Is your country on the list?
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Hire Computer Security Consultants
I have created a virtual enviroment with 4 virtual machines that send their logs to SPLUNK. I will simulate attacks from Kali linux to another virtual machine and try to detect the attacks with Splunk.
We have a small Cisco based network with some switches, a router and 2 ASA's connecting two locations. Looking for someone who can make configuration changes, install/setup/configure Firepower and IPS as well help create new VPN's to other sites. also require ongoing network security, routing updates and Anyconnect configuration as needed.
Hello, Ensure you follow instructions well,for instance, where have you used LCA software in this work? The words count should be 3000 word you have give only 2700 words In conclusion, Which percentage reduction in impact was achieved? Infact the work is not concluded. Kindly go through the instructions and deliver what is expected
First its about OWN account, rightful owner and not account of others or anything else. It would be better from Kolkata / anywhere else can assist on unlocking the account. The problem occurs after New Phone purchase and Old phone to New Phone data transfer. Looking forward,
I would like a multi-class course from Veeam, to learn how to carry out, manage and design backup and replication. I want a course from scratch, starting from scratch to complete and advanced exercises at the end of the course, to master the subject well. The minimum total duration of the course with all classes must at least 2 hours.
I'm searching for Cyber Security Analysts to create a Red Team of Ethical Hackers and a Blue Team of Ethical Hackers. Experience is required Certification are required Here is the list of certifications I would need. Please see the reference here: :~:text=Red%20teams%20are%20offensive%20security,all%20cyber%20attacks%20and%20threats Thank you
Very simple job for a IT student or new one in the market, we will pay you $20-$30 per site survey and submitting the required information. The scope of work would be: • Check the number of power sockets available, rack space and potentially the 4G availability. Make pictures at the location as well. • Simply said, make an inventory of what is available on site and what is still needed before we can deliver our services (together with Cato). (Only difficulty will be checking internal cabling as DTAG is mainly responsible for that and that is behind closed doors). • Maybe we can send the engineer the cradle point 4G device ….but that is open for discussion internally first I think. I am attaching list of locations, you can apply for one country or multiple count...
Hi, I need a security expert to configured Firewall (Hardware of software) at my home. You need to suggest me which firewall would be best for me and why. I need to full secure my home network. If you have at least 5 years experience in managing security and firewall then apply for this job. Thanks,
I have an issue with my research
Phishing Attacks Phishing Attack types: 1- Data Entry Attack 2- Hyperlink Attack 3- File-Based Attack Full text without any title, I need professional writing (Advanced Search) Don't get out of the references I mentioned Follow APA Style Add pictures and tables as much as possible
I am trying to build a new Coverity Analysis and would like to solve this message happening see attached SNAPSHOP that shows network configuration; any clue? can I get a better snap? SINCERELY WOULD BE NICE TO MEET YOU PLEASE ------------------------------------------------------------------------------------------------------------------------------------ There is hope you can give your “best” price; unemployed, and have cancer with bills backing up. $12 ok? My funds are low but will pay quick and leave 5 stars. Please give your best possible for your bid ? (something reasonable?) Please note there is hope we can mutually complete this task; we can leave each other nice comments and 5 stars for each? Look at feedback on my profile, feedback I left for many others. Here ...
I will provide JSON files with the extracted features (I will extract these from the pcap files). The features will be from malware and non-malware traffic, so the idea is to detect and classify the malware and non-malware samples. The feature selection should be done two ways: Manual and automated and we should be able to clearly identify the features that are being used and which features work well, and which features do not work well. As there are multiple datasets, we should be able to identify the features that work well across all the datasets. There are different versions of the malware, so we need to clearly identify which features work well across all these malware versions. The manual feature selection should allow me to select which features I want to use for the classificatio...
A 5-pager describing the most critical actions to be done after a cyber security incident, from a technology manufacturing company point of view. Which department is responsible for what: - internal/external...
In this network Marketing we can create a small type of marketing and create big group , big marketing to get full information or if you want to join us then contact me or send msg me everyone knows the power of networking it is safe best good or if you with us and do some small works then your earring starts with 3000rs in two days and approx earning according to creating networking is 3000-2crore according to your works or networks
The task will be to polish, re-write, and add more references to the paper. So, you need to read some related work and refer to it in the text and write the differences between our work and the previous work. You must be familiar with research publications in computer science, or more preferably security field.
Hi guys I had the Q locker virus last year; managed to decrypt my files but now I'm in the process of trying to wipe my drive clean autoruns and do an entire restart of my QNAP system with ALL SECURITY measurements and back up solutions in mind. I've always had issues when I first set up the QNAP having problems connecting it to my pc laptop and macbook with read and write issues. I'm absolutely fed up of the QNAP support as they aren't hands on at all and they don't communicate. I need someone to guide me through setting up the Qnap properly with extensive security and perhaps guide me on other steps I can take to increase security measures. I also use Plex media server which is why I would ideally still have Plex/the Qnap accessible online. I want someone to ac...
Project: Macro : I need my PC to get connected to Irish IP when I'm abroad through VPN and multiple routers (see attached). I will travel with my PC. This PC will be connected to "router 2" through ethernet cable. Router 2 will be connected to local internet but will mirror the irish IP from router 1 which would stay in Ireland. I understand the macro but can't micro configure this myself. Therefore I'm looking for someone to do that. If you're interested just contact me and introduce yourself (background, work experience etc...) Videos : Cheers!
*** this is not a penetration test - this is vulnerability research project involving vulnerability database research and data tabulation into a spreadsheet *** We are doing a security review of 70 software libraries that our organization depends on. The libraries are a mix of Open Source software libraries and Commercial Runtime software libraries We are looking to hire someone who can review the entire list of software libraries, and cross-check each individual library against the NIST National Vulnerability Database for published Security Vulnerabilities (CVE's). ** please note: a penetration test of each library is not required - no physical software / libraries will be provided. Only a list naming each library and its version number that we need cross checked against the Nati...
Data we gather from different IOT devices placed in cloud, while upload and download we need protect data with respect to privacy and security For providing privacy and security we use facial recognition and digital sign for security for facial recognition we use ML Deep learning and neural networks So i need the peer who has knowledge on ML DNN Network security Cloud
I have an article on information security (CAPTCHA) and I have also a comments file. I need help to modify the article as requirements in the comments file Do not accept any solution from the internet Deadline 2 days. time is very sensitive
Preciso de um especialista para orientar e verificar o windows e acessos a rede para proteger um pc que vem sendo atacado. O pc atacado já foi formatado, mas agora precisamos de orientação de proteção e como saber se ainda possuí algum dispositivo contaminado.
Membantu / Helpdesk Troubleshooting dan pemeliharaan komputer/software dan jaringan untuk perkantoran kecil dan menengah yang bersifat temporary IT.