Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Πρόσλαβε Computer Security Consultants
Need an IT network expert to solve 4-5 questions related to networks. The questions are related to topics covered in the attached image. The questions are to be solved in 1 hour. Your availability is required on 17th June 2021 from 7 pm to 10 pm according to pacific time in Vancouver, BC, Canada. When questions are solved you may leave before.
"i need a network engineer who can complete my document writing ,, i did the packet tracer files , i just need someone to document what i did , please ping me so that we can talk to explain more "
I AM LOOKING FOR SOMEONE TO TRAIN ME TO DO ALL THESE THINGS: • Design, implement, and monitor security measures for the protection of the systems, networks and information. This includes after hours on-call support and handling technical problems escalated from Level 1 • Establish and construct security standards and best practices that an organization should follow. • Impleme...
[Deadline is Saturday] There will be a socket server and two clients. The image sharing will use Registration and Public Key Certification (server will be considered as a trusted certificate authority) Image posting in system using AES key, encrypted in CBC mode. Generating digital signature of the image with private key and SHA256 hash function. Image downloading with same AES key algorithms. ...
Microsoft Data Protection Application Programming Interface (DPAPI). Weaknesses and known security breaches in Microsoft in DPAPI. Depth learning of Microsoft DPAPI. This will requires a depth research and write a good report about it. I have the first draft report completed. Good Example Of what I want get improved. [κάνε είσοδο γ&iota...
I am looking for a developer that can crawl information from airlines and web automation. I need him to be able to bay-pass any web crawling limitations like: - Akamai - Captcha/reCaptcha - hCaptcha - Distil Network/distil networks - humansecurity/White Ops - datadome/[κάνε είσοδο για να δεις &...
Stop outgoing ddos or netscan from my vpn server instructions to do on servers, to stop these attacks from happening on my server by vpn clients connected to the server
We are a small ISP that has just added a 2nd upstream, we are looking for a Mikrotik BGP expert to set up load balancing/failover, the new upstream is 1 hop away from our primary edge router, our network is fully routed with OSPF. Our network is 100% Mikrotik.
*******Seriously inquiry only******* I am looking for a person to assist with a project most theory researching questions and answers. The Project require high quality work. NO copy and paste from internet is allowed. Experience in the following: Graph Algorithms Vertex orderings in graph Algorithms Public RSA key Set up the table for GCD and find private key for table Compressed with LZW NP co...
I am looking for a person to assist with a project most theory researching questions and answers. The Project require high quality work. NO copy and paste from internet is allowed. Seriously inquiry only. Experience in the following: Longest Increasing Subsequence algorithm Extended Euclidian Algorithm Longest Common Subsequence Levensthein Edit Distance **You most know those skills above**
Ethical reliable hacker needed to recover my Facebook account
If you were hired as the single IT person for a brand new company. As part of your new role, you've been asked to setup: 100 users One corporate office location and two satellite locations Mixed environment of Windows and Mac desktops Three line-of-business application servers (Windows/Linux) Which firewalls/security appliances would you use? How would you ensure users can access all resour...
I have lost my mobile [κάνε είσοδο για να δεις το URL] I know my IMEI number so anyone who find please contact if you can
I need a tech savage individual to connect my channel manager to my bed and breakfast so that i can receive bookings from bookuing ,com expedia ,agoda etc.
BlueHost identified Malware on my website. I need someone to scan and remove the files - see attached screenshot. These files are hidden! Not as easy as going via file manager and deleting them. It would need special scanning software and skill..
I need some one who can capture traffic and packet of some part of my device, just professionals
You must know Snapcraft very well. Spend 8 hours with me on Zoom and go through the process of creating Snaps and be able to answer in depth questions. You must understand confinement, writing to files, passing information to other Snaps, using API's etc... Must speak clear English.
I need Fix OpenVPN Server Internet Issue. I have OpenVPN Server. VPN connected every time. some time internet not access when connect vpn. if i restart openvpn service then problem solve. again many time face this problem. you need find why face this problem & i need permanent solutions
Our company got hit by a ransomware, and all the files in the windows server has now a .devil extension. Need security expert who can decrypt the files and remove the virus from our server.
i need a person who knows computer security and know how to search
SSR, CLASH, V2 RAY NEED PROGRAMMWER WHO CVAN HELP TO BUILD ASTABLE SERVICE
- Comparing and analysis the performance of existing protocols such as Epidemic, Spray and Wait and PROPHET using ONE Simulator - Required to design and create new routing protocol based on existing protocols such as Epidemic, Spray and Wait and PROPHET protocols using ONE Simulator. - Implement and simulate the new routing protocol using ONE Simulator
I am certified with some cyber security vendor certificates and i am working on ways to build my practical experience. I need an experience cyber security consultant to assist me in gaining the practical experience needed.
This is a research-oriented task. For this assignment you are required to: - Produce an encryption algorithm to secure communications performed - Your encryption algorithm can be completely novel or inspired by existing algorithms. Instructions for fulfilling the task: - Present a reflective summary of the current cybersecurity threat landscape. - Include the full specifications of the insp...
Hello. I am looking for the platform where I can upload my video lectures which can secure my content from getting it leaked. So Looking for the one who can develop such software or a platform with this features for all possible content leaks: 1. Multi-DRM 2. Forensic Watermark 3. Anti - Capture to avoid screen recording 4. And Ovio, App security to prevent any Cyberattacks. Please be in touc...
I have an 2 TB external hard disk has been encrypted by a hacker , I need help to decrypt all my files from my hard disk
hi,i need a person who knows computer security very well