Looking to make some money?

  • Set your budget and the time frame
  • Outline your proposal
  • Get paid for your work

Bids on this Project

  • pradeepthundiyil Profile Picture


    Frankfurt,  Germany

    6 years of experience in IT industry. Masters in Digital Communication & Networking (Telecommunication) Expertise in Linux, C++, Networking. C2 Certification for German Language from Goethe Institute

  • Asfer Profile Picture


    Dhaka,  Bangladesh

    Experienced and Expert on Microsoft Windows (All Version), MS-DOS, Notepad, WordPad, Microsoft Word, Microsoft Excel, Microsoft PowerPoint, Microsoft Access, Microsoft FrontPage, Microsoft Outlook, Outlook Express (All versions), Adobe Photoshop, Adobe Illustrator, Adobe Premier, Adobe Aftereffects, 3d Studio Max, Maya, Macromedia Dream weaver, Ulead Media Studio Pro, Ulead Cool, Ulead Photo Impact, SQL Server, Web designing, Web Engineering, Hardware Administration [HDD physical & logical bad sector repair, Partition Convert, MFT File system repair, O/S Resto ration, Bootable OS CD-Writing, Making a pen drive bootable, Data Backup and restore system, Data recovery system, HDD Imaging Technology, Basic and failsafe virus check with Antivirus with latest update, System devices Diagnosis], DOS Administration [DOS CD-writing, Networking, Partitioning etc.] and Network Administration [Network setup using by cross or straight cable, Internet Server, Email (POP3, IMAP, SMTP) Server, Website Server, NAT Server, RIS Server, Terminal Server, Remote Access Server, Print Server, File Server, Microsoft Exchange Server, PXE Server for PXE boot ROM client, DHCP Server, WINS Server, DNS Server, Domain Controller Server etc.], Software application Installing, configuring, administering and troubleshooting using Linux, Solaris and all versions of Microsoft's operating systems & all other built-in administrative tools with any Microsoft operating system.

  • rajatgroverceh Profile Picture


    yamuna nagar,  India

    Ethical Hacking Course Contents:- Chapter 1-Introduction To Hacking -What is a Hacker -Hacker Types -Types of Attacks -What is an Exploit -Identifying Vulnerabilities -Steganography -Footprinting -Session Hijacking -Tabnapping -Forensic -What a Hacker should know Chapter 2-Email Hacking -Phishing Attacks -Keyloggers -Rats -Password Guessing -Brute Force -Password Recovering -Email Bombing Attack -Email Spoofing Attack Chapter 3-Facebook Hacking -Phishing -Keylogger -Deleting facebook accounts -Facebook message spoofer -Deleting images -Securing Accounts Chapter 4-Denial Of Service -What is Denial Of Service -How to Perform Denial of Service Attack -How to prevent your Website from Denial Of Service Attacks -How to Crash a Server Chapter 5-Website Hacking -Website Hacking Methods -How to find a vulerability on a Website -SQL Injection -Tools for Website Hacking -Port Scanning -Information Gathering Chapter 6-Virus -What is a Virus -Virus Types -How to create a virus -How to make a virus undetectable -How to spread a virus on the Internet -How to protect your Computer from viruses Chapter 7-Hiding Identity -What is an IP Address -How to surf anonymously on internet -What is a proxy -How to hide and change your IP Address -What is a Mac Adress and how to change it -How to find somebody IP Address and trace it -How to remove your tracks Chapter 8-Operation System Hacking -Introduction to Windows -How to Crack Windows Passwords -Windows Vulnerabilities -System Hacking -Windows Tips and Tricks -How to recover deleted files -Mac Address Spoofing -Increasing your System's Performance -Backdoors -Introduction about Linux -Buffer overflow Attack -Securing your System Chapter 9-Wireless Network Hacking -Wireless Network Types -Identifying Wireless Networks -Cracking WPA Wireless Network Password -Cracking WEP Wireless Network Password -Cracking WPA2 Wireless Network Password -How to Protect your Wireless Network Chapter 10-Networking -Introduction to Network -Honeypot -Hacking Security Cameras -Network Passwords Sniffing -What is Switch -What is Hub -Network Ports Chapter 11-Exploits -What is an Exploit -Exploit Types -How to set an Exploit -Proxy pivoting -VPN pivoting -Unauthorized Data Acess -Information Leakage Chapter 12-Backtrack -Introduction to Backtrack -How to install Backtrack -How to set Metasploit using Backtrack -Website Information gathering -Email Collector -SqlMap -DNS Spoofing -Metasploit Backdoor -Hacking into Remote Computer Chapter 13-Cracking -Introduction to Cracking -What is a Cracker -Cracking Software -Cracking Hashes -Cracking Passwords -Encryption -Decryption Chpater 14-Career -How to secure it -how to get good jobs -how to attend courses in free -how to earn Course Fees:-250$ For more info contact us at Skype:-rajat.grover.rg Email:

  • itamarjp Profile Picture


    S?o Paulo,  United States

    I am a fedora linux developer. I am working with linux since 10+ years. I require 100% milestone for all projects before I start work no exceptions.