Invite Freelancer to Project
You don't seem to have an active project at the moment. Why not post a project now? It's free!Post a project
mkhalidhafeez Online Offline
- 79%Jobs Completed
- 100%On Budget
- 100%On Time
- 30%Repeat Hire Rate
GMAIL Sender/ Archiever
MediScope (Jsp, Servlets, Web Services, MySQL)
Student Management System
Email Picture Extractor
“The freelancer was excellent. He worked extremely hard to ensure the program was working to my satisfaction. He wrote several versions to get it perfect for me.”clark376 1 year ago.
“This guy is awsome. Delivered on time.”Dooste01 1 year ago.
Java Employee Project
“He is great thank you”Xedora 1 year ago.
Object oriented programming (JAVA) tasks to be done
“On time and on budget”SalimuddinSultan 2 years ago.
Two simple C# programs built Simple text editor with one large rich text box and (2) Write an MDI application that is a simple text editor. - Repost
“Excellent work and I appreciate the timeliness.”brewilder 2 years ago.
Two simple C# programs built Simple text editor with one large rich text box and (2) Write an MDI application that is a simple text editor.
“EXACTLY WHAT I NEEDED...done quick with an hour after i selected for project...this is my 2nd time using mkhalidhafeez----HIGHLY RECOMMENDED!!! THANKS RH”robholtz 2 years ago.
Software EngineerApr 2006 - Sep 2007 (1 year)
Working as Software Engineer in a Team of more than 80 people, working on a single project of Liz Claiborne Inc. (Fortune 100 Company). Role: Understanding Functional Specification, preparing Technical Design, writing Technical Specification, Development, Unit Test plan writing and correspondence with onsite office
MS(IT)2009 - 2012 (3 years)
BCS(HONS)2001 - 2005 (4 years)
Oracle 10g Administration Workshop-I (2011)
Oracle 10g Administration Workshop-I
LASSP: A Logic Analyzer for Tweaking Snort Security and Performance
Snort, an intrusion detection/prevention system (IDS/IPS), performs protocol analysis, content searching/matching, and is commonly used to actively block or passively detect a variety of attacks and probes. When snort is running in intrusion detection mode, it allows the user to analyze network traffic against s user defined set of rules. A rich set of rules is easily available which allows a non-expert of security to use snort for his network protection with a false sense of confidence. Snort rules