Internet security involve training and/or experience in the design, assessment and configuration of measures to protect both IT systems exposed to the Internet as well as the consumers of those systems. The field of internet security is highly volatile as new threats and measures develop on a daily basis, necessitating anyone tasked with it to constantly keep their skill up to date to remain effective.
This is a skill carrying high responsibility, as data compromises of either company data or personal data can incur significant reputational or financial damage. Given these risks, this skill is mandatory for any organization with an Internet presence to secure, either through their own recruitment or vetting of their suppliers.Najem Internet Security Experts
need a long term developer how is familiar with python coding, I want someone to train me on python and teach me from basics. I am planning to have a full course and complete it in at least 5-6 full weeks. ( I prefer classes on Monday / Tuesday / Wednesday / Friday ).
We're looking for a security audit of an E-Commerce site built on Magento 1: [prijavite se za ogled URL] Please check for malware, any issues with security patches and any server vulnerabilities (if applicable - the site is hosted on a PCI-compliant shared host) We will need a report of everything that has been checked and if there are any issues that need to be addressed.
I need to look back on my search history over a specific period, but have deleted the history, and the activity log from my Google account. I'm hoping there will be another way to recover this search history. I'm also looking to improve the overall security of my laptop as I have concerns that I have been hacked.
Ok for this project you’ve been given several codes that you need to try and decode. You’ll need to research some of the most common encoding schemes used to try and break each of the codes. An experienced security expert can spot most encoding schemes very quickly, the trick is to check the character set used in the encoded message and the length of the encoded message, these will poi...
We need to simulate sinkhole or sybil attack using cooja simulator in RPL. Thus, we need to modify the source code of objective function that handles rank calculation. All this must be done in contiki OS 2.7
Protecting my website from crawler and scraper (30$). Hello! Thank you for having interest in this topic. As you know, Crawling and scraping have been always generalized. Even if you don't have very deep knowledge about it, you can make your own crawling tool just following a few steps in a tutorial that you could easily see in online. But still, there seem to be a way have a shield, cont...
There is requirement to identify suspicious users from web server log file. Definition of suspicious users - Suspicious users are the users other than attack users. They are suspicious because they don't have any particular aim to visit a web application. They neither do hacking activities. But they even not normal users. They do other than normal activities without any purpose. For example,...
My server hosted on a2hosting's database is being constantly dropped by someone or a script. Need someone to look into this for me and find out whats causing it, whether its SQL injection or something else.
I am using cloud flares and aws. My original ip is under attack. I changed ip several times using "private IP" provided by aws, but I was attacked. So I will only allow cloudflare ip on aws. want to set all security for IP impressions. I am looking for a professional to set this up. looking for professionals who can provide detailed manuals in steps.
PLEASE APPLY ONLY IF YOU ARE QUALIFIED - THIS JOB IS FOR GENIUS ONLY I want to test the level of security for my website. I need you to hack my own website and check if you can steal my own email database. If you manage to do this, help me find secure the website. The job interview will be done in skype video call only.
I have a windows virtual machine. I want an expert who can do Authentication relay attack on it and document all the steps to do it. This is to be done to check the windows feature "Extended Protection for Authentication". Testing is to be done for IIS and SQL Server 2017.
The idea is to do a digital signature but with Encryption, in this case we can retrieve the text and image ( not just hashing). I already have code in Java that do that and android app but I need to convert it to C#
My computer is being attacked and datas are locked. Looking for someone to help unlock the datas. Below are messages I received when I turned on my computer. ? Your files are encrypted! ? -------------------------------------------------------------------------------- All your important data has been encrypted. To recover data you need decryptor. To get the decryptor you should: Send 1 test image...