...building and flats management 3. Subgroup of customers 4. Payment gateway integration 5. Data encryption 6. Discussion forum 7. Polling 8. Complaint management(Ticket System) 9. Parking Management with Vehicle directory 10. Hall booking 11. Email and SMS broadcast facility 12. Customize invoice facility 13. Income tax calculation 14. Vendor
I'm having trouble finding out how to set up full disk encryption on ubuntu server 16.04. It's installed on ([url removed, login to view]) using asrock tpm2-s module ([url removed, login to view]) I don't want to learn anything about it, I'm looking for copy&paste solution :-) And data recovery
I need a HTML form that will use Twilio API. It must have 5 fields: 1. Twilio Account SID 2. Twilio API KEY 3. Send From NUmber 4. Sent To NUMBER 5. Textarea for message to be sent! + SEND BUTTON! Please bid only if you worked with Twilio before! I will provide Twilio Login Credentials on private!
...set up. Here us the list of the vulnerabilities that need to be fixed... 1) DOM Based Cross-Site Scripting Fix:Review client-side code and clear your input sources 2) Encryption not apllied Fix: Force the use of HTTPS when sending sensitive information 3) Hidden Directory Detected Fix: Issue a "404 - Not Found" response status code to a prohibited
Hello, We planing to develop a product as SAAS based on cloud. that will include Micro CMS , Micro CRM with Market place + Analytics report with socialise. Question you need to answer in your proposal. 1, Which framework you will be using - Laravel/Codeigniter? 2, How to going to make multi tenant application with single code and multi database - for cloud version, If user want subscr...
Important Notice ::: Project for Pakistani Developers only, Write your CNIC (without dashes and spaced) and send it to 668 In return you will details of numbers registered against your CNIC including the mobile company name that has issued SIMs against your CNIC. What you will get the result is like under. Result: MOBILINK:0,0; TELENOR:2,0; UFONE:1,0; WARID:0,0; ZONG:1,1; TOTAL:5(4Voic...
Voice and SMS Telecom Engineer Career level Senior (5-10 years) Greencall Mangement, a romanian telecom company is seeking a telecom engineer with good knowledge of VoIP and SMS interconnections. One of the main responsibilities will be to interconnect new voice and sms partners and manage these interconnections at a technical level. The candidate
I need a Joomla component where i can see all incoming SMS. I plan to use Arduino for that. Something like this: [url removed, login to view] only don't need a screen, so it will be simpler. I also can use Ethernet and/or wifi shield for Arduino if needed. So i need a program for Arduino
I have a PHP website and i need some pages locked, members can only access those pages after subscribing and getting one time verification code via SMS
We are looking...of 21Million coins, QT wallet and the coins should be transferred to our wallet. We want the complete source code of the coin as well. The coin should be based on SHA256 encryption. You should have experience in Coin Development and should be able to provide us sample of your work so we are sure that you can complete the project.
...compression involved) The archive does not need to employ compression/decompression. We use it as a simple container, the JPG files could be simply read as data buffers; encryption will be applied later The application will only have to show thumbnails of this pictures (by dynamically resizing the pictures), the full picture and buttons: SlideShow
...looking for testers to try a new SMS service and provide feedback. Our service helps people learn how to use new digital financial tools like mobile money. We’re looking for ways to improve the service. Testing will take 1 week. Testers will receive SMS messages each day. Testers will be asked to reply to our SMS messages. Job is a contract requiring
...script that enable multiple users to encrypt and decrypt a file with a password. The password must be entered by the user via command line (not stored in the script). The encryption hash used must be SHA256. The script must have the ability to list multiple files in the index. When encrypting a file that is already in the index, have it replace the
I need you to develop some software for me. I would like this software to be developed for Windows using Java. Design a windows software that will have an encryption and decryption functions and will access a web server for information