...have this website on Digital Ocean and I am using webmin to administer. I think I want to put in a self signed certificate (this is for recreation, not commercial purposes and I don't want to pay) and leverage port 443 instead of 80 because I have users authenticate. BTW, if there is a better way to encrypt the transmission without paying for a certificate
...into environment variables - upgrade PHP version - audit existing API endpoints - use prepared statements (PDO or MySQLi) for all SQL queries - enable SSL - encrypt user passwords in database - password reset link in email instead of password - implement JWT authorization - document API specifications iOS client - create
Hi We need [url removed, login to view], [url removed, login to view], [url removed, login to view] and [url removed, login to view] to new server It is two affiliate shops and two wordpress. Server is freebsd and NO c...affiliate shops and two wordpress. Server is freebsd and NO cpanel. It is at [url removed, login to view] the server. Admin interface is in english And protect techoose by ...
...to build from a scratch a Secure File transfer utility. It should be a clear code and not a copy from a website or other people works. Find below the requirements: 1. Transfer Files betwen users. 2. Encrypt the files before transferring ( Confidentiality and Integrity using Encryption and Hashing ) 3. Encrypt the connection ( Tunnels ) 4. Authencated
Help us set up a control panel for our existing Ubuntu server. We have existing domains on there with SSL certificates from Let's Encrypt. Need help to add a control panel such as DirectAdmin (or other options) but keep our existing domains intact on the server. The control panel should be similar to CPanel which allows us to restart services
We have a -JTL*shop*system and wanna move to WooCommerce shop system. ...existing customers can log in as usual in their account. But the problem is: J T L encrypt the data for field "password" with a blowfishkey. your Job is: decrypt the customer data (password) with from us provided blowfishkey and send us all data as a csv file or sql-file.
The aim is to enable the user to encrypt data such as text, word docs etc, which are stored on their android phones. The aim is to develop an application that can provide sense of security for the user who stores lots of sensitive and confidential information on their phone .in case that someone access to the data through the security weaknesses, the
I want make a multi-keyword ranked search on a encrypted cloud environment. First i want to apply hierarchical clustering while indexing then apply search ...hierarchical clustering while indexing then apply search on cloud server by user query. The files as well as index should be outsourced to the cloud with encryption. Then apply cipher text search
We are seeking a full BASH script to install and configure default installation of Gogs with HTTPS on Ubuntu 16.04.4 x64 using Let's Encrypt certificate. Server will have 512MB RAM and 1 CPU so configuration should be very light. An example of this exact configuration: [url removed, login to view] Proposals that do not respond to the
Don't show me other apps in cover letter. I need to list all installed apps on iPhone. You should very familiar with encrypt/decrypt process regarding the image file. I will share more details via private interview.
i've a website and using websocket and using cookie to upgrade protocol. But it's easy to write a automatic tool that do this step without using my website. So, i find out another similar website, it's not using cookie, instead it use md5 algorithm to encrypt a session key has been sent to user for verify and upgrade to websocket. But i don' k...
Hey i have a little bug, everytime i encrypt my android phone it seems to change it's boot animation and splash screen to the default rom animation. i want it to be my animation and splash screen. need someone who is experianced with custom ROMS in android. i am using 5.1.1 samsung device
...the security may be added to the specification by the winner. Own experience like setting up TOR network is benefitial. The system shall enable passing encrypted data, encrypt data and sell everything on any market including crypto currency. Security mechanisms have to be included. The bidding is NOT for the setup but for the detail planning of
...worker • Be willing to add ideas & creative thought to the project • Have prior & proven experience The book is set in Ancient Egypt & Rome (during the time of Julius Caesar - 55BC), and is pitched to a Young Adult audience. It incorporates the mythology of Egypt, with magical aspects, into the daily life & setting of Rome. So I can easily knock