A freelancer is need to write a USB mass media interface for legacy MS-DOS. This should be coded in C++ using the OpenWatcom compiler. The program will need to be written as a 32-bit protected mode executable. Along with the program, a test program should be provided. The test program should also be compiled as a 32-bit protected mode program. The
My website is under attack. From some days, it is continually deleted. Once I restore it and change admin and cpanel and ftp password, it is deleted anyway. I would someone delete this threat and change all the password, and help me to keep the website safe for the future, checking and fixing vulnerabilityes.
We need to design low poly graphics for the game(in below link). You can see attached file for referance [login to view URL] Here is the layout of the game... 1. UI buttons and menus * Home Screen * GamePlay Screen * Challenge Screen * Setting Screen * Profile Screen 2. Backgrounds
...11 client devices, not APs, to ex15 tract a CTS response message which we derive the true global MAC address of that device. Instead of a localization attack, we are using RTS/CTS exchanges to perform derandomization attacks". In essence we would get a CSV file with the following data of the device present in the area: date and time in microseconds
C++ program - stop slowloris and other dos programs to attack it!
Hi Farid, next creature i need is a sabr...jpg [login to view URL] Again with four animations: - Move - Idle - Attack - Combat Art (be creative ;) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian
I have an existing system , I want to someone to clean up code Review existing code and Improve performance. My system is too slow. And also prvent Cross site scripting attack. This system is in Asp.Net MVC with C# and Mssql
I need a dos-box command line utility that can be called during an automate batch file and add the the audio cart chunk information specified in section 6 of this document (ftp://[login to view URL]) to a generic .wav audio file. Needs to add title / artist, etc. fields by variable in the command line so that I can specify
My website is under attack. From some days, it is continually deleted. Once I restore it and change admin and cpanel and ftp password, it is deleted anyway... furthermore on chrome it's appeared the message that my website is trying to load unverified script. I would someone delete this threat and change all the password, and help me to keep the website
...incidents. Respond and be sure to provide recommendations on what should be done about the various incidents. 2. Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented. 3. Discuss the importance of user
A freelancer is with strong skills in C++ and X86 assembly to write a protected mode interrupt handler for the legacy MS-DOS platform. Please see attachment for details and bid as you feel is appropriate.
I have someone working for 3d and 2d, right now I need a designer to create a card with special effects to represents the spells of that character. The cards will have an attack power, hp, trait, description of the character, spell, and its ultimate move. The special effects will be required for the spell and ultimate move. If you can finish within
...very legacy piece of software! If you're looking for a completely unusual project to tackle, here is one! You will be needed to improve a multi-tasking kernel written for MS-DOS. You should have a firm understanding of coding hardware interrupts and low-level assembly coding. Understanding of DPMI is also a must. Please see attachment for additional
...analysis ( attack, detection, prevention, and stability). I want to write articles with your new ideas, mathematical calculation and MATLAB simulation results. It is preferable if you have the experience to publish articles on the SCI or SCIE-indexed journal. The following topic is my desire: [login to view URL] Grid Security Control [login to view URL] Grid Attack and Detection
Need someone who understands servers, and prestashop.
...other creative uses; note that most organisations will have multiple use cases for their devices 4. Define your likely opponent(s): a. Typical Opponent Profiles b. Likely attack vector c. Mode of operations 5. Detail the policy itself, and explain your rationale. You may want to consider: a. Is BYOD Allowed? b. Physical Security c. Do you have
...style that we are looking for. For this contest, you will need to produce 5 different icons : a gem, a bundle of gems, a special abillity called "Sniper Shot", a surprise attack icon and a medi-kit. You will find the references in the submission. Don't hesitate if you have any questions! Thank you and we can't wait to see what you guys will create
...opponent, formation used etc.). ~What time of the game the team has scored/conceded, the goal type (set-piece such as penalty, free-kick or corner, established play, counter attack or cross from left/right) ~I'd attach some screen shots from my excel sheets at the moment to give you a rough guidance of how I'd expect the sheet to sort of look like. But
Im looking for someone that can connect our Xero and shopify accounts. We need our invoices on xero to be uploaded and understood by Shopify so that out stock is updated from an order. If you need further details please get in contact Thanks
A C++ and X86 assembly language expert is needed to write C++ routines for file and data handling. This is for the legacy operating system MS-DOS. You will be required to construct an STL container which manages data from a file in memory. The OpenWatcom C++ compiler v1.9 should be used for this project to ensure proper functionality. The project
...make the connection with Laravel Forge [login to view URL] Here is the email Digital Ocean sent me: **** Hi there, We've detected an outgoing Denial of Service attack ([login to view URL]) originating from your Droplet. Specifically, we have detected inbound traffic exceeding 0.08 Mb/s and outbound traffic exceeding 676.75 Mb/s. Due to
...UI The gameplay UI will 4 tabs at the bottom: - Home: go back to main screen - Skill tree: choose talents for heroes when they level up - Upgrades: buy some upgrades like 2x attack damage, or immune damage - Shop: same shop screen The requirements might change ( added or reduced) with progress. Please only original work, I know there alot of cheap
I need help with my blog on the technical side of things. I have no idea about how it all works, but I do know I need my site optimized to be able to perform better. I need someone to analyze my site, and fix issues.
...website to display the corporate information and availability of Tokens. To purchase or sell the tokens. ANALYTICS Admin shall be able to view the ICO donation analytics, perform website edits, manage token sales, pre-sales and private sales etc. MANAGING THE TOKEN SALES The admin dashboard will have a facility to manage the token sales by specifying
...reports and logs attached below for your concern: on 2018-10-02 we received an udp amplification attack from: x.x.x.x udp port 53 (dns) to: [login to view URL] This seems a udp dns amplification attack  originating from a misconfigured dns server which is exploited by spoofed packets coming to the server in your network
I have some work, in an Excel spreadsheet.
EXPERTS Only Wikipedia experts ONLY!!! My Wikipedia page for my name what taken down we have all the sources and content to be accepted however I believe this was an attack. this happened about 6 months ago or longer. I'm looking for an EXPERT for will not waist time and GUARANTEE inclusion into Wikipedia. [REMOVED BY FREELANCER.COM ADMIN - PLEASE
EXPERTS Only Wikipedia experts ONLY!!! My Wikipedia page for my name what taken down we have all the sources and content to be accepted however I believe this was an attack. this happened about 6 months ago or longer. I'm looking for an EXPERT for will not waist time and GUARANTEE inclusion into Wikipedia. I would also like to be able to communicate
We are conducting competitor study and analysis, we want to know if our marketing message is focused around certain target audiences or highly spread out, and which are brands who are good at having focused marketing messages. We would like to hear the dimension reduction analysis method you have in mind as well as the type of survey we will need to conduct in order to make this analysis a succes...
Looking for a person who has the background of the control theory and engineering with expertness in power system and smart grid security analysis ( attack, detection, prevention, and stability). I want to write articles with your new ideas, mathematical calculation and MATLAB simulation results. You must have the experience to publish articles on
Hi everyone, I need a little research about DoS attack then prepare it in presentation power point, between 5 to 10 slides, what is Dos, how can protect... etc. the presentation should be between 5 to 10 minutes.
...measure the success of my designs. For my print work, I look at customer satisfaction, brand loyalty and overall cost savings.” I never take design criticism as a personal attack. I know clients want the best possible end result, so I actively listen and use the feedback as a way to not only iterate and perfect the design, but also to grow as a graphic
Design some simple 2d stick figures with medieval theme and animate it to walk attack and cripple with no leg. I need a simple soldier with one handed sword, an archer with a robinhood hat and a bow with animation, a priest with a staff and animation of raising both hands for healing its allies, a knight with helmet and metal armor with double handed
I would like the sketch to be of 2 armored men dueling, and one landing a powerful blow against the other. It should be inspired by Dungeons and Dragons or fantasy games in general so the weapons and armor should be unique and not resemble historical gaurd armor.
...configuring and maintaining the security for our server. Top priority is analyzing and configuring our server to prevent and stop SYN Flood attacks. Our server has been under attack for the last 3 days and our hosting company has been of minimal help. Other priorities: auditing and configuring server environment for optimal security and performance.
I have high-resolution images that need to be edited with Photoshop to look their best. They may need color and/or exposure correction, saturation adjusted, etc. Also, you will need to use layer masks to replace the sky in most images. May need to add fire to fire pits/places. Photos are outdoor images of residential and commercial architecture - swimming pools, landscapes, outdoor living areas...
...Each player will have a deck containing 40 cards - The first round each player will take 5 cards from its own deck - In the first round of the game, the player won't be to attack but only place a card. - The player can only place 1 card per turn and its a must. If the field is full of cards which are limited to 5, the player will be able to replace
More detail i will share one to one.