Crowdsource jobs for your company or business on Freelancer. We provide access to over 15.6 million freelancers with specific skills from around the world without the need to place job ads or provide work space, insurance, etc. Whether you are looking for qualified workers or looking to reduce costs and raise profit, we have the freelancers for you.
You can hire a freelancer for any kind of job such as: Logo Design, Business Cards, Graphic Design, Website Design, Market Research, Telemarketing, Search Engine Optimization of your Website, Typesetting of Brochures and Catalogues, Translation of Website Content or other Documents and Data Entry.
We have the freelancers for your outsourcing needs. Employers can hire a freelancer for as little as US$30, with the average project completed for US$200. Our talented freelancers are ready to work for you now.
|ID||Project Name||Description||Bids||Skills||Started||Ends||Price (USD)||type|
|Project Name||Description||Bids||Skills||Started||Ends||Price (USD)|
|Required network adminitrator [yvos router ]||Need to set-up network in DC with help Vyos router||4||Linux, Cisco, VMware, Network Administration||Jun 3, 2015||Today||$8|
|packet analysing||We have to build up a system on system movement examination to distinguish online badgering correspondence. This is the primary goals of this task. We have to build up a structure and we will test this system in lab environment made on VMware workstation and contrast this system and other existing strategies and methods for movement examination. we will utilize wireshark to investigation the activ...||3||System Admin, Web Security, Computer Security, VMware, Internet Security||Jun 2, 2015||Jun 2, 2015Ends - 6d 7h||$74|
|Migrate VmWare to Amazon EC2||Hello. I need a people to help-me to send VMWare to AMS EC2. The people will only teach me in with error occurs in the process.||8||Amazon Web Services, VMware||Jun 1, 2015||Jun 1, 2015Ends - 5d 13h||$40|
|ethical attacking||you need to set up a victim host with certain criteria and attack on the based on the requirement. all the work need to be done in vmware to check the attack has been done. all the things need to documented according to the requirement in the deliverables. For more and details information check the attached file.||8||Linux, Web Security, Computer Security, VMware, Internet Security||May 30, 2015||May 30, 2015Ends - 3d 13h||$242|