The files are already uploaded to the new server. Now our Plesk web pro edition panel needs to be configurated. Who can clear this job for us? site: [login to view URL] Greetings, Marcel Breemans
...would like to work with the competition winner on this aspect of the story line. The video clip should follow the character going through a variety of challenges like a dog attack, mugging, police arrest for example. I'm very open to suggestion with regards to the story line in general, and if you have any ideas to make the story more interesting/cooler
...I would like my plesk server configured so that I can log in using an FTP account, as I can currently only login with my root username and password but would like ther users to be able to login. I think it has something to do with 'passive' access. I would then like my wordpress website and database migrated over fom my shared server to my VPS Thnk
Plesk onyx latest version set up and configuration on windows server 2016 in AZURE cloud Things already done: Plesk is already installed MS Sql express is already installed Things to do [login to view URL] plesk use public IP instead of internal IP [login to view URL] server set up so that domain is pointed to this IP hosting. 3.Plesk back up set up wit...
I am looking for a concept drawing for a medium attack vehicle, Would like to base it off the Fire King wildfire truck, but also articulate like a franna crane and have water jets and a water cannon like the bulldog fire truck
Two Odoo installation installations are needed. The installation will be done through Plesk 17 by using Odoo docker container. Please Apply on this job if you have the right skills to perform this. Thanks. Postgresql must be integrated in plesk.
...is crashing 2-3 times per week requiring a server restart but Pioneer Craft site is fine so this is a new type of problem as in the past both sites went down together. 2)The plesk panel needs an update as is showing this: Extended support for Plesk 12 The version of Plesk installed on this server (Plesk 12.0 or 12.5) has entered extended support phase
...assistance... I need someone with top level skills in Plesk, Windows 2012 Server and PHP mail. At the weekend, my server crashed and was restored again. They said it was a Firewall issue. Everything is back online now but my php scripts won't send emails to external domains. Domains on the server can receive emails ok but no external emails are being
Please READ and apply ONLY if you have enough knowledge to fix this! We are looking for an expert, who has deep knowledge of Centos 7 server with PLESK, Apache, Nginx, PHP, HTML and Wordpress/Woocommerce. Our problem is, that our Woocommerce webshops works fine when a user browses a website with a common browser. But when we use Google search console/fetch
I have a dedicated server hosted at 1and1.com. It currently hosts 3 domains plus some several subdomains with websites corresponding to the domains & subdomains. The server is managed with Plesk. The Plesk email system is used for my business email. Last week, the server was compromised by somebody who has been continuously sending SPAM from all
...have a server with a licenced copy of Oempro which was report as hacked and in use for phishing attacks two weeks ago. We and our hosting companies admins can find no evidence of a compromise with the server and have removed it from blacklists. Nevertheless email deliverability has fallen by 75% and we have decided to replace the rented server. There
...English. The security product is established and you will use existing web application logs to discern characteristic patterns of attack. These attack vectors are already known. Your task will be to confirm these attack vectors, establish the simplest way to detect them, then implement an algorithm to work in near-real time. It is likely that you will
...across a customer which is an organization having a problem of bees which are attacking one of the wooden shade close to the main gate,they always come and go and sometimes they attack [login to view URL] Nature that surrounds this place is a bushland and thickets so they need a scientific report based on observation and how can they be permanently removed without
need someone who is good in cryptography and cryptanalysis as well as in matlab and maple. have to implement "differential-linear attack" on dummy structure of 4 or 8 bit cipher in matlab or maple. at the end i need a brief report and source code with comments. you have to do everything by yourself.
I have VPS Server that self managed with Windows on it with Godaddy and plesk. I am wanting someone too go in there and set this up so it's like a virtual desktop for me and my staff members so that staff wont have access to the root just to the desktop windows. I am hoping that someone will be able to complete this within 2 hours
...territories, which are grouped into six continents. The object of the game is to eliminate the other players by occupying every territory on the board. Players use armies to attack and defend territories from other players. A random number generator determines the outcomes of battles. This program has three main screens that will have to be displayed
...choose the one is best for the project. 1/So i wish that my website to work with magento 2 lastest version 2.2.5 I like to use magento 2 to manage my websites. 2/i have a plesk license , i would need an installation , i ll provide license and domaine. 3/i purchased a theme , i need a good install and a smart one with only languages : french, english
Hi Ritu G., I noticed your profile and would l...add to its function. we would like to add if its a weapon and the roll is a sucess then check if the feat dice is higher than the weapon edge score you may have a piercing attack. also we would like if a weapon and its a success roll then give us damage we can explain both of these in more detail.
...be a great plus. We work with bitbucket today, but are not that familiar with docker or pipelines. Some are, familiar with pipelines but they are old school (used to old server environments) and don´t see the the amazing benefit that Docker gives. (me my self, I am hooked and see the benefit,and want to start using docker ASAP.) So my developers and
...with the Turkish Texts Questions to be asked: 1) Performance, How can we make sure the application will remain fast with a huge number of users ? 2) Security, incase of an attack of a third party, how secure will be our data ? will the data be encrypted or protected in the database ? 3) Regarding Search facility, incase a user wants to see all the students
Im lo...interesting way different than the existing [login to view URL] must react to being attacked by the player. Secondly, add a special weapon for the player, Special weapon must be able to attack and damage or destroy enemies in a unique way different from the standard weapon, special weapon must use limited or recharging ammo, preventing continuous use.
I need an Illustration or sketch of a man being sneak attacked. It will be used in my game Heir to Dragonsfall The game is a Dungeons and Dragons style deckbuilding game. I would prefer someone being sneak attacked by a Rouge type character. We are using uncolored sketches for art in the game. I will try to post a picture similar to the style we are using below (the attached file is not mine, i...
...weapon, and we add 4) legs and 5) arms. We have these images. - it is needed to create animation (only skeleton path, not images) while character stands (in fight-ready mood), attack, defend, death (only becomes black and dissepear) + minor animations of ultimate skills like moving dragon head breathing fire + some other animations you would suggest we
Need more than 5 years experience code igniter web design and developer to fix some of the bugs and add new...web design and developer to fix some of the bugs and add new page and feature to the site. Developer need to have CSS design knowledge. Developer need to know linux and plesk server . I have attached document for full detail of the job scope
Windows server was compromised due to due to SynAck ransomware attack We need to Decrypt a MS SQL Server 2008 database .mdf & .ldf file (2files)
...escape? 5. Why do some Lizards Squirt Blood from their Eyes? 6. Can they Inflate their Bodies to look larger? 7. Do they Whip their Tails as a defence mechanism? 8. Blue-Tongue Attack (like the Blue-tongued Skink)] Tone: > Entertaining & Informative BUT Actionable Use first and second person: "I," "we," and "you" - Use the word “you” fre...
This project involves installing 2 open source software products on Dedicated server on fasthost The employer will provide access to the dedicated through ssh. The freelancer should install the 2 requested software packages as well as any other related/required software and shall configure each of the software products to be operational. When completed
Hi Farid, next creature i need is a ...[login to view URL] [login to view URL] Again with four animations: - Move - Idle - Attack - Spell/Combat Art (be creative ;) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian
Board game will be launched later this year. The style is sci fi, future soldier, tech, digital art. Aiming for $200 budget. 1. Attack Card: A future soldier aiming and shooting. Crop from the thighs up with the rest of the body showing. No background needed. 2. Move Card: A future soldier running. Crop from the thighs up with the rest of the body
I have a wordpress site that has been subject to a hacker attack. I have cleaned up most of the files but now when I log in to the site I am directed to spam sites
I need documentation talk about introduction social Engineering and phishing attack It should contain investigate level threats and awareness Our scenario is We create fake web page and email then we send emails to 2000 person in Company between staff and client. 1500 from them visit the web site and login with same account details for company And
I have a simple "api". I call [login to view URL] and values are inserted in DB. After hosting company upgraded cpanel (from plesk) my "api" is not working anymore. I need someone with basic knowledge of PHP and cpanel settings (PHP version..).
I need word documentation talk about awareness cyber security Introduction to Social Media and Phishing attack The document should contains a Graphics (Figures) and the methodology to investigate level to threats and a awareness The documentation has a scenario i will provide it to you
Urgent: Need to build a script or chrome extension to follow the website link that is protected by cloudflare I'm Under Attack mode and get the final re-directed URL. Final URL has to be captured and writen to the text file on server or if it is on chrome extension then that final url has to be split into different slices based on condition and it has
Hi Tanuj How are you ? , can you help us out quite urgently ? we have a problem with mailenable on our plesk .... [login to view URL] is accessible , but configurations on outlook lead s always to error Ox80042108 , Kindly advise
So, my website just had malware attack until my hosting account deactivated. So i've cleaned it and the account back to active again. But, i still suspect there's malware there, because there are some unwanted redirection to other websites. So i need you to clean it accordingly 100%, i do have backup but it might be infected as well. then, after i
...playing). Here are the list of the cards: - Miner: A guy with a pickaxe - Viruses: 3 small viruses that fly and fire strange balls - Mining Rig: A rack with graphic cards that attack with electricity - Thunder: An area of electrical damage - Electric Shock: An electric impulsion that hit a single ennemy - Hacker: A guy with black glasses and a gun - Bugs:
...your code with an Independent Security Expert. This Expert has been hired to ensure there are no obvious holes within the code. The site being built may be susceptible to attack so all code needs to be proficient and built using the latest web development standards. The Chosen Developer will be trusted with secret company information. This individual
...for a troubleshooting developer with strong background or expert level in PHP / MYSQL, JAVA, HTML among other languages. Bootstrap, CSS and HTML and working acknowledge of Plesk Panel.. The main task for this position is to work on programming issues, modify and create database tables and forms and to oversee contractor/ freelancers hire to work on
Cryptography about 30 pages Abstract Encryption is the encryption process in cryptography. Make sure th...who is meant to use the keys that are rewritten in a legible form. In this paper I have handled a bit of history of cryptography, modern cryptography , cryptosystem, crypto attack system, [login to view URL], authentication, digital signature ....