...Please specify if your bid is for Part 1 or for Part 2 or for both. SKILLS required is mainly Windows 7 pro DOS-Batch and/or any Scripting or compiled language you like as long as it PERFORMS FAST, no slow script, it must run fast. You can use dos-batch (which can be fast enough) or perl or java, D, C/C++ etc whatever you want to use :) HASH Verification
A freelancer is need to write a USB mass media interface for legacy MS-DOS. This should be coded in C++ using the OpenWatcom compiler. The program will need to be written as a 32-bit protected mode executable. Along with the program, a test program should be provided. The test program should also be compiled as a 32-bit protected mode program. The
My website is under attack. From some days, it is continually deleted. Once I restore it and change admin and cpanel and ftp password, it is deleted anyway. I would someone delete this threat and change all the password, and help me to keep the website safe for the future, checking and fixing vulnerabilityes.
We need to design low poly graphics for the game(in below link). You can see attached file for referance [accedi per visualizzare l'URL] Here is the layout of the game... 1. UI buttons and menus * Home Screen * GamePlay Screen * Challenge Screen * Setting Screen * Profile Screen 2. Backgrounds
We would to develop a software in C/C++ for Linux/OpenWrt to capture probe requests received from WiFi for marketing purposes. Capturing "probe request" is simple by setting the WiFi interface in "monitor mode" and capture traffic via tcpdump. However, randomization of MAC addresses made by many Apple and Android operating systems, causes various problems
C++ program - stop slowloris and other dos programs to attack it!
Hi Farid, next creature i need is a sabr...jpg [accedi per visualizzare l'URL] Again with four animations: - Move - Idle - Attack - Combat Art (be creative ;) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian
I have an existing system , I want to someone to clean up code Review existing code and Improve performance. My system is too slow. And also prvent Cross site scripting attack. This system is in Asp.Net MVC with C# and Mssql
I need a dos-box command line utility that can be called during an automate batch file and add the the audio cart chunk information specified in section 6 of this document (ftp://[accedi per visualizzare l'URL]) to a generic .wav audio file. Needs to add title / artist, etc. fields by variable in the command line so that I can specify
My website is under attack. From some days, it is continually deleted. Once I restore it and change admin and cpanel and ftp password, it is deleted anyway... furthermore on chrome it's appeared the message that my website is trying to load unverified script. I would someone delete this threat and change all the password, and help me to keep the website
...be done about the various incidents. 2. Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented. 3. Discuss the importance of user technology security education within organizations. What topics
A freelancer is with strong skills in C++ and X86 assembly to write a protected mode interrupt handler for the legacy MS-DOS platform. Please see attachment for details and bid as you feel is appropriate.
I have someone working for 3d and 2d, right now I need a designer to create a card with special effects to represents the spells of that character. The cards will have an attack power, hp, trait, description of the character, spell, and its ultimate move. The special effects will be required for the spell and ultimate move. If you can finish within
A freelancer with very strong skills in C++ is needed to work on a very legacy piece of software! If you're looking for a completely unusual project to tackle, here is one! You will be needed to improve a multi-tasking kernel written for MS-DOS. You should have a firm understanding of coding hardware interrupts and low-level assembly coding. Understanding
...analysis ( attack, detection, prevention, and stability). I want to write articles with your new ideas, mathematical calculation and MATLAB simulation results. It is preferable if you have the experience to publish articles on the SCI or SCIE-indexed journal. The following topic is my desire: [accedi per visualizzare l'URL] Grid Security Control [accedi per visualizzare l'URL...
Need someone who understands servers, and prestashop.
...other creative uses; note that most organisations will have multiple use cases for their devices 4. Define your likely opponent(s): a. Typical Opponent Profiles b. Likely attack vector c. Mode of operations 5. Detail the policy itself, and explain your rationale. You may want to consider: a. Is BYOD Allowed? b. Physical Security c. Do you have
...opponent, formation used etc.). ~What time of the game the team has scored/conceded, the goal type (set-piece such as penalty, free-kick or corner, established play, counter attack or cross from left/right) ~I'd attach some screen shots from my excel sheets at the moment to give you a rough guidance of how I'd expect the sheet to sort of look like. But
A C++ and X86 assembly language expert is needed to write C++ routines for file and data handling. This is for the legacy operating system MS-DOS. You will be required to construct an STL container which manages data from a file in memory. The OpenWatcom C++ compiler v1.9 should be used for this project to ensure proper functionality. The project
...make the connection with Laravel Forge [accedi per visualizzare l'URL] Here is the email Digital Ocean sent me: **** Hi there, We've detected an outgoing Denial of Service attack ([accedi per visualizzare l'URL]) originating from your Droplet. Specifically, we have detected inbound traffic exceeding 0.08 Mb/s and outbound traffic exceeding 676.75 Mb/s. Due to
...UI The gameplay UI will 4 tabs at the bottom: - Home: go back to main screen - Skill tree: choose talents for heroes when they level up - Upgrades: buy some upgrades like 2x attack damage, or immune damage - Shop: same shop screen The requirements might change ( added or reduced) with progress. Please only original work, I know there alot of cheap
...Local file inclusion. Arbitrary file inclusion. Remote file inclusion. HTTPS. GENERAL CONSIDERATIONS Cross-site scripting. SQL injection. Path disclosure. Denial-of-service attack. Arbitrary code execution. Memory corruption. Cross-site request forgery. Data breach (information disclosure)....
...reports and logs attached below for your concern: on 2018-10-02 we received an udp amplification attack from: x.x.x.x udp port 53 (dns) to: [accedi per visualizzare l'URL] This seems a udp dns amplification attack  originating from a misconfigured dns server which is exploited by spoofed packets coming to the server in your network
EXPERTS Only Wikipedia experts ONLY!!! My Wikipedia page for my name what taken down we have all the sources and content to be accepted however I believe this was an attack. this happened about 6 months ago or longer. I'm looking for an EXPERT for will not waist time and GUARANTEE inclusion into Wikipedia. [REMOVED BY FREELANCER.COM ADMIN - PLEASE
EXPERTS Only Wikipedia experts ONLY!!! My Wikipedia page for my name what taken down we have all the sources and content to be accepted however I believe this was an attack. this happened about 6 months ago or longer. I'm looking for an EXPERT for will not waist time and GUARANTEE inclusion into Wikipedia. I would also like to be able to communicate
Looking for a person who has the background of the control theory and engineering with expertness in power system and smart grid security analysis ( attack, detection, prevention, and stability). I want to write articles with your new ideas, mathematical calculation and MATLAB simulation results. You must have the experience to publish articles on
Hi everyone, I need a little research about DoS attack then prepare it in presentation power point, between 5 to 10 slides, what is Dos, how can protect... etc. the presentation should be between 5 to 10 minutes.
...measure the success of my designs. For my print work, I look at customer satisfaction, brand loyalty and overall cost savings.” I never take design criticism as a personal attack. I know clients want the best possible end result, so I actively listen and use the feedback as a way to not only iterate and perfect the design, but also to grow as a graphic
Design some simple 2d stick figures with medieval theme and animate it to walk attack and cripple with no leg. I need a simple soldier with one handed sword, an archer with a robinhood hat and a bow with animation, a priest with a staff and animation of raising both hands for healing its allies, a knight with helmet and metal armor with double handed
Necesito que se me traduzcan dos ebooks super pequeños del inglés al español. El pago será por Freelancer, pero tendré que revisar primero el trabajo antes de hacer ningún pago, por temer de seguridad y asegurarme de que está bien traducido. Si necesitas más información, háblame por mensaje directo.
I would like the sketch to be of 2 armored men dueling, and one landing a powerful blow against the other. It should be inspired by Dungeons and Dragons or fantasy games in general so the weapons and armor should be unique and not resemble historical gaurd armor.
...configuring and maintaining the security for our server. Top priority is analyzing and configuring our server to prevent and stop SYN Flood attacks. Our server has been under attack for the last 3 days and our hosting company has been of minimal help. Other priorities: auditing and configuring server environment for optimal security and performance.
...Each player will have a deck containing 40 cards - The first round each player will take 5 cards from its own deck - In the first round of the game, the player won't be to attack but only place a card. - The player can only place 1 card per turn and its a must. If the field is full of cards which are limited to 5, the player will be able to replace
Emulador de DOS en SO Android 7.0 o superior Necesito un emulador ( licencia libre ) que pueda correr en Android y que permita CONFIGURAR todos los parámetros de los COM y USB ( entre otros características ) Se requiere un emulador tipo DOSBox que corra en Android o puede también ser uno del tipo Magic DosBox. Actualmente, los emuladores
erforming a heap and stack-based buffer overflow attack. there are 4 questions on that lab.
...of most popular animations. The business is going to be small cafe with animations running on TVs, figures and lots of paintings on the wall of one piece, gintama, naruto, attack on titan etc. I will be selling coffee and dessert that resembles those amazing characters. Regarding the logo: I have lettered logo that I have created and illustration
...(attached below) portraying a combat-racing game. The portrait shows 2 riders on ATVs taking on each other in a race, where one rushing forward and the other trying to catch up and attack with a weapon(bat) in hand. In the current portrait the proportions of the two human riders are not quite alright. So we want both the riders to be redesigned in correct proportions
Hi Farid, next creature i need is a crysta.../c/9/[accedi per visualizzare l'URL] [accedi per visualizzare l'URL] Again with four animations: - Move - Idle - Attack - Combat Art (be creative ;) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian