Hi HamidAshraf, I noticed your profile and would like to offer you my project. We can discuss any details over chat. overview of the work: I need someone to review my client windows' network .. make it up and fixe issues nd recommend a security remote connection and implement it. the network is small 6-7 PCs and we need to add one or two more ...
...ISR4451-X-SEC/K9 SEC PoE 4 Port Wired Router Security Bundle (with securityk9 and ipbasek9 permanent licenses): 1. Update the 4451 to the latest available cisco iOS available for it. 2. Configure the 4451 to perform the following: Port 0 is connected to a Cox Gigablast fibre/Ethernet modem operated in bridge mode. Upload and download speeds to the Internet average
I am looking for an individual that can support technical aspects of a planned Network Security audit. Required competencies are knowledge of Network architecture and Virtual environments, as well as hands-on use of vulnerability scanning tools like Nessus and Qualys.
...heading. Come up with creative content with SEO and high quality content. You will be given only the Heading,keywords and possible some reference (domain fundamentals) if required. You should have prior experience in technical writing on Network,Data,Cloud Computing,Data Storage,Data Backup,Security. My max budget is 150INR Per PAGE. DONT BID IF YOU
Developing a Request for Information (RFI), with nee...Request for Information (RFI), with need to focus specifically on Network Security for Business. I need a minimum 700 word article that answers the following topics: Definition of Network Security, Benefit of Network Security, Current Landscape of Network Security, and Future of <...
...on the Tron Network. We need the basics for the permanent game website, complete with administrative backend for easy management, secure user accounts, individual Tron game wallets and 2fa security options for the user accounts. The structure and functionality of the website is most important right now. We can add the images, links and information
My parse cloud code for my social network needs to be rewritten for performance and security. Currently, my app has bugs and poor performance because of the cloud code. the problem with this is beforeSaves and Aftersaves are triggered anytime the object is saved or updated Remove before/after saves Make sure cloud code is secure Make sure the back4app
My parse cloud code for my social network needs to be rewritten for performance and security. Currently, my app has bugs and poor performance because of the cloud code. Remove before/after saves Make sure cloud code is secure Make sure the back4app server doesnt return any error logs Made to scale with thousands of people using at once cloud code
...net/item/olympus-html-social-network-toolkit/full_screen_preview/19755363 - PLEASE, make sure to review the pages prior to posting a bid on this project as we will be featuring about 40 of the pages here within this template. Although 40 pages may seem like a lot, most of the features can be included in Laravel blades and reused in different pages so
My parse cloud code for my social network needs to be rewritten for performance and security. Currently, my app has bugs and poor performance because of the cloud code. Remove before/after saves Make sure cloud code is secure Make sure the back4app server doesnt return any error logs Made to scale with thousands of people using at once
...SEO Team, I am searching for the right person to spearhead our needs for IT and Web development. We are a national insurance call-center with over 100 developed lead generating insurance web properties. Our call center relies upon the lead generation efforts of our websites, and we would like for the appropriate candidate to grow with us in this exciting
...setup a complete Network architecture for our Houston office and you need to let us know the BOM for this entire deployment We are building Managed infrastructure services practice and this network setup needs to designed in keeping all the compliance and security point in mind We will be basically working with multiple customers and will be look...
...tech stack is Mongo, Nodejs, ExpressJS and AngularJS and [login to view URL] Knowledge on Linux , Apache/Nginx Need extensive experience AWS tools like Autoscaling, route53, ec2 , lambda, s3, beanstalk , Mongo Atlas AWS Management tools Security Audit requirement and Using AWS Security tools , SSL and securing the network checklist Basic knowl...
...the world. Focusing on deep due diligence and a network of highly connected experts, BCS’ value proposition promises to launch a token quickly, reliably, and profitably. Arguable the more important benefit is the top tier influencer network associated with BCS. Services include creation of custom Blockchains and smart contracts, token management platform
Please read the instructions carefully and respond accordingly. Please read the magazine paper carefully. It is a short magazine paper and contains general information regarding layered architecture of Internet of Things (IoT) and Cyber Physical System (CPS). It is mentioned that what are the similarities and differences in architectures of both
Hi Ismail B., I noticed your profile and would like to offer you my project. We can discuss any details over chat. I run a small business with around 20-30 active GCP VM's. I would like to sort out the security on these as they are all currently in one network. I'd like to have a DMZ with Red, Blue and Yellow zones. Also, we are using Elastic Cloud
...are a VMware and ServiceNow partner of choice for providing services in the cloud. We specialize in bringing different cloud solutions together through automation to provide business visibility, operational awareness and a service driven focus for public and private clouds. We have been selected strategic partners for both ServiceNow and VMware. In addition
We are looking for an Application Developer with extensive Python experience to develop and support applications targeted for Linux based systems. Knowledge of Python, security, interfacing with GPS receivers, and network protocol software development is desirable. Responsibilities: • Experience working with GPS receivers • Experience with working
...nodejs, linux, security and smart contracts and are willing to take a challenge that will reward you - potentially big, up to a contract and a % on the total traded on the network - based on your skill and speed to install , hack and adapt open source software to real use cases. Initial milestone will asses candidate suitability to the role an...
...BELOW) ON COMPANY AND NEEDS OF LOGO 1. What is the name of your company? Webb Security Group LLC 2. Which words in the company name do you want to emphasize? Webb is a play on words (Webber is my last name and then web like the interweb/internet…) Also, important that people understand from looking at the logo that we are a security company looking
Starting an IT Consulting & Services Company and professional website with the following secitons Cyber Center - Design and Deployment Technology - Enterprise Video Conferencing, Video Surveillance, Phone Systems, Network Infrastructure and Wireless Technologies Security - Physical & Data Integrity (SOX, PCI DSS) Critical Infrastructure segmentation
...Shopify template • Website designing • Ecommerce • Shopping carts • Network Security Requirements User/customer Portal • [login to view URL] (This template would be provided). • Designing need to be according to the template. • Customer Registration page and it needs to be email verified (Dual verification) • Login Page
...communications system in the world. However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters the GSM network . Project requirements: No JB, Do
... operations of Vnets/ Subnets/ NSG changes and also support/troubleshoot connectivity issues within the company network (Azure and on-prem). You will be expected to work on aggressive timelines for the project, engage with application DevOps and other teams to troubleshoot highly secure and complex network environments. The ideal candidate is also
my company is NCS Technology Solutions. Networks, Computer, Security I would like a logo, that may incorporate, and network cable -- server / or monitor-- and a security camera.-- business cards -- shirts etc is what I need it for.
...must represent us and what we basically do. We are an outsourcing IT company that give: • Business IT Support: we provides efficient, fast, and friendly IT support for desktops, servers, networking devices and application • IT Consulting • Remote Support • Network Security • Cloud Services • And more The logo should be simp...
To study and analyze the existing type of WSN and their functionality. 1. Understanding the security loopholes for a clustered WSN. 2. To design an efficient secure routing protocol for cluster-based WSN, in order to ensure that critical data is always in safe hand. 3. The repercussion of varying node numbers to assess the effectiveness of the proposed
...(android/iOS) ETHEREUM wallet. Must work in an android / iOS mobile devices (mobile operating systems, like iOS 8, that exist on hardware-encrypted devices with a 'secure element' security chip, such as iPhone). Features required: Primary requirement Open source Use of latest technology by the developer Simplest User Interface (UI) with great User Experience
We are looking on security solutions for our client using OpenVPN. We go through the arthicle in : [login to view URL] We found all the following are matching to our clients environments : ~ Securely accessing company resources from anywhere ~ Site-to-site connections to bring
• Have strong experiences of network and server technologies • Well verse with technical architecture and frameworks to delivery efficiency and security issues • Comfortable to work on wordpress/Drupal/Sitecore/AEM/Kentico • Have exposure to large tech projects is an advantage • Overall responsibility to operations that are link with IT ...
...offers the chance to advance quickly as well as real long term security. The duties of this position do not involve cold calling insurance, gold, silver, oil, timeshares, outside door to door sales or having to sell to friends or family. This is not any type of multi level or network marketing and there is never any out of pocket expenses for a person to
...Cyber Security Professional to lead the security design, architecture, implementation of IT Infrastructure and Applications for a Smart City Initiative in India. The person would have deep experience in Server Security, Hardening, Security Architecture, Network Security, Configuration Review, Application Security, Web Security, End ...
...automation for purchasers, and integration of “bundling” into checkout. While these are our current needs, depending on success and alignment this could become a long-term relationship. The ideal candidate will be an expert on Shopify, will have a keen eye for design and aesthetic, will be focused on conversion rates and emphasize user experience
...in the process of launching an Online Technology Academy and we need 50-100 instructors who will partner with us to deliver course content. This is a revenue share project and each instructor must pay a $100.00 partnership fee to join the network. If you are interested and have skills and the capacity to record a 30-60 video that can be uploaded
...skill in English. Herewith, our requirement (1)IT article in client's website as white paper (2)Target: CTO, IT manager, Network specialist and so on (3)White paper topic: Related in Data Center/Network/Security/Cloud and so on (4)Word volume: 1,200-1800 words/Article (5)Language: Proper English (6)Contents quantity: 1 article/ month for 3-4mont...
Network Security and its implementation. Little theory and more labs. reply asap to get more details.
...System Admin/Cyber Security Consultant. Requirements are: - Minimum of one year hands-on experience with the AWS platform - Good Knowledge of Networking and Network Security - Good Knowledge of Web Application and Webapp Security - 2-7 years of relevant experience - Experience understanding virtualization technology - Monitoring and auditing sy...
Network Segmentation using Palo Alto Firewalls, A Palo Alto Guru with hands on with the aperture and autofocus. Basically speaking a Security architect who is proficient in segmenting the existing network architecture and come up with most secure design and enforcement for the data center and enterprise deployments.