||...looking for persons who are extremely adept in computer security. I run a couple of website portals with extremely
||PHP, Project Management, Engineering, Testing / QA, Software Architecture, Software Testing, Website Testing, MySQL, Usability Testing
||Jun 3, 2009
||Jun 3, 2009Ended
||...admin can detect what the client doing on their computer(client).
2. The data must encrypt before transmitting
||C Programming, Windows Desktop, System Admin
||Jun 2, 2005
||Jun 2, 2005Ended
Saturday 29/11/2014 at 11.59 PM (submission time is recorded! Submission form is below)
We will be using Java support for managing and working with digital certificates and key pairs.
"keytool" is a key and certificate management utility. It enables users to create and manage their own public/private key pairs and certificates for use in self-authentication...
||C Programming, Java, Computer Security
||Nov 18, 2014
||Nov 18, 2014Ended
||...service because of various problems such as security problems, database problem , poor coding/programming...partnership. Your job will be provide an essential web security, adequate data system, intensive protection, and
||System Admin, Linux, Web Security, Computer Security,
||Jun 23, 2012
||Jun 23, 2012Ended
||...information security awareness and educates non-technical users about information security basics. RAWAM...will be given if you stumble across a bug or a security vulnerability.
1. Create an account
||Java, Computer Security
||Dec 9, 2014
||Dec 9, 2014Ended
||Refer to the attachment for details.
||Report Writing, Academic Writing, WIKI
||Nov 20, 2010
||Nov 20, 2010Ended
||...to aid me in analyzing the flaws in my computer network security
||Feb 14, 2015
||Feb 14, 2015Ended
||this is a URGENT work.. I need this in one hr and should plagiarism free.. NO PAYMENT WILL BE MADE IF FOUND ANY PLAGIARISM , 1250 words
||PHP, Java, Computer Security, Software Architecture, Network Administration
||Oct 2, 2014
||Oct 2, 2014Ended
||You need to have some knowledge about ciphers and deciphering the given text. And also the hash functions.
||Jul 17, 2015
||Jul 17, 2015Ended
||...pleace do not bid if you are not experience in security computer.
i will pay high if you get that hacker away
||PHP, Computer Security, HTML
||Jun 8, 2012
||Jun 8, 2012Ended
||You need to write a full report on the given scenario... PLEASE SEE THE ATTACHED FILE.
1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done.
2) Installation package that will install the software (in ready-to-run condition) on the platform(s) specified in this bid request.
3) Exclusive and complete copyrigh...
||PHP, Translation, Windows Desktop, System Admin, Web Security, Engineering, Computer Security, Software Architecture, Software Testing, Academic Writing, Website Testing, Article Rewriting, Microsoft, MySQL, Website Management, Web Hosting
||Nov 7, 2003
||Nov 7, 2003Ended
||This is an assignment having 3 questions on computer security (cryptography).Attached is the file having
||Nov 9, 2013
||Nov 9, 2013Ended
||Detail the difference between a virus and a worm. Research the characteristics (infection vectors and
strategies) of five internet worms and compare and contrast them.
||Sep 29, 2013
||Sep 29, 2013Ended
||...Servers, Windows Servers, Cpanel/WHM, Systems Security, Web Security, Technical Support, Web Scraping
||Web Security, Computer Security, Cloud Computing, Software Architecture, Web Hosting
||Jun 7, 2014
||Jun 7, 2014Ended
||...virus worm etc. simply showing altered data on my computer as opposed to the actual internet modifications...mention it.
5. Needed consultation with network security experts at a cheap rate. While I'm hoping this
||Web Security, Computer Security, Windows 8
||Mar 21, 2013
||Mar 21, 2013Ended
||Write a report comparing the security facilities of gmail with those of
yahoo mail. Your discussion
||Computer Security, Academic Writing, English (UK)
||Nov 3, 2013
||Nov 3, 2013Ended
topic is computer security
at least 5 academic references
within 07 days should complete
||Computer Security, Academic Writing
||Oct 6, 2014
||Oct 6, 2014Ended
|computer security, network security
||Develop requirements for a new cyber security product & incident response product
Provide insight on
||Jun 25, 2014
||Jun 25, 2014Ended
|Information Security, computer security questions
||...technical person to develop 300 Information security and computer security awareness related questions and answers
||Copywriting, Technical Writing, Articles
||Nov 26, 2011
||Nov 26, 2011Ended
|Computer Security -cryptography
||I have an urgent assignment that i need it to be done(you got few hours to complete) in a short amount of time. Please see the attached files.If you don't understand the question, please don't waste my time and bid.
||C Programming, Web Security, Computer Security, Software Architecture, Internet Security
||Mar 23, 2015
||Mar 23, 2015Ended