Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
从107,930个评价中,客户给我们的 Computer Security Consultants 打了4.87,共5星。雇佣 Computer Security Consultants
Add Aws user account to Rapid7 alerting when user log on.
General objective It is required to implement redundancy based on the current topology, it is sought to have a failover so that the architecture is fault tolerant in front of the internet channel since the services of did are negotiating the backup with the ISP. Specific Objective It is required to have a mirror of the general configuration that, when it detects a failure in the Internet channel, changes it to the backup scheme, avoiding customer unavailability. They must have scheduled tasks to make backup copies, the mirror rule is complied with, and the change in functionality is transparent.
Hi I’m working on a uni project and trying to access my Linux server using a domain and cloudflare CDN to protect the server IP also running a openconnect server on my Linux and trying to cover the server IP using the exact same method . So far could not establish any connection because clouldflare has limited available port and other protocols are not supported .Please place your bid if you have knowledge and have done it before specially running V2ray engine using clouldflare CDN. Please note I need the command lines and instructions only and if it does not function I will get your help Thanks
it is some kind of serious work in cloud based database of sql so kindly contact me only experienced persons who have good knowledge in ethical hacking/ hacking.
Hi I’m working on a uni project and trying to access my Linux server using a domain and cloudflare CDN to protect the server IP also running a openconnect server on my Linux and trying to cover the server IP using the exact same method . So far could not establish any connection because clouldflare has limited available port and other protocols are not supported .Please place your bid if you have knowledge and have done it before specially running V2ray engine using clouldflare CDN. Please note I need the command lines and instructions only and if it does not function I will get your help Thanks
This project is about to configure on a server (testing server)
We are IT company and once of my customers request me to review specific check list, i should be aligned and i should meet it all; so i need your help to review the document and provide me actual actions what i need to do
We are looking for a proffesional IT support person that can with teamviewer Install and configure hardware, software, systems, networks, printers and scanners. Plan and execute maintenance upgrades. Set up accounts for staff. Respond to breakdowns and other technology issues. Investigate, diagnose, and solve computer software and hardware problems. Pro
I need someone to do seed labs firewall evasion for me, dead line is 1 week
Look for freelancers with rich experience in finding website vulnerabilities and improving account permissions,Familiar with various website architectures, middleware, service layer, application layer, front-end and back-end applications。 Provide more details to the freelancer I choose. thank you
Hi there, 1. Some of my email which responded by my client will get into Spam folder. 2. Some of my dropbox links will navigate to different websites which causes the issues. Let me know if someone can rectify this asap.
Mid / Senior Level Employees having 5+ Years of Experience. Provide Support and assist web based tools like (Google Suit, Rippling, Okta, Jira, Salesforce, Jamf, G Suite, ) Assist on provisioning and configuring corporate devices and applications Troubleshoot escalated issues from the users on Windows and Mac based machines Perform Onboard / offboard tasks, develop new process and maintain internal systems
need help setting up a v2ray and xray protocol vpn
DNS address could not be found. Diagnosis the problem DNS_PROBE_POSSIBLE
conducting a thorough vulnerability assessment of a web application, infrastructure and its associated repository. Your task is to identify and provide a report on any security weaknesses present in the application and repository at large. This report should include a list of vulnerabilities discovered, an assessment of the risk level for each vulnerability, and recommendations for remediation.
simple project to create a partnership and have ongoing consultancy.
I want to route three things across one ge-0/0/x port to public internet on an SRX-345: 1. a management vlan-tagged traffic on unit 0 NAT'ed to mgmt port/subnet, regular traffic on unit 1 NAT'ed, and transparently route a public static 1.2.3.5/27 on unit 2. I have attached a network diagram (though it doesn't show the management vlan. I can use multiple ports if necessary, but would prefer one. I have all the NAT'ing done and traffic is flowing fine, I just don't know how to add the public static transparent route.
Simple task , my site is suffering down attacks need some expert to avoid that easy task hourly rate
I looking a cybersecurity experts for a tutoring project. i need some helping for started just i need more understanding cybersecurity
I want devlop own secure tool to protect exe .net Over antidump. And highley secure
Create Proposal to Qualify new opportunities, present ABC Company solutions, overcome objections, negotiate, and close business over the phone & MSFT Teams. Sell software solutions to business customers Handle all standard quote activities for end customers and partners Propose the Software to Struggling Companies such as FTX Crypto Trading exchange, Genesis, Celsius, Vauld, Voyager and many more Crypto related companies. Identify and pursue new markets and verticals for commercial expansion; assess opportunities for leveraging partners Will provide article on software that you will need to sell, which I have software already in hand.
Dear testers from Germany! We are helping a world-known IT company to build the best remote security console on the market. The input of skilled specialists is needed! We will ask you to answer a number of questions about our new platform and share your feedback. (interview format, 90 mins in Zoom, 80 $)? We are primarily looking for those who are working in a companies, are responsible for information security and directly select products (software) and participate in the final decision on the choice of the product (software) that is being implemented. What will it be? You will participate in a Zoom interview with moderator, where we will ask you questions about the console, and we will ask you to share your opinion about it Please keep in mind that this is not the full list of targe...
We require a book in pdf format to be converted into a classroom presentation tool with some imbedded audio for listening sections (mp3s will be given) which will allow teachers to show the book to a classroom full of students, zoom in and out and so on. While this is simply done with a pdf viewer, we require that the presentation tool is secure and that no one can copy it and then use the presentation tool to view the book elsewhere and this would mean the book is freely available, which we naturally don't want. Solutions are invited from competent and fast providers (there is a 2 week timeframe).
We have Raspberry Pi's outstanding which became legacy devices. They are connected using NodeJS with our server. To avoid these legacy devices to be hacked or reverse engineered we want to remotely wipe all the data when ever they make connection with the server. Target - Push Wipe - Request Wipe Push Wipe - Wipe all devices connected to the server. Request Wipe - Wipe each device once connected to the server. When it can't be wiped, all data on the Pi + Files should be multiple times encrypted. Budget $1000 We need this very fast.
Need network engineer with experience on routing switching, f5,aci ,ISE etc