Invite Freelancer to Project
You don't seem to have an active project at the moment. Why not post a project now? It's free!Post a project
dinko4 Online Offline
- 50%Jobs Completed
- 100%On Budget
- 100%On Time
- 50%Repeat Hire Rate
Written and Video Tutorialsfile
Categorisation & In-Video-Categorization of Video Content - re
“Excellent. Period.”purposeindustrie 2 years ago.
Hello, Help in backup vista to restore window 7
“Great work A+++”samanna 2 years ago.
System AdministratorJul 2005 - Oct 2014 (9 years)
Analyzing system logs and identifying potential issues with computer systems. Introducing and integrating new technologies into existing data center environments. Performing routine audits of systems and software. Performing backups. Applying operating system updates, patches, and configuration changes. Installing and configuring new hardware and software. Adding, removing, or updating user account information, resetting passwords, etc. Answering technical queries. Responsibility for security.
Chief Department Information ServicesFeb 2004 - Jun 2005 (1 year)
Manage Information Infrastructure on Municipality of Cherven bryag
System AdministratorMar 2002 - Feb 2004 (1 year)
Responsibility for correct work of company LAN and communication(PBX and GSM gateways, ISP), creating and developing company web site , software adopting , Updating information on eTrade sites, team work with Advertising Department.
MSc1994 - 2000 (6 years)
MCTS - Windows® 7 , Configuration (2013)Microsoft
Installing, upgrading, and migrating to Windows 7 Deploying Windows 7 Configuring hardware and applications Configuring network connectivity Configuring access to resources Configuring mobile computing Monitoring and maintaining systems that run Windows 7 Configuring backup and recovery options
CEH v7 EC-Council, License ECC976860 (2013)EC-Council
Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Enumeration System Hacking Trojans and Backdoors Viruses and Worms Sniffers Social Engineering Denial of Service Session Hijacking Hacking Webservers Hacking Web Applications SQL Injection Hacking Wireless Networks Evading IDS, Firewalls, and Honeypots Buffer Overflow Cryptography Penetration Testing
- Facebook Connected
- Payment Verified
- Phone Verified
- Email Verified