What's Up with Google Blocking 1 Million WordPress Sites?
Google has blocked an extensive number of Wordpress-based sites due to a malware attack by SoakSoak.ru
I NEED MY SERVER SECURITY TO BE FIXED. I WILL PROVIDE WITH SCAN REPORT WITH DETAILED SOLUTION TO IMPLEMENT IT.
需要会中文的Android开发者,开发及修改Android Native APP。 工作要求 ↓ (Google Drive):[login to view URL] (百度网盘)链接:[login to view URL] 提取码:x518
Looking for an IT security expert helping recover access to a Personal email access lost
A new type of security authentication while logging into a website should be made which comes under networking and security topic.
We need a web security specialist who specializes in the below-listed points. We are looking for an expert who can track the website and resolve the CODE and DB challenges and make them secure in terms of every aspect. * Security Audit * Penetration Testing * Malware Removal * Authentication * Vulnerability analysis * Site performance analysis * Risk Analysis * XSS scan * Brute Force Pro...
Office internet is down due to Watchguard router or switch issue.
We are an equipment dealer and someone has hacked some of our email accounts, not sure where they were hacked. I have run malware on the office pc's, and changed passwords on cpanel email accounts.. 4 separate accounts are replying to existing email threads sending zipfiles.. need this shut down ASAP
I have a forum website: [login to view URL] and I’m struggling with spam. I have hired two freelancers before to correct this but this was not resolved. I’m looking for ideas to fix this at a minimum of costs before I hire a freelancer who can fix the site spam. I get 10 spam posts/ new registrations even after i disabled automatic registration and requiring newbies for “Requir...
I need someone to fix spam problems on my forum website: [login to view URL] My site [login to view URL] has been invested with spam – I get 10 spam posts/ new registrations even after i disabled automatic registration and requiring newbies for “Require verification of all new registrations by email”. At the moment i have stopped new registrations. I also want to remove “...
Looking for Ddos Attack solution i am using shared hosting linux and i dont want to use cloud and my website still under DDOS Attack. Looking for best and easy solution
Our company has online presence in the several sectors of interests, Local and international. Most of the system we run are web-based. 90% of the VPS servers are Linux based and other remaining 10% are Windows based. We need to structure them properly for our websites and systems, which are running on those VPS servers. Ideally we would like to have following configured. 1. Install proper tools a...
Need guest post on both site. tell me your price and send me a bid.
App web interactiva, se requiere perfiles full stack para desarrollo front y back end
I want you to set up payment gateway on my website The website contains digital products that are delivered through the website itself There are coupon codes that should be applied for giving the discounts I will check the functionality by making payment and test whether or not the funds are going to my account You need to set it up using PAYPAL Additionally, I want the website to b...
I need an Expert on kylo/security/security-auth-ldap , for ongoing project basis,preferably based in India .This is an urgent requirement , Please connect as early as possible.
simple task to create a duplicate login form page. urgent task very simple
looking someone that familiar with [login to view URL] and security website (also hacking,phishing, reporting etc…), please check first that you can actually customize the product and build a professional website with all the functionality. For more details on chat.
I have a virus on my server and all my websites on the server are redirecting to an external link. We think the virus has infected the database. If you think you can fix this please bid and we can start ASAP URL [login to view URL]
I am looking for a developer that would be able to work with that can walk me through setting up the code with a database for a web app and Github to allow me to sync the new code in the app for testing on the server. I am using Bluehost and I want to deploy a small web app under development onto the server with my cpanel and use Github repositories to allow my developer to continue to develop th...
i need to list two data recovery tools for windows and give two pages for ecah to give information about how to use them and what feature they have.
I would like some one understand security of application s
For one of our WordPress websites we are looking for a WordPress security expert who can make our applications more GDPR compliant. We have 5 topics where we would like to be more GDPR compliant. Could you help us with this? The 5 things that we would like to change are listed below, with a little more explanation. Please provide hight level detail process / approach per step(1/5) and provide us...
Hi, we got few questions about SAML/SSO and we are looking for help in that matter. If you already implimented SSO we would like to learn about the security aspects and link sharing.
We have a grails 3 application which now needs to be migrated to keycloak for the authentication. Also we search for a coach who is coaching our team about developing grails (we are java developers) So if you have extensive experiences on Grails 3 and you also know how to setup keycloak you are welcome to mentor/coach our developers. you will get access via Teamviewer to the machine and you help ...
I need a proof of concept of the following video: [login to view URL] The scenario will be the following: one running hidden service with a bad configuration which will lead to the leak of the public ip using the attack showed in the video. I need to know the case where it can happen, how to execute the attack and how to prevent the attack. I have a vulnerable test site up, if you can do this job ...
Hi there, I'd like someone to help me with a similar set of content for the updated survey we are working on for this year. Can someone help me with a quote for this?
Need someone for security tests, more info through messages
Hey, i have been attacked and most of my sites display this screen shot message.I need a fixer urgently to fix this kind of attack
- URGENTLY Needing someone to help with URL block on Facebook and IG to store website. - Linking both IG and Facebook together as a business page. - help set and activate product tagging.
vulnerability assisment and penetration testing
I am doing maintenance work on my website. So, there are many problems in my website, but first I want to find negative seo baglink that has bad effect on Google and remove it. Thoroughly inspect and completely remove
ethical hacking is a great skill in information security and cyber security
No any ready-made online tools should be used for this project. 1) First o/p should be - features/patterns/footprints which get stored in any web server log file while performing the mentioned attacks (SQLI, XSS, CSRF, Brute Force, RFI, LFI), robot/crawler user agents on web application. 2) Writing of an algorithm (in python or R) which will analyze any web server log files based on the collecte...
A SECURE linux server who only will push the apps to the devices with a VPN tunnel...
Hi, How are you? I need to figure out the web posting details for certain page. I will share details via chatting.
want freelancer for configuring mod security WAF...we are running an HRMS application hosted in Azure datacenter VMs. We have got mod security installed on our application server but need an expert to configure rules for WAF.
Hello, I need php/html/server specialist to help me with Server/Website optimization to counter GET method HTTPS spam/ddos.
There is requirement to identify all footprints/patterns of brute force attack from any web server log file. Algorithm is required to write in python/R language and it is required to test on given few log files.
We have a project to Pen Test external websites for one of our customer, we do usually vulnerability assessment , we need comprehensive penetration testing exercise where the pen tester will walk our team through the process and will generate and identify actual threads, we should then demonstrate the same to our customer.
I have a desktop application written in c#. I want to secure it. I have used the confuserex, themida and crypto obfuscator to obfuscate it. But they seems to be breakable. Currently we are using crypto obfuscator. Our requirement is 1. Demonstrate and document how you can break our current application. 2. Proving better obfuscation and encryption solution to secure it. I will provide our ex...
We have a search script that has some vulnerabilities and needs to be updated and also allow to blow some pages that we do not want searched.
Searching for an expert who can help me troubleshooting spam with Zimbra.
I need someone to do a malware study of my phone and tell me how to quite or avoid them at real time or to avoid imsi catchers or to clean my phone doing it step by step.
Please do security on our website for the vuhurnabity test?
Hi I need a Professional CloudFlare developper who can help us on optimising our High traffic CSM queries and reducing average load . The freelancer should kane knowledges about CF pages rules to cache Dynamic html pages , workers , and caching features . We have high traffic website and we would like to reduce the high queries to mysql and optimising website to support high traffic please , &...
I need a Network administrator to monitor and edit my current configurations and see if I have vulnerability and stop any attack from happening. and manage my current bandwidth and share it with users.
Experienced developer and google expert required to fix google indexing issues. Some are listed and attached here: - DNS errors - Mobile usability issues - Crawling and robot txt issues - AMP issues - Security issues Our site suddenly dropped from google search ranking... No Chancers!
Google has blocked an extensive number of Wordpress-based sites due to a malware attack by SoakSoak.ru
Building a web application is easy - building one that meets all security requirements is hard. This article covers the 5 popular security practices.
How safe is your online communications? Here are simple tips on how to get started on encryption.