Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Contratar a Computer Security Consultants
I need someone that is proficient with big o, arrays, recursions, stack and queue, list and iterator ADT. Its only about 1 hour to 1.5 hours worth of work but could lead to future tasks.
Hi all! We are looking for a solution that intercepts in/out web traffic as a part of small DLP project. Mainly http and https traffic have to been intercepted and blocked if requests have restricted data. But it will be better if solution intercepts ftp, smtp and smtps traffic. Currently we have own solution for transparent proxy. We can intercept and block http, https, ftp, smtp, smb traffic usi...
Data Protection Application Programming Interface (DPAPI). Weaknesses and known security breaches in in DPAPI. Depth learning of DPAPI issues. Proposal solutions for DPAPI issues. This will requires a depth research and write a good report about it. I have the first draft report completed. Examples of how the report should be complete will be given upon request. Material and references to use as r...
What is required? A detailed review of the given research papers in a given template. The template will be provided separately. The word count should be between 3000-3500 words or 6 to 7 pages. Citations must be included wherever used. Avoid plagiarism. More details are given below. What is the topic? Internet of Medical Things (IoMT): A Review of Security & Privacy What are the component...
my x husband and friend have installed keylogger and much much more. He is cyberstalking me and it is out of control. He is in EVERYTHING. I want him removed, and specific information regarding incident and to have for legal purp;oses . I escaped with 2 broken [iniciar sesión para ver URL] IS NEW AT HIS CRAFT. HIS FRIEND MAYBE A MAX 5 YRS AT IT THO. I AM COMPLETELY CONTROLED BY I OR, I MUST...
I need someone who’s experiences in cyber security and creating apps, You’ll be further informed in the details in the app once we get in contact. I myself can help design the app I just need someone to code it.
"i need a network engineer who can complete my document writing ,, i did the packet tracer files , i just need someone to document what i did , please ping me so that we can talk to explain more "
I AM LOOKING FOR SOMEONE TO TRAIN ME TO DO ALL THESE THINGS: • Design, implement, and monitor security measures for the protection of the systems, networks and information. This includes after hours on-call support and handling technical problems escalated from Level 1 • Establish and construct security standards and best practices that an organization should follow. • Impleme...
[Deadline is Saturday] There will be a socket server and two clients. The image sharing will use Registration and Public Key Certification (server will be considered as a trusted certificate authority) Image posting in system using AES key, encrypted in CBC mode. Generating digital signature of the image with private key and SHA256 hash function. Image downloading with same AES key algorithms. ...
Microsoft Data Protection Application Programming Interface (DPAPI). Weaknesses and known security breaches in Microsoft in DPAPI. Depth learning of Microsoft DPAPI. This will requires a depth research and write a good report about it. I have the first draft report completed. Good Example Of what I want get improved. [iniciar sesión para ver URL]
Stop outgoing ddos or netscan from my vpn server instructions to do on servers, to stop these attacks from happening on my server by vpn clients connected to the server
We are a small ISP that has just added a 2nd upstream, we are looking for a Mikrotik BGP expert to set up load balancing/failover, the new upstream is 1 hop away from our primary edge router, our network is fully routed with OSPF. Our network is 100% Mikrotik.
*******Seriously inquiry only******* I am looking for a person to assist with a project most theory researching questions and answers. The Project require high quality work. NO copy and paste from internet is allowed. Experience in the following: Graph Algorithms Vertex orderings in graph Algorithms Public RSA key Set up the table for GCD and find private key for table Compressed with LZW NP co...
I am looking for a person to assist with a project most theory researching questions and answers. The Project require high quality work. NO copy and paste from internet is allowed. Seriously inquiry only. Experience in the following: Longest Increasing Subsequence algorithm Extended Euclidian Algorithm Longest Common Subsequence Levensthein Edit Distance **You most know those skills above**
Ethical reliable hacker needed to recover my Facebook account
If you were hired as the single IT person for a brand new company. As part of your new role, you've been asked to setup: 100 users One corporate office location and two satellite locations Mixed environment of Windows and Mac desktops Three line-of-business application servers (Windows/Linux) Which firewalls/security appliances would you use? How would you ensure users can access all resour...
I have lost my mobile [iniciar sesión para ver URL] I know my IMEI number so anyone who find please contact if you can
I need a tech savage individual to connect my channel manager to my bed and breakfast so that i can receive bookings from bookuing ,com expedia ,agoda etc.
BlueHost identified Malware on my website. I need someone to scan and remove the files - see attached screenshot. These files are hidden! Not as easy as going via file manager and deleting them. It would need special scanning software and skill..
I need some one who can capture traffic and packet of some part of my device, just professionals
You must know Snapcraft very well. Spend 8 hours with me on Zoom and go through the process of creating Snaps and be able to answer in depth questions. You must understand confinement, writing to files, passing information to other Snaps, using API's etc... Must speak clear English.
I need Fix OpenVPN Server Internet Issue. I have OpenVPN Server. VPN connected every time. some time internet not access when connect vpn. if i restart openvpn service then problem solve. again many time face this problem. you need find why face this problem & i need permanent solutions
I'm planning to hire a competent individual to work on my projects. They must be confident enough, quick, sound, and have much work experience to do the tasks. I'm happy to collaborate with you again. Thank you.