I have a Virtual Compute Node on a Public Cloud Server. It uses CentOS+Apache+MySQL. I want get Performance and Security Optimizations to be done for the websites hosted on the server. This will involve setting up cache, checking the existing server configuration and whatever is required.
Write an article about the product, the number of words is 50-100, I need people living in the United States
I need a new website. I need you to design and build a website for my small business.
...team to have the relevant skills to respond to client needs. 3. Demonstrated experience working in cloud projects and/or analysis activities. Well-developed interpersonal, negotiation and communication skills, including the ability to establish positive working relationships with management, inspire employees and influence internal clients and external
We have a couple php sites, a sql database and several wordpress sites on a cloud virtual private server with Superb.net. We need a security assessment due to some spam uses of our wordpress sites, an assessment of our current configurations and we would like to have an expert available for as needed server maintenance. Please give us a proposal
I have cad files, i need working drawings to commence construction of these dwellings. All measurements must be included on the plans to commence building. Only units, 2, 3 and 4 are to be done. Unit 1 is not going to be built CAD files attached. Please confirm a price. CAD files and pdfs are required. Method of Payment I will load the funds to
Can you give me an estimate to do user security (user registration, user role based login, user preferences) using Spring MVC and Spring Security? The work should support both Web and Mobile users HTML output as well as json output will be needed
Hello, I'm looking to download all the videos from an Adult Streaming Website. I've attempted to download the videos myself, but can only seem to download a poor / lesser quality. I'm looking for a net-sec professional to investigate the website and see if they can find a solution to mass-download all of the videos in HD (high-quality). Let's chat and see if you are the right...
...Networks and forums. All content is provided in English needs to be translated and posted Monitoring and replying to messages. This is a long-term position with part-time working hours. * The work normally takes approximately 3-4 hours a day Monday-Friday Sat. and Sun. only need to check the official page for new messages 1 time a day __________
...Network. We need the basics for the permanent game website, complete with administrative backend for easy management, secure user accounts, individual Tron game wallets and 2fa security options for the user accounts. The structure and functionality of the website is most important right now. We can add the images, links and information to the website ourselves
...management phases including all required documents / form that are mainly used in physical security project from design perspective only from project inception till final design approval project components are CCTV, Access Control, Data Center, Access point. Working Needed: Software : Bluebeem, Revit Low voltage engineering. Electronic components placement
The company is a IT/Cyber Security services company that provides solutions/consultings in Vulnerability assessment, IT infrastructure Security , Penetration Testing etc I have rough idea for the logo in my mind and I'm uploading a rough sketch of it
Would like a colour by number feature for my app. I already have a app made and want to add another game. colour by number. Will provide photos of pictures and you will need to create the colour by number templates.
...find out the security measures needed to develop a computer game. The purpose of this project is to explore the security measures needed to develop a computer game that mitigates cyber security risks. It is a small study. I am seeking for 5-10 game designers who meet the participation criteria below: • The ability to explain the security measures needed
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?
I need an My Android app. I would like it to be redesigned and additional new development. BUT BE ABLE TO LINK BANK AND API ON THE ANDROID APP
I want to edit the php website, use the cell phone number register account, use the cell phone account login and get the new password, I have twilio account and use twilio to send the activation code registered account . website: [login to view URL]
Please respond only after reading in entirety & understanding the needs. We are responding to a request for a facilities integrated security system & looking for a evangelist technical expert/consultant(s) for help. Need is to help identify the HW, possible software to accomplish this task. The HW should be openly available (PLC use for I/O digital
...BUDGET IS 19 DOLLARS FRO THIS PROJECT , PLEASE DONT BID IF YOU ARE LOOKING FOR MORE . My site is [login to view URL], it has script already added to seceive SMS but it is not working the way I want . I want my site look or function like this [login to view URL] or [login to view URL] or any other site with similar functionality .
We currently use Slack and Google voice to communicate with a group of 50 people I would like to set up a better system for broadcasting sms messages to the group.
This task includes normalizing 1781 rows of phone number information into a standardized format. The current formatting has "Phone", "Description", "Extension", which needs to be converted to "Phone", "Phone Type", "Notes", "Extension" for 4 types of phone numbers per row, organized by Home, Cell, Work, Fax. Maintaining r...
Need an expert from the filed assiting with securities of CSS, CTR mode, CBC mode, ECB mode, AES-128, hash function with 256-bit
...network is with patience and mindset with ideas out of the box. With experience in system penetration testing , easily with ideas and experimental ways, can be proven that security is a must. you must know how to use a xss to make a shell! you are good at it ,because it is a difficult project. PS： I am looking for a google hall of fame to do it!!
I already had someone make the PDF email invoice feature. Now for $30, I need it to be tested and further modified if needed.
Website perfectly working on http but it has broken css on https
...on Linux , Apache/Nginx Need extensive experience AWS tools like Autoscaling, route53, ec2 , lambda, s3, beanstalk , Mongo Atlas AWS Management tools Security Audit requirement and Using AWS Security tools , SSL and securing the network checklist Basic knowledge about XRay , Pinpoint , SES, SNS, SQS Setting up an Infrastructure Monitoring System and
Given a data set of 50, 000 images (32x32 pixels) that belong to 10 categories, say, the 10 digits, how many parameters in your classifier for hand-written digits that you can comfortably entertain if you want to train (a) a discriminative classifier or (b) a generative classifier? I need help solve this question with argument.
Currently we have fully developed this project but we are getting some errors. We are using Nethereum and json-rpc. The node seems to be the source of our problems. Working in Windows environment.
Write a Java program that is reading from the keyboard a value between 100 and 700 and is printing on the screen the divisors of the number. Your program should use a cycle for validating the input (if the value typed from the keyboard is less than 100 or bigger than 700 to print an error and ask the user to input another value). Also the program