The ultimate guide to hiring a web developer in 2021
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
PHP is a widely-used, open-source scripting language that is specifically designed for web development. PHP Developers can create dynamic websites and applications, integrate various APIs, optimize your site, and much more. By hiring a PHP Developer on Freelancer.com, you will gain access to skilled professionals who can help bring your web-based project to life. Here's some projects that our expert PHP Developers made real:
As you can see, our experienced PHP developer pool has made clients' dreams into reality by tailoring their skillset to a wide range of web development projects. PHP developers can turn your idea into a functional, user-friendly website or web application that will leave a lasting impression on your customers.
To take advantage of the expertise offered by our network of talented PHP developers on Freelancer.com, simply post your project and connect with skilled professionals from around the world. Don't wait any longer - let our expert PHP developers turn your ideas into tangible web solutions!
De 206,214 opiniones, los clientes califican nuestro Web Security Experts 4.9 de un total de 5 estrellas.PHP is a widely-used, open-source scripting language that is specifically designed for web development. PHP Developers can create dynamic websites and applications, integrate various APIs, optimize your site, and much more. By hiring a PHP Developer on Freelancer.com, you will gain access to skilled professionals who can help bring your web-based project to life. Here's some projects that our expert PHP Developers made real:
As you can see, our experienced PHP developer pool has made clients' dreams into reality by tailoring their skillset to a wide range of web development projects. PHP developers can turn your idea into a functional, user-friendly website or web application that will leave a lasting impression on your customers.
To take advantage of the expertise offered by our network of talented PHP developers on Freelancer.com, simply post your project and connect with skilled professionals from around the world. Don't wait any longer - let our expert PHP developers turn your ideas into tangible web solutions!
De 206,214 opiniones, los clientes califican nuestro Web Security Experts 4.9 de un total de 5 estrellas.I’m ready to launch a fully-featured online store that sells physical products, and I need a designer-developer who can take the project from concept to “add to cart” with polish and reliability. The site must make it effortless for visitors to search, filter, and discover items, encourage trust through a built-in customer review system, and complete purchases via a secure payment gateway that supports the usual credit-card and wallet options. Clean, responsive design and swift page loads are non-negotiable so shoppers on mobile or desktop experience the same smooth journey. If you’re comfortable working in platforms such as Shopify, WooCommerce, or a custom stack—and you have a track record of shipping stores that convert—I’d love to see your ap...
My Magento 2.4.7-p1 installation has picked up malware located in /aregowe/magento2-module-polyshell-protection/. The server hosts five separate storefronts that all run off the same codebase, so the infection must be eliminated everywhere without disrupting live sales. I already have recent, working backups, so you can feel free to revert any file if needed. I am not looking for a full security audit right now—just a thorough, targeted cleanup.
Project: PrestaShop Migration 1.7.6.4 → PrestaShop 8 (Security + Full Validation) Hello, I’m looking for a senior PrestaShop developer to handle a full migration from PrestaShop 1.7.6.4 to PrestaShop 8. Important: The site recently had a security incident (already cleaned), so this project requires real experience with migrations and security hardening. Scope of Work - Full migration to PrestaShop 8 (not just a basic upgrade) Preserve: - Categories - Products - Prices - Customers (if feasible) - Maintain current PayPal integration Validate full functionality: - Navigation - Cart - Checkout Required Experience (Must Have) - Proven experience with PrestaShop migrations (1.7 → 8) - Strong debugging skills (themes and modules compatibility) Ability to: - Detect and remo...
My GoDaddy server was hit by the “Japanese SEO” hack and Google is now indexing spam pages that don’t exist on any of my sites. I already generated fresh UpdraftPlus backups before the incident, so the data you need is ready and waiting. Here’s exactly what I want to walk away with: • Complete malware sweep of the entire hosting account (all folders + databases) until it is 100 % clean • Fresh WordPress core files installed for each site, while preserving the existing custom themes and custom plugins I rely on • Restoration of the legitimate content from the Updraft backups and a double-check that no malicious files or users slip back in • Hardening steps—new salts, secure file permissions, updated plugins, and any GoDaddy-specific ...
I need help tightening the digital security around a growing library of photographs. My priority is data protection: the images must stay confidential, unaltered and accessible only to authorised users. Here’s what I’d like from you: • Assess the current storage workflow (local drives, cloud folders, backups) and identify vulnerabilities. • Propose and implement practical safeguards—encryption at rest/in transit, granular access controls, and tamper-evident measures. • Document every change so I can maintain the system long-term, including clear restoration steps if something ever goes wrong. If you have hands-on experience with secure photo archives, modern encryption standards (AES-256, TLS), and best-practice key management, I’d love to...
Project Overview: Pharmacy & Clinic Management System Core Modules Pharmacy & Inventory: Comprehensive tracking of medicine stocks, batch numbers, and expiry dates. Features automated low-stock alerts and Supplier Management for seamless procurement. Clinic & Patient Records: Centralized Electronic Health Records (EHR) covering patient history, vitals, and consultations. Includes a Clinic Management module for scheduling and workflow optimization. Accounting & Sales: Integrated Point of Sale (POS) that syncs directly with the Accounting Section, managing revenue, expenses, invoices, and comprehensive financial health. Communication Hub: Automated SMS Integration for appointment reminders, prescription updates, and patient notifications. Technical & Operational Featu...
I need a seasoned ethical hacker to perform a full-scale security audit of one of my production web applications. The primary goal is to uncover code-level vulnerabilities—anything from insecure input handling to flawed session management—and provide a clear remediation plan. While the audit may touch on broader OWASP issues, I’m specifically interested in how the current codebase could be exploited and what exact fixes will close those gaps. Here is how I see the engagement unfolding: • Conduct a thorough review of the live application and its underlying source code, using industry-standard tools such as Burp Suite, OWASP ZAP, static analysis utilities, and any custom scripts you rely on. • Deliver a detailed report that ranks each finding by severity, expl...
I need my live store upgraded from Prestashop 1.7.8.6 to the latest 9.1 release without losing a single feature, record, or customization. I rely on a mix of core and third-party modules, custom tweaks, and theme edits that all must keep working exactly as they do now—payment, shipping, catalog, orders, customer accounts, everything. Scope of work • Create a safe staging copy of the site and database. • Perform the version jump to 9.1, handling all backward-compatibility changes. • Update or replace every installed module and theme so they remain fully functional. • Migrate and verify all data: products, customers, orders, SEO URLs, multistore settings (if present), translations. • Thoroughly test front office and back office to confirm that checkout...
Equity and governance ontop of retrainer plus paid hrs in zoommeeting option available for long term earnings. I need an experienced technical partner who can help me put order, speed and airtight security into a large-scale project that spans a full blockchain ecosystem—core chain, apps, games, smart-integrated services—plus an internal research arm and a robust training program. Right now my overriding priority is organisation: I want development to flow smoothly from idea to deployment without the usual bottlenecks. The very first area to tackle is the blockchain layer itself. We will anchor everything around a rock-solid implementation that supports smart contracts out of the box, then expand to companion apps and gaming modules. Security must exceed traditional bank st...
My WordPress site hosted on Bluehost still needs its Google AdSense account verified. The key blocker is placing the AdSense verification meta tag in the <head> so Google can detect it on the next crawl. I prefer to do this through Google Site Kit or a clean header code snippet rather than editing theme files directly. Once the code sits correctly, I also want a quick sanity-check on ad placement and layout so the site passes Google’s policy review the first time. You’ll receive WordPress admin access, Bluehost cPanel, and Namecheap DNS controls. If Google has trouble fetching the tag, tweaking the DNS settings at Namecheap may be required. Deliverables • Verification tag added to the site head and showing in page source • “Ready” status insid...
Discord Server Setup & Configuration – Day Trading Community Project Overview We're looking for an experienced Discord server builder to help us set up, secure, and fully configure our day trading / IVFG trading community server. We currently have around 67 members and are actively looking to grow. This is a build/setup project, not an ongoing staffing role — we want someone to come in, do it right, and leave us with a clean, professional, fully operational server we can run ourselves. What We Need Done Security & Moderation Full server security setup — protection against raids, griefing, and unauthorized access Link-filtering so members cannot post unsolicited or harmful links Anti-spam and anti-bot protection Role-based permission structure so we have full...
My WordPress site has been compromised with malicious code and needs a cleanup. It happened a few months ago and my website has been down since then. I have no backups to roll back past this period. You will need to: • Run a comprehensive scan (WP-CLI, Wordfence, Sucuri, or similar) and remove every malicious file, injection, or database entry • Restore core, theme, and plugin integrity without breaking existing functionality • Patch the underlying vulnerability, harden , set correct file permissions, and add a security plugin/firewall • Generate a fresh full-site backup once the site is verified clean • Provide a concise report summarising what was found, what you removed, and the preventive steps applied I’m not certain whether the symptoms stem f...
Description: I have a fully functional Telegram Reward Bot running on Python (Telebot) with a PostgreSQL database on Railway. I am expanding this into a Web-based Task System (Task Point Media). What is already done: Full Telegram Bot logic and Database schema. User management and balance system. Basic Postback listener logic. What I need from you (The Expert): Web Bridge: Create a simple, high-speed PHP or Python web-dashboard that fetches User ID and Balance from my existing PostgreSQL DB via a secure URL token. Iron-Clad Security (Crucial): Device Fingerprinting: One device, one account only. VPN/Proxy Detection: Block all tasks if a user is on a VPN/Proxy (mandatory for CPA/AdMob/Unity). Anti-Fraud: Root/Jailbreak detection and Emulator blocking for the webview. SQL Injection & XSS...
I have a website and when running the PCI Compliance Report, 31 Vulnerabilities were found as well as 15 special notes. I need someone very experienced with this that can make the needed changes to pass the PCI scan.
My long-running website is stable and fully live, yet it now needs consistent care so it stays that way. I want a dependable professional who can slip in seamlessly, keep everything up to date, and jump in quickly whenever something breaks. Routine responsibilities include: • Security updates to core files, plugins, and any third-party integrations • Performance optimisation to ensure pages keep loading fast under varying traffic • Automated and manual backups with easy restoration points • Troubleshooting of unexpected issues as they arise • Regular plugin or module updates and general housekeeping keeping an eye on google analytics and Consoul to track I already handle content, so this role is purely technical maintenance: no design or copy work is re...
I'm seeking a skilled cybersecurity professional to secure my devices. Someone has been infiltrating my macOS computer and iOS phone, and I need expert help to stop this. Key Requirements: - Secure my devices from unauthorized access - Identify and remove any existing malicious code - Provide a report on vulnerabilities - Recommend and implement security measures Ideal Skills and Experience: - Proven track record in cybersecurity - Expertise in macOS and iOS security - Strong knowledge of malware and intrusion detection - Ability to communicate technical details clearly Please ensure you have relevant certifications and experience.
I’m putting together a lightweight, consortium-based blockchain layer to decentralize the control plane of a software-defined vehicular ad-hoc network (VANET) for ddos attack. The architecture must place enhanced security front and center—specifically, it has to guarantee data integrity, robust authentication and strong privacy protection for every message that moves between vehicles, roadside units and cloud edges. Because we are working with a consortium blockchain, I expect permissioned membership management, rapid consensus and low latency that fits the tight timing windows of vehicular communication. Open public chains are off the table; the solution has to remain controllable by a defined set of stakeholders such as OEMs, infrastructure operators and municipalities. Her...
Remove a video from an 18+ site This video belongs to a relative of mine and I want it to be completely removed.
I need an experienced systems professional who can take ownership of my production servers from the ground up. The job starts with a full audit of the existing Linux stack (Ubuntu 22.04 on AWS EC2), then moves into tightening every layer—optimising configuration, hardening services, and putting robust security controls in place. What matters most to me is confidence that the machines are patched, performance-tuned, and continuously protected. After the initial hardening you will set up real-time monitoring and alerting (Prometheus + Grafana is currently installed but not fully wired), document a clear maintenance schedule, and remain on hand for rapid incident response. Deliverables • Comprehensive audit report with recommended fixes • Implementation of agreed configu...
A full-scope penetration test is required on my production web application with special attention paid to authentication and authorization workflows, input validation and sanitization routines, session management, and any additional vectors you deem necessary for a modern OWASP-aligned assessment. Automated scanning is welcome, yet the emphasis should remain on thorough manual exploitation using tools such as Burp Suite, Kali Linux, or equivalents, so that business-logic flaws are uncovered alongside technical ones. Please include a redacted sample or concise summary of past work that demonstrates report structure, depth of findings, and remediation guidance. No other application materials are necessary at this stage. Deliverables expected: • An executive summary and detailed ...
I’m ready to give you full access to our live, multi-tenant transportation SaaS, and I need a complete quality audit finished as soon as possible—no later than 20 business days after the NDA is signed. What I expect you to cover • Functional depth first: 13 individual modules (booking, dispatch, driver tracking, pricing, invoicing, SMS/email marketing, and the rest) must be exercised in real-world workflows for all six user roles. • Security with special focus on tenant-to-tenant isolation. Authentication, authorization, injection vectors, and PCI areas still need attention, but isolation is the non-negotiable baseline. • Load and performance baselines under realistic concurrency. • Usability feedback from the perspective of each role. • Cr...
My internal ERP sits behind a private domain that I’m ready to move under Cloudflare Zero Trust. The goal is simple: when someone tries to reach the ERP URL, the prompt must enforce multi-factor authentication and allow the session to open only if the request comes from one of our office computers on our Wi-Fi network. Anything originating elsewhere—home, café, mobile hotspot—should be denied outright. Here is what I need from you as the security specialist familiar with Cloudflare Access, Gateway, and device posture rules: • Configure the domain inside Cloudflare, enabling the security features that sit in front of the ERP server (Firewall, WAF, DDoS protection). • Create an Access policy that ties identity (Google Workspace / Azure AD, or another SS...
Title: Cybersecurity Specialist Needed to Identify and Eliminate Ongoing Device & Account Breach Description: I am looking for an experienced cybersecurity professional to help investigate and resolve a serious security issue. Last month, multiple personal accounts (including WhatsApp and other social platforms) and devices were compromised. Since then, I have: Switched to new devices Reset passwords and secured accounts Enabled basic security measures However, I still suspect unauthorized access or persistent compromise. There are concerns that my data may have been exposed or that a hidden vulnerability (malware, spyware, remote access, or account takeover method) still exists. Scope of Work: Perform a full security audit of devices and accounts Identify how the breach occurred...
Project Description: I am looking for a WordPress expert to fix loading issues and security vulnerabilities on my real estate websites. A previous assessment of my cPanel shows several outdated sites and plugins, a malware infection, and a conflict caused by two separate WordPress installations running on the same domain. Scope of Work: Malware & Virus Removal: Manually scrub the hosting environment, files, and databases to remove all viruses. Do not tell me to contact the host; I need you to do this. WP Installation Fix: Resolve the conflict caused by having two WordPress setups on the same domain. Clean up the directory structure so only the correct version is live. Updates & Maintenance: Update WordPress core, all plugins, and themes to the latest versions while ensuring not...
I run a small construction company and want to build a long-term relationship with an external IT team that bills by the hour. My most pressing need is tightening our email defences, but you will also step in whenever we face issues with phone or computer security, malware, or any attempt at hacking. For email specifically, make sure your proposal shows how you will: • stop spam and phishing before it reaches our staff, • enable encrypted communications that are simple for non-technical users, • set up access controls and ongoing monitoring so we always know who touched what and when. Beyond email, outline the tools and processes you use to harden endpoints, secure mobile devices, and perform rapid incident response. A detailed project proposal explaining your approach, ti...
I’m looking for a reliable WordPress developer to fix some issues on my website. The site is already built and the pages are in place. This is NOT a rebuild. Current issues: - Old URLs (e.g. /skips/...) are returning 404 errors - These need to be properly 301 redirected to the new URLs - Some internal links may still be broken What I need: - Set up all 301 redirects (old links to correct new pages) - Fix all 404 errors - Check and correct internal links - Quick audit to ensure the site structure is correct - Basic security check (ensure no public access to files/data, no vulnerabilities) Important: - This is a FIX job only, not a redesign or rebuild - The site is built on WordPress - I need this completed quickly and properly Please include: - Your price ...
I’m expanding a full-stack cybersecurity practice and want a driven freelance closer who can own every step of the sales cycle, anywhere in the world. Your mission is simple: bring in new business for our penetration testing, security auditing, cloud security, infrastructure security, and API security services—and get paid on pure commission for every dollar you help us earn. What you’ll actually do • Identify and prospect ideal clients across any region that makes sense—North America, Europe, Asia, or elsewhere. • Run discovery calls, scope technical requirements with my engineering team, prepare proposals, and negotiate contracts until they’re signed. • Maintain your pipeline inside our CRM and deliver a concise report each week. How y...
I’m carrying out some personal research and need a hand tracking down both the correct URL and the corresponding server IP address for a website whose name I already know. I do not have the URL yet, so the first step will be locating the official domain. Once you confirm that, I’d like you to resolve the domain to its public IPv4 (and IPv6, if available) address and supply a quick explanation of how you verified the result. Please keep the process entirely above-board: open-source intelligence methods such as WHOIS look-ups, DNS queries, nslookup, and public records are fine. No intrusive techniques are required or wanted—just accurate, verifiable information. Deliverables: • Verified website URL • Public IP address(es) for that URL • A brief note (...
The scope of this engagement centers on a fresh Windows-based server stack that needs to be fully stood up, secured, and kept running smoothly. The core activities include: • Server setup and ongoing maintenance – building the Windows Server environment from scratch (version 2019 or later), applying best-practice roles and features, scheduling regular patching, and monitoring performance. • Network security management – hardening the OS, configuring firewalls, refining Group Policy, and setting up audit logging to meet standard security baselines. • Microsoft SQL Server support – installing, configuring, and tuning SQL Server, setting up automated backups, and verifying high-availability options where appropriate. Success is measured by a clean deploy...
Por favor, regístrate o inicia sesión para ver los detalles.
Project Brief (Summary): Authorized Token Exposure Testing Platform Goal Develop a security testing tool to identify insecure handling of API tokens, session tokens, and credentials in web apps and APIs— Mainly Telgram HTTP API tokens Core Functions Scan for phishing websites…, - Traffic Analysis: Inspect and replay HTTP requests to detect tokens in headers, cookies, and responses - Client-Side Scanning: Identify tokens or secrets in JavaScript, LocalStorage, SessionStorage, and frontend code - Endpoint Discovery: Map API endpoints and classify authentication requirements - Token Inspection: Decode and analyze JWTs (expiry, scope, sensitivity) - Auth Testing: Validate whether APIs correctly enforce authentication and authorization - Offline Analysis: Support...
I have a domain sitting in GoDaddy’s dashboard and a single-page business site template—HTML, CSS and a bit of vanilla JavaScript—ready to go. What I need is for you to make it live on AWS, wire up a working contact form, and ensure the domain resolves over HTTPS without any hiccups. Here’s the flow I’m picturing: • Spin up the most appropriate AWS service (S3 + CloudFront for a static site or a lightweight EC2/Lightsail instance if you prefer), enable HTTPS via AWS Certificate Manager, and configure the distribution so the pages cache properly. • Point my GoDaddy DNS records to the AWS endpoint; a quick walkthrough of the settings you change would be helpful so I can repeat it later if needed. • Drop the provided template in place, confi...
We are looking for an experienced Carbonio expert to review, troubleshoot, and optimize our current email system. Scope of work: • Review our existing Carbonio CE installation and configuration • Diagnose issues with specific domains that did not migrate correctly • Identify bugs, misconfigurations, or performance issues • Fix problems where possible or provide clear solutions/workarounds • Optimize system performance, stability, and security • Verify DNS configuration • Ensure all services are running correctly • Provide recommendations and best practices Current situation: • Migration to Carbonio CE already completed • Some domains are not functioning correctly after migration Environment: • Please send us a message for details su...
I run several Windows 11 PCs that should be able to see one another on the local network, yet every time I try to connect I’m prompted for a username and password that the system then refuses. File-sharing, printer access and even simple ping tests fail at the credential stage, so I’m clearly missing something in the authentication chain. I’ve already cycled through the usual fixes: reset all network settings, recreated and changed user credentials, restarted every device on the switch and even tweaked a few Group Policy and security settings. None of it has stuck. Because I’ve done a fair bit of leg-work, I’m after someone who can go deeper—spot a mis-set SMB policy, a credentials manager glitch, a firewall rule, or whatever else is blocking the handsh...
I’m ready to turn an idea into a fully-featured web application that users can access seamlessly from any browser and install on both iOS and Android devices as a Progressive Web App. The core build must therefore be a standards-compliant web app, but it should behave like a native mobile application—offline support, push notifications and home-screen installation are all essential. Pwa Need fire base added for data This app is all about privacy I have the code already Here’s what I need from you: • A responsive front-end that scales elegantly from desktop down to the smallest phone screen. • PWA essentials in place (service workers, manifest, caching strategies) so the app is installable and functional offline. • Clean, well-documented code and a st...
I have a data scraping company and I work with music services. Basically, we collect metadata from various accounts that we generate from different countries and reconstruct current trends, genres, tempo, top artists, authors, algorithms, etc., and we sell them B2B to our clients (major record labels) like UNIVERSAL, SONY, and WARNER. We currently have a problem with Spotify; they are "killing" the accounts, and we are forced each time to generate new ones, wasting unnecessary bandwidth. We have identified that the problem occurs when using the storage credentials (auth_blob) to request the access token (bearer), which lasts 1 hour, so we need to get it often. Then they, based on the quality of the IP, take them down (but we use residential proxies, even Oxylabs, because yes, we...
I need an experienced security professional to spend time in our Delhi NCR office and harden every layer of our development environment, starting with the laptops my engineers use daily. Immediate focus – securing laptops Please arrive ready to implement or advise on: • Prevent data/code leakage • Restrict USB, file sharing, and all external uploads • Control developer access with screen recording Activity monitoring is the key restriction I want enforced from day one. You may bring your own preferred EDR/DLP toolset or work with ours; what matters is that the controls are provably effective and centrally managed. Broader scope during the same engagement Once the endpoints are locked down, I’ll move straight to: – Rolling out Data Loss Preve...
We are the Sudanese British Association (SBA), and we are seeking a top-tier, highly experienced Senior Developer or a small, elite agency to architect and build Phase 1 of our new digital platform. PLEASE READ CAREFULLY: This is NOT a standard brochure website. The SBA platform is a multi-layer digital ecosystem designed to serve as a national-level diaspora hub and a global knowledge network. It requires complex relational data architecture, strict role-based access control, and robust search capabilities. We have a comprehensive, developer-ready specification document (Database Schema, User Flows, UI/UX Structure) ready to share with the successful candidate. If you only build basic templates, this project is not for you. We need an architect who understands complex data relationship...
I run a simple three-page WordPress site, , and I’d like to place it under a steady maintenance plan. For a flat $15 each month, here’s what I need from you: • Content updates once a month—this could be a text tweak, a new photo, or a small blog post. • Routine plugin and core updates carried out promptly, with a quick check afterward to be sure nothing breaks. • Basic security upkeep: patch vulnerabilities, run malware scans, and keep backups ready in case something goes wrong. That’s the core of the job. I may want minor design improvements down the road, so the ideal person is comfortable jumping in when those requests arise, though that work would be scoped and paid separately. If you’re reliable, know WordPress inside out, and can se...
Join our mission to make the digital world safer! As a Bug Bounty–Focused Security Analyst, you’ll work closely with our global community of ethical hackers, helping identify, validate, and escalate real-world vulnerabilities — ensuring organizations stay ahead of evolving cyber threats. Your Role Review, validate, and triage vulnerability reports submitted by bug bounty hunters. Assess the impact and severity of findings, including CVSS scoring. Collaborate directly with ethical hackers to reproduce and understand vulnerabilities. Provide clear, actionable remediation guidance to clients. Perform targeted penetration testing to support and verify bug bounty findings. Identify duplicate, false positive, and low-quality submissions efficiently. Contribute to improving b...
I have a working-but-fragile Chrome extension that crawls pages and “dorks” (niche search queries) looking for HTTP API tokens that match a specific regex. The job is twofold: 1. Repair and streamline the current codebase so the scanner reliably captures and locally stores every hit. Right now it sporadically misses matches and sometimes stops writing to storage. 2. Enrich the detection logic with fresh, private dorks and widen the sweep to cover the full set of indicators I care about: Keywords, Phrases, API endpoints, HTTP API strings and any related variations you can dream up. The flow I picture: • Content script injects, scans DOM + network responses in real time. • Regex engine identifies tokens, deduplicates them and saves to local storage / optional we...
I want my site’s static assets—images, CSS and JavaScript—to be served through Amazon CloudFront so pages load faster without breaking any of the login-based features or active user sessions. My AWS account and the necessary IAM roles are already in place; what I need now is an expert who has done this before to: • Create and configure the CloudFront distribution, origin settings and cache behaviours • Set proper TTLs, path patterns and invalidation rules so static files cache aggressively while authenticated pages bypass the cache • Enable HTTPS, compression and origin shield (if useful) for optimal performance and security • Provide a quick walkthrough or short notes so I can maintain the setup later Once everything is wired up, I’ll te...
More details: Which specific areas do you need mentorship in? Configuration issues, Security policies, Traffic management What kind of configuration issues are you facing? This question was skipped by the user Which specific security policies do you need help with? This question was skipped by the user
My website has 11 redirect errors, 404, and other issues that need to be resolved. Requirements: - Identify and fix broken links and 404 errors. - Ensure all redirects work correctly. Ideal Skills: - Experience with Ionos website management. - Familiarity with SEO and website error resolution. - Attention to detail and problem-solving skills. Please provide a timeline and any relevant experience.
We are a startup working on a highly confidential and private internal project. Due to the sensitive nature of this initiative, we require a highly experienced Cybersecurity Specialist with strong expertise in advanced security testing and simulation techniques. This is not a basic vulnerability scanning or standard assessment role. We need an expert capable of performing comprehensive, advanced-level security testing against robust environments while maintaining complete confidentiality. Project Duration: 2 to 3 months (possible extension based on project needs) Compensation: ₹3,00,000 per month (premium budget for the right expert with proven advanced skills) Key Requirements: 5+ years of hands-on experience in advanced cybersecurity testing and security operations Must hold advance...
I need a skilled QA specialist to test, refine and deploy a web application. Requirements: - Test on Chrome and Safari - Perform functional, performance, and security testing Ideal Skills: - Experience with web app QA - Proficient in testing on multiple browsers - Strong background in functional, performance, and security testing - Familiar with deployment processes Looking for someone detail-oriented, with a track record of ensuring high-quality software.
More details: What functionality should the freelancer profiles have? Depending on the package they decide to subscribe to: 16 Images Priority in search results Hide My Profile feature Image Voting Profile Statistics Skimpy Forum Testimonials Selfie Gallery Subscribe to short notice availability Special Offers News and Announcements Archive Gallery Choose your own image layout Video Gallery Image Blurring - SB Photoblur Tour Page - Australia / International •upload their professional pictures, •Ability to list services, •Direct sales capability, •Client positive reviews only, •Logins, • ”Available now” option •Have their own blogs ( private content page for clients to subscribe to.) Each freelancers will have their own profiles and ...
we need a Website API Expert , we have a website where images path coming from API Code , I will give you few codes to check how images coming , i need someone who can figure out how those images path coming and you can get other images urls as well , mention IMAGE in your proposal else you will be Ignore , Need someone who can get it done ASAP , If you can able to get the url path then only we will hire you
I already have a clean Linux server reserved for n8n and need an expert who can take it from first boot to a fully operational, self-hosted automation hub. The goal is to build a reliable environment where I can design complex, client-facing workflows and handle routine data-integration jobs without worrying about stability, scaling, or security. You will: • Install and harden n8n on the Linux host (SSL, reverse proxy, backups, environment variables). • Configure user management, logging, and version-controlled deployment so I can push updates safely. • Build at least two sample workflows that demonstrate 1) seamless data transfer between systems and 2) a marketing-automation sequence, showing me the key nodes, triggers, and error-handling patterns. • Document ...
We’re looking for someone to join our team for a 6-month freelance/contract/full time role (remote) focused on application authentication and authorization using Microsoft Entra ID. In this role, you will design and implement secure identity solutions, enabling **SSO, OIDC/SAML integrations**, and centralized access control across enterprise applications. You will work closely with development and infrastructure teams to modernize authentication flows and strengthen IAM practices. **Key Responsibilities** * Implement and manage authentication & authorization using Microsoft Entra ID * Design and integrate **SSO solutions (OIDC/SAML)** for applications * Configure and enforce **access control, MFA, and Conditional Access policies** * Integrate modern apps (React, APIs) and lega...
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Learn how to find and work with a top-rated Google Chrome Developer for your project today!
Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.