Simple Tips to Get Started on Encryption
How safe is your online communications? Here are simple tips on how to get started on encryption.
It is a AWS-IoT project. In this project i have to build a aws server and integrate all aws services in this. basically we are using ESP32 for data flow through mqtt protocol to IoT core. So the requirement are- -data through esp32 to Iot core -security (VPC & IAM ROLES) EC2, and storage (lambda, dynamoDB, S3, SNS, SQS) -Api gate data to mobile app and desktop.
...to develop the website on. We are looking for someone who can develop a website that looks and functions similar to this reference site Our site needs to be 100% custom design created from scratch without copying someone else’s work meaning custom design, layout, color scheme and much more tailored around Hand car wash and detailing business model. Site security is 100% important factor in this project because customers will be coming to the site and purchasing products or booking car wash appointments whether its mobile or in shop as well as purchasing unlimited wash club memberships. Each customer module will need to have its only design and interface such as Customer Portal for ordering products and services from the e store on the website, also customers
Please Sign Up or Login to see details.
Required Endpoints, needed to create 1. Endpoint for wallet balance query ( this will return Wallet code and Balance) 2 endpoint for commission query ( this will return Commission per currency) ...functions in MTCN redeeming ) 4 endpoint for send to my wallet ( this will handle sending from one wallet to another) 5 endpoint for send to IRT wallet ( this will handle Sending from one users to another) 6 endpoint for send to bank/mobile money ( this will handle payout ) 7 endpoint for Transactions (this will return transaction history query per day) ( connection access and security ) 1. MID ( already existing in DB) 2. User email ( already existing in DB) 3. IP (you will create in DB) 4. Transaction Pin ( already existing in DB) 5. Public key ( you wi...
We are looking for a wholesale IT provider who can provide remote IT technical support for the following products and services. Cloud Services - Public Cloud - Data Backup - Disaster Recovery Integrated Communications - Soft Telephony systems - MS Teams PBX - Ring Central End User Computing - Device Management - Mobility Solutions - IT Procu...Teams PBX - Ring Central End User Computing - Device Management - Mobility Solutions - IT Procurement Website Creation and Applications - Website design - Application Maintenance & Support - Software Selection Productivity and Collaboration - Microsoft 365 - Google Workspace - Connectivity (networks) IT Support - IT Support - Service Desk - Field Service Security and Compliance - IT Security Management - IT Security Complia...
Blockchain have been an interesting research area for a long time and the benets it provides have been used by a number of various industries. Similarly, the healthcare sector stands to benet immensely from the blockchain technology due to security, privacy, condentiality and decentralization. Nevertheless, the Electronic Health Record (EHR) systems face problems regarding data security, integrity and management. In this paper, we discuss how the blockchain technology can be used to transform the EHR systems and could be a solution of these issues. We present a framework that could be used for the implementation of blockchain technology in healthcare sector for EHR. The aim of our proposed framework is rstly to implement blockchain technology for EHR and secondly to provi...
Having a requirement for Oracle OCI pre-sale to assist in the below task Design and delivery of Oracle ERP Cloud technical architecture strategy including PaaS for SaaS (OIC, API Gateway, PCS, VBCS, DBCS, OTBI , Object Storage) and cloud security (IDCS, Data Encryption, Vault) Deploying and governance of a secure landing zone architecture for setting up the OCI tenancy, Identity and Access Management policies, Compartments , Virtual cloud network (VCN) , subnets, internet gateway, DRG , Service gateway etc..
...try running the seed again: docker-compose exec web rake db:seed Tasks to be done: - Keycloak: - Install CAS Module - hyku - Authenticate against Keycloack using CAS is NOT working anymore See README of on how to integrate w/Devise - Authentication should be done with email (not username) - Single host configuration is sufficient (see .env) - nginx - Configure auto renewing LetsEncrypt SSL - configure network set up and port exposures with high security standard in mind - Single-sign off HTTP User
...(MVC)) Experience .NET C# and HTML5/CSS3. Expertise in building large-scale web applications using Domain Driven Design, Microservices, API First, and Event Driven architecture patterns BSc/BA in Computer Science, Engineering, or a related field. Experience with database design concepts, RDBMS, SQL Server, PostgresSQL, MongoDB, Azure elements, and GIT version control Experienced in integrating mobile apps with web services and external APIs, XML/ JSON RESTful interfaces, and Kafka. Knowledge of data management, database concepts, database-driven Web applications, Ability to adapt to the startup culture, handle multiple competing priorities, meet deadlines and troubleshoot problems. Knowledge of application security, authentication & authorization using pa...
Have MS Server 2016. Need to organize folder per security settings and VPN access.
Fix security issues in WordPress Currently redirect home page Check all security issues
*** ONLY BID if you have experience in SSH/RSA keys and CA certs *** Specifically, we need someone to provide a list of bash commands to accomplish the following. All you need to do is provide working bash/command line commands. We will integrate the commands into our system. Goal of Project: We need to provide users the ability to connect to our Linux s...4096 - Currently, we use: ssh-keygen -f [USER-KEY-FILE] -b 4096 -t rsa 2) Take the keys and sign them with our CA cert - ssh-keygen -s git_provider_ca -I [USER-EMAIL] -n git -V +365d [USER-KEY-FILE] The problem with the above two lines is it signs the public key, but I need the private key signed (I think?). Then we need the private key in PEM format. ()
We are a cyber security agency and looking for 3 ethical hackers who have experience in cyber security, malware detection, IP tracking, phone number tracking, email tracking, and so on. Note: we are looking for a long-term partner not only a one-time project, if you are looking for a regular job this is for you. Please read the requirements before bidding thanks
We have 2 websites that need to be upgraded to responsive design. Additionally we need to have some features like call , chat etc Websites are static, but I will need...new pictures, your creativity is key. SEO Is very important. We come up in first page of search engines. Obviously Meta data, tags, keywords etc all need to be in place, therfore a proper analysis is needed on our website to ensre that al features are captured. It is required that the developer builds another similar website for our approval. Access to existing website will NOT be provided for security reasons. We can provide the source code for your own hosting to help you. When ready those new pages will replace the existing ones on IONOS. Additional features like google reviews (popups) see:
*** ONLY BID if you have experience in SSH/RSA keys and CA certs *** Specifically, we need someone to provide a list of bash commands to accomplish the following. All you need to do is provide working bash/command line commands. We will integrate the commands into our system. Goal of Project: We need to provide users the ability to connect to our Linu...4096 - Currently, we use: ssh-keygen -f [USER-KEY-FILE] -b 4096 -t rsa 2) Take the keys and sign them with our CA cert - ssh-keygen -s git_provider_ca -I [USER-EMAIL] -n git -V +365d [USER-KEY-FILE] The problem with the above two lines is it signs the public key, but I need the private key signed (I think?). Then we need the private key in PEM format. ()
We are a private security / EP company that is looking to revise an Employee Handbook.
Hi, We are a super young an professional company operating in Canada and in the US. We are looking for a long term relationship with a telemarketing team (call center) or freelancers to grow our business. We've been in the industry for the past 4 years and are looking for competent individuals that already sold similar product in the past or selling them right now. We are looking forward to meeting you all, thank you!
Project roles creation. Need to create roles not in studio but in backend
We are looking Experienced PHP developer for working our Project Prepare New Module Types Of Reports Security Concerns etc..
Your report should include but not limited to the following: • Cloud Computing Concept, Background, Characteristics, Services, and Models. • Cloud security and mitigation of security issues • Virtualisation concept including Hypervisor I & II • A comparison of IaaS, PaaS, and SaaS with respect to UWTSD requirements. Provide pros and cons of the cloud services and recommend which service should be selected in different scenarios. • Modern cloud services i.e., Containers, Dockers, Serverless, Kubernetes, and FaaS. You are required to write 2500 words report. Your report should include relevant figures or diagrams wherever required. Although you will be writing a consultation report but still your report should include minimum 15 IEEE style academ...
Fix security issues in WordPress Currently redirect home page Check all security issues
I'm looking for someone who can develop a script which will be used to set up template folders for security incidents. I have attached an outline of the project along with with the templates.
We are looking for a Tech - Testing expert who can help with Security side testing for Vulnerabilities and UNIT testing of the Web based and Desktop Application related to Time tracker.
'd like someone to create a Chrome Extension that has 4 different functions that automatically: - buys a certain amount ($ spent) of all the coins on coinspot. - sets orders for all purchased coins for 17% greater than the current sell price. - cancel all orders. - sell all coins. I want all four functions to be separate from each other. I'd build it myself but I can't bypass/match their security method. Must be made into a chrome extension. Must be descrete and not a macro. Please only submit a quote if you're familiar with how coinspot works. Thanks!
To found my website vulnerabilites and increase my website security
...have a proposed methodology in the attached files, or feel free to come up with better solutions we will discuss and conclude the methodology. Project has two main phases. 1. Vulnerable code segment detection and 2. Correct the detected vulnerable code segments / suggest the corrected code. 1. Vulnerable code segment detection These vulnerable code segments should be related to the information security. For example, code segments which helps to make Cross site scripting attacks, Buffer overflows, SQL Injection etc. I have found an existing data set from this project GitHub - SySeVR/SySeVR. Better to use this or feel free to come up with better data set if you have. This detection should be done syntactically and semantically. Then only we can come up with good results. So, once ...
...solution and answers for following: what's the overall technical solution and the guideline to develop the system? which kind of blockchain to use (or build), with what kind of language or platform; what kind of technical background needed for the developer to do the work why it's good to be used for purely phone-based mining, and how the phone users contribute to the operation (mechanism)? Any security issues or concerns? how to prevent people to use simulator/emulator to fool the system (i.e., use computer instead of phone for mining)? How to make our cryptocurrency/token to integrate/exchange with other token/currency? Estimated cost and time to build such system. (we'll provide a detailed operational idea about how to run the operation on the network) *pleas...
I am looking for an experienced Magento 2 developer who has minimum 3 years experience in Magento 2 and excellent understanding about Google Cloud server. I have a live Magento 2 multi vendor/ marketplace website running in google cloud pr...cloud production server. Need a very experienced developer who can have good experience in Magento 2 and GCP to maintain the project. Current requirements are 1. Replicate live website for a new staging server 2. Create additional website and new store in same magento instance for Supermarket products (different theme/ layout form main website) 3. Customizing in current functionality 4. Install security measures and update magento patches 5. Regular support Only experienced individuals can bid as I am looking for Freelancers who can continuo...
Hi, We are a security company that operates in all of Canada. We are an ADT authorized dealer so we would prefer a team or an individual that is familiar with their products an know how to sell them. We need agents with experience or call centers that already did similar campaigns. Thank you
Hi we are a Security company operating in Canada. We do residential and commercial and we are looking with individuals with experience that don’t need training and can start closing right away! We offer the best rates in the industry by far. We don’t have issues with working with call centers or with freelancers. People that already sold those product are more then welcome! Thank you all for your time and to the pleasure of working together!
Developer Native Android Application (Java) for the security service provider with the eye catching UI design. Note: Need someone who can work closely with my team to get the required APIs Details are there in attachment.
Hello developers. Need help fixing a simple Spring Security example without using Spring Boot or JPA. I will discuss more details with best developers. Thanks.
I am looking for C# expert with background in security and AWS cognito integration for the identification. I have a premade C# backend that currently using its own identity management, and I want to switch that to Cognito. I am looking for high quality code and well secured so please bid only if you got the right experience and have actually done similar task before.
I need a contact form placed on a website. It should also use Captcha mechanism for security.
Both sites would be personal websites and would require personal pages, experience, blog, contact, and social media feed pages. One website needs to have a gallery and pages to add portfolio for upload of work. I would like to know about the hosting prices along with security features with it.
I am looking for a Linux administrator to maintain my servers. Must be higly skilled. Most tasks involve: Security Installation and updates Malware search and removal Must be qualified in Plesk hosting panel. Dns knowledge Highly skilled in Mongo DB Higly skilled in Node.js This is a long term project, paid pr task.
Block Eagles is a Blockchain Security business focusing on Smart Contract Audits. The logo we would like, while being minimalist should have some elements of Security and attention to details (So Eagles here more focused on the vision of the eagle) and blockchain. Please be creative. Looking forward to see the submissions. I have received 159 entries, but it was disappointing. No one had put time to read the contest description or enough taught to make a creative design. It was mostly search, change name and submit. I have seen this logo on Shutterstock that looks interesting. can someone make something like this but block (cube/hexagon) in the eye and better looking eagle, still minimalist like
We are looking for Backend Web Developer who can help us and work for several months to finish our project. We are proud to have an open, transparent and collaborative working culture. We like to work with like-minded people who are team players and are looking for a place to learn and grow both personally and professionally. We are looking for a back-end developer who can design and deploy cloud-based backend architectures that are cost-effective, feasible and scalable. Key Responsibilities: Design, develop, test and troubleshoot solutions. Able to map project requirements to technical design solutions. Able to do back-end development. Build reusable APIs for internal and external use. Provide security and data protection settings. Willing to learn n...
I need a PhD proposal that makes Three contributions.. Should be network security and in this case-MANETS… it could be to improve its security,reliability,etc. I also need someone who is good in simulations and more so MATLAB. We will walk a journey together to the very end
Create a POC for data lakehouse solut...data lakehouse solution using: 1. hdfs for storage, 2. deltalake, dremio to query delta lake, dremio-superset integration It should have folln features: 1. ACID support 2. data governance feature 3. Data/metadata discovery using Amundsen 4. data catalog with Apache atlas .. here Amundsen to be integrated with Atlas. 5. provision for masking/encrypting data based on role accessing the data. 6. security controls and audit. Deliverables: 1. demo showcasing all the above requirements. 2. setup instructions/scripts that will help install the POC setup. 3. any scripts used to configure the products used in solution. 4. explanation of each and every solution component used, its configuration etc. 5. spark jobs code used to showcase one end to en...
IT IS MY STARTUP WORK, WHOSE PURPOSE IS VERY SIMPLE. I WAND TO COME TOGETHER LOCAL...items. Delivery charges as per weight and distance will be available. policy for vendor and delivery boy. a customer booked items then the app notified the admin, vendor and delivery boy. 7.Security for APP and secure payment gateway and their charges. in app ;Items details and customer address slip printout option by vendor. type payments in Admin account. COD in our office, location will decide for COD , advance payment. Option for delivery boy to transfer cash through their mobile to admin account when received cash from customer. 10. Security deposit by delivery boy for safe COD delivery. option in APP 1. Order booked 2. Packed 3. Dispatched 4. Delivered
...100 – 500 employees Contact Job Titles: IT Manager Requirement 3 (EN) 200 contacts needed verticals finance and banking insurance manufacturing construction Professional Services – Accountants, HR companies, Legal firms Marketing Agencies Region: UK based Size of companies: 50 – 500 employees Contact Job Titles: IT Manager Cyber ​​Security Manager Data Manager IT Security Manager Size of companies: 50 – 500 employees Contact Job Titles: Marketing Manager Marketing Director Requirement 5 (FDO) 200 contacts needed verticals Financial sectors – lending, mortgage, banking Insolvency Practitioners - insurance companies Car finance companies Claims management companies...
Need a wordpress security expert to fix backdoors etc.
Hi, I have new AWS EC2 instance running CyberPanel and would like to set it up as a web server for my clients. I currently host our websites on a WHM/cPanel account but would like to cut costs and transfer them over. I would like for someone to setup security, name servers, firewalls for this server to run at its optimum. Please only apply for the job if you have setup a CyberPanel server before.
A national bank having branches, offices, and customers in all major states of the country was recently informed of some security breach. The bank has sent a mail to all the customers for resetting their password. The process as per instructions form the bank is:- 1) The customer will login to the account with current ID credentials. 2) The customer will be able to change the password with two step processes a) Choose three new security questions from a set of six security questions offered. b) After successful change of the password, the system will give the option to the customer to get information on each transaction nationally and internationally. The customer will choose the amount as to what amount and above he/she wants notification of the transaction (the noti...
I need an OSCP certified who can help me to prepare for the Offensive Security Certified Professional (OSCP).
AWS CloudFormation Template Needed Create Several Resources, ex. EFS, S3, etc and 1 IAM user These will be security focused.
Need a Logo Designed for a Security Web Site Colors: red and blue
Need a quick design of icons to stick on glass door. Will be vinyl cut to stick on glass. The icons need to look like they’re from the same family and modern. I need the following icons 1. No Soliciting (maybe a man with a briefcase crossed out) 2. No Smoking ? 3. No Cash ? crossed out 4. 24/7 security monitoring (maybe a security badge) 5. No public restroom, toilet crossed out. 6. No food or drink I really like the designs of
Work details: Please the site is very functional for now before we start work. We need these listed below. Update the site to the latest Prestashop with all security patches. Then we need it to be mobile responsive or friendly, in ios android, tablet and desktop. The site speed: Most of our customers use mobile devices we need at least speed of 65 or more on all mobile devices.
How safe is your online communications? Here are simple tips on how to get started on encryption.
Google has blocked an extensive number of Wordpress-based sites due to a malware attack by SoakSoak.ru
Building a web application is easy - building one that meets all security requirements is hard. This article covers the 5 popular security practices.