Is your country on the list?
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Hire Computer Security Consultants
Hy, I need an expert, who has previous experience in Cuckoo Sandbox and Window API for malware analysis. The analysis should be static and dynamic. I need implementation and report within 24 hours. My maximum budget is 100 AUD. Please see the attached file for detail. All requirements must be completed according to the attachment. The samples of the malware can be download from this link There should be at least 5 minimum qakbot malware analyzed using Sandbox and Window API also with static and dynamic techniques. In the report all the questions given in the attachment file must be addressed in detailed like execution time, compilation time, entry point, file singed or not, if singed which certificate etc. All these questions in the static and dynamic parts should be addressed in de...
I am trying to create an optimized home network and am looking for the best advice as for how to accomplish that. My ISP: Comcast Xfinity 1200Mbps subscription My current gear: Netgear Nighthawk CAX80 DOCSIS3.1 Wireless Combo (Multigig 2.5 + Aggregate options) Netgear Nighthawk SX10 (GS810EMX) smart switch (also has aggregate or multigig) Netgear Nighthawk EAX80 "Mesh" Extender Netgear Nighthawk R6080 Router (setup in Access Point mode) My configuration is using the Multigig port out of the CAX80 using a Cat6 cable into the Multigig input of the SX10 switch. The switch out then outputs to my major media devices. (gaming PC, Nvidia Shield, as well as some smarthome devices like Hue Bridge, and now recently added the access point. Currently the EAX80 extender is unplugged...
a description of the methodology and the required components following a specific format will be provided the work is urgent and needs to be done in 5-6 hours time around 3000 words
LAPTOP REPAIR TECHNICIANS NEEDED! Are you great at repairing PC's and laptops? Want to work for one of the world's biggest technology companies? Are you located in or close to (PUT IN LOCAL AREA HERE)? If you thrive on taking a customer centric based approach and have experience with hardware repairs for notebooks/laptops and printers, then we want to hear from you! A tech giant through Freelancer.com - the world's largest freelancing marketplace - is looking for Field Hardware Engineer candidates! Some responsibilities may include but are not limited to: Perform preventative maintenance and repair services on equipment by analysing system problems, troubleshooting, ordering and gathering components and parts, completing installation and performing tests Replace...
develop a SecuriCAD model which consists of at least three networks. • The first network is an employee environment, which can be seen as a public access network. • The second network is an administration network having an internal Web Application and Database server that can be accessed internally. • The third network is an IT Management network, where IT technicians can manage all servers over SSH or Web Application. Additionally, the third network has a Database and Web Application that can only be accessible from the third network. All networks must contain at least one Windows and one Linux host. The networks are connected using routers. You have freedom in choosing high-value assets for analysis. The analysis must be done on the following threats: • Denial of Serv...
You must develop a SecuriCAD model which consists of at least three networks. • The first network is an employee environment, which can be seen as a public access network. • The second network is an administration network having an internal Web Application and Database server that can be accessed internally. • The third network is an IT Management network, where IT technicians can manage all servers over SSH or Web Application. Additionally, the third network has a Database and Web Application that can only be accessible from the third network. All networks must contain at least one Windows and one Linux host. The networks are connected using routers. You have freedom in choosing high-value assets for analysis. The analysis must be done on the following threats: • Denia...
We are looking for a Freelancer Ethical Hacking Trainer for the duration of 1 month, who can take classes of student for 5 days a week for 1.5 hour. Candidate must have good practical knowledge of Ethical Hacking. Experience in giving training in the given field will be preferred.
We are looking for a project in computer networks. The project should be in a different way but it can be small. We are expecting a project with project proposal, implementation and documentation for it. I am uploading a file with list of topics from those topics any one topic can be chosen for a project. Need this project proposal by June 29th. The project proposal and documentation should be plagiarism free.
hello i need someone who can do webshell backdoor service
I would like to create two honeypots where one without any attacks and other with different attacks like bruteforce, ddos and finally comparison between honeypots and attack patterns. We are finally proving which honeypot is best for the organisation.
I need a paper with simulations either done with MATLAB or R for some techniques to comparative analyse some techniques of cloud security. In the experiment some screen shots must be taken,it has a soon Deadline.
Dear participants, I would you to find vulnerabilities from external & internal and prepare a report of your pentest result. This is my own website with full authorize, Critical or high is necessary for this test.
We've sent a number of emails through Gmail reminding certain matters and all goes to client's spam folders. We need help to adjust Gmail setting and make sure not going to the recipient's spam folder
Needing a digital forensic investigator to look into some documents and emails sent from ex-business partners
Advanced curbside tech repair specializing in computers (desktops, laptops, custom) and mobile devices (cellphones, tablets) as well as water damage, software repairs and soldering for all of the above. Just looking for something basic and to the point. Thanks for your time!