I own and manage a small business. Due to security requirements from customers and potential customers, I have a need to build a smart card authentication system. I need to have a smart card login to my workstation, that automatically logs out upon removal. I also need to have a way to deactivate the smart cards remotely. Finally, I need to be able
...secure so not sure if Wordpress is ideal for this? Please advise. The information needs to be kept VERY secure and also use Password encryption – do you have experience of security and encryption? Admin can add: New company New contact (assigned to company) New Project (assigned to company, plus contacts associated with that project in particular)
To handles the large volumes of log files. To ensure the reliability. Reducing response time for query result.
Details will be provided via chat. Please be able to find issue in code and fix in timely manner
...Levels of User Access Online Backup System Transport Layer Security (TLS) Unified Customer Management Monitoring and Reporting ACD (Average Call Duration) ASR (Average Success Ratio) CDR (Call Detail Record) Country/City Reports Customer Reports Real-Time Monitoring Tool Security Logs Unsafe Account Monitoring Call Management DID Forwarding
Looking for full stack developer with experience in cryptocurrencies and web security. As a reference, I please look at this example [url removed, login to view] This is my favorite exchange for it’s clean looks, fast responsiveness et and nice features. *** Requirements *** - BTC as base trading pair - Scalable : Must support hundreds
Looking for full stack developer with experience in cryptocurrencies and web security. As a reference, I please look at this example [url removed, login to view] This is my favorite exchange for it’s clean looks, fast responsiveness et and nice features. *** Requirements *** - BTC as base trading pair - Scalable : Must support hundreds of
We believe we might have a security breach in our Office365 hosted Exchange. As we are a small company we don't have an in-house expert. We have had logging turned on and need some help to interpret the logs. For example, we see delegates being added in the logs but I don't know if that could be misleading. Maybe we should be looking at something
...masters, advt space admin, analytics etc... Description of requirements/features: Non-Functional Requirements like • SEO • Security – SQL injection etc… • User Tracking • User navigation log • Proactive Error logs • Advertisement space administration • Standard pages in footer or menus – aboutus, contactus, TnCs et...
The project’s primary goals consist of: A robust and effective web based online banking system. Extending functionality without compromising the security. Personal banking services that gives you complete control over all your banking demands online. Simple and easy user interface to work with. Online Banking features: Registration for online
Windows application which emails an event log entry to a specified email address. Runs in taskbar with -checkbox 'Start with windows' -Settings -help (links to webpage) -exit Settings window -contact email address Emails will automatically be sent once a day.
...industry best practices 4. Full object oriented design 5. GUI for design of views 6. Triggers 6.1 Form / View 6.2 Field 6.3 Completion 7. Audit logs 7.1 Pages accessed 7.2 Action performed 7.3 Fields edited 8. Security 8.1 Object level 8.2 Action - CRUD 9. Generate code for all layers 9.1 Model 9.2 View 9.3 Controller 9.4 Data access 10. Generate code for
...associated server and have no direct access to them other than as a user. We also need to recreate the official app's function of streaming a video. In additional to taking logs of app traffic data, we will need you to analyze the data and figure out how we can emulate those messages so our own app can communicate with the official app's servers correctly
...Partners in Life) has hired your company to investigate a potential breach of their medical records system. The HCC Security Operations Center (SOC) identified some “inconsistencies” in the intrusion detection system (IDS) logs that caused the reliability to be questioned. HCC uses Snort IDS’ running on Linux systems. In addition, the lead HCC database