...developers. You don't have to create any system / project or anything. We need some advice from a IT project expert who knows about IT systems - like Change Request Management, CRM, some unique systems. We are planning to develop an online system (PHP based) but we need some ideas - that's all. It cannot be normal systems like HR management system, Ticket
I’m following the development of Gwadar Port Project and those security threats it faces or its conflicts with local people. That’s why I need the help from some local persons. This is a long-term project, so we can cooperate many times. To bid on this project, you should introduce yourself and show me your advantages. I need someone who has both
...Develop new user-facing features as required by business goals that are effective across desktop and mobile platforms - Optimize website for maximum speed, scalability, and security - Use and manage plugins effectively, and provide recommendations as needed - Oversee release management including staging and production sites - Build and maintain an automated
1 page summary of the entire article 1 page description of the importance of the discovery 1 page discussion of the potential industrial areas of potential uses 1 page discussion of what can now be researched further because of this discovery
...Develop new user-facing features as required by business goals that are effective across desktop and mobile platforms - Optimize website for maximum speed, scalability, and security - Use and manage plugins effectively, and provide recommendations as needed - Oversee release management including staging and production sites - Build and maintain an
Hello, We looking for Java and PHP expert Consultant needed for one product consulting job with Responsible for Project db and api architecture to make. This going to be long term project. Also after then your responsibility is going to a control execution and security. etc .. As this is going to be large project. Please bid only if you
I need expert developer in C and have very deep knowladge in the php internals ( C ) You must have the ability to write new php extention (.so) You must have deep knowladge in php and linux and security The work will be discussed in pm Please do not randomly bid, if this is not fit to you do not bid.
Seeking cyber security , hardware h@acker for electronics projects internal security management company working for large commercial retailers Requirements - have dsp and sdr experience - know how to defeat most keypad entry systems - locksmith or enthusiast - hardware security enthusiast
...looking for an intelligent problem solver who can help us with a list of 70 errors on our MVC, PHP website. Errors range from security issues on logins to grammatical, technical errors, flow errors, logic errors, and design errors. We need an expert with a lot of experience and the ability to work very FAST! WE WILL NEED AN EXACT HOURS COUNT
Hello I am working on a project, I need the following ADVANCED training and some security questions about: - ASP.net Identity in general comparing with old Account's Module - fix (forget password) - fix (Reset Password) - fix (validate email) - Enabled (third party Authentication) - Secure Project Folder - Membership vs Role vs Profiles
Implementation on server's security and SIP configuration for outbound calls and SMS
...Attention this script has no bug! i use it for 2 years,test,change etc and all fine,when you are changing this page,you need to be very carefull to not break any! means i need good expert people! Payment gateway,i will use a local payment gateway,they call it iyzico,will be market place payment gateway entegration,we have already direct iyzico,we need to
...overloads CPU from Php code, server is checked and everything is installed correctly, running 40 CPU but it overloads on 2,000 online. CPU overload coming from Php - GD , image generation. I need PHP expert with this particular knowledge (image generations php GD) to change structure or update for lower cpu usage. requirements : PHP -GD knowledge, Team...
use Netbeans to create two different unique and complete demonstrations of Risky Resource Management such as Buffer Copy without Checking Size of Input, Improper Limitation of a Pathname to a Restricted Directory, Download of Code Without Integrity Check, and Inclusion of Functionality from Untrusted Control Sphere. You will demonstrate and describe how to fix each of the problems. Therefore a tot...
testing SSH Binary for Illegal -G option: Binary Infected testing 2 server vps have my vps server audited security Suckit rootkit... Warning: /sbin/init INFECTED !!!!!!!!false positive???? the fixed all problem
...GNU/Linux 4.4.0-70-generic x86_64 (Ubuntu) , Apache2 installed. I need server expert with PHP knowledge to fix the issues . Requirements : Teamviewer ( highly recommended becouse we have to work with it, for security purposes) Linux(Ubuntu) Since server is ubuntu. PHP knowledge in case if website have script issues. Varnish Firewall . If you've
Hello there, I recently had security network cameras set up my by my partner. Once I became aware of this I took the essential details of the system router and security setup and would like it remotely set up so I am able to access the system as he does from his phone however he also had another freelancer help with this. I have the Information and
Hello, I'm looking for an expert PHP/linux developer with experience of using and converting SSL certificates to make curl/soap requests from php/linux. I have a linux server running CentOS 6.8 and curl 7.19.7 compiled with Network Security Services (NSS 3.21) for SSL. I need to make requests to a remote soap/wsdl api webservice hosted on an
i have a private game with a very simple anti-cheat, it scans the memory and make sure none of the memory is changed. if memory is changed it will close the game. I would like someone that can make a bypass for this. You may write your code in any language, but I do require the source. So that I may learn from this and provide solutions to fix these exploits in the anti-cheat. Thank you.
Experienced Website Security Specialist, Fixes Hacks, Advice
...intelligence. - Unit 3 - Voice: Tru has her own voice recognition system. That means that she activates only with a particular voice. - Unit 4 - Musicologist: Tru is an expert in music. She knows every song that is made! She attached her data form you- tube, spotify and iTunes. She also knows every detail for a song (like spotify’s genius). She can
I want an expert who can protect my excel data which i mean to sell to clients from making copies that can be used for other purposes for which it was not originally meant for. I am willing to pay as much as possible to get this done, please.
...plus deactivate convertplug to be able to fix it. I think its got something to do with these plugins Convertplug Bullet Proof Security W3TC & obviously my .HTAcccess File. BUT I AM NOT 100% so need an expert WP/PHP fellow to find and fix the issue. **Person who tells me how he/she plans to help me in their proposal with this issue will only