Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    1,612 arp spoof jobs found
    ARP Consultant
    1 day left

    NEED A LOGO FOR A FAMILY BUSINESS. LOOKING FOR A SPECIAL DESIGN. FONT AND COLOR DOES NOT MATTER. BONUS $100 FOR THE BEST DESIGN. NO AI DESIGNS, UNIQUE DESIGNS ONLY.

    $459 Average bid
    $459 Avg Bid
    85 bids
    ARP Consultant
    1 day left

    NEED A LOGO FOR A FAMILY BUSINESS. LOOKING FOR A SPECIAL DESIGN. FONT AND COLOR DOES NOT MATTER. BONUS $100 FOR THE BEST DESIGN. NO AI DESIGNS, UNIQUE DESIGNS ONLY.

    $20 / hr Average bid
    $20 / hr Avg Bid
    45 bids

    NEED A LOGO FOR A FAMILY BUSINESS. LOOKING FOR A SPECIAL DESIGN. FONT AND COLOR DOES NOT MATTER. BONUS $100 FOR THE BEST DESIGN. NO AI DESIGNS, UNIQUE DESIGNS ONLY.

    $162 Average bid
    $162 Avg Bid
    66 bids

    ...software. • Strong portfolio showcasing a range of projects and design skills. • Understanding of user-centered design principles and best practices. • Experience in creating responsive designs and working with design systems. • Basic knowledge of HTML/CSS (preferred, not mandatory). • Excellent communication and problem-solving skills. Skills Must Have: • Color Combination knowledge • Made ARP System (Eg: Dashboard, CRM, Admin Panel) • Had Worked with Storyline. • How Social Media graphics works and have knowledge of it. • Make Designs according to the Content. • Have knowledge of making Cartoon Character with the help of Sketching. What We Offer: • Opportunity to work on diverse and innovative proje...

    $6 / hr Average bid
    $6 / hr Avg Bid
    36 bids

    ...for others. While prank calls can be fun in the right context, they can also be disruptive or harmful if taken too far. Here’s a general overview of how to prank call using some popular apps, along with important guidelines to ensure it’s all in good fun: 1. Using Prank Call Apps: There are several apps designed specifically for prank calling. These apps usually allow you to change your voice, spoof the caller ID, or even play pre-recorded messages. PrankDial: This is a popular app for prank calls. You can choose from a variety of prerecorded messages to send to a friend or someone else. SpoofCard: This app lets you change your voice and disguise your phone number, so it appears as though you are calling from a different number. Call Voice Changer: This app allows y...

    $563 Average bid
    $563 Avg Bid
    16 bids

    ...skilled engineer to create a communication and querying platform capable of interfacing with a TI ADS7138QRTERQ1 A to D converter through an I2C communication board. The platform's primary purpose is for research and development, and it should read data from multiple sources, including: - Voltage - Current (INA293B2) - Three Temperature IC's (LMT90DBZR) - One Temperature/Humidity Sensor (SHT30-ARP-B) -We also have the board to be able to select between two I2C addresses so that needs to be verified. I can provide the necessary information on Analog offsets and will need assistance setting the registers. A schematic can be provided once a candidate is selcted Key Requirements: - Expertise in I2C communication - Experience with A to D converters - Proficiency in sett...

    $1536 Average bid
    $1536 Avg Bid
    46 bids

    ...attack is successful. Requirements: Provide configuration details and screenshots of Wireshark captures. Experiment 1.3: ARP Spoofing Attack Objectives: Master the address resolution process. Understand ARP packet structure. Learn how to perform ARP spoofing attacks. Content: Use terminal C to send a fake ARP request to the router, associating terminal C’s MAC address with terminal A’s IP address, causing the router to route traffic intended for A to C. Steps: Start eNSP, connect devices, and configure IP addresses. Have PC1, PC2, and PC3 send ARP requests to the router. Have PC4 ping PC1 and verify the result of the ARP spoofing. Requirements: Provide screenshots of ARP table entries and ping results. Note: Priority will...

    $45 Average bid
    $45 Avg Bid
    12 bids

    In this Project you will create a movie spoof poster. It must clearly pay homage to the original in every visual detail. See the Cobra vs. Wolf Cop 2 examples below. You will be assessed principally on your usage of the selection tools, masking abilities, adjustment layers, and layer styles. More details will be forthcoming and a rubric will be uploaded shorted. I've turned on this assignment so that you can begin to do research for Project 2. You may not use cartoons. Required Images: 1. Background 2. Main Character 3. Supporting Character 4. Supporting Character Supporting characters do not have to be human. A supporting character may be an animal as in the case of the life of Pi. Let's Examine the Life of Pi Poster (see below). 1. Background = The Ocean a...

    $39 Average bid
    $39 Avg Bid
    83 bids

    ...accounts, track remaining minutes, and adjust settings. Key Features: User Mobile App: - Login System: Secure user authentication with a dedicated database for user data. - Purchase Minutes: Users can buy call minutes from my service using Stripe or cryptocurrency. - SIP Integration: Utilize LexiCall SIP to facilitate VoIP calls through the app. - Caller ID Customization: Allow users to change and "spoof" their outgoing caller ID. - Minutes and Call Logs: Users can view their remaining minutes and call history within the app. - Simple UI/UX: A user-friendly interface that is minimal but functional for the initial release. Admin Panel (Web-Based): - User Management: Admins can view and manage user accounts, including remaining minute balances and call history. - Manua...

    $454 - $1362
    Sealed
    $454 - $1362
    19 bids

    ...accounts, track remaining minutes, and adjust settings. Key Features: User Mobile App: - Login System: Secure user authentication with a dedicated database for user data. - Purchase Minutes: Users can buy call minutes from my service using Stripe or cryptocurrency. - SIP Integration: Utilize LexiCall SIP to facilitate VoIP calls through the app. - Caller ID Customization: Allow users to change and "spoof" their outgoing caller ID. - Minutes and Call Logs: Users can view their remaining minutes and call history within the app. - Simple UI/UX: A user-friendly interface that is minimal but functional for the initial release. Admin Panel (Web-Based): - User Management: Admins can view and manage user accounts, including remaining minute balances and call history. - Manua...

    $537 Average bid
    $537 Avg Bid
    32 bids

    Im a DJ and need someone to provide me mp3 files for a list of 75 songs. Song list will be provided in screenshots & playlist. THEY MUST BE IN TRUE 320kbps, I will be using a spoofer to check if they are actually 128 kbps. NO youtube to mp3 downloader, NO spotify downloader quality will be spoofed to 320 but its really 128!! Reply with the word spoof so I know you read and understand that it cannot be a fake file.

    $23 Average bid
    $23 Avg Bid
    21 bids

    I'm looking for a realistic spoof of the Best Western logo with a centipede theme. The color scheme should mirror the original logo. Ideal Skills: - Graphic design - Logo design - Illustration - Brand design Please provide examples of your previous work in your proposal. end auto-generated text :-) I’d like a version of the classic red and blue Best Western logo (see attached) with the text changed to ‘Best Nestern’ (in the same font), and the red logo made from line drawings of centipedes, with maybe an ant’s head face on for the bit above the stylised ‘W’.

    $133 Average bid
    $133 Avg Bid
    137 bids

    I am experiencing email deliverability issues with my booking platform. System emails, such as invoic...Familiarity with DMARC and other email authentication methods We have added SPF records. DKIM is set up. Everything looks relatively good when you use MX toolbox to check the DNS settings but the booking platform that is built on Salesforce will not send invoices etc Some of the responses from our email marketing that uses Zoho campaigns is getting stuck in Quarantine. Quarantine reports suggest a spoof DMARC but it has been set and MX Toolbox / Zoho campaigns etc suggest is it in correctly. So we have a need for an experienced 365 exchange/DNS/email deliverability expert to help troubleshoot. Please, no time wasters. I am looking for a professional who can get this sorted...

    $59 / hr Average bid
    Featured Urgent NDA
    $59 / hr Avg Bid
    13 bids

    Spoof An Email Address Fir more information inwill message you

    $687 Average bid
    $687 Avg Bid
    76 bids

    I'm looking for an expert in networking to assist in building a router for my project. In this project you will implement a functional IP router that is able to route real traffic. You will be given an incomplete router to start with. What you need to do is to implement the Address Resolution Protocol (ARP), the basic IP forwarding, and ICMP ping. A correctly implemented router should be able to forward traffic for any IP applications, including downloading files between your web browser and a web server via your router. Given figure is the topology of the network that you will work on. The node vrhost is the router that will run your code. The two repeaters are for configuration purposes and can be ignored. The servers run nginx web servers to serve some web pages and file...

    $218 Average bid
    $218 Avg Bid
    25 bids

    I'm looking for a tool that allows me to view my HWIDs and MAC Address on Windows, with an option to spoof them. Key Requirements: - Capability to view and potentially spoof the following hardware identifiers: - Motherboard ID - Disk Drive ID - Compatibility with the Windows operating system - No specific preference for the user interface, though a simple and intuitive design would be a plus Ideal Skills and Experience: - Proficient in Windows OS - Strong understanding of hardware identifiers (HWIDs) - Experience in developing tools for hardware monitoring and spoofing - Ability to create simple, user-friendly interfaces - Knowledge of network interface and MAC address manipulation

    $234 Average bid
    $234 Avg Bid
    8 bids

    ...loading times and to improve user's experience. adding cache headers for images to improve website performance. With cache headers, browsers can cache images and serve them quickly to returning visitors, rather than re-fetching them each time. adding cache headers for CSS resources to speed up the webpage for returning users. an SPF record, spammers can easily spoof emails from this domain, potentially leading to compromised email security and deliverability issues. more than 20 HTTP requests on a webpage can negatively impact the loading time. moving inline CSS styles to an external stylesheet to improve site performance and maintain separation of content and design. out any unnecessary metadata to improve loading time, security

    $95 Average bid
    $95 Avg Bid
    22 bids

    I am seeking an expert to customize the Linux version of the Chromium browser. This project involves altering WebGL and GPU information to aid in web worker fingerprint mocking. Additionally, the customized browser should work seamlessly with Playwright and be undetectable. Customization Objectives: Adjust shader precision parameters Spoof vendor and renderer identifiers Modify maximum texture size limits Mask web worker details effectively Overwrite WebRTC IP Ideal Candidates: Extensive experience in Chromium browser modification Strong knowledge of WebGL and GPU information Proven track record in browser customization for fingerprinting and security purposes Experience in creating custom browsers that integrate with Playwright and are resistant to detection

    $101 Average bid
    $101 Avg Bid
    1 bids

    I need someone to remove all spoof and fake accounts, with my name from all dating platform apps like Skout, Tinder, Line, Wechat, etc. as this has been causing me and my wife lots of distress. More details: Is this project for business or personal use? Personal What information should successful freelancers include in their application? Past work How soon do you need your project completed? ASAP

    $149 Average bid
    $149 Avg Bid
    47 bids

    I'm in need of a proficient PHP developer to create a script for me. This script will run on a web server and its main function will be to spoof affiliate link referrers. Key Requirements: - The script needs to replace original referral information with a chosen referrer. - It should support Custom Affiliate Networks. - I need moderate control over the referrer spoofing, meaning I should be able to select from a list, but not have to input a new referrer each time. Ideal Skills: - Strong proficiency in PHP. - Experience with web server scripting. - Familiarity with Custom Affiliate Networks. - Previous work with referrer spoofing scripts is a plus. This is a unique and exciting project for the right developer. Please reach out if you believe you have the skills necessary ...

    $208 Average bid
    $208 Avg Bid
    37 bids

    We are looking for a skilled PHP developer to create a script that can spoof affiliate link referrers. The script should be able to replace the original referral information with our desired referrer. The script should be written in PHP We require the following skills: - Proficiency in PHP programming - Knowledge of affiliate marketing platforms - Experience in working with HTTP requests and headers - Understanding of URL manipulation If you have the necessary expertise and can deliver high-quality work within the given timeline, we would love to hear from you.

    $206 Average bid
    $206 Avg Bid
    27 bids

    I'm looking for a male singer capable of impersonating the Bee Gees, specifically their falsetto, for a serious with a twist spoof of 'Night Fever'. The track should start off serious, but contain subtle humorous elements, leading into an exaggeratedly serious final chorus. Key Requirements: - Exceptional vocal ability, particularly in falsetto - Experience in humorous musical performances - Ability to deliver a serious performance with a twist - Capacity for creating an exaggeratedly serious final chorus Ideal candidates will have a deep understanding of the vocal style of the Bee Gees, as well as a knack for comedic timing and delivery.

    $325 / hr Average bid
    $325 / hr Avg Bid
    2 bids

    We are seeking a talented professional to create a sophisticated Man-in-the-Middle (MITM) script for a security-related project on Linux. This script will target my betting account accessed via Safari and must be capable of bypassing Dynamic ARP Inspection or exploiting an HSTS vulnerability. The primary objective is to intercept and modify data in real-time on the betting site. - **Key Requirements:** - **Programming Language:** The script can be developed using Python (not required if not using MITM). - **Functions:** After bypassing Dynamic ARP Inspection or exploiting an HSTS Vulnerability, the script should: - Perform network traffic sniffing. - Execute session hijacking. - Inject packets seamlessly. - **Project Components:** - **MITM Proxy ...

    $3214 Average bid
    NDA
    $3214 Avg Bid
    26 bids

    I need a talented professional to create a sophisticated Man-in-the-Middle (MITM) script for Linux. This script must be capable of bypassing Dynamic ARP Inspection. Key Requirements: - Operating System: The script should be compatible with Linux. - Programming Language: It should be developed using Python. - Functions: Once the script bypasses Dynamic ARP Inspection, it should execute three actions: - Network Traffic Sniffing - Session Hijacking - Packet Injection This is a security-related project, so experience with network security tools and protocols is a huge plus. Please note that the success of this project will be measured by the script's ability to execute the above functions effectively and without detection.

    $452 Average bid
    $452 Avg Bid
    4 bids

    I'm seeking a skilled developer to create a custom Antidetect browser for Windows that offers the following features: - Spoof user agent: The primary requirement is for the browser to have the ability to spoof the user agent. This is crucial for the browser to hide my online identity and bypass certain website restrictions. If you have experience in developing browsers or similar software, and are familiar with the technologies needed for user agent spoofing, I'd love to hear from you. Please include examples of your past work and an estimated timeline for this project in your proposal.

    $716 Average bid
    $716 Avg Bid
    41 bids

    I'm looking for an experienced programmer t...for an experienced programmer to develop an automated tool for changing MAC addresses for a network project. This tool will need to be capable of changing MAC addresses on network devices and integrating well with a Linux environment. Key requirements: Strong programming experience in at least one of the following languages: Python, C/C++, or Perl. Deep understanding of network protocols such as ARP and Ethernet frames. Proficiency with networking tools and libraries on Linux. Good debugging and troubleshooting skills. Experience with projects related to network security is a plus. If you have the experience and are interested in this project, please contact me to discuss more details about the scope of work and specific requireme...

    $163 Average bid
    $163 Avg Bid
    25 bids

    My project requires someone with the ability to composit a believable photo of me holding a winning ticket at a horse race track. I want to appear excited in the image. The photo should clearly depict a horse race happening in the background. To pull this off, you'll need skills in: - Photo editing and manipulation - Photorealistic compositing - Character emotion portrayal Experience in creating convincing fake images for comedic or entertainment purposes would be a great advantage. Please note, the final result should look as natural and believable as possible to fool my friends.

    $98 Average bid
    $98 Avg Bid
    30 bids

    I am looking for an experienced programmer who can create a software to spoof the inputs of a PS5 DualSense controller for the PS Remote Play gaming app on Windows. !!! SO NO VIRTUAL CONTROLLERS!!! Requirements: - Spoofing Button Presses: The software should be able to simulate the R1 button press. - Spoofing Analog Stick Movements: The software should emulate both directions of the analog stick movement. Ideal Skills: - Proficient in programming, particularly in Windows environment. - Experience in input spoofing or gaming peripherals. - Preferably Use python - Familiarity with PS Remote Play app and PS5 controller inputs. - Strong attention to detail and accuracy in input emulation.

    $207 Average bid
    $207 Avg Bid
    42 bids

    I need an feature to integrate with my CRM that can spoof text messages. I need it to be able to send message from a virtual number, but display my business phone on the recipient's Caller ID. This is for a legitimate business purpose to allow auto generated CRM numbers from Twilio to appear to come from our business number. Edit: I've received almost 100 auto proposals, please send me a direct message if you're for real able to complete this project.

    $1616 Average bid
    $1616 Avg Bid
    138 bids

    I'm looking for a talented developer to create a sophisticated Fivem Spoofer with the ability to spoof IP addresses and hardware IDs. The final product should be compatible with Windows, Mac, and Linux. Key Features: - Spoof IP Address: The spoofer should be able to effectively mask the user's actual IP address with a different one. - Spoof Hardware ID: It should also have the capability to change the hardware ID to enhance user anonymity. Additional Requirements: - Multi-platform: The spoofer should work seamlessly across Windows, Mac, and Linux systems. - Customizable Theme: I prefer a design that can be customized with different themes. Ideal Skills and Experience: - Proficiency in C++ and network security. - Prior experience in developing spoofing sof...

    $33 Average bid
    $33 Avg Bid
    3 bids

    I'm in the evaluation and testing phase of an advanced network security project. This extends beyond basic firewall and intrusion detection systems to a more complex methodology defense architecture that addresses DNS spoof principles and tailored scenarios. Key Responsibilities: - Design and implement advanced network security measures - Test the effectiveness of the measures in detecting and repelling threats - Provide insights and recommendations to strengthen the defense architecture Skills and Expertise: - Deep understanding of network security - Proven experience in implementing advanced security measures - Expertise in evaluating and testing security systems - Familiarity with DNS spoofing and tailored attack scenarios If you're an expert in network security an...

    $160 Average bid
    $160 Avg Bid
    8 bids

    I'm in the evaluation and testing phase of an advanced network security project. This extends beyond basic firewall and intrusion detection systems to a more complex methodology defense architecture that addresses DNS spoof principles and tailored scenarios. Key Responsibilities: - Design and implement advanced network security measures - Test the effectiveness of the measures in detecting and repelling threats - Provide insights and recommendations to strengthen the defense architecture Skills and Expertise: - Deep understanding of network security - Proven experience in implementing advanced security measures - Expertise in evaluating and testing security systems - Familiarity with DNS spoofing and tailored attack scenarios If you're an expert in network security an...

    $43 - $188
    Sealed
    $43 - $188
    9 bids

    I'm seeking a seasoned software tester who, equipped with an understanding of ONT and OLT, can deliver detailed, meticulous results on manual testing for several protocols on Nokia products. The project requires: - Strong knowledge of several protocols, notably RIP and OSPF, which are the principal focus of this project. Familiarity with DHCPV4, ARP, VLAN, and SNMP is also important. - High proficiency in smoke testing, regression testing, and non-regression testing. - Experience in manual testing between ONT and OLT from varying vendors, especially Nokia. - Do note that this project is for personal use. Therefore, reliable and precise work is paramount. Your commitment to the project and expertise in testing will be invaluable to achieving the desired results. Your input ...

    $16 / hr Average bid
    $16 / hr Avg Bid
    4 bids

    I'm seeking a skilled developer to create a highly accurate, facial spoof detection system. The primary application will be detecting false faces in a dynamic surveillance environment. To undertake this task, you'll need: - Extensive experience in Computer Vision and Image Recognition - Prior experience in object tracking and Facial Recognition - Knowledge of the latest, most effective facial recognition algorithms and libraries - Ability to develop a system with an high level of accuracy - Experience in security surveillance system development would be a plus. Your success in this role will be measured by the accuracy and reliability of the facial spoof detection system developed. This is a high stakes project, so only the very best need apply.

    $32 Average bid
    $32 Avg Bid
    8 bids

    I am looking for an experienced computer networking expert who can assist me in enhancing my understanding of network protocols, routing and switching, and network security. I am going to have an online at home test at 3pm EST(Eastern Standard Time) to 5pm on April 18th so I need just two hours of your time. The lect...plane - Section 5.5 (5.5.1, 5.5.2, 5.5.3, 5.5.4) - ICMP: The Internet control message protocol Section 5.6 >> The link layer and LANs: Chapter 6 - Introduction to link layer - Section 6.1 - Error detection and correction techniques Section 6.2. - Multiple access links and protocols Section 6.3. - Switched local area networks - Section 6.4 - Link Layer addressing and ARP 6.4.1 - Ethernet - section 6.4.2 - Link layer switches...

    $152 Average bid
    $152 Avg Bid
    13 bids

    I'm looking for a skilled professional to conduct a network security test on our workstations using ARP poisoning techniques. The focus of this project is to identify vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someon...

    $94 Average bid
    $94 Avg Bid
    14 bids

    I need a skilled network analy...skilled network analyst who can examine an ARP request and reply message within my network. The purpose of this project is network troubleshooting. - Use Wireshark - Focus on personal computers - Generate a report outlining patterns or oddities - You should be knowledgeable about detecting intrusion, maintaining network security, and problem-solving in complex network environments. Experience with the Wireshark tool is essential. Your goal is to give a clear snapshot of the situation with the ARP request and reply messages. Here are the deliverables: - ARP request and reply messages log - A detailed report about these ARP messages and potential problems Please, only bid if you have a concrete understanding of Wireshark Net...

    $48 Average bid
    $48 Avg Bid
    5 bids

    I'm in need of an adept graphic designer who can take a portrait supplied by me and seamlessly integrate it into the iconic 'Abbey Road' album cover, in such a way that the added person appears to be the fifth Beatle crossing the street. Key Requirements: - The added person should appear at the end of the group or ...look as though they originate from the same era and stylistic choices as the original Beatles cover. - I'm looking for the final output to be realistic, not a cartoon. Ideal Skills: - Experience in graphic design and photo manipulation - Knowledge of Beatles era design aesthetics - Proficiency in Photoshop or similar software. I'm excited to see what you come up with! Let's have fun with a spoof of one of the most iconic album cov...

    $153 Average bid
    $153 Avg Bid
    75 bids

    We need to develop an android app which will all employee name and register face and take attendanace with Face Recognition. Ite should not take attendance with photo or video.

    $481 Average bid
    $481 Avg Bid
    22 bids

    ...container service, Lambda, Elastic beanstalk, S3, EFS, Storage gateway, Glacier, VPC, Direct connect, Transit Gateway, ELB, Auto Scaling, ACM, Cloud Front, Cloud Formation, Cloud Watch, Cloud Trail, SNS, SES, SQS, SWF, IAM, RDS, DynamoDB, Elasticache, Redshift, AWS Backup · Operating Systems: UNIX, Redhat LINUX, Windows · Networking & Protocols: TCP/IP, Telnet, HTTP, HTTPS, FTP, SNMP, LDAP, DNS, DHCP, ARP, SSL, IDM 6.0 and 7.0 · DevOps Tools: Puppet, Chef, Subversion (SVN), GIT, Jenkins, Hudson, Puppet, Ansible, Docker and Kubernetes · Scripting Languages: UNIX Shell Scripting (Bourne, Korn, C and Bash), Python, Perl Scripting, · Database: Oracle, Amazon Aurora, MySQL, MariaDB, PostgreSQL, Microsoft SQL Server · Version Controlling ...

    $12 / hr Average bid
    $12 / hr Avg Bid
    1 bids

    Dear professionals in the field of programming and artificial intelligence, My name is Jorge Moreno, General Manager of SELLO ARP, S.L., a pioneering and leading company in quality certifications for online training programs. At SELLO ARP, we are undergoing a digital transformation process aimed at optimizing our audit system. Our goal is to implement an artificial intelligence-based solution capable of autonomously evaluating whether an online course meets our rigorous quality standards. This AI will need to perform the following tasks: Precise and Strict Analysis: Accurately and thoroughly evaluate each course, ensuring adherence to our quality standards. Constructive Feedback: Provide clear feedback and recommendations to help course providers continuously impr...

    $3153 Average bid
    $3153 Avg Bid
    20 bids

    ...Packet Tracer. Technical Skills: =============== Good understanding and knowledge of TCP/IP, OSI Layer. Practical experience in configuring in CISCO 800, 1900, 2900, 2800, 2800, ISR 4300, 4100, ASR 1000 series and catalyst 2960, 9300, layer3 switches, nexus switch. #Static, RIP, RIPv2, EIGRP, OSPF, OSPFv3 and BGP #VLAN, VTP, STP, HSRP, GLBP, VRRP, SPAN, RSPAN, DHCP Snooping, Dynamic ARP Inspection, ARP ACL. #CISCO nexus 9k and CISCO ACI solution like BD, VRF, EPG, Tenant, L4-L7 graph etc. #ACL, NAT, Transparent Mode, Multiple context and Failover (Active/Active, Active/Standby) Site-to-Site VPN, Remote Access VPN and SSL VPN, Intrusion policy, AVC, Malware & File Policy etc in Cisco ASA, Next Generation Firewall and Firepower Management Center (FMC) #F5 BIG-I...

    $43 Average bid
    $43 Avg Bid
    1 bids

    ...- the persons, who will later test your work, are typically not engineers. They have a good understanding of simulating or entering sensor values. - based on this sensor values, the actors shall trigger and display on the UI. E.g. if you have simulated PIR, the persons shall activate a PIR detection duration and amout. So they can identify how sensitive the PIR requires to be. - if you assume a ARP-based presence detection, the users, shall be able to trigger a "smartphone" wifi logon - if the presence is detected, the corresponding actor shall be triggered and be visualized to the end user. Timeline: - this is for now a setup project of the simulator for our premise. Based on the pace and quality of delivery we will like to integrate you into the process of implementi...

    $27 / hr Average bid
    $27 / hr Avg Bid
    13 bids

    I am looking for a skilled designer to modify an existing logo for a gym spoof. The specific requirements for the project are as follows: - Change design elements only: I want the designer to focus on modifying the design elements of the existing logo. - Match original style: The modifications should be done in a way that matches the original style of the logo. - Vector File format: The final design should be delivered in a Vector File format. In place of the person lifting the weight bar, I want them taking a selfie with their phone (ie - instead of being interested in lifting weights at the gym, they are more interested in taking a selfie for their Instagram). So, some sort of duckface pose, or some obvious "full of themselves" pose. Additionally, I'd like to see...

    $108 Average bid
    Featured Guaranteed
    $108
    216 entries

    Project Title: Android Camera Spoofer Description: I am looking for an experienced Android developer to create an Android Camera Spoofer application for personal use. The main requirement for this project is Force Images and Videos to the android Camera spoofing, where the application should be able to spoof the camera in real-time while using the camera on an Android smartphone. Ideal Skills and Experience: - Strong knowledge of Android development and camera functionality - Experience with image and face detection and recognition algorithms - Proficiency in image processing and manipulation - Familiarity with real-time video processing and rendering - Ability to integrate the camera spoofer functionality seamlessly into the Android smartphone's camera app - Prior experienc...

    $565 Average bid
    $565 Avg Bid
    32 bids

    Project Description: I am looking for a talented musician to record a spoof of the classic song "Werewolves in London" in the rock genre. I have the lyrics attached compared to the lyrics of the original. If it can sound like Warren Zevon, all the better. The ideal candidate should have experience in music production. If you are a skilled musician with a knack for creating humorous yet authentic rock music, I would love to hear samples of your work and discuss this project further. Thank you!

    $855 Average bid
    Local
    $855 Avg Bid
    2 bids

    I have the source code for tweak spoof normal camera feed to my chosen video/photo from gallery for stable work any jailbreak IOS 14.8 (Unc0ver, Checkra1n), need adaptive for new jailbreak for palera1n (IOS 12.5.7 to 16.8).

    $185 Average bid
    $185 Avg Bid
    17 bids

    ...and in a voice call you will guide me all options available to configure. You will advise me to make things available to setup our test environment before starting practical learning. Here are menu options that I can see in HP and we will be exploring: - Device â—‹ Port Management â—‹ Port Mirroring â—‹ RMON â—‹ SNMP - Network â—‹ VLAN â—‹ VLAN Interface â—‹ MSTP â—‹ Link Aggregation â—‹ LACP â—‹ LLDP â—‹ ARP Management â—‹ ARP Anti Attack â—‹ IGMP Snooping â—‹ MLD Snooping â—‹ IPv4 Routing â—‹ DHCP â—‹ Service â—‹ Diagnostic Tools - Authentication â—‹ 802.x â—‹ Port Security â—‹ AAA â—‹ Radius - Secuirty â—‹ Port Isolate Group â—‹ Authorized IP â—‹ Loopback Detection - QoS â—‹ Time Range â—‹ ACL IPv4 and more What I want to setup: I have 2 Static IPs on single Ethernet connection from ISP, I want to build separate VLA...

    $58 Average bid
    $58 Avg Bid
    13 bids

    Project Description: I am looking for a skilled graphic designer who can create a spoof movie poster using a photo of someone I know. The poster should have a modern style and incorporate elements of the movie Extraction starring Chris Hemsworth Requirements: - Strong graphic design skills - Proficiency in photo editing software - Creativity and ability to come up with unique ideas - Knowledge of movie poster design - Attention to detail Skills and Experience: - Graphic design - Photo editing - Movie poster design - Creativity - Attention to detail

    $33 Average bid
    $33 Avg Bid
    56 bids

    Project Description: I am looking for a talented musician to record a spoof of the classic song "Werewolves in London" in the rock genre. I have the lyrics attached compared to the lyrics of the original. If it can sound like Warren Zevon, all the better. The ideal candidate should have experience in music production. If you are a skilled musician with a knack for creating humorous yet authentic rock music, I would love to hear samples of your work and discuss this project further. Thank you!

    $147 Average bid
    $147 Avg Bid
    15 bids