Google has blocked an extensive number of Wordpress-based sites due to a malware attack by SoakSoak.ru
Looking for a talented developer with extensive experience in developing a Crypto Currency from the ground up. I want someone who can fork and execute measures to prevent hacking or other potential threats. I want this Coin to stand out from the crowd and be able to improve on some of the complaints of Bitcoin. I would like to be able to utilize blockchain or something similar to make the whole process as easy as possible. I am focusing on an older demographic that has concerns and is scared about getting into crypto. The most important part of this project is to make this ICO known. Whether it be through social media or having the ICO go viral. Any ideas or suggestions in regards to composing the whitepage and website would be most appreciated. I am looking for the best of the best. MIT grads or students a plus. For the right candidate, this will be an ongoing project as will need a talented coder to manage the initial traffic after the ICO; as well as promote mining. Incentives after the ICO available.
My website is having issues with accessing https:// over mixed content hears the error message i receive [login to view URL] Mixed Content: The page at '[login to view URL]' was loaded over HTTPS, but requested an insecure XMLHttpRequest endpoint '[login to view URL]'. This request has been blocked; the content must be served over HTTPS. my website is [login to view URL] okay http works but https does not
We have a Word Press site using Linux, and then a separate nonWordPRess directory where we keep password-protected .pdf files. The password protection is old-fashioned, using .htaccess files. Lately, some users have been having problems accessing these files, where "Authorization Required" is thrown up instead of a username and login password window. Need someone to evaluate the password protected file access using different browswers and combinations to see if the problem can be replicated and fixed.
We are looking for website security audit report by CERT Empaneled agency
i need some advice on something that was deleted . can it be done remotely and can we trace back the deleted file even from the recycle bin. how many percentage and so on..
Cloud computing has gained higher priority due to a wide range of resources and help that offers to end users. With this advancements, there arises a number of security issues which inversely affect the users. Security in Cloud computing has become a major issue and various researchers were done in the same field to overcome the unauthorized attacks. The major drawback in various researches are related to the limitation in elasticity feature of the cloud through admission control and the average response time of valid clients was also very high. Propose a new approach to overcoming the drawbacks
I want a hacker to hack my website and tell me the 'open doors' so that I can fix those. It should be detailed hacking. You should be a good hacker who can hack website. Website is in PHP. We will host the website on a demo server for hacking. You will not get access to code.