The objective is to create a secure mobile application (with its backend) that allows the exchange of end-to-end encrypted voice, video and text messages among subscribed client devices. all users must be pre-authorized by an administrator. The admin panel is the page where the administrator can create “Client Circles” and link multiple devices to each circle separately. For example i...
I have a Virtual Compute Node on a Public Cloud Server. It uses CentOS+Apache+MySQL. I want get Performance and Security Optimizations to be done for the websites hosted on the server. This will involve setting up cache, checking the existing server configuration and whatever is required.
We have a couple php sites, a sql database and several wordpress sites on a cloud virtual private server with Superb.net. We need a security assessment due to some spam uses of our wordpress sites, an assessment of our current configurations and we would like to have an expert available for as needed server maintenance. Please give us a proposal
Hello, I'm looking to download all the videos from an Adult Streaming Website. I've attempted to download the videos myself, but can only seem to download a poor / lesser quality. I'm looking for a net-sec professional to investigate the website and see if they can find a solution to mass-download all of the videos in HD (high-quality). Let's chat and see if you are the right...
...Network. We need the basics for the permanent game website, complete with administrative backend for easy management, secure user accounts, individual Tron game wallets and 2fa security options for the user accounts. The structure and functionality of the website is most important right now. We can add the images, links and information to the website ourselves
Looking for a consultant or Expert who can define all phase in design management phases including all required documents / form that are mainly used in physical security project from design perspective only from project inception till final design approval project components are CCTV, Access Control, Data Center, Access point. Working Needed: Software
The company is a IT/Cyber Security services company that provides solutions/consultings in Vulnerability assessment, IT infrastructure Security , Penetration Testing etc I have rough idea for the logo in my mind and I'm uploading a rough sketch of it
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?
Please respond only after reading in entirety & understanding the needs. We are responding to a request for a facilities integrated security system & looking for a evangelist technical expert/consultant(s) for help. Need is to help identify the HW, possible software to accomplish this task. The HW should be openly available (PLC use for I/O digital