...If you can solve many other projects like this will come, we will need other features and reports in the system, as well as someone who can solve system security issues, you can support the project. // Portugues Tenho um script clone do uber, o mesmo conta com um bug na seleção do táxi, tudo funciona normalmente, inclusive o táxi chega a
...accordingly to W3C – HTML 5, with clean code, according to the rules of good programming, and well commented. Must be delivered together with the complete and open code, with security settings and software manuals. The given price must include small additional features that may occur to both parts in the development process. Payment will be phased, only
...way of the future, but we are saving that for a total rewrite next year... right now we just want to run PHP7 safely. We are also using a WAF and security headers. We will also be running some security scanning software before deployment. Source code will be provided in a tarball and the edited tarball can be returned the same way. Requirements:
...addendum. Reading. In your response/bid, it must be absolutely clear that you read the project, looked at the file(s), if any, and have something intelligent, clear, or informative to say about what you saw, or you will not be considered. Delays. If a project requires a delay from either party before starting or accepting work, please build that
...you can do for us. Building/Designing E-commerce sites, Mobile sites and web apps Testing on various devices to ensure correct functionality Implementing SEO, Security and Protection for sites. Desired Skill sets: 2+ years experience, preferably in WordPress CMS based Web Development. Experience in developing mobile responding website
I am sick and tired of getting 43,000 auto-bids from people who didn't even read my ad. So if you are interested in this project, please contact me and give me a proper explanation of how you are qualified to help me and what you will do to fix my problem. All other bids and "hello I am ready to start", generic messages will be ignored. What I need:
...examples. You may suggest me same things in Joomla too. -Job board --Combination of recruiter algo ([login to view URL]) and UI Jobboard ([login to view URL]) --recruiter is only security maintenance only --UI Jobboard is dead. --Do not expect any support for above two projects Mobile app or web based access --Quiz
We would ...would like to build a new website for the company, we need something very professional and creative. Only experts in this field can bid in this project. we're a cyber security company. We provide cyber security solutions, consultancy and training. We would like to build our website to be like companies such as: [login to view URL] --
Must have: MCSE Server 2012/2016, AD, SCCM, Fluent German Speaking/Reading/Writing skills Job Description: • Windows Server/Infrastructure & .net Expertise in the Security Context • Microsoft Clients, Server and Architecture Workspace • Independent implementation of work packages agreed in the respective call-off according to the objectives defined
Need VMware resources for our project Must have: VCP/VCIX, Fluent German Speaking/Reading/Writing skills Job Description: Expertise with VMWare (Automation & Orchestration) vRealize vRA, vRO, vROPS, VMware NSX, VMware vSAN Expertise with Windows and Linux operating systems Cloud, DevOps, SDDC, Network, Security and storage experience is a
...We need help in developing wordpress to 'act as backend" for IOS, Android and website. The person should be able to deliver excellence in security, User expeirence, geolocation and external API integrations. Project needs to be finally deployed on Azure cloud, so a bit (minimal) exposure of azure will help. We have a classifieds template procured.
As per stated in the title. I am working on a project for my school to entice high schoolers to join the field of cyber security.... - Duration of briefing should be between 15-30mins (exclude demo). - Every slides should include a script for the presenter (me). Bonus to have make it fun and include a bit of joke... i will try to read it word for
...token-free consensus mechanism, on which nodes can provide consensus without any financial incentive. Agora primarily focuses on voting, having developed several Dapps to ensure security, end-to-end verifiability and support for new devices. By creating an immutable and publicly viewable digital record of elections, Agora’s technology allows both private and
This project is to create a platform designed to connect business with influencers on social media. It will require someone capable of working with Instagram API’s and have the ability to create unique keys, fetch ‘checkout’ dollar value and process a commission payment back to the user. Similar to Affiliate Marketing commissions. I need a backend
**Must spea...are developing an inhouse an Asterisk based PBX solution to suit our needs. This is an ongoing project and we will need developers who are experts in PHP, NodeJS, CSS, MySQL, Optimization, Security. Bonus points for mobile development. We also need project managers. Previous experience managing development groups and projects is a must.
...related to "personal finance and products/plans that I offer to achieve financial security". I'm currently looking for an expert when it comes to Google AdWords campaign and can help me promote my website thru SEO. On the SEO part, at the end of 30-day period for the project, the freelancer should give me COMPARISON from 1st day up to 30th day of: 1. Keyword
...support to all staff within the organisation and overseeing the technical requirements of the company’s various offices. Essential Skills/Knowledge: • 5+ year of software project management experience, preferably in a website creation business involving remote team members • Previous experience with design and layout of a website, from the appropriate
Hi JITNC1, I noticed your profile and would like to offer you my project. would like to have a security expert pentest my office's IT infrastructure. would be a one time fee that we could negotiate. let me know if interested.
You work for a global consulting company with a number of large airport customers and the company has asked you to work on an airport planning and development project. You have been assigned to write a report regarding 2 airports to use as case studies for the teams who will be working with their various airport customers. Steps to follow: The steps
...are secure, but the site has an issue – the admin section displays all the passwords, and 2 clients have complained their passwords are sent by email which is a breach of security under GDPR. The job is to do the following: 1) Replace the password sent by email with password reset or password reminder, whichever you prefer 2) Ensure the passwords cannot
...specializing in Cloud Security, Automation, Devops, managed services, Cloud strategy, and Training services. The portal should be highly customizable so that we should be able to modify text and change layout, graphics as and when i want. It also needs to have a blog section as well. I would also need logo developed as well as part of this project. For reference
Hey, I have the following project where you could help with your expertise. Project: Building a "Security-Expert" Website for the German market Domain: [login to view URL] Example Website: [login to view URL] Example Quiz: [login to view URL] Requirements: 1. Basic Wordpress
Budget: $25-$50 Time-frame: 20 Hours Completion (Before 8am MST October 10th) Project Details: Seeking a highly skilled WordPress professional with strong background in web security/hacks and malware removal. Our website [login to view URL] currently shows signs of a malware redirect when trying to access the homepage it periodically sends visitors
Web Security and Penetration Test I am looking for a great team to complete my project. you have even penetrated server of a big website, then received Bounty!!! for example facebook、google、Microsoft and so on. This is very important . If you don't have the abilities, don't bid. Thanks. Because it is a very very difficult project. Challenge it , you
...virtual encrypted disk within a file or encrypt a partition or the entire storage device with pre-boot authentication. PLEASE NOTE: Accepted reports must follow VeraCrypt's Security Model (see attached PDF) • QUALIFICATION • Only CRITICAL vulnerabilities that demonstrate complete compromise of the system's integrity or confidentiality are eligible
...designer to develop the brand identity for Skill Force Security Systems including a bi-lingual logo and stationery. The company is a sister of Skill Force Security Services, a subsidiary of Al Barakah Holding Company. Background of Skill Force Company: “Skill Force” is a leading provider of security solutions offering comprehensive services to public
...my code and check it for imperfections and security flaws. Additionally while doing this, i need a few things relinked. The url to our login scripts have changed directories so that needs changed in the code. Also the facbook login token needs updated. Two: i need the new layout images put into the project and the old ones removed. This is a simple
...Design and Built Bank Management system . i need it web application . and i need it with high level of security . I need it on the urgent basis, so only apply if you have free time. Please attach samples of your previous project like my project in Bid message. Write “OK” in the top of the message to confirm that you read the description. Thanks
The objective of this project is to migrate or implement our mail service (Hostgator) to Exchange Online with including the advanced protection of ATP threats. We need a business solution cloud email that gives us the security and confidence that Exchange Online offers us. Please include in the proposals times, costs, technical requirements, which need
...specializing in Audio Visual, Security, Voice & Data/ WiFi technologies and we looking for a responsible, highly motivated individual who is ready to take on the responsibilities of generating interest in our organization as well as the solutions we provide. Our ideal candidate will take the project contacts with the known project information and professionally
...some token money after sometime of starting the project. But the entire amount will be released within 2 month. after the product has been installed in market. For your payment security we are ready to make a legal agreement. Contact only if you are okay with the payment part. and also its a big project. someone good development skill is need to complete
I have ongoing work related to our previous project 'logo design for a new security company'
...looking for 2 Vietnamese certified Magento developers who are ready to work remotely in night shift with us for the period of 6 months or longer and totally committed to the project. We will offer the good pay for the right candidates. You must be good at Magento and English and able to help with the these following: • Customize and deploy Magento multivendor
Project details: We’re developing a multi-tenant app [login to view URL], Material Design Component Framework This is an application for a mentoring organization. The UI will be from here: http://preview.themeforest.net/item/vuely-vuejs-admin-template/full_screen_preview/21247764_ga=2.196108204.1033829135.1538771671-1701465075.1536352248 I have bought this
kali linux - computer security project based on a case study
computer security project based on a given case study. Need to do practically in given VM also. Pls pm for more info.
...= 356m. i need to build motion sensor for security purpose. For each corner i need separate light and buzzer alarm. If any one try to enter my premises then alarm tiger. More you can find on attachment. In picture red area need to be motion sensitive. Each 4 corner have separate buzzer and led so security can direct easily witch corner effected. Only
We are looking for someone that can setup a dedicated server for Magento 1 for security and speed. Portfolio is necessary for our collaboration. We use Cpanel. There is also a possibility after this project to take care all our servers, including load problems, updates, backup problems etc.
...comes up with a message (eg ‘thanks for reporting this as a phishing attempt because of people like you our company is more secure’) and will be sent to the local inhouse security team (forward email, add a subject prefix and attach subject headers). It would also be great to have an option to also forward this to our team (checked by default) which
Hi Mudassar, good day!. I need your help for a project, it consists of a new Vulnerability Assessment of my website [login to view URL], which I changed its hosting provider. In addition to this I need a security analysis for 3 landing pages that are in the same hosting, one of them is built in Wordpress, but the other two are built in html (AMP) The landing
...manager for Cybersecurity. This would be a full-time and long-term relationship if you qualify and deliver results. To apply, please answer the folowing: What practical project experience do you have with "Cybersecurity"? Do you have any teaching experience? How good is your English writing skill? Can you work fulltime? How understandable is your