1. Optimize cPanel Server (Dedicated), we want to maximize performance with the same hardware. 2. Outgoing spam detection and automation. 3. Incoming spam configuration. Please suggest one tuning you will done for each of the category below, we will see if you are qualified. E3 Server 32GB RAM 2 SSD RAID 1 (OS, MySQL and main site) 2 HDD RAID 1 (Other
...5. Experience in working with project teams involved in the delivery and implementation of broad based, complex ICT projects that balance the requirements of performance, security and user functionality/friendliness in a diverse and rapidly changing university environment. To address the selection criteria with the following weights: 10% 10% 50%
...linux templates in and deploy two servers based on the templates. First, an email server. Email server includes popular linux mail tools, web interface, secure mail, IMAP, SPAM, mallware filtering etc. but also DNS and SSH access. The root account should be disabled to login directly. Second an LAMP server: LAMP server includes LAMP, SSH, HTTPS, perl
Two Odoo installation installations are needed. The installation will be done through Plesk 17 by using Odoo docker container. Please Apply on this job if you have the right skills to perform this. Thanks. Postgresql must be integrated in plesk.
We have a couple php sites, a sql database and several wordpress sites on a cloud virtual private server with Superb.net. We need a security assessment due to some spam uses of our wordpress sites, an assessment of our current configurations and we would like to have an expert available for as needed server maintenance. Please give us a proposal
...30-60 days - Domains must be from different IP addresses and different Class-C IP addresses. - Prefer high ranking Alexa sites. - No article directories, link farms, forums, spam sites, web rings or link directories. - Links that are not approved will have to be replaced by service provider. - Maximum 2 Links per day -The page where you will put my
Can you give me an estimate to do user security (user registration, user role based login, user preferences) using Spring MVC and Spring Security? The work should support both Web and Mobile users HTML output as well as json output will be needed
...protection in app: you can add request Password on starting app and protect your black list with password. Easy reset password with your BlackBerry ID password Block unwanted and spam calls and play an audio message of user's choice or Send calls to hang up on the caller, unique in this Blocked calls don't ring Personal Blacklist Add any phone number Easy
...together. 2)The plesk panel needs an update as is showing this: Extended support for Plesk 12 The version of Plesk installed on this server (Plesk 12.0 or 12.5) has entered extended support phase in June 2018. It will reach EOL by the end of 2018. This means that starting next year, your Plesk panel will no longer be supported by Plesk, and no updates
Hello, I'm looking to download all the videos from an Adult Streaming Website. I've attempted to download the videos myself, but can only seem to download a poor / lesser quality. I'm looking for a net-sec professional to investigate the website and see if they can find a solution to mass-download all of the videos in HD (high-quality). Let's chat and see if you are the right...
Please READ and apply ONLY if you have enough knowledge to fix this! We are looking for an expert, who has deep knowledge of Centos 7 server with PLESK, Apache, Nginx, PHP, HTML and Wordpress/Woocommerce. Our problem is, that our Woocommerce webshops works fine when a user browses a website with a common browser. But when we use Google search console/fetch
I have a wordpre...Remove Malware from website - Check all code for malware - Prevent future malware, virus, spam etc attacks using whatever methods possible (paid security plugins, external security software etc) - Ensure data is secure currently and get involved for future data security. You should have significant previous experience in this area.
...METHODS, ONLY WHITE HAT METHODS. -- Google guidelines must be followed and no way should be compromised. Links building should follow: - No black hat and other unethical SEO Spam techniques. Only white hat methods and ethical work will be accepted. - Backlink pages must relate to our site topic - Links must be from EU, Canadian, USA and Japanese websites
I need help to make a bot (or software) that simply reads data from one website and uses it on another. There cannot be spam and it needs to be timed. The bot needs to handle much data and be able to work all day. I am not sure what type of difficulty this is but feel free to ask questions.
Thanks Everyone! ***PLEASE READ DESCRIPTION FULLY***PLEASE... I'll never respond to spam bidder. You have to prove that your bid is not spam with any way. Following is my description. I have 3 website templates. I'll show it to proper candidate. You must build react app that seems like these template. First template is for news. and the others are complex
The company is a IT/Cyber Security services company that provides solutions/consultings in Vulnerability assessment, IT infrastructure Security , Penetration Testing etc I have rough idea for the logo in my mind and I'm uploading a rough sketch of it
...find out the security measures needed to develop a computer game. The purpose of this project is to explore the security measures needed to develop a computer game that mitigates cyber security risks. It is a small study. I am seeking for 5-10 game designers who meet the participation criteria below: • The ability to explain the security measures needed
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?
Please respond only after reading in entirety & understanding the needs. We are responding to a request for a facilities integrated security system & looking for a evangelist technical expert/consultant(s) for help. Need is to help identify the HW, possible software to accomplish this task. The HW should be openly available (PLC use for I/O digital
...link-exchange programs, no banned sites by Google, no illegal/scam/spam sites. - No exchange programs, web rings, rented links, FFA sites. - No gambling, adult & porn sites, pharmacy sites, illegal websites, hate-based websites, violent websites, cracking or hacking websites, no blacklisted or spam sites. - No Directory Submission, Forum Post, Article Submission
I have a pretty simple task. I need to connect Facebook Comments modeartion tool to my site, so I will be able to delete spam comments. Here's the page where the FB plugin is (it's built with Clickfunnels): [login to view URL] Thanks, Eric
...will manage our emails using rainloop and roundcube webmail clients .. by using the sieve and rspamd and clamav , all mails will get filtered properly when downloading so less spam . we will need all this things to work together in the docker image so all working together with each other Dovecot GETMAIL has to be version 5 the latest ( it has to
I have a unique project im looking for y9uo to search the terms I give and email...search the terms I give and email the websites that appear.. I will give you the copy and paste. I think the most we can send a day is a few as we dont want them to goto spam. You can also do from facebook or social media. Total 5 keywords first 7-10 pages per each.
Hi, I think I have malware on my server. I have a digitalocean droplet hosting multiple sites but all of them when hit are redirecting through multiples sites and landing on spam websites with popups etc. The right freelancer will be able to clean this server efficiently. Thanks.
Need an expert from the filed assiting with securities of CSS, CTR mode, CBC mode, ECB mode, AES-128, hash function with 256-bit
...network is with patience and mindset with ideas out of the box. With experience in system penetration testing , easily with ideas and experimental ways, can be proven that security is a must. you must know how to use a xss to make a shell! you are good at it ,because it is a difficult project. PS： I am looking for a google hall of fame to do it!!
...on Linux , Apache/Nginx Need extensive experience AWS tools like Autoscaling, route53, ec2 , lambda, s3, beanstalk , Mongo Atlas AWS Management tools Security Audit requirement and Using AWS Security tools , SSL and securing the network checklist Basic knowledge about XRay , Pinpoint , SES, SNS, SQS Setting up an Infrastructure Monitoring System and
I'm looking for a developer to help add a new feature to our Wordpress website. We run...points if you also know Laravel! (We have a separate project that could use Laravel Expertise) Please start your cover letter with "Rockstar Developer" to help me weed out spam.. and keep it short and sweet. Super pumped to meet talented people!! :-) Thank you