Jamming attack wsn tcl punët

Filtër

Kërkimet e mia të fundit
Filtro sipas:
Buxheti
deri në
deri në
deri në
Lloji
Aftёsitё
Gjuhët
    Shteti i punës
    2,000 jamming attack wsn tcl punët e gjetura, me çmimin EUR

    ...life anime-inspired T-shirt designs. Here's what I envision for this project: - **Purpose**: The primary goal is to create eye-catching T-shirt designs that encapsulate the vibrant and lively spirit of popular anime. While I haven't specified which anime themes or characters to include, I'm open to creative proposals that incorporate elements from fan favorites like Naruto, My Hero Academia, and Attack on Titan. - **Color Scheme**: The designs should employ a bright and vibrant palette. I'm looking for colors that pop and breathe life into the fabric, making each T-shirt a statement piece. **Ideal Skills and Experience**: - Strong portfolio in graphic design, particularly in apparel. - Proficiency in Adobe Illustrator, Photoshop, or similar software. - Expe...

    €13 (Avg Bid)
    €13 Oferta mesatare
    13 ofertat

    ...assignment dealing with TCP SYN flood attacks. My primary goal is to deepen my understanding and implement strategies related to this specific type of cyber-attack. Given the urgency of my timeline, I am in dire need of a professional freelancer who can offer their expertise on the subject. ### Key Requirements: - **Expertise in Linux Ubuntu**: Proficiency in the Linux operating system, specifically Ubuntu, as the assignment will be executed within this environment. - **Understanding of TCP SYN Flood Attacks**: A solid grasp of the theory behind TCP SYN flood attacks. The freelancer should be able to explain the mechanics of the attack and its implications. - **Implementation Skills**: Though the specific focus area wasn't mentioned, I am looking for someone w...

    €53 (Avg Bid)
    €53 Oferta mesatare
    10 ofertat
    VM-Ware Esxi 6.5 Ka përfunduar left

    We have lot of servers (Windows_OS) running on VM-Ware Esxi version 6.5. On Thursday, we got hacked (encrypted) by the ransomware attack, now all servers are non-accessable. This caused a general disruption in the company. We need someone who is expert in dealing with ransomware and able to (de-encrypt the servers's data). We have the backup on our external storage but the data is very old, (approximately 3 months) If anyone have the knowledge regards above, kindly approach us urgently.

    €52 / hr (Avg Bid)
    €52 / hr Oferta mesatare
    8 ofertat

    Market Research: Please find over 100 specific statistics within the past 24 months that directly relate to the cyber risk of small and mid-sized businesses. For example: "53% of SMBs were hit by a cyberattack in the past year", "46% of uninsured SMBs never fully recover from an attack," and "60% of executives may decide to not do business with you if you don’t carry adequate cyber insurance coverage". The statistics must include a reference to the original publication source so it can be cited correctly. Source data from reputable industry reports, surveys, and analyses. This research will be used in professional presentations to business owners, so it must be well researched and solid. Thank you for considering this project.

    €11 / hr (Avg Bid)
    €11 / hr Oferta mesatare
    7 ofertat

    ...only forward , backward , side ways but NOT diagonally. Each player tries to encircle the enemy's one piece on three sides. Game pieces will be roman soldiers. the user instead of moving the star static game pieces, moves the characters from square to square, and the characters move with a walking animation. When red soldier for example is surrounded on three sides by three blue soldiers, they attack him together and he collapses dies and disapperrs. Please guide me on exactly what all the graphics designer must give, so that later we dont face delays because some components you need are missing. Also mention any other specs or criteria he must follow Please do not send AI (artificial idiocy) generated replies, it impresses no one. Just be an intelligent human, because ...

    €228 (Avg Bid)
    €228 Oferta mesatare
    18 ofertat

    I'm in urgent need of a cybersecurity expert with a strong background in Laravel development to assist me in combating a fraudulent website impersonating a legitimate company. This site has been misleading people and it's crucial we take immediate action to prevent further victimization. Here's a breakdown of what I require: - **DDoS Attack Execution:** Initiate a well-planned DDoS attack to disable the fraudulent website, halting its harmful activities. - **Laravel Development Skills:** Looking for someone proficient in Laravel to develop a tool or implement security measures that ensure such fraud can be detected or prevented in the future. ### Ideal Skills & Experience: 1. **Cybersecurity Expertise:** Proven experience in conducting DDoS attacks ethic...

    €61 (Avg Bid)
    €61 Oferta mesatare
    25 ofertat

    I am seeking a Machine Learning expert capable of developing a supervised learning Multi-Layer Perceptron (MLP) model to predict outcomes of beach volleyball matches. Key Responsibilities: - Process .csv files which contain detailed player statistics, ball locations, types of attack, blocks and more. - Utilize these inputs to successfully forecast the winning team and set scores. Ideal skills and qualifications: - Experience working with MLP in python and tensorflow. - Familiarity with sports analytics, especially beach volleyball - Proficiency in handling and interpreting .csv file - Exceptional ability in predictive modeling and analysis. Through this project, I aim to advance the accuracy of sports match predictions, particularly in beach volleyball.

    €429 (Avg Bid)
    €429 Oferta mesatare
    61 ofertat

    Ju lutemi Regjistrohuni ose Identifikohuni për të parë të dhënat.

    Urgjent MRS

    ... including source and destination IPs, ports, DNS queries, processes, services, new users, failed logins, and other Windows logs. The dashboard will feature a live map for traffic visualization, animated network diagrams, and various charts for real-time and historical data analysis. The application will integrate connectors for AWS and Azure/Microsoft 365 to collect and monitor data for cyber-attack detection. The contractor will use advanced programming languages suitable for data processing and visualization, emphasizing performance and scalability. Past projects and expertise in cybersecurity dashboards will be shared to demonstrate capability. This dashboard is a key component of our cybersecurity infrastructure, and as such, we're looking for someone who can deliver a...

    €485 (Avg Bid)
    €485 Oferta mesatare
    54 ofertat

    ...Amazon EC2 instances to bolster our security measures. Currently, all our IAM users have unrestricted access to EC2 services, which is something we aim to change. **Requirements:** - Review the current IAM policy settings. - Restrict EC2 access based on groups, ensuring only authorized groups can create or terminate instances. - Implement least privilege access principles to minimize potential attack vectors. **Ideal Skills and Experience:** - In-depth knowledge of AWS IAM and EC2 services. - Proven track record of enhancing security measures within AWS environments. - Strong understanding of best practices regarding AWS service permissions and security. - Ability to communicate effectively and work collaboratively. **Objectives:** - Ensure that only necessary personnel have c...

    €146 (Avg Bid)
    €146 Oferta mesatare
    44 ofertat

    ...antenna designer to create a GPS array for a short-range, anti-jamming tracking solution. This project aims to deliver precise and reliable tracking capabilities within a 1-mile radius. The focus is on designing an efficient and robust antenna system that can withstand interference, ensuring consistent performance. **Key Requirements:** - Design a GPS antenna optimized for short-range tracking. - Ensure the antenna is capable of anti-jamming functionalities. - Adapt the design for compact and efficient use, considering space constraints. **Ideal Skills:** - Experience in antenna/radio frequency (RF) design, especially GPS technology. - Proficiency in simulation and modeling tools for antenna design. - Knowledge of anti-jamming techniques and technologies. - Abilit...

    €528 (Avg Bid)
    €528 Oferta mesatare
    18 ofertat
    NO Plugins: Secure WordPress Ka përfunduar left

    I urgently require an experienced individual to meticulously assess and fortify my WordPress website, without the use of additional plugins. A fresh pair of eyes...this hosting environment is a plus. **Skills Needed:** - Proficiency in WordPress security best practices. - Experience with VPS hosting, specifically HostGator. - Ability to harden websites without relying on plugins. **Experience Required:** - A track record of successfully securing WordPress websites. - Insight into manual security enhancement techniques. - Strong understanding of potential attack vectors and preventive strategies. In your proposal, please highlight any past experience with similar tasks and your approach to securing WordPress websites without plugins. Your expertise is critical to protect my online...

    €35 (Avg Bid)
    €35 Oferta mesatare
    57 ofertat
    AI Photo Customization Ka përfunduar left

    Comedian doing a culture jamming project. I need a skilled freelancer for editing AI-generated product images. Your task will involve: - Adding and removing objects, logos, and text - Ensuring a natural, seamless appearance - Retaining image quality post-edit IDEAL CANDIDATE: - Proficient in Adobe Photoshop/GIMP or similar tools - Experience with AI photo manipulation - Keen eye for detail - Design skills - Prior work with product images I know this sounds weird but you will have to sign an NDA before you get full details.

    €10 / hr (Avg Bid)
    €10 / hr Oferta mesatare
    36 ofertat

    My webserver on Linode was recently hit with a DDoS attack and I need assistance bringing it back to its original functioning state. I am yet to notify Linode about this attack. I need someone capable of: - Identifying the compromised areas on the server - Restoring the server to its previous status - Implementing barriers to further prevent DDoS attacks The ideal candidate should have: - Prior experience in handling DDoS attacks - Expert knowledge in Nginx software - Familiarity with Linode hosting - The ability to work quickly and efficiently, as this project is time-sensitive. Please bid if you are capable of providing a fast and reliable solution.

    €240 (Avg Bid)
    Urgjent
    €240 Oferta mesatare
    10 ofertat

    ...which will be provided. The site will need to include at least two options for a home page, an about us page, a blogs page, a services page, and a dedicated page for each service. My consultancy provides cybersecurity services for the following three types of organizations: 1. For small and medium organizations: - Cybersecurity strategy development and review - Cybersecurity assessment - Attack path analysis - Virtual CISO (vCISO) support 2. For managed security services providers: - Cybersecurity risk quantification support - Active defense capabilities development 3. For cybersecurity audit and consulting firms: - Cybersecurity consulting capabilities development The site will be managed through Github and hosted through Cloudflare using Cloudflare pages. ...

    €1382 - €2303
    I vulosur MRS
    €1382 - €2303
    72 ofertat

    We are in immediate need of a freelancer with expertise in WordPress website recovery, PHP code cleanup, and server/domain security. Our site recently fell victim to a malware attack, resulting in false code injection into the file and also other root files maybe. We already changed the spam content in index. php with the default index. php code but now we are getting error This page isn’t is currently unable to handle this request. HTTP ERROR 500 In addition to restoring the site, we require a professional with comprehensive server and domain-side expertise to ensure the overall security of our online presence. This Rectification should not be take more than 1-2 days. The ideal candidate for this project should have: - Proven experience in

    €88 (Avg Bid)
    €88 Oferta mesatare
    59 ofertat

    We are currently on the lookout for a skilled 3D character rigger and animator to join our project. The ideal candidate will have a strong background in creating professional rigs and executing basic animations for 3D characters. Responsibilities: Create a professional rig for a 3D character. Develop a range of animations for the character, including: - Attack: 2 animations - Damage: 2 animations - Idle: 2 animations - Die: 2 animations - Movement: animations for moving up, left, and right - Run: animations for running up, left, and right - Walk: animations for walking up, left, and right - Rest: 1 animation Requirements: - Proven experience in 3D rigging and animation. - Strong portfolio showcasing character animation skills. - Ability to work within deadlines and to spe...

    €153 (Avg Bid)
    €153 Oferta mesatare
    48 ofertat

    As a devoted fan of the Anime, Attack on Titan, my project is aimed at creating a 3D animated series based on this popular title. I am seeking experienced animators who can bring my vision to life. Here's what this endeavour entails: • Creation of a 3D animated series: You will help develop less than 10 episodes within our agreed upon timeline. Previous experience in creating 3D animated series is a must for this project. • Understanding of the Anime Aesthetic: You should be familiar with Attack on Titan, it's art style and the aesthetics of anime in general. • Collaboration: You'll work closely with me to ensure that the animated series aligns with my vision. Skills and experience needed: - Expertise in 3D animation - Familiarity with the a...

    €18 / hr (Avg Bid)
    €18 / hr Oferta mesatare
    14 ofertat

    ...the Adrenal glands don't produce cortisol, aldosterone or other hormones made by the outer cortex. A person can not live without Cortisol or a suitable replacement. I take a set amount of hydrocortisone daily, divided into three doses. In times of stress (bad and good!) that amount needs to increase. If enough is not taken quickly enough it can result in Adrenal Crisis, which can lead to heart attack, coma or death!! The problem is, it's a guessing game. There is no way to monitor my levels. Think of a diabetic trying to guess how much insulin they needed without checking their blood sugar! That's where a cortisol detection dog comes in!! It can be my monitor!! It can detect falling levels and alert me BEFORE I notice a problem!! It can also alert me if, even after...

    €1935 (Avg Bid)
    €1935 Oferta mesatare
    5 ofertat

    I'm in need of a talented artist who can create vector and PNG files for a range of popular anime characters including Naruto, One Piece, and Attack on Titan. Key Responsibilities: - Develop designs capturing both the distinctiveness of each character, and the distinct styles of each show. -The desired styles are Chibi, Realistic, and Cartoon-like manner. Character Details: - For each anime character, provide different forms and expressions. The poses should range from action-filled stances, relaxed standing poses to various facial expressions. The ideal freelancer would be a seasoned graphic designer with a passion for, and a solid understanding of, anime styles and characters. They should be proficient with designing vector images and versatile in applying varying styles...

    €33 (Avg Bid)
    €33 Oferta mesatare
    6 ofertat

    I'm urgently seeking a savvy coder with experience in PHP and HTML to integrate hCaptcha for bot prevention into my website's registration forms. This immediate project requires: - Familiarity with hCaptcha integration - An understanding of bot attack prevention strategies - Demonstrated experience in coding in PHP and HTML - Ability to apply the hCaptcha on the registration forms specifically Please respond with your relevant skills and experiences in these areas as well as your availability for a quick turnaround.

    €21 (Avg Bid)
    €21 Oferta mesatare
    11 ofertat

    I am seeking a professional to create a LoRa IoT Jammer with the primary purpose of preventing unauthorized access. The successful candidate should have expertise in IoT commun...successful candidate should have expertise in IoT communication systems and security strategies. Scope: - The jammer should operate on a small scale, less than 100 meters. - It needs to be effective against Communications and Tracking devices. Required Skills and Experience: - Comprehensive technical understanding of LoRa devices and technology - Proven successful experience in IoT communication jamming - Thorough knowledge of IoT security vulnerabilities and preventive strategies. This project is critical to my IoT security infrastructure; therefore, only experienced and highly skilled professionals s...

    €297 (Avg Bid)
    €297 Oferta mesatare
    11 ofertat

    I am seeking a professional to create a LoRa IoT Jammer with the primary purpose of preventing unauthorized access. The successful candidate should have expertise in IoT commun...successful candidate should have expertise in IoT communication systems and security strategies. Scope: - The jammer should operate on a small scale, less than 100 meters. - It needs to be effective against Communications and Tracking devices. Required Skills and Experience: - Comprehensive technical understanding of LoRa devices and technology - Proven successful experience in IoT communication jamming - Thorough knowledge of IoT security vulnerabilities and preventive strategies. This project is critical to my IoT security infrastructure; therefore, only experienced and highly skilled professionals s...

    €305 (Avg Bid)
    €305 Oferta mesatare
    12 ofertat

    ...433 MHz, 868 MHz, and 915 MHz bands. - Range Specifications: The effective disruption range should be up to 100 meters. - Intended Use: The primary purpose is to impede unauthorized IoT device operations. Key Skills: - Electronics Design - Wireless Communication - IoT Security Knowledge - RF Engineering Experience Needed: - Proven track record with radio-frequency devices. - Previous work with jamming equipment or IoT security. - Ability to design for specific frequency bands. Project Goals: - Create a functional prototype. - Ensure legality and compliance with regulations. - Deliver testing documentation. I'm looking forward to collaborating with a skilled professional who understands the nuances of IoT and RF design. Please reach out if you have the necessary expertise...

    €349 (Avg Bid)
    €349 Oferta mesatare
    20 ofertat

    ...diagrams as follows; 1st Task: Tumor Mutation Burden (TMB) Leads to Immune System Activation against Cancer Details: TMB is rigorously defined as the total number of somatic mutations within the tumour genome but in practice involves an estimate from a subset of the genome. The efficiency of ICIs is based primarily on the ability of the immune system, predominantly the T-cells, to recognise and attack cancerous cells. The T-cell activation could be triggered by cancer antigenic recognition. The accumulation of somatic alterations in DNA may lead to neoplastic transformation and cancer cell development. These include synonymous mutations (silent mutations that do not alter amino acid coding), non-synonymous mutations (largely comprised of non-sense and point mutations that chan...

    €111 (Avg Bid)
    €111 Oferta mesatare
    27 ofertat

    ...suggestions. An example of scenes is listed below. In total we have around 25 scenes of similar duration and style. I hope this helps Scene 1 Narration: Once upon a time there was a witch called Marge. She was with child, Scene description: Camera shows Marge’s head, she is looking down and camera pans down to her pregnant belly, she is stroking the belly Scene 2 Narration: and under the attack of a gazillion of relentless angry trolls Scene description: Camera from behind her shoulder, she is looking out the window and sees trolls, carrying weapons and torches, coming towards her tower. The weather is stormy with dark blue clouds lightning bolts here and there Scene 3 Narration: As the trolls charge towards her tower, Marge, with her mastery of spells, fights vali...

    €455 (Avg Bid)
    €455 Oferta mesatare
    48 ofertat

    ...Solidity, you will craft a secure, gas-efficient smart contract tailored for the Binance Smart Chain. - **Functionality:** The contract must be capable of managing marketplace interactions, including but not limited to, handling offers, acceptances, and automated escrow services. - **Security:** Implement best practices to prevent vulnerabilities and ensure the contract is resistant to common attack vectors. - **Optimization:** Maximize gas efficiency to ensure cost-effective operations on the Binance Smart Chain network. - **Testing:** Write and conduct thorough tests to validate the functionality and performance of the contract. **Ideal Skills & Experience:** - Proficient in Solidity programming. - Strong track record with smart contracts on Binance Smart Chain. - E...

    €20 / hr (Avg Bid)
    €20 / hr Oferta mesatare
    28 ofertat

    ...THE 2 TEMPLATES PROVIDED** - Beer Name: Pidgey-Oat-O - Theme: Pokemon (Pidgey specifically) - Attack: "Peck" -Beer Style: Fruited Sour with Raspberries, Pineapple, and Orange Your Canvas: We've attached two of previous beer labels as a template for you to follow, please make them as similar as you can to those labels. Please keep the essence intact but feel free to infuse it with your artistic magic. ***Remember, no stock photos or AI generated photos- we're all about that originality!*** Inspiration: Our brewery's origin story involves a pigeon loft, which inspired our iconic pigeon logo. We want the Pokemon on the label to be a pigeon, specifically drawing from the Pidgey Pokemon. The attack associated with this brew is "Peck," so i...

    €115 (Avg Bid)
    I garantuar Konkursi më i mirë
    €115
    80 kandidaturat

    I need assistance with conducting a replay attack using my HackRF Software Defined Radio. My main focus is on carrying out operations on the 433 MHz frequency. Requirements include: - Prior experience with HackRF Software Defined Radio. - Knowledgeable in conducting replay attacks. - Skilled in operations on the 433 MHz frequency. Prospective freelancers should hold advanced awareness of potential risks and solutions to mitigate them in this task. A background in cybersecurity and radio operations would be highly advantageous. The ideal freelancer for this project is an adept problem-solver with keen attention to detail.

    €391 (Avg Bid)
    €391 Oferta mesatare
    17 ofertat

    ...of gameplay style are you aiming for in these mini games? Adventure / puzzle Do you have specific concepts or themes for each of the 5 mini games? Fantasy themed 1st Game: Simple show a random amount of 'caves' on the screen. User can left and right select a cave and then enter a cave. There is: Random number of caves 2-5. Random Cave Depth 2-5. Results on selecting a cave. - Go down a level - Attack By Snake or Gorilla. ( place an X over that cave entrance and go to previous level). - Award player X (being points or 'diamonds'). Game play is straight forward you keep selecting a cave until you get a prize or are attacked. When play again then go from start and go down cave levels. IF cave has X then can't enter, caves should randomly generate, need to...

    €132 (Avg Bid)
    €132 Oferta mesatare
    37 ofertat

    I'm looking for a well-versed writer to generate a research paper focused on the impacts of social engineering attacks and mitigation strategies within an organization. Key Requirements: • The paper should adhere strictly to APA citation style. • It requires conformity to specific length, formatting, and referencing requirements. • It needs to cover the following subtopics: - Social engineering techniques - Impacts of social engineering attacks on organizations - Strategies to mitigate these attacks - Relevant case studies on the subject matter Ideal Skills: • Proficiency in academic writing and research • Familiarity with APA citation style • Understanding of cybersecurity, particularly social engineering attacks and mitigation strateg...

    €24 (Avg Bid)
    €24 Oferta mesatare
    11 ofertat

    I'm looking for a social media security expert to reinforce the security of my Instagram and Twitter accounts. I've recently experienced a breach and need ...reinforce the security of my Instagram and Twitter accounts. I've recently experienced a breach and need a professional to conduct an in-depth audit of potential attack vectors. Your tasks will include: - Investigating the recent breach - Auditing all possible attack vectors While no specific attack vectors are suspected currently, an understanding of common tactics, such as phishing, brute force attacks, and malware injections, would be beneficial. Key skills and experience: - Strong knowledge of Instagram and Twitter security features - Experience with social media account audits - Under...

    €143 (Avg Bid)
    €143 Oferta mesatare
    9 ofertat
    need DDOS Protection Ka përfunduar left

    My site under DDOS attack.....currently my site load very slow (sometimes host error) they attack me regularly so, I'm looking for security expert if you are not security expert...please do not bid... ==================================== Total Requests Previous 24 hours 19.53M ===================================== Cpu = 100% Ram = 75%

    €19 / hr (Avg Bid)
    €19 / hr Oferta mesatare
    11 ofertat
    Trophy icon Sci-fi Comic Ad: Starship Crisis Ka përfunduar left

    I'm after a talented artist who can capture the gripping tale of a space captain and his robot assistant among the chaos of an alien attack, all within a 5-panel comic strip. This engaging, action-packed narrative will be set on the bridge of a starship and will be used in an advertisement campaign. What's required: - Develop a 5-panel cartoon strip-style advertisement. - Incorporate three main characters: a space captain, robot assistant, and crew member. - Set the plot around a dramatic alien attack. Ideal skills and experience: - Proven experience in cartooning, particularly in a comic strip format - Familiarity with science fiction genre is beneficial - Superior storytelling abilities - Strong communication and understanding of client’s vision Ultima...

    €151 (Avg Bid)
    Urgjent I garantuar
    €151
    116 kandidaturat

    I am looking for a skilled developer who can create a DDoS attack defender program using OMNET++. The program should be able to defend against SYN Flood, UDP Flood, and HTTP Flood attacks. Specific Requirements: - The defender program should have the ability to detect and mitigate these types of attacks effectively. - It should be able to analyze network traffic and identify malicious patterns or anomalies. - The program should have a user-friendly interface that allows for easy configuration and monitoring of the defense mechanisms. The project is related to a previous project called (OMNet++ DDoS Attack Simulation) . That project was done at the TCP level; however, the new project should have the following features: 1. The defender program should be before the target serv...

    €455 (Avg Bid)
    €455 Oferta mesatare
    21 ofertat

    I am seeking a cybersecurity expert who specializes in DDoS prevention. The ideal candidate should possess a deep understanding of different DDoS attacks - SYN Flood Attacks, ICMP Flood Attacks, and UDP Flood Attacks in particular, and know effective prevention methods for each. I'm looking for DDoS prevention web application/desktop application developer, who ha...cybersecurity expert who specializes in DDoS prevention. The ideal candidate should possess a deep understanding of different DDoS attacks - SYN Flood Attacks, ICMP Flood Attacks, and UDP Flood Attacks in particular, and know effective prevention methods for each. I'm looking for DDoS prevention web application/desktop application developer, who has more skills for cyber Security, networking, DDos attack etc...

    €6 / hr (Avg Bid)
    €6 / hr Oferta mesatare
    10 ofertat

    I want to create a browser extension. This extension will automatically find forms and fields on a webpage and then test them for vulnerabilities using special test data for that website. It automatically works in the background and alerts the user right at the browser if it finds any field or payload vulnerable to an XSS attack. It will give a heads-up to the user about that specific part of the page and add to the user's history. This will focus on detecting and alerting users to potential cross-site scripting (XSS) vulnerabilities that can have several positive outcomes and contribute to enhancing web security: Proactive Security Measures User-Driven Security Practices / Contribution to Web Security Research Customized Payload Testing To make it user-friendly, I'm plan...

    €143 (Avg Bid)
    €143 Oferta mesatare
    15 ofertat

    I need a relatively experienced 3d animator that could make me some animations for this 3d model that I have of a Repticect (a quadruped monster) that just has one animation and I need more and I don't know how to animate animals so i need in relation to the animations: a ground idle animation, a walk animation, a run animation, two attack animations (sting-tail and mouth) , a jump animation, a idle fly animation and and flight movement animation, and if possible a flight barrel roll animation! I will pay between 40€ - 65€! Needs to be in blender because the source file is a .blend file! The model is already rigged and textured, I just need someone to anim keyframe it, please! Need it in 1-1/2 weeks!

    €59 (Avg Bid)
    €59 Oferta mesatare
    24 ofertat
    DDOS protection -- 3 Ka përfunduar left

    my site under DDOS attack I can not access my site now Current Traffic - Previous 24 hours 188.75M

    €18 / hr (Avg Bid)
    €18 / hr Oferta mesatare
    12 ofertat

    My website, built using JavaScript/Node.js, is currently suffering from frequent DDoS...for an experienced professional to help analyze this problem, implementing solutions to fortify the site's security. The primary task is to mitigate DDoS attacks. The deployed solution should incorporate: - Real-time traffic monitoring - IP blocking - Rate limiting This role absolutely requires a deep understanding of JavaScript/Node.js application security and a proven track record in DDoS attack mitigation. The professional should also possess the expertise to not only implement these specific features but also advise on future potential security enhancements. Finally, ability to gather intelligence on the attackers would be a bonus. This is an urgent requirement and prompt interventi...

    €112 (Avg Bid)
    €112 Oferta mesatare
    36 ofertat

    ...conquering territories during the Conquer phase, granting unique abilities and boosting the warlock’s power during specific moon phases. 4. Strategic alliances can be formed, allowing players to share spells or coordinate attacks. 5. Moon Phase cards are revealed at the start of each round, affecting the strength of lycanthropy and altering gameplay dynamics. 6. Players use spells strategically to attack opponents, defend territories, or unleash lycanthropic powers. 7. The game continues until only one warlock remains, claiming victory over the Moonstruck Battlegrounds. Strategy Tip: Forming temporary alliances can be beneficial, but beware of betrayal as only one warlock can emerge victorious! Enjoy the Moonstruck Battlegrounds, where warlocks and lycanthropy col...

    €301 (Avg Bid)
    €301 Oferta mesatare
    66 ofertat
    3d animator Ka përfunduar left

    Script Writing 2. Hindi VO 3. English VO 4. Storyboard 5. Animation like attack on Titan type anime 6. Final composition The project to be delivered by 22 th January 2024 The story line is Brief - Mr lufixo our male panda and miss lufixo our female character They both introduce the lufixo social dating app

    €68 (Avg Bid)
    €68 Oferta mesatare
    6 ofertat
    GSM signal jamming circuit Ka përfunduar left

    This project is targeting experts in the field of mobile signal interception and decoding. The primary objective is surveillance and monitoring which is geared towards enhancing our security system. Expectations: - Specialize in interception and decoding of mobile telephone signals. - Utilize sophisticated techniques to provide an analysis of conversation content, not just basic call details. Required Experience and Skills: - Extensive knowledge in mobile communication and signal processing. - Proven experience in decryption or decoding techniques. - Previous work in surveillance or security systems is a must. - Ability to provide in-depth analysis of intercepted conversations. Kindly submit your proposal clearly stating your understanding of the project, your strategy, and your releva...

    €568 (Avg Bid)
    €568 Oferta mesatare
    8 ofertat

    This work is based on Image steganography in the spatial/frequency domain. At the transmitter side, the binary message is embedded in a digital image to generate a stego image. while at the receiver side, the message is reconstructed from the stego image. Various quality metrics are evaluated with and without attack to assess the overall performance of the developed system. At present, we are working on "A data hiding scheme based on dual-tree complex wavelet transform". In this work, we have done the embedding part and are unable to retrieve the original message at the receiver using the MATLAB Platform. There seems to be some issue in the calculation while performing the message extraction. we need help to rectify this issue or any other possible solution using either ...

    €98 (Avg Bid)
    €98 Oferta mesatare
    15 ofertat

    ...moment I have problem checks: CHECK THAT THERE IS NOT A MALICIOUS SCRIPT ON A MACHINE////// CHECK EXEMPLE PROBLEM / An abusive behaviour (Intrusion) originating from your IP ip-37[.]59[.]171[.]7 has been reported to or noticed by our Abuse Team. Technical details showing the aforementioned problem follow An IP address within your delegated space is currently involved in an ongoing brute force attack against the following services: * SSH (Secure Shell) We have observed more than 6 login attempts within a 6 hour period originating from the following IP address: We last observed a malicious login attempt from this IP address at 2024-01-16 05:59:54 UTC. SSH (Secure Shell) (16 total) Date Source IP Target IP 2024-01-16 05:59:54 2024-01-16

    €41 (Avg Bid)
    €41 Oferta mesatare
    14 ofertat

    I am looking for a skilled developer who can create a DDoS attack defender program using OMNET++. The program should be able to defend against SYN Flood, UDP Flood, and HTTP Flood attacks. Specific Requirements: - The defender program should have the ability to detect and mitigate these types of attacks effectively. - It should be able to analyze network traffic and identify malicious patterns or anomalies. - The program should have a user-friendly interface that allows for easy configuration and monitoring of the defense mechanisms. The project is related to previous project called (OMNet++ DDoS Attack Simulation) . That project was done at the TCP level; however, the new project should have the following features: 1. The defender program should be before the target serve...

    €553 (Avg Bid)
    €553 Oferta mesatare
    27 ofertat
    Trophy icon Logo Creation for "Whats.Exposed" Ka përfunduar left

    I'm looking for an experienced graphic designer to craft a minimalist logo for my company. It's crucial to have the logo embody the following: - Company Name: "" - Industry: Cyber Security - Company Background: We are a cyber security organisation that offers ethical hacking, attack surface monitoring & compliance assessments. Our mission is to identify and reduce our clients' exposures, as seen from the internet. - Color: #24D3ED/ black/white/grey should be the predominant focus in the design. Open to suggestions on other colours should they work better. - Content: The logo should contain my company's name. An icon that captures the essence of "" is imperative. - Design Style: I'm leaning towards a minimalist design. Simpl...

    €198 (Avg Bid)
    I cilësuar I garantuar
    €198
    2479 kandidaturat

    ... The project requirements are as follows: Scope: - The penetration test should focus on the client's Web Application. Report Detail: - The client requires both a high-level summary and a detailed technical report. - The high-level summary should provide an overview of the findings and their potential impact. - The detailed technical report should include in-depth analysis of vulnerabilities, attack vectors, and potential exploits. Remediation Recommendations: - The client requires remediation recommendations to be included in the report. - These recommendations should outline steps to mitigate identified vulnerabilities and enhance overall security. Ideal Skills and Experience: - Extensive experience in conducting Grey Box External Penetration Tests. - Proficiency in ide...

    €416 (Avg Bid)
    €416 Oferta mesatare
    38 ofertat