Spring security työt
My WordPress site is fully updated—core, themes and plugins—except for PHP, yet Google has slapped a “Dangerous website” label on it. I need an experienced WordPress security specialist to step in, track down whatever malicious code remains, eliminate it completely and help me clear the warning. Here’s what you’ll walk into: • Latest WordPress version running on shared hosting • Sucuri is active, but the last scan only told me something is wrong without pinpointing the infected files • I have no idea where the malware hides, so discovery is part of the job What I expect from you: 1. Run a thorough scan (Sucuri dashboard, WP-CLI, or your preferred tools) to locate every infected file, database entry or backdoor. 2. Remove o...
...Retrieval-Augmented Generation (RAG) systems through a behavioural data-science lens, and I’d like a collaborator to help me shape the theoretical framework from the ground up. What I need now is structured brainstorming that turns my initial ideas into a solid, defensible design: clarifying the central research questions, mapping the relevant literature on accuracy, performance, cost, scalability, security, and privacy, and selecting evaluation metrics that make sense for behavioural data science. I’ll be working with Python-based tooling the usual OpenAI endpoints—so experience with these environments will make our discussion far more concrete. Deliverables I’m looking for: • A concise framework outline (problem statement, hypotheses, variab...
...background service on an Android phone that "listens" for bank SMS or notifications (HDFC, SBI, PhonePe, etc.). * Instant Verification: It scrapes the UTR number and Amount from the message and sends it to the Mac. * The "Auto-Green" Moment: The billing screen on the Mac/Tablet turns green automatically the second the payment hits. No manual checking required. 2. The "No-Scam" Audit System (The Security) This solves the problem of managers stealing cash or faking entries. * Shift Tracking: Logs the exact time a manager logs in and out. It calculates "Active Hours" so they can't lie about how long they worked. * Manager ID Stamps: Every bill (Cash or UPI) is permanently tagged with the manager's name. * Audit Trail: If a manag...
I need a brand-new Gmail inbox opened for my U.S-based company. Set the display name to the company name only, lock the locale to the United States, and clear any first-time security prompts before handing it over. Security basics must be in place: enable two-step verification, add the alternate email I’ll provide as the single recovery option, and run an initial spam-filter pass. Branding is minimal—no logo—just include a tidy footer that shows the company name and website URL. Deliverables • Working login credentials • Confirmation the account is recognised as U.S. based with all prompts dismissed • A short note listing every setting you touched (labels, filters, forwarding, etc.) and how I can adjust them later No Google A...
...that feeds directly into my CRM (I’ll supply API details). Alongside those pages, I also need two WordPress sites spun up on the same brand guidelines. I’ll provide hosting access, a sitemap for each site and all copy. You’ll handle: • Theme selection or lightweight custom theme development • Responsive layout, accessibility best practices and performance optimisation • Plugin setup for security, caching and the same contact-form integration used on the landing pages • Final hand-off with clear instructions so my team can edit content without touching code Acceptance criteria 1. Three standalone landing pages delivered in HTML/CSS (or Elementor/Gutenberg blocks if you prefer) with embedded, functioning CRM form. 2. Two WordPres...
...Beyond the core protocol, I will also require built-in wallet support and a smart-contract layer so third-party developers can deploy dApps once the network is live. Security is paramount; every component—from key management to consensus—must be hardened against common attack vectors and accompanied by clear documentation. Key deliverables • PoW node software and full network setup (testnet + mainnet) • Fiat-collateralized stablecoin issuance and redemption module • Cross-platform wallet integration (mobile / web / desktop) • Smart-contract functionality exposed to developers (gas model, VM, SDK) • Comprehensive security review, load testing, and deployment guide Acceptance criteria • Stable block times and finality on ...
Rekisteröidy tai kirjaudu sisään nähdäksesi tiedot.
...(2/16). All of the data points, background material, and high-level requirements for the new district-wide database are already prepared on my end; your role is to shape them into a clear narrative that resonates with School District Executives. Content to include: an Executive Summary that highlights value and urgency, a succinct but accurate Technical Details section covering architecture and security, and an Implementation Plan that shows phased rollout and support. Because the audience is primarily non-technical leadership, each section should balance precision with accessible language. You are free to choose formatting and visuals that best convey the message. I only ask that the final deliverable be provided in both an editable format (Word or Google Docs) and a ready-to-...
...the current site is part of this job. Live video integration is secondary. The Evolution stream is expected to be HLS and must be embedded securely with domain locking. No re-hosting or re-streaming of video is required. The platform is expected to attract high traffic, so the architecture must be lightweight and optimized. The server is limited, therefore efficiency is critical. Additional security protections and domain locking are required to prevent cloning or third-party scraping. Before any payment, the system must be fully tested and demonstrated. Proof of uninterrupted scraping beyond standard session timeout limits is required, including evidence that no rounds are missed during continuous operation. Once the data scraping system is stable and verified, the project w...
We are looking for an experienced full-stack developer or development team to build a complete Society / Apartment Management Software for residential housing societies. The solution should include a Web Admin Panel and Mobile Applications (Android & iOS) for residents and security staff. The software must be scalable, secure, and user-friendly. Scope of Work: The system should include the following core modules: 1. Member / Resident Management - Owner & tenant database - Flat/unit management - Document upload (KYC, agreements) - Move-in / move-out tracking - Parking allocation 2. Billing & Accounting - Monthly maintenance auto-generation - Custom charge creation - Late fee & interest calculation - Online payment integration (UPI, cards, net banking) - Receipt ...
deploying the official open-source backend components and integrating them with various third-party services for full functionality. • mainly our requirements our own infrastructure Self-Hosted with Cu...for compiling the source code. • External Service Dependencies For a fully functional "Signal" experience, you must configure external APIs in your config .yml: • SMS/Voice: FCM/Twilio for user registration OTPs. • Push Notifications: Firebase (FCM) for Android and APNs for iOS. • Storage: AWS S3 for profile photos and message attachments. • Spam Protection: Google reCAPTCHA for registration security. • Clone the Repo: Get the source from the Official Signal-Server GitHub. • Build the Project: Run ./mvnw clean test or mvn insta...
...counters) Call to Action Section Contact Form (with Google Map integration) Footer with quick links & social icons Technical Requirements WordPress (latest version) Elementor (preferred) or similar page builder Premium creative agency theme (suggestions welcome) Fully responsive (mobile, tablet, desktop) Speed optimized (Google PageSpeed 85+ preferred) SEO-friendly structure Contact form integration Security and basic optimization setup Clean and scalable code Design Expectations Modern corporate & creative look Smooth scrolling Sticky header Hover animations Professional typography Clean spacing and alignment Minimal and conversion-focused layout Required Integrations Contact Form (WPForms or Contact Form 7) WhatsApp Chat (optional) Google Analytics Basic SEO plugin (...
...(reCAPTCHA or equivalent) Calendly integration (“Book a Call”) GA4 + Google Tag Manager installation + basic event tracking Cookie consent banner if needed Clean on-page SEO foundations (meta titles/descriptions, OG tags, sitemap, clean URLs) 301 redirect support if we change URLs Performance, Accessibility & Security Mobile-first responsive build Fast loading pages (Core Web Vitals friendly) Accessibility best practices (semantic HTML, readable layouts) SSL/HTTPS and basic security best practices Secure forms (spam prevention, CSRF protection where applicable) What We Provide Final long-form SEO website copy (5,000+ words for Venttraffic Media + 2,000+ words for Labs) Page structure and service list Brand direction and any logo/assets we hav...
I already have a live Google Business Profile, several Google Ads campaigns, and a Meta Business account running across Facebook and Instagram. The fundamentals are in place, but performance has stalled. I need a specialist who can step straight into these existing ...campaign structures, audiences, and creatives where needed • Set up custom conversion tracking and pixel/GA4 events to ensure clean reporting • Provide a weekly performance snapshot with concise recommendations • Walk me through results on a short call every two weeks Everything is already verified and billing-ready, so onboarding should be fast. Access will be provided via proper user roles; security and data integrity are essential. If you have proven results in similar multichannel setups, I&rs...
...QA Engineer – Cybersecurity Product (Reverse Proxy Server) Position Title: QA Engineer Location: Mumbai, India (Hybrid/Remote options available) Domain: Cybersecurity – Reverse Proxy Server Development and enterprise data security while using the cloud services Framework: Agile/Scrum Role Overview We are seeking a detail-oriented and security-aware QA Engineer to ensure the quality, reliability, and resilience of a cloud-native reverse proxy server. You will be responsible for designing and executing test plans, automating test cases, and validating security features in a fast-paced Agile environment. Your work will directly contribute to the robustness of a critical cybersecurity product. Key Responsibilities • Design, develop, and execute...
...hand to my electrician/cabling installer. I have a strong preference for the Ubiquiti (UniFi) ecosystem for networking and security. Scope of Work: Home Network (Ethernet/Wi-Fi): Design a robust Ubiquiti UniFi network topology. Determine optimal Wireless Access Point (AP) placement for coverage across three floors + outdoor areas. Plan CAT6a drop locations for TVs, office workstations, and backhaul. Whole House Audio: Design wiring zones for multi-room audio (in-ceiling/in-wall speakers). Designate "Home Run" locations to a central rack/AV closet. Recommend speaker placement for optimal acoustics in key areas (Home Theater, Great Room, Kitchen, Patio). Security & Surveillance: Placement of PoE cameras (UniFi Protect series preferred). Locations f...
...and high-level user flows; now I’m ready to turn that vision into audited code. Here’s what I expect from this engagement: • Architecture & specification – refine requirements with me and translate them into a concise technical spec. • Development – implement the contracts in Solidity using best-practice libraries such as OpenZeppelin, with comprehensive unit tests in Hardhat or Truffle. • Security & gas optimisation – apply industry-standard patterns, write clear modifiers, and run automated analysis (Slither, MythX, or similar) before handing the code over for an external audit. • Deployment & hand-off – provide scripts for testnets and mainnet, full documentation, and a walkthrough so my in-house engin...
...public rollout, I want a rigorous penetration test that will expose any weakness and help tighten every layer of security. The assessment must be hands-on and realistic, covering the full stack rather than a purely theoretical review. Scope My priorities are clear: • Code review – comb through the source for injection points, authentication flaws, insecure dependencies, and logic errors. • Network-level probing – map open ports, misconfigured firewalls, and potential lateral-movement paths. • Server configuration – evaluate patch levels, TLS setup, permissions, and hardening of the underlying OS and web server. Primary Goal The sole purpose is to improve the overall security posture of the application; compliance check-boxes are...
I need a straightforward Android application that lets my customers send money to me by bank transfer. After signing up or logging in with the classic username-and-password flow, a user should be able to choose an amount, see (or pre-fill) my banking details, and push the payment through an integrated bank-transfer API. Security is critical, so the credential flow must be encrypted end-to-end and the transfer requests signed or otherwise verified to prevent tampering. A lightweight backend—REST or Firebase Cloud Functions is fine—can manage authentication, session tokens, and payment-status webhooks. Please deliver: • Full Android Studio project (Java or Kotlin) • Secure username/password authentication flow • Bank-transfer API integration with s...
I need a high-quality, original master's degree certificate from CSU University in the field of Business and Finance. The design must be authentic and replicate the university's official certificate. Requirements: - Proven experience in creat...certificate from CSU University in the field of Business and Finance. The design must be authentic and replicate the university's official certificate. Requirements: - Proven experience in creating official documents or certificates - Attention to detail to ensure accuracy and authenticity - Ability to replicate university-specific designs Ideal Skills: - Graphic design proficiency - Experience with security features to prevent counterfeiting - Knowledge of certificate layout for academic degrees Please provide samples of s...
I’m starting from scratch and want... and any other must-have utilities, plus tips on safe virtual-lab configuration. • Practical assignments after each module so I can apply what I’ve learned, and short answer keys or walk-throughs that still force me to think before peeking. • A progress-tracking template so I can see how far I’ve come and what’s next. If you’ve mentored newcomers before or designed material for CompTIA Security+, CEH, or OSCP prep, tell me—real teaching experience matters here. Once I have the material, I’ll work through it independently, but I’d appreciate limited post-delivery Q&A in case I hit a wall. Please outline how you’d structure the syllabus, list any platforms you’d lean ...
Security Engineer to implement advanced application-layer security improvements, session control, and structured framework upgrades. This is a higher complexity engagement involving architectural work and controlled deployment. Scope of Work 1. Concurrent Login and Session Management Design and implement controlled session management. Responsibilities Implement Redis or ElastiCache-based session tracking Develop middleware to prevent unauthorized concurrent sessions Build configurable session policies Implement detailed audit logging Ensure compatibility with mobile clients Support emergency break glass access scenarios Healthcare-aligned audit logging is required. 2. Administrative Portal Access Control (Optional VPN / Zero Trust) Secure administrative access to sens...
Security Engineer to implement advanced application-layer security improvements, session control, and structured framework upgrades. This is a higher complexity engagement involving architectural work and controlled deployment. Scope of Work 1. Concurrent Login and Session Management Design and implement controlled session management. Responsibilities Implement Redis or ElastiCache-based session tracking Develop middleware to prevent unauthorized concurrent sessions Build configurable session policies Implement detailed audit logging Ensure compatibility with mobile clients Support emergency break glass access scenarios Healthcare-aligned audit logging is required. 2. Administrative Portal Access Control (Optional VPN / Zero Trust) Secure administrative access to sens...
Security Engineer to implement advanced application-layer security improvements, session control, and structured framework upgrades. This is a higher complexity engagement involving architectural work and controlled deployment. Scope of Work 1. Concurrent Login and Session Management Design and implement controlled session management. Responsibilities Implement Redis or ElastiCache-based session tracking Develop middleware to prevent unauthorized concurrent sessions Build configurable session policies Implement detailed audit logging Ensure compatibility with mobile clients Support emergency break glass access scenarios Healthcare-aligned audit logging is required. 2. Administrative Portal Access Control (Optional VPN / Zero Trust) Secure administrative access to sens...
Security Engineer to implement advanced application-layer security improvements, session control, and structured framework upgrades. This is a higher complexity engagement involving architectural work and controlled deployment. Scope of Work 1. Concurrent Login and Session Management Design and implement controlled session management. Responsibilities Implement Redis or ElastiCache-based session tracking Develop middleware to prevent unauthorized concurrent sessions Build configurable session policies Implement detailed audit logging Ensure compatibility with mobile clients Support emergency break glass access scenarios Healthcare-aligned audit logging is required. 2. Administrative Portal Access Control (Optional VPN / Zero Trust) Secure administrative access to sens...
Cloud Security Specialist – Immediate Infrastructure Hardening (Short Term) Project Overview Duration: 3 to 5 days Location: Remote Start: Immediate A healthcare technology platform requires a Cloud Security Specialist to implement quick security improvements identified in a recent penetration assessment. This is a focused, short-term assignment aimed at reducing immediate attack surface exposure at the infrastructure layer. Scope of Work All listed tasks must be completed. 1. Server Version Disclosure Prevention Remove server and framework version information from HTTP responses. Responsibilities Configure AWS Application Load Balancer to remove server headers Update CloudFront response headers policy Disable X Powered By headers in Customize error re...
Cloud Security Specialist – Immediate Infrastructure Hardening (Short Term) Project Overview Duration: 3 to 5 days Location: Remote Start: Immediate A healthcare technology platform requires a Cloud Security Specialist to implement quick security improvements identified in a recent penetration assessment. This is a focused, short-term assignment aimed at reducing immediate attack surface exposure at the infrastructure layer. Scope of Work All listed tasks must be completed. 1. Server Version Disclosure Prevention Remove server and framework version information from HTTP responses. Responsibilities Configure AWS Application Load Balancer to remove server headers Update CloudFront response headers policy Disable X Powered By headers in Customize error re...
...of truth Establish controls, QC, and reporting frameworks Deliver a pre‑opening marketing & teaser website transitioning into a full hotel website Provide customisation support for 3 months post‑go‑live Deliver graphic & branding assets aligned to Velora’s identity 3. Odoo Modules & Functional Scope 3.1 Core System Setup Odoo 19 Enterprise base configuration User roles, access control & security matrix Multi‑company / multi‑department structure Master data setup (products, services, rooms, assets) Backup, logging & audit trail configuration 3.2 Hospitality & Accommodation Management Hotel Operations Pragmatic Hotel Management module configuration Room & unit hierarchy (types, views, pricing tiers) Daily, weekly, monthly & long‑...
...productivity but require deep technical expertise to implement correctly. Required Expertise: Your background should include full-stack development across web (React, , Vue, or similar) and mobile platforms (React Native, Flutter, or native iOS/Android). You must demonstrate proficiency with AI-assisted development workflows, writing production-grade code with proper architecture, testing, and security practices. Experience deploying to cloud platforms (AWS, Google Cloud, Vercel, or similar) and working within CI/CD pipelines is essential. We expect you to maintain code quality, implement best practices, and deliver scalable solutions even when moving fast. What Sets You Apart: Show us your portfolio of production applications built using AI tools, with measurable results on de...
I’m launching a small online store focused on bio-regulators and need an end-to-end e-commerce site that can take secure Credit/Debit Card payments from day one. I haven’t committed to a specific platform yet—Shopify, WooCommerce, Magento or another option could all work—so I’d value your guidance on which stack offers the best balance of security, scalability and ease of use for a lean operation. Core needs • Branded storefront with intuitive product pages, cart and checkout • Payment gateway setup for real-time card processing (PCI-compliant) • Responsive design that feels native on desktop and mobile • Basic inventory management, order notifications and a simple dashboard I can run myself • SEO-ready structure and ...
...system you built that executed large batches of Solana transactions. How did you manage blockhash freshness? How did you handle transaction failures under load? 5. Fee & Latency Optimization What concrete steps have you taken to reduce Solana transaction latency? Mention compute units, priority fees, pre-signed transactions, or other optimizations you’ve actually used. 6. Key Management & Security How have you implemented secure key storage for automated Solana trading? Have you used AWS KMS or HSMs? How do you sign transactions without exposing private keys?...
I need a cohesive trio of print pieces—brochure, business card, and flyer—that all speak the same visual language and clearly promote our security solutions. A complete brand guide is already in place, so every layout, colour choice, and font decision must stay firmly within those parameters while still feeling fresh and engaging. Here’s what success looks like for me: • Brochure: a clean, professional multi-panel layout that walks prospects through our key security offerings in a logical flow. • Business card: a sharp, minimalist design that instantly signals trust and authority when handed over in meetings. • Flyer: a concise, visually striking one-pager for events and leave-behinds, highlighting our top services at a glance. Final ass...
...analytics and outputs only (no raw data sharing) 2. Evaluate Build vs Buy o Compare building from scratch vs existing solutions o Pros/cons, cost, scalability, vendor lock-in o Examples of real-world implementations 3. Technology recommendations o Cloud or hybrid architecture o Tools for privacy, access control, encryption o Possible use of BigQuery, Snowflake, AWS Clean Rooms, or custom stack 4. Security & Governance o Data access rules and roles o Auditability and traceability o Compliance-oriented design (financial / credit data context) 5. Deliverables o High-level architecture diagram o Recommended tech stack o Decision framework: build vs buy o Optional: roadmap for implementation Nice to have (big plus) • Experience with credit bureaus, banks, fintechs, telecoms, ...
...analytics and outputs only (no raw data sharing) 2. Evaluate Build vs Buy o Compare building from scratch vs existing solutions o Pros/cons, cost, scalability, vendor lock-in o Examples of real-world implementations 3. Technology recommendations o Cloud or hybrid architecture o Tools for privacy, access control, encryption o Possible use of BigQuery, Snowflake, AWS Clean Rooms, or custom stack 4. Security & Governance o Data access rules and roles o Auditability and traceability o Compliance-oriented design (financial / credit data context) 5. Deliverables o High-level architecture diagram o Recommended tech stack o Decision framework: build vs buy o Optional: roadmap for implementation Nice to have (big plus) • Experience with credit bureaus, banks, fintechs, telecoms, ...
Job Description We are seeking an experienced SEO and Google Ads Specialist to manage digital marketing for two separate businesses: A Construction Company A Security Services Company This role includes setting up new SEO and Google Ads accounts from scratch and migrating existing Google Ads campaigns into the new accounts, ensuring proper structure, tracking, and optimization. This is a monthly, ongoing partnership based on performance and results, focused on generating high-quality leads and maximizing ROI. Scope of Work SEO (Both Companies) Full SEO audit and strategy development Keyword research for local service-based businesses On-page optimization (meta titles, descriptions, headers, content) Local SEO & Google Business Profile optimization Technical SEO (site ...
We are seeking...prevent downtime. Support would also cover software installation and updates (including clinical and practice management systems - Best Practice), email systems, cloud services, data storage, compliance with healthcare data protection regulations, user access controls, hardware procurement and lifecycle management, troubleshooting, helpdesk support for staff, and ensuring overall system performance, security, and reliability. As a medical centre, maintaining patient data confidentiality, system uptime, and secure communications is critical, so we are looking for a proactive partner who can ensure our IT environment is secure, compliant, and operating efficiently at all times. NOTE: Looking for a monthly contract (renewable every month). Rates will be discussed and n...
We are seeking...prevent downtime. Support would also cover software installation and updates (including clinical and practice management systems - Best Practice), email systems, cloud services, data storage, compliance with healthcare data protection regulations, user access controls, hardware procurement and lifecycle management, troubleshooting, helpdesk support for staff, and ensuring overall system performance, security, and reliability. As a medical centre, maintaining patient data confidentiality, system uptime, and secure communications is critical, so we are looking for a proactive partner who can ensure our IT environment is secure, compliant, and operating efficiently at all times. NOTE: Looking for a monthly contract (renewable every month). Rates will be discussed and n...
is seeking an experienced web application security specialist to address specific vulnerabilities identified in our recent penetration testing assessment. As a healthcare technology company specializing in innovative oral health monitoring solutions, we prioritize robust security standards and regulatory compliance. This is a focused, short-term engagement to remediate six specific security findings in our web application infrastructure. We need an independent contractor who can take full ownership of implementing these security fixes efficiently and professionally. Scope of Work - Specific Vulnerability Remediations Based on our completed Web Penetration Testing assessment, you will address the following security findings: 1.-n/a 2. Server Version D...
is seeking an experienced web application security specialist to address specific vulnerabilities identified in our recent penetration testing assessment. As a healthcare technology company specializing in innovative oral health monitoring solutions, we prioritize robust security standards and regulatory compliance. This is a focused, short-term engagement to remediate six specific security findings in our web application infrastructure. We need an independent contractor who can take full ownership of implementing these security fixes efficiently and professionally. Scope of Work - Specific Vulnerability Remediations Based on our completed Web Penetration Testing assessment, you will address the following security findings: 1.-n/a 2. Server Version D...
...conflicts between Elementor generated pages, Blogger generated posts, Gutenberg Classic and Block rendered posts - Review Plugin conflicts, and list plugins that are no longer needed - Look for ways to speed page and post loading - Identify why YouTube insert blocks in blog posts are now blank - Find remedy for post load blocked because it doesn’t appear in the worker-src directive of content security policy - Search Console error: The resource/themes/astra/assets/fonts/ was pre-loaded using link preload but not used within a few seconds from the windows load event. The site is focused on art and tutorials, so it is image focused with inserts from tutorials on my YouTube Channel The site was started in 2005 on blogger, and imported to WP in 2015. There are a little over 6...
...Validate SPF/DKIM/DMARC are not broken (only fix if misconfigured; no full deliverability consulting required). Deliverables Working sending flow (test email + successful small campaign). Correct cron configuration documented (exact cron line and schedule). Summary of changes made (files edited, services restarted, commands used). Short troubleshooting checklist for future incidents. Access & Security Requirements (Non-Negotiable) To be considered, you must agree to the following: Temporary Access Only Access will be provided via SSH key or temporary user. No permanent credentials will be shared. No Data Exfiltration You may not copy, export, download, or store subscriber lists, campaign content, or any sensitive business data outside the server. Access Removal &...
- **Core Architecture:** Spring Cloud + Kafka + Hadoop + Python Automation,This project requires a certain level of technical expertise.
- **Core Architecture:** Spring Cloud + Kafka + Hadoop + Python Automation,This project requires a certain level of technical expertise.
...QR-code scanner so a user can point the device camera at a code and have the relevant fields auto-populated. • Layer in voice entry with Azure Speech-to-Text so spoken values fill the same fields hands-free. Both methods need to respect my existing validation rules and work seamlessly on the current phone and desktop form factors. Back-end refinement Security is a priority: please tighten role-based access and any relevant Dataverse security layers so the new data capture routes do not open loopholes. At the same time, structure the data so it is analytics-ready—in other words, clean relationships, consistent field usage and documented calculations. Power BI dashboard Build a single report (embedded or linked) that gives: • Real-time data tracki...
...tracking. • Security → deliver students (optional) Features: • Login • Class & student list • Attendance marking • Reports & notifications 2) Oracle APEX Backend System Users: • Admin • Teachers • IT Staff Project Phases & Timeline (2 Months) Phase 1 – Analysis & Planning (Week 1) Duration: 5 days Tasks: • Requirements gathering about school data • Define user roles: o Admin o Teacher o Security o Parent • Define workflows: o Student delivery flow • System architecture design • Database ERD design • UI/UX wireframes (mobile + APEX) Deliverables: • Requirements Document (SRS) • Data Model (ERD) • Flow Diagrams • Project Schedule Phase 2 – Database ...
...Incremental sequence number • Requirements:• No duplicates • Concurrency‑safe logic (e.g., locking or controlled updates) • Easy to modify rules in the future 5. SharePoint List Storage (Preferred) • Use SharePoint Lists to store:• Last used sequence number per region/year • Region mappings • Audit history of generated IDs • Configuration settings • Must be structured for easy admin updates. 6. Security & Governance • Follow Power Platform and Teams governance best practices. • Store API keys and secrets securely (e.g., environment variables, Azure Key Vault if needed). • Ensure proper permissions for SharePoint and Teams integration. 7. Documentation & Handover • Provide:• Solution arch...
I need help tracing harassment issues related to cyberstalking. I suspect my LinkedIn account has been compromised, and I'm receiving harassment on email and other online platforms. Key tasks include: - Investigating unauthorized logins and profile changes on my LinkedIn. - Identifying sources of har...compromised, and I'm receiving harassment on email and other online platforms. Key tasks include: - Investigating unauthorized logins and profile changes on my LinkedIn. - Identifying sources of harassment on email and other platforms. - Providing a report of findings and recommendations to secure my accounts. Ideal skills and experience: - Experience with cybersecurity - Familiarity with LinkedIn security protocols - Strong investigative skills - Ability to provide clear...
I need a reliable developer to build a WordPress site that lets my small business do two things smoothly: present our ...customers to complete the transfer. I already have hosting and can supply the logo, brand colours, product photos and copy. What I don’t have is a theme or any custom templates, so you’ll start from a clean WordPress install, choose or tweak a responsive theme that matches our identity, configure the catalogue, add the e-commerce layer, and make sure everything looks good on mobile. SEO basics, security hardening and a short hand-off session (video or written) are part of the hand-over so I can manage products and orders myself afterward. If you have recent examples of similar showcase-plus-shop builds, please link them when you respond; it will spee...
...wallet handling and monitoring logic • Recommendations for the role model: Admin → Distributor → Shop → End Customer • A technical setup for a self-custody wallet with biometric security features • A workflow for QR-based token transfers between roles • A concept for automatic token classification (Clean / Unverified) and an audit trail • A rough effort estimation and identified technical risks Additionally, I require guidance on API integration for external partner platforms to ensure that future fiat purchases outside the app can be integrated seamlessly. If you have experience with Solana, mobile wallets, and security architectures, I look forward to your proposal and a brief overview of similar projects you have implemented. ...