Seguridad informática Jobs
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Contratar a Computer Security ConsultantsI am in the cybersecurity/IT industry and would like the following from an experienced programmer: 1)Stable, fully undetected "FUD", crypter that has solid compatibility with most .exe files that will contain various malware samples to be used in sandboxed/isolated test environments for anti-virus evasion analysis. This crypter must be fully compatible with modern Windows environments (Win10/Win11). 2) Provide me with the original project source code, working and fully undetected crypter program and crypter stub. 3) Provide a detailed report on methods how I can personally "redo" parts of the source code you provide if/when the source code becomes detected in the future during testing/analysis with security tools. This part is very important, I am expecting quality...
Need Skill developers who; - Can develop a new digital signature platform like Docusign, Panda, etc.. - Have an understanding of PKI security and SSL certification - Has a good understanding of Biometrics (finger, facial and iris) - Understands mobile security - Is able to develop two or more factor verification processors - Understands biometric enrollment, verification and authentication
Cisco packet tracer perform home automation of internet of things
We are looking for a cyber security hacker that can find and propose ways to keep our platform more secure
Please bid only if you worked with Mikrotik version 7 BGP I have a running mikrotik when I upgrade to version 7 bgp stops working can you help?
Computer Networks Questions for computer Science
Computer Networks for business purpose
how to protect cloud data privacy with Homomorphic Encryption. To protect our data privacy in cloud and meanwhile allow the cloud server to process our data, the best solution is using homomorphic encryption scheme, e.g., Paillier encryption scheme, to protect our data in the cloud. In this question, you are expected to understand how homormphic encrytion technique can be used to protect your data privacy in Cloud and analyse data privacy
Por favor, regístrate o inicia sesión para ver los detalles.
i am looking for some one have skills in dealing with problems in applied cryptography , more details in che chat
I am looking for an expert Cyber Operations, My project is on "Analyzing the threats imposed by virtualization in cloud computing". Rest Information will be given on chat
i am looking for some one have skills in dealing with problems in applied cryptography , more details in che chat
In this project, we will be performing Security Education (SEED) hands-on labs to demonstrate a classic buffer overflow for arbitrary code execution. We will also explore possible mitigations to both attacks and evaluate which are effective and which are not.
need someone who is good in academic writing and also good at the above networking concepts
I need 2 CV written : - data analyst -Cyber security engineer with Vulnerability Assessment
Hello, I need a tutor for computer architecture who is very proficient in the subject. I have a specific material from which I need to learn and I need to cover 121 pages in 30 days, I.e I need to complete 4 pages every day. The syllabus will be attached below. I require a tutor ASAP.
In this project, we will be performing Security Education (SEED) hands-on labs to demonstrate a classic buffer overflow for arbitrary code execution. We will also explore possible mitigations to both attacks and evaluate which are effective and which are not.
Hello everyone Hope you are doing well Can you check the attached pictures please and tell me if you understand them and then you can explain them in a very Thanks
To perform Security Education (SEED) hands-on labs to demonstrate a classic buffer overflow for arbitrary code execution.
Hi I am searching for an expert in 5G technology, cognitive radios and how to apply machine learning to manage spectrum, a device to device communication regarding discussing my master synopsis please message me.
Need to perform 2 activities 1. propose a WLAN deployment plan 2. network simulator OMNeT++ to investigate how the network scale affects the throughput performance
Goal is to check website and check form security to avoid any attack
We are looking tor QA in Japan It`s work with slot game,
Hello VxLAN experts, I need to replicate the following vulnerabilities / flaws: I'll provide two hosts four vms and the vxlans between them. Thank you.
I have an office place with 6 PC and will open another office of 6 PC. I want both of them to be connected in the same LAN. I thought a good plan is to have a managed router, a Firewall and a static IP and a VPN Server. Or you are free to suggest another plan for connecting the two sites. I you want to have the task please comment or write a message of the plan you think about to work. Deadline is very Important !!! Unifi dream machine UDM Ubiquiti Unifi USG fast IP-adress VPN tunnel - Konfigurera VPN
I am looking for someone who is having good knowledge of Machine Learning and can write a paper on "Real-time ML-based security auditing for the cloud." I will share the more details in chat.
We want to implement a fortigate firewall with following feature: 1. HA 2. SSL-VPN 3. VPN 4. URL filtering 5. WiFi controller We will require 1. Detailed design 2. Hearing sheet 3. Configuration best practice 4. Configuration
hey, I need to edit my background "in academic writing" not all sections I am not finishing and I need help to finish on Friday. Just the sections with red highlights, not all I have edited the first and second sub-sections, just from "FHE With noise management". Please take a look at the word doc and if you are interesting send me
We are looking for senior IT Engineers to support in house projects and customer networks. Primary work will be performed remotely. Must have excellent internet service and reliable working computer. We are primarily looking for engineers in North America or able to work with our clients between 4:00am - 6:00pm PST. Must be able to speak and write proficiently in English. If you meet the criteria below and are interested in complex IT projects let me know. We have enough work for 2-4 full time team members. I will need a formal CV/Resume for all applicants before you will be considered. If you send me a generic chat you will not be considered. This posting is for individuals only. We cannot hire other organizations for this position. ===== REQUIREMENTS ===== - Microso...
Hello Do you have expertise in Computer Networking? I need to virtualise a network. If yes, please apply.
Society main security guard and security supervisor ki job h
An expert is required to setup sonic wall on the laptops so that the laptops could be connected through VPN to a healthcare server in US.
I wanna require an ethical hacker to hack my cctv as i have forget the password
I need help with Network protocols, network security, DNS, IP subnets. i will send more details in the chat.
I need to edit my background I have already written and add information but I still not finished all there are more comments from Dr and adding more information
I have an exam tomorrow the subject is Assurance and privcy sec .
Dears, I need someone who worked as an admin for knowbe4 platform before
Need Freelance trainers on Cyber Security and Ethical Hacking for 3 Days Onsite Training un Chennai
Looking for a group of hackers to help me secure some sites and networks
We are trying to apply the rip & OSPF protocols over the project network, but we encountered errors that we could not solve in the tables and transmissions.
Hello, My business is based around a phone application. Before I launch I need to know more about cyber security. I need to protect my business and the users using the application.
It is represent the famous scholars who have strong trughts
Project will be described in detail once confirmed you can complete it.
Being blackmailed for personal pictures. Would like them deleted please
Using pbc.h library implementing proxy re-encryption scheme
This is regarding a real-time Intrusion Prevention System project using hybrid machine learning, which is based on two-level classification. The approach is from a base paper published by the IEEE, which is attached below. This needs to be of both the code and its live demonstration. Hope you'll accept it with reasonable consideration.
XG SOPPS 550 VPN SUPPORT USERS UNABLE TO CONNECT TO REMOTE VPN 08:22:57 2022 UDPv4 link remote: [AF_INET] Sat May 14 08:22:57 2022 MANAGEMENT: >STATE:1652512977,WAIT,,,,,, Sat May 14 08:23:57 2022 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Sat May 14 08:23:57 2022 TLS Error: TLS handshake failed Sat May 14 08:23:57 2022 SIGUSR1[soft,tls-error] received, process restarting Sat May 14 08:23:57 2022 MANAGEMENT: >STATE:1652513037,RECONNECTING,tls-error,,,,, Sat May 14 08:23:57 2022 Restart pause, 2 second(s) Sat May 14 08:23:59 2022 Socket Buffers: R=[65536->65536] S=[65536->65536] Sat May 14 08:23:59 2022 UDPv4 link local: [undef] Sat May 14 08:23:59 2022 UDPv4 link remote: [AF_INET] Sat May 14 08:23:59 2022 MANAGEMENT: &...