Telecommunications vulnerabilities trabalhos

Filtro

Minhas pesquisas recentes
Filtrar por:
Orçamento
para
para
para
Tipo
Habilidades
Idiomas
    Estado do Trabalho
    2,000 telecommunications vulnerabilities trabalhos encontrados, preços em USD

    Professional to review Nessus and close / address all security vulnerabilities.

    $20 / hr (Avg Bid)
    $20 / hr Média
    12 ofertas

    I need someone that can do outbound calling for telecommunications as well as some administrative task . I need some one that is good at selling and following up as needed . I need someone dependable and ready to work for long term project.

    $10 / hr (Avg Bid)
    $10 / hr Média
    26 ofertas

    I Want a Website Developer Who Build My Website on the Topice Telecommunications Service Provider Like a go2market Website.

    $1292 (Avg Bid)
    $1292 Média
    20 ofertas

    Hi, i need help starting a telecommunication company (MVNO).

    $147 (Avg Bid)
    $147 Média
    8 ofertas

    ...website should be professional, minimalistic and include pictures as profiled at the below IMAGE REQUESTS section. Please pay attention that the design should be aligned to the brand's language as reflected by the company’s logo. IMAGE REQUESTS: · Please include pictures of high-end tech projects/solutions/inventions from diverse fields including technology, biomed, biotechnology, IoT, telecommunications and aggrotech. · Please include designated icons for each of the points at the Our Merits subpage. TIMELINE: 5 days LANGUAGE: English SAMPLE WEBSITES: ...

    $207 (Avg Bid)
    $207 Média
    30 ofertas

    ...will approve the quote. The website should be professional, minimalistic and include pictures as profiled at the below IMAGE REQUESTS section. Please pay attention that the design should be aligned to the brand's language as reflected by the company’s logo. IMAGE REQUESTS: · Please include pictures of high-end technology projects from diverse fields including biomed, biotechnology, IoT, telecommunications, smart transportation, IT, smart cities, and aggrotech. · Please include designated icons for each of the points at the Our Strengths subpage. TIMELINE: 5 days LANGUAGE: English ...

    $184 (Avg Bid)
    $184 Média
    34 ofertas
    Mobile Cloud Encerrado left

    Mobile CLoud Project for telecommunications

    $304 (Avg Bid)
    $304 Média
    5 ofertas
    Telecommunications Encerrado left

    I need help with some telecommunications tasks

    $26 (Avg Bid)
    $26 Média
    8 ofertas

    We are telecommunications are into messaging and voice services

    $23 (Avg Bid)
    $23 Média
    31 ofertas

    Bidding contracts offered to China government departments by Multilateral Funding Agencies and Private Companies may be found here. To discover more about the most recent China Tenders, go here. Tenders from China in the construction, oil and gas, defence, energy, health, and telecommunications industries can be found here. We are market-leading bid contractors that would be delighted to assist you in growing your company. go to for more information about Chinese tenders.

    $500 (Avg Bid)
    $500 Média
    2 ofertas

    ...assess the architecture, design and configuration of web applications. A web penetration testing helps end user find out the possibility for an attacker to access the data from the internet, find about the security of their web application and also get to know how secure the web hosting site and server are. Why Web Application Pentesting? (Benefits) • Gain real-world insight into your vulnerabilities. • Keep untrusted data separate from commands and queries. • Develop strong authentication and session management controls. • Improve access controls and Privileges. • Discover the most vulnerable route through which an attack can be made; and Find any loopholes that could lead to the theft of sensitive data. How do we test Web Applications? When ...

    $20 / hr (Avg Bid)
    $20 / hr Média
    13 ofertas

    COVID-19: In an online address at the 'Future of Asia' conference organised by Nikkei, the External Affairs Minister said India, Japan and Australia are working on a supply chain resilience initiative a...of the COVID-19 experience has also brought to fore concerns of trust and transparency. Opacity can no longer be overlooked; it has real implications for the rest of the world," he said. "It was bad enough to be confronted with shortages and disruptions; worse that they could become pressure points. There are also worries that the financial distress caused by the pandemic could lead to new vulnerabilities," he added. Mr Jaishankar said the coronavirus challenge has created a stronger case for greater international cooperation, be it in vaccine production ...

    $11 / hr (Avg Bid)
    $11 / hr Média
    9 ofertas

    ...entities that can attack or pose threats: insiders and outsiders. An attacking entity is considered an insider if it is in possession of the secret key for any OSPF Cryptographic Authentication session either through: cryptanalysis, social engineering, extortion, or access to compromised/subverted routing resources. This also includes threats from malfunctioning or misconfigured OSPF routers. Vulnerabilities and attack vectors: Example scenario: Route spoofing: First, the attacker sets up a virtual machine a VM with the same IP address as the victim's website, and the gateway of this VM is configured to the attacker's

    $293 (Avg Bid)
    $293 Média
    3 ofertas

    Looking for someone that can check if has a vulnerability to cross site scripting. If it has the vulnerability, message me. I will pay $500 USD for each cross site script to be executed Please don't bid or message me before checking the site for vulnerabilities. Looking for serious people only!

    $593 (Avg Bid)
    $593 Média
    13 ofertas

    DESIGN REQUEST Mistra Investments is a boutique investment firm, which matches between groundbreaking infrastructure and telecommunications investment projects and high net worth investors. · The website is supposed to undergo on-going changes and updates in the future, thus should be entirely editable. Therefore, we request that the website will be designed in a content management system (CMS). · All access passwords and usernames will be sent to the client once the website has been fully designed. · Hosting and domain details will be sent to the chosen website designer once the client will approve the quote. The website should be professional, minimalistic and include pictures as profiled at the below IMAGE REQUESTS section. Please pay attention that the...

    $184 (Avg Bid)
    $184 Média
    44 ofertas

    WMT Invest is a family owned investment firm, which specializes in the fields of high-end technology, biomed, biotechnology, IoT, telecommunications and aggrotech. The company invests in early seed and early stage tech startups in the fields mentioned above worldwide. I look for an English native speaker to write a professional marketing content for the firm's website. Please find attached an elaborated brief with required pages and all content requirements.

    $96 (Avg Bid)
    $96 Média
    41 ofertas

    LOGO REQUEST WMT Invest is a family owned investment firm, which specializes in the fields of high-end technology, biomed, biotechnology, IoT, telecommunications and aggrotech. The company invests in early seed and early stage tech startups in the fields mentioned above worldwide. The logo should include a symbol, the company's name, and its tagline (When Technology and Investment meet). The logo across all its components (symbol and fonts' typography) should be solid and minimal, while using motives from the realm of success and business growth. REQUESTED TIMETABLE: 3 days

    $27 (Avg Bid)
    $27 Média
    87 ofertas

    ... We focus on partnering with citizens, institutions and governments and digitally transforming the lives of people, communities and society and enabling their full potential. With over various business bases in India, the Hitachi MGRM Net initiatives ranges from Educational E-Governance Technologies, Healthcare Technologies, Insurance Technologies, Automotive Technologies, Information & Telecommunications Systems, Smart City Solutions, Data Center Solutions, Digital Solutions & Services, Infrastructure Systems, Industrial Systems and many more. More details on our products and services can be obtained from www.hitachi.mgrmnet.com. About the profile Requirements · B.E./B.Tech./MCA with 8-12 years of relevant technology specific experience; · ...

    $8 / hr (Avg Bid)
    $8 / hr Média
    5 ofertas

    ...reference number, and software send a text message to the sender with reference number. The plan needs to address all risks and a plan to prevent any security issue. Also, to answer the following questions: Security: 1. How do you identify your threats and vulnerabilities? 2. What risks have you identified, and what is your plan for mitigating each of them? 3. What process (if any) do you have in place to identify, resolve and record security incidents? 4. Have you conducted any penetration tests, tested for SQL injections vulnerabilities, equipped yourself to thwart Dos/DDos attacks. If no, at what stage will you? Information Management: 1. What kind of database do you use, and where is it hosted? 2. What methods of encryption do you have on your stored data? 3. What ...

    $175 (Avg Bid)
    $175 Média
    7 ofertas

    ...for need to possess: 1. Proficient in the steps, methods and processes of penetration testing, and have the ability to perform penetration work independently; 2. Familiar with network security and vulnerability mining, familiar with the principles, methods, utilization methods and solutions of vulnerabilities; 3. Familiar with the process and methods of code security review (phpaspjsppython), and use mainstream code review tools. 4. Have experience in binary, reverse engineering and browser vulnerabilities. About company profile: We are a Chinese company specializing in network information security technology. We provide efficient and professional anti-cyber crime intelligence analysis services and solutions for the cooperation of police departments at all levels. About ...

    $32500 (Avg Bid)
    $32500 Média
    2 ofertas
    SS7 Direct Access Encerrado left

    We're looking for telecommunications network access via Sigtran (SS7) to make HLR lookup request, perform geolocation search of cell phones and send bulk sms. If you have a decent offer, contact me personally

    $1212 (Avg Bid)
    $1212 Média
    2 ofertas

    ...self-starter, team player, reliable and professional. This position is for someone who can help to get everything organized and efficient. The job duties are mainly doing online research, creating and posting ads, and creating various documents, forms & lists. Collaborate with and help teammates while maintaining a positive and professional attitude. What You Will Do: Identification of security vulnerabilities - Executing scans, penetration tests, source code analysis, reverse engineering. 2. Automating vulnerability assessment and penetration testing using scripting. 3. Continuous analysis of threats and weaknesses to develop more secure platforms. 4. Review of roles, profiles, and authorization objects to identify potential escalation of privileges. 5. Propose next le...

    $371 (Avg Bid)
    $371 Média
    12 ofertas

    Hi i need search vulnerabilites in my web wordpress

    $57 (Avg Bid)
    $57 Média
    12 ofertas

    ...please make sure you understand Cybersecurity and penetration testing. We have conducted an audit to the website (details will be given) and we have identified 5 points and below are the recommendations that need 1. Implement adequate controls against SQL and OS command injection e.g. data input validation and sanitisation. A robust method for mitigating the threat of SQL Injection based vulnerabilities is to use parameterized queries (prepared statements). Almost all modern languages provide built in libraries for this. Wherever possible do not create dynamic SQL queries or SQL queries with string concatenation. to be fixed. 2. Securing cookies by marking them “HTTPOnly” or “Secure”. 3. Ensure that header parameter are configured securely. The X-Frame...

    $62 (Avg Bid)
    $62 Média
    4 ofertas

    Mistra Investments is a boutique investment firm, which matches between groundbreaking infrastructure and telecommunications investment projects and high-net worth investors. I look for an English native speaker to write a professional marketing content for the company's website. Please find attached an elaborated brief with required pages and all content requirements.

    $94 (Avg Bid)
    $94 Média
    31 ofertas

    LOGO REQUEST Mistra Investments is a boutique investment firm, which matches between groundbreaking infrastructure and telecommunications investment projects and high-net worth investors. The logo should include a symbol, the company's name, and its tagline (Grow Your Capital). The logo across all its components (symbol and fonts' typography) should be solid and minimal, while using the green color as a symbol for financial and business growth. REQUESTED TIMETABLE: 3 days

    $54 (Avg Bid)
    $54 Média
    87 ofertas

    Hi, I am interested in accessing the telecommunications network via sigtran (ss7) to make HLR search requests, to get Geo location cell phone, VLR Lookup service tha will return the LAC code and the CELL ID of a MSISDN. If you have any offer, please contact me. Thanks

    $500 (Avg Bid)
    $500 Média
    1 ofertas

    Deadline is 8 days I have done the entire system and initial report by someone, Now you have to write interim report with 1500 words and final report is 6000 words only, Make sure you have 100% experience about matlab, Note: Everyday you have to show the progress whatever you will done on particular day Plagiarism less than 20% acceptable Please download all the requirements here

    $159 (Avg Bid)
    $159 Média
    14 ofertas

    Deadline is 8 days I have done the entire system and initial report by someone, Now you have to write interim report with 1500 words and final report is 6000 words only, Make sure you have 100% experience about matlab, Note: Everyday you have to show the progress whatever you will done on particular day Plagiarism less than 20% acceptable Please download all the requirements here

    $155 (Avg Bid)
    $155 Média
    12 ofertas

    Hi, We have a clients websites that needs its jquery 1.12.4 updating to the latest version 3.6.0. Google are reporting 4 known security vulnerabilities with 1.12.4 that we need to eradicate by this upgrade I have attached a zip of the website but with all images and videos removed due to upload size restrictions. Please check out if an upgrade is possible and the work it will involve before you bid. Thanks Steve

    $46 (Avg Bid)
    $46 Média
    24 ofertas
    Cisco Engineer Encerrado left

    ...active role in software upgrades on existing Cisco voice deployments. The job role also involves providing technical assistance to Network Analysts & Network Professionals. The Cisco Call Manager must also identify and resolve the issues relating to the Cisco software, Cisco IP phones, and voicemail. They should coordinate with other hardware and software professionals relating to networks and telecommunications. It is the Cisco Call Manager duty to be the primary point of contact for any queries relating to ISP outages and other issues. The person should be able to create, analyze and troubleshoot the call flows and look into call detail records. They should understand its role in the complex multi-component environment. The Cisco Call Manager will design and deploy solution...

    $50 / hr (Avg Bid)
    Destacado
    $50 / hr Média
    2 ofertas
    $15 Média
    1 ofertas
    windstream internet Encerrado left

    i am looking for internet prospect for windstream telecommunications. people who are looking to buy internet service.. keywords : lifeline, emergency broadband service, and more. these leads need to come from specific zip codes from winder GA, Jefferson GA, MONROE GA, areas that offer windstream

    $10 (Avg Bid)
    $10 Média
    3 ofertas

    Por favor, Cadastre-se ou Faça Login para ver os detalhes.

    Destacado ADC

    ...be applied. 2. Explain the specific security relevant actions taken during each step to include the people involved, the considerations taken, and security assurance methods used. 3. Identify and briefly explain at least three different security testing methods and indicate which methods analyze the app’s front end, source code, or vulnerabilities while the app is running. Justify when you would use each method. 4. Explain at least six different vulnerabilities that could potentially affect your app and actions that your team could take to prevent each. 5. Use at least four quality sources in this assignment. The specific course learning outcome associated with this assignment is: • Propose a strategy for securing the operation of a Web application. ...

    $315 (Avg Bid)
    $315 Média
    34 ofertas

    Complete in 2 days Matlab Version: R2017b Step 1: First compare three topologies with simple graph, ex: number of nodes Vs throughput, number of nodes Vs packet size and number of nodes Vs time taken (for all the three topologies and choose the best) Step 2: Second connect the best topology chosen, ex: mesh with WSN Step 3: Connect with WSN should build the receiver, rx and transmitter, tx Step 4: Finally topology with WSN for waste monitoring Please check the attached files. Thanks.

    $180 (Avg Bid)
    $180 Média
    4 ofertas

    Complete in 3 days Matlab Version: R2017b Step 1: First compare three topologies with simple graph, ex: number of nodes Vs throughput, number of nodes Vs packet size and number of nodes Vs time taken (for all the three topologies and choose the best) Step 2: Second connect the best topology chosen, ex: mesh with WSN Step 3: Connect with WSN should build the receiver, rx and transmitter, tx Step 4: Finally topology with WSN for waste monitoring Please check the attached files. Thanks.

    $177 (Avg Bid)
    $177 Média
    4 ofertas

    ...provides the following protection: It blocks the unauthorized users from accessing the systems and networks that connect to the Internet. It detects the attacks by cybercriminals. It removes the unwanted sources of network traffic. 3. Intrusion Prevention policy This policy automatically detects and blocks the network attacks and browser attacks. It also protects applications from vulnerabilities 4. LiveUpdate policy This policy can be categorized into two types one is LiveUpdate Content policy, and another is LiveUpdate Setting Policy. 5. Application and Device Control This policy protects a system's resources from applications and manages the peripheral devices that can attach to a system 6. Exceptions policy This policy provides the ability to exclud...

    $406 (Avg Bid)
    $406 Média
    4 ofertas
    Pentesting report Encerrado left

    For this coursework, you will use these techniques to gather information about a client, enumerate services, identify and evaluate vulnerabilities, and exploit some of those vulnerabilities. For the coursework, you need to perform a pentesting on two machines within the TryHackMe platform. In the end, you will develop a professional penetration testing report which will give evidence (including screenshots) of the techniques used, vulnerabilities found, and exploits conducted. This coursework will make up 30% of the total assessment. Please, ensure that you take screenshots and record evidence (e.g. retrieved credentials) while you attack the machine as it will be no longer after its expiry date. The entire report (excluding the appendices, references and the front ...

    $175 (Avg Bid)
    $175 Média
    8 ofertas

    Experienced Designer who has worked on designing advertisements for Telecommunications services like Retail Broadband offers, IP services (PBX, Cloud services) etc. We are looking for a retainer with a mandate to produce 5 advertisements per month for selling primarily Telecommunications Services. These designs will be predominantly posted on Social Media or circulated via brochures/flyers. The work is only for designing. The designs in English language are also required to be replicated in Arabic Language.

    $351 (Avg Bid)
    $351 Média
    45 ofertas

    Requirements: - 3+ years experience with PHP. You've written code that is not...JS. Angular.js and/or Node.js experience is a strong plus. - Working knowledge of Git and GitHub. You've collaborated with other developers on a project on GitHub. - Experience using Linux systems. You're comfortable using the command line to troubleshoot issues on a server. - Experience with AWS. You've built apps that run and scale in AWS. - Understanding of common web vulnerabilities. You're able to identify vulnerabilities through code reviews. - Experience with WordPress. You've written custom code that utilizes the WordPress API. - A keen interest in infosec. Credentials like Security+, CISSP or other is a strong plus. - Knowledge of other languages a strong plu...

    $13 / hr (Avg Bid)
    $13 / hr Média
    63 ofertas
    Nems mulandu Encerrado left

    Website and system hacking and checking vulnerabilities

    $100 (Avg Bid)
    $100 Média
    9 ofertas
    Penetration testing Encerrado left

    Build an unsecured system and perform penetration testing to mitigate the vulnerabilities such as SQL injection.

    $14 (Avg Bid)
    $14 Média
    4 ofertas

    Need out-of-the-box thinkers who can bypass gatekeepers and set appointments with decision-makers for our salespeople and C-Level executives. We don't want to have to micromanage. The ideal candidate will understand our services and set meetings with relevant leads which they source themselves. These leads can be sourced through any medium that works for you. 6x7 Networks is a telecommunications carrier. We sell high-speed internet and networking services to enterprise customers. Our ideal customer is an established company with offices in high-rise buildings (10 stories and above) in major metros, like San Francisco, Los Angeles, New York, Chicago, etc. We are open to an hourly rate, an hourly + commission, or commission only. The most important thing is that you gene...

    $50 - $50 / hr
    $50 - $50 / hr
    0 ofertas

    I have an old solidity contract that needs to be updated to fix vulnerabilities.

    $13 / hr (Avg Bid)
    $13 / hr Média
    5 ofertas

    Telecom B/OSS Manager will attend software vendor training and interface with sales and customer service call centers to solve issues raised in tickets related to customer billing and provisioning issues. Applicant should be familiar with telecom bills, order forms, products such as Dedicated Internet Access, VoIP/SIP Trunks, Cable, Long distance, equipment logistics (telephones, routers, and other gear from warehouses), billing cycles, work flow, transaction posting. Applicant can work from anywhere that has reliable Internet access but should be available 9 AM - 5 PM Central US time.

    $6 / hr (Avg Bid)
    $6 / hr Média
    25 ofertas
    Pen Testing with IP Encerrado left

    ...gathering activities in the main report. You may include this in an appendix. In the Attack Narrative section, you are expected to discuss the attacks you have undertaken and what vulnerabilities you have tested in each attack. In the Vulnerability Details & Mitigation section you are expected to provide a technical explanation of the vulnerabilities you have tested and confirmed (e.g., with a working exploit), as well as offer advice on how to mitigate it. To get full marks for this section you are expected to provide confirmed details and mitigation for three (3) vulnerabilities from the total vulnerabilities that you have found on the target. You must use the VPN (I will share you the full information once everything will be final) for undertaking th...

    $225 (Avg Bid)
    $225 Média
    3 ofertas
    Ring doorbell api Encerrado left

    I’m following a documentation that’s been put online, which is the ring doorbell api on GitHub. My project is trying to find vulnerabilities with the ring doorbell, however I have been stuck for a while now. The issue is that I implemented the code from GitHub and when I run the code no problems appear, but the output doesn’t seem right as it just comes back with my email. The supposed output should be different, the specific api I’m using is ‘ring doorbell api python’. I am just a student needing help with a project.

    $164 (Avg Bid)
    $164 Média
    10 ofertas

    ...self-service maintenance is ensure that the application is available as per the agreed availability matrix. A number of below activities need to be conducted to ensure availability. Specific tools and frameworks are to be used. Application maintenance • Software updates resulting from upgrades in the application’s underlying packages. • Security patches resulting from the identification of security vulnerabilities in the application’s underlying packages. • Bug fixes resulting from changes in the software’s operational environment and system errors Updates to images and content. Frameworks used • Meteor JS Application • Angular Front-End Framework • Nodes Framework and All associated NodeJS packages used in the functionality of a ...

    $4194 (Avg Bid)
    $4194 Média
    24 ofertas