The ultimate guide to hiring a web developer in 2021
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
PHP is a widely-used, open-source scripting language that is specifically designed for web development. PHP Developers can create dynamic websites and applications, integrate various APIs, optimize your site, and much more. By hiring a PHP Developer on Freelancer.com, you will gain access to skilled professionals who can help bring your web-based project to life. Here's some projects that our expert PHP Developers made real:
As you can see, our experienced PHP developer pool has made clients' dreams into reality by tailoring their skillset to a wide range of web development projects. PHP developers can turn your idea into a functional, user-friendly website or web application that will leave a lasting impression on your customers.
To take advantage of the expertise offered by our network of talented PHP developers on Freelancer.com, simply post your project and connect with skilled professionals from around the world. Don't wait any longer - let our expert PHP developers turn your ideas into tangible web solutions!
De 202,566 opiniones, los clientes califican nuestro Web Security Experts 4.9 de un total de 5 estrellas.PHP is a widely-used, open-source scripting language that is specifically designed for web development. PHP Developers can create dynamic websites and applications, integrate various APIs, optimize your site, and much more. By hiring a PHP Developer on Freelancer.com, you will gain access to skilled professionals who can help bring your web-based project to life. Here's some projects that our expert PHP Developers made real:
As you can see, our experienced PHP developer pool has made clients' dreams into reality by tailoring their skillset to a wide range of web development projects. PHP developers can turn your idea into a functional, user-friendly website or web application that will leave a lasting impression on your customers.
To take advantage of the expertise offered by our network of talented PHP developers on Freelancer.com, simply post your project and connect with skilled professionals from around the world. Don't wait any longer - let our expert PHP developers turn your ideas into tangible web solutions!
De 202,566 opiniones, los clientes califican nuestro Web Security Experts 4.9 de un total de 5 estrellas.I’m looking for a reliable WordPress specialist who can both keep my site healthy and show me how to handle everyday tasks on my own. Your first priority will be routine maintenance: safely updating all plugins and themes, running security checks, and configuring automated backups. I don’t have a preferred toolkit, so I’ll rely on you to recommend proven solutions—think ManageWP, UpdraftPlus, iThemes Security, or anything you trust that delivers the same peace of mind. Once the technical house-keeping is in order, I’d like a short, live training session (screen-share is fine) focused on some site management. A concise PDF or video recap afterward would be perfect so I can revisit the steps later. Deliverables: • Initial audit with all plugins, themes...
Project Description I am looking for an experienced developer who can implement a solution to send POST API requests directly from an active browser session, maintaining full session integrity and security context. The requirement is to replicate browser network requests exactly as they occur in DevTools — including all dynamic headers, cookies, tokens, and Akamai-related security parameters — without triggering bot protection or security blocks. Core Requirements: API request must originate from the same opened browser session Must reuse: All request headers Session cookies CSRF tokens Authorization tokens Dynamic security tokens Akamai-related parameters Must work with protected endpoints (Akamai / Bot Manager enabled) Should avoid 403, 401, 504, or security val...
I’m looking for a specialist to run a full health-check on my Local Area Network. The priority is to verify that everything works as intended and to pinpoint any performance bottlenecks that might slow users down. Security is being handled separately, so your focus will be strictly on functionality and performance. The job involves testing end-to-end connectivity, measuring throughput and latency at peak and off-peak times, and confirming that current configurations on switches, routers, and access points align with best practices. I expect you to use industry-standard network diagnostic tools—think Wireshark, iPerf, or SolarWinds—but you’re free to bring in any utilities you trust as long as the results are clearly documented. Deliverables • A concise repo...
Several weeks ago Cloudflare settings and a filter plugin accidentally opened the door for Googlebot to see pages that should never have been crawled. I have already corrected the plugin and Cloudflare configuration, yet Google Search Console is still reporting multiple issues. What I need now is a one-time, start-to-finish cleanup. Using Google Search Console as your main dashboard, please remove or resolve every lingering Indexing and Crawl error, including: • “Alternative page with proper canonical tag” • “Page with redirect” • “Blocked by ” • “Excluded by ‘noindex’ tag” My product pages are the priority. Success means the Index Coverage and Page Experience reports show a clean slate for...
My goal is simple: understand everything that may be blocking visitors from turning into customers and fix it fast. I need a thorough audit that looks at SEO performance, security vulnerabilities, user experience—and frankly any other factor that could be hurting my conversion rate. You’ll dig through on-page SEO, technical SEO, backlink health, code security holes, page-speed bottlenecks, mobile usability, navigation flow, copy clarity, and micro-conversion touchpoints. From there I’m expecting a clear, prioritized action plan I can hand to my dev team or implement myself. Speed matters; I’d like the first findings within the next few days and the full report shortly after. Deliverables: • A concise executive summary that highlights critical issues affecti...
My site has suddenly stopped loading for visitors and now throws the browser error “ERR_CONNECTION_TIMED_OUT.” I have not made any code, setting, or content changes recently, yet the front-end is unreachable while I can still log in to the hosting control panel and WordPress/FTP. I need a troubleshooter who can: • Identify the root cause—whether it is DNS, firewall rules, server timeout, .htaccess, plugin conflict, or another server-level misconfiguration. • Apply the necessary fix so the website loads normally from all locations and devices. • Provide a concise summary of what was wrong and the steps taken so I can avoid a repeat. The job is complete when the home page and all sub-pages respond within normal load times without errors. A fast t...
The expected deliverables include a fully functional web platform and mobile application with course management, payments (one-time and subscription), certificates, coupons, reviews, AI-powered course search (RAG system), and role-based dashboards. The developer must provide complete source code, deployment (staging and production), database setup, Stripe integration, AI embedding pipeline, documentation, and secure, production-ready architecture. The estimated timeline is 10–12 weeks, covering both web platform and mobile app development.
I have already completed the technical investigation of a recent security alert: the endpoint protection platform flagged an executable that tried to tamper with system files and phone home to an external server. I verified the hash, monitored live-system behaviour, confirmed the activity as malicious, quarantined the file and rescanned the host to ensure it is now clean. What I need next is a professionally written incident report that translates those raw findings into a clear narrative for both management and technical stakeholders. The document should outline the timeline of events, the investigation methodology, indicators of compromise, remediation actions taken, and practical recommendations to harden the environment against similar threats. Where helpful, map tactics to MITRE ATT&...
I am seeking a skilled PHP Ecommerce developer to build a custom module for a third party ecommerce shopping cart. This module will maintain full sync with an external product source via API. Scope of work - Develop a custom PHP module for ecommerce site. - Implement full sync with external product source via API. - Ensure reliable data transfer and synchronization between the source and module. Developer expertise: Performance, Security, Testing procedures Programming language: PHP Ideal candidate Skills and experience: - Skilled in PHP development. - Experience with API integrations. - Knowledge of ecommerce platforms.
my client tech-support company needs our infected WordPress site rebuilt from the ground up, with a laser focus on performance and security. Wordfence is currently installed yet the malware persists, so I need a fresh redesign Scope • Spin up a fresh, secure WordPress instance. • Recover all critical data—blog posts (with comments), user accounts/profiles, and all media files—from the existing database. • Redesign the front end so it loads quickly and feels modern while preserving our tech-support brand. Core sections must include: - Blog area for ongoing articles - Real-time customer-support chat (plugin of your choice) - Clear service-listing pages • Implement best-practice security (server-level configs, WAF rules, plugin vetting, ongo...
You are a senior cybersecurity + machine learning engineer. Build a practical, runnable, end-to-end Transformer-based Web Application Firewall (AI-WAF) prototype suitable for Smart India Hackathon / ISRO SIH demonstration. The system must implement the full pipeline: Log Ingestion → Parsing → Normalization → Tokenization → Transformer Training → Multi-Class Attack Classification → Anomaly Scoring → Real-Time Non-Blocking Inference → Alerting & Logging → Incremental Fine-Tuning ======================================== 1. CORE FUNCTIONAL REQUIREMENTS ======================================== A. Multi-Class Attack Detection The Transformer model must classify HTTP requests into: - BENIGN - SQL_INJECTION - XSS - COMMAND_INJECTION - PATH_TR...
I would like a website where customers can: pay 1 fee to download mp3 songs that will be divided into different genre's. need to be able to sign-up/login/forget password. There is no subscription, just 1 price paid via paypal. On the front end, I need them to be able to "preview" 5 songs from each genre. so a simple "preview" and "sign up" buttons. Paypal checkout. Once logged in, they can simply download any song from any genre/category but I also need the download hidden so they can't just copy the link and post/share with anyone else. I either want something custom or an all in 1 solution if using wordpress. I don't want to use woocommerce and some membership software. Please let me know your thoughts it's best if you have al...
I need a robust web server configured specifically for storing and managing transaction records. The entire environment must meet recognized industry standards such as PCI DSS, so every layer—from operating system hardening to database encryption and network configuration—has to align with those controls. Here is what success looks like to me: • Provision a scalable server (cloud or on-prem, your recommendation) built for high-volume transaction data. • Implement advanced encryption at rest and in transit, with key management that satisfies PCI DSS. • Configure access controls, logging, and monitoring so audit trails are complete and tamper-proof. • Provide clear documentation of the architecture, compliance checkpoints, and any scripts or automation ...
I need a tailored set of Cloudflare WAF rules that operates as a Custom Bot Policy. The objective is straightforward: detect suspicious, automated traffic and have Cloudflare respond with a CAPTCHA challenge instead of an outright block. You’ll start by assessing my current Cloudflare configuration, then craft one or more custom WAF expressions that reliably flag bots through indicators such as abnormal request rates, header irregularities, IP reputation scores, or other signals you’ve had success with. Once matched, the rule action must be “Challenge (CAPTCHA).” Deliverables • Finalised WAF rule set added to my Cloudflare dashboard • Proof-of-concept tests showing legitimate users unaffected and bots challenged • A brief hand-over note ex...
I hold written authorization from the system owner and need an experienced ethical-hacking professional to carry out a controlled breach of our production environment. The assignment goes beyond a traditional penetration test: I want you to replicate a real-world, end-to-end intrusion scenario so we can measure how our monitoring, logging and incident-response teams react under pressure. Scope • Obtain initial access using any non-destructive vector you discover (phishing simulation, misconfigurations, credential weakness, etc.). • Laterally move, escalate privileges and demonstrate data access without altering or deleting information. • Leave tamper-proof evidence (flags) in pre-agreed directories so we can verify compromise. • Conclude with a thorough report that det...
My provider has suspended my Ubuntu VPS after flagging a hack on the web-server layer (Apache/Nginx, exact stack is in the incident report I will share once we start). At the moment I have zero hardening in place—no firewall rules, no SSL, nothing—so the attacker clearly found an easy way in. I do have a recent full backup, so you can work safely and roll back if needed. Your mission is to identify the entry point, remove any malicious code or files, close the vulnerability, and leave the server in a state that convinces the host to lift the ban. You are welcome to use tools such as fail2ban, UFW/iptables, ClamAV, rkhunter, ModSecurity, or any other utilities you normally rely on. Deliverables • Clean, uncompromised web root and services reinstated • Detailed ...
My CodeIgniter website has been running unchanged for years, yet since yesterday every attempt to sign in is rejected with the “Incorrect username/password” message—even for known-good accounts. I’m not sure whether anything on the server was updated, but I do have full cPanel, SSH, and MySQL access so you can inspect code, configuration files, and logs. Here’s what I need from you: • Identify the exact cause of the failed authentication. • Implement a clean, well-commented fix that restores normal login behaviour without breaking anything else. • Provide a brief report outlining what went wrong and what you changed. The stack is classic PHP, MySQL, and CodeIgniter. Once I confirm that users can log in again, I’ll close the job imm...
I’m looking for a skilled WordPress developer who can take my idea from a blank page to a fully functioning, responsive website. The domain and hosting are ready; everything that happens between first install and launch is where I need your expertise. Here’s what I have in mind so far: • A clean, modern layout that looks great on mobile and desktop • Intuitive navigation with clear calls-to-action • Solid foundation for SEO, speed, and security (caching, image optimisation, SSL) Beyond that, I’m open to your suggestions on themes, plugins, and any best-practice integrations (contact forms, social media hooks, email capture, analytics, etc.). Process wise, I’d like to: 1. Brief you on my content goals and brand style. 2. Review two or...
I’m bringing my health-focused website up to full HIPAA compliance and need an experienced security professional to handle the technical hardening. The immediate priorities are: • Provision and correctly install an SSL certificate so every page, asset and sub-domain loads exclusively over HTTPS. • Encrypt all stored and transmitted medical-record data, making sure keys are managed securely and database backups follow the same standard. • Review the current codebase, server configuration and third-party plugins against HIPAA’s Security Rule, then patch any gaps you find. • Document the changes and supply a simple compliance checklist I can keep on file for auditors. I’m on a Linux VPS running Nginx with a Laravel backend; you’re free to us...
I need an expert who can review the current implementation and make sure the widget is working Your task will be to audit the existing code and adjust the way to make it work
I am seeking an expert WordPress plugin developer to build a professional-grade, cross-browser cookie cleaner that gives administrators granular control over which specific cookies are deleted when users log out. This is not a simple "delete everything" plugin—existing solutions fail because they either rely exclusively on the Clear-Site-Data header (which does not work on Safari, iOS browsers, or Edge Legacy), or they lack a proper admin interface for selective deletion, or they cannot handle HttpOnly cookies (like WordPress authentication cookies) which JavaScript cannot touch. I need a four-layer hybrid solution that: (1) sends the Clear-Site-Data header only to supporting browsers (Chrome, Firefox, Edge Chromium), (2) performs server-side PHP deletion of HttpOnly cookie...
I’m ready to bring in a security specialist to run a thorough, manual penetration test on my live e-commerce application. Automated scanners aren’t enough for this engagement—I need human-driven testing that uncovers real-world attack paths. Here’s what I’m looking for: • A full manual assessment covering all SQL Injection, Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF),Web Application Penetration Testing , Network Penetration Testing Services External or Internal, Web Services Testing, API Testing • Exploitation-level proof of concept for every confirmed issue, with clear, reproducible steps. • A concise risk-ranked report that separates critical, high, medium and low findings, followed by practical remediation advice writ...
I have a WordPress website that I am trying to advertise on Google Ads, but Google finds it as a Compromised Site. I have hired a develop over here and over a month already and he wasn't able to fix it. I hope I finally find someone who can fix it.
We are looking for an experienced DNS and domain reputation specialist to help resolve an ongoing production issue affecting users on certain mobile networks (specifically T-Mobile). The specific error users see is: DNS_PROBE_FINISHED_NXDOMAIN Our platform is hosted on AWS (Route 53 + ALB / CloudFront). DNS is correctly configured and resolves properly on most networks (Google DNS, Quad9, etc.). Our domain reputation has already been reviewed and corrected by major security providers. However, users on T-Mobile are still experiencing DNS-based blocking or resolution issues. This appears to be related to carrier-level DNS filtering or residual reputation/security classification behavior — not core infrastructure misconfiguration. ⸻ Scope of Work • Diagnose carrier-level DNS...
We would like to find someone who is capable of making a ticket buying bot, to PREVENT tickets from being bought from. This is a protection and defensive upwork post. We are looking to block vulnerabilities in the website. Thank you, J
I'm looking for an expert to optimize the performance of my web application. Key focus areas include: - Application performance enhancement - Resolving specific performance issues (to be discussed) Ideal skills and experience: - Proven track record in web app performance optimization - Expertise in identifying and resolving slow loading times, high memory usage, and crashes - Strong knowledge of web technologies and optimization tools - Ability to analyze and improve application performance metrics Please provide relevant experience and approach in your bids.
Saya membutuhkan solusi lengkap untuk meng-host sesi live streaming penjualan. Fokus utamanya adalah menyiarkan acara secara langsung dengan chat interaktif sehingga penonton dapat bertanya atau memesan produk real-time, sekaligus menyediakan analytics untuk memantau jumlah penonton, durasi tonton, dan konversi. Lingkup kerja utama: • Menyiapkan server atau layanan hosting yang stabil untuk live streaming Full HD. • Mengintegrasikan fitur live chat langsung di halaman pemutar. • Menambahkan modul user analytics yang dapat diekspor ke laporan Excel atau Google Sheets. • Membangun panel admin sederhana untuk menjadwalkan siaran, memulai/ menghentikan streaming, dan mengunggah rekaman untuk replay. • (Opsional) Menghubungkan platform dengan aplikasi kantor po...
Saya membutuhkan solusi lengkap untuk meng-host sesi live streaming penjualan. Fokus utamanya adalah menyiarkan acara secara langsung dengan chat interaktif sehingga penonton dapat bertanya atau memesan produk real-time, sekaligus menyediakan analytics untuk memantau jumlah penonton, durasi tonton, dan konversi. Lingkup kerja utama: • Menyiapkan server atau layanan hosting yang stabil untuk live streaming Full HD. • Mengintegrasikan fitur live chat langsung di halaman pemutar. • Menambahkan modul user analytics yang dapat diekspor ke laporan Excel atau Google Sheets. • Membangun panel admin sederhana untuk menjadwalkan siaran, memulai/ menghentikan streaming, dan mengunggah rekaman untuk replay. • (Opsional) Menghubungkan platform dengan aplikasi kantor po...
Saya membutuhkan sebuah tulisan deskriptif dalam bahasa Indonesia yang menggambarkan makhluk hidup—tepatnya seorang manusia—dengan fokus utama pada emosi dan perasaan. Tujuan saya adalah membawa pembaca seolah-olah berada di dalam kepala tokoh, merasakan getaran hati, riak napas, dan perubahan ekspresi yang terjadi sepanjang situasi yang Anda bangun. Ruang lingkup: • Panjang naskah sekitar 600–800 kata. • Sudut pandang bebas (orang pertama atau ketiga), asalkan konsisten. • Gunakan pancaindra untuk memunculkan detail sensorik: suara denyut jantung, wangi udara, tekstur kulit saat merinding, dan sebagainya. • Hindari daftar sifat; ceritakan lewat aksi kecil—jari yang gemetar, mata yang membasah, senyum setengah tertahan. • Bahasa har...
I’m launching an online store and need a developer who can take the project from blank domain to a fully operational e-commerce site. The single non-negotiable requirement is a rock-solid payment gateway integration that handles multiple cards securely and passes PCI compliance checks. I’m open on platform—Shopify, WooCommerce, Magento, or any other stack you’re comfortable with—as long as the final build is stable, fast, and easy for me to manage after hand-off. Product search, filters, and customer reviews may be added in later phases, but they aren’t part of this initial scope. Deliverables • Responsive storefront with sample product catalog • Payment gateway set up, tested end-to-end in both sandbox and live modes • Admin das...
I’ve built a custom web application and it’s almost ready for production. Before the public rollout, I want a rigorous penetration test that will expose any weakness and help tighten every layer of security. The assessment must be hands-on and realistic, covering the full stack rather than a purely theoretical review. Scope My priorities are clear: • Code review – comb through the source for injection points, authentication flaws, insecure dependencies, and logic errors. • Network-level probing – map open ports, misconfigured firewalls, and potential lateral-movement paths. • Server configuration – evaluate patch levels, TLS setup, permissions, and hardening of the underlying OS and web server. Primary Goal The sole purpose is to imp...
Cloud Security Specialist – Immediate Infrastructure Hardening (Short Term) Project Overview Duration: 3 to 5 days Location: Remote Start: Immediate A healthcare technology platform requires a Cloud Security Specialist to implement quick security improvements identified in a recent penetration assessment. This is a focused, short-term assignment aimed at reducing immediate attack surface exposure at the infrastructure layer. Scope of Work All listed tasks must be completed. 1. Server Version Disclosure Prevention Remove server and framework version information from HTTP responses. Responsibilities Configure AWS Application Load Balancer to remove server headers Update CloudFront response headers policy Disable X Powered By headers in Customize error responses to prevent ve...
Cloud Security Specialist – Immediate Infrastructure Hardening (Short Term) Project Overview Duration: 3 to 5 days Location: Remote Start: Immediate A healthcare technology platform requires a Cloud Security Specialist to implement quick security improvements identified in a recent penetration assessment. This is a focused, short-term assignment aimed at reducing immediate attack surface exposure at the infrastructure layer. Scope of Work All listed tasks must be completed. 1. Server Version Disclosure Prevention Remove server and framework version information from HTTP responses. Responsibilities Configure AWS Application Load Balancer to remove server headers Update CloudFront response headers policy Disable X Powered By headers in Customize error responses to prevent ve...
We are seeking a reliable IT team to support our medical centre with comprehensive, end-to-end IT services. This would include setting up, managing, maintaining, and regularly updating all aspects of our IT infrastructure, including networks, servers (on-site and / or cloud-based), workstations, computers, printers, and all connectivity systems. We require ongoing management of firewalls, cybersecurity protections, antivirus and anti-malware systems, data encryption, secure remote access, backups and disaster recovery solutions, and proactive monitoring to prevent downtime. Support would also cover software installation and updates (including clinical and practice management systems - Best Practice), email systems, cloud services, data storage, compliance with healthcare data protection re...
We are seeking a reliable IT team to support our medical centre with comprehensive, end-to-end IT services. This would include setting up, managing, maintaining, and regularly updating all aspects of our IT infrastructure, including networks, servers (on-site and / or cloud-based), workstations, computers, printers, and all connectivity systems. We require ongoing management of firewalls, cybersecurity protections, antivirus and anti-malware systems, data encryption, secure remote access, backups and disaster recovery solutions, and proactive monitoring to prevent downtime. Support would also cover software installation and updates (including clinical and practice management systems - Best Practice), email systems, cloud services, data storage, compliance with healthcare data protection re...
is seeking an experienced web application security specialist to address specific vulnerabilities identified in our recent penetration testing assessment. As a healthcare technology company specializing in innovative oral health monitoring solutions, we prioritize robust security standards and regulatory compliance. This is a focused, short-term engagement to remediate six specific security findings in our web application infrastructure. We need an independent contractor who can take full ownership of implementing these security fixes efficiently and professionally. Scope of Work - Specific Vulnerability Remediations Based on our completed Web Penetration Testing assessment, you will address the following security findings: 1.-n/a 2. Server Version Disclosure Prevention • Task Ty...
is seeking an experienced web application security specialist to address specific vulnerabilities identified in our recent penetration testing assessment. As a healthcare technology company specializing in innovative oral health monitoring solutions, we prioritize robust security standards and regulatory compliance. This is a focused, short-term engagement to remediate six specific security findings in our web application infrastructure. We need an independent contractor who can take full ownership of implementing these security fixes efficiently and professionally. Scope of Work - Specific Vulnerability Remediations Based on our completed Web Penetration Testing assessment, you will address the following security findings: 1.-n/a 2. Server Version Disclosure Prevention • Task Ty...
After installation the wordpress site and theme works not good. It endless loading and timeout after adding one picture. Check server settings, theme and installation, memory space etc. and fix the issue
I operate two offices and I purchased two UniFi UDM Pro, and I want them linked so that staff can reach internal resources from either location as if they were on the same LAN or to work remotely (VPN access). Nothing is in place yet, so the full security stack must be designed and deployed from scratch. Scope of work • Build and test a site-to-site VPN between the two UDM Pros for seamless remote access. • Create granular firewall rules that allow only the traffic we specify while blocking everything else. • Enable and tune UniFi’s intrusion-detection/prevention features to catch unwanted activity without flooding us with false alarms. • Document every setting—screenshots or exported configs—so I can replicate or restore the setup if needed. ...
Saya sedang mempelajari cara kerja sebuah aplikasi berbasis web dan ingin memahami proses autentikasi penggunanya secara menyeluruh. Tolong bantu saya dengan penjelasan yang mudah dipahami namun tetap akurat secara teknis. Ruang lingkup yang saya butuhkan: • Alur login → dari formulir hingga verifikasi di server. • Mekanisme penyimpanan dan pengecekan kata sandi (hashing, salting, dsb.). • Cara pengelolaan sesi atau token (cookie-based, JWT, atau pendekatan lain). • Langkah pengamanan umum untuk mencegah serangan seperti brute force, session hijacking, dan CSRF. Silakan sajikan dalam format ringkas—boleh berupa poin-poin tertata, diagram sederhana, atau kombinasi keduanya—supaya saya bisa langsung memahaminya dan menerapkannya pada proyek ...
I need a Godaddy-issued SSL certificate installed and fully configured on my Windows Server 2019 VPS that is also hosted with Godaddy. The certificate has already been purchased; what’s left is generating the CSR (if you prefer, I can supply one), importing the returned certs, installing the intermediate chain, and binding everything to the correct IIS site so the domain loads only over HTTPS. Once the certificate is in place, please force-redirect all HTTP traffic to HTTPS, check for mixed-content warnings, and run an SSL Labs test to confirm an “A” rating or better. Deliverables • CSR generation (or validation of my existing CSR) • SSL certificate and chain correctly installed in IIS • HTTP-to-HTTPS redirect enabled and verified • Final rep...
I'd need to create a social network with , I'd need hardening plus ensuring the platform will be deployable and production-ready
My network edge relies on a Sophos XG appliance and a Fortinet FortiGate unit. Both devices are in production, but their current configuration is a mix of legacy rules and quick fixes that now interfere with performance and security. I want a seasoned firewall engineer to step in, examine every setting, correct what is wrong, and design a clean, least-privilege rule base. Scope of work • Configuration – back up the existing setups, remove or refine redundant rules, and align all interfaces, NAT, VPN, IPS and logging options with best-practice guidelines for Sophos SFOS and FortiOS. • Troubleshooting – identify and eliminate the intermittent drops we see on site-to-site VPN and outbound web traffic. Validation must include live traffic tests and log review. &bul...
I run a Canadian real-estate search engine that must stay lightning-fast for genuine home-hunters while remaining fully crawlable by Google, Bing and other reputable AI/search bots. Right now Cloudflare shows ±100 k daily hits from malicious, spam and scraper bots; that traffic spikes the servers, ruins bounce-rate metrics and occasionally knocks the site offline. I have already: • Placed the site on Cloudflare, • Allowed full, captcha-free access for visitors inside Canada, • Forced most other countries through a captcha, • Experimented with firewall rules, IP and UA blocking. Unfortunately, Google’s crawler activity drops whenever the shield becomes too strict, so I’m looking for an expert who can strike the sweet spot: block malicious...
O Facebook Sharing Debugger devolve os códigos 418 e 429 para todas as URLs do meu site, impedindo que meus artigos e posts de blog sejam exibidos corretamente ao compartilhar. Os metadados Open Graph já estão configurados, portanto o problema está, muito provavelmente, na forma como o crawler do Facebook chega ao servidor (DNS, firewall, cache, rate-limit ou configuração de headers). Sua missão: • Diagnosticar a causa exata desses retornos 418/429. • Ajustar a configuração necessária — seja no servidor web, proxy/CDN, regras de segurança ou limites de requisição — para que o Facebook consiga acessar qualquer página sem bloqueios. • Validar, no próprio Sh...
I am looking for an experienced Instagram account recovery specialist to help me regain access to my business Instagram account. I currently cannot log in to my account through any method: Password reset is not working Facebook login is not working Instagram recovery page shows “No account found” However, the username and account are still visible when checked from another Instagram account Additional details: This is a business account I still have access to the original email and phone number The issue happened suddenly, likely due to hacking or unauthorized changes What I need: Proper recovery through Instagram / Meta official support Assistance with hacked account appeal and verification No fake tools or scams — only legitimate recovery methods Requireme...
My QRadar deployment needs a sharper eye on phishing. I want a set of custom Alert and Correlation rules that reliably pick up everything from the first suspicious e-mail event to follow-up user activity that hints the attack is moving forward. Scope • Build correlation logic that ties together indicators such as mail-gateway detections, odd mailbox rules, risky web clicks, and any subsequent authentication anomalies. • Create alert rules that trigger actionable offenses the moment a phishing pattern emerges. The rules must fit neatly into existing QRadar best practices: use building blocks where appropriate, keep AQL searches efficient, and document each rule so another analyst can tune or extend it later. Acceptance A rule set that fires during lab replay of know...
Important Update & Reminder for All Applicants: A sincere thank you to everyone who has applied. The quality seen has prompted us to clarify our position for an efficient selection. · Our Priority: We are seeking an expert technical partner for a complex, long-term project and are prepared to invest accordingly. · Required for Assessment: To move forward, please ensure your application includes: 1. Direct URLs to 2-3 live WordPress projects you have personally developed or technically led, ideally demonstrating experience with booking or complex e-commerce logic. Applications without links to live projects will not be considered. 2. Priority to projects featuring complex booking, appointment, or service management systems. · On Budget: The figure on the jo...
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Learn how to find and work with a top-rated Google Chrome Developer for your project today!
Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.