Top 10 Countries With The Fastest Internet In The World: Why They Change Every Quarter
Is your country on the list?
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Hire Computer Security ConsultantsHi, need trainers to prepare training material for Cybersecurity certification exams. Inbox me for more information.
Hi We need security for all my team system we are using directly using broadband ,no internal network in our company SO we need System security expert who can visit my Mohali office and check security all my system Thanks
I need someone to teach me some security concepts related to Zero-Knowledge proofs, specifically Bulletproofs. So that, he/she can help me to get a better understanding for this topic.
We have set up a VPN in AWS using their Virtual Private Computer (VPC) service. We need to run a vulnerability test with a standardized tool that can confirm that there are no vulnerabilities in the environmet.
I am running a PhD programme and I want to do my thesis. My area of interest is Networking and information security
5+ years of experience in technical support for a networking or security tools company Strong operating and troubleshooting knowledge across various IP networking technologies such as: Ethernet, TCP/IP, OSPF, Security (VPN, Inline, SSL), trunking/ Stacking, QoS, and Test Equipment such as Spirent and IXIA. Excellent written and verbal communications skills Good project management, problem resoluti...
Please contact me. I need a good freelancer and expert.
Need to have template which describe to me number of engineer required to apply OS patch based on time , day ,week , hours to completed.
I need a cybersecurity expert who must be familiar with decoding and analysing static cookies session ID.
Hey Everyone, I'm looking to have TLS implemented into a HTTP client in Golang to send HTTP requests outwards. It will need to be able to support the following: - Support HTTP 1.1 and 2 - Header Order - Custom TLS fingerprints - Send HTTP requests (GET, POST, PUT etc) with the TLS fingerprints. If you are experienced with TLS and Golang, send me your offers, and I would be glad to work wit...
I need someone on Classified security locks ,more details when you contact .thanks
Hi dear, i want to change the IP address without VPN every 1 sec. i talk about my local ip address not just for browser. text to me inbox !!!
I tried to put up Ads on Google, then google said the website has Malware, and didn't let me to put Ads for the website. Can you provide me a solution for her website to remove the Malware on the site? Please make sure that the removal of the Malware would not affect her SEO ranking and the website functionality. I saw there are software online like cWatch & Sucuri, is It necessary to...
Networking expert required who has knowledge of ip tracer and he can use ip tracer ..
I would need support on Azure Dev ops that would help automate and streamline security operations and processes through automation and orchestration pipeline tools. Integrate CI/CD pipeline through Azure and PowerShell scripting knowledge is required. Build and maintain tools (Checkmarx) for deployment, monitoring and operations. And troubleshoot and resolve issues in dev, stage, and production en...
Must have good understanding and experience with VA and PT area Must have good knowledge with Tenable or Qualys product or similar products I am currently evaluating and need help with
I would need support on Azure Dev ops that would help automate and streamline security operations and processes through automation and orchestration pipeline tools. Integrate CI/CD pipeline through Azure and PowerShell scripting knowledge is required. Build and maintain tools (Checkmarx) for deployment, monitoring and operations. And troubleshoot and resolve issues in dev, stage, and production en...
Looking for a Forcepoint Email Security expert to review and adjust my policy.
c++ programing coding c programming cybersecurity computer security
c++ programing coding c programming cybersecurity computer security
My files were encrypted by a hacker. I cannot do anything with the files. I want these files to be made available.
Networking packet tracer
I need a computer science expert who must be familiar with systems
Research paper for Graphical password authentication for children
I would like someone to show me how to set up and run evilginx 2
I am looking for an an experienced person who can test the efficacy of a firewall app for windows 10. The objective of the app is to prevent any unauthorized intrusions or extrusions. You have to know the ins and outs of security testing. THIS IS FOR WINDOWS PC, not for windows server. If you clicked 'bid' without reading the description, our conversation will be unproductive and unpleas...
Hi, need trainers to prepare training material for the below technology NETWORKING & CYBER SECURITY CCNA, CCNP, Ethical Hacking
Hi I am looking for someone that knows Office365 / Endpoint manager/ Intune in DEPTH. They will need to understand all security polices for Windows 10 machines / Iphones & Androids. I need assistance setting up security polices. The candidate should speak fluent English as i will be speaking to them. I am estimating it will take around 2-3 hours.
I need Computer systems technician networking expert for long term work
Need cyber security expert to make policies and processes and solutions for my business
I am not looking for indepth analysis - I need an independent audit in order to apply for a tender....need to satisfy the requirement and good to get your input... Need independent assessment of IT security - including security controls, security protocols, password management, system access, data security, data encryption, audit trail, audit logging.
You are required to write a 1500 words Threat modeling report in response to a case scenario by identifying the threat types and key factors involved.
Per the auditor's request, we need to perform a vulnerability assessment for the whole company. We have two servers (1 Windows Server 2016, 1 Linux) and around 10 Workstations (Windows 10). I want to hire a freelancer for providing the report.
Milestone 1 $10 : Read code and Check for list of ads unit ID implanted. ([login to view URL]) Bonus $25/malicious ads unit ID if you found which are not listed (send me screenshot proof [login to view URL]) Milestone 2 $20 : Design a strategy or an advice to prevent our existing developers to implant malicious ads unit ID I want to have a long term relationship for other future job if you do ...
MY PHOTOS GOT CORRUPTED/REPAIRED I CANT SEE MY PHOTOS IN MY LAPTOP/MOBILE/ANYWHERE. I WILL GIVE SAMPLE IMAGE FOR REPAIR. THOSE WHO DO THAT SAMPLE WORK DONE I WILL AWARD YOU AND CREATE MILESTONE TO GET REPAIR OF MY 20000 PHOTOS. KINDLY HELP ME TO REPAIR MY PHOTOS.
I HAVE BEEN AFFECTED BY KUUS VIRUS AND MY PHOTOS ARE GETTING DAMAGED BY VIRUS AND ENCRYPTED THROUGH ONLINE ID, CAN I GET THOSE PHOTOS DECRYPTED AND REMOVE ALL MY VIRUS FROM PC ?
c++ language, Linus, hack, buffer overflow, game debuting,
I would like to build a currency for people with a Graham's number USD (2021).
Complete and pass the Comptia Test in IT Networking
I am looking paper on a special law in India: a critical analysis of the same from a legal and human rights perspective. A publishable piece. Word Limit is 5000 words Plagiarism free ofcourse. I don't want it as a law school project but like a critical study. Deadline 28th January 2021
I’m looking for a skilled network freelancer who perfectly know : - ISP Residential or 4G Mobile IPs market offer - ASN Registration and BGP routing (to route subnet IPs into DataCenter) More information at discretion in DM
I am looking for network engineer . It is requested to place bid if you can start work today. we have a longterm projects for a good freelancer.
Hello , I had lost access to my email (Yahoo) , And i try to reset the password but i get this message , (Uh-oh... We can’t sign you in right now. Please try again in a while.)
Implement Network Share for users to have a network home drive and users to have home folders and folders for departments (Fianance) (Acounts Rec & Accounts Payable) (Sales Manager) (Marketing, note Marketing required re-create and migration of existing marketing folder) (HR). network mapping can be done using DC GPO or login script.
The date is 1 July 2004 . You have been called in by an organisation that suspects one of its staff members is breaking organisational policy. The staff member has joined a strange religious group that considers geometric shapes to be very important. The staff member was warned in May 2004 against using organisational resources to create, store, search the Web for or disseminate pictures of such s...
networking expert required files are attached . You can read and let me know
issues with a pc and loggin in my business partner is having trouble loggin in and needs to be on the admin on her pc
Is your country on the list?
This article exposes facts you never knew about your password, and how you can make it stronger.
Building a web application is easy - building one that meets all security requirements is hard. This article covers the 5 popular security practices.