File security jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    9,959 file security jobs found, pricing in USD

    ...of time and on a regular basis (if everyone likes each other and we’re convinced you can do the work!) Requirements: ============ We will provide you a swagger file. The swagger will describe an API, authentication & objects. Your role will be to produce a serverless script or ansible (or similar) that will construct and configure the following

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    9 bids

    ...IMAGES TO LOCAL DISK (1,3TB available) PROJECT DESCRIPTION EXAMPLE SCREENSHOT!!!! >>>>>>> [login to view URL] * YOU WILL HAVE ONLY ACCESS THRU TEAMVIEWER (DUE TO THE SECURITY AND IP LOGGING) * YOU WILL WORK ON CLEAN WINDOWS 10, 1,3TB DISK SPACE FOR PARSING AND 100-500mbps fast connection

    $42 (Avg Bid)
    $42 Avg Bid
    6 bids

    ...manipulating an input file using reference data from three other reference files to produce an output file. Each of the files is a CSV/XLS file. There are three(3) reference datasets -- call them REF-A, REF-B, and REF-C. There is an input dataset in another CSV/XLS file (INPUT) which must be manipulated to create the output file (OUTPUT). The current

    $225 (Avg Bid)
    $225 Avg Bid
    14 bids
    Web Developer 6 days left

    I need a website development for healthcare services. Must be with hl7 security protocol and Follow Hipaa compliance. The developer need to have designer great ideas and development expertise for professional quality looking. The billing software that I use have ads & adm file extension, is not compatible with most of the regular practice management

    $493 (Avg Bid)
    $493 Avg Bid
    40 bids

    ...customization's must be: - Upgrade security Many security features, which include i.e.: --> Use TLS connectivity for handshake --> Use VPN connection for additional security --> Use ZRTP encryption protocol on VoIP (voice and video) communication --> Use text encryption for messaging and file sending --> Database security on app and server...

    $1120 (Avg Bid)
    $1120 Avg Bid
    21 bids

    Required: .Net, SQL, C#, Web Security, SQL Injection, XSS etc, Proficiency in English in an academic level. Two basic websites need to be tested and compared in terms of security vulnerabilities. And a short report required for findings. . Project: Source files and DB .bak file and testing guidance document will be provided (needed: Visual Studio

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    10 bids
    Trophy icon Web security article 4 days left

    article about web security and common type of web threats in word doc file , see the attachment file that contains project detail.

    $25 (Avg Bid)
    Guaranteed
    $25
    1 entries

    ...customization's must be: - Upgrade security Many security features, which include i.e.: --> Use TLS connectivity for handshake --> Use VPN connection for additional security --> Use ZRTP encryption protocol on VoIP (voice and video) communication --> Use text encryption for messaging and file sending --> Database security on app and server...

    $956 (Avg Bid)
    $956 Avg Bid
    7 bids

    ...you pass the trial video, you'll have an agent and consistent work (potentially daily work!!) If you disagree with some of the terms above, take a moment to think of the job security opportunity you'll have. One day we will open Studios across the globe and take people on-board full-time , high rates, flexible hours, fun + creative work environments

    $75 (Avg Bid)
    $75 Avg Bid
    28 bids

    ...*Application Banner: The following items should be available on the application banner: -Side Menu: Click Side Menu to view a list of available screen names. -Application-Level Menu : File, Edit, View, Navigate, Query, Tools, and Help. -Menu Toolbar : Search Toolbar, Advanced Options, Share, Communications, Notification, Settings. *Dashboard: **First Dashboard

    $366 (Avg Bid)
    $366 Avg Bid
    36 bids

    ...one of the four will have credits attached. The file naming convention for each file must be: Credits_[name of game].docx Credits_[name of game].txt Remove all hyperlinks and text formatting from pasted credits, unless the integrity of the credits is affected. Deliver all documents in a zip file. Bidding guidelines: NO SUBCONTRACTORS WITHOUT WRITTEN

    $23 (Avg Bid)
    $23 Avg Bid
    35 bids

    I woul...web safety and security to check a web application. Web application is developed in html, css, jquery, php, mysql. I would like him to check for all possible vulnerabilities and provide constructive feedback and basic repair instructions. The web app is really simple with just an authentication and a form consisting of just an input file tag.

    $34 (Avg Bid)
    $34 Avg Bid
    22 bids

    ...cargo flights). Cargo Each item must be registered and tracked for security reasons. Moved on Cargo or Mixed planes. Has a weight (in KG's). Has a unique cargo id, supplied by the client. Passenger Can be client or friends/colleagues of a client. A person who travels on a flight. For security reasons, personal information is kept. Booking Assigned a plane

    $137 (Avg Bid)
    $137 Avg Bid
    7 bids

    ...you pass the trial video, you'll have an agent and consistent work (potentially daily work!!) If you disagree with some of the terms above, take a moment to think of the job security opportunity you'll have. One day we will open Studios across the globe and take people on-board full-time, high rates, flexible hours, fun + creative work environments and

    $90 (Avg Bid)
    $90 Avg Bid
    14 bids

    ...you pass the trial video, you'll have an agent and consistent work (potentially daily work!!) If you disagree with some of the terms above, take a moment to think of the job security opportunity you'll have. One day we will open Studios across the globe and take people on-board full-time, high rates, flexible hours, fun + creative work environments and

    $68 (Avg Bid)
    $68 Avg Bid
    14 bids

    ...open-source utility used for on-the-fly encryption. It can create a virtual encrypted disk within a file or encrypt a partition or the entire storage device with pre-boot authentication. PLEASE NOTE: Accepted reports must follow VeraCrypt's Security Model (see attached PDF) • QUALIFICATION • Only CRITICAL vulnerabilities that demonstrate complete

    $250 - $750
    $250 - $750
    0 bids

    ...designer to develop the brand identity for Skill Force Security Systems including a bi-lingual logo and stationery. The company is a sister of Skill Force Security Services, a subsidiary of Al Barakah Holding Company. Background of Skill Force Company: “Skill Force” is a leading provider of security solutions offering comprehensive services to public

    $944 (Avg Bid)
    $944 Avg Bid
    56 bids

    ...keyboard inputs. Perhaps one minute is enough for you to type 10 ~ 20 lines, so, you can do yours in the meantime. Make it sense? It is not important how fast you complete one file typing, but it is important how long you stay connected on my laptop. Once you work with me perfectly this time, I will use you permanently. I am able to check your hours

    $150 (Avg Bid)
    $150 Avg Bid
    11 bids

    ...Ethereum is Turing-Complete. MULTI CURRENCY WALLETS/FIAT Although most ICOs only allow funding through Ethereum, Our solution shall support investments with multiple currencies. SECURITY We follow the industry standard best practices to develop flawless and fully secure web application.. Our codes are free from all OWASP reported vulnerabilities SMART CONTRACT

    $5558 (Avg Bid)
    $5558 Avg Bid
    26 bids

    ...a Texas electrical coordinator through their API. I need to implement a client to secure client. Secure server uses stringent security and provides little support. But does provide documentation guidance (see attached file). I need just a successful API call. I don't need the developer to make all the API functions. I will provide you with a certificate

    $206 (Avg Bid)
    $206 Avg Bid
    11 bids

    ...Introduction : I need a good thinker , good tactic , good strategy to complete a challenging project Project Requirements We need a complex javascript or method to create a text file on client machine from web browser We will provide 3 page license agreement to users , users will read answer few questions in text , radio + combo then click the "I accept

    $453 (Avg Bid)
    $453 Avg Bid
    11 bids

    ...comes up with a message (eg ‘thanks for reporting this as a phishing attempt because of people like you our company is more secure’) and will be sent to the local inhouse security team (forward email, add a subject prefix and attach subject headers). It would also be great to have an option to also forward this to our team (checked by default) which

    $299 (Avg Bid)
    $299 Avg Bid
    6 bids

    We look for a computer programmer specialised in Data Encryption and Security to write a code for us to insert in our source code of programs in dll and exe format to encrypt our program file and restrict any third party access to the program file we coded. Please contact: Technowave LLC

    $179 (Avg Bid)
    $179 Avg Bid
    9 bids

    ...yourself. While your website has been HTTP restricted, you can still access your content using cPanel File Manager, FTP and SSH. We have included a list of the infected content for your reference below. ‚óŹ You can get professional help from our security partner, SiteLock, to remove the phishing from your site and prevent future infections. For more information

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    33 bids

    The Data entry work is to punch 4-5 fields from a PDF file. Each PDF can have records from 100 to 1500 records. The data entry operator needs to punch the data in software which shows both PDF as well as Data entry fields. A good operator can punch upto 1400 to 1800 records in 8 hours time. Detailed explanation. Freelance Data Entry operators

    $476 (Avg Bid)
    $476 Avg Bid
    70 bids

    IT Infrastructure Design Requirements You must start with a blank/new Packet Tracer file, existing labs or modified labs of existing solutions will receive a zero without exception. Include the existing hospital services and systems but optimized/improved. Design a medium-size network for 200 to 1,000 devices. For example, an N-Tier design or superior

    $58 (Avg Bid)
    $58 Avg Bid
    18 bids

    ...It should 1. Have standard CRUD with atleast 1/2 complex search query. 2. DB connections should be pulled from a property file in resources folder with password encrypted in the property files. 3. There should be a security filter that should check for a request headers with the key "xyz". 4. There should be mockito test cases & web service test cases

    $257 (Avg Bid)
    $257 Avg Bid
    6 bids

    ...by Falcon Security, and their API connector is called vxAPI). Scripts and info can be shared for this. 3) If the values checked in step 1 exceed a certain threshhold, or by a high percentage, then, send an email alert (Gmail) containing details from step 1 to notify the admin. 4) If any file scans return results stating that a certain file is malicious

    $20 (Avg Bid)
    $20 Avg Bid
    3 bids

    ...by Falcon Security, and their API connector is called vxAPI). Scripts and info can be shared for this. 3) If the values checked in step 1 exceed a certain threshhold, or by a high percentage, then, send an email alert (Gmail) containing details from step 1 to notify the admin. 4) If any file scans return results stating that a certain file is malicious

    $9 - $22
    $9 - $22
    0 bids

    ...by Falcon Security, and their API connector is called vxAPI). Scripts and info can be shared for this. 3) If the values checked in step 1 exceed a certain threshhold, or by a high percentage, then, send an email alert (Gmail) containing details from step 1 to notify the admin. 4) If any file scans return results stating that a certain file is malicious

    $10 - $30
    $10 - $30
    0 bids

    Objective: Looking for an experienced developer to implement CSRF security tokens on a website. The source code are already there but we need help to pass a variable so that the php and dwt files can talk. Since this is a very quick and simple job for even average developer (30 mins max to fix), we expect a quick turn around and a competitive bid price

    $25 (Avg Bid)
    $25 Avg Bid
    10 bids

    ...new logo for a new security company need to look high end and elite PLEASE SEE THE EXISTING LOGO IN THE ATTACHED FILE AND MAKE THIS BY REMOVING THE GREEN AREA, AND PUTTING THE RED PART LOWER DOWN ON THE LOGO WE WANT BLACK AND GOLD LOGO DESIGN, PLEASE MAKE CHANGES SO THAT THE LOGO IS DIFFERENT FROM THE SAMPLE GIVEN file needed in coreldraw

    $30 (Avg Bid)
    Guaranteed
    $30
    26 entries

    - Visitors will download the "pre-installation exe file" you are going to code which will be about 2-5MB. - We will give you the design and materials. It is very simple. There is just logo and icon, texts and progress bar. - Security must be taken. We are open to discuss the infrastructure of file download URLs. Maybe some private repo or over ftp

    $226 (Avg Bid)
    $226 Avg Bid
    4 bids

    ...something like this: 1) I FTP into the server using SSH and drop a pre-formatted CSV file in a specified directory. 2) the server has a CRON job running that scans for a new upload every 30 seconds or so. 3) The CSV is imported into the db. 4) A results text file report is left in place of the CSV. I need to know that the database was not tampered

    $232 (Avg Bid)
    $232 Avg Bid
    20 bids

    ...icon overlay, once we select "icon overlay" option in right click menu on file or folder. we need it in a way without affecting security/safety of the macOS and without we disable SIP. the app will sync file/folder contents, so a syncing file has different icon than a sync'd file. please look at the link below for more information about what w...

    $194 (Avg Bid)
    $194 Avg Bid
    4 bids
    Trophy icon Create a LOGO Ended

    Brand: IDAS stands for strong security and authentication data store in switzerland Ideas: Letters similar to bank logos like: HSBC, UBS Strong - shield - secure / hence the red shield with swiss banner in example. Reliable - personal services for visiter management - reception - identification. Pick up the topics, feel free to make other

    $183 (Avg Bid)
    Sealed
    $183
    135 entries

    ...hybrid-analysis by Falcon Security, and their API connector is called vxAPI) 3) If the values taken in step 1 exceed a certain threshhold, or by a high percentage, then, send an email alert (Gmail) containing a snapshot of the system activity to notify the admin. 4) If any file scans return results stating that a certain file is malicious, repeat step

    $25 (Avg Bid)
    $25 Avg Bid
    1 bids

    ...Enterprise File Security Website: Tagline (optional) : Trusted. Everyday. Everywhere. Colour: Background: white The logo should both: - represent the file sync or file backup security - maybe have a shield? - a data security vault? - give a trusted enterprise file security About Enterprise File Security Enterprise Grade ...

    $36 (Avg Bid)
    $36 Avg Bid
    53 bids

    Good Day, I want to set up a machine learning program that uses reinforced learning to achieve goals based on simplicity, security, efficiency and customer satisfaction. Will you be able to help me set up a bot to learn something with these reward structures in mind. The Machine must LEARN TO WRITE code in ASP.Net (C#) with the above variables in

    $219 (Avg Bid)
    $219 Avg Bid
    12 bids

    ...: 1- First of all eye catching design (header, footer, menu's) 2- Two languages option (Arabic/English), editable language file required for custom's translation. 3- SEO friendly 4- Responsive Mobiles Sites 5- High security coding 6- Social media integration like FB, comments box, twitter, youtube etc. The subject website is required for PDF Ebooks

    $615 (Avg Bid)
    $615 Avg Bid
    130 bids

    Using a Cisco ISR4451-X-SEC/K9 SEC PoE 4 Port Wired Router Security Bundle (with securityk9 and ipbasek9 permanent licenses): 1. Update the 4451 to the latest available cisco iOS available for it. 2. Configure the 4451 to perform the following: Port 0 is connected to a Cox Gigablast fibre/Ethernet modem operated in bridge mode. Upload and download

    $401 (Avg Bid)
    $401 Avg Bid
    26 bids

    ...docker files (OS: Ubuntu 16.04). Application: - We are hosting python flask applications that use flask-socketio for Websocket connections. The applications persist data to the file system as well as to a mongodb (individual database per application). Redis is used for inter-process communication (individual process per application). The flask applications

    $553 (Avg Bid)
    $553 Avg Bid
    20 bids

    we will give you screens for [login to view URL] have domain and will buy a hosting for that. There are two user for that. S...that. Single users and moderators In it must be form Wizard,scoring system , live message ,profile for users and profile for moderators ,send file or take file, reporting system. confidentiality and security agreement will be made.

    $219 (Avg Bid)
    $219 Avg Bid
    7 bids

    ...this a public service). - The front page should be customized in a simple way using our logo and mascot. A simple design should be sufficient. - Documentation in a plain text file, detailing: - The series of steps to run if we want to install the service again on another VM - Non default settings that were chosen and the reasons why. - How to update

    $141 (Avg Bid)
    $141 Avg Bid
    14 bids

    ...webmail interface. We need the mail server to get properly installed and all the ssl security features and the proper settings so the emails are not flagged as spam or blocked by gmail or yahoo mail. The nextcloud account should have a proper s3 bucket for the file storage for low cost. Will also have [login to view URL] as the email account control panel to

    $84 (Avg Bid)
    $84 Avg Bid
    20 bids

    4.1. Login Request Method URL POST /v1/user/login Params Parameter Type URL type String Auth type — “facebook” or “google” token String Security token location Object User location in format {“lat”: …, “lng”: …} Response 200 { «status»: 200, «message»: «Ok»...

    $504 (Avg Bid)
    $504 Avg Bid
    41 bids

    I need to get trained fully Odoo functional and development from expereiced Odoo Consultan...from expereiced Odoo Consultant. Development Training How to develop the New Form Report designing Security Levels asigning Process flow changing Dashboard Designing Functional Side CRM Sales Purchasing Inventory Accounting System Setup Master File Uploading

    $6 / hr (Avg Bid)
    $6 / hr Avg Bid
    7 bids