Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
雇佣 Computer Security ConsultantsHi ,Thank you very Much for Reading , In need of searching reinforcement learning expert , Have you any experience on network simulators especially OMNeT++? I have a project which is done on OMNeT++ about HetNet Now I want to extend it with reinforcement learning.
Need an expert who can handle a networking project immediately asap.
Searching for an very experienced FreeIPA admin, who can consult on defining requirements and defining features to be implemented Work will be - discussion with responsible persons - definition of requirements - documentation of requirements and mapping to FreeIPA MANDATORY: you have FreeIPA experiences in multiple organizations with common pitfalls and issues of organizations Outlook: Preferably getting consultancy and afterwards help in integrating freeIPA into organization Budget? will not be disclosed, place your best bid
Buy Large Amounts Webshell and Backdoor ,Contact me ! I’ll buy more and more if you have !
Research paper based on some mobile forensic softwares.
I used a password to close a file and i forgotten it. I need you help me find it.
I am in the cybersecurity/IT industry and would like the following from an experienced programmer: 1)Stable, fully undetected "FUD", crypter that has solid compatibility with most .exe files that will contain various malware samples to be used in sandboxed/isolated test environments for anti-virus evasion analysis. This crypter must be fully compatible with modern Windows environments (Win10/Win11). 2) Provide me with the original project source code, working and fully undetected crypter program and crypter stub. 3) Provide a detailed report on methods how I can personally "redo" parts of the source code you provide if/when the source code becomes detected in the future during testing/analysis with security tools. This part is very important, I am expecting quality...
Need Skill developers who; - Can develop a new digital signature platform like Docusign, Panda, etc.. - Have an understanding of PKI security and SSL certification - Has a good understanding of Biometrics (finger, facial and iris) - Understands mobile security - Is able to develop two or more factor verification processors - Understands biometric enrollment, verification and authentication
We are looking for a cyber security hacker that can find and propose ways to keep our platform more secure
Computer Networks Questions for computer Science
Computer Networks for business purpose
how to protect cloud data privacy with Homomorphic Encryption. To protect our data privacy in cloud and meanwhile allow the cloud server to process our data, the best solution is using homomorphic encryption scheme, e.g., Paillier encryption scheme, to protect our data in the cloud. In this question, you are expected to understand how homormphic encrytion technique can be used to protect your data privacy in Cloud and analyse data privacy
i am looking for some one have skills in dealing with problems in applied cryptography , more details in che chat
I am looking for an expert Cyber Operations, My project is on "Analyzing the threats imposed by virtualization in cloud computing". Rest Information will be given on chat
i am looking for some one have skills in dealing with problems in applied cryptography , more details in che chat
In this project, we will be performing Security Education (SEED) hands-on labs to demonstrate a classic buffer overflow for arbitrary code execution. We will also explore possible mitigations to both attacks and evaluate which are effective and which are not.
need someone who is good in academic writing and also good at the above networking concepts
I need 2 CV written : - data analyst -Cyber security engineer with Vulnerability Assessment
Hello, I need a tutor for computer architecture who is very proficient in the subject. I have a specific material from which I need to learn and I need to cover 121 pages in 30 days, I.e I need to complete 4 pages every day. The syllabus will be attached below. I require a tutor ASAP.
In this project, we will be performing Security Education (SEED) hands-on labs to demonstrate a classic buffer overflow for arbitrary code execution. We will also explore possible mitigations to both attacks and evaluate which are effective and which are not.
Hello everyone Hope you are doing well Can you check the attached pictures please and tell me if you understand them and then you can explain them in a very Thanks
To perform Security Education (SEED) hands-on labs to demonstrate a classic buffer overflow for arbitrary code execution.
Hi I am searching for an expert in 5G technology, cognitive radios and how to apply machine learning to manage spectrum, a device to device communication regarding discussing my master synopsis please message me.
Need to perform 2 activities 1. propose a WLAN deployment plan 2. network simulator OMNeT++ to investigate how the network scale affects the throughput performance
Goal is to check website and check form security to avoid any attack
We are looking tor QA in Japan It`s work with slot game,
I have an office place with 6 PC and will open another office of 6 PC. I want both of them to be connected in the same LAN. I thought a good plan is to have a managed router, a Firewall and a static IP and a VPN Server. Or you are free to suggest another plan for connecting the two sites. I you want to have the task please comment or write a message of the plan you think about to work. Deadline is very Important !!! Unifi dream machine UDM Ubiquiti Unifi USG fast IP-adress VPN tunnel - Konfigurera VPN
I am looking for someone who is having good knowledge of Machine Learning and can write a paper on "Real-time ML-based security auditing for the cloud." I will share the more details in chat.
We want to implement a fortigate firewall with following feature: 1. HA 2. SSL-VPN 3. VPN 4. URL filtering 5. WiFi controller We will require 1. Detailed design 2. Hearing sheet 3. Configuration best practice 4. Configuration
hey, I need to edit my background "in academic writing" not all sections I am not finishing and I need help to finish on Friday. Just the sections with red highlights, not all I have edited the first and second sub-sections, just from "FHE With noise management". Please take a look at the word doc and if you are interesting send me
We are looking for senior IT Engineers to support in house projects and customer networks. Primary work will be performed remotely. Must have excellent internet service and reliable working computer. We are primarily looking for engineers in North America or able to work with our clients between 4:00am - 6:00pm PST. Must be able to speak and write proficiently in English. If you meet the criteria below and are interested in complex IT projects let me know. We have enough work for 2-4 full time team members. I will need a formal CV/Resume for all applicants before you will be considered. If you send me a generic chat you will not be considered. This posting is for individuals only. We cannot hire other organizations for this position. ===== REQUIREMENTS ===== - Microso...
Hello Do you have expertise in Computer Networking? I need to virtualise a network. If yes, please apply.
An expert is required to setup sonic wall on the laptops so that the laptops could be connected through VPN to a healthcare server in US.
I wanna require an ethical hacker to hack my cctv as i have forget the password
I need help with Network protocols, network security, DNS, IP subnets. i will send more details in the chat.
I need to edit my background I have already written and add information but I still not finished all there are more comments from Dr and adding more information
I have an exam tomorrow the subject is Assurance and privcy sec .
Dears, I need someone who worked as an admin for knowbe4 platform before
Need Freelance trainers on Cyber Security and Ethical Hacking for 3 Days Onsite Training un Chennai