Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Najem Computer Security Consultants
I am preparing documentation of some work. I need a person having web security, ethical hacking knowledge and experienced knowledge to check my documentation, suggest proper changes, can suggest new innovative things...etc. Min Checking Cost Per Chapter - 600/- Rs Max Checking Cost Per Chapter - 1000/- Rs (Indian Rupees) (Maximum 7 Chapters are there) Note - No emergency, No such time limit. Bu...
We have an openWRT router which is connected to our VPN server. Other devices connected to the same VPN server have access to the web interface of the openWRT router. openWRT router has two networks: LAN and WAN. From any device connected to the VPN, we want to connect to the devices connected to both networks. Therefore, we need help to achieve that.
Hi, Anyone with knowledge on security are highly encouraged to apply. The project is on going basis for long term. For now you will implement s/key to generate one time password (console based) and thats about it. Further details can be sent to shortlisted candidates.
Cache server stable for ISP we need to cache ( YOUTUBE, Facebook, http, https, streaming) we prefer if someone have already done this project
Hi I am looking for an expert in Cisco Nexus switches and Catalyst switches to add class-maps, policy-maps and service-map to prioritize [Removed for encouraging offsite communication which is against our Terms and Conditions -Section 13:Communication With Other Users] for business application conference calls. Please let me know if you have done it before and it you have experience in this. Thank...
* Needed experienced person for the projects. * Freelance for L1 and L2 work. * Experienced in Installing Firewall, Juniper. Install 2 x PAN-PA-820 · Equipment mounting into the cabinet. · Cable patching within the cabinet for network connectivity. · Power on and adding management IP Address on devices to enable customer’s /channel partner’s remote NOC to connec...
Need someone who can create a VPN from a client machine to the server using Softether. I have full control of Comcast modem and the AT&T modem, and have remote access to the server. I have the client machine connected thru VPN and it gets an IP address, the client just doesn't see the network!
need a long term developer how is familiar with python coding, I want someone to train me on python and teach me from basics. I am planning to have a full course and complete it in at least 5-6 full weeks. ( I prefer classes on Monday / Tuesday / Wednesday / Friday ).
We are a startup that collect transportation and vehicle data and would like to add machine learning to help with better identification of devices. Can provide more details during a call if you are interested in this job.
I need to look back on my search history over a specific period, but have deleted the history, and the activity log from my Google account. I'm hoping there will be another way to recover this search history. I'm also looking to improve the overall security of my laptop as I have concerns that I have been hacked.
Ok for this project you’ve been given several codes that you need to try and decode. You’ll need to research some of the most common encoding schemes used to try and break each of the codes. An experienced security expert can spot most encoding schemes very quickly, the trick is to check the character set used in the encoded message and the length of the encoded message, these will poi...
We need to simulate sinkhole or sybil attack using cooja simulator in RPL. Thus, we need to modify the source code of objective function that handles rank calculation. All this must be done in contiki OS 2.7
Mixed method data analysis quantitative using SPSS (simple statistics) then using MAXQDA for interview coding ) phd level then discussion
Looking for help setting up a Synology Diskstation with SSL and a private domain name, access through my router (the diskstation has an internal static IP) setting up tight security policies and firewall rules, and implementing best practices for data security, virus protection and automated backup.
Location of the Job: NEW YORK (USA) Type of the job: On-Site Duration: 1 to 2 Days Max Hi, We need a Cisco Field Engineer to do a LAN MAINTENANCE IN NEW YORK estimated job is one day. please see attached document for the job description let me know if you have questions.
Hi, I am working on a mini project on the topic, "Security analysis of RPL network protocol in IOT systems". I would like to simulate Blackhole attack against RPL using Contiki cooja simulator and analyse the performance of RPL under blackhole attack (power consumption with and without malicious motes). The requirements are as follows: 1. Setup a simulated environment capable of gat...
There is requirement to identify suspicious users from web server log file. Definition of suspicious users - Suspicious users are the users other than attack users. They are suspicious because they don't have any particular aim to visit a web application. They neither do hacking activities. But they even not normal users. They do other than normal activities without any purpose. For example,...
I am a penetration tester researcher for a corporate firm and I am looking for a well-detailed technical analysis on post-exploitation analysis.
A content writer with relevant IT experience who can provide all necessary data/reference/explanations etc with regards to the IT security topics given. The main topic are security properties, threats, vulnerabilities, CVE etc.
PLEASE APPLY ONLY IF YOU ARE QUALIFIED - THIS JOB IS FOR GENIUS ONLY I want to test the level of security for my website. I need you to hack my own website and check if you can steal my own email database. If you manage to do this, help me find secure the website. The job interview will be done in skype video call only.
I need an admin with VERY strong familiarity with both Amazon Web Services and Linux/Linux Security. The admin hired for this project will be tasked with uploading 4 virtual machines to my Amazon Web Services environment. The virtual machines are virtualbox virtual machines, so they will need to be converted to the OVF format, uploaded to S3, then imported as an EC2 instance in my VPC. OpenVPN AS...