Siguria e Kompjuterave Jobs
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Punësoni Computer Security ConsultantsWe have a CPP written application where we want to add some security triggers in case someone tries to debug it or tries to alter it in any other ways. We want it to be as hard as it can be to be cracked. *Do note as its a closed source we cannot share much details as well as either source or the application for implementing. Anydesk or TeamViewer is preferred for the task
I'm seeking an expert in website and server penetration testing to audit the security of the website and web server associate. This engagement can expand into a long term collaboration. Please no web developer or script kiddie but someone that is a good security tester.
ATTENTION: PIease if you are really interested say me, Hi I am here to help you with confidence...I am looking for an a profesional user engineer to avoid malwaree in my phone and also to clean it with good knowledgment...
We have a CPP written application where we want to add some security triggers in case someone tries to debug it or tries to alter it in any other ways. We want it to be as hard as it can be to be cracked. *Do note as its a closed source we cannot share much details as well as either source or the application for implementing. Anydesk or TeamViewer is preferred for the task
An IT professional with 6+ years of experience, having expertise in Windows Installer technology, Wise, Application virtualization; skilled in analysis, troubleshooting, testing, documentation, technical support, and windows network administration.
An IT professional with 6+ years of experience, having expertise in Windows Installer technology, Wise, Application virtualization; skilled in analysis, troubleshooting, testing, documentation, technical support, and windows network administration.
Crack 802.11 WEP-secured protocol and join an WEP-secured network without authorized. as per requirements given.
I'm looking for a programmer with a lot of computer security and ROP style programming experience.
I need some help with some CTF computer security problems.
I am looking for qualified and experienced penetration testers to check vulnerabilities in partner companies. Successful candidates will be well paid.
I have received the following Email from Linode which i need an urgent solution to. ############################################################### We have detected an outbound denial of service attack originating from your Linode. It appears that a process internal to your Linode is sending large amounts of malicious traffic towards other servers. We ask that you investigate this matter as soon ...
Gathering information such as internet protocols, names and addresses
Hi We need a person who can test our application for QOS purposes in various part of the world Thanks
i want to convert .p file to .m file. I can't find my original source codes but I get them in form of p code I have 5 p codes so i want to convert them to .m file or to read them in any way that can be read it and getting data for them.
i am looking for expert in cyber security. note that it requires a certain virtual machine and a Kali Linux virtual machine.
looking for network engineer who can provide assistance. it's will be just like Question Answer session.
Hello, I'd like you to be able to connect VPNUnlimited to a version of OpenWRT 18.06. Using certificates. I also need you to do a well explained how-to with screenshots. Thank you.
Hi there, If you are familiary with web application security assessment and vulnerability assessment please drop a bid starting with [Security Expert]. It seems our website was maybe hacked (not sure). but we are getting a phishing warning message on our website from the browsers. Screenshot is attached. We need your help to figure how this occurred and how to prevent it in the future. Further ...
I need content writer for research paper, I have many projects which includes following subjects: >computer science >Cloud computing >cyber security >sql injection Thanks.
o The scope of the report is only the memory dump analysis o The more insights from the attack you can provide, it's good o Every aspect you reveal about the attack must be supported by a technical analysis
Proficient with computer network systems and troubleshooting methodologies. Must have tools the necessary equipment. Start immediately
I need the source code of "Server Tester", I need test my server farm specifically ssh protocol (22 port), the idea is that I can set a COMBO list file (user and password) and ip list file (like 10-250+) and give me a list with only vulnerable servers with this format "ip/user/pass" then proceed to repair them. I have tried it in c and golang but i have problem with threads. Se...
I am looking for someone for a project in Active directory. It's a case study about a campagny • AD DS -> describe the attack step by step including the techniques and tools you would use • Identify major misconfigurations on case study domain controllers and explain why they are putting the environment at risk. • Make security recommendations and order them by priority.
.hets and .msop virus affected file has to recovered.
Retrieve page to owner deleting any connection with agencies or other admins
I need a software engineer or teacher to create about 14 sets of slides for me which will cover all the basics of software development for beginners. It will cover aspects such as User Interface development, design , deployment. I can send a full specification on successful award of the project. Please only experienced teaching professionals apply. Milestones will be added for each slideshow creat...
I need full new brief methodology framework architecture for securing IoT devices by Edge computing and Fog computing with less coding. The idea should be plagiarism free. Only the experiecend persons are welcome to message me please. Thank you.
I want someone is an expert with Klai in computer security, and know how to find " Capture the flag " ..
We are looking for an experienced Computer Technician to join our team! As a Computer Technician at our company, you will be responsible for installing, maintaining and repairing computers and networks. Your role will be crucial for ensuring that our IT infrastructure works properly with maximum capabilities.
We are looking for an experienced Computer Technician to join our team! As a Computer Technician at our company, you will be responsible for installing, maintaining and repairing computers and networks.
We are looking for an experienced Computer Technician to join our team! As a Computer Technician at our company, you will be responsible for installing, maintaining and repairing computers and networks. Your role will be crucial for ensuring that our IT infrastructure works properly with maximum capabilities.
I need a Powerpoint that explains Microsoft Private - Public Key Infrastructure. and 5-7 pages word documents.
I need a Powerpoint that explains Microsoft Private - Public Key Infrastructure. and 5-7 pages word documents.
I need a Powerpoint that explains Microsoft Private - Public Key Infrastructure. and 5-7 pages word documents.
Je suis à la recherche d'un freelancer qui maîtrise mapinfo pour faires des tps. pour freelancers sérieux.
Hi All I need the simulation scripts with snapshots and log files of below with conclusions( 200+ word for every attack type) using any software tool like packet tracer,wireshark,gns3 (all attacks should be simulated for IIS) (max budget 30 usd) DDOS Attack Man-in-the-Middle Attacks Low-rate TCP attacks DNS poisoning
Need to install Cisco firewall switch and UP the 3 ports and enable.
Dear Freelancers !!! I need to configure CPU on Digital Ocean with the details are I3/I5, 8 GB RAM and 1TB HDD and Win 7 Installation on it.. I need this to be done on the immediate basis only. People who are available and can get it done only ping us. Thanks
i want to hire awesome hacker for check hack possibility in a database site.
4 pages report - 1.15 space - referencing list - NO plagiarism Report must address resource availability, ITIF performance. Security, Resource management, networking and OS management.
Hi, everyone. I need a help about .zobm virus and I can't open any kind of files from my computer. Already attached some screenshots. This is a encrypted virus and I need to access my all files. if you know anyone how to decrypt this virus then bid on this project otherwise, don't waste my time. if I know you will do it then I will give you this job otherwise, not.