Securityemplois
We are developing CVeria, a SaaS aimed at students and recent graduates to optimize their careers using AI. We are looking for an expert Bubble freelancer to build the complet...analysis with scoring and recommendations CV / job offer matching with a compatibility percentage A simple personality test providing career-related results OpenAI integration for all AI-powered features Responsive design aligned with our branding: deep blue, light blue, pastel green, blue-green gradients, light background The freelancer must deliver clean, well-documented workflows, ensure data security, and work with milestone-based deliveries with payment upon validation. Proven experience with Bubble and AI integrations is mandatory. The MVP must be functional, clear, fast, and extensible for future...
I want a brand-new website focused on hacking-related information and the services I provide. The build comes first: a clean, responsive layout, an articles section that is easy to expand, iron-clad security, and effortless content management (I’m leaning toward WordPress with a hard-ening plugin stack, but I’m open to other CMS ideas if you can justify them). Once the site is live, the real goal begins—steady, sustainable traffic and a first-page Google ranking for the core hacking keywords we’ll agree on together. That means: thorough keyword research, airtight on-page SEO (metadata, schema, site speed, mobile friendliness), a content schedule of service-oriented articles, authoritative link building, and transparent analytics tracking with Google Analyt...
...a fix, or (b) a documented justification confirming it is intentional and does not harm SEO goals, with an action plan if improvement is possible. ⸻ Measurable goals (KPIs) • Resolve and minimize all Google Search Console errors/warnings: Indexing/Coverage, Sitemaps, Pages, Core Web Vitals, Page Experience, Structured Data/Rich Results (including Event/Event schema issues), Manual Actions, Security Issues, Crawl issues, etc. • Improve Core Web Vitals (mobile-first): LCP / INP / CLS, plus server stability (TTFB, 4xx/5xx errors). • Improve crawlability and indexation (only valuable pages indexed; remove/exclude low-value or problematic pages). • Increase organic impressions, clicks, CTR, and improve rankings for news/updates pages. • Improve “p...
Full Stack De...Portfolio: 2-3 React Native apps 2. Approach: How you'll deliver in 20 days 3. Timeline: Confirm availability including holidays 4. Questions: Any clarifications needed ══════════════════════════════════════════════════════════════ FUTURE OPPORTUNITY Success may lead to: maintenance contract, new features, possible full-time position. ══════════════════════════════════════════════════════════════ SECURITY - Client owns all code - NDA before repository access - Verifiable deliverables before payment READY? Apply with portfolio.
...→ Reboot Install Plex (or Jellyfin): - Mount: /mnt/tank/media - Enable: Hardware transcoding (NVENC) - 4K HEVC 10bit support 8. VIRTUAL MACHINES (OPTIONAL) Enable KVM Use pool “nvme_vm” for VM disks Create Windows, Debian, Ubuntu VMs as needed 9. SNAPSHOTS & BACKUP Enable automatic ZFS snapshots: - Frequency: hourly or daily - Retention: 1–2 weeks Enable replication or external USB backup 10. SECURITY HARDENING - Enable 2FA - Disable root SSH login - Use SSH keys - Block WAN access in firewall - Local network access only 11. CLOUDFLARE SECURE ACCESS (NO OPEN PORTS) Requirements: - Domain name (ANY domain) - Cloudflare account (free) A. Add domain to Cloudflare B. Open Cloudflare → Zero Trust → Tunnels → Create Tunnel C. Install cloudflare...
...prioritize security, data privacy, and usability, and comply with international standards for data protection (GDPR-level). It should be simple, fast, and resilient to potential cyberattacks or censorship attempts. --- Key Objectives 1. Create a secure, encrypted platform (HTTPS, HSTS, CSP) with strong backend protection. 2. Enable anonymous submissions and encrypted file uploads for whistleblowers. 3. Provide a content management system (CMS) with role-based access control and audit logs. 4. Build a responsive RTL/LTR design (Arabic right-to-left compatibility). 5. Include archive pages for reports, documents, and public content. 6. Implement data backup, monitoring, and privacy policies for long-term reliability. --- Core Features and Requirements 1. Secu...
Build a simple AI plush generator website (image → plush concept) + email delivery Overview We want a lightweight web app where a user drags-and-drops a photo or logo, enters their email, and receives an AI-generated plush concept image by email. We already have a working prompt (in ChatGPT) and need a developer to implement the end-to-en...short description of your approach (stack, AI API of choice, email & storage picks). • Relevant examples (image generation workflows, file upload UIs, transactional email). • Estimated timeline & milestones for: 1. UI + Upload/Email 2. AI generation integration 3. Email sending + admin 4. Deployment & handover • Fixed-price for MVP, and separate line items for any nice-to-have features. • Notes on security, ra...
Bonjour, je suis à la recherche d’un(e) professionnel(le) en forensic mobile ou digital qui peut m’aider à analyser et sécuriser mon iPhone et mes comptes en ligne. Je soupçonne une intrusion sérieuse et potentiellement la présence de logiciels espions qui traquent mes activités. J’ai déjà changé mes mots de passe et activé la double authentification plusieurs fois, sans succès. Ce dont j’ai besoin : Une analyse forensic complète de mon appareil (iPhone) pour détecter toute activité suspecte. Un rapport clair sur ce qui est trouvé (logiciels espions, accès non autorisés, etc.). Des recommandations pour sécuriser mes comptes et appa...
...currency payments Mobile Wallets: Vodafone Cash, M-Pesa support for mobile-based payments Payment Workflow: Redirect to gateway, confirm payment, update order status Security: All payments over HTTPS, webhook/API verification, secure data storage --- 9. Database & Backend Infrastructure Database Choice: MySQL (relational) or MongoDB (document-based), depending on structure Key Tables/Collections: users: ID, name, email, password, role, etc. products, services, courses, projects, posts, orders course_registrations, categories, settings, languages Relationships: Proper foreign keys and indexing for performance Security: Prepared statements or ORM usage to prevent SQL injection ORM: Use of Eloquent (Laravel) or Mongoose (Node.js) for clean CRUD operations ...
...and efficient, catering to both experienced and new users. 3. **Building a Strong and Accurate Automation System** – Developing an automated system for managing data and real-time updates is crucial. The challenge is to ensure that data can be updated accurately from multiple external sources without creating errors or inaccuracies. 4. **Security and Privacy Aspects** – In such a system, managing sensitive data and equipment requires a strong focus on security, including password protection and access control. 5. **Creating Virtual Server Farms** – Developing the OpenDCIM system and enhancing its features will require creating virtual server farms to conduct testing and experimentation, which is challenging without access to physical server farms. --- #...
...Suppliers (with complete profiles, contact details, certifications, etc.). Products (including costs, product details, images, certifications, etc.). Claims (customer claims and supplier claims). Various contacts (graphic designers, IT specialists, etc.). The CRM must have a modern, elegant, and minimalist design and feature two-factor authentication via email for secure access. 2. Access and Security Authentication Implement two-factor authentication (2FA) by email. A secure login interface (using HTTPS). The CRM is intended for administrator access only (no public access). User Roles Primarily one user role: Administrator. Potentially configurable for additional roles in the future, but initially only an admin role is needed. Language Requirement The entire CRM in...
...Suppliers (with complete profiles, contact details, certifications, etc.). Products (including costs, product details, images, certifications, etc.). Claims (customer claims and supplier claims). Various contacts (graphic designers, IT specialists, etc.). The CRM must have a modern, elegant, and minimalist design and feature two-factor authentication via email for secure access. 2. Access and Security Authentication Implement two-factor authentication (2FA) by email. A secure login interface (using HTTPS). The CRM is intended for administrator access only (no public access). User Roles Primarily one user role: Administrator. Potentially configurable for additional roles in the future, but initially only an admin role is needed. Language Requirement The entire CRM in...
...Manage job postings, track applications, approve name revelation, and finalize selection. • Recruiters: Review applications, shortlist candidates, and schedule interviews. • Hiring Managers: Approve shortlisted candidates, participate in interviews, and make final hiring decisions. • Candidates: Register, apply for jobs, and track application status. • System Users: Role-based permissions ensure security and controlled access. 1.2 Job Posting & Vacancy Management • HR can create, edit, and delete job vacancies. • Each job is assigned a unique job reference ID. • Jobs are posted on the career page and external job boards. • Automated email and SMS notifications for job postings. 1.3 Candidate Registration & Profile Management • ...
...each transaction • Transaction Tracking o View log of all transactions & commissions earned • Security Features o Fraud detection alerts o Optional rating system for agent trustworthiness 2.4 Admin Panel (Web-Based) • User & Agent Management o Approve/reject agents & users o Verify user KYC details • Transaction Monitoring & Real-Time Payment Processing o Monitor transactions in real time o Ensure automatic payouts to agents after every withdrawal • Bank API & Payment Gateway Integration o Automated real-time transfers from app’s main bank account to agents' linked bank accounts • Commission & Revenue Management o Configure commission rates dynamically o Revenue tracking & reporting • Security...
...history, family history, and current symptoms to predict the patient’s health status and classify them into five categories. 2. Objectives • Implement an AI system that predicts a patient’s health status based on medical and family history. • Integrate the AI model with an existing EHR system. • Provide real-time classification and recommendations for medical professionals. • Ensure data security and compliance with medical regulations (e.g., HIPAA, GDPR). 3. System Overview 3.1. User Roles 1. Doctor/Healthcare Professional • Input patient data (history, symptoms, test results). • View AI-generated health status and recommendations. 2. Patient (Optional - If Access is Allowed) • View their classification and recommendatio...
...quotes. Database: Use of PostgreSQL or MongoDB to store information about craftsmen, customers, quotes, and projects. Cloud storage: Use of AWS S3 or Google Cloud Storage to store images, 3D models, and files. 3.3 Drone integration (DJI SDK) DJI SDK: Use of the DJI SDK Mobile for drone integration (Phantom 4 Pro and Mini 4 Pro). Control drone movements, take photos, and manage flight routes. 3.4 Security Secure authentication: Use of OAuth2 or JWT to secure user access. Data encryption: Storage of sensitive information (such as quotes) with SSL encryption. 4. User Interface (UI) / User Experience (UX) Minimalist and refined design: Simple, intuitive, and quick to use interface. Main screens: Home page: Dashboard with summary of quotes and current projects. Project management: Lis...
...et de résoudre des problèmes variés, tout en leur proposant des solutions adaptées pour améliorer l’utilisation de leur site WordPress. Voici une liste de tâches qui vous seront demandées : Conseil et assistance technique : Conseiller un client sur des thèmes ou des plugins pour améliorer les performances (ex. : WP Rocket, WP Fastest Cache, LWS Optimize, LiteSpeed), la sécurité (ex. : Solid Security, Wordfence), le référencement (ex. : Yoast SEO, Rank Math), ou la création de contenu (ex. : Divi, Elementor, Gutenberg). Guider les clients dans l’installation, la configuration et l’utilisation de plugins (Form7, WooCommerce, la gamme de plugins LWS, etc.). Param&ea...
Nous recherchons un développeur expérimenté en Java ou PHP pour créer une marketplace très sécurisée. Le projet implique de développer une interface efficace et sécurisée pour les transactions entre acheteurs et vendeurs. Compétences essentielles : Java, PHP, sécurité des applications web, gestion de bases de données." - Skills : Java, PHP, Web Security - Budget : €700 - €800 EUR
...questions. The application will support multiple languages. Incorporate social media sharing features to increase engagement and attract more users. Include a user feedback system to gather reviews and suggestions from users directly within the app. Introduce daily challenges with special rewards. Allow users to provide feedback through ratings and reviews. The application will implement advanced security measures to ensure high-level data protection. Questions will range from easy to hard difficulty levels to cater to a diverse user base. The application will use OAuth for user authentication. The app's visual design and user interface should be minimalistic and clean....
...Proficient in building dynamic and responsive user interfaces. • Java: Experience in backend services within a microservices environment is a plus. • Node.js: Strong knowledge for building efficient APIs and backend microservices. 2. Cloud & Infrastructure: • Amazon Web Services (AWS): Experience with EC2, ECS, Lambda, S3, and RDS. Familiarity with AWS security best practices is essential. • AWS Security: Ability to implement military-grade security measures, including IAM policies, encryption, and secure networking. • Amazon S3 & AWS Lambda: Knowledge of serverless architectures and scalable storage solutions. • Amazon ECS & EC2: Proven experience managing and orchestrating containerized services. 3. DevOps & A...
...articles via Twitter, Facebook, WhatsApp, etc. Other Features: Like articles. Time to read indicator. "Read by" feature showing user count. Job application page. Quizzes and multi-page articles. Display match odds for pre-match predictions. Additional Requirements: Responsive Design: Ensure the website and apps are optimized for all screen sizes. Performance: Prioritize performance, scalability, and security. Code Documentation: Provide well-documented code and any necessary documentation for future development and maintenance....
...Use CSS frameworks like Bootstrap to ensure good adaptability. #### 5. Notifications and Alerts - **Real-Time Notifications** - Use push notifications (via WebSockets or Pusher) to inform applicators of the validation of their photos and reviews in real-time. - **Email Reminders** - Send automatic reminders to encourage applicators to complete their profiles or respond to comments. #### 6. Security - **File Upload Verification** - Scan images to detect potential malware or corrupted files. - **Form Validation** - Use robust validation mechanisms to prevent SQL injections or other types of attacks. #### 7. Performance - **Page and Query Caching** - Use caching systems to improve module performance. - **Image Optimization** - Compress images during upload to minimize their...
... - **API**: RESTful API for integration with other systems. 2. **Frontend** - **Frameworks**: React.js, Vue.js, Angular. - **UI/UX**: Use libraries like Material-UI or Bootstrap for a responsive and attractive user interface. 3. **Mobile** - Development of mobile applications for Android and iOS (React Native, Flutter). 4. **Hosting and Security** - Hosting on cloud platforms like AWS, Google Cloud, or Azure. - Data security with SSL, encryption of sensitive data, and two-factor authentication (2FA). ## Development Plan ### 1. Research and Analysis Phase - Understand the specific needs of the school. - Analyze existing systems and identify gaps. ### 2. Design - Create wireframes and prototypes for the user interface. - Define the system ar...
En fait j'aimerais avoir l'appui de cette personne sur Azure Security Center. Mon mémoire de fin de formation porte sur le cloud particulièrement Azure donc j'aimerais avoir une personne experte ou non qui pourra me conseiller, m'aider avec les documentations, me situer me donner des conseils
Veuillez vous inscrire ou vous connecter pour voir les détails.
...access later. Purchase Process: Customers can add items to their cart, select their preferred payment method, and securely place orders. Payment Options: Customers can choose between payment by CIB bank card or payment at the pickup point. Order Tracking: Customers can track the status of their orders, including order confirmation, shipping, and delivery. 4. Security and Privacy: Transaction Security: The platform will implement robust security protocols to ensure the confidentiality of user information and secure financial transactions. Data Protection: The platform will comply with data protection regulations such as GDPR and ensure that user information is processed securely and ethically. 5. Customer Support: Customer Service: A customer support system will be...
Détails & caractéristiques Du 25 décembre 2023 (à partir de 00h01) au 4 février 2024 (23h59), recevez un remboursement de 50€ pour l’achat d’un Chromebook, hors gamme Chromebook Plus Système d'exp...du processeur MediaTek Type de processeur MediaTek Helio Vitesse du processeur 2,05 GHz Nombre de coeurs 8 Mémoire maximale 4 Go Taille du disque dur 64 Go Technologie du disque dur eMMC Taille de l'écran 14 Pouces Marque chipset graphique ARM Description de la carte graphique Intégré Type de mémoire vive (carte graphique) Shared Nombre de ports USB 3.0 2 Logiciels inclus Internet Security Poids du produit 1,3 K...
Détails & caractéristiques Du 25 décembre 2023 (à partir de 00h01) au 4 février 2024 (23h59), recevez un remboursement de 50€ pour l’achat d’un Chromebook, hors gamme Chromebook Plus Système d'exp...du processeur MediaTek Type de processeur MediaTek Helio Vitesse du processeur 2,05 GHz Nombre de coeurs 8 Mémoire maximale 4 Go Taille du disque dur 64 Go Technologie du disque dur eMMC Taille de l'écran 14 Pouces Marque chipset graphique ARM Description de la carte graphique Intégré Type de mémoire vive (carte graphique) Shared Nombre de ports USB 3.0 2 Logiciels inclus Internet Security Poids du produit 1,3 K...
Détails & caractéristiques Du 25 décembre 2023 (à partir de 00h01) au 4 février 2024 (23h59), recevez un remboursement de 50€ pour l’achat d’un Chromebook, hors gamme Chromebook Plus Système d'exp...du processeur MediaTek Type de processeur MediaTek Helio Vitesse du processeur 2,05 GHz Nombre de coeurs 8 Mémoire maximale 4 Go Taille du disque dur 64 Go Technologie du disque dur eMMC Taille de l'écran 14 Pouces Marque chipset graphique ARM Description de la carte graphique Intégré Type de mémoire vive (carte graphique) Shared Nombre de ports USB 3.0 2 Logiciels inclus Internet Security Poids du produit 1,3 K...
Détails & caractéristiques Du 25 décembre 2023 (à partir de 00h01) au 4 février 2024 (23h59), recevez un remboursement de 50€ pour l’achat d’un Chromebook, hors gamme Chromebook Plus Système d'exp...du processeur MediaTek Type de processeur MediaTek Helio Vitesse du processeur 2,05 GHz Nombre de coeurs 8 Mémoire maximale 4 Go Taille du disque dur 64 Go Technologie du disque dur eMMC Taille de l'écran 14 Pouces Marque chipset graphique ARM Description de la carte graphique Intégré Type de mémoire vive (carte graphique) Shared Nombre de ports USB 3.0 2 Logiciels inclus Internet Security Poids du produit 1,3 K...
Détails & caractéristiques Du 25 décembre 2023 (à partir de 00h01) au 4 février 2024 (23h59), recevez un remboursement de 50€ pour l’achat d’un Chromebook, hors gamme Chromebook Plus Système d'exp...du processeur MediaTek Type de processeur MediaTek Helio Vitesse du processeur 2,05 GHz Nombre de coeurs 8 Mémoire maximale 4 Go Taille du disque dur 64 Go Technologie du disque dur eMMC Taille de l'écran 14 Pouces Marque chipset graphique ARM Description de la carte graphique Intégré Type de mémoire vive (carte graphique) Shared Nombre de ports USB 3.0 2 Logiciels inclus Internet Security Poids du produit 1,3 K...
Détails & caractéristiques Du 25 décembre 2023 (à partir de 00h01) au 4 février 2024 (23h59), recevez un remboursement de 50€ pour l’achat d’un Chromebook, hors gamme Chromebook Plus Système d'exp...du processeur MediaTek Type de processeur MediaTek Helio Vitesse du processeur 2,05 GHz Nombre de coeurs 8 Mémoire maximale 4 Go Taille du disque dur 64 Go Technologie du disque dur eMMC Taille de l'écran 14 Pouces Marque chipset graphique ARM Description de la carte graphique Intégré Type de mémoire vive (carte graphique) Shared Nombre de ports USB 3.0 2 Logiciels inclus Internet Security Poids du produit 1,3 K...
...this specification document is to clearly define the objectives, features, technical requirements, and expectations regarding the deployment and maintenance of the proposed plugin. This document will serve as a reference throughout the development process, ensuring that the final product meets the specific needs of our educational environment, while adhering to Moodle's standards of quality and security. This plugin is designed to be intuitive, secure, and adaptable, ensuring a smooth and effective integration of virtual assistants into the teaching and learning process. IMPORTANT Existing PHP code is already written to display an OpenAI assistant chatbot on a web page. The task is to integrate this PHP code into a plugin while ensuring compatibility between this PHP code ...
Identification des risques SI cartographie des risques S.I Définition d’une politique de sécurité
Technical Experience – Front-End Mandatory - Angular 2+ - HTML / CSS / JavaScript (ES6) - Use of REST Services Preferable - Sass - Bootstrap - NgRx - Frontend Security topics Technical Experience – Back-end Mandatory - Java 8 - Spring framework - REST Services - SQL Preferable - Hibernate - Backend Security topics Business Experience Mandatory - Agile (SCRUM) development Preferable - Web development - Financial affinity
Un établissement scolaire dispose d'ordinateurs Chromebook (chaque élève et chaque professeur possède un ordinateur et l'ensemble du parc est géré par une équipe informatique de l'école) et utilise Moodle qui contient le plugin Safe Exam Browser (SEB). Malheureusement, SEB ne fonctionne pas sur Chromebook. Nous recherchons une person...fonctionne pas sur Chromebook. Nous recherchons une personne capable de guider l'équipe informatique de l'école par vidéoconférence afin de contourner le problème, c'est-à-dire faire fonctionner SEB sur des Chromebook. Quelques informations complémentaires :
Bonjour Rohit S., j'ai remarqué votre profil et je voudrais vous offrir mon projet. Nous pouvons discuter des détails via le chat.
...account, the user have to choose between linking an existing account or create a new sub account. Meaning that they can move from their account to the sub account just by clicking on the username of the sub account that will appear on the right side under profile where we have profile picture. And also add the possibility to link and unlink and existing account to a main account, in this case for security reason you have to provide the email address and the password of the account you want to link or unlink. We need this work to be done in 5 days ...
...en cours. En cours Really Simple SSL 4.0. En savoir plus sur notre dernière version majeure. Plus d’info ou ignorer1 En cours Redirection 301 WordPress activée. Nous recommandons d’activer une redirection 301 .htaccess. Activer ou ignorer1 En cours Nouvelle fonctionnalité ! Les cookies sécurisés HttpOnly ont été automatiquement définis ! Plus d’info ou ignorer1 Premium HTTP Strict Transport Security n’est pas activé Lire la suite Premium En-têtes de sécurité recommandés non activés (Lire la suite). Je vois aussi que parmi les extensions installées, plusieurs mises à jour sont demandées... Je ne sais pas encore exactement quelles sont ...
I am looking for a Type Lua developer, to be able to create my game server from scratch on the Fivem platform. For that, I would also like to have anti-dump file security, and to be able to have new scripts. cordially Namp '
Reading assembler code and using debugging tool (assembler) would need someone who could do my project where there is some assembler, debian, linux, The purpose of this project is about basic tools and vital rigor to have when automatising tasks on a system, assembler,assembly , linux, debian, shell,Security,network,language C , C++... Computer Security , Network Security , Web Security, C Programming and Linux
...service) en méthode GET. Les entêtes à passer (headers) : - X-Amz-Content-Sha256 - X-Amz-Date - X-Amz-Security-Token - Authorization Le problème : lors de la tentative de connexion à l'API en AJAX, un retour serveur indique une erreur sur le calcul de la signature. Mission : régler le problème et obtenir un retour serveur valide. Aucun traitement des données n'est à prévoir. Le code source est fourni. ----------------------------------------------------------- Hello, we are looking for a freelancer capable of solving a bug encountered during an attempt to connect to the AWS S3 API (amazon web service) using the GET method. Headers to pass: - X-Amz-Content-Sha256 - X-Amz-Date - X-Amz-Security...
Realization of security attack simulations on SDN (Software defined networks) on a virtual environment using kali linux Attacks like Dos, arp poisoning... the important thing is to have the steps to follow up in order to perform an attack on SDN It's possible to exploit the openflow protocol vulnerabilities on this simulation It's for my bachelor project !!! On network security field Thank you
Nous développons un logiciel de comptabilité adapté à un système comptable particulier. Deux personnes ont déjà débuté le projet depuis début octobre (dont une jeune sénior). L'objectif est d'obtenir une première version fonctionnelle à la mi décembre. Nous recherchon...version fonctionnelle à la mi décembre. Nous recherchons pour compléter l'équipe, un développeur SENIOR en Java connaissant les technologies suivantes: Langage : Java EE – Oracle JDK 11 Framework de développement : Spring Boot 2 [+ Spring 5 ] Accès aux données : Spring Data [+Hibernate] SGBD : MariaDB / Oracle / PostgreSQL Technologies comp...
...project for our company, To properly choose our Freelancers, before starting the recruitment process you are invited to take a little test to judge your code. Test: Create a piece of code that meets the following requirements. Keep in mind the quality of the code, especially the structure must meet the usual standards. Do not worry about topics that are not directly mentioned below (for example, security). Normally, you should be able to finish the example in 30 to 60 minutes if you have already worked with the necessary technologies. Spring Create a Java application using Spring Boot. Provide a REST function that can receive an object that contains two numeric values. The result of the function must be an object containing at least the two numerical values and the result of ...
...en ligne /fait* - Un fil d’actualité - Une FAQ - Un forum fermer au non membres - Le portage du contenue de l'ancien site < environ 500 articles de blog / pages > Le site est déjà crée et installer avec beaucoup de chose déjà configurer et fonctionnel mais du travail reste à faire. J'utilise Wordpress avec le theme Extra de Divi et voici la liste d’extensions déjà installer : All In One WP Security Divi Cloud WooCommerce Memberships WooCommerce Stripe Gateway WooCommerce Subscription Downloads WooCommerce Subscriptions WP Menu Cart Clairement je recherche une personne ouverte à la discussion et qui pourra me partager des idées d'améliorations et ensuite retrava...
JOB LE DOMAINE DE RESTAURATION FIXE DOMAIN RESTORE 5, PROBLEME RESTOR domaine, probleme Domaine https LE SERVEUR SECURITE FIXE VPS CPANELWHM Services de sécurité: Iptables Configurations de pare-feu Installer et configurer CSF Firewall Installer et configurer Mod_Security Installer et configurer Rootkit / Virus. Installez et configurez l'analyse du journal de détection de force brute et la rotation du journal Secure / tmp partition et d'autres binaires sur le serveur. Virus et Malware Scanner Shell Protection contre les Bombes Fourrure FTP Renforcer SMTP Renforcer la Sécurité OpenSSH. !!!!!!!!job maxi me paye 30$ !!!!!!!!!!!!!!
...les plugins au fur. Mais le bug s'est reproduit au moment de migrer le site sous le dossier /avoriaz et de faire tout les changements d'URL dans la base de donnée Le site étant multilangue (Français et Anglais) sous le plugin Polylang, j'ai d'abord pensé que ça venait de ce plugin. A cause de la modification qu'il fait à l'url en ajoutant /fr ou /en à l'url. Il y a aussi WP Hide & Enhanced Security qui permet de modifier le htaccess et qui aurait pu provoquer ça mais quand le bug s'est produit, je n'avais pas encore configuré le plugin. J'ai tout de même désintallé les plugins et le problème persiste. Ce problème n'ava...
...SQLServer 2008 database (already designed) will be hosted on a popular ASP hosting website. - Create a standard interface to secure login for patients based on the information on login already saved in the SQLServer 2008 DB. - Create a Web site to simply allow medical clinics to create their accounts with a login and to pay for the service with credit card or (maybe) Paypal. - Use of standard security methods (SSL Certificate, securing code against SQL injections, etc.). - Convertir un petit projet WinForms en une application ASP.Net MVC. Le projet est un petit questionnaire médical où un patient peut entrer son nom, adresse, etc. ainsi que répondre à une liste pré-établie de questions médicales. Tout le code pour la portio...
Meilleurs articles de la communauté security
Secret to Success: Make Real Friends
Starting up as an entrepreneur or a freelancer isn’t easy. Harder still is going at it alone.