컴퓨터 보안 Jobs
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Computer Security Consultants 분야 채용I need an expert in computer security and social networks
I need an expert in computer security and social networks
check security level of site and check to hack posibility
our site had been under attack with various malware. We reuire the site to be cleaned and to ensure that our site is protected from any further attacks.
I need a freelancer who can edit and rewrite some parts of an academic paper related to IT, more details will be shared with the right freelancer.
We have a CPP written application where we want to add some security triggers in case someone tries to debug it or tries to alter it in any other ways. We want it to be as hard as it can be to be cracked. *Do note as its a closed source we cannot share much details as well as either source or the application for implementing. Anydesk or TeamViewer is preferred for the task
I'm seeking an expert in website and server penetration testing to audit the security of the website and web server associate. This engagement can expand into a long term collaboration. Please no web developer or script kiddie but someone that is a good security tester.
ATTENTION: PIease if you are really interested say me, Hi I am here to help you with confidence...I am looking for an a profesional user engineer to avoid malwaree in my phone and also to clean it with good knowledgment...
An IT professional with 6+ years of experience, having expertise in Windows Installer technology, Wise, Application virtualization; skilled in analysis, troubleshooting, testing, documentation, technical support, and windows network administration.
An IT professional with 6+ years of experience, having expertise in Windows Installer technology, Wise, Application virtualization; skilled in analysis, troubleshooting, testing, documentation, technical support, and windows network administration.
I'm looking for a programmer with a lot of computer security and ROP style programming experience.
I need some help with some CTF computer security problems.
I am looking for qualified and experienced penetration testers to check vulnerabilities in partner companies. Successful candidates will be well paid.
I have received the following Email from Linode which i need an urgent solution to. ############################################################### We have detected an outbound denial of service attack originating from your Linode. It appears that a process internal to your Linode is sending large amounts of malicious traffic towards other servers. We ask that you investigate this matter as soon ...
Gathering information such as internet protocols, names and addresses
Hi We need a person who can test our application for QOS purposes in various part of the world Thanks
i want to convert .p file to .m file. I can't find my original source codes but I get them in form of p code I have 5 p codes so i want to convert them to .m file or to read them in any way that can be read it and getting data for them.
i am looking for expert in cyber security. note that it requires a certain virtual machine and a Kali Linux virtual machine.
looking for network engineer who can provide assistance. it's will be just like Question Answer session.
Hello, I'd like you to be able to connect VPNUnlimited to a version of OpenWRT 18.06. Using certificates. I also need you to do a well explained how-to with screenshots. Thank you.
Hi there, If you are familiary with web application security assessment and vulnerability assessment please drop a bid starting with [Security Expert]. It seems our website was maybe hacked (not sure). but we are getting a phishing warning message on our website from the browsers. Screenshot is attached. We need your help to figure how this occurred and how to prevent it in the future. Further ...
I need content writer for research paper, I have many projects which includes following subjects: >computer science >Cloud computing >cyber security >sql injection Thanks.
o The scope of the report is only the memory dump analysis o The more insights from the attack you can provide, it's good o Every aspect you reveal about the attack must be supported by a technical analysis
Proficient with computer network systems and troubleshooting methodologies. Must have tools the necessary equipment. Start immediately
I need the source code of "Server Tester", I need test my server farm specifically ssh protocol (22 port), the idea is that I can set a COMBO list file (user and password) and ip list file (like 10-250+) and give me a list with only vulnerable servers with this format "ip/user/pass" then proceed to repair them. I have tried it in c and golang but i have problem with threads. Se...
I am looking for someone for a project in Active directory. It's a case study about a campagny • AD DS -> describe the attack step by step including the techniques and tools you would use • Identify major misconfigurations on case study domain controllers and explain why they are putting the environment at risk. • Make security recommendations and order them by priority.
.hets and .msop virus affected file has to recovered.
Retrieve page to owner deleting any connection with agencies or other admins
I need a software engineer or teacher to create about 14 sets of slides for me which will cover all the basics of software development for beginners. It will cover aspects such as User Interface development, design , deployment. I can send a full specification on successful award of the project. Please only experienced teaching professionals apply. Milestones will be added for each slideshow creat...
I need full new brief methodology framework architecture for securing IoT devices by Edge computing and Fog computing with less coding. The idea should be plagiarism free. Only the experiecend persons are welcome to message me please. Thank you.