

    $76 (Avg Bid)
    $76 Avg Bid
    27 bids

    I'm seeking a professional proficient in hacking for a project aiming at thorough manipulation of a website for experimental purposes. Your primary responsibility will be altering items including, but not limited to, text content, images, metadata, as well as database entries. Key responsibilities: - Security testing to locate potential vulnerabilities - Ethical hacking and altering of designated data - Verification of data changes and appropriate saving Ideal Experience and Skills: - Extensive experience in data alteration and ethical hacking - High attention to detail with the ability to rapidly identify and resolve issues - Ability to deliver within a demanding timeline (ASAP) - Exceptional ethics and understanding of legalities pertaining to this challenge ...

    $29 (Avg Bid)
    $29 Avg Bid
    30 bids

    We are seeking an experienced Azure DevOps Architect to help us utilize Azure Pipelines, Azure Repos, and Azure Boards for our project....seeking an experienced Azure DevOps Architect to help us utilize Azure Pipelines, Azure Repos, and Azure Boards for our project. The main objectives of this project are to achieve continuous integration and deployment, facilitate collaboration and communication, and manage the project in an Agile way. The project will require skill with Power Shell. Ideal Skills & Experience: • Experience with Azure Pipelines, Azure Repos, Azure Boards • Power Shell programming language proficiency • Knowledge of Continuous Integration and Deployment • Comfortable working within Agile Project Management frameworks • Strong col...

    $1205 (Avg Bid)
    $1205 Avg Bid
    54 bids

    ...Analyzing and adjusting APIs - Although I have not specified which APIs require adjustments, a comprehensive evaluation of the project will assist in flagging those that need change. * Introducing a Sell Option - This is specifically for digital products, so prior experience in creating such a functionality will be greatly beneficial. * Implementing Hacking Security Measures - Skilled coders will be able to optimize my site to identify and neutralize hacking attempts. I am looking for someone with a track record in cybersecurity. * Fixing Two Button Functions - The existing buttons need some fixing for better user experience. The ideal candidate for this job should have considerable experience in improving features of a live site, API usage and adjustment, the creatio...

    $28 (Avg Bid)
    $28 Avg Bid
    28 bids

    ...enhance the trading experience and meet the needs of both novice and experienced traders, the platform will incorporate advanced trading features such as limit orders, market orders, stop-loss orders, and margin trading. These features will empower users to execute trades with precision and flexibility. Security and Compliance: Security is paramount in the cryptocurrency space, where the threat of hacking and theft is ever-present. Our platform will implement industry-leading security measures, including encryption, two-factor authentication (2FA), and cold storage for storing user funds. Additionally, we will ensure compliance with regulatory requirements, including anti-money laundering (AML) and know your customer (KYC) regulations, to mitigate legal and reputational risks. ...

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    23 bids

    ...) which .json / .txt file will contain the parameters and server details Stop: v2ray disconnect - **Functionality:** The task will involve modifying an existing app which can be launched via command line. I assume the native tun2socks in the open-source will remain unchanged - Scripting: Shell Script Compatibility - This application should permit scripts to be run from the command line. This requires your android development skills to be coupled with a good understanding of shell scripting. IDEAL SKILLS & EXPERIENCE: The successful freelancer should demonstrate a strong background in software development, specifically in dealing with open-source clients. Proficiency in working with Android operating systems is a must, along with expertise in command line executio...

    $1089 (Avg Bid)
    $1089 Avg Bid
    21 bids

    I'm seeking a skilled penetration tester with a focus on web applications. I need you to identify vulnerabilities in a white box (full knowledge) environment. Key responsibilities include: - Conducting in...responsibilities include: - Conducting in-depth testing on web applications to uncover potential security issues. - Providing detailed reports of vulnerabilities detected, including their potential impacts. Ideal candidates should have: - Extensive experience with penetration testing, particularly focused on web applications. - Strong knowledge of cybersecurity, network security, and ethical hacking. - Ability to work in a white box environment, using full knowledge to simulate real-world threats. Your work will be crucial to ensuring the security and integrity of our we...

    $337 (Avg Bid)
    $337 Avg Bid
    34 bids

    ...cross-browser compatible and mobile friendly * Maintaining system security and integrity through best practices * Providing information support for the administration team as needed * Participating in team efforts toward efficient and successful project planning including weekly virtual team meetings Job Requirements * 5+ Years Experience in backend or full stack development * Knowledge in ColdFusion (2018 or newer), Python, PHP, CFC, Javascript, SQL, MySSQL, Database Design, Server Management * Experience in front end user interface development,
HTML, and CSS * Knowledgeable in APls, both SOAP and REST * Knowledgeable in Windows server management * Strong problem solving skills * Forward thinking in all development * Strong time management skills * Self-s...

    $641 (Avg Bid)
    $641 Avg Bid
    120 bids

    I am the head of a new unrecognized country, and we're in need of a seasoned blockchain expert to develop a national cryptocurrency. This digital currency will be overseen by our Royal Bank and the federal reserve. Key Requirements: - Security Measures: The development of the cryptocurrency must prioritize robust security to ensure the protection of our financial transactions from hacking, money laundering, and other banking financial crimes. - Scalability: The cryptocurrency should be able to scale effectively as our nation's economy grows and transactions increase. - Transparency: The system should be transparent, promoting trust and accountability in our financial systems. Creation of accounts: The ability for citizens, businesses, government officials and agencies, a...

    $2904 (Avg Bid)
    $2904 Avg Bid
    28 bids

    My Facebook business page has been banned for over 3 weeks due to a policy and guidelines violation. I've already contacted Facebook regarding this but have not received a resolution yet. I need an expert who can help me unban my page and ensure it complies with their policies to avoid further issues. Key responsibilities include: - Programming (hacking) skills -Removing all the strikes -Get something to prevent future bans

    $24 (Avg Bid)
    $24 Avg Bid
    5 bids

    I'm looking for a professional who can assist with the unbanning of my TIKTOK account, which was suspended 1-3 months ago, for violation of community guidelines. The ideal freelancer for this project should have: - Proven experience in successfully helping clients get their accounts unbanned on TIKTOK. -Programming or hacking skills

    $25 (Avg Bid)
    $25 Avg Bid
    2 bids

    ...our organisation is urgently seeking a professional with vast knowledge in system protection and ethical hacking. Key Roles: • We primarily aim to implement robust Firewall measures, Intrusion Detection Systems and efficient Antivirus Software to guard our vital business data. • The appointed specialist will design systems particularly focused on preventing unauthorized access, swiftly detecting and responding to any security breaches, and protecting our systems against malware and viruses. Ideal Skills: • Extensive experience in setting up firewalls and antivirus software • Proficiency in detecting possible breaches via intrusion detection systems • Expertise in ethical hacking to identify potential vulnerabilities • Previous work wi...

    $124 (Avg Bid)
    $124 Avg Bid
    26 bids

    ...ANSYS. this is objective of the project, its in different phases. i have done this part in MATAB but i need help with the writing of the methodology and detail explanation of results/ and discussion am struggling to write it Phase 2: Shell modelling and mesh validation This phase is to develop a shell finite element model of the entire tank geometry in ANSYS with adjusted shell element thicknesses and neutral axes based on the obtained ultrasonic thickness measurements. After materials properties and load conditions are applied, the aim will be to ensure the shell finite element mesh has converged and produced realistic stress distributions. A mesh refinement study will be conducted with a focus on demonstrating that the mesh has converged in areas where the...

    $708 (Avg Bid)
    $708 Avg Bid
    26 bids

    I'm in need of an hacker to perform a thorough black-box penetration testing on a WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are cr...

    $93 (Avg Bid)
    $93 Avg Bid
    29 bids

    I'm in need of an hacker to perform a thorough black-box penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are c...

    $324 (Avg Bid)
    $324 Avg Bid
    23 bids

    I am currently facing a critical issue with my Joomla website. It has been compromised, exhibiting signs of hacking, the presence of malware, and broken links which need to be promptly addressed. Key Tasks: - Unhack Files: Your experience and proficiency in handling and unhacking infected files is paramount. - Malware Cleanse: Strong understanding of malware fixes and quality control will be necessary to ensure eradication. - Fix Broken Links: Fixing broken links requires web development and troubleshooting skills Additionally, this project requires an e-commerce integration. The existing design of the website should remain unchanged through this process. You should hold expertise in integrating shopping cart features in Joomla without disturbing the current design. Ski...

    $677 (Avg Bid)
    $677 Avg Bid
    57 bids

    ... password cracking, and running a comprehensive vulnerability assessment. Key Responsibilities: - Conduct network scanning to identify potential security issues. - Perform password cracking to ensure that the server is secure. - Conduct a thorough vulnerability assessment to identify and report any vulnerabilities. The ideal candidate for this job should have: - Proven experience in ethical hacking and server security. - Extensive experience in conducting network scanning, password cracking, and vulnerability assessment. - Knowledge of Windows server security best practices. - Strong communication skills to clearly report on any identified vulnerabilities. I will provide full administrative access to the server, so the ethical hacker will have the necessary privileges to condu...

    $18 (Avg Bid)
    $18 Avg Bid
    6 bids

    As an educator, I'm looking to showcase the secu...a security system. The features I require are: - A custom login page - The ability to track user activity - Integration with other platforms The project will also involve demonstrating a successful XSS hacking. To accompany this, I'll need detailed documentation created to outline the steps taken and the vulnerabilities exploited. Following the hack, I expect to have full administrative access to the WordPress site. Ideal candidates for this project have a deep understanding of WordPress, its vulnerabilities, and security concepts in general, coupled with experience in XSS hacking and documentation writing. Advanced technical WordPress skills, expertise in frontend/backend development and strong background in...

    $40 (Avg Bid)
    $40 Avg Bid
    28 bids

    I'm using a shell script to monitor for volume changes on Debian. The relevant code looks like this: pactl subscribe | grep --line-buffered "sink" | while read -r UNUSED_LINE; do /home/user/.local/bin/ ; done; This script worked fine on the first computer I used it on. However, on a second computer, it's not working well. The problem seems to be that on the second computer, volume changes are detected twice. For example, when I click the "Volume Up" button on my keyboard, the initial 2 lines of output from command "pactl subscribe" are duplicates: Event 'change' on sink #1 Event 'change' on sink #1 On the original computer, there was only one line of output for each "Volume Up" click. Note that both these com...

    $21 (Avg Bid)
    $21 Avg Bid
    6 bids

    I have an exciting project lined up for skilled Android programmers with experience in open source modification. Specifically, I need modifications o...command: v2ray start (or ) where will have the vmess:// vless:// ss:// details generated by server Stop command: v2ray stop - Native support of tun2socks - Scripting: Shell Script Compatibility - This application should permit scripts to be run from the command line. This requires your android development skills to be coupled with a good understanding of shell scripting. The end product should be a highly stable and efficient application with an intuitive interface. So, if you have the expertise in Android programming, open source modification and shell scripting, this is the perfect project for you.

    $1128 (Avg Bid)
    $1128 Avg Bid
    72 bids

    I'm seeking a skilled civil engineer with proven expertise in structural design, specifically pertaining to residential building projects. Here's a snapshot of what I need help with: - Creating a compelling structural design for a residential building - Developing...engineering concepts and best practices, with particular focus on structural design. Excellent attention to detail and a strong understanding of local building codes and safety regulations will be critical to this role. High proficiency in using engineering software for developing designs and structures would be a plus. I’ve attached a pdf of kind of what I want I’m just wanting plans for the shell please disregard rooms and partition. Join this project to showcase and enhance your skills in ...

    $425 (Avg Bid)
    $425 Avg Bid
    54 bids

    I'm seeking a proficient cybersecurity professional specialized in ethical hacking. This individual will be responsible for comprehensively testing my Android app and ensuring it is free from any potential hacking vulnerabilities or scams. Though no specific areas were indicated for priority testing, the ideal candidate should have expertise in testing all integral security components within an app’s infrastructure such as: - User Authentication - Data Encryption - In-app Purchases The ideal freelancer should have previous experience in cybersecurity testing specifically in Android apps and hold a proven track record in identifying and resolving security vulnerabilities. I’m hoping to have this project completed within a month. Your technical insight and ex...

    $88 (Avg Bid)
    $88 Avg Bid
    19 bids