Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Zaměstnat Computer Security Consultants
I need a 50 page dissertation on how websites are still vulnerable to attacks as show with tools the types of attack’s that can be done along with the types of data or issues one can cause if a website is not secure. I need someone who can explain OWASP top 5 vulnerabilities along with mitigation techniques.
Basically it's a Mikrotik 3 routers in the Cloud with 2 IP transits and 1 home switch to use my IPv4/v6 prefixes at home. For IPv6 I just need to configure IPv6 on those 3 routers before because both Vultr and Vmhaus provide native IPv6 so it's better to configure before. Please see the attachment carefully and explain to me your design and approach to achieve the design as per attachm...
Online filling of the digital forms which take less than 30 seconds per form. Our requirement is filling form with dynamic IP addresses (proxy..) of the desktop machine. The project could be in good volume if the output result will be satisfactory. (Bidders only from INDIA, not outside)
I am looking for someone who can help me learn and support security analyst tasks. Skills involved: puppet, vulnerability analysis and remediation using windows and linux systems. Security audits Analyze data by using queries and reports. General tasks include: • Deploy and manage endpoint security tools (Antivirus/Antimalware, Exploit prevention, DLP, Host-based Intrusion Prevention) • ...
Group with 1 member requires to submit the overall design (what kind of servers, switches, routers and routing protocol have to setup) - min. length is 3 pages. Specification for the new network Deployment for Company I • 500 users will work in a working space about 50000 square feet within a four floor buildings. • Company I has two Internet connectivity to two different service prov...
Group with 1 member requires to submit the overall design (what kind of servers, switches, routers and routing protocol have to setup) - min. length is 3 pages. I am single member so need only 3 pages
Hi Everyone, Discover vulnerabilities to prevent attacks and improve business continuity. To also find application security flaws, such as SQL Injection and Cross-Site Scripting etc. Thanks
Perform an analysis of the malware using static and dynamic analysis tools and techniques. Report on: • Static File Information for all Files Involved • Any Created, Dropped, or Delete Files Must be Analyzed • Any Encoding, Obfuscation, or Anti-Revering Techniques Observed • Dynamic Analysis Information • Static Code Analysis • Network Activity • Recommended Sign...
We need to use several computers in many regions remotely and this lasts for many years. It needs high internet speed and computer performance. And you must be male who lives in Australia. You have to know English.
Looking for someone to provide instructions on configuring relayd on OpenBSD I will require PF rules to enable this and relayd config any other steps required to configure the proxy Reverse proxy > one IP HTTPS
Hi I just need to create an expansion file for my app. All details will be given. The job is urgent and I need someone to complete this now for me if possible. Thank you kindly
I want machine to machine authentication using digital certificates and some hardware signatures so that only approved devices will be connected to server
i may have malware where my pc freezes every 3 hours in task scheduler i can see some tasks which look suspicious please see [pro zobrazení URL se přihlaste]
Hi I am sending this message to ask you if you are able to provide PHD topic selection. The field I am going to work on is ( home automation using internet of things) I prefer to work with cyper security in the field of ( smart homes and IOT)
I need an expert pen tester to test my pc firewall. You are expected to install this on a test pc and see if it controls and restricts effectively all unauthorized inbound and outbound connection attempts. You would need kali or similar on another device to simulate intrusions. Not for beginners. Please do not bid without reading. No bids from indiapakistan. No bids in broken english.
We are looking to increase the material on a RFID tag that limits the amount of material that we can use on a machine. we would like the RFID tag to register infinite amounts of material rather the 1KG. I would send the RFID tag to you and if you could copy it and return the card with a larger material value on it.
1. Need to check backend processes and secure network in mobile devices (4) and home router ( Seems our devices, cel numbers and social media accts are under in g suite)and someone is monitoring.
Wir sind eine klassische Unternehmensberatung und suchen für die Implementierung von ERP-Systemen bei unseren Mandanten freie /-innen (m/w), die Projektbezogen den Ist-Zustand eines Unternehmens analysieren und die Implementierung des ERP-Systems begleiten (Deutsch/Englisch). Bitte senden Sie uns aussagekräftig Unterlagen zu den von Ihnen eingesetzten Risiko-, ERP- oder Digitalisierungs...