My project should have the following things: - Java code ( methods ) that can do clustering of numerical and categorical and mixed data set - It might work if I combine the k-mean and k-mode - Any thing that will work with dataset the I mention above - Security (intrusion detection) might be included in some way - Security method that analysis data
...high bids. Please don't waste my time by submitting a ridiculously high bid to me. In other words, if you a looking to fleece an ignoramus I suggest you look elsewhere. ***PROJECT SUMMARY*** I'm currently running Gallium OS 2.1 [login to view URL] which is based on Lubuntu. Before I walk away from my computer–when I remember—I
...possible support in terms of web security such as penetration testing, vulnerability assessment, vulnerability scanning, server hardening, installing firewall etc. It is a wordpress site so likely to be [login to view URL] will give all possible support you can in terms of making the site safe from future attacks. You will bill on my time logging software. There
The objective is to create a secure mobile application (with its backend) that allows the exchange of end-to-end encrypted voice, video and text messages among subscribed client devices. all users must be pre-authorized by an administrator. The admin panel is the page where the administrator can create “Client Circles” and link multiple devices to each circle separately. For example i...
I need my website re-configured. There seems to be 2 issues- visitors to my site cannot send me an email and I’ve been told by flywheel the website has security issues-see below Hey Lorina, We're always happy to help if you believe your email issues are server related! Otherwise, if the issue is caused by a plugin configuration problem, we would have
I have a Virtual Compute Node on a Public Cloud Server. It uses CentOS+Apache+MySQL. I want get Performance and Security Optimizations to be done for the websites hosted on the server. This will involve setting up cache, checking the existing server configuration and whatever is required.
...for one the Jobs i would like to apply for a role as a Business Analyst I can provide the details of key selection criteria and also a copy of my resume for someone to help . Musts : 2 pages long relates to my resume and some makeup Selection Criteria 1. Education, training and/or relevant experience equivalent to postgraduate qualification together
We have a couple php sites, a sql database and several wordpress sites on a cloud virtual private server with Superb.net. We need a security assessment due to some spam uses of our wordpress sites, an assessment of our current configurations and we would like to have an expert available for as needed server maintenance. Please give us a proposal
I need to post a listing on Google Map, ...your physical address, at which I will send Google Map verification. You do not need to worry about your privacy and personal security as post verification, I will keep the address hidden. Google needs a physical address to put my marker on Austalia's map, it does allow to hide the address post verification.
I am trying to secure a new commercial lease for my business. The landlord requested my personal social security number, even though we had provided our company EIN and D&B#. I am not comfortable with this. Is there another preferred option?
I need to post a listing...your physical address, at which I will send Google Map verification. You do not need to worry about your privacy and personal security as post verification, I will keep the address hidden. Google needs a physical address to put my marker on Qatar or in Saudi Arabia's map, it does allow to hide the address post verification.
I need to post a listing on Google Map, for ...physical address, at which I will send Google Map verification. You do not need to worry about your privacy and personal security as post verification, I will keep the address hidden. Google needs a physical address to put my marker on Austalia's map, it does allow to hide the address post verification.
Hello, I'm looking to download all the videos from an Adult Streaming Website. I've attempted to download the videos myself, but can only seem to download a poor / lesser quality. I'm looking for a net-sec professional to investigate the website and see if they can find a solution to mass-download all of the videos in HD (high-quality). Let's chat and see if you are the right...
My company is in need of a fully functional Crypto Exchange for BTC and ERC20 tokens That has the similar working features and functionality as hitbtc but with a unique front end. High-security backend end functionality with 2 FA authorization and Google recaptcha at login. Script must have liquidity API script for instant liquidity. Must have a viewable
...store successfully This Required for mobile electronics item and electronics part you will install template a complete functional site later I will edit create product as per my store but install site with template data Some Kea Feature: • Platform upon developer any platform suitable for you which meet requirement • ***** site should be mobile friendly
...is used for my business email. Last week, the server was compromised by somebody who has been continuously sending SPAM from all 3 domains on this server. I cannot use my own email accounts now because of this unauthorized and illegal activity. I need somebody who knows how to stop the current spamming, restore my unrestricted use of my own email
Looking for a consultant or Expert who can define all phase in design management phases including all required documents / form that are mainly used in physical security project from design perspective only from project inception till final design approval project components are CCTV, Access Control, Data Center, Access point. Working Needed: Software
My parse cloud code for my social network needs to be rewritten for performance and security. Currently, my app has bugs and poor performance because of the cloud code. the problem with this is beforeSaves and Aftersaves are triggered anytime the object is saved or updated Remove before/after saves Make sure cloud code is secure Make sure the back4app
...preferred version 3.35.0 with my Zencart websites has 2 domains but run off the same gateway. Price both options out to me. Satisfaction guaranteed. Here is what Braintree noted: We're reaching out to let you know that we will be updating our root SSL certificate provider for API traffic on October 1, 2018 to align with security standards, and our records
The company is a IT/Cyber Security services company that provides solutions/consultings in Vulnerability assessment, IT infrastructure Security , Penetration Testing etc I have rough idea for the logo in my mind and I'm uploading a rough sketch of it
My parse cloud code for my social network needs to be rewritten for performance and security. Currently, my app has bugs and poor performance because of the cloud code. Remove before/after saves Make sure cloud code is secure Make sure the back4app server doesnt return any error logs Made to scale with thousands of people using at once cloud code
...find out the security measures needed to develop a computer game. The purpose of this project is to explore the security measures needed to develop a computer game that mitigates cyber security risks. It is a small study. I am seeking for 5-10 game designers who meet the participation criteria below: • The ability to explain the security measures needed
I would like an advert created for my business to go in a local magazine. It will need be half an A5 page in size (landscape). We are an IT Consultancy specialising in Cloud and Cyber Security Defense. The company website is here: [login to view URL] I am looking for a creative solution, beyond the following requirement to include the logo
My parse cloud code for my social network needs to be rewritten for performance and security. Currently, my app has bugs and poor performance because of the cloud code. Remove before/after saves Make sure cloud code is secure Make sure the back4app server doesnt return any error logs Made to scale with thousands of people using at once
Please respond only after reading in entirety & understanding the needs. We are responding to a request for a facilities integrated security system & looking for a evangelist technical expert/consultant(s) for help. Need is to help identify the HW, possible software to accomplish this task. The HW should be openly available (PLC use for I/O digital
My company is named BI DataPro Limited and is a management consultancy specialising in Business Intelligence and Data Protection. We need a logo that speaks to our corporate identity and also identifies with our primarily Scottish market. To that end, we are seeking submissions for logo designs that meet the following requirements: - Identifies
...Codevant We are professional hackers, experienced software developers and security engineers and we help startup companies and software house companies finding and fixing security vulnerabilities and flaws in their software and applications, promoting high-level security for their software, for their information and customers. We work strictly with