Top 10 Countries With The Fastest Internet In The World: Why They Change Every Quarter
Is your country on the list?
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Hire Computer Security ConsultantsHy, I need an expert, who has previous experience in Cuckoo Sandbox and Window API for malware analysis. The analysis should be static and dynamic. I need implementation and report within 24 hours. My maximum budget is 100 AUD. Please see the attached file for detail. All requirements must be completed according to the attachment. The samples of the malware can be download from this link There should be at least 5 minimum qakbot malware analyzed using Sandbox and Window API also with static and dynamic techniques. In the report all the questions given in the attachment file must be addressed in detailed like execution time, compilation time, entry point, file singed or not, if singed which certificate etc. All these questions in the static and dynamic parts should be addressed in de...
I am trying to create an optimized home network and am looking for the best advice as for how to accomplish that. My ISP: Comcast Xfinity 1200Mbps subscription My current gear: Netgear Nighthawk CAX80 DOCSIS3.1 Wireless Combo (Multigig 2.5 + Aggregate options) Netgear Nighthawk SX10 (GS810EMX) smart switch (also has aggregate or multigig) Netgear Nighthawk EAX80 "Mesh" Extender Netgear Nighthawk R6080 Router (setup in Access Point mode) My configuration is using the Multigig port out of the CAX80 using a Cat6 cable into the Multigig input of the SX10 switch. The switch out then outputs to my major media devices. (gaming PC, Nvidia Shield, as well as some smarthome devices like Hue Bridge, and now recently added the access point. Currently the EAX80 extender is unplugged...
It would be like Minecraft where you can build stuff and experiment second life like an economy jobs and the metaverse where you can create and earn money have fun
The suitable candidate must be able to work independently and support a range of networking solutions. Experience in network security is preferred but not compulsory.
Need someone good in CISCO networking
a description of the methodology and the required components following a specific format will be provided the work is urgent and needs to be done in 5-6 hours time around 3000 words
LAPTOP REPAIR TECHNICIANS NEEDED! Are you great at repairing PC's and laptops? Want to work for one of the world's biggest technology companies? Are you located in or close to (PUT IN LOCAL AREA HERE)? If you thrive on taking a customer centric based approach and have experience with hardware repairs for notebooks/laptops and printers, then we want to hear from you! A tech giant through Freelancer.com - the world's largest freelancing marketplace - is looking for Field Hardware Engineer candidates! Some responsibilities may include but are not limited to: Perform preventative maintenance and repair services on equipment by analysing system problems, troubleshooting, ordering and gathering components and parts, completing installation and performing tests Replace...
Need Ethical hacker to do long term project
develop a SecuriCAD model which consists of at least three networks. • The first network is an employee environment, which can be seen as a public access network. • The second network is an administration network having an internal Web Application and Database server that can be accessed internally. • The third network is an IT Management network, where IT technicians can manage all servers over SSH or Web Application. Additionally, the third network has a Database and Web Application that can only be accessible from the third network. All networks must contain at least one Windows and one Linux host. The networks are connected using routers. You have freedom in choosing high-value assets for analysis. The analysis must be done on the following threats: • Denial of Serv...
I want to be able to connect multiple networks together. I need guidance/assistance in achieving the setup. Please see image
You must develop a SecuriCAD model which consists of at least three networks. • The first network is an employee environment, which can be seen as a public access network. • The second network is an administration network having an internal Web Application and Database server that can be accessed internally. • The third network is an IT Management network, where IT technicians can manage all servers over SSH or Web Application. Additionally, the third network has a Database and Web Application that can only be accessible from the third network. All networks must contain at least one Windows and one Linux host. The networks are connected using routers. You have freedom in choosing high-value assets for analysis. The analysis must be done on the following threats: • Denia...
I need a few thigs edited in a large document (170k pages) as soon as possible. Tomorrow would be ideal. Need someone to go through and edit a few columns to show a mobile device has been hacked.
We are looking for a Freelancer Ethical Hacking Trainer for the duration of 1 month, who can take classes of student for 5 days a week for 1.5 hour. Candidate must have good practical knowledge of Ethical Hacking. Experience in giving training in the given field will be preferred.
Hello, I need help troublshotting ntopng with mikrotik its installed, configured somehow traffic is not coming probably problem with nprobe. if you have prior experience please bid. Thanks
We are looking for a project in computer networks. The project should be in a different way but it can be small. We are expecting a project with project proposal, implementation and documentation for it. I am uploading a file with list of topics from those topics any one topic can be chosen for a project. Need this project proposal by June 29th. The project proposal and documentation should be plagiarism free.
hello i need someone who can do webshell backdoor service
Need Ethical hacker to do long term project
Looking for a cyber security trainer with experience in one or more of the following domains. 1. VAPT 2. Network Security 3. Risk analysis and Mitigation 4. Information Security Auditing 5. Cryptography
I would like to create a platform that allows me to share information in a secure way. I was thinking some form of 2FA however I am open to suggestions.
Need Ethical hacker to do long term project
I would like to create two honeypots where one without any attacks and other with different attacks like bruteforce, ddos and finally comparison between honeypots and attack patterns. We are finally proving which honeypot is best for the organisation.
Fix my small office network with 2 printers and 2 computer
I have basic CTF quiz I need to submit 1- Linux 2- Network ( Wireshark ) 3-Reverse Engineering its all level 1 CTF ,
I need a paper with simulations either done with MATLAB or R for some techniques to comparative analyse some techniques of cloud security. In the experiment some screen shots must be taken,it has a soon Deadline.
i need the cyber security coder for multiple jobs. Details will be discussed..
Dear participants, I would you to find vulnerabilities from external & internal and prepare a report of your pentest result. This is my own website with full authorize, Critical or high is necessary for this test.
i need an assistance to add protection to under developing app
Need Ethical hacker to do long term project
Hi, I have a client project which need to hire SS7 developer experts to assist. Share me what u have done for this field knowledge. TQ
We've sent a number of emails through Gmail reminding certain matters and all goes to client's spam folders. We need help to adjust Gmail setting and make sure not going to the recipient's spam folder
I am looking for an ethical hacker to test vulnerabilities in my site, this will include making sure all our systems are secured and admin panel. Vulnerabilities found will be paid good.
Needing a digital forensic investigator to look into some documents and emails sent from ex-business partners
Advanced curbside tech repair specializing in computers (desktops, laptops, custom) and mobile devices (cellphones, tablets) as well as water damage, software repairs and soldering for all of the above. Just looking for something basic and to the point. Thanks for your time!
Is your country on the list?
This article exposes facts you never knew about your password, and how you can make it stronger.
Building a web application is easy - building one that meets all security requirements is hard. This article covers the 5 popular security practices.