we have received the following email from our ISP. We need someone to find the source of the problem and eliminate it. "Dear Sirs, We have received abuse reports for the IP x.x.x.x for being used in malicious activities. As a precaution, we have temporarily disabled this IP address. Please let us know once you have found the cause so that we can re-enable
I'm doing a movie trailer a contest entry. The movie trailer will be a spoof of a James Bond film. I need some simple changes to the traditional Bond logo and silhouette for this spoof. First, for the logo, rather than having 007 and a gun, it needs to be 8583 for the number and rather than it being a gun, I'm looking for the 3 to look more like it is the folded part of someone...
Hi, I want to simula...controller and controller mitigates those attacks using some machine learning (ML) techniques (or any other technique). There is also another aspect, the data could also be spoofed and controller needs to check that as well. This is purely an academic project that would most probably be extending for future research. Thanks!
I ...which sends emails to and from my email address. Postfix is giving a 550 error because the from address hasn't been verified and it is refusing to relay it. The only destination is my own E-mail address. I'd like to know what settings I need to change so that postfix installed via iredmail will allow these spoofed emails for local delivery only.
...client with email on hostgator who are constantly getting hacked. Seemed like it stopped and then they started getting spoofed. So i setup hard stop spf records. now somehow they are getting hacked again and they are blacklisted for spamming but its not coming from them but some attacker. So what i would like someone to do is. Find a email provider similar
...deliver the message in user inbox. If the IP address doesn't match, which in my case it doesnt they think its spoofed and therefore they are considering it as a spam. My messages are going in spam because I have not created a PTR record for my email server. We need to update PTR records or reverse DNS records on my VPS control I need someone who has
Review of email security procedures. We are currently using Google G-Suite for our domain. Have an SPF, DKIM & DMARC record setup as per Google guidelines and are still experiencing outbreaks of spam with its address spoofed to be from ourselves. Not only is the spam annoying to our customers - It is extremely damaging for our brand. Looking for
...someone to create a realistic looking email purporting to be the administrator of an organization. I am giving a presentation this week regarding cybercrime awareness. As part of this we are showing how credential harvesting works. We will provide the name of the organization and the website you should link to. The email needs to look like it is coming
I Want Person Who Has Implemented Face Recognition Based User Verification In Android And iOS,Note I Am Well Aware Of Face Recognitions Like Open CV etc ...Recognition Based User Verification In Android And iOS,Note I Am Well Aware Of Face Recognitions Like Open CV etc I Want Someone Who has Developed A System That Cannot Be Spoofed By Photo Or Video
I need you to develop some software for me. I would like this software to be developed for Windows using C or C++. Need a HWID spoofed that works please only contact me if you can do this experienced people only thanks
I am looking for a de...The goal is not to sniff the traffic but rather to temporarily disable a device from communicating. Please note, deauth attack is no sufficient. I need the chipset to send spoofed arp frames to an endpoint. Note the current library doesnt allow for forged packets. My understanding is, this may be capable with an older library.
I need someone to help me break down an IP address; figure out where it is being hosted and how it is being spoofed
I need an Android app. I would like it designed and ...built. I'm interested in making an app where you can spoof your phone number and SMS number. I want it where they can register an account which gives them 5 free spoofed texts or 5 spoofed call minutes. They should also be able to buy minutes or complete surveys or install apps for free minutes.
This question has probably been asked for over a thousand times, but I've tried so many scripts, and googled so long while finding nothing, I thought, let's jus...user to keep seeing this URL, while the page given is actually [เข้าสู่ระบบเพื่อดู URL] Note: this should work with www , http , and without. User will see Subdomain spoofed as a folder
Our SPF records are not set properly and our mail servers are being spoofed. We have existing spf authentication for various services we would like maintained. For the right person this task should be straightforward. Please provide advice on how to correctly set our records to achieve both purposes.
...possibly fall prey to hacking attacks. To tackle this, I need an android application which could work on TTL Value and PTT (Packet Transfer Time) of the payload and detect spoofed IP addresses, and also block them. Additional Information: TTL gives us indirectly number of hops from a source IP (if TTL =47 and default =64 for this kind of network,
i would like to build i private booter/ stresser to test on own projects, must be secure, and server ips be properly spoofed to not have servers banned. goal, 100-250gbps no funds will be paid until completed, as have already tried this and was scammed for 250usd
Hello, Two of our customers are having their email spoofed and their email address send out spam. We need someone to find the origin of the spoofing and prevent it from happening again. Thank you for your interest.
Don't want to go into too much detail without you signin...- User clicks to sync up their MAC and IP, after it is completed they are given a code - The give the code to another user who then clicks "start" and their IP and MAC is spoofed as the first users We can use AWS to store the details of the user and then dump them after usage is completed.
I have the domain [เข้าสู่ระบบเพื่อดู URL], i want to create an app which people can call others using spoofed numbers,voice changer, also the call needs to be encrypted. We can discuss the specifics, let me know if you can do this. App is for android.
1. firewall set up and sever security installation programs, 2. mailserver set up, email account to be friendly for gmail, not spoofed , valid SPF records,Domain Keys Identified Mail 3. ssl certificate installation, 4 check if the sites and email accounts operate correct after migration
...in this app you are allowed to spoof 1st IMEI Android ID Advertising ID Serial Bluetooth Mac Wifi Mac Wifi SSID I want additionally the following fields to be spoofed 2nd IMEI Android Version Model Name Manufacturer or Brand Name Other features like saving the original info, restoring the same, etc to remain as it is. Rooting the
My server was just added to multiple blacklist. I have a dedicated server (from 1and1) linux, plesk. I also have outgoing mail limited to 50 per domain per hour in plesk and didn't see any domains that have exceeded that. I then went to [เข้าสู่ระบบเพื่อดู URL] and noticed there are several domains not on my server sending emails. These domains are messing
I need someone/team to develop an online based software for me where people can register to send mass spoofed emails. For details about the software you will have to sign a mutual non disclosure agreement.
Hello, I need help with creating an outlook add-in that will pull the IP address and the Sending email address from the headers of an already received email that has in the subject the word "Spoofed", the extracted data need to be stored in Excel or access .mdb as I will need to re-anlayse it later Many thanks Awaiting your response Best
...instances. - Each instance will NEVER leak original IP information to the website its browsing. - Custom useragent configurable - Each browser has its own fingerprint. Spoofed if needed (fixed resolution, canvas, fonts, plugins, and more) - Each instance should look like its running on a different computer. - No data is ever leaked or shared between
...a copy of that message to me by e-mail and spoof the sender to show on my system as <mobilenumber>@<domain>.[เข้าสู่ระบบเพื่อดู URL] and the message to be delivered to email@<domain>.[เข้าสู่ระบบเพื่อดู URL] There is a free app on the market called ReplayMe that does the SMS to email forwarding; I need it tweaked to include the spoofing. I had...
We need to assume a network with multiple dhcp servers , a client, and a hacker. And we need to explain 10 kinds of different dhcp spoof messages.
...possible as there no identical cell towers in their database, I then found a website run by ethical hackers who tested this app in order to see if it would show it connecting to spoofed cell towers and it did as well as show it's location accuratly they also said identical info would be a giveaway of someone spoofing cell towers. Hopefully I explained this
I require a genuine UK based, ( non spoofed IP) to place adverts in a variety of on line classified sites, possibly to included twitter and tumbler postings. Each posting will be simply edit paste, Post title, body and graphic will be available to you. You will be paid per posting, which is open to bid, but expect £100 + month for a few hours
...like to know if one of them can be done.rnrnIDEA #1 POSSIBLErnI want this app to spoof a email and I need to be able to get a reply. For the reply feature we can have it where I can choose my own domain so when they reply, it will be relayed to my email. rnrnIDEA #2 Don't know if it's possiblernNow I have a another idea but don't know if
...to know if one of them can be done.rnrnIDEA #1 POSSIBLErnI want this app to spoof a email and I need to be able to get a reply. For the reply feature we can have it where I can choose my own domain so when they reply, it rnrnwill be relayed to my email. rnrnIDEA #2 Don't know if it's possiblernNow I have a another idea but don't know
...showing the path of each file. I would also like it to be certified as a forensic tool. Not a big project just to be used by any consumer to be able to counter these illegal spoofed cell towers and show accurate evidence of their locations. Any thoughts on how to improve this idea is welcomed. I would also prefer a freelancer in located in the United States
...start with and I can replicate this for the other vehicles. Contact us page - would like a simple contact us form that sends us an email when a user needs to contact us. Something secure that cant be spammed or spoofed. Here is a competitor website [เข้าสู่ระบบเพื่อดู URL] to give you an idea of what I am looking for. However I am looking
We need to update an existing android application to detect if the geo location has been spoofed or if the time has been changed. The time will be validated by some of the default NTP servers. The current app currently reports only the location and it doesn't work in the background. The app will function as a background service and will ping the
Hello, I need a Redirect script with a rotating of 100 Spoofed Referrers. The script I have now only allows 1. Example below. *<?PHP $desired_referer = "[เข้าสู่ระบบเพื่อดู URL]"; $site_z = "[เข้าสู่ระบบเพื่อดู URL]"; $ch = curl_init(); curl_setopt ($ch, CURLOPT_REFERER, $desired_referer); curl_setopt ($ch, CURLOPT_URL, $site_z);
...location has been spoofed or if the time has been changed. The time will be validated by some of the default NTP servers. The app will function as a background service and will ping the details to the server at regular intervals, say 250 ms to 3000ms. The pings will contain, the device identifiers, server time, the device time, location, spoofed flag, alert
...example of the Results page. ============= DESCRIPTION: ============= Using CURL, the script should send a request to a list of URLs. Each CURL request will be a spoofed IP (using the "X-Forwarded-For" function) from a list of inputted IP addresses. Also, a custom User Agent will be added to the CURL request. The script will scrape through