We ha...sql database and several wordpress sites on a cloud virtual private server with Superb.net. We need a security assessment due to some spam uses of our wordpress sites, an assessment of our current configurations and we would like to have an expert available for as needed server maintenance. Please give us a proposal if you are interested.
We need to create a one page application without any frontend interface which should communicate with PHP code and take the location of pdf file from PHP function and should read barcode(1D barcode), financial year, quarter and deductor/collector name from the PDF file and should save the values in respective fields in MySQL database. This project also needs to be hosted on the same server where t...
I want to design my COMPANY PROFILE with below requirements - 16 Slides - Contents & ideal images (low resolution) are Ready. - My ideal images are in low Resolution & need to PURCHASE from Shutter Stock in High Resolution. - Every Slide IMAGES to be designed in High Resolution - Project Completion time: TOP URGENT & ASAP
...located in the Gold Coast region of Australia. The specific information I would like is: - Business Name - Principal Contact/Business Owner Name - Email Address - Phone Number - Website address (if available) I would like the information in a spreadsheet format. I expect the information would be available on the internet through website searches etc
Hello, I'm looking to download all the videos from an Adult Streaming Website. I've attempted to download the videos myself, but can only seem to download a poor / lesser quality. I'm looking for a net-sec professional to investigate the website and see if they can find a solution to mass-download all of the videos in HD (high-quality). Let's chat and see if you are the right...
...for a new Logo and a Company profile(power-point or Acrobat Reader)for our Call Center Company. The logo that we are looking for should be a name based logo which should look elegant and reflect a touch of the call center industry. The name of our Company is SYNOTRIX GLOBAL PVT LTD. We also want you to make a Company profile in power point or Acrobat
...administrative backend for easy management, secure user accounts, individual Tron game wallets and 2fa security options for the user accounts. The structure and functionality of the website is most important right now. We can add the images, links and information to the website ourselves. Your job will be to make the game website network function flawlessly
ABOUT ADITYA TRANSPORT Aditya transport started in 2010 servicing the Melbourne metropolitan area. Over the years, our client base has asked Aditya transport to complete more and more services including. As one of the most trusted transport company, you can always rely on Aditya transport OUR SERVICES Aditya is Australasia’s premier Metropolitan Transport & Logistics provider. We special...
Template is completed and info text and pics ready to add in. Rough client pics showing home page and 2 types of inner pages. html5 responsive site. We call one 'switch' wher (see switch pdf. % headings on side switches info on page, just a single page with info on.. plus 'inner' page that links from home page. First 4 pics show home page headers. Next shows headers and below ...
Looking for a consultant or Expert who can define all phase in design management phases including all required documents / form that are mainly used in physical security project from design perspective only from project inception till final design approval project components are CCTV, Access Control, Data Center, Access point. Working Needed: Software
...company profile online and I need this template converted into a company profile for my website. I have created the content myself, I just need somebody who can take the content, take the template and transform it into something for my website that suits my concept. Here is the link to the template >> [login to view URL]
...find out the security measures needed to develop a computer game. The purpose of this project is to explore the security measures needed to develop a computer game that mitigates cyber security risks. It is a small study. I am seeking for 5-10 game designers who meet the participation criteria below: • The ability to explain the security measures needed
Scrape product information from [login to view URL] and input into CSV file with correct format.
Collect job recruitment of 10 company per a country. The target countries are 10 countries from Europe and 10 countries from East Asia. In total, Collect job recruitment of 200 company.
...designer to continue the work and make some changes to the design so far which is 90% complete. we are in the final editing stage, and wanted to add/remove/replace some information to the existing packaging and edit the logo name from Co. to Est. (and do the same on the business cards, letterheads) Arabic will be added/incorporated so the designer
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?
Please respond only after reading in entirety & understanding the needs. We are responding to a request for a facilities integrated security system & looking for a evangelist technical expert/consultant(s) for help. Need is to help identify the HW, possible software to accomplish this task. The HW should be openly available (PLC use for I/O digital
Php login with MD5 , profile view with image connect with server (Removed by Freelancer.com Admin)
I have a data base manged by a system, I want to create some queries to get information from differents tables, in the same queries do some operations and IFs conditions, then download the data in excel, and create a dashboard to manage a special replenishment of requirements as a Distribution Center.
Need an expert from the filed assiting with securities of CSS, CTR mode, CBC mode, ECB mode, AES-128, hash function with 256-bit
...network is with patience and mindset with ideas out of the box. With experience in system penetration testing , easily with ideas and experimental ways, can be proven that security is a must. you must know how to use a xss to make a shell! you are good at it ,because it is a difficult project. PS： I am looking for a google hall of fame to do it!!
...on Linux , Apache/Nginx Need extensive experience AWS tools like Autoscaling, route53, ec2 , lambda, s3, beanstalk , Mongo Atlas AWS Management tools Security Audit requirement and Using AWS Security tools , SSL and securing the network checklist Basic knowledge about XRay , Pinpoint , SES, SNS, SQS Setting up an Infrastructure Monitoring System and
...the project, and raise the price later Please understand the project carefully before bidding bc price change won't be allow REQUEST -> Webscrape using python ALL product information for the link below: [login to view URL] Extract ALL DATA must be captured in key-value pair, creating all the necessary keys to reflect the attributes
...a professional Delphi programmer that has years of experience with the language and also has allot of experience with SMTP/Bulk mailing applications and all the SMTP email security protocols such as SSL/TLS. Programmer must know how to do multi threading and also know how direct mailing works (sending emails through DNS without any SMTP). Must also be
I need some graphic design that shows the most important technology innovations of the last 35 years on a time line. Example would be internet, Iphone, google search.