Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Rekrut Computer Security Consultants
Networking packet tracer
Research paper for Graphical password authentication for children
I am looking for an an experienced person who can test the efficacy of a firewall app for windows 10. The objective of the app is to prevent any unauthorized intrusions or extrusions. You have to know the ins and outs of security testing. THIS IS FOR WINDOWS PC, not for windows server. If you clicked 'bid' without reading the description, our conversation will be unproductive and unpleas...
The project is to prepare a methodology and architecture to achieve the attached paper and the following objectives: 1. a secured and distributed Link Discovery Protocol for SDN 2. a robust Flow table Management resistance against SDN attacks when all the flow tables become overloaded 3. a deep learning model against DDoS attacks.
Hi I am looking for someone that knows Office365 / Endpoint manager/ Intune in DEPTH. They will need to understand all security polices for Windows 10 machines / Iphones & Androids. I need assistance setting up security polices. The candidate should speak fluent English as i will be speaking to them. I am estimating it will take around 2-3 hours.
I am not looking for indepth analysis - I need an independent audit in order to apply for a tender....need to satisfy the requirement and good to get your input... Need independent assessment of IT security - including security controls, security protocols, password management, system access, data security, data encryption, audit trail, audit logging.
Per the auditor's request, we need to perform a vulnerability assessment for the whole company. We have two servers (1 Windows Server 2016, 1 Linux) and around 10 Workstations (Windows 10). I want to hire a freelancer for providing the report.
Milestone 1 $10 : Read code and Check for list of ads unit ID implanted. ([login untuk melihat URL]) Bonus $25/malicious ads unit ID if you found which are not listed (send me screenshot proof [login untuk melihat URL]) Milestone 2 $20 : Design a strategy or an advice to prevent our existing developers to implant malicious ads unit ID I want to have a long term relationship for other future jo...
MY PHOTOS GOT CORRUPTED/REPAIRED I CANT SEE MY PHOTOS IN MY LAPTOP/MOBILE/ANYWHERE. I WILL GIVE SAMPLE IMAGE FOR REPAIR. THOSE WHO DO THAT SAMPLE WORK DONE I WILL AWARD YOU AND CREATE MILESTONE TO GET REPAIR OF MY 20000 PHOTOS. KINDLY HELP ME TO REPAIR MY PHOTOS.
c++ language, Linus, hack, buffer overflow, game debuting,
I am looking paper on a special law in India: a critical analysis of the same from a legal and human rights perspective. A publishable piece. Word Limit is 5000 words Plagiarism free ofcourse. I don't want it as a law school project but like a critical study. Deadline 28th January 2021
I’m looking for a skilled network freelancer who perfectly know : - ISP Residential or 4G Mobile IPs market offer - ASN Registration and BGP routing (to route subnet IPs into DataCenter) More information at discretion in DM
Implement Network Share for users to have a network home drive and users to have home departments (Fianance) (Acounts Rec & Accounts Payable) (Sales Manager) (Marketing, note Marketing required re-create and migration of existing marketing folder) (HR).
The date is 1 July 2004 . You have been called in by an organisation that suspects one of its staff members is breaking organisational policy. The staff member has joined a strange religious group that considers geometric shapes to be very important. The staff member was warned in May 2004 against using organisational resources to create, store, search the Web for or disseminate pictures of such s...
Help me with Euclidean algorithm and prove that gcd,the Diffie-Hellman algorithm,digital signature system,Vigenere cryptosystem,RSA algorithm, digital signature categories: (a) asymmetric encryption (b) by self-recovery Feistel Algorithm DES and 3DES What is PGP?
Responsibilities * Research and oversee security initiatives/programs to improve and enhance detect and response/recovery capability within the organization. * Act as the primary point of contact with the Managed Security Services Partner in response to the threats and possible attacks and intrusions. This includes conduct of root cause analysis of security incident and ensure control measures imp...
The problem: Tracker identification is based on whitelists and lists of known trackers (see attached paper Introduction to being a Privacy Detective - Investigating and Comparing Potential Privacy Violations in Mobile Apps Using Forensic Methods) The aim: Identify trackers from Mobile Application Network traffic w/o resorting to whitelists of known trackers (Finding features of different trackers...
SLR in cyber security in critical infrastructure for master degree student
Hello Everyone, We need 1 pentester with 2 to 3 years of SAP system experience. The client is an important international company. The job is related to penetration test to SAP System. Time of execution after approval: 3 weeks. If you comply with the requirement, please contact TEAM ISLC
I need someone with strong skills regarding website security issues such as scrapping presentation, ddos attacks.. preventing spammy posts .... etc Currently I am facing problem from people using bots to scrap pages of my site. I need to solution to this problem.