Diablo dupe hack 112 jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 diablo dupe hack 112 jobs found, pricing in USD

    ...stream me and my family to the internet, and stealing information. As a result, I have no control over my devices at this point. I am seeking an experienced professional who can assist me in removing the hackers from my systems and ensuring that my personal data is secured. Your primary focus must be on removing these hackers from the system. Key tasks include: - Investigating the extent of the hack and identifying vulnerabilities - Removing the hackers from the system entirely - Securing my personal data - Ensuring control over cameras and microphones is restored Ideal Skills and Experience: - Proven experience in cybersecurity and network security, particularly with Azure - Expertise in identifying and removing hackers from systems - Ability to secure personal data effecti...

    $45 / hr (Avg Bid)
    $45 / hr Avg Bid
    4 bids

    I need an apk security expert I hope there are no vulnerabilities in the database in my apk. Other people keep trying to hack my database

    $1051 (Avg Bid)
    $1051 Avg Bid
    25 bids

    I'm in need of an expert who can carry out a task that involves eavesdropping on Thuraya satellite communications using a Hack RF receiver. This task is for research and analysis purposes. Your main responsibilities will include: - Real-time eavesdropping on Thuraya satellite communications. - Extracting specific information including location data, voice communication, and details of data transfers. The ideal freelancer for this project should have: - Proficiency in working with satellite communication systems. - A strong understanding of Hack RF receivers. - Experience in data extraction and analysis. Please be sure to include any relevant experience in your proposal. This is a complex task that requires specialized skills, so relevant experience will be highly va...

    $539 (Avg Bid)
    $539 Avg Bid
    8 bids

    I'm looking to hire an architect who can help me obtain a permit for building a sunroom from a kit. Here are some key points: - **Location:** The sunroom will be installed on a wooden deck that is attached to my house. It's essential that the blueprint includes the proper connection details to the existing structure. - **Size:** The sunroom is relatively small, around 112 sq ft (8' x 14'). It's important to design a space that is both cozy and functional, suitable for relaxation and leisure. - **Skills and Experience:** I need someone with experience in creating similar blueprints and obtaining permits for home additions. An architect who can efficiently design a space that maximizes natural light and views while ensuring structural integrity will be ...

    $460 (Avg Bid)
    $460 Avg Bid
    46 bids

    I'm seeking an expert to merge and de-dupe around 700 account / contact records to enable us to obtain a clear deduped prospecting list to be uploaded into a CRM like HubSpot. The records will need to be deduped using a specific criteria to ensure that all unique information is kept for each account. The list is currently in Excel/CSV file format. Each contact record encapsulates around 10 key fields: Customer type and association, Store Name, Contact Name, Email, Phone, Mobile, Email, Address, Job Title and notes. Ideal Skills and Experience: - Proficiency in Excel and other spreadsheet tools - Experience with data cleansing and deduplication - Attention to detail and accuracy - Experience with handling sensitive data securely Tasks Involved: - Merging duplicate contacts (b...

    $66 (Avg Bid)
    NDA
    $66 Avg Bid
    39 bids

    ...This task requires robust technical expertise, problem-solving abilities, and an innovative mindset to explore these systems. Key Requirements: - Profound understanding and experience in systems infrastructure - Solid experience manipulating operating systems, databases, and networks - Ability to penetrate systems with user-level access authentically and legally - Goals and Objectives: - The hack is for educational purposes only. Thus, the acquired knowledge will be used to further my understanding of the systems and will not be utilized for any unauthorized means. To the potential freelancer, your formal education or certifications in ethical hacking or a related field will be a significant advantage. However, if you're self-taught but can demonstrate your proficien...

    $27 / hr (Avg Bid)
    $27 / hr Avg Bid
    17 bids

    ...looking for a diligent and creative social media manager to regularly post dynamic content on Facebook, Instagram, and TikTok. This content will revolve around the theme of promoting a campaign for a hair education beauty summit. Key tasks will include: - Generating and posting engaging content randomly throughout the day. we want to post 2 to 3 times daily. - reels and just educational hack videos that shows what's to come; I have some script, but they would need to provide some script for us - Applying consistent branding and messaging across all platforms. Ideal candidates will have: we are promoting our @haireducationbeautysummit - Proven experience managing social media accounts for businesses, especially in the beauty and/or education sectors. ...

    $443 (Avg Bid)
    Urgent
    $443 Avg Bid
    62 bids

    - Description: We are a passionate game development studio dedicated to creating captivating gaming experiences. We are currently in the process of developing an action RPG game heavily inspired by the classic gameplay of Diablo 2, with a modern twist. To bring our vision to life, we are seeking a talented 3D modeler to join our team. Position Overview: We are looking for a skilled 3D modeler with experience in creating high-quality assets for action RPG games. The ideal candidate will have a strong understanding of the visual style and aesthetic of games like Diablo 2 and Champions of Titan, and the ability to create immersive and detailed 3D models that align with our game's design and narrative. - Responsibilities: Collaborate with the game development team to unde...

    $664 (Avg Bid)
    $664 Avg Bid
    51 bids

    Hi Tanmay, could you please investigate this site for malware. I will supply login credentials in chat.

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    1 bids

    I'm in need of an hacker to perform a thorough black-box penetration testing on a WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are cr...

    $93 (Avg Bid)
    $93 Avg Bid
    29 bids

    I'm in need of an hacker to perform a thorough black-box penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are c...

    $324 (Avg Bid)
    $324 Avg Bid
    23 bids

    ...purposes and to help formulate a proof of concept for a security system. The features I require are: - A custom login page - The ability to track user activity - Integration with other platforms The project will also involve demonstrating a successful XSS hacking. To accompany this, I'll need detailed documentation created to outline the steps taken and the vulnerabilities exploited. Following the hack, I expect to have full administrative access to the WordPress site. Ideal candidates for this project have a deep understanding of WordPress, its vulnerabilities, and security concepts in general, coupled with experience in XSS hacking and documentation writing. Advanced technical WordPress skills, expertise in frontend/backend development and strong background in cyber...

    $40 (Avg Bid)
    $40 Avg Bid
    28 bids

    I am in need of a skilled developer who can create an external tool for the game Diablo 4. The tool should focus primarily on optimizing player pathing. This can be a web tool, app, spreadsheet I don't mind. Ideal Skills & Experience: - Proficiency in creating external tools for video games - Experience in path optimization algorithm design Key Features: - Path optimization: The tool should be able to analyze the Paragon Board data and provide the most efficient path for the player to follow. Players have 255 points to spread across multiple boards. I want to select the required boards from highest importance, required notes nodes on each board from highest importance and then each glyph from highest importance. Once everything is select, we want it to find the most ...

    $27 (Avg Bid)
    $27 Avg Bid
    14 bids

    As the owner and administrator of a Facebook page and multiple profiles, I am seeking an expert in Facebook's security protocol who can successfully and securely delete these accounts. This task is of utmost importance due to severe security concerns. There are no other platforms in need of attention; this job focuses solely on Facebook. Key requirements for this project are: -Legitimate knowledge of Facebook's security and deletion procedures - Experience in maintaining client privacy and confidentiality - Assurance that deleted data will not be recoverable - Proof of successful past experiences in similar tasks

    $39 (Avg Bid)
    $39 Avg Bid
    14 bids

    I urgently require help to predict a cryptographic-based random number generator, or RNG, which is used in a casino setting. I have output sequences of the RNG that can be utilized f...hopeful you can create an algorithm or a model to predict the next sequences. ## What You Should Have: - Extensive experience with RNGs, especially those that are based in cryptography, is absolutely crucial for this project. - Experience in creating predictive algorithms or models. - Good understanding of gambling methodologies would be a plus. - Understand that the goal is not to exploit or hack, but to generate effective gambling strategies. Persons with matched skills and experience, I look forward to your proposals. and also if you have some insights ....... it from "' �...

    $70 / hr (Avg Bid)
    $70 / hr Avg Bid
    5 bids

    ...Modeling Requirements: MSGARCH Model Configuration: The analysis requires the implementation of a MSGARCH model to capture the dynamic volatility of each cryptocurrency. The model must accommodate two distinct regimes: High-Volatility Regime (Regime 1): Characterized by periods surrounding significant market events expected to induce heightened market volatility. Examples include the Coincheck Hack (January 2018), the 2018 Cryptocurrency Market Crash, Black Thursday (March 2020), the 2021 Chinese Cryptocurrency Mining Ban, the Collapse of TerraUSD and LUNA (May 2022), and the FTX Bankruptcy (November 2022). Low-Volatility Regime (Regime 2): Represents periods of relative market stability, with lower volatility not significantly influenced by immediate external shocks. The model...

    $138 (Avg Bid)
    $138 Avg Bid
    18 bids

    ...Modeling Requirements: MSGARCH Model Configuration: The analysis requires the implementation of a MSGARCH model to capture the dynamic volatility of each cryptocurrency. The model must accommodate two distinct regimes: High-Volatility Regime (Regime 1): Characterized by periods surrounding significant market events expected to induce heightened market volatility. Examples include the Coincheck Hack (January 2018), the 2018 Cryptocurrency Market Crash, Black Thursday (March 2020), the 2021 Chinese Cryptocurrency Mining Ban, the Collapse of TerraUSD and LUNA (May 2022), and the FTX Bankruptcy (November 2022). Low-Volatility Regime (Regime 2): Represents periods of relative market stability, with lower volatility not significantly influenced by immediate external shocks. The model...

    $594 (Avg Bid)
    $594 Avg Bid
    33 bids

    Looking for a Skilled Web Developer with knowledge of API and web hack stuff which can get done the task easily , its not a simple job for a fresher we need someone who can get gone the task in any way

    $96 (Avg Bid)
    $96 Avg Bid
    64 bids

    I'm in need of a specialist who can design an anti-hack solution integrated with Unity for Android and iOS platforms. The solution must: - Identify all applications running in the background. Essential skills: knowledge of Android and iOS system processes, experience with app behavior and detection. - Capture a complete screenshot of the cellphone and not only the game. - Collect data and generate a report upon detection of suspicious applications running in the background. This requires data collection, analysis, and reporting skills. Ideal candidates should have previous experience with similar projects, exclusively handling anti-hack measures, specifically on Unity. Strong understanding of both Android and iOS platforms is a must.

    $366 (Avg Bid)
    $366 Avg Bid
    56 bids

    ...Adjust existing filters. The app is operational, so please read carefully. - Around 80% of the adjustment time should be dedicated to multi filters; the rest to single filter adjustments. - Eyelid must be tracked and corrected for each individual and not as a template in Android and iOS. - USe only one filter for each facial area and not several filters duplicated Background: Previously, a bid for 112 hours for both iOS and Android was accepted to create the filters from scratch and make adjustments. So, a bid of 160 hours is unwarranted. Other developers are questioning if this is merely an attempt to overcharge. Another team working on the app suggests that they could handle the work themselves, indicating dissatisfaction with the estimates provided. Simple Estimate: - A reas...

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    59 bids

    We have several hightail charts that we need to convert to responsive for modern websites. These are from a 3rd party so we can't create the chart differently. My hope is that an expert developer can look at our code and understand how to create a solution / hack. The charts update automatically. Example sizes of the same chart attached. It will not allow me to paste Also, image versions of the chart could work too.

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    23 bids

    ...job: - Strong experience in IT support - Knowledge of network setup and configuration - Proficiency in software and hardware installation - Solid background in ethical hacking and internet security. Let's ensure the security of my home network! I have a small home business where I work with sensitive client information. My internet provider is Google Fiber. I’m looking for someone to ethically hack my home internet to view all incoming/outgoing data & provide me with a detailed list of 4-5 days of information. This will help me to understand what kind of information others would be able to see on my home internet if they had intermediate/advanced hacking knowledge. Then I’ll be able to fix that & patch any needed areas. Need: 4-5 full days of dat...

    $151 (Avg Bid)
    $151 Avg Bid
    17 bids

    I'm in need of some technical assistance with a MySql error that has occurred within my React/NodeJS application. The error is: Error: Can't add new command when connection is in closed state at (/var/www/html/backend/node_modules/mysql2/:112:22) at /var/www/html/backend/:39 at [as handle_request] (/var/www/html/backend/node_modules/express/lib/router/:5) at next (/var/www/html/backend/node_modules/express/lib/router/:13) at complete (/var/www/html/backend/node_modules/passport/lib/middleware/:13) at /var/www/html/backend/node_modules/passport/lib/middleware/:15 at pass (/var/www/html/backend/node_modules/passport/lib/:14)

    $16 (Avg Bid)
    $16 Avg Bid
    3 bids

    I need a professional with strong experience dealing with hacked WordPress websites. Under this project, your responsibilities would include: - Cleaning and restoring my hacked WordPress website from the recently available backup. - Enhancing the post-recovery security to prevent further hacking attempts. - Potentially identifying areas most impacted by the hack, as I'm unsure of specific areas. General skills and experience: - Proven track record with WordPress. - Specific experience dealing with recovery from hacking attacks. - Knowledgeable about preventative measures against hacking. - Experience in website backups and restoration.

    $179 (Avg Bid)
    $179 Avg Bid
    43 bids

    ...Pulldown One Arm Lat Pulldown One Arm Seated Cable Row Cable Pull Through Cable Kickback Cable Lateral Raise Cable Reverse Fly Face Pull Cable External Rotation Cable Crunch Cable Woodchopper Cable Shrug Chest Press Machine Chest Fly Seated Dip Machine Machine Tricep Extension Machine Bicep Curl Machine Row Machine Back Extension Sled Leg Press Horizontal Leg Press Leg Extension Seated Leg Curl Hack Squat Lying Leg Curl Machine Calf Raise Vertical Leg Press Seated Calf Raise Hip Abduction Hip Adduction Sled Press Calf Raise Machine Shoulder Press Machine Reverse Fly Machine Lateral Raise Machine Seated Crunch...

    $211 (Avg Bid)
    $211 Avg Bid
    59 bids

    WordPress Publishing We are publishing courses in WordPress for education and training. The content is fine and being source...the content and the general template is agreed then your job is to assembly each course and test for bugs and final sign-off. So basically, it is a publishing process and testing/proofing to make sure all is okay then releasing for commercial usage. This is similar to any publishing operation. I need a person who is fluent in English and a graduate. This job will not suit the average computer code hack who is not interested in content. To apply and be considered - you will have experience in WordPress, MemberPress, and plug-ins to make courses with paywalls. If you cannot show me an example then you will be not considered so don't waste your time ap...

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    223 bids

    I run a B2B website that currently needs solid IP blocking strategies to prevent unauthorized access. I've recently noticed some suspicious activities that indicate hack attempts. Given these factors, I am after a seasoned web security expert who can: - Assess the situation and recommend viable solutions - Implement an IP blocking solution to prevent these unauthorized access attempts - Create a strategy to routinely monitor for and address such threats Ideal skills and experiences would include a strong background in website security, experience with B2B websites, and familiarity with preventing hack attempts.

    $130 (Avg Bid)
    $130 Avg Bid
    21 bids

    Can't create a new (or copy) an extension...Been like this since I upgraded, just haven't had to add an ext since. () Fatal error: Uncaught ValueError: random_int(): Argument #1 ($min) must be less than or equal to ...since. () Fatal error: Uncaught ValueError: random_int(): Argument #1 ($min) must be less than or equal to argument #2 ($max) in /var/www/fusionpbx/resources/ Stack trace: #0 /var/www/fusionpbx/resources/(1000): random_int() #1 /var/www/fusionpbx/app/extensions/(112): generate_password() #2 {main} thrown in /var/www/fusionpbx/resources/ on line 1000

    $36 / hr (Avg Bid)
    $36 / hr Avg Bid
    7 bids

    Can't create a new (or copy) an extension...Been like this since I upgraded, just haven't had to add an ext since. () Fatal error: Uncaught ValueError: random_int(): Argument #1 ($min) must be less than or equal to ...since. () Fatal error: Uncaught ValueError: random_int(): Argument #1 ($min) must be less than or equal to argument #2 ($max) in /var/www/fusionpbx/resources/ Stack trace: #0 /var/www/fusionpbx/resources/(1000): random_int() #1 /var/www/fusionpbx/app/extensions/(112): generate_password() #2 {main} thrown in /var/www/fusionpbx/resources/ on line 1000

    $36 / hr (Avg Bid)
    $36 / hr Avg Bid
    7 bids

    ...corporation's headquarters which is out of state to meet diversity requirements? 2) Hacking into a privately owned website and placing malware on the site: The corporation's motive was to squash public knowledge of their illegal and unethical behavior which the plaintiff's website shared plus give pointers of how to best sue defendant if there was cause. 3) Civil rights issues because the website hack restricted the site owner's free speech as users' anti-malware software prevented them from visiting it or adversely affected their computers 4) Conspiracy charges because in a large corporation there must have been >1 person approving, planning and hacking. 5) Way of stating/showing sufficient proof for “preponderance of evidence” when al...

    $259 (Avg Bid)
    $259 Avg Bid
    23 bids

    Hi. I want to remove lazyload on I tried the following - tried motion effects per field - tried elementor settings - lazyload inactive - tried javascript hack - tried add_filter( 'wp_lazy_loading_enabled', '__return_false' ); If you know how to do this, please start with the words lazyload There is also an a zoom hover effect close to the footer. I know i could just remake this as columns, but prefer to disable the zoom animation for now if you know how to do this.

    $19 (Avg Bid)
    $19 Avg Bid
    18 bids

    Attached is sample pitch deck, you can use starting page...opportunity, user-friendly interfaces for the solution section, and concise bullet points for strategies and future plans will enhance readability and impact. For revenue in last 4 years, use this data: Our performance metrics, supported by current financial statements upon request, are as follows: In 2021, we served 83 clients, generating revenue of €28,842.31. In 2022, our client base grew to 112, with revenue at €22,198. By 2023, we expanded our reach to 188 clients, increasing revenue to €32,949. As of 2024, we have already engaged 12 clients and secured 1 investor, leading to a revenue of $55,000. The cumulative revenue approximates €135,000. 2024 is the period when we focus on scaling ba...

    $100 (Avg Bid)
    Guaranteed Sealed
    $100
    21 entries

    I urgently need assistance in dealing with a suspected Japanese keyword hack issue in my Laravel app. Noticed the problem following a sudden dip in Google search rankings, and unfortunately, I haven't made any progress in addressing it. Here are some key user requirements: - Full administrative access to the system will be granted to troubleshoot and resolve this issue. - Efficiently identifying and eliminating the Japanese keyword hack issue. - Insuring minimal downtime during the mitigation process. Ideal skills and expertise: - Extensive experience in Laravel application security. - Prior experience dealing with Japanese keyword hacks. - Proficiency in analyzing and rectifying Google search rankings related issues. - Should have good Laravel application server mana...

    $32 (Avg Bid)
    $32 Avg Bid
    6 bids

    For our Hack the North 2022 submission, the rise of Web3 lead us to explore a new topic in web development that all of us were unfamiliar with. We created Receipt3.0, a full-stack application that allows businesses to create digital receipts that exist on the Ethereum blockchain. The idea of the project focused on decentralization, where individuals had ownership of their own receipts, and can use it to refund their bought products. These receipt tokens would exist on the user's MetaMask wallet. We built smart contracts using Solidity and tested everything on the Ganache network. The frontend was created using React and Chakra-UI, while the backend used Express, Node, and MongoDB to store data. Here is code: For now my previous developer can't working

    $51 / hr (Avg Bid)
    $51 / hr Avg Bid
    39 bids

    ...23 HOURS I'm currently grappling with a redirection hack on two of my WordPress websites. Visitors are being redirected to unintended pages, likely due to malware infection. The malware's specifics, however, are still unclear to me. I'm seeking a freelancer with expertise in malware removal and website security to address and resolve this issue promptly. Key Requirements: - *Malware Analysis & Removal:* Identify and fully remove all traces of the redirection hack and any other potential threats from both sites. - *WordPress Security Hardening:* Implement measures to enhance the security of my websites, preventing future attacks. - *Website Restoration:* Ensure that my websites return to their original functioning state before the hack, with al...

    $154 (Avg Bid)
    $154 Avg Bid
    76 bids

    ...eliminate the need for third party involvement. Registration requirements: Centralized exchanges require customers to comply with Know Your Customer regulations enforced by the U.S. Treasury, while decentralized exchanges do not require this. Security: Centralized exchanges are more frequent targets of malicious actors, whereas the decentralized nature of DEXs makes them relatively difficult to hack. Privacy: Decentralized exchanges do not share transaction data with any third party. DEX users also do not disclose any personal information. Trading volume: Trading activity on centralized exchanges still far outweighs the trading volume on DEXs. Decentralized exchanges currently account for only about 5% of the global crypto trading volume. Number of supported tokens: Decentralized...

    $1237 (Avg Bid)
    $1237 Avg Bid
    57 bids

    From time to time, the wordpress php files will be hacked and overwritten. I have recovered website but would like to find out the root cause of the hack place so that it doesn't happen again.

    $104 (Avg Bid)
    $104 Avg Bid
    108 bids

    I'm seeking a skilled mobile app developer to hack my Candy Crush on Android. This special modification should enable two primary features: unlocking all game levels and facilitating free in-game purchases. The timeline is tight, and I need it done within a week. **Key Requirements:** - Expertise in Android app development and modification. - Previous experience with game hacks or similar projects. - Ability to work swiftly and efficiently, completing the project in under a week. - Strong understanding of Candy Crush game mechanics is a plus. **Project Deliverables:** - A reliable hack that unlocks all levels in Candy Crush for Android. - Enable free in-game purchases without affecting game performance or stability. - Ensure the solution is discreet and minimizes th...

    $19 (Avg Bid)
    $19 Avg Bid
    6 bids

    I'm looking for a tech-savvy and reliable professional who can design and implement advanced features for the Rave application. Key Responsibilities: - Design effective hack strategies to wrest leadership from other active rooms in Rave - Incorporate additional operation options in existing Rave features Ideal Skills and Experience: • Extensive experience in application development • Familiarity with the Rave app's architecture and features • Excellent problem-solving abilities • Proven track record of successful application hacks The goal is to create a superior user experience via additional in-app features. Please be prepared to showcase similar projects or hacks in your portfolio. The ideal candidate will deliver this project in a timely, re...

    $556 (Avg Bid)
    $556 Avg Bid
    64 bids

    I'm looking for a skilled ethical hacker to embark on a unique project, aimed not just at identifying security vulnerabilities but for reasons beyond the usual scope. My priority is to approach this project with a fresh perspective, focusing on safeguarding our systems in innovative ways. **Objectives** - Beyond traditional security checks, this project craves innovation in protecting our digital frontier. - The omission of enhancing data privacy, ensuring compliance, or improving our security posture doesn't mean these aren't under consideration; our approach, however, prioritizes pioneering methodologies. **Timeline** - Completion is set within a month, providing sufficient time to delve deep while ensuring opportunistic threats are mitigated promptly. **Ideal Skills an...

    $73 (Avg Bid)
    $73 Avg Bid
    4 bids

    ...(f89a3a) and white logo (see to see how it should look) - image heights of 40px, 50px, 75px, 100px, 150px, 175px, 200px, 250px, 300px, 350px, 400px, 500px, 600px, 800px - width (keep aspect ratio with height) - all in PNG and JPG formats All images are to be named and sorted into folders. All images to be internet ready, optimal image file size and high image quality. There should be 112 in total for all the formats listed above. ----------------------------------------- Please also provide an optimally formated images for the following profiles: - Facebook - Tiktok - Instagram - Youtube - Twitter / X All these images should display optimally on each social media page (high resolution and positioning). They are not to be full cropped and require some spacing so the logo is no...

    $16 (Avg Bid)
    $16 Avg Bid
    69 bids

    I'm currently grappling with a redirection hack on two of my WordPress websites. Visitors are being redirected to unintended pages, likely due to malware infection. The malware's specifics, however, are still unclear to me. I'm seeking a freelancer with expertise in malware removal and website security to address and resolve this issue promptly. Key Requirements: - **Malware Analysis & Removal:** Identify and fully remove all traces of the redirection hack and any other potential threats from both sites. - **WordPress Security Hardening:** Implement measures to enhance the security of my websites, preventing future attacks. - **Website Restoration:** Ensure that my websites return to their original functioning state before the hack, with all c...

    $142 (Avg Bid)
    $142 Avg Bid
    64 bids

    I'm seeking a mobile security expert to ensure my iPhone is free from any hacks and to implement measures to prevent future compromises. My phone currently shows signs of being hacked, highlighted by receiving strange messages or calls. Despite not recalling the installation of suspicious apps recently, I need professional help to address and rectify these concerns. **Key Responsibilities:** - Conduct a thorough security audit of my iPhone - Identify any malicious software or activity - Remove any identified threats securely - Advise and implement preventive measures against future hacking attempts **Ideal Skills & Experience:** - Proficient in iOS security protocols - Experienced in malware detection and removal on iOS - Knowledgeable in securing devices against unauthorized ac...

    $270 (Avg Bid)
    $270 Avg Bid
    20 bids

    We are seeking 15-20 + years of experienced CORE PHP, Laravel developer. **Requirements:** - **Strong Proficiency in Laravel/ core php:** . - **Experience in fixing SQL Injections and security of php files: ** Demonstrable experience in fixing SQL injections and making sure the website is hack-proof - **Experience in Project Upgrades: ** Demonstrable experience in upgrading existing projects, making them more efficient, and integrating new functionalities seamlessly. **Ideal Skills and Experience:** - In-depth knowledge of PHP and Laravel framework. - Proficient in problem-solving and debugging. - Experience in performance tuning. - Ability to handle feature development from conceptualization to deployment. - Strong communication skills in ENGLISH - MUST be available for di...

    $6 / hr (Avg Bid)
    $6 / hr Avg Bid
    126 bids

    ...With an emphasis on elevating performance, squashing bugs, and introducing new features, the successful candidate will play a key role in steering our project towards excellence. **Requirements:** - **Strong Proficiency in Laravel/ core php:** . - **Experience in fixing SQL Injections and security of php files:** Demonstrable experience in fixing SQL injections and making sure the website is hack-proof - **Experience in Project Upgrades:** Demonstrable experience in upgrading existing projects, making them more efficient, and integrating new functionalities seamlessly. **Scope of Work:** **Ideal Skills and Experience:** - In-depth knowledge of PHP and Laravel framework. - Proficient in problem-solving and debugging. - Experience in performance tuning. - Ability to handle...

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    55 bids

    This project calls for an experienced WordPress developer to create a searchable database for European Union (EU) Funding Programmes. An example of this database as per ::closed::future&aspf%5Bmain_category_search__4%5D=116::113::409::112::114&termset%5Borganization-types%5D%5B0%5D=73&termset%5Bprogram-category%5D%5B0%5D=-1&termset%5Bprogram-major-category%5D%5B0%5D=-1&customset%5B0%5D=call&filters_initial=1&filters_changed=0&wpml_lang=el&qtranslate_lang=0&current_page_id=31660 The calls must be automatically uploaded via RSS (where available) Key responsibilities: - Incorporate all EU funding programmes into the database, including but not limited to Horizon Europe

    $526 (Avg Bid)
    $526 Avg Bid
    68 bids

    I’m looking for a skilled cybersecurity professional or ethical hacker to thoroughly test the API of our mobile application for vulnerabilities. The API is custom-built using our own PHP framework, and the goal is to strengthen our app by identifying potential security flaws. **What You'll Do:** - Conduct comprehensive vulnerability scanning and penetration testing on our mobile app’s API. - Utilize creative hacking techniques to uncover any weak spots or potential security loopholes. **Access Provided:** - You will be granted full access to the API for the purpose of this assessment. It’s important that you handle this access responsibly and ethically. **Report Requirements:** - Upon completion of your testing, I expect a summary report of vulnerabilities discove...

    $73 (Avg Bid)
    $73 Avg Bid
    13 bids

    ...as well I will send a folder with our .ai icons (REBRANDED ICONS) that were recently redesigned for our new software once a message is sent to us, these are the icons that we would like to be used in the new version! We are rebranding so our new colours will be the following: Colours: BLACK: HEX #080808 R 8 G 8 B 8 WHITE: HEX #F0F0F0 R 240 G 240 B 240 ORANGE: HEX #F07020 R 240 G 112 B 32 GREY: HEX #686868 R 104 G 104 B 104 RED: HEX #F80808 R 248 G 8 B 8 GREEN: HEX #08B008 R 8 G 176 B 8 Here is a wetransfer link with the requirements and icons that need to be redesigned:

    $763 (Avg Bid)
    $763 Avg Bid
    92 bids

    I need a few lines of code hacking for adding variables to CMS contents of prestashop

    $23 (Avg Bid)
    $23 Avg Bid
    15 bids

    ...plaintiff in federal court change the address of the defendant corporation from in-state to out of state to meet diversity requirements? 2) Hacking into a privately owned website and placing malware there. Their motive was to squash public knowledge of their illegal and unethical behavior plus give pointers of how to best sue them if there was cause. 3) Civil rights issues because the website hack restricted the site owner's free speech as users' anti-malware software prevented them from visiting it or adversely affected their computers 4) Conspiracy charges because in a large corporation there must have been >1 person approving, planning and hacking. 5) Way of stating/showing sufficient proof for “preponderance of evidence” when all evidence of the h...

    $243 (Avg Bid)
    $243 Avg Bid
    24 bids