Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Computer Security Consultants anheuern
Hello I am trying to install Fortinet or PA firewall on gns3 , My system is Core I7 Processor Installed RAM: 12gb I am already having a virtual box, GNS3 installed on my system. I want to have a running lab which will have a firewall Fortinet or Paloalto firewall for practice.
I'm so sick of google, facebook, ad systems, and intrusive watching and collecting information and all that utter nonsense! What is really upsetting, is that I'll be somewhere and my phone will overhear a conversation at the grocery store, then related ads will show up on google or my facebook. Or conversations on WhatsApp end up with facebook ads for the stuff I talk about on whatsapp. ...
I want to track my employee's locations regularly. I would require you to build an application that tracks their location 24x7 and I could access this with my phone an laptop. okay, so we want to build a that tracks our companies employees' location without their knowledge because most of them are sent for the deal during cash exchange.
Using Autonomous Drones to act as a secured channel between two users with high encryptions protocols divided by two separate 1/2 data packages .These packages will be delivered via two drones in a pre-planned pathway. After reaching the destination, the Verification check will take a process where there must be a double-check from both drones using face recognition Camera, once the verification p...
We are a condominium complex that recently installed Linksys Business LAPAC1750 Access Point Wireless Wi-Fi Dual Band 2.4 + 5GHz AC1750 with PoE As well as Cisco WS-C4506-E now we are looking to get the network segmented so that anyone using the network cannot see other people using the network as its a public wifi but needs to also run our security cameras in a separate confined not publicly vie...
I have a two story home that is going to be our forever home. 4 bedrooms 2 living rooms and an office. I want someone to help design a home network that will enable me to connect all multimedia devices, security devices, home automation, NAS, audio, video. With router switch modem and each other.
Need of a Cisco Engineer to log into clients Cisco access points to configure, update, rename and optimize them. Client has a total of 26 Access points. We are installing new antennas on 7 Access points Picture 1 shows all the AP Picture 2 shows 1 of the AP Please contact us for any more questions.
I need someone who can makes the files inside our FTP or wordpress not downloadable nor copied able except by some specific certain users. So our developers can only edit/modify within the files, not even copy paste the codes inside it. we dont use cpanel, just use google cloud console and filezilla
DSLM smartAX MA5616 configuration and ready up many time showing error - the system is loading or backup or duplicating data or rollback or canceling rollback, please dispose of data later_ need to configure this issue immediately.
write program to allow specific applcations through firewall in c++
I need you to teach me how to unpack a program that is protected with VMProtect. This is the program I want to unpack: [Zur Anzeige der URL Anmelden] The password to unzip the file is: 123 Preferably, you should do a video to show me step-by-step how to unpack it, what tools to use, how to fix the PE header and how to fix the IAT imports, and any necessary things to fix, in order to make i...
Help with my Computer/Laptop/Devices 2 computers and 2 printers connected with bluetooth. After renewing Microsoft office and Adobe, red x's. showed on several files, need removed. Also, tune / check up of computers
Our company has some problems to build infrastructure of our company. So I need professional expert who has rich epxerience in Network infrastructure. I will discuss details in private chat.
Develop & improve machine learning models for radiology(lung cancers, COVID-19, pneumonia, ovarian cancers, etc) Before a proposal, answer the following questions -Have you worked with radiographic images (X-Rays, CT scans, etc.) before? If so, in what context? What was the accuracy? -Have you worked with machine learnings algorithms before? If so, which projects? What was the accuracy?
I need someone to look at my computer through team viewer and find the hack portal on my computer and give me the details to catch the person's IP address and maybe hack there system to see where it is coming from.
we have many dedicated servers and the some isps are sniffing our data and this matter cause the blocking of server's ip. we need a solution for encrypting output data via proxy server. note1: we tried SSL. note2: our clients can not use VPN.
be able to analyse IP addressing requirements and design an addressing scheme. be able to analyse the requirements of IP routing and choose appropriate routing methods. be able to demonstrate how internetworking devices obtain their network configuration. be able to explain how data flows through the internet. be able to ascertain and evaluate selection of applications and protocols for transferri...
BUDGET 50 USD Pentester / security expert to find and remove malware on sites (WP) You look on sites on our server and remove malware and secure the sites.
Need someone who have experience in find/resolve the issue of website hacking. Looking forward to work with the EXPERT only.
Introduction to Security and Cryptography. Cryptographic Tools. User Authentication Fragmentation Functions - Message Authentication Encryption Algorithms and Properties. Selective Number Theory Topics Υπο Digital Signature and Message Authentication Asymmetric Encryption Public Key Encryption and Message Authentication Encryption Device Topologies HTTPS - IPSec ...
We are a Networking company and designed the network in the city but confirmed by overseas network professionals to find us our technical issue. Project: Network Monitoring 1- network policy is Mikrotek 2- Firewall and blocking 3- Network Usage 4- client end usage 5- fiber connectivity usage 6- devices maintenance and check the logs 7- server monitoring 8- testing routers and modems thi...
We are from an IT consulting firm and an online tutoring company One of our client is in need of project assistance in the Blockchain - Network Security - computation and information technology We need the work to be completed in 3 days from now so only if you are available immediately to work on our project please bid
Hi there, I have to do a Cisco Packet Tracer project for school, I have to write a report so don't have time to do this task. OSPF routing protocol to communicate with head office and branch offices. There needs to be 1 head office which will be in area 0. There will be 3 branch offices, 1 branch office will be in area 1 and the other office in area 2. (area 1 and 2 branch office are connec...
Requires report writing and analysis
I'm looking for someone who is specialized in cyber sécurity and hacking to perform penetration tests and recovery of email address files... of course the goal is to protect yourself from all this.