Linux server plesk spam security jobber
Hei! Jeg trenger noen som er erfarne med domeneshop og kan binde opp 2 hjemmesider jeg har. Ta kontakt for meg info.
Hei Jeg trenger en som kan overføre et nettsted til en annen server for oss. Flere detaljer blir gitt til budvinner
Hei. Jeg trenger aktiv markedsføring i sosiale medier for en lokal bedrift ved Oslo; hovedstaden i Norge. Det ønskes at dette gjøres uten "spam" og at markedsføringen ikke synes
SQL server database administrator guru as a consultant
Server Config for Arnold..Server Config for Arnold..Server Config for Arnold..Server Config for Arnold..Server Config for Arnold..
Læse QR koder og sende QR-koden,dato,gps-lokation til en server via webservice
Server scrapper bott for data ..........
server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration server migration
Legge til meny navigasjon på i forskjellige kategorier og eventuelt noe tweaking på nettsiden.
I'm seeking skilled developers for ongoing RISC-V projects. Key requirements include: - Proficiency in Assembly, Verilog, and C - Strong background in RISC-V code development and programming - Understanding of RISC-V hardware - Familiarity with Linux development is a plus This is a unique opportunity for repeat contract development on long-term projects. I welcome all applicants and promise to respond to everyone. Connect with me to discuss project specifics.
I'm looking for an ethical hacker with expertise in social engineering, specifically phishing attacks. Your role will be to assess our vulnerability to these types of attacks and propose effective countermeasures. Ideal Skills: - Proven experience in ethical hacking, particularly social engineering - Expertise in identifying and mitigating phishing attacks - Strong comm...countermeasures. Ideal Skills: - Proven experience in ethical hacking, particularly social engineering - Expertise in identifying and mitigating phishing attacks - Strong communication skills for reporting and advising A thorough understanding of various phishing techniques is crucial. We need someone who can realistically simulate these attacks and provide us with a detailed assessment of our current securit...
Storecheckers are a Market Research and Mystery Shopping company. We undertake worldwide mystery shopping visits. This visit is to an Examination Centre, checking that the security standards are being met, in order to ensure that there is no possibility of cheating at any stage. The exam content and result are irrelevant to this exercise. You will need to be observant and discreet in order to undertake this visit. You need to remain in the test centre and complete the exam as if you were a genuine entrant. We have full guidance notes to assist you, which give a very clear background of the environment. The actions that you need to take are actions that test takers attempt, so do not be worried about carrying them out. After the visit there is a report to complete, it is not lengt...
I have a medium resolution video from a security camera that I need help with. The video is in MP4 format and I need assistance in extracting a car's license plate from it. Ideal freelancers for this project should have: - Proficient video editing and enhancement skills - Experience in license plate recognition - Access to or knowledge of advanced video enhancement tools
I need help configuring my Ubuntu 22.04 machine to randomize outgoing requests across different IP addresses. The machine currently has a /27 subnet, but I plan to add more IPs over time. Key Re...to add more IPs over time. Key Requirements: - Implementing a round-robin IP rotation strategy to distribute outgoing requests evenly across the available IP addresses. - Creating a robust and scalable solution that can accommodate additional IPs in the future. - Assisting with the setup of necessary tools or scripts for IP management. Ideal Skills: - Extensive experience with Ubuntu 22.04 and Linux networking. - Proficient in IP management and rotation strategies. - Ability to create custom scripts for automation. - Strong problem-solving skills to ensure the solution is robust and fut...
I'm looking for an experienced professional to upgrade my ASPVS250 from Server 2012 to Server 2025. Key Requirements: - Upgrade the server, which primarily functions as a Remote Desktop. - Migrate totally critical applications from the existing server to the new one. - Ensure a smooth transition with minimal downtime. Ideal Skills: - Extensive experience with Server 2012 and Server 2025. - Strong knowledge of Remote Desktop Services, particularly the Enterprise version. - Proven track record in critical application migration. Please get in touch with your relevant experience and proposals.
I'm looking for a professional to help me create a TRC20 USDT token primarily for payment transactions. Key Requirements: - Deep understanding and experience in TRC20 USDT token creation - Ability to discuss and implement potential additional features (like Smart contract integration, Custom token features, Security audit) based on our conversations - Excellent communication skills to discuss details Please message me to discuss this project further.
...• HIPAA Folder Protection • Some employees need HIPAA compliance for certain folders in SharePoint; ensure access is locked down and logs are recorded appropriately. 2. Personal Devices (BYOD) • Limited Company Data Access • We do not plan to enforce full MDM or MAM policies, but we do want to ensure that when employees access company files or emails, our data remains secure. • App/Email Security • Configure policies (e.g., Conditional Access, if feasible) to protect corporate data in Microsoft 365. • Ensure employees can’t inadvertently sync or download sensitive files (like the HIPAA folder) to unapproved locations. 3. Microsoft Defender & Intune Configuration • Advanced Threat Protection • Enable real-time threat...
I'm in need of a Java developer with a deep interest in information security, specifically in data encryption. The project involves sovling the college assignment. Ideal Skills and Experience: - Experience in Java programming - Strong knowledge and interest in information security - Experience with data encryption techniques - Problem-solving skills and creativity in approaching challenges
I'm looking for a seasoned Laravel developer to upgrade my Foodomaa application from PHP 7.3 to the latest version. The upgrade should include the introduction of new features and security enhancements to improve the application's overall performance and safety. Key Responsibilities: - Upgrade Foodomaa to the latest PHP version. - Implement new features during the upgrade. - Enhance the application's security during the upgrade. Ideal Skills: - Strong expertise in Laravel and PHP. - Experience in upgrading PHP applications. - Knowledge in implementing new features and security enhancements. Please note that the application does not have any customizations or third-party integrations. I will handle all the testing post-upgrade.
Storecheckers are a Market Research and Mystery Shopping company. We undertake worldwide mystery shopping visits. This visit is to an Examination Centre, checking that the security standards are being met, in order to ensure that there is no possibility of cheating at any stage. The exam content and result are irrelevant to this exercise. You will need to be observant and discreet in order to undertake this visit. You need to remain in the test centre and complete the exam as if you were a genuine entrant. We have full guidance notes to assist you, which give a very clear background of the environment. The actions that you need to take are actions that test takers attempt, so do not be worried about carrying them out. After the visit there is a report to complete, it is not lengt...
Storecheckers are a Market Research and Mystery Shopping company. We undertake worldwide mystery shopping visits. This visit is to an Examination Centre, checking that the security standards are being met, in order to ensure that there is no possibility of cheating at any stage. The exam content and result are irrelevant to this exercise. You will need to be observant and discreet in order to undertake this visit. You need to remain in the test centre and complete the exam as if you were a genuine entrant. We have full guidance notes to assist you, which give a very clear background of the environment. The actions that you need to take are actions that test takers attempt, so do not be worried about carrying them out. After the visit there is a report to complete, it is not lengt...
Storecheckers are a Market Research and Mystery Shopping company. We undertake worldwide mystery shopping visits. This visit is to an Examination Centre, checking that the security standards are being met, in order to ensure that there is no possibility of cheating at any stage. The exam content and result are irrelevant to this exercise. You will need to be observant and discreet in order to undertake this visit. You need to remain in the test centre and complete the exam as if you were a genuine entrant. We have full guidance notes to assist you, which give a very clear background of the environment. The actions that you need to take are actions that test takers attempt, so do not be worried about carrying them out. After the visit there is a report to complete, it is not lengt...
I'm seeking a cybersecurity expert with a profound understanding of all aspects of cybersecurity. My primary concern revolves around vulnerability assessment, but I need an all-encompassing approach to ensure safety across the board. Ideal Skills and Experience: - E...cybersecurity. My primary concern revolves around vulnerability assessment, but I need an all-encompassing approach to ensure safety across the board. Ideal Skills and Experience: - Extensive experience in cybersecurity, particularly in vulnerability assessment - Knowledge of network, application, and data security - Proficiency in implementing comprehensive security measures across various platforms (web, mobile, desktop) - Excellent skills in threat detection and response - Familiarity with securit...
I'm seeking a skilled professional to conduct a Gray Box penetration test on my web-based insurance policy administration system. This is a critical part of our security protocol, focusing specifically on user authentication and transaction processing vulnerabilities. Key areas of focus: - User Authentication: We need to ensure that our system can withstand potential attacks targeting user login and access control measures. - Transaction Processing: This area needs to be scrutinized for possible threats that could compromise the integrity and security of transactions. The penetration test should adhere to the OWASP compliance standards. Your experience with and understanding of these benchmarks will be key in identifying and mitigating potential risks. Ideal skills fo...
I'm looking for an expert developer to create a scalable and secure e-commerce website for our products, using ReactJS / NextJS (not CMS platforms). Key Features: - Some product pages will require custom functionalities. For instance, we want to allow customers to upload their photos and choose their frames for printing. - U...custom product functionalities. - Skills in creating user-friendly interfaces for product customization. - A great experience in payment integration and be able to address the possible errors by his/her experience Please note, not all product pages will need custom functionalities, but those that do should be seamlessly integrated into the overall site. The site must prioritise scalability and security, accommodating our growth and safeguarding our c...
I am seeking expert assistance for the deployment of an ERC-20 Token smart contract on the Ethereum platform. Key Requirements: - Proficient in smart ...assistance for the deployment of an ERC-20 Token smart contract on the Ethereum platform. Key Requirements: - Proficient in smart contract development and deployment. - Deep understanding of ERC-20 standards. - Prior experience with Ethereum platform. - Ability to ensure the token has all necessary functionalities (Minting, Burning, Pausable Transfers). - Familiarity with best practices for security and efficiency in smart contract development. - Ability to provide post-deployment support and troubleshooting. Please note, I already have the token smart contract ready for deployment I need assistance with that since I'm fac...
I am looking for a seasoned IT Infrastructure Solution Architect to assist in the completion of our project. This role requires hands-on expertise and a deep understanding of IT infrastructure architect solutions. Key Responsibilities: - Design and implement effective IT infrastructure solutions - Oversee and enhance network security - Implement comprehensive cybersecurity measures - Leverage cloud technologies for optimal infrastructure performance Skills & Experience Required: - Extensive knowledge of IT hardware and software - Proven experience in network architecture - Expertise in cybersecurity and cloud technologies - Excellent documentation and reporting skills The ideal candidate will be responsible for creating detailed reports and documents based on their experie...
Vennligst Registrer deg eller Logg inn for å se detaljer.
...low-connectivity regions. Store data locally and synchronize when online. Field Features: Capture photos, videos, and geotags. Auto-fill forms using GPS metadata for asset locations. D. Dashboard Customizable Views: KPIs for system performance (e.g., uptime, water flow rates). Predictive analytics for resource allocation. Alert System: Real-time notifications for system anomalies or urgent repairs. 4. Security Design Authentication: Multi-factor authentication (MFA) for administrators. OAuth2 for secure API access. Encryption: Data encryption at rest (AES-256) and in transit (TLS 1.3). Auditing and Logging: Maintain an audit trail for all user actions. Automated log monitoring to detect suspicious activities. 5. Integration Plan External Systems: API gateways to interface with na...
I need a skilled professional to set up a...VirtualBox 7.14 for a test environment. Key Requirements: - Host System: Windows 11 powered by Intel i5 12th Gen with 64 GB RAM - Install Oracle Linux Server 8.8 on both cluster nodes, assigning 12 GB RAM to each - Configuration of ASM with specified disk groups: - OCR: 3 GB - DATA: 30 GB - RECO 20 GB - Installation of Oracle 19c Grid software - DNS setup can be ignored - Use of Automatic Storage Management (ASM) for disk groups I have the Oracle Linux Server 8.8 ISO ready, and no special network settings are needed for the cluster nodes. The ideal freelancer for this project should have extensive experience with Oracle databases, VirtualBox, and Linux systems. Please be prepared to demonstrate your p...
...2) Collaborate with front-end developers and designers to ensure efficient rendering of content and user-friendly interfaces 3) Troubleshoot issues and optimize AEM performance for better scalability and user experience 4) Integrate AEM with third-party tools, CRMs, and databases to enhance functionality 5) Provide guidance and expertise on AEM best practices, including workflow management, security, and scalability 6) Participate in requirement analysis, project planning, and status updates 7) Ensure high-quality deliverables by performing unit testing, integration testing, and debugging Technical Qualifications: 1) Experience working with Adobe Experience Manager (AEM) including AEM Sites and AEM Assets. 2) Experience with content repositories (JCR) and tools like Apach...
...convert prospects into clients. Responsibilities Analyze Current Campaign: Evaluate existing email campaigns, focusing on subject lines, content, personalization, and targeting strategies. Improve Email Copy: Revise templates to resonate with USA law firms, ensuring content is relevant and personalized. Increase Deliverability: Implement best practices to enhance inbox placement and avoid spam filters. A/B Testing: Conduct tests on subject lines, email bodies, and calls-to-action to identify the most effective variations. Follow-Up Sequences: Develop automated follow-up sequences to enhance response rates over time. Campaign Tracking & Reporting: Establish tracking for open rates, click-through rates, and replies, providing regular performance updates. Ongoing ...
I am seeking a seasoned SQL Server Administrator to assist with database maintenance tasks, specifically focusing on backup and restoration. Your primary responsibilities will include: - Performing a one-time backup and restore of the database. Ideal candidates should have extensive experience in SQL Server management and database maintenance. Excellent problem-solving skills and attention to detail are essential.
... The homepage survey should be a multi-step form with conditional logic, if possible. Captured data should be stored securely, ideally integrated with a CRM or at least easily exportable. - Speed & Performance Optimize for fast load times. Follow best practices for images, code, and server configurations. - SEO-Friendly Use SEO best practices (meta titles, descriptions, proper heading structure, image alt tags, etc.). We aim to rank for relevant keywords in accounting, HR, and advisory services. - Security & Compliance SSL certificate for secure data transmission. GDPR compliance for form submissions and data handling. - Analytics & Tracking Integration with Google Analytics (or other analytics platforms) to track visitor behavior and conversions. 8. Conte...
I need somebody with server management skills to help me troubleshoot my app running on a VPS with Plesk. The app is built on Rails 8 and is currently displaying an nginx 403 error. I've checked the server logs and haven't found anything unusual, so it's likely a configuration issue or permissions error that's causing the 403 error page to display. Key Responsibilities: - Diagnose the cause of the nginx 403 error - Configure server settings as needed for Rails 8 app - Optimize server settings for performance and security - Provide a brief report on the issue and the resolution Ideal Skills and Experience: - Strong knowledge of server environments, particularly VPS and Plesk - Experience troubleshooting nginx erro...
I need an expert in data security, privacy, and blockchain to work on a project involving secure proximity activations using smart devices. Overview: - The system should be activated by a SmartPhone entering a location. - The system should open gates, turn on lights, and sound alarms upon activation. - Utilization of Bluetooth Low Energy (BLE) Secure Connection for security. Skills and Experience Required: - Extensive knowledge in data security and privacy. - Proficient in integrating with smart devices. - Experience working with Bluetooth Low Energy (BLE) Secure Connection. - Familiarity with using MPU (Raspberry) devices and Docker Container-based System. - A new advertisement system should be adopted. (Or alternatively - MCU (ESP32) devices are considered leveragi...
Hi There, I have been building Shopify Stores for more than 10 years and have great skills in HTML, CSS, JavaScript, Liquid, PHP, and MySQL, so I can create a full SEO-friendly, fast-loading, all browsers and devices compatible, and interactive Shopify store. I can provide well-managed HTML markups with fully functional responsive design ensuring the maximum level of performance and security. I can also focus on SEO Semantic Coding, W3C Valid HTML5/CSS3 codes, Browser Compatibility, and fully optimized codes. If you provide Shopify information then I can immediately start your project and can show you the progress soon. Thank you
I'm looking for a skilled Laravel developer to help enhance the backend of my application, specifically focusing on user authentication. Key Requirements: - Expertise in Laravel for backend development. - Experience with implementing and improving u... specifically focusing on user authentication. Key Requirements: - Expertise in Laravel for backend development. - Experience with implementing and improving user authentication systems. - Knowledge of various authentication methods (email/password, social media login, etc.), even though the specific methods are not pre-defined for this project. - Ability to provide suggestions for enhancing security and user convenience. Please provide examples of previous backend projects you have worked on, particularly those involving user ...
...Performance: Assess the speed and efficiency under various conditions. - Security: Identify any potential vulnerabilities. I need the testing to be conducted from the perspective of: - Admin: Tests should simulate actions and interactions of a system administrator. - Manager: Tests should reflect the experience and tasks of a managerial user. Additionally, the testing should encompass various database operations, including: - CRUD operations: Verify Create, Read, Update, Delete functionalities. - Code: Testing should extend to the software's code base for any potential issues. The ideal candidate will have extensive experience with .NET and SQL, as well as a strong background in software testing and database management. Security and performance testing experience...
I'm looking for an ethical hacker with expertise in social engineering, specifically phishing attacks. Your role will be to assess our vulnerability to these types of attacks and propose effective countermeasures. Ideal Skills: - Proven experience in ethical hacking, particularly social engineering - Expertise in identifying and mitigating phishing attacks - Strong comm...countermeasures. Ideal Skills: - Proven experience in ethical hacking, particularly social engineering - Expertise in identifying and mitigating phishing attacks - Strong communication skills for reporting and advising A thorough understanding of various phishing techniques is crucial. We need someone who can realistically simulate these attacks and provide us with a detailed assessment of our current securit...
I'm seeking a skilled developer to implement login and sign up features for my website using Node.js and Angular. Key Requirements: - Authentication via email and password. - Integration with Google OAuth for alternate sign in option. - Setup of email verification process for added security. Ideal Skills: - Proficiency in Node.js and Angular. - Experience with implementing email/password authentication and Google OAuth. - Knowledge in setting up email verification systems.
...rigorous and competent data entry professional to ensure the entry, processing and management of data in our systems. The ideal candidate will be proficient in office tools such as Word, Excel, Google Sheets, and will also have skills in data security and the use of Adobe InDesign. Responsibilities: - Enter, verify and update data accurately in databases or documents. - Organize and structure files and databases for optimal accessibility. - Use tools such as Microsoft Word, Excel, and Google Sheets for data management. - Respect data security protocols to guarantee the confidentiality and integrity of information. - Create or modify graphic documents and media using Adobe InDesign. - Produce detailed reports and share them with relevant teams. ...
I'm looking for an expert developer to create a scalable and secure e-commerce website for our products, using ReactJS / NextJS (not CMS platforms). Key Features: - Some product pages will require custom functionalities. For instance, we want to allow customers to upload their photos and choose their frames for printing. - U...custom product functionalities. - Skills in creating user-friendly interfaces for product customization. - A great experience in payment integration and be able to address the possible errors by his/her experience Please note, not all product pages will need custom functionalities, but those that do should be seamlessly integrated into the overall site. The site must prioritise scalability and security, accommodating our growth and safeguarding our c...
...Required Skills & Experience: 3+ years of React Native development experience Proven track record of publishing apps to both Apple App Store and Google Play Store Experience using AI coding tools (GitHub Copilot, Claude, ChatGPT, etc.) Strong understanding of mobile UI/UX principles Proficiency in JavaScript/TypeScript Experience with state management (Redux, Context API) Knowledge of mobile app security best practices Experience with local data storage and cloud synchronization Familiarity with push notifications and background processes Technical Requirements: React Native Native iOS and Android development understanding REST APIs Git version control Mobile app testing frameworks CI/CD for mobile applications Cross-platform development Mobile app performance optimization...
...Display completed jobs in a list. ■ Required Skills Proven experience with WordPress development Experience with Google Translate/DeepL API integration (including free versions) Proficiency in PHP, JavaScript, HTML, and CSS Experience with Git or other version control systems Preferred Skills: Knowledge and experience in improving translation accuracy (e.g., glossary management) Expertise in security best practices Familiarity with Agile development methodologies ■ Scope of Work Integration with HIVEPRESS Modify HIVEPRESS to enable seamless integration with free translation APIs such as Google Translate and DeepL Free. API Implementation Implement and configure the free versions of the translation APIs to handle multilingual content. Cost Management Ensure that all ...
We are seeking an experienced developer or team to implement a robust licensin...managing licenses, including issuing, revoking, and monitoring usage. Deliverables: Licensing System Design: A plan outlining the licensing mechanism, security measures, and user binding method. Software Integration: Integrate the licensing system into our existing software. Admin Panel: A management interface for tracking and controlling licenses. Documentation: Clear documentation on licensing workflows, integration, and maintenance. Requirements: Experience in software licensing and security. Familiarity with MAC address binding or alternative user/machine-specific licensing methods. Ability to ensure data security and prevent unauthorized Licensing Impl...
...handling of data and incorporating encryption/decryption functionalities as needed. **Test Environment Setup & Attack Simulation** - Create simulation environments that mimic realistic user behavior and abnormal click scenarios (including high-frequency clicks, IP switching, cookie clearing, etc.) to validate the effectiveness of the system's protective measures. - Utilize automated scripts and security testing tools to conduct exercises, assessing the system’s ability to detect malicious traffic and abnormal behavior. **Data Analysis & Issue Diagnosis** - Analyze testing logs and monitoring data in detail, using statistical and data mining techniques to evaluate the accuracy of the anomaly detection models and rules. - Quickly diagnose issues by applying ...
...Stories and posts. X (Twitter) Integration: Retrieve tweet analytics (likes, retweets, impressions). Access profile and follower data. Requirements: Experience with API integration for social media platforms. Familiarity with OAuth 2.0 for user authentication. Proficiency in backend development (e.g., Node.js, Python, PHP, or similar). Understanding of data security and compliance with platform policies. Ability to handle rate limits and optimize API calls. Deliverables: Fully functional integration with the above-mentioned platforms. Secure authentication flow for users (OAuth 2.0). API endpoints in our app for fetching metrics and insights. Documentation of the integration process. Testing and debugging to ensure ...
...should be designed to reflect the newly developed brand style and serve as an intuitive entry point for visitors, with clear navigation and responsive design across all devices. Phase 2: Login Page Design & User Authentication Develop a functional and secure Login Page with a user-friendly interface that maintains visual consistency with the overall branding. Attention to user experience (UX) and security best practices (e.g., password recovery, encryption) is crucial for this phase. Phase 3: Details Page Design & Content Structuring Design a highly functional Details Page, optimized for both desktop and mobile experiences. The page should include well-organized content layouts, clear call-to-actions, and technical considerations for scalability and SEO optimization. P...