Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Contratar a Computer Security Consultants
If you were hired as the single IT person for a brand new company. As part of your new role, you've been asked to setup: 100 users One corporate office location and two satellite locations Mixed environment of Windows and Mac desktops Three line-of-business application servers (Windows/Linux) Which firewalls/security appliances would you use? How would you ensure users can access all resour...
I have lost my mobile [iniciar sesión para ver URL] I know my IMEI number so anyone who find please contact if you can
I need a tech savage individual to connect my channel manager to my bed and breakfast so that i can receive bookings from bookuing ,com expedia ,agoda etc.
BlueHost identified Malware on my website. I need someone to scan and remove the files - see attached screenshot. These files are hidden! Not as easy as going via file manager and deleting them. It would need special scanning software and skill..
I need some one who can capture traffic and packet of some part of my device, just professionals
Hi, I do cyber security consultancy jobs. Primarily in - Risk Management - Chief Information Security Officer - Information Security Manager - ISO27001 I need someone that can find me more jobs to do. You would get percentage if the contract. The jobs needs to be primarily remote. I have +20 years of experience.
You must know Snapcraft very well. Spend 8 hours with me on Zoom and go through the process of creating Snaps and be able to answer in depth questions. You must understand confinement, writing to files, passing information to other Snaps, using API's etc... Must speak clear English.
Tasks are but not limited to: Network Topology design Labeling IP addresses and Subnets design setup Users and groups configuration DSS (Management server) configuration EVS (Storage server configuration) Cameras configuration Storage redundancy, location and schedule configuration ReportDocumentation
I need Fix OpenVPN Server Internet Issue. I have OpenVPN Server. VPN connected every time. some time internet not access when connect vpn. if i restart openvpn service then problem solve. again many time face this problem. you need find why face this problem & i need permanent solutions
Our company got hit by a ransomware, and all the files in the windows server has now a .devil extension. Need security expert who can decrypt the files and remove the virus from our server.
i need a person who knows computer security and know how to search
SSR, CLASH, V2 RAY NEED PROGRAMMWER WHO CVAN HELP TO BUILD ASTABLE SERVICE
- Comparing and analysis the performance of existing protocols such as Epidemic, Spray and Wait and PROPHET using ONE Simulator - Required to design and create new routing protocol based on existing protocols such as Epidemic, Spray and Wait and PROPHET protocols using ONE Simulator. - Implement and simulate the new routing protocol using ONE Simulator
I am certified with some cyber security vendor certificates and i am working on ways to build my practical experience. I need an experience cyber security consultant to assist me in gaining the practical experience needed.
This is a research-oriented task. For this assignment you are required to: - Produce an encryption algorithm to secure communications performed - Your encryption algorithm can be completely novel or inspired by existing algorithms. Instructions for fulfilling the task: - Present a reflective summary of the current cybersecurity threat landscape. - Include the full specifications of the insp...
Hello. I am looking for the platform where I can upload my video lectures which can secure my content from getting it leaked. So Looking for the one who can develop such software or a platform with this features for all possible content leaks: 1. Multi-DRM 2. Forensic Watermark 3. Anti - Capture to avoid screen recording 4. And Ovio, App security to prevent any Cyberattacks. Please be in touc...
I have an 2 TB external hard disk has been encrypted by a hacker , I need help to decrypt all my files from my hard disk
hi,i need a person who knows computer security very well
I am seeking a talent who has information on how do people use fake mobile numbers to receive OTPs and thus to create dummy accounts in websites and apps? I need a solution on how do we identify those dummy registrations and block such?
Specification no.: [iniciar sesión para ver URL] (XXX =887) Internal network address: [iniciar sesión para ver URL] NAT pool Public address: 165.XX.55.44/18 to 165.X.55.51 (XX = 87) ISP Network connection: [iniciar sesión para ver URL] ISP Internet Web Server Address 160.120.44.X/28 (X is 34)
The data file [iniciar sesión para ver URL] was found on an external hard drive at a crime scene. The file format and contents are unknown. Using only a hex editor, analyse this file and describe what you can locate. You should explain the steps that you took to obtain any evidence. Your answer should include 1. What is the file type of this data file? How was this discovered? 2. What are t...
- Comparing and analysis the performance of existing protocols such as Epidemic, Spray and Wait and PROPHET using ONE Simulator - Required to design and create new routing protocol based on existing protocols such as Epidemic, Spray and Wait and PROPHET protocols using ONE Simulator. - Implement and simulate the new routing protocol using ONE Simulator Please ask me for project proposal.
Need help with the topic of IoT Security in IoT protocols. Protocol examples include zigbee, wifi, ble, nfc, rfid, mqtt, coap, xmpp, rpl etc. Critical analysis and comparison skills are required for the different protocols.
i have a [iniciar sesión para ver URL] which opened using Wireshark and view the trace using the File pull down menu, choosing Open, and then selecting the existing file then answer questions related to file
Hello, I would like to use a spy software but I do not know how it works and which software to chose. Ideally I would want to chose a FREE plan. Could you please help me with choosing the best plan, and tell me how to install it and use it. Do you know any good free software? Tell me about your experience using spy software for the phone and if you are able to get a good free version. I looked on...
I have few wedding pictures which are infected by Ransomware virus (all files changed to .npsk format).. need someone who can recover them
I have a project, I'm doing one section of it. Firewall section. There needs to be configuration done of the firewalls, there needs to be rules that are applied. There will be a firewall, one will allow access to pass through and one will block. Basic configuration for the firewall in the topology. I need this done and topology file modified, I also need a word document of you putting the ste...