Aws security whitepaper jobs
I'm in need of a skilled professional to set up a VPN server in China. The primary purpose of this server will be to secure remote work connections. Key Requirements: - Proficient in OpenVPN protocol, as this is the preferred VPN protocol for the server. - Extensive experien...to secure remote work connections. Key Requirements: - Proficient in OpenVPN protocol, as this is the preferred VPN protocol for the server. - Extensive experience with Windows operating system, since the VPN server will be installed on a Windows platform. - Previous experience in setting up VPN servers, particularly in China, would be a significant advantage. - Strong understanding of network security and remote work needs. Please bid if you have the required skills and experience. Looking forward to ...
I'm seeking a seasoned developer to integrate the Antom API into my application for payment processing. I need this to be secure, efficient, and seamless to ensure a smooth transaction experience for users. Key Requirements: - Extensive experience with API integration, specifically with payment gateways. - Prior experience working with Antom would be a significant advantage. - Strong focus on security and efficiency in payment processing. - Excellent problem-solving skills to ensure seamless integration. - Availability for post-integration support and troubleshooting. - Experience in conducting load testing to ensure performance under heavy traffic. Please provide examples of previous API integrations you've undertaken, particularly with payment gateways, in your bid.
My Wordpress site has been compromised multiple times recently. All files were replaced 3 days ago, and today it has been hacked again. I need an expert to investigate the cause and implement a solution to prev...multiple times recently. All files were replaced 3 days ago, and today it has been hacked again. I need an expert to investigate the cause and implement a solution to prevent this from happening again. Additional Information: - Security Plugins: I have security plugins installed on my site. - Hosting: The site is on a shared hosting environment. - Backups: I have regular, weekly backups of the site. Ideal Skills and Experience: - Extensive experience with Wordpress security - Familiarity with shared hosting environments - Proven track record of resolving Wo...
I'm seeking a seasoned web developer to create a fully functioning escrow website, similar to the design found here: https://www.b...backend system where the website owner can manually enter and override amounts in an escrow before payment occurs, in the event of a pending payment. - Integration of multiple payment gateways: PayPal, Stripe, and Bank Transfer. - Enhanced security features for escrow transactions including Two-factor authentication and Transaction encryption. Ideal Skills and Experience: - Proficiency in Custom HTML/CSS/JS. - Extensive experience in developing escrow websites. - Familiarity with integrating various payment gateways. - Knowledge of implementing advanced security measures for online transactions. - Ability to create an intuitive and user-fr...
...comprehensive, secure sign up and login system for my CRM. The system should include: - Authentication through email and password, social media logins (Google, Facebook, LinkedIn) and Two-Factor Authentication for heightened security. - A user role management system with different roles and permissions, enhancing access control and data security. Ideal candidates for this project should have extensive experience with CRM systems, user authentication, and role management. Proficiency in integrating third-party services is crucial, as well as a deep understanding of security protocols to implement Two-Factor Authentication effectively. This project is not just about setting up a login system; it’s about creating a robust, secure, and user-friendly experience...
...enhancements. Final Resubmission (Optional) User can make changes and re-evaluate the CV. Improved CV increases hiring chances. 4. AI Model Selection & Implementation 4.1 Technology Stack NLP Libraries: SpaCy, NLTK, OpenAI GPT, BERT ML Frameworks: TensorFlow, PyTorch, Scikit-Learn Resume Parsing APIs: Affinda, Sovren, or custom-built Database: PostgreSQL / MongoDB for structured resume storage Hosting: AWS Lambda / Google Cloud Functions for scalability 4.2 AI Model Training Training Data: Large datasets of SDET resumes & job descriptions. Fine-Tuning: AI models trained with hiring data to understand recruiter preferences. Evaluation Metrics: Precision, recall, F1-score for accurate resume assessment....
...mentioned above) Analysing competitors and industry reports 2. Key Questions to Answer: Biggest Business Pain Points: What are the top 3 daily challenges in your business? Which manual processes are the most time-consuming and frustrating? AI Awareness & Adoption: Have you used AI tools before? If yes, which ones? What concerns do you have about AI adoption (cost, complexity, accuracy, security, etc.)? Industry-Specific Questions: (customised for each sector) For Coaches: Do you struggle with client management, content creation, or lead generation? For Small Businesses: How do you handle scheduling, quoting, and invoicing? What’s your biggest bottleneck? For Medical Field: How much time is spent on paperwork vs. patient care? For Public Sector: What proc...
...should match the current design, content, and images while leveraging Drupal’s flexibility, security, and performance. A Figma file of the design will be provided for reference. The final Drupal website must be fully responsive, SEO-friendly, and optimized for fast performance with a well-structured content management system. Project Scope & Requirements: ✅ Migrate WordPress Website to Drupal (keeping all content & images intact) ✅ Rebuild the Website in Drupal while maintaining the same design & layout ✅ Ensure Full Responsiveness (mobile, tablet, desktop) ✅ SEO Optimization (meta tags, structured data, fast loading speed) ✅ Drupal Theme Development (custom or existing theme adaptation) ✅ Security Best Practices (Drupal permissions, secure modules) ✅ C...
I have developed an online n...priority. The immediate concern is ensuring data integrity, particularly with foreign key constraints. - Improving website performance and security: Once the bugs are fixed and queries optimized, I would like to improve the overall site performance and bolster its security. - Adding new features: Post bug fixes, I want to implement new features such as user profiles, a search functionality, and the ability for users to upload files. - Enhancing the UI: Finally, I want to improve the user interface for a better user experience. Ideal Skills: - PHP - MySQL - HTML, CSS, JavaScript (optional but preferred) - Experience with website optimization and security Budget & Timeline: Please provide your estimated budget and time frame for ...
...mechanisms, and security considerations. Select and integrate appropriate technologies and tools for monitoring, performance tuning, and system management. Design and implement robust backup and recovery strategies for the Moodle platform and its associated data. Implementation & Configuration: Experience working on Huawei Cloud or equivalent. Configure and manage hundreds of Linux servers in a load-balanced, high-availability cluster. Install, configure, and customize Moodle, including plugins and themes. Optimize the MySQL database backend for performance and scalability. Implement and manage caching solutions (e.g., Redis, Memcached) to improve response times. Integrate authentication and authorization systems (e.g., LDAP, SAML) for secure user access. Implement secur...
...traffic (bandwidth usage, errors, dropped packets) Service uptime Service-Level Metrics Web services (HTTP/HTTPS status, performance, visitor statistics) Database performance (MySQL/MariaDB with query statistics) Mail servers (queues, processed/deferred emails, etc.) DNS server health FTP server status cPanel/DirectAdmin-specific service metrics Backup monitoring (jetbackup) Website monitoring Security and Logs User login activity Firewall rule statistics System and error log monitoring Mail log monitoring Apache log analysis Deliverables A fully configured monitoring setup for both cPanel and DirectAdmin servers. Multiple visually appealing dashboards showcasing key metrics and service health. Comprehensive Items, Triggers, Graphs, Dashboards, and Discovery Rules. Docum...
Project Name Property Maintenance Streamlining App Development Pr...new jobs, quote requests, job updates, and messages. Rating & Review System: Foster trust and transparency by allowing both parties to rate and review each other. Payment Integration (Optional): Integrate with payment gateways for seamless online payments. Development Considerations: Scalability: Design the app architecture to handle a growing user base and increasing data volume. Security: Implement robust security measures to protect user data and ensure secure transactions. User Experience (UX): Prioritize a clean, intuitive, and user-friendly interface for both user groups. Cross-Platform Compatibility: Develop the app for both iOS and Android platforms to maximize reach. The app shoul work on mobil...
I need a high-quality animated logo for my company, Super Center Storage, to use in a trade show video project. The animation should be sleek, professional, and emphasize security and reliability. The final files must be compatible with Adobe Premiere Pro, allowing me to overlay the animation onto my video. Animation Concept (Lock & Shield Reveal) I want an animation based on the following sequence: 1. Shield Outline Reveal – The shield shape should start as a glowing wireframe and gradually solidify. 2. Lock Icon Animation – The lock icon should slide down into place inside the shield with a subtle click sound effect. 3. Company Name & Tagline – The text "Super Center Storage" should fade in smoothly, and possibly the tagline: o "Your Trust...
We are looking for a Data Scientist with expertise in AI and Machine Learning to develop a time series forecasting model. The project involves analyzing historical sales data using AWS and Snowflake. The ideal candidate should have strong skills in Python, machine learning, and predictive analytics. This is a short task estimated to take 1-2 hours. Please apply with your relevant experience and availability!
...& Experience - Strong proficiency in Solana web3, including key concepts like accounts, instructions, and transaction lifecycles - Hands-on experience with Jupiter Swap or other Solana-based swap protocols - Ability to optimize fees and handle priority fee settings for efficient transactions - Comfortable configuring and troubleshooting Solana RPC endpoints Nice to Have - Knowledge of Solana security best practices and strategies for mitigating on-chain vulnerabilities - Familiarity with CI/CD and DevOps processes (automated testing, Docker, Kubernetes) for blockchain applications...
...Requirements** - **Mobile Front-End**: Responsive design (iOS/Android) using Odoo’s web framework or Flutter. - **APIs**: Integration with Ak existing CRM, ERP SAP, and property management systems. - **Security**: GDPR compliance, data encryption, role-based access control (RBAC). - **Localization**: Arabic/English bilingual support, prayer time reminders. --- ### **3. Deliverables** - **Phase 1**: Odoo backend configuration (modules setup, loyalty rules, IoT alerts). - **Phase 2**: Mobile app development (UI/UX design, API integration). - **Phase 3**: Testing (UAT, performance, security audits). - **Final Deliverables**: - Fully functional Odoo backend with custom modules. - Cross-platform mobile app (iOS/Android). - Admin training an...
...an observer file to a WhatsApp number. This endeavor is intended solely for educational purposes. The following requirements must be met: 1. Kali Linux must be accessed via Oracle Virtual Machine. 2. The video should detail the process of creating the file in formats such as PDF, JPG, Excel, Word, or even video or audio files. 3. The file must be recognized as safe by WhatsApp and Android security measures. 4. The file should enable the sender to view the gallery photos and camera of the WhatsApp Android device. 5. The file must not contain any malicious algorithms. To receive payment, you must demonstrate that you have successfully completed the aforementioned steps. 1. The video must be of high quality. If there is no audio narration, a text narration in English must ...
We are looking for an experienced AI instructor to create a comprehensive, structured AI course in Hinglish (Hindi + English). The course will cover beginner to advanced levels, including practical projects, hands-on coding, and industry-relevant case studies. The ideal candidate should be fluent in ...model deployment using Flask, FastAPI, or cloud platforms. Required Skills & Qualifications ✔ Strong AI/ML knowledge (Python, NumPy, Pandas, TensorFlow, PyTorch) ✔ Experience in teaching/training AI/ML concepts (Hinglish preferred) ✔ Ability to explain complex concepts in a simple, engaging manner ✔ Experience in developing AI/ML projects & case studies ✔ Knowledge of AI deployment (Flask, FastAPI, AWS, GCP, Azure) is a plus ✔ Comfortable with video recording & online teac...
I have a website built with Angular and Node using Mongo DB hosted on AWS. I'm looking for a skilled professional to help me fix it and add a small functionality. - The hosting costs are quite high, and I need someone to help me optimize this. Ideal skills and experience for the job include: - Proficiency in Angular and Node - Experience with Mongo DB and AWS - Ability to diagnose and fix website issues - Knowledge of cost optimization for AWS hosting
We are looking for an experienced AI instructor to create a comprehensive, structured AI course in Hinglish (Hindi + English). The course will cover beginner to advanced levels, including practical projects, hands-on coding, and industry-relevant case studies. The ideal candidate should be fluent in...model deployment using Flask, FastAPI, or cloud platforms. Required Skills & Qualifications ✔ Strong AI/ML knowledge (Python, NumPy, Pandas, TensorFlow, PyTorch) ✔ Experience in teaching/training AI/ML concepts (Hinglish preferred) ✔ Ability to explain complex concepts in a simple, engaging manner ✔ Experience in developing AI/ML projects & case studies ✔ Knowledge of AI deployment (Flask, FastAPI, AWS, GCP, Azure) is a plus ✔ Comfortable with video recording & online teac...
I'm looking for an experienced developer to deploy Blockscout Explorer on our fully set up AWS infrastructure using Docker. This explorer needs to be connected to our private Ethereum network for monitoring blockchain activities. Key Responsibilities: - Set up Blockscout on AWS with Docker. - Connect Blockscout to our private Ethereum network. - Resolve CORS issues using NGINX to ensure accessibility. Ideal Skills: - Proficient in Docker, NGINX, AWS, Blockchain and Blockscout. - Prior experience in deploying Blockscout. - Strong problem-solving skills to resolve CORS issues efficiently.
...Implement robust network security measures and firewall configurations. - Perform firmware upgrades for all Ubiquiti devices to ensure they are up-to-date. - Set up and configure VPN access for remote workers. - Configure VLANs for network segmentation and enhanced security. - Set up and configure a guest network with appropriate policies. - Set up automated alerts for network issues and performance metrics. - Provide training to staff on the use and maintenance of network systems. Ideal Skills: - Extensive experience with Ubiquiti devices - Proficiency in configuring Dream Machine Pro - Knowledge in setting up online backups We aim to ensure a seamless setup for our commercial customers. Please, only apply if you possess the necessary skills and experience. Advanced ...
My iPhone appears to be compromised. I need a professional to conduct a thorough check and restore my phone to its original state. Issues I'm Experiencing: - Unusual battery drain - Strange pop-ups or ads - Unauthorized access to accounts - Pictures being shared without proof Steps I've Already Taken: - Device reset - Anti-malware scan - Updated to the latest iOS Freelancers with experience in cybersecurity, particularly with iPhones, would be ideal for this project. Please include in your bid details of your experience with similar projects, and any strategies you would employ to resolve my issue. Thank you.
We are inviting experienced software developers or development teams to create a sophisticated online marketplace platform dedicated to the trading of digital products using advanced security and payment solutions, including cryptocurrencies. Technical Requirements: Programming Language: PHP Database: MySQL Consideration of using a modern framework such as Laravel or Symfony Development to be conducted in phases with payments tied to milestone approvals. Core Features: - Product listing functionalities with categories and advanced search capabilities. - User profiles with rating and review systems to foster a reliable community. - A secure transaction mechanism that includes an escrow system to protect both buyers and sellers. - Automated updates to user wallets when transaction...
I'm in need of a professional and tailored payment platform dedicated to handling one-time transactions. This platform should primarily support Credit/Debit Cards and Bank Transfers. K...need of a professional and tailored payment platform dedicated to handling one-time transactions. This platform should primarily support Credit/Debit Cards and Bank Transfers. Key Requirements: - Design and development of a one-time payment focused platform - Integration with Credit/Debit Cards and Bank Transfers - Basic security measures including SSL/TLS encryption Ideal Skills and Experience: - Expertise in payment platform development - Strong knowledge of security protocols - Prior experience with one-time payment systems The platform should support integration with PayPal fo...
I'm seeking a qualified and Australian certified electrical engineer for the design documentation of a new 4-bedroom home in Coorparoo. This is raise and build underneath project The electrical systems to be designed include a comprehensive setup for the complete home including but not limited lighting, switch board upgrade, power outlets, security system. Key Requirements: - Design documentation for all electrical systems - Collaboration with already finalized architectural plans While there are no specific energy efficiency or sustainability standards to meet, a keen understanding of current trends and technologies in the field would be beneficial. Ideal Skills and Experience: - Australian certified electrical engineer - Experience with residential electrical design - F...
I'm looking for an experienced app developer to create a business-grade app that handles sensitive personal information. The primary focus of the app is on data collection, analytics and reporting, while ensuring top-notch data security measures are in place. Key Requirements: - Design and build an app that can collect, process and analyze personal data - Implement end-to-end encryption for comprehensive data security - Ensure the app is user-friendly and intuitive Ideal Skills: - Proven experience in designing and developing secure apps, particularly for personal data - Strong understanding and expertise in data analytics and reporting features - Skills in implementing end-to-end encryption in a user-friendly manner Please provide examples of similar projects you ha...
Please Sign Up or Login to see details.
I am looking for an expert in web penetration testing. The main goal is to get admin access of my brother's website so that we can see how our website is doing. I am ready to pay hefty amount for it Your task will include: getting admin access of my website The ideal candidate has: - Proven experience in web penetration testing - Strong understanding of security protocols - Excellent problem-solving skills
Please Sign Up or Login to see details.
...static IP assignments, advanced network management, and laptop security configurations. This is a short-term contract role requiring high-level expertise to ensure a 100% success rate within the given timeframe. This role involves pre-configuring systems remotely and then working on-site in Maryland for final setup, validation, and performance testing. Key Responsibilities: ✅ Residential Verizon Fios Configuration: Oversee the installation and activation of a 2 Gbps Verizon Fios Residential Plan with 5 static public IPs. Verify and configure static IP assignments to ensure proper geolocation compliance. ✅ Network Hardware & Configuration: Set up and configure a Edge Ubiquiti router 4 with traffic shaping, firewall rules, and security protocols. Integrate and optimize ...
I'm seeking a skilled animator and content writer to create a 2D animation explaining a blockchain solution. The animation should cover how the solution works, its features and advantages, with a pri...You will need to write the script/content for the animation, making it engaging and easy to understand. - Moderately Detailed Animation: The level of detail in the animation should be moderate. You should be able to balance simplicity with enough detail to effectively explain the blockchain solution. Ideal candidates will have: - A strong understanding of blockchain technology, particularly its security features - Proven experience in 2D animation and content writing - Ability to create moderate-detail animations that are engaging and informative - A portfolio showcasing similar...
I need to deploy two custom PHP applications on my Hostinger hosting. Both of these applications require a database setup. Key Requirements: - Experience in deploying PHP websites - Proficiency in database setup and management - Familiarity with Hostinger hosting services - Familiarity with using SSH access for efficient deployment on Hostinger - Knowledge of implementing security best practices during deployment Please ensure you can handle both the deployment and the necessary database setups before bidding.
...experienced Qlik Sense developer who can create a comprehensive, detailed article on implementing Row and Column Level Security in Qlik Sense. This article is intended for a technically proficient audience already familiar with Qlik Sense, and should maintain a professional, technical tone throughout. Your responsibilities will include: - Developing step-by-step tutorials within the article, following a structured outline I will provide - Creating a .qvf file to demonstrate the examples contained in the article - Providing code snippets that illustrate specific security settings and configurations The ideal candidate will have: - Expertise in Qlik Sense, particularly in its security configurations - Strong technical writing skills with an ability to clarify compl...
...deployment of applications through Jenkins CI/CD pipelines. Key Requirements: - Proven experience with Jenkins, specifically in automating deployment processes. - Should know GITLAB and AWS EKS as we deploy our code on EKS via Octopus*** - Proficient in scripting, with the ability to develop and implement necessary scripts for automation. - Familiarity with CI/CD pipeline setup is a plus, though the primary focus will be on automation and scripting. - Should be willing to work on a remote machine . - Should be available in CST timezone . Atleast 3-5 hours. Skills & Experience: - Extensive knowledge of Jenkins , AWS and its functionalities. - Strong scripting skills, with experience in Shell, Groovy, and Python scripts. - Demonstrated ability to enhance efficiency t...
...documentation in Cybersecurity & Digital Forensics. The work involves writing detailed reports and creating a presentation based on specific requirements. Scope of Work: 1. Technical Review on a Security Vulnerability • Conduct in-depth research on a common vulnerability. • Write a 1500-word technical review with a critical analysis. 2. Security Report & Presentation • Analyze a common web vulnerability and document the findings. • Provide recommendations and mitigati...
...platforms such as AWS, GCP, or Azure to deploy and manage data infrastructure. Collaboration: Work closely with data scientists, analysts, and software engineers to support analytical and machine learning projects. Data Quality & Performance Optimization: Ensure data accuracy, consistency, and security while optimizing performance. Monitoring & Troubleshooting: Identify and resolve data pipeline performance bottlenecks and failures. Required Work Experience: 2+ years of experience in data engineering or a related field. Proven experience developing ETL pipelines and data processing workflows. Hands-on experience with PySpark, Pandas, and SQL. Experience working with big data technologies such as Apache Spark, Hadoop, or Kafka (preferred). Familiarity with cloud da...
...experience with Blazor Server, .NET development, SQL Server, secure coding practices, and DevOps principles. Full source code sharing without any locks or time-based restrictions is mandatory. Project Overview: This application will serve as a platform for sending WhatsApp messages (both template and non-template), managing WhatsApp numbers, and providing API access to third-party applications. Security is paramount, and all development must adhere to best practices. This project will utilize Azure DevOps for project management, version control, and CI/CD. Key Features: * WhatsApp Meta API Integration: * Seamless integration with the WhatsApp Meta API for sending text messages via templates and free-form text. * Ability to send documents from the user's system throu...
I'm looking for an expert to set up a Site-to-Site VPN using Mikrotik and a Contabo VPS. This VPN will need to incorporate Digital Certificates for authentication, as well as basic encryption for security. Ideal Skills & Experience: - Proficient in configuring Mikrotik routers - Experienced with Contabo VPS - Knowledgeable in setting up Site-to-Site VPNs - Familiar with Digital Certificates for authentication - Able to implement basic encryption effectively Your task will be to ensure a seamless connection between the two sites, while maintaining a reliable and secure environment. Please provide examples of similar projects you've completed in the past.
...whether the code can be optimized and used or if a new base needs to be developed. ? Tasks Required ✔️ Review the source code (React Native + React.js). ✔️ Evaluate project structure (architecture, modularization, coding standards). ✔️ Analyze dependencies and packages (check if they are up to date and secure). ✔️ Verify Android and iOS compatibility. ✔️ Identify potential performance or security issues. ✔️ Provide recommendations on what can be used and what needs to be redone. ? Deliverables ✅ Technical report covering: Overall code quality (well-structured or needs improvements?). Strengths and weaknesses of the current project. Suggested improvements and estimated effort to optimize or rebuild necessary parts. Recommendations for further development (Is i...
...✅ User Authentication & Security – Implementing login systems, KYC verification, and account safety measures. ✅ Real-Time Interactions – Leaderboards, live chat, and smooth multiplayer functionalities. ✅ Payment Gateway Integration – Seamless deposits & withdrawals with multiple payment options (fiat & crypto). ✅ Admin Dashboard & Analytics – Manage user accounts, monitor transactions, and track key performance metrics. ✅ Scalability & Performance Optimization – Ensure the platform runs smoothly for thousands of players. • Tech Stack (Preferred, but flexible): • Frontend: React.js, , Vue.js • Backend: Node.js, Django, FastAPI, or Laravel • Database: PostgreSQL, MySQL, MongoDB • WebSockets & Real-Time ...
...expires, the user must be notified and blocked from accessing the application until they renew their subscription. 6️⃣ Communication Between Website and Desktop Application Develop an API or WebService to allow the desktop application to check the user’s license status. If the license is active, grant access to the application. If the license expires, the login must be automatically blocked. 7️⃣ Security Encrypt user data, especially passwords and payment information. Implement protection against attacks like SQL Injection and XSS. Use SSL certificates to secure transactions. Implement a method to prevent multiple simultaneous logins with the same account. 8️⃣ Additional Monetization - Google Ads Set up the website to sell an advertising space for Google Ads. 9️⃣ Extras in ...
...existing bugs. Key Requirements: - Create a robust User Management Module that includes: - Role-based access control to ensure security and proper access levels - User authentication and registration for new staff and patients - Profile management to maintain and update user information - Develop a comprehensive Payment Processing Module that handles: - Billing for patients - Insurance processing - Payment tracking - Build a Reporting and Analytics Module that can: - Generate reports on various hospital metrics - Analyze data for trends and insights - Implement a User Management Module with features like: - Role-based access control to maintain security - User authentication and registration for new staff and patients - Profile management for use...
I'm in need of a seasoned professional with expertise in C, C++, and Python, alongside a deep understanding of telecommunica...specific country. Key Requirements: - Development of SMS and call receiving software designed for both PC and mobile, with the intent for it to be used primarily for research and development purposes. - Strong knowledge and experience with SS7, HTTP/2, and Diameter signalling. - Software compatibility with both Windows and Ubuntu operating systems. - Adherence to recognized telecommunications security practices throughout the development process. The ideal candidate for this project will be a strong developer with extensive experience in telecommunications software development. I'm open to ideas and advice, but I require the most experienced indi...
Make an audit and road map for Internet/Social Media marketing presence and activities. International company that designs, assembles, installs and maintains library automation equipment. Its product line includes user-friendly sorting systems, return stations, self-checkout terminals, 24/7book borrowing kiosks as well as security gates. Using both the time-tested barcode technology and state-of-the-art RFID solutions, it delivers everything needed to automate a library. The company offers customized solutions to provide its customers with the best possible service. Main market is North America and Europe.
...MySQL as the database, Nginx as the web server, and proper configurations to ensure security and performance. The freelancer must ensure that all services are containerized and work seamlessly together. Project Requirements: Docker Setup: Install and configure Docker and Docker Compose on the server. Create a file to manage all containers. MySQL Database: Set up a MySQL container with a persistent volume. Configure a secure root password and a dedicated WordPress database. Optimize database performance settings. Nginx Web Server: Set up an Nginx container as a reverse proxy for WordPress. Configure SSL (Let’s Encrypt or provided SSL certificate). Optimize Nginx settings for security and performance. WordPress Installation: Deploy a WordPress container ...
I'm looking for an expert in SSH who can help me with secure remote access to my Linux/Unix servers. Requirements: - Establish and configure SSH connections for secure remote access - Provide guidance on best practices for SSH security - Troubleshoot any issues with remote connections Ideal Skills and Experience: - Proven experience with SSH and Linux/Unix servers - Strong understanding of network security - Excellent problem-solving skills
...https and that all visitors can access the site without security warnings. The task also includes updating the Really Simple Security WordPress plugin to ensure the website's health and security are up to date. I'm also open to any other plugin if you feel there is a better solution for monitoring the site. - SSL Certificate: I need assistance purchasing an SSL certificate. I'm unsure which type of SSL certificate would be best for my website, so I would appreciate your expert advice on this matter. - Really Simple Security Plugin: The plugin is currently set to standard settings, with no customizations. Your task will be to update the plugin to its latest version and ensure all settings are optimally configured for website security...
I am seeking assistance to expose my local SSH Ubuntu for public access. The main purpose is to facilitate remote management of the system. I have an Ubuntu device, I want to access the terminal, host websites (NGINX) like AWS EC2 or any VPS. Requirements: - Full root access needs to be provided through SSH. - Implementation of key-based authentication for security. Ideal Skills and Experience: - Proficient in Ubuntu and SSH. - Strong knowledge and experience in system security, particularly key-based authentication. - Prior experience in setting up systems for remote management.