Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Computer Security Consultants 분야 채용
I'm facing an error in creating a VPN connection on GCP server using Strongswan
Online filling of the digital forms which take less than 30 seconds per form. Our requirement is filling form with dynamic IP addresses (proxy..) of the desktop machine. The project could be in good volume if the output result will be satisfactory. (Bidders only from INDIA, not outside)
I am looking for someone who can help me learn and support security analyst tasks. Skills involved: puppet, vulnerability analysis and remediation using windows and linux systems. Security audits Analyze data by using queries and reports. General tasks include: • Deploy and manage endpoint security tools (Antivirus/Antimalware, Exploit prevention, DLP, Host-based Intrusion Prevention) • ...
Group with 1 member requires to submit the overall design (what kind of servers, switches, routers and routing protocol have to setup) - min. length is 3 pages. I am single member so need only 3 pages
Hi Everyone, Discover vulnerabilities to prevent attacks and improve business continuity. To also find application security flaws, such as SQL Injection and Cross-Site Scripting etc. Thanks
I need an expert pen tester to test my pc firewall. You are expected to install this on YOUR test pc and see if it controls and restricts effectively all unauthorized inbound and outbound connection attempts. You would need kali or similar on another device to simulate intrusions on your test computer. Not for beginners. Please do not bid without reading. No bids from indiapakistan. No bids in bro...
Perform an analysis of the malware using static and dynamic analysis tools and techniques. Report on: • Static File Information for all Files Involved • Any Created, Dropped, or Delete Files Must be Analyzed • Any Encoding, Obfuscation, or Anti-Revering Techniques Observed • Dynamic Analysis Information • Static Code Analysis • Network Activity • Recommended Sign...
Hi I just need to create an expansion file for my app. All details will be given. The job is urgent and I need someone to complete this now for me if possible. Thank you kindly
I want machine to machine authentication using digital certificates and some hardware signatures so that only approved devices will be connected to server
i may have malware where my pc freezes every 3 hours in task scheduler i can see some tasks which look suspicious please see [로그인하시면, URL을 확인하실 수 있습니다.]
Hi I am sending this message to ask you if you are able to provide PHD topic selection. The field I am going to work on is ( home automation using internet of things) I prefer to work with cyper security in the field of ( smart homes and IOT)
I need an expert pen tester to test my pc firewall. You are expected to install this on a test pc and see if it controls and restricts effectively all unauthorized inbound and outbound connection attempts. You would need kali or similar on another device to simulate intrusions. Not for beginners. Please do not bid without reading. No bids from indiapakistan. No bids in broken english.
We are looking to increase the material on a RFID tag that limits the amount of material that we can use on a machine. we would like the RFID tag to register infinite amounts of material rather the 1KG. I would send the RFID tag to you and if you could copy it and return the card with a larger material value on it.
1. Need to check backend processes and secure network in mobile devices (4) and home router ( Seems our devices, cel numbers and social media accts are under in g suite)and someone is monitoring.