Compromised files removed from FTP and make sure site is safe and live urgent
- or -
Post a project like this1901
£15(approx. $19)
- Posted:
- Proposals: 6
- Remote
- #2283967
- Awarded
⭐ ⭐ ⭐ ⭐ ⭐ Top Rated in Plymouth UK, 17+ Years Professional Experience, A+ Communications
Metuchen
19762302742631505883167986925468422552841
Description
Experience Level: Entry
GDPR plug in was previously hacked, paid two different developers for the hack fix and there are still some compromised files listed from host, files marked with HIT need removing and to make sure site is live within the hour. Thanks Hack is mostly fixed but some files need removing I think that is it! We will then rescan and clear payment once it is done and checked all working.
There will also be another second job I will post on here or give to the Dev should the first job go well. Again to solve previous hack issues as woo commerce is not showing products etc. Next job will be £15 but needs doing today too please. Only professional Developers please who will not share any of my details and be 100% trusted! Should only be 30 min max on this one and maybe an hour on the next estimate.
There will also be another second job I will post on here or give to the Dev should the first job go well. Again to solve previous hack issues as woo commerce is not showing products etc. Next job will be £15 but needs doing today too please. Only professional Developers please who will not share any of my details and be 100% trusted! Should only be 30 min max on this one and maybe an hour on the next estimate.
Bequality Ltd
100% (69)Projects Completed
34
Freelancers worked with
31
Projects awarded
46%
Last project
30 Jan 2024
United Kingdom
New Proposal
Login to your account and send a proposal now to get this project.
Log inClarification Board Ask a Question
-
Hi Gemma,
Is your budget flexible for this job at all? Cleaning a compromised website, properly, takes much longer than half an hour.
It's clear that the site was not cleaned fully previously by your last 2 developers. Cleaning the compromised files is only the start of fixing the problem, finding the cause/entry point of the hack is the hard part.
Kind regards,
Matthew
762206
We collect cookies to enable the proper functioning and security of our website, and to enhance your experience. By clicking on 'Accept All Cookies', you consent to the use of these cookies. You can change your 'Cookies Settings' at any time. For more information, please read ourCookie Policy
Cookie Settings
Accept All Cookies