Perl hacking hotmail jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 perl hacking hotmail jobs found, pricing in USD

    Script Feature: - Login to a list of SSH servers by domain or IP (from text file) - Use a set of usernames + password (can be multiple passwords) to login to the servers. - Run Bash Script on the connected server (which comes from a txt file on the server running the script, not on the connected to server) - Timeout if SSH server did not answer. - Display results at the end of a run (show which servers the script did not run because of errors). Login simultaneously to all available ssh servers. Not server by server.

    $29 (Avg Bid)
    $29 Avg Bid
    19 bids
    University Work Hacking 5 days left
    VERIFIED

    Dear Ladies and Gentlemen, I am searching for someone who can help me with a work (universty work) hacking. Point is to show the ways of hacking. - What methodes are there - What are the consequences - etc.. Pls only when you have experience in this

    $500 (Avg Bid)
    $500 Avg Bid
    26 bids

    I am in need of an experienced technical analyst for a critical project focus on testing ...the system can withstand under heavy loads without crashing or slowing down notably. Ideal freelancers should have significant experience in network or application security, proficiency in executing various types of tests including penetration and load tests, and a proactive approach to identifying potential vulnerabilities in systems. A strong understanding of cybersecurity principles, ethical hacking, and performance testing methodologies is crucial to the project's success. Your ability to deliver clear, easy-to-understand reports on your findings is also important. full documentation how the tests are being done is needed (step by step) or record videos in order for us to replicate...

    $453 (Avg Bid)
    $453 Avg Bid
    11 bids

    I am seeking a skilled game hacker for the purpose of modifying Game A's mechanics. More specifically, I am interested in altering the movement mechanics of this game. The ideal personnel would have: - Profound knowledge in hacking and game modification - A specific focus on movement mechanics - Proven experience in Game A or similar titles - Strong understanding of ethical hacking rules In essence, your task would be to alter these specific game mechanics in a fair and ethical way that aligns with the designated rules of game modification. A keen understanding of movement mechanics and the ability to replicate that in real time is a must for this project.

    $90 (Avg Bid)
    $90 Avg Bid
    3 bids

    I need to convert the following Perl code to PHP: The expected output is a PHP class that can convert a docx file into text. The attached zip contains a mockup of such class (with demo code) and a test docx file. The task is straight forward. If you place a bid, expect it to be accepted. If you fail to deliver, you'll be subjected to a bad review. This is to avoid wasting my time with autoposters and people who lowball the bid and then try to ask for more money. You have been warned. Read the brief, check the code and place a bid accordingly.

    $214 (Avg Bid)
    $214 Avg Bid
    25 bids

    I’m seeking an experienced cybersecurity specialist to secure my informational websites against hackers and malware. Key Responsibilities: - Implement robust security measures to fend off hacking attempts and prevent malware infections. - Prioritize the website's availability and uptime, ensuring the security protocols don’t interfere with the website's responsiveness and speed. Ideal Skills: - Extensive practical knowledge of website security best practices. - A solid understanding of hacker methodologies. - An ability to install and configure cybersecurity software. - Previous experience in protecting informational websites. Your role will be crucial in maintaining a secure digital environment that keeps my users' trust and consistently delivers ...

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    32 bids

    I need an IT specialist who can perform an ethical hacking on my home network system to alleviate my security concerns. Key responsibilities include: - Assessing and troubleshooting my home internet - Securing my Wi-Fi network from unrecognized access - Checking any suspicious activities on my devices - Preventing unwanted access to my personal information The devices connected to my home network include smartphones, computers/laptops, and smart TVs/streaming devices. Ideal skills for the job: - Strong experience in IT support - Knowledge of network setup and configuration - Proficiency in software and hardware installation - Solid background in ethical hacking and internet security. Let's ensure the security of my home network! I have a small home business...

    $142 (Avg Bid)
    $142 Avg Bid
    14 bids
    Software Development 3 days left
    VERIFIED

    I am in need of a professional who can develop a gaming software tailored explicitly for my personal Windows or Android device Key Features: - The software should help me know the outcome of a specific game result Ideal Candidate: - Proficient in script writing, programming, hacking would be an added advantage - Has a valid understanding of developing gaming applications - Familiarity with diverse gaming strategies would be a significant plus Will continue on chat but due to trust issues you will start the software and show me updates before I pay you

    $158 (Avg Bid)
    $158 Avg Bid
    26 bids
    Lead Generation 3 days left

    ...be an exhaustive list of pains and fears identified and communicated for each ICP, so that the ICP feels that we are speaking directly to them and the fears are allayed and the risk of moving forward is low. Campaign Elements: 1. **Research and Analysis** - Conduct thorough research into the pains, fears, and behaviours of the ICPs. - Investigate competitor's funnels for insights (funnel hacking). 2. **Ad Creation** - Craft ad copy that directly addresses the ICPs' specific issues. - Develop engaging adverts (static or video formats) highlighting a High Value Content Offer (HVCO), such as an eBook addressing the critical aspects of managing Amazon PPC effectively. 3. **Lead Magnet and Conversion Process** - Create an OPT-in page to capture leads by off...

    $19 / hr (Avg Bid)
    $19 / hr Avg Bid
    9 bids

    I am seeking an expert in Youtube growth hacking who can significantly increase subscriber count on my channel. Checking the channel, you will find it's primarily focused on educational materials and experiences on various aspects of life. What I need now is a strategy that aligns with the goal of daily video posting and leverages that content to gain maximum subscribers. I Want watch housrs also Ideal candidates should: - Have extensive experience and success in growing Youtube channels. - Be well-versed in Youtube's algorithms and SEO. - Be able to provide actionable strategies for daily content. - Demonstrate a clear understanding of effective promotional techniques to attract the target audience.

    $18 (Avg Bid)
    $18 Avg Bid
    11 bids

    I'm urgently in search of a well-rounded and outstanding programmer fluent in numerous programming languages. It's essential for you to excel in Python, Java, C++, C#, Scala, Ruby, Python, Perl, Javascript, Go, SQL, Rust, Swift, Kotlin, HTML/CSS, and be experienced with NoSQL and LaTeX. Ideal technical expertise includes: - Data Visualization: Proficiency in matplotlib, D3.js, bokeh, or comparable tools - Machine Learning: Familiarity with TensorFlow, scikit-learn, PyTorch, or equivalent - Unit & Functional Tests: Experience using Selenium, Cypress, Mocha, or similar - Cloud Computing: AWS, Azure, Google Cloud Platform, or equivalent knowledge - Containerization: Docker The central task is to perform insightful programming assessments and coding within my enterpris...

    $25 / hr (Avg Bid)
    $25 / hr Avg Bid
    51 bids

    ...ticketing platform. Key Features/Requirements: * It should automate the purchase of tickets for all Real Madrid matches including La Liga, UEFA Champions League, and Copa del Rey games. * Additionally, the bot must be configured to search for tickets within specified seating sections. Ideal Skills and Experience: * Proficiency in programming languages fit for bot development (Python, Javascript, Perl or similar) * Previous work in developing bots or automation tools, specifically ticket purchase bots, will be quite beneficial. * Awareness of ticketing platforms or a ready understanding of the Real Madrid ticketing process is a strong advantage. I look forward to hiring a dedicated and skilled developer who thoroughly understands requirements and can bring this project to fruit...

    $276 (Avg Bid)
    $276 Avg Bid
    28 bids

    As a keen organization looking to ensure our cyber security measures are fully proofed, we wish to invite experience...test on our network infrastructure. Our ultimate goals are to: - Identify any vulnerabilities within our system - Robustly assess the security measures we have already put in place on our network - Gauge the efficacy of our cybersecurity measures This project will require: - Deep understanding of cyber security and network system trends - Proven experience in penetration testing - Ethical hacking capabilities - Familiarity with both manual and automated testing tools Please bring forward your proficiency in providing comprehensive and detailed reports. We anticipate the information to be intricate, actionable, and explained in a way that a non-expert could u...

    $1170 (Avg Bid)
    $1170 Avg Bid
    25 bids
    Linux Server administrator -- 2 10 hours left
    VERIFIED

    ...responsible for: - Investigating potential security vulnerabilities within our server - Proposing and implementing necessary measures to fortify server security While the requirement does not particularly target any specific area of security, a comprehensive understanding of all aspects of server security, from firewalls to data encryption, will be regarded as an asset. Experience with warding off hacking attacks is particularly desired. Candidates who are skilled in configuring email accounts or setting up domains and databases, while not a mandatory requirement for this project, will be preferred. Of greater importance is the ability to diagnose WordPress websites hosted the Hestia control panel experience in Hestial control panel is very important and key in this task The wor...

    $34 (Avg Bid)
    $34 Avg Bid
    20 bids

    Seeking a dynamic Freelance Growth Hacker with a proven track record of growing a crypto project to success. Your goal: attract new investors by leveraging and adapting strategies that you ...have implemented elsewhere in the crypto world. Key Tasks: - Implement successful growth tactics to boost our investor base. - Use analytics to refine and optimize strategies. - Work flexibly and collaboratively with our remote team. - A keen understanding of the target audience (crypto enthusiasts, decentralized investors) is also vital Requirements: - Demonstrable success in crypto growth hacking. - Versatile marketing skills; creative and analytical mindset. - Excellent communication and teamwork abilities. Offer: - Work on an exciting crypto project with room for your ideas. - Lasting pa...

    $577 (Avg Bid)
    $577 Avg Bid
    11 bids

    I'm in need of a skilled...software engineer to develop a unique mobile application. The key functionality will be the ability to take control of another app as per user selection. This is not a common feature found in standard mobile applications, so it's crucial that you possess a strong understanding of mobile app development and possibly ethical hacking. Ideal Skills: - Robust knowledge in mobile application development - Experience with software that controls other apps - Understanding ethical hacking principles could be a plus The timeline for completion is within a month, so you should be prepared for an intense period of focused work. If you have experience in this niche area and can deliver within the specified timeline, kindly place your bid. Your expert...

    $313 (Avg Bid)
    $313 Avg Bid
    17 bids

    I'm in need of an expert hacker to secure my personal online accounts. The parameters for this project will be personal to me, and will be discussed with the hired freelancer. The ideal freelancer for this project would be highly experienced in Reverse Engineering. They would also be able to provide a detailed project proposal il...project would be highly experienced in Reverse Engineering. They would also be able to provide a detailed project proposal illustrating their intended approaches and methods to complete the project. Skills and Experience Required: - Expert in Reverse Engineering - Excellent communication skills - Must provide a detailed project proposal - Proven background in online security and ethical hacking - Confidentiality and high ethical standards...

    $2398 (Avg Bid)
    $2398 Avg Bid
    7 bids

    I am seeking a talented Social Media Manager to build our presence on Facebook and Instagram. Requirements: - Ability to grow followers organically - Experience in running paid ad campaigns - Track record in driving site traffic via social media The goal of this project is to significantly ...The ideal candidate must have a proven track record in executing effective strategies that optimize our visibility, engage our audience and drive site visits. Both organic and paid strategies will be integral to achieving this goal. Skills and Experience: - Comprehensive understanding of Facebook and Instagram - Familiarity with analytics and social media advertising - Experience in growth hacking or similar positions - Versatility in using both organic and paid strategies to drive si...

    $62 (Avg Bid)
    $62 Avg Bid
    32 bids

    Seeking an ethical hacker with specialized expertise in cyber security. Ideal candidates must demonstrate: - Experience in different facets of ethical hacking, including but not limited to network penetration testing, web application security testing, and social engineering testing. Even though these areas were not specified in the project, a well-rounded candidate should possess skills in these areas. - Extensive experience in cyber security. This is a key requirement for this project. Please detail level of expertise and provide examples illustrating this experience. Applications must include detailed information about the freelancer's experience, preferably in the realms mentioned above. Past work samples are not a mandatory criterion but the emphasis is on your experienc...

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    11 bids

    Seeking an ethical hacker with specialized expertise in cyber security. Ideal candidates must demonstrate: - Experience in different facets of ethical hacking, including but not limited to network penetration testing, web application security testing, and social engineering testing. Even though these areas were not specified in the project, a well-rounded candidate should possess skills in these areas. - Extensive experience in cyber security. This is a key requirement for this project. Please detail level of expertise and provide examples illustrating this experience. Applications must include detailed information about the freelancer's experience, preferably in the realms mentioned above. Past work samples are not a mandatory criterion but the emphasis is on your experienc...

    $13 / hr (Avg Bid)
    $13 / hr Avg Bid
    6 bids

    I need a professional with strong experience dealing with hacked WordPress websites. Under this project, your responsibilities would include: - Cleaning and restoring my hacked WordPress website...dealing with hacked WordPress websites. Under this project, your responsibilities would include: - Cleaning and restoring my hacked WordPress website from the recently available backup. - Enhancing the post-recovery security to prevent further hacking attempts. - Potentially identifying areas most impacted by the hack, as I'm unsure of specific areas. General skills and experience: - Proven track record with WordPress. - Specific experience dealing with recovery from hacking attacks. - Knowledgeable about preventative measures against hacking. - Experience in web...

    $179 (Avg Bid)
    $179 Avg Bid
    43 bids

    I'm in need of professional assistance to conduct an in-depth exploration of Android device's security. The tasks that need to be carried out involve: - Extracting data - Bypassing security measures - Analyzing present vulnerabilities Please note, the project will be hand...- Analyzing present vulnerabilities Please note, the project will be handled remotely as I do not have physical access to the Android device. I'm expecting a freelancer equipped with advanced skills in Android platform, cybersecurity, and remote access capabilities. Ethical hacking certification would be a plus. Your role is to identify and diagnose the holes in security rather than exploiting them. I'm looking forward to working with a dedicated security expert who respects the rules of ...

    $80 (Avg Bid)
    $80 Avg Bid
    3 bids

    I require immediate assistance in hacking a phone for investigative purposes. This is a legal request and solely for the purposes of obtaining: - Call logs - Text messages - Pictures Timing is critical, and I therefore expect the work to be completed ASAP. An ideal freelancer for this project would have expertise in ethical hacking, digital forensics, and cyber investigations. Experience with information security and a proven track record in similar projects is greatly appreciated. Please note, strict adherence to ethical guidelines and professionalism is mandatory.

    $346 (Avg Bid)
    $346 Avg Bid
    25 bids

    I require a proficient IT specialist with a deep understanding of system audit logs and SharePoint. I have recently experienced a cybersecurity issue, hence, the need for an expert to help to recover and secure my system. Your duties will include: - Comprehensive review and analysis of system logs for detection of any hacking patterns. - Implement corrective actions from system logs analysis and ensure security updates and patches are done. - Assist with data backup and recovery to restore lost files. - Set up SharePoint for document sharing and collaboration, with high focus on security protocols. The ideal candidate must have significant experience in system logs review, an understanding of SharePoint functionality, and a knack for data backup/recovery. Familiarity with network...

    $27 / hr (Avg Bid)
    $27 / hr Avg Bid
    6 bids

    I'm on the hunt for a competent "funnel hacker" with specialized experience in creating and identifying sales & operational funnels. The scope of this project involves funnel hacking current successful sales funnels and breaking it down with in a flow chart. Your Experience: - A solid background in optimizing or 'hacking' funnels in the social media niche Project: - Identify the entire sales funnel of @lladosfitness on instagram, @llados ok TikTok & "LLADOS" on YouTube (700k ish followers) - Organize everything into a flow chart with visuals and clickable links - Make it very clear as to what needs to be done if one was to replicate the exact funnel & every sales avenue this person has - Include Google/Facebook ads that you f...

    $85 (Avg Bid)
    Featured Urgent
    $85 Avg Bid
    2 bids

    I'm i...intermediate-level ethical hacker to tackle Snapchat. The focus is pure white-hat, with the aim to understand and anticipate potential security weaknesses or vulnerabilities. Although designing strategies to mitigate these vulnerabilities isn't required, I appreciate your insights in this aspect. Required Skills and Experience: - Proven experience in ethical hacking - Knowledge in cybersecurity and data protection protocols - Familiarity with commonly used hacking tools and techniques - Previous practice with social media platform security or similar would be beneficial Please note, the essence of this project doesn't involve applying talent for any form of illegitimate activities. Information or suggestions that contravene these professional standard...

    $125 (Avg Bid)
    $125 Avg Bid
    15 bids

    I am the owner of a website and I need an expert in cyber security. My primary aim is to gain an understanding of the website's level of security, specifically focusin...understanding of security features, your role will be to: - Test the password strength, identifying any weaknesses - Provide a detailed report of your findings, and suggestions for improvement - Provide ethical hacking service with permission Due to the nature of the task, it's imperative that you have a solid background in computer security or a related field. Advanced knowledge and techniques in hacking such as ethical hacking, penetration testing, Apollo Database and computer systems are vital. Please note: all actions are authorised and fall within the legal boundaries. Only ethical ...

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    6 bids

    I'm seeking an expert to help cr...an expert to help create a Dockerfile that runs Perl and DBD::mysql so that I can run a legacy website. This should be a simple task if you have the knowledge. Specific requirements include: - A Dockerfile is the only output required, roughly corresponding to mine - It should build and run in wsl, i.e. docker run -p 8080:80 image_name - It must use Apache, Perl and the CPAN module DBD::MySQL - It should have been tested on a MySql database, the file is provided to run on localhost:8080/ - A screenshot of the above is required to prove that it is working (you just need a MySql Table with fields Id and Name) Candidates should ideally have: - Extensive experience in Docker and a basic knowledge of Perl - Understanding of Per...

    $68 (Avg Bid)
    $68 Avg Bid
    5 bids

    I'm seeking a proactive, engaged, and experienced Community Manager for my Web3 Gaming Projec...partnerships with other Web3 Gaming projects, KOLs and Influencers; - Create attractive Web3 Quests campaigns - Creating engaging content daily - Actively engaging with and building our online community - Moderating discussions to maintain a positive community environment Ideal applicants should have excellent communication skills, experience managing Twitter and Discord communities, growth hacking experience in the Web3 space, and a passion for gaming. Familiarity with the Web3 environment will be a significant advantage. Please provide examples of communities you’ve grown and links to your created content. P.S. Would be great if you love playing board games and have played...

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    13 bids

    I am the owner of a website and I need an expert in cyber security. My primary aim is to gain an understanding of the website's level of security, specifically focusin...understanding of security features, your role will be to: - Test the password strength, identifying any weaknesses - Provide a detailed report of your findings, and suggestions for improvement - Provide ethical hacking service with permission Due to the nature of the task, it's imperative that you have a solid background in computer security or a related field. Advanced knowledge and techniques in hacking such as ethical hacking, penetration testing, Apollo Database and computer systems are vital. Please note: all actions are authorised and fall within the legal boundaries. Only ethical ...

    $27 / hr (Avg Bid)
    $27 / hr Avg Bid
    13 bids

    ...WhatsApp Instagram link, linking to actual Instagram posts, page footer, application links on Google, and... others. 8. The delivery price when the amount is 49,000 or less equals 5,000, or 50,000 or more equals 0, and it now works like this. It was previously added by one of the developers. 9. Install important add-ons 10. Activate the most important methods of protecting the site from hacking, such as captcha and... 11. Cleaning the site from any malicious programs that may be present as a result of previously using unofficial add-ons. It is preferable to delete the entire site to ensure 100% cleaning, but while preserving the current content of the same products that are currently present by keeping a backup copy of them or.... 12. How can I keep a copy of the ...

    $512 (Avg Bid)
    $512 Avg Bid
    64 bids

    ...working. MochaHost tech support got the Import buttons on the forms fixed but suggests they may not be able to fix the XML & XML+XSL submission buttons at the bottom of the forms. Here's what they say about that: When the server is upgraded, the Perl modules in the new server might not be fully imported. That's why your website doesn't work because some Perl module dependencies might be deprecated. MochaHost support says: We highly suggest you talk about the error with your Web Developer to ensure they can help you add the missing path on the Perl module. Based on our check, your website form processing is missing pointing to the `File::Spec` module which has been installed on the server. It seems like that might be a fairly easy fix and I have...

    $30 - $250
    Sealed
    $30 - $250
    1 bids

    I'm in need of an expert in ethical hacking, cybersecurity, and penetration testing. The main task will be gaining access to an Android phone for the purpose of monitoring and surveillance. Specific activities to monitor include: - Call logs and messaging - Location tracking Extensive experience in similar projects is a must, with a focus on maintaining data integrity and confidentiality. Please, only ethical hackers need apply.

    $66 (Avg Bid)
    $66 Avg Bid
    5 bids

    As an individual, my primary concern is understanding and improving my phone's security. I am looking for an expert who can undertake the task of hacking my Android phone in a controlled environment, the main goal being to retrieve personal data. This is to help me understand potential vulnerabilities and assess measures I can take. Requirements for this project include: - Deep understanding of Android vulnerabilities - Significant experience in penetration testing - Ethical hacking skills - Absolute respect for privacy norms and understanding of ethical boundaries Communication is a vital component, I expect regular reports. Note, this project’s intention is purely security enhancement and not for any malicious intent. If you appropriately fit the criteria, pl...

    $177 (Avg Bid)
    $177 Avg Bid
    16 bids

    I'm in need of a knowledgeable and experienced cybersecurity trainer. The individual will provide comprehensive training for up to 10 students who are beginners in the field. Key Responsibilities: - Deliver training on Network Security, Ethical Hacking, and Data Privacy - Develop teaching materials appropriate for the beginner level - Monitor student's progress and provide actionable feedback Ideal Skills & Experience: - Strong proficiency in Network Security, Ethical Hacking, and Data Privacy - Previous experience in the role of instructor or trainer, especially with beginner-level students - Excellent communications and interpersonal skills - Ability to simplify complex concepts and foster engaging learning environment.

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    8 bids

    ...performance tuning, sizing and capacity planning, database backup and recovery in a Unix O/S using RMAN and Oracle export/import utilities, administration, and maintenance to provide backup and disaster recovery. • Knowledge of installation, configuration, and maintenance of multi-node Oracle RAC enabled databases, including Oracle ASM and Oracle CRS management. Knowledge of PL/SQL packages, shell, and Perl scripts for task automation, and proactive database monitoring and notification using Oracle OEM Grid Control. • Demonstrated written and oral communication skills reviewing and editing established database policies and procedures and developing new SOPs for database software installation and configuration. • Experience with Cloud(AWS/Azure/OCI) migrations (DB a...

    $2622 (Avg Bid)
    $2622 Avg Bid
    4 bids

    I'm looking for seasoned coders that excel in Perl, to reconfigure my current Perl email script. The primary aim is to make it efficient in sending out emails using Google's SMTP. Key Deliverables: - Modify Perl script to use Google's SMTP via the Net::SMTP::SSL or Email::Send::SMTP::Gmail modules - Integrate secure connection to Gmail - Integrate Email authentication No requirement for handling attachments is necessary. Need to understand how the forms work. Proficiency in Perl, understanding of SMTP protocols, specifically Google's SMTP, and experience with Net::SMTP::SSL and Email::Send::SMTP::Gmail modules are crucial for success in this task.

    $15 (Avg Bid)
    $15 Avg Bid
    2 bids

    I need a skilled PERL developer to create a compact and secure script to automate the login process to a banking site. The purpose of the script is to extract data from the first page subsequent to a successful login. This will require the following: - Deactivating a "security keyboard" with one click - Inputting the login credentials stored in variables - Navigating to a given page of the website - Perl 5 on Linux The banking site utilizes Ansible and JavaScript, so an understanding and experience of these technologies is ideal. Lastly, once the relevant data has been successfully extracted, it should be stored in an array for further processing. No file or display output is required at this stage. Skills required for this task are proficiency in scripting wit...

    $31 (Avg Bid)
    $31 Avg Bid
    5 bids

    ...emails and text messages. The ultimate aim is to harness the knowledge for the purposes of ethical hacking. Key focus areas: - Fundamentals of Email and Text Message Spoofing. - Core Concepts that Govern Ethical Hacking. - Understanding the Interface between Spoofing and Ethical Hacking. A potential candidate for this project will ideally have: - Extensive experience in cybersecurity and ethical hacking. - Innovative teaching skills to simplify complex concepts. - Proficiency in course structure and creation. Your assignment is to enlighten beginners with zero experience about the theory behind spoofing, imparting them the tools necessary to utilize this knowledge in the field of ethical hacking. Please note that the course should strictly follow ...

    $24 / hr (Avg Bid)
    $24 / hr Avg Bid
    20 bids

    ...Responsibilities: - Clean up my Wordpress site from any existing malware. - Update and remove any security issues. - Assure the site isn't susceptible to hacking in the future. - Resolve issues related to outdated plugins and suspicious file modifications. Additional Issues: - My reservation system has also been affected and is currently not functioning. Handling this issue efficiently would be a crucial part of the job. Ideal Skills: - Experience in WordPress security and handling malware issues. - Proficiency in managing outdated plugins and fixing suspicious file modifications. - Previous experience in dealing with issues like hacking and data breach. - Familiarity with security tools such as website firewall, Malware scanner, and login security plugin. If you...

    $54 / hr (Avg Bid)
    $54 / hr Avg Bid
    69 bids

    I'm on the lookout for a professional who can significantly increase the number of subscribers on my educational YouTube channel, which currently has 115 subscribers. Specifically, the results of this project should help me reach a broad...Specifically, the results of this project should help me reach a broader audience so that my educational content can touch and impact more kids. Key tasks of the project include: - Develop an effective growth strategy - Implement the strategy, with emphasis on organic growth - Suggest ways to improve content quality or delivery Ideally, you will have experience in: - YouTube channel growth hacking - Content strategising with an educational focus - Audience development and engagement Looking forward to transforming my channel with ...

    $7 - $18
    Sealed
    $7 - $18
    9 bids

    Clean up of , , reload existing files from onto domain. Make sure backend is secure, clean, plugins are not causing easy hacking. 2FA all sites

    $30 / hr (Avg Bid)
    $30 / hr Avg Bid
    1 bids

    I'm in need of an experienced professional for a sensitive project. The main objective is to monitor activity on a specific phone. ***...sensitive project. The main objective is to monitor activity on a specific phone. ***Key Responsibilities***: * Monitoring call logs and text messages * Monitoring social media activity * Mapping the geographical location ***Expected Frequency***: This is an ongoing project and the monitoring is expected to be done continuously. ***Ideal Candidate***: You should have proven experience in ethical hacking, data retrieving, and digital forensics. A deep understanding of mobile operating systems, mobile surveillance techniques, and privacy laws is expected. It's also crucial that you handle this project ethically, responsibly and with utm...

    $301 (Avg Bid)
    $301 Avg Bid
    3 bids

    I'm looking for a skilled growth hacker with experience in Search Engine Optimization (SEO), Social Media Promotion, and Content Marketing. The main goal of this project is to significantly increase traffic to my website to sell an e book. I'm targeting an international audience, hence an unders...targeting an international audience, hence an understanding of diverse digital landscapes is essential. Key Responsibilities: - Implement SEO strategies to enhance website visibility - Develop, manage, and track social media promotions - Create captivating content that will drive traffic Ideal Skills: - Prior experience in SEO, social media promotions, content marketing - Proven results in growth hacking - Deep understanding of international digital spaces - Excellent written c...

    $51 / hr (Avg Bid)
    $51 / hr Avg Bid
    36 bids

    I'm seeking skilled Perl coders to modify my email script. This script currently sends out emails well after a web form submission using the Net::SMTP::SSL module. Success in this project will mean updating the script to instead utilize the Email::Send::SMTP::Gmail module. Ideal Skills: - Proficient in Perl coding - Familiarity with Net::SMTP::SSL and Email::Send::SMTP::Gmail modules - Understanding of Google SMTP Key Responsibilities: - Reconfigure Perl script to work with Email::Send::SMTP::Gmail module - Ensure the script remains efficient for sending out web form submission emails - Test script after modifications to verify seamless integration with Gmail SMTP

    $25 (Avg Bid)
    $25 Avg Bid
    9 bids

    ...result in loss of marks. 2. Technical Report Requirements You are required to write a professional report describing your exploitation process for each target. You must document all your attacks including all steps and commands issued. For each target machine you exploit, you must provide the target’s operating system name and IP address and detailed documentation to accompany the ethical hacking process. Your documentation should be thorough enough that your attacks can be replicated step-by-step by a technically competent reader....

    $188 (Avg Bid)
    $188 Avg Bid
    18 bids

    I'm seeking an experienced penetration tester to perform a black box testing on my website. The aim is to identify potential vulnerabilities that may be exploited by malicious actors. This role demands a thorough understanding of various hacking methods and the ability to implement latest penetration testing tools. Key Requirements: - Expertise in Black Box Penetration Testing. - In-depth knowledge of potential website vulnerabilities. - Familiarity with latest penetration testing tools and techniques. - Strong report-writing skills to document findings. Please share your previous experiences in website penetration testing, along with any relevant certifications. Your approach on how you would test the website vulnerabilities and prevent potential security risks is high...

    $34 / hr (Avg Bid)
    $34 / hr Avg Bid
    41 bids

    ...internal systems. The key focus of this task will be to monitor someone's activities on Snapchat, which I currently do not have access to. The scope of the project includes: 1. Monitoring Specific Information: - I'm primarily interested in observing the target's Snapchat password. To complete this project successfully, you will need: Skills & Experience Required: - Prior experience in ethical hacking or digital forensics. - An understanding of Snapchat's API and backend systems. - Ability to work discreetly and maintain confidentiality. Please note, this project adheres to all legal and ethical constraints, and any actions taken should respect the target person's privacy rights. Your proposal should include your approach to this task, examples...

    $192 (Avg Bid)
    $192 Avg Bid
    4 bids