Is your country on the list?
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Hire Computer Security Consultants
I have already configured openvpn in my office and I have successfully connected the client with the server as well. But I am having issues regarding ping and firewall setup. Budget is fixed ₹600
Looking for oscp lab report 30+ boxes & exam report 70+ points (for learning purposes). Might be sanitized.
I need an expert who knows the infrastructure of the Internet very well. What I wanna do is pretty simple. Show custom html content in place of Ads on "HTTPS" webpages. Experience with pi-hole is a great plus. * If you don't have any idea, please don't bid. * Include "I know pi-hole" at the top of a proposal to show you are not a bot.
We have a number of Mikrotik routers and switches in a network (total about 2 routers and 10 switches). Due to a lapse in our documentation over time, we want someone to document and then sketch out the current network topology from the configurations on the switches and routers. The end result will be presented in Microsoft Word / Excel (or open source alternative) file format for the records, p...
its about a case which consider Ethical and Law considerations - Focus on the ethical issues and also the treats and the risks (mostly interested in network and hosts security threats). For more details please send me on the chat .
My name is Okunola Elisha, an educationist with more than 8 years of teaching and research experience. I have compilation of WAEC economics notes for SS1 to SS3 (i.e Year 10 to year 12). The notes have been designed to include series of WAEC past questions already organised topic by topic to ensure that students master the course content. I want to design App that perform the following functions: ...
Need a network engineer who can do a passive side of networking ( cabling , splicing,face plate fitting ,crimping,croning .) Person shuld have his own splicing machine and penta testing machine wih him . the work location is mauritius .
Security analysis for an existing work. I am looking for help to improve security analysis of an existing system by defining or determining 5-6 attacks that are defeated by the design with well justification and professional explanation. Please contact me for further details.
I needed an information security expert As well as an expert in databases He has a Certified Ethical Hacker He has a long experience in his field It has news in networks
The name of the company is (NovaBay Pharmaceuticals, Inc.). NovaBay Pharmaceuticals, Inc. is a biopharmaceutical company developing products for the eye care market. We are currently focused primarily on commercializing prescription Avenova® for managing hygiene of the eyelids and lashes in the United States. Avenova is the only eye care product formulated with a proprietary, stable and pure f...
I need help with a project which includes the following topics. YOu must be familiar with the topics mentioned below. App Layer [DNS, http, SMTP] Transport layer [TCP, flow control, connection management, congestion control] Network layer [IP, IP subnetting, ICMP, NAT, DHCP, routing algorithms, LS, DV, and BGP Security [ Secret key, public-private, encryption algorithms. Techniques for confide...
I have an exam coming up, I have one sheet double sided 8.5 * 11 paper I can bring, I need the following information on it: ch6 (L2 security), ch7 (cryptography) and ch8 (IPsec). firewalls also included and IPS case study (based on the lab). Correct configuration modes need to be reflected in the CLI prompts you enter. I have the notes for the classes, I need the sheet created which will co...
The idea is simple: A GUI for a database where new malware is constantly being uploaded. From this GUI, the user (ideally a pen-tester), can launch the respective malware: Logistics: 1. User enters (on a screen) the website that they wish to test 2. From that, they have a drop down list with the type of malware that they wish to launch (Trojan Horse, AdWare, DDoS, etc.) 3. They can then select th...
Searching for someone who can teach the following topics in Linux -Caching only DNS server and its optimization -Setting up DNS primary and secondary Servers -DNS Views and Split Brain DNS -Setting up caching server for IPv6 -DNS security -DNS optimization The price for this training project is $25 so please do not quote above than that. Thank you.
I'm working on a project which functioning as an air server like apple-tv3; my project is based on an open source project named PhoneGap, but unfortunately the source left uncompleted; Some basic steps like registering the system in DNS-SD and pair setup and pair verify has been done successfully but it fail on fp-setup (apple fair play protocol initialization) step; now I need your help to s...
Need to build a SCRIPT for F5 load balancer to auto generate the configurations for a VIP, Pool, Members, Etc from a standard templet. Expample: VIP Name: Protocol: HTTPS/HTTP: Host Name or Node Name: Host Name or Node IP: Port: We give the inputs and the script should generate the configurations.
Hi, I've a big project that needs checking a function(10k-12k) lines of code and identify the vulnerabilities in the software. And also come up with solution to mitigate such risks. I will give detail to shortlisted candidates. Will hire 1 or 2 testers. Thanks!
Note: if you don't have experience with this then don't bid. need to code ad-ware with control panel, the ad-ware will get the ads from the control panel and then it will display it into the system. it will be coded with native language like C/C++/delphi. the control panel should be coded with PHP and bootstrap.
I want you to write a small report on malware detection All the necessary documents and links for reference will be provided
I need some networking diagrams like Topology, Traffic Flow Diagrams etc I need for LONG term You can use Viseo
i'm working on non-repudiation on social networking and iam finding it difficult to get the literature review and my prof. ask me to do literature review survey find my work and some paper for your review and advice on how we are going to do it