Invite Freelancer to Project
You don't seem to have an active project at the moment. Why not post a project now? It's free!Post a project
Genpex Online Offline
- 41%Jobs Completed
- 100%On Budget
- 100%On Time
- N/ARepeat Hire Rate
Literature Review (technical computer networking)
“Good job, and always give fast response. Willing to do correction until you satisfied.”noorm4h 3 years ago.
Very Small task on Linux
“Work was good and delivered in time and budget. I created the complete milestone. I needed some time for checking the task but freelancer showed little patience and even blackmailed me after 5 days to release the milestone. Now he is sending strong messages for feedback. Its my wish when to leave the feedback and of course freelancer cannot bargain on that. You can give me any review you want but I can only say what happened. Good quality work but very inpatient.”Vipin85Gupta 3 years ago.
802.1x Radius Tutorial for Windows and Linux
“Very nice and professional guys. They handed the project to me, fully. I asked for some corrections and they made it with total professionalism. Would hire them again for sure.”luizsalomon 3 years ago.
Security Enhanced Linux
“They are really professionals, specially in Linux. And they finished my project before the expected day.”hutzaa 3 years ago.
install openbravopos on ubuntu 11.10
“they know what they are doing”e20d 3 years ago.
Paper about File System Analysis
“EXZone provide us with a great service and excellent communication! I will definitely hire him again! Thank you”jonathanbalim 3 years ago.
B.Sc2007 - 2010 (3 years)
ACSE (APPIN CERTIFIED SECURITY EXPERT) (2010)Appin Group of Security
The Certified Ethical Hacker is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council.) An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of the targeted system(s) or network(s) is not. A Certified Ethical Hacker has obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker.
DB2 9 Fundamentals (2011)IBM
IBM DB2 is a relational model database server developed by IBM. There are three DB2 products that are very similar, but not identical: DB2 for LUW (Linux, Unix, and Windows), DB2 for z/OS (mainframe), and DB2 for iSeries (formerly OS/400). The DB2 LUW product runs on multiple Linux and UNIX distributions, such as Red Hat Linux, SUSE Linux, AIX, HP/UX, and Solaris, and most Windows systems. DB2 also powers the IBM InfoSphere Warehouse edition, which is basically DB2 LUW with DPF (Database Partitioning Feature), a massive parallel share-nothing data warehousing architecture. Alongside DB2 is another RDBMS: Informix, which was acquired by IBM in 2001.
IBM Mainframe (2010)High Technologies Solution
IBM mainframes are large computer systems produced by IBM from 1952 to the present. During the 1960s and 1970s, the term mainframe computer was almost synonymous with IBM products due to their marketshare. Current mainframes in IBM's line of business computers are developments of the basic design of the IBM System/360.
My Top Skills
- Linux 6
- System Admin 3
- Technical Writing 2
- UNIX 2
- .NET 1
- Script Install 1
- C++ Programming 1
- Windows Server 1
- PHP 0
- Java 0
- Web Security 0
- Computer Security 0
- Cloud Computing 0
- Oracle 0
- Apache 0
- Patents 0
- Shell Script 0
- Nginx 0
- Website Management 0