...your choice. The web server should serve one page with the following content. <html> <head> <title>Hello World</title> </head> <body> <h1>Hello World!</h1> </body> </html> • Secure this application and host such that only appropriate ports are publicly exposed and any http requests are redirected to https. This should be au...
We have a wordpress website that has be...that has been hacked At some times per day (not always) it is redirected to a spam website We need someone to check wordpress and plugins code, remove malicious scripts and secure the site so this does not happen again We will use the services of the successful candidate as security expert for all our websites
Hi, I have an [đăng nhập để xem URL] application which uses OWIN ...PowerBi report server behind that. the problem is that i need to create custom authentication on Powerbi report server and create a SSO between two systems(ASP app and Reporting Server). if a user logged in asp application, cookie or whatever will provide seamless authentication to reporting server.
Hello I have startup company for web development. So need I simple website for my business. There is mainly 7 to 8 pages in website. most of contain will be static. more details I will give selected freelancer. Please bid only serious freelancer. SHOW ME YOUR PAST WORK IS RELATED TO MY BUSINESS. Thanks
...system! -Bitcoin payment integrated -Support system -Admin panel -reseller panel -bulk upload Script must be fully complete and secure! Obviously I will create new logo change name and basic designs. I just need a secure PRIVATE script complete ready to start using. Please message me if you have....
Hey Guys! I have an android app. I want to add features like two-factor authentication ( OTP, DUOS) in this existing app. It has a Firebase attached to it. I want it to be done within the next 24 hours.
...specification but it should be completed by Friday. We believe there are around a half dozen or so objects to create the API for. This work will include Login, User Creation, Authentication, Password Reset, etc. If you have experience connecting with Facebook that would be a plus! As far as objects go, a simple company object, where users can be a generic
• Design/setup micro services for a mobile app using the best approach that's secure, affordable and reliable • Setup database and connect to AWS • Help build backend infrastructure w Ngix, docker containers, Cloudflare, • Must have experience with automation server like Jenkins for CI/CD • Suggest/Implement best way to handle clusters (i.e Using Percona
I'm working on a project which functioning as an air server like apple-tv3; my project is based on an open source project named PhoneGap, but unfortunately the source left uncompleted; Some basic steps like registering the system in DNS-SD and pair setup and pair verify has been done successfully but it fail on fp-setup (apple fair play protocol initialization) step; now I need your help to s...
Use ruby on rails to build a website. The flow of the website is as follows: - Use the gem devise for user authentication and gem 'net-ssh' for VPS set up. - Configure email verification after user sign-up. - From the homepage click on hosted nodes button. Display as cards different cryptocurrencies. At the bottom of the card allow a user to click a
...Zimbra Proxy Components Proxy Architecture and Flow Changing the Zimbra Proxy Configuration Zimbra Proxy Configuring Zimbra HTTP Proxy Configuring Zimbra Proxy for Kerberos Authentication Zimbra multi-server installation for fault tolerance. Setting up zimbra cluster using DRBD and packemaker...
I have a very serious problem with my hosted PBX: It is available online but I already change the default 5060 to 10... Firewall and fail2ban are already setup. Sip phones can call using dialcheap and megavoip. The problem is that hackers make calls using dialcheap and megavoip and I cannot stop it. ##, *2, Tr are already disabled
Hi I have an application which needs to have an OTP generated and sent to the user email id.. as well as need to get authenticated .. using authentication token, refresh token and reset token. We are on AWS cloud ad expecting to use Windows server or aws services for this any idea of implementing it would be helpful. you have to work remotely through
...Anyone Can Do It * Private Money For Newbies: 7 Simple Steps To Finding Private Money To Fund Your First Deal * Build A Real Estate Empire: 7 Simple Steps Newbies Should Use To Secure Seller Financing When Buying Your First Properties * Real Estate Investing For Newbies with NO or LOW Money Down: Simple Strategies To Buy & Control Properties Using Other
...and relevant formats will be provided to selected developer. In addition, this API requires client authentication using a .p12 certificate file. I will provide this certificate file and credentials. So you must have experience with such authentication. Do not apply if you have never done this before. Data received from API should be saved into database
...Access-point by using PEAP-EAP-TLS authentication. This authentication method is available in windows but not in Ubuntu/Redhat as of now. But AFAIK, Cisco confirms that Linux can connect by using mentioned method. Currently, following is the key components in picture Wired 802.1x with PEAP-EAP-TLS Authentication method. 1) Supplicant ( Embedded linux
...rejected as spam, with following message: SMTP error from remote mail server after end of data: 550-5.7.1 This message does not have authentication information or fails to pass 550-5.7.1 authentication checks. To best protect our users from spam, the 550-5.7.1 message has been blocked. Please visit We don't send emails to anyone we don't
...Account Access: Simplified login or even bio-metric logins such as a fingerprint touch ID. 3. Fraud Alerts or Lost/Stolen: In this mobile and digital age where we trade our secure information freely, it's important to be able to stop the flow of our vital information on a moments notice if something suspicious arises. 4. Encrypted transactions 5.
My project is in BYOD access control policy using Blockchain The component in the system is user authentication where user need to key in id, password. Blockchain will create public n private key for the user Then the system will scan for user device MAC address n IP. If the device are are in public network, Blockchain will generate a verification
...application allows companies to centralize confidential employee information and define access permissions to authorized personnel to ensure that employee information is both secure and accessible. notice :Source code should be clean and Arrange comments together each functions to allow other developer continue with EER diagram of database . we have exist
...create and eidt 2 types of forms. Managers should be able to approve or reject with with additional changes being required. It will need to include user sign up and user authentication with AD as well.I dont care if you use a boiler template or have something previously similar. I do need this within the next two days however with daily progress updates