E-commerce website list crawl bot (30$). Hello! Thank you for having interest in this topic. I need a programmed tool that could crawl on websites in the search result. or any tool that could pull off a list of e-commerce websites in certain region or country. and make it into a list. requirements are explained below. Please look into it :)
I need some help with home security warm transfers, you will be paid for successful warm transfer . We will be doing sales at our end . Pls do not waste our time if you don’t have experience in home security warm transfers . Thanks
I need a pro. who can obtain Lists of videos Titles of some youtube channels , only the videos titles of the each required channel.
... and adding content. I will have a discussion with the developer before hand and gauge their experience according to what I need to get done. Go through the task list, and make a list of things you need from me. I have thought things through and have prepared certain items, but let me know if I missed something. Tasks: Add a cleaner theme Create
...front end app developed with React native and all of them are linked to one back end with NodeJs . It will also include an online payment that have to respect some rules of security (encrypted data, SSL ..) and a map API so that the client can see the real time location of the delivery man. More information will be specified in the specifications. The
The scope will include the following: A) Site recovery and updating security concerns from the existing back. Repair the below website error: Fatal error: Uncaught Error: Call to undefined function nocache_headers() in /home/wxh0sk9hrs4d/public_html/wp-admin/[kirjaudu nähdäksesi URL:n] Stack trace: #0 /home/wxh0sk9hrs4d/public_html/wp-admin/[kirjaudu nähdäksesi URL:n](1...
Looking for help setting up a Synology Diskstation with SSL and a private domain name, ac...Diskstation with SSL and a private domain name, access through my router (the diskstation has an internal static IP) setting up tight security policies and firewall rules, and implementing best practices for data security, virus protection and automated backup.
Need an engineer who could architect hadoop cluster on aws cloud, Need to prepare an architectural diag. in detail highlighting the security/governance when implemented in cloud using AWS infrastructure. Knox , KMS ranger etc person should be proficient in AWS and HDP
I need to list available apartments for rent on page /available-rentals. There will need to be a selected image for the thumbnail image, address, price, security deposit price, and a link to view the details and an "apply" button. Then each location will have a details page with additional info fields. ie bedrooms, bathrooms, amentities, etc. And
...through OTP d. User can add other users who will be notified when the user does uploads and sends documents or recipient downloads the document. e. User can add a predefined list of nature of documents or document description and the system can learn the same as well. f. User can see the history of his uploads and subsequent audit trail g. User can search
Hello i have problem with my dedicated server he atack wordpress website its a virus script i need freelancer to connect with SSH in my server and see CRON for delete script thanks you
...Member's page 4. Integration with my Affiliate Program 5. Live Chat along with an app to monitor the chat via phone 6. Upload request (with document upload etc) 7. Database security 8. Customized for Mobile 9. Admin area to monitor the whole website, visitors and others. 10. Ability to export the information to an external website or application 11
...to power the web application - Building reusable code and libraries for future use - Optimization of the application for maximum speed and scalability - Implementation of security and data protection - Translation of UI/UX elements to working products - Integration of the front-end aspects of the web application Skills - English - Ability to understand
I need a logo designed. New Business Cyber Security blog site so the logo must be relevant Name will be SecureMyWorld Colours scheme to be red and black or red and white but open to some creativity. Look forward to reviewing your designs!
...is to configure the server to meet the requirements above, we'd be looking to work on an ad-hoc basis to support the running of the server and make further improvements and security enhancements. Please provide a quote for the initial project and options for an ongoing support agreement if this is available....
Hi, I am working on a mini project on the topic, "Security analysis of RPL network protocol in IOT systems". I would like to simulate Blackhole attack against RPL using Contiki cooja simulator and analyse the performance of RPL under blackhole attack (power consumption with and without malicious motes). The requirements are as follows: 1. Setup
please write some script to extract the outl...attached the screenshots please check them and extract all fields data. i'm looking for ready to use script .. it would be great if you already have this script. because of some security reasons i can't provide you an access but i can run and test your script in my environment and let you know the result.
Hi i need to sales person who can do handle to increase our email list sale. We are big company for email list provider. We need to person who can increase our sales.
Hi Guys I need a post made for my security company to use to advertise on instagram the offer we want to include is on [kirjaudu nähdäksesi URL:n] - homepage - we want to use the two popular options in the pricing table. we want to have our logo, website, contact number included on the post and it needs to be eye-catching. logo- attached website - www
I need csom based c# script to upload local files to list folder it can be one or multiple
...settings for various firewall ‘rules’ that one can use to protect the server. Basic info is here: [kirjaudu nähdäksesi URL:n] Since you're a security guy, it might be best for you to advise me or set this up. I can set up a temp password for you at Upcloud. ...
1. I will provide the link with 825 companies. find homepage and copy email. One email per home page. When its done take another company. Do this to all 825 companies. If the company dont have homepage just take another one (very small amount of companies dont have homepage). 3. All collected emails should be in excel file.
1. I will provide the link with 1943 companies. find homepage and copy email. One email per home page. When its done take another company. Do this to all 1943 companies. If the company dont have homepage just take another one (very small amount of companies dont have homepage). 3. All collected emails should be in excel file.
1. I will provide the link with 1275 companies. find homepage and copy email. One email per home page. When its done take another company. Do this to all 1275 companies. If the company dont have homepage just take another one (very small amount of companies dont have homepage). 3. All collected emails should be in excel file.
A non-fiction book, in English, about "Cyber Espionage". The number of pages will be around 100 to 200. A Ghostwriter with a background in; Espionage, Spying, Politics, Conflicts, Journalism, or Information Technology will be a plus. The Ghostwriter should share samples for evaluation which will be followed by a call for clarifying topics related
...Server 2008 and 2008 R2. Analyze the workloads to determine the best path—migrate to Azure. 3) Fine-tune the resources to optimize costs, manage resources, and strengthen security and compliance across hybrid cloud workloads. 4) Need minimum 3 months post implement support for inhouse application upgradation requirements. 5) We are looking for a resoure
I am using the centos server in aws. I want aws security configuration manual. 1. Block countries from aws 2. Allow access only to cloudflare ip 3. How to monitor traffic logs in aws or in centos server 4. How to check logs(before 3) in aws and block URL patterns in aws 5. Manual document or remote guide (i need set it myself) 6. Other additional
Hi We need professional servi...Customise Engineer Solution Product Pages - Monitoring System, Water Leak Detection System, Aircon, Carpentry works, Stainless Steel Works, Piping Works, Electrical Works, Security Access Control, CCTV, ESD turnstile, Fire Protection, Fuel Cell, Audio/Video Equipment, Contact Us. Please help to provide a solution.
hi, I m investing for building channel manager and i need build PCI DSS SaQ-D security standard for my server. [kirjaudu nähdäksesi URL:n] request that security from me. did you build such security level before? and can you do it for me? if you can, please give me price to do it on new server. obout PCI you can finde: [kirjaudu nähdäksesi URL:n]
...Development - Data Analysis and Visualization - Business Intelligence - Social Media & Marketing - Consulting - Business - Engineering - Analytics - Digital Solutions - Cyber Security The 2nd deliverable is to draft an about-us statement that aligns with the previous services. The should be 3 - 4 sentences. The 3rd deliverable is to draft a Who We
Security shirts for church security team. We want logo on the front of shirt center to cover the chest area. The rear of the shirt should read "SECURITY" across the top of the back. The short sleeve tshirt must be black.
Migrate from M1 to M2 13 ORDERS - 5 CUSTOMERS - 6 Online visit list please to M2 Need done today. Price is 15$ Fixed
I'm looking for a list of all Digital Marketing Agencies in the United States. This list should include: - Company Name - Company Address - Company Contact Information - Company Decision-Maker Contact Email - Company Phone Number
I am currently starting my bussiness, my market place and app is to do with nvesting, hedge fund and forex signals through our app and website. the website wi...50% of what it should be worth. my self as an after effects expert i know how everything works anyways so i dont want any BS on the prices. this is a long investment to your careers thank you
...with action buttons . 8.2 Employees (users) - 8.2.1. manage Employees (add , edit , delete and add role ) , and to have the employees as a list . 8.2.2 Role Permission - to be able to assign the level of security from Access , edit and delete information . 8.3. Templates : it will have the invoice , quotation , tickets , customer templates , template
...want it set up with tight security and optimized for delivering a WordPress site with decent traffic as efficiently as possible. Please include with your bid a recommendation for how you would accomplish this goal. Start with web server, database and PHP, then explain how you would lower site response times, tighten security, "harden" WordPress, implement
...applications Expert knowledge of the Spring Boot framework (including spring data, spring security) and JEE containers Comfortable using AWS and Linux to support application development and deployment Thorough understanding of application security and secure coding practices Proficient in application design and architecture Knowledge