Top 10 Countries With The Fastest Internet In The World: Why They Change Every Quarter
Is your country on the list?
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Hire Computer Security ConsultantsConsist of a mobile user, a home server and a foreign server. Mobile user, who is subscribed to home server, is in a foreign network administered by foreign server. There is direct link between Mobile user and foreign server, there is direct link between home server and foreign server. However, there is no link between mobile user and home server. In order to obtain the services provided by foreig...
Details will be shared in chat box directly
Setup remote desktop on our windows pro 10 computers and set the network security options so the code will not be stolen
I have cyber security monitoring requirements and I need to develop a run book for each of the process I want to develop a run books/ work flows for security analysts to follow. The person must be a cyber security analyst and understand how to follow a cyber security run book/ work book /play book
Hi, Please do refer to the attached .pdf specs for more details. Feel free to ask for any clarification that might be required. Thank you for your time! Premysl
We need certified ethical hacking person to secure our site.
Below are some example projects. . For each project, we will be applying a real attack, then we will detect it, and we will demonstrate how to mitigate these attacks. First, you will be proposing a team and a proposal paragraph on your project where you will be explaining which environment you are targeting, what kind of attacks you will be applying, how you are planning to detect and also mitig...
Below are some example projects. . For each project, we will be applying a real attack, then we will detect it, and we will demonstrate how to mitigate these attacks. First, you will be proposing a team and a proposal paragraph on your project where you will be explaining which environment you are targeting, what kind of attacks you will be applying, how you are planning to detect and also mitig...
Needs advice on how to improve network security scenario including firewall and command lines
Decrypt 4-5 encrypted string which i will share and explain the encryption and decryption process using PHP. NOTE :- Only expertise shall bid.
The database design process for NoSQL databases is different from one for relational (SQL) databases. As we learned NoSQL database does not require the use of a predefined structure, except for creating a list of databases and the list of collections. Some of the NoSQL databases (like MongoDB) allow us to define what the structure should be for certain rules that will define what should be the st...
I need a Cyber Security Expert to help me in my project.
I need a hardware ID spoofer that will change serial numbers, model and manufacture with user friendly instructions. Applications that request hardware data should not receive real data, but those that will be emulated by your application. The real data about the hardware of the computer for application should be hidden. I need it to spoof serial numbers, model and Manufacturer: Obigious condit...
Developing an app to block Denial Of Service attacks on a machine
Write a security report on the basis of notes that we have found ourselves that may become a vulnerability if we do not manage everything carefully. The security report must be written in English and should not become a book but a short easy to read security report about our notes. Budget 500
Hello I need an expert in Computer Networking in a few hours. Please reply if you have the required expertise.
For our mobile platform we require one security engineer who can advise us regarding security, quick overview if we are on the right track as an third party reviewing other persons work. Budget is about 250 - 300
It a sort of software that actually monitors kid’s activities on tablets/smart phone/desktops/laptops and restricts access to applications or websites defined and allow to certain. It must include but not limited to the followings: 1- Software that can be installed in android and windows (tablets and laptops, desktop). 2- Should give a full report of what has been done in the device. 3- The ...
Need someone good with security and operating system
Cyber security expert to fully secure a payments system (implement the end to end security). The front is in react.js and back in Java (spring boot).
Need gamified web content related to Cyber Security, please message to ask for more details. Please reach out only if you have recognizable security certifications like CISSP and CEH.
hi i need someone expert professional at forencis tool use cases and then report the findings &a presentation. The study must cover major features for software through benchmark forensics data like as computer Forensic Reference Sets (CSReDS) thank you
I need just need a cybersecurity plan, with all details about possible risks and how to avoid them as much as possible. This is for a high school and we aim to protect teenagers when using our platform and emails. We have the virtual campus with moodle and this is storaged in moodle cloud. The institutional mail is with gmail. Also, it sould include recommendations for the hosting for the website ...
*Some of these settings are hidden or managed by your organization this message is above in red and I don't know why but it cant be removed, I tried a lot of solution to this problem white the help of google and youtube but it just can't be removed. Help me please
Need Cyber security pro for a quick project. Will discuss. Bid only if you are expert in Cyber security
I have recently upgraded to Ubiquiti access points and switches and the UDM-PRO Dream Machine. I'm unfamiliar with it's firewall settings, etc and was looking for some help. I want to configure a solid firewall and secure home network. I am prepared to sacrifice some network speed for greater security. This person would have to be proficient with Ubiquiti (Unifi) products and the UDM...
Need Cyber security pro for a quick project. Will discuss. Bid only if you are expert in Cyber security
I need some network related expert person who has good experience of Linux Environment , Eclipse, OpenFlow Libraries. I have some basic level tasks I need work at Low budget
Hello, I would like to build a security orchestration, automation, and response(SOAR) product. The term is used to describe three software capabilities – threat and vulnerability management, security incident response and security operations automation. SOAR allows companies to collect threat-related data from a range of sources and automate responses to low-level threats. I want only se...
Written:- Specify, justify and plan a project to enable the implementation of a substantial product or service of a form appropriate to the student’s subject area / award set. Undertake detailed academic and practical research in an area appropriate to the student’s chosen project. Presentation and supporting material:- Apply research, methodology and skills to design, build, test an...
LO1Demonstrate a critical understanding of current techniques of task analysis, design approaches and user interface implementation within specific human-computer environments. LO2Critically appraise methods and guidelines for HCI evaluation, and conduct an evaluation using proposed evaluation techniques and evaluative criteria. LO3Assess the various trends towards more sophisticated interfaces ...
Need custom iso made with VPN requirements in side of it.
Looking for someone who is great with theories in Cyber Security
Synology DiskStation 2 storages in office my requirement is this 2 storages data need to replicate at home which is public network. Every day
Hi, I'd like someone to perform penetration testing on my network and provide a detailed report of vulnerabilities and then fix those vulnerabilities. I have a small network with only a couple of publicly facing IP's and open ports. I run everything else on a private network but it also needs to be considered for breach containment.
I am looking for an Expert in Network Topology (network monitoring and IPS)
I am issuing a company phone and need to have some sort of monitoring system installed on the phone. I want it to be controlled via Kali
hi i need someone expert at forensics tool use cases & write report the findings & presentation. study muxt cover major features software tool through use it at benchmark forensics data like Computer Forensic Reference Data Sets (CFREDS) thank you
Need to find a creative and flexible minded it security pentesting expert for my company. Main jobs will be web application security testing, finding vulnerabilities, loop holes, password cracking, priviledge escalating and such.
Need help learning how to create datacenter proxies and internet service provider (ISP) proxies. Looking for someone who know about proxy creation, subnet creation, and someone who is proficient at creating scripts. Process needs to be replicable as I may need 1000's of different proxies at one time. Please message me if you can help. These ips need to be able to be used on specific websites.
Need help learning how to create datacenter proxies and internet service provider (ISP) proxies. Looking for someone who know about proxy creation, subnet creation, and someone who is proficient at creating scripts. Process needs to be replicable as I may need 1000's of different proxies at one time. Please message me if you can help. These ips need to be able to be used on specific websites.
we are looking for a person who can solve our webite malware problems.
Is your country on the list?
This article exposes facts you never knew about your password, and how you can make it stronger.
Building a web application is easy - building one that meets all security requirements is hard. This article covers the 5 popular security practices.