I have a Virtual Compute Node on a Public Cloud Server. It uses CentOS+Apache+MySQL. I want get Performance and Security Optimizations to be done for the websites hosted on the server. This will involve setting up cache, checking the existing server configuration and whatever is required.
...5. Experience in working with project teams involved in the delivery and implementation of broad based, complex ICT projects that balance the requirements of performance, security and user functionality/friendliness in a diverse and rapidly changing university environment. To address the selection criteria with the following weights: 10% 10% 50%
It is a VPS Server set up already here you can log into will you test the code
We have a couple php sites, a sql database and several wordpress sites on a cloud virtual private server with Superb.net. We need a security assessment due to some spam uses of our wordpress sites, an assessment of our current configurations and we would like to have an expert available for as needed server maintenance. Please give us a proposal
...Friends I have a lot of Dual CPU servers from 8-Cores to 40-Cores. We are searching for a method or service to earn money from our servers. It can include game servers , hosting , VPS servers or any other ideas . Please send us your offers to cooperating and partnership business. My base offer is 50% for you and 50% of profit for me. I can configure servers
Can you give me an estimate to do user security (user registration, user role based login, user preferences) using Spring MVC and Spring Security? The work should support both Web and Mobile users HTML output as well as json output will be needed
Hello, I'm looking to download all the videos from an Adult Streaming Website. I've attempted to download the videos myself, but can only seem to download a poor / lesser quality. I'm looking for a net-sec professional to investigate the website and see if they can find a solution to mass-download all of the videos in HD (high-quality). Let's chat and see if you are the right...
I'm transferring hosting providers and I have 6 websites on a VPS that I would like transferred to a new VPS. All the website are WordPress. Please include "VPS Transfer" in your response to be considered.
We have been running on AWS and everything has been fine, however we would like to move the website application to a VPS as we are using cpanel for many other sites and would like everything in 1 location. Do not bid unless you have experience with ruby and can troubleshoot if any problems come up after the transfer
...Network. We need the basics for the permanent game website, complete with administrative backend for easy management, secure user accounts, individual Tron game wallets and 2fa security options for the user accounts. The structure and functionality of the website is most important right now. We can add the images, links and information to the website ourselves
Looking for a consultant or Expert who can define all phase in design management phases including all required documents / form that are mainly used in physical security project from design perspective only from project inception till final design approval project components are CCTV, Access Control, Data Center, Access point. Working Needed: Software
WEHAVE AN LARAVEL PROJECT BUILT AT 188.8.131.52. WE NEED TO CONFUGURE LARAVEL TO CONNECT TO MAIL SERVER AND ALSO CONFIGURE MAIL SERVER TO BOUNCE AND RESEND MAILS WITH MX RECORDS POITING TO ZOHO MAIL. CHECK: [login to view URL] WE WANT TO AVOID BLACK LIST. database of brands and models of cars will be provided. you will work with other database specialist and coders in parallel.
1) maeke fresh EC2 installation with w wwwwwwwwwwwwwwwwwonly6?desired subdomain in question 2)make p[anel...backups 3)look carefullllly for exploits 4)make AWS server VPN for home ane network 5?Make solid backuos 6)cpability for sole cpanel instance with only subdomain Verification that VPS works properly. 8) carry on with project as discussed wwwwwww
The company is a IT/Cyber Security services company that provides solutions/consultings in Vulnerability assessment, IT infrastructure Security , Penetration Testing etc I have rough idea for the logo in my mind and I'm uploading a rough sketch of it
...find out the security measures needed to develop a computer game. The purpose of this project is to explore the security measures needed to develop a computer game that mitigates cyber security risks. It is a small study. I am seeking for 5-10 game designers who meet the participation criteria below: • The ability to explain the security measures needed
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?
Please respond only after reading in entirety & understanding the needs. We are responding to a request for a facilities integrated security system & looking for a evangelist technical expert/consultant(s) for help. Need is to help identify the HW, possible software to accomplish this task. The HW should be openly available (PLC use for I/O digital
...system to edit this website them self. We need a simple cms system with functions ill provide you a similar website so you can see what we want exactly Your skills: VPS SERVER PHP Script CMS and maybe others we don't know about yet. Im looking forward to get your bids for our project and looking forward to work together this project
First of all the price is open to negotiation, I prefer quality content over a mediocre price. I'm looking for someone to build a VPS control panel which will include a billing module and a ticket module, it should be able to integrate with the main site. The entire website must be built using reactive elements. The backend infrastructure is QEMU/KVM
Need an expert from the filed assiting with securities of CSS, CTR mode, CBC mode, ECB mode, AES-128, hash function with 256-bit
...network is with patience and mindset with ideas out of the box. With experience in system penetration testing , easily with ideas and experimental ways, can be proven that security is a must. you must know how to use a xss to make a shell! you are good at it ,because it is a difficult project. PS： I am looking for a google hall of fame to do it!!
...on Linux , Apache/Nginx Need extensive experience AWS tools like Autoscaling, route53, ec2 , lambda, s3, beanstalk , Mongo Atlas AWS Management tools Security Audit requirement and Using AWS Security tools , SSL and securing the network checklist Basic knowledge about XRay , Pinpoint , SES, SNS, SQS Setting up an Infrastructure Monitoring System and
Hi I need someone who is diligent with Voip Asterisk. We have a Voip freepbx setup on 1.8 For some reason Iptables is blocking our Phone lines. I disable iptables service. All is working 30 min later it automaticaly reenabled iptables no more Phone. So as the freepbx is old. I want to reinstall a new server. We have 2 tenants 5 trunks and 11 phones Who can assist? All is Centos Linux