...apart from that, pay system via credit card and paybyway (this can be discussed in terms of security and certificates to get) 2. As soon as the customer opens order, having invoice print from the printer at the restaurant (having, place to go, the customer name and the price etc. as order information) ( I can make the physical configuration of the
Emre merhaba, Bilgi guvenligi alanında bir yazılım gelistiren bir startup'iz. [login to view URL] adresinde bir miktar bilgi mevcut. 3 ay once urunumuzu duyurduk, patent basvuru surecinde oldugumuz icin siteyi product oriented yapmadık henuz. Urun UI'i konusunda enterprise bir UI/UX sahibi olmak icin girisim icerisindeyiz. Ankara'da yasadıgın icin proje bazlı bu konuda seninle gorus...
...code. It also will be published under the name of our company is our Mobile Market. 1 Step - Web Site 2 Step - IOS (Iphone & Ipad) and the Android App 3 Step - Facebook App 4 Step - Black Berry App 5 Step - Windows Mobile App My friend, and all the web services specialized in Website Application security configuration will be required to submit
...5. It also will be published under the name of our company is our Mobile Market. 1 Step - Web Site 2 Step - IOS (Iphone & Ipad) and the Android App 3 Step - Facebook App 4 Step - Black Berry App 5 Step - Windows Mobile App My friend, and all the web services specialized in Website Application security configuration will be required to submit
Installing WHM on AWS EC2 with full configuration : AWS : networks security group Route 53 OS WHM : Full installation DNS configuration SMTP configuration adding domain account Adding name server adding name server to domain registrar adding additional domain without any new modifications UAT
I want a logo created that is of a shield with the letter V on it. This will be for a security business. This is not a lock and key security company. It's more of a consulting physical security company. The name will be Vigilant Shield
...arrange for inspection/acceptance of work. SECURITY/IDENTIFICATION OF CONTRACTOR PERSONNEL AND VEHICLES: The contractor shall provide a detailed list of all employees expected to enter Federal facility to the COR ten (10) days prior to commencing work. The employee list shall contain the employee’s full name, date and place of birth, current address
...the figure and position they want to show off their clothes, giving them greater self-esteem, security and feel beautiful. The clothes will be sporty. I need a short name that projects what makes the clothes and the strips a short name. And the logo. The name and logo must be one that is not confined only to the strips since I work sportswear that molds
...articles about personal security, both digital and physical. It also has tests and comparisons of various security products. For this website we would now like a logotype. The website is not yet created, so you are not bound to any theme or colors, but we have in mind black/grey and blue/red/orange as possible colors. The name of the website is skyddad
We are looking for programmer who is good in symfony PHP and help on the list below : 1. Security improvement 2. Change database name and password 3. Change any related passwords 4. Add google recaptcha for resetting password page 5. Add https to website 6. Solution of user getting 100s email for resetting password. Thank you.
...confirmed and has our company selected as the shipping method for the order. The plugin should do these effects after installation : 1-A new shipping method under our company name should appear on the checkout page. 2-A Settings page for the plugin to enter shipping-company-API-key, so the open cart store can be linked to a particular account in our
...MyAccount, validation. For a new account they enter their account name, password, and default billing and shipping information. The new account is submitted to the Order Processing service. If the account name already exists, the user is prompted to use a different account name. To submit their order, they verify their billing and shipping information
...cyber security and good SEO practices, and enjoy debugging codes. I need to speak with companies to determine if we're a fit to work together on this project and other projects. So contact me quickly for consideration. I'm looking to build long term relationships with companies, NOT individual freelancers, so tell me about your company, it's name and
...based self-storage facility. The name of the business is Smart Storage Centre. The facility is unmanned and the gates and storage units are accessible by bluetooth from your smartphone. I would like the logo to convey the message of this technologically advanced facility. The company slogan is "Convenience and Security through Technology" - I am not
My website is hosted on Linux Droplet from Digital Ocean...Droplet from Digital Ocean. I have hosted multiple WordPress websites. Recently, my websites were attacked by hackers and I have regained the access. I want someone to take security measures. so my websites cannot be hacked. Note:- Need proof of past projects. Budget is just the place holder.
...[login to view URL] -------------------------- Mechanism of Action: Add Merchant Code and Security Key by WHMCS Panel ------------------------ The add-on will fetch invoice information such as financial value, product name and any other information you need to make a payment. -------------------------- Also attached is an HTML file
...confirmed and has our company selected as the shipping method for the order. The plugin should do these effects after installation : 1- A new shipping method under our company name should appear on the checkout page. 2- A Settings page for the plugin to enter shipping-company-API-key, so the open cart store can be linked to a particular account in our
...application that was running fine on EC2. I ported it to [login to view URL] and this I got this error when I tried to access one section of the site. ERROR error detail The File Name : /home/...../[login to view URL] In The Line : 96 Error No : 1045 Error Say : Access denied for user '........'@'localhost' (using
...our phone system. "To help us serve you better, please be prepared with the following information: -The account holder’s name -The employer of the account holder, and -The last 4 digits of the account holder’s Social Security Number If you are not the account holder, please have the account holder available to come on the line and give permission
...researched this and is doable with libraries. First we thought about detecting special face gestures. But then we thought that if it's about a security related topic, doing a special face will not increase the security very much. So we concluded that combining the already implemented facial recognition techniques to create a system where the phone tells the
Hello everyone We want to build a whmcs plugin for payments The name of the addition will be Atfawry ------------ We want the user to add via the control Panel information such as Merchant code "User numer" and Security key to start taking advantage of plugin ---------- The code and file attachment shows how the payment process is done Also we
I have an existing "GUEST" SSID that is currently being abused by users because the password is shared among them. I need this to change. Below is what i am looking for: 1. Users need to self-register to get login details before being granted access to the internet. 2. Access is only for 1 hour 3. Login details are temporary (Just like in airports and restaurants) 4. No downloading/adul...
...that open source project: 1) Make the user Subscribe (put their email and name) when they want to follow a price so they get email when the price dropped. 2) Add a database Mysql so everytime a user "follows" an item we get that info in the database ( needs a simple api no security to write into the db the users emails and the products they are following
...document and pretty bland. I want someone to work on the design so it look professional. I have included an example of what I want it to look like below titled "The Politics of Security in Ninewa". Since I'm not 100% finished with it, I need your first draft back by March 25th in a word document that I can edit, and then have you finish it over the next weekend
...with the Google search engine • Metatag: Configure the metatags according to the Redirect entity: Configuration of the pages Apply general improvements in performance and security: • Install and configure a captcha module for the forms. • Cache the pages and blocks. • Compress css and js files. • Reduce the size of the images, so that they load faster
...( add new or delete ), read the user of it, and compares with the user of the mailboxes. Example: 1. User Max should get access on Project Love 2. He will added to the Security Group Team_test123, this group is a member of group DE_Muc 3. The Group DE_muc has severeal members and is in the OU ( FileAndServergroups ) 4. This script should run every
...page is linked to whmcs. Anthony has to provide you with theme 2. install WebNiC module so that customer to manage his own DNS. You have to test and make sure it works. Domain name registration and DNS management. Anthony has to provide you with DNS Module and WebNIC module. VPS 3. Install and configure 12 Standard Windows VM Plans running on VMware
I need a logo for my company : information security, data protection and privacy management. The name of the company is iCircle
...will shown as filled roots and many more.. This chart part will be discussed in detail. 4. Generate invoice 5. Generate prescription, add/edit data related to drugs name/dose etc . 6. Send Auto eReminders to patient. SMS/EMAIL/Automatic voice calls 7. Share patient treatment data with patient via SMS/EMAIL/WHATSAPP or any other way 8. Auto
- Logo Design - Business card design - Brandbook - Letterhead - Email footer - Envelopes - Preparation of graphics for Facebook, Instagram
...functionality complete. - Deliverable #3: Deploy (upload to cloud host) and test system Requirements: - Above all, the application must be secure. Maybe SaaS Tier 4 Security or close. - Database must be in SQL (MS SQL or MySQL), leaning toward using AJAX but flexible. - Assign permissions - Administrative controls Multiple levels will be included
...Daddy shared Linux server with MySQL database and cPanel control panel Tasks: Move files and database Change scripts to ensure website is working Transfer domain name (if needed) Update security certificate. Update domain nameservers Result: Website up and running with new hosting provider and everything works as before 1 day downtime max To be done before
...trust can then decide how to deal with the situation, what to do (e.g. try to call the user, visit, call police.) Note: User can chose person(s) of trust by entering his-her name an phone number. 4. Emergency button for user to quickly inform person of trust that he/she needs help anytime (e.g. fallen down the stairs, burglars in house....)...
...Bootstrap interface ADMIN PANEL: Create user account - School name (varchar) - School ID (varchar) - School Logo (image upload) - School Password (password) - School Message (longtext) Edit User Account - Edit the above information Document Categories - Create Category - - Category Name - - Category Image - Edit/Delete Category Functionality File
...these VPS should have different space, core's, memory and space 3. Each of these VPS should be set the name servers (we would like to have for all VPS's the same name server) 4. The mail server should be set to work perfectly on a high level of security 5. We need to set a backup server solution (we need to discuss it with you) 6. Install some plugins
We have 10 stores in various locations. Each store has 4 POE security cameras attached to NVRs. The NRVs are connected to the Internet. All equipment in manufactured by Lorex. We can connect to the cameras via the Lorex app, but we would like to have a wordpress website that our team can visit that shows feeds from all stores. We want our website to
Hi. I have a security and speed business that help other Wordpress websites running there pages. I will have some help to make a backend system where they can make there own users. [login to view URL] - In this link there have to choose there plan for subscription. If they choose the small plan they come to this site ([login to view URL])
I baiscally run an IPTV server. Recently the ISP are blocking my IP (Dedicated server ) during certain times of the day. The end user can switch on to VPN an use my service as normal. This is quite a headache for all my clients.. So basically i want to to install this stopped maybe a vpn on my dedicated machine which is running Ubuntu can work but I would not like to slow down traffic. Or if you ...
...show the category hierarchy of the product - The product images should also be loaded into an ordered List, and the images should be extracted to a directory using the product name (if any characters are found that cannot be used in a file structure, replace the chars using a simple map look... i.e '+' can be replaced with 'plus' and spaces can be replaced
...configuration and security settings, and the ability to trade email messages with other users. Phase I is to build a Version 1.0 of a functioning client-side email app that will allow users to add and use their Gmail account. C. Future Project (not in scope for Phase I) In Phase 2, the email client will be designed to provide security and privacy for
...meet. A friendship app that allows you to create and share events 1 - REGISTER I as a client wish to register in the app by email, facebook or gmail. Registration screen: Name E-mail Telephone (with code area mask) Gender Age City State Photograph Profile Summary Event preferences (boxes for selection) Buttons: Register and Cancel Validation: the
-security for web ([login to view URL]) -payment methods-credit card(visa and mastercard), webmoney, skrill -languages-english, czech, german, french, spanish, russian, portugese -site will be available in every country worldwide -support section -sign in and registration section(name, email, password, adress and phone number) phone number and email will
De...Strategy - IT vision & mission - IT end users ( customers) - IT Infrastructure ( Geographical locations, data-centers , Servers , Storage, Networking, Security systems) - IT Applications ( application name , application description, type of users , number of users,...) - IT 2019 Projects as per IT Strategy - IT Department Achievements
...think of that idea and gives them resources of where they could go next. Any and all security features that are necessary for a website such as this. Aestetically looking with cool designs The website will be called [login to view URL], although I will need to buy the domain name first. Please reach out if you are interested and send me a quote when you get the
Hello, I'm looking for a logo for my company. The companies name is breakIT-Security and I'm an IT Security Specialist. My approach is offensive, so I attack servers or networks to find an exploitable vulnerability. That's the cause for naming it "breakIT-Security". I break the application or break into a server to secure it afterwards. My cus...
...someone who can provide me with a secure PHP contact form mailer that meets my requirements. Please have the time available to complete this task in one day. In terms of security, I have no preference for the way in which spam/bots are blocked, but it should follow the latest best practices. Google's reCAPTCHA V3 might be an idea, but if there are
Hello, We are running a small internet business, and our local team developed a mobile app that will allow users to recharge and other activities. We need a third party to evaluate the vulnerabilities in the application and the backend system.
B...and implementation services in the security industry. Key security solutions : smart access control, cameras and virtual services. I'm looking for someone to create a logo that is creative, not typical and most importantly great for branding. I don't want a camera in the logo. Needs to be eye-catching. Business Name: DP PROTECTION SERVICES INC.