Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Punësoni Computer Security Consultants
This project is about designing network architecture for the DDoS attacks, implementing, filtering and detecting of DDoS attacks on host level. And simulating on Omnet++ tool. Will discuss more in detail
I'm searching an expert in Sqlmap and python because I want modify sqlmap and make a special version. Please send me in your proposal your experience with sqlmap and/or python. thanks you!
I am looking for someone who can simulate fog and edge computing security for IoT devices using Ifogsim or any other cloud simulator which can show that system is secure. For more information, you are welcome to check attachments. Thank you.
On one of my KVM VPS hosts we have an issue where the read/write speeds on the host are much faster than the speeds achieved within the VM guest. I have set the IO policy to thread mode and the cache setting to write back, however the speed is still no where near that is achieved on the host. I'd like someone to take a look at the issue and resolve it, or at least provide an explanation for w...
Somos una consultoria en protección de datos de nueva implantación. Nos caracterizamos por prestar un servicio personalizado de alta calidad que nada tiene que ver con las gestorías LOPD low cost. Nuestra premisa es que todo trabajo en privacidad debe realizarse conjuntamente por un abogado y un informático, única manera de tener una visión global de cada ...
I need a proposal on definition of predictive models (and associated prototypes) to predict the need of resources to be provisioned in the computing continuum spanning from the Cloud to the IoT, consisting of thousands of distributed heterogenous devices exploiting different software and hardware technologies. Proposal should include: I. “Research context and main goal of the project”...
Hi, I have a backend projects which shows security vulnerabilities using anchore scan [identifikohuni për të parë adresën URL] There are some 18 vulnerabilities which needs to be updated Can anyone help me fix these
trying to migrate from Juniper to Palo Alto firewall and require a project plan for this migration. What is needed is a high level project schedule with key milestones to accomplish the migration
above message is self explanatory
for Internet security protocols we would like to write using SPAN-AVISPA tool and verify using the tool that the proposed protocol is secure. The tool can be found in Ubuntu Virtual Machine installed from avispa website. The requirement is an HLPSL file. We need a Security Protocol Animator SPAN, AVISPA coder for Internet security protocols
Need a very knowledgeable technician that can make my yahoo mail account / box impenetrable by hackers. We were hacked and even tho we change all settings to best described by yahoo, the hacker still resides in it because he or she continues to delete emails. I am not expert so I need one and a great one to check for back doors, codes, etc etc that the hacker exploits and needs no password not 2FA...
I purchased a business and previous owner deleted the business Facebook page and can not restore it . I need help from someone who knows how to restore a Business Facebook page that has been deleted
Need Freelancer for IT Support AMC for Our Small Office - 10 PC, 1 Server, 2 Printer Our Office Located at Pune, Maharashtra, India. If Someone from Pune, It will better.
Maximum budget is INR 3000/-/ 1. Benefits of using open source library. 2. Security challenges resulting because of using open source libraries. 3. Damages suffered by industry because of using open source components. 3. Major attacks because of open source components. 4. Tools - Commercial and open source. Tools ratings. 5. Best security practice to integrate open source component in your code. ...
Requiero a un especialista cerificado CISA vigente (obligatorio) para realizar una auditoria de seguridad informática. Al postularse, necesito me manden su certificado y evidencia de su vigencia
We are installing Amazon Workspace as Virtual Machine for our team to work remotely. We need to install data security for ensuring: a) There's 2 step verification while logging into AWS b) No data can be downloaded from AWS to desktop/laptop c) Personal emails can't be accessed for downloading the data
Computer Hackers required for security resolution project. There will be an assessment to complete before the project is awarded to ensure that you are able to complete the required tasks. If you will not conduct these assessments, then you will not be awarded the project.
My son just turned 13 and i know nothing about cyber security. Looking to spend 1 hour per day motivating him to study more and observe knowledge at rate of 3 USD per hour to start. My wife maybe interested also if the person is inspiring, mentor must be passionate, to keep my son focused. Either 7 or 14 hours a week if wife is also interested. My son also likes to play video games, looking for s...
I need help to secure access to the administration part of a website and a database. I am looking for a partner with experience and who is autonomous to find the flaws.
We have recently purchased a software package that seems to lack some robustness in the way they handle licensing.
Need help in a project related to packet tracer and networking