Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Contratar a Computer Security Consultants
Queremos crear una plataforma para nuestro fondo de inversion, donde el ususario puede tener su dashboard y retirar su dinero en btc en cualquier momento, que tenga una buena seguridad para cuidar los fondos, y que podamos recibir pagos en btc y otras criptomonedas. que la interface muestre las estadisticas y todo acerca de la inversion.
We are a latin american company looking for a Small to Medium size Cyber Security consultant company (based in Bangalore, India) very professional and skilled to help us improve our apps and systems security. We need you to pentest our Websites, Apps, and servers looking for problems related to security and give us your recomendations and information on improving our security.
Home Network TCP Port 1935 passthrough enabling. General Network troubleshooting on live-streaming gig Additionally, speccing and configuring 2nd temporary internet line. Cell box or the like Video Production experience is a plus.
I'm a writer and am working on a couple of pieces for a client, but I need someone with technical experience to provide technical examples for the articles. For example, 1 article is about securing the CI/CD pipeline using the client's product, and its written except I need someone to document an example like with the security automation use case, not setup but, problem state (exposed...
My project is designing any the fake app (malicious) so the this malicious app need only to be installed in the victim device After this malicious app has been installed, it will get the username+password that has been entered when the victim is login to his original gmail app. Note that user will not open the fake app(malicious) at all As the malicious app will get the username+password ent...
It will require deploying two virtual machines using Ubuntu as it's an operating system as shown in the attachment. One serving as a firewall and the other serving as a Honeypot. The firewall VM also integrates intrusion detection capabilities, therefore, in addition to filtering network traffic, it should alert any potential intrusion. On the Firewall VM configure the firewall using iptables...
I wanted a new survey type of Research paper created on my behalf using Fog,Edge , Dew and Cloud Computing with cyber security ..I am attaching a sample paper [iniciar sesión para ver URL] might refer 30 different papers or as many reference papers you like and create one single survey type paper in a word or pdf document. I want you to mention the conclusion and the future scope clearly.
One of the drawbacks of IPv4 is the maximum number of network devices it can support. IPv4 addressing uses a 32-bit network address. This allows for 232, or a little over 4 billion devices. However, today there are significantly more devices on the internet. Even though the more robust IPv6 version has been introduced and efforts are underway to assure wide adoption, IPv4 is still wi
We are from an IT consulting firm and an online tutoring company One of our client is in need of assistance in COMPUTER NETWORKING Project We need only PhD computer science experts to handle this project
I am looking for Information security and Cybersecurity expert. I will explain more on chat. Thank
I need help with TCP/IP attacks. My friend wants me to figure out how to use SYN flooding attacks and TCP RTS attacks on telnet and ssh. If anyone has experience in this please let me know ASAP!
this is a basic encryption project. All you need to do is using OpenSSL implementing ciphering and integrity check with c programming language. detail will be discussed.
need help with packet tracer project.. its configuration in packet tracer. pls see its easy task
I need web developer that have knowledge in IT iwth more than 10 years of experience to remove Malicious code, deceptive code, malware, virus and redirecting problem from the file site. I also need developer with IT knowledge in wordpress and codeignitor to secure server with tighter security to prevent from future attack. Also need to have knowledge in Plesk linux . There are several site on the...
Delivering In- house and Online CCNP Security CCIE Security Trainings to Indian and International Students. Prepare and develop training material based on requirements. Assess and evaluate performance of Trainees. Interact with management teams in scheduling training activities. Design and develop classroom materials and presentations. Skills Desired: Sound knowledge of Cisco Security technol...
Morning I need someone who is very familiar with Facebook passwords: Separate my company account from my personal account. At the moment there are both linked. We have asked a friend to help here and I fear he is way over his depth so we need to check he has not left our account open. Could I please ask for UK applicants only. Thanks
I need someone who can help me to solve problems in Information Security/ Cryptography/ Encryption.
I need to make many changes to my Linked In profile. I wish to start with getting rid of multiple accounts, fix passwords etc. Once done, I need to have my Linked In profile created, for which I need assistance. I am only interested in working with someone one on one, at my house or your place. PLEASE DO NOT APPLY IF YOU ARE NOT IN MELBOURNE, OR ARE UNABLE TO MEET ME AND WORK WITH ME SITTING TOGET...
I need someone who is computer Architecture expert. this project is long - term project. Only bid for those who can work in the long term. You have to work in the long run without reason or excuse.
Hi We are looking for Subject Matter Experts/Professionals/Professors/PhDs who have deep knowledge and understanding in Network Securities and communication
I am looking for a certified Fortinet engineer to pack me up in the installation of two units FAD-1000F load balancer in High availability mode . Someone with experience and good network background and in addition to security
Operating System. Need solutions for some exercises from Operating Systems subject.
Computer Networks Need solutions for some exercises from Computer Networks subject.
plss pitch ur monthly quote on on the following Job brief We are looking for a System Administrator to maintain, upgrade and manage our software, hardware and networks. Resourcefulness is a necessary skill in this role. You should be able to diagnose and resolve problems quickly. You should also have the patience to communicate with a variety of interdisciplinary teams and users. Your goal will...