Bezpieczeństwo komputerowe Jobs
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Zatrudnij użytkownika Computer Security ConsultantsHello, I am looking for someone that can do black hat hacking and red hat and also white hat hacking. I will elaborate the details in DM/PM. Thanks,
My files were encrypted by a hacker. I cannot do anything with the files. I want these files to be made available.
Networking packet tracer
I need a computer science expert who must be familiar with systems
Research paper for Graphical password authentication for children
I would like someone to show me how to set up and run evilginx 2
I am looking for an an experienced person who can test the efficacy of a firewall app for windows 10. The objective of the app is to prevent any unauthorized intrusions or extrusions. You have to know the ins and outs of security testing. THIS IS FOR WINDOWS PC, not for windows server. If you clicked 'bid' without reading the description, our conversation will be unproductive and unpleas...
The project is to prepare a methodology and architecture to achieve the attached paper and the following objectives: 1. a secured and distributed Link Discovery Protocol for SDN 2. a robust Flow table Management resistance against SDN attacks when all the flow tables become overloaded 3. a deep learning model against DDoS attacks.
Hi, need trainers to prepare training material for the below technology NETWORKING & CYBER SECURITY CCNA, CCNP, Ethical Hacking
Hi I am looking for someone that knows Office365 / Endpoint manager/ Intune in DEPTH. They will need to understand all security polices for Windows 10 machines / Iphones & Androids. I need assistance setting up security polices. The candidate should speak fluent English as i will be speaking to them. I am estimating it will take around 2-3 hours.
ich brauche Hilfe bei IT sicherheit Hausarbeit
I need Computer systems technician networking expert for long term work
Need cyber security expert to make policies and processes and solutions for my business
I am not looking for indepth analysis - I need an independent audit in order to apply for a tender....need to satisfy the requirement and good to get your input... Need independent assessment of IT security - including security controls, security protocols, password management, system access, data security, data encryption, audit trail, audit logging.
You are required to write a 1500 words Threat modeling report in response to a case scenario by identifying the threat types and key factors involved.
Per the auditor's request, we need to perform a vulnerability assessment for the whole company. We have two servers (1 Windows Server 2016, 1 Linux) and around 10 Workstations (Windows 10). I want to hire a freelancer for providing the report.
Milestone 1 $10 : Read code and Check for list of ads unit ID implanted. ([zaloguj się, aby wyświetlić URL]) Bonus $25/malicious ads unit ID if you found which are not listed (send me screenshot proof [zaloguj się, aby wyświetlić URL]) Milestone 2 $20 : Design a strategy or an advice to prevent our existing developers to implant malicious ads unit ID I want to have a long term relationship for...
MY PHOTOS GOT CORRUPTED/REPAIRED I CANT SEE MY PHOTOS IN MY LAPTOP/MOBILE/ANYWHERE. I WILL GIVE SAMPLE IMAGE FOR REPAIR. THOSE WHO DO THAT SAMPLE WORK DONE I WILL AWARD YOU AND CREATE MILESTONE TO GET REPAIR OF MY 20000 PHOTOS. KINDLY HELP ME TO REPAIR MY PHOTOS.
I HAVE BEEN AFFECTED BY KUUS VIRUS AND MY PHOTOS ARE GETTING DAMAGED BY VIRUS AND ENCRYPTED THROUGH ONLINE ID, CAN I GET THOSE PHOTOS DECRYPTED AND REMOVE ALL MY VIRUS FROM PC ?
c++ language, Linus, hack, buffer overflow, game debuting,
I would like to build a currency for people with a Graham's number USD (2021).
Complete and pass the Comptia Test in IT Networking
I am looking paper on a special law in India: a critical analysis of the same from a legal and human rights perspective. A publishable piece. Word Limit is 5000 words Plagiarism free ofcourse. I don't want it as a law school project but like a critical study. Deadline 28th January 2021
I’m looking for a skilled network freelancer who perfectly know : - ISP Residential or 4G Mobile IPs market offer - ASN Registration and BGP routing (to route subnet IPs into DataCenter) More information at discretion in DM
I am looking for network engineer . It is requested to place bid if you can start work today. we have a longterm projects for a good freelancer.
Hello , I had lost access to my email (Yahoo) , And i try to reset the password but i get this message , (Uh-oh... We can’t sign you in right now. Please try again in a while.)
Implement Network Share for users to have a network home drive and users to have home departments (Fianance) (Acounts Rec & Accounts Payable) (Sales Manager) (Marketing, note Marketing required re-create and migration of existing marketing folder) (HR).
The date is 1 July 2004 . You have been called in by an organisation that suspects one of its staff members is breaking organisational policy. The staff member has joined a strange religious group that considers geometric shapes to be very important. The staff member was warned in May 2004 against using organisational resources to create, store, search the Web for or disseminate pictures of such s...
networking expert required files are attached . You can read and let me know
issues with a pc and loggin in my business partner is having trouble loggin in and needs to be on the admin on her pc
The questions should be from the following topics. Ensure there is no plagiarism. Cyber Security Networking Basic programming VAPT & SOC
I need to do a very good research on something in computer science
Help me with Euclidean algorithm and prove that gcd,the Diffie-Hellman algorithm,digital signature system,Vigenere cryptosystem,RSA algorithm, digital signature categories: (a) asymmetric encryption (b) by self-recovery Feistel Algorithm DES and 3DES What is PGP?
Hello everyone I am looking for a freelance nodejs developer that is able to do sniff website requests, and develop in node js. If you are you able to do this please bid
Responsibilities * Research and oversee security initiatives/programs to improve and enhance detect and response/recovery capability within the organization. * Act as the primary point of contact with the Managed Security Services Partner in response to the threats and possible attacks and intrusions. This includes conduct of root cause analysis of security incident and ensure control measures imp...
The problem: Tracker identification is based on whitelists and lists of known trackers (see attached paper Introduction to being a Privacy Detective - Investigating and Comparing Potential Privacy Violations in Mobile Apps Using Forensic Methods) The aim: Identify trackers from Mobile Application Network traffic w/o resorting to whitelists of known trackers (Finding features of different trackers...
Hello I need an expert in Theory of Computing for some technical task. Its urgent.
Hello I need an expert in Theory of Computing for some technical task. Its urgent.
Hello I need an expert in Theory of Computing for some technical task. Its urgent.
SLR in cyber security in critical infrastructure for master degree student
Hello Everyone, We need 1 pentester with 2 to 3 years of SAP system experience. The client is an important international company. The job is related to penetration test to SAP System. Time of execution after approval: 3 weeks. If you comply with the requirement, please contact TEAM ISLC
I need someone with strong skills regarding website security issues such as scrapping presentation, ddos attacks.. preventing spammy posts .... etc Currently I am facing problem from people using bots to scrap pages of my site. I need to solution to this problem.
Hi freelancers! I hope you're in best health. I am looking for an expert in TcpDump in Linux. Please bid if you're good at this.
Hi, Removing a virus. Type VIRUS if you understand. Thank you
i want long term employee. see the attached task. if you are expert, please bid here. its low budget task
i want long term employee. see the attached task. if you are expert, please bid here. its low budget task