The issue of cybersecurity is more serious than many freelancers realize.
Internet security involve training and/or experience in the design, assessment and configuration of measures to protect both IT systems exposed to the Internet as well as the consumers of those systems. The field of internet security is highly volatile as new threats and measures develop on a daily basis, necessitating anyone tasked with it to constantly keep their skill up to date to remain effective.
This is a skill carrying high responsibility, as data compromises of either company data or personal data can incur significant reputational or financial damage. Given these risks, this skill is mandatory for any organization with an Internet presence to secure, either through their own recruitment or vetting of their suppliers.Hire Internet Security Experts
I already have a game source code. I need a help on deploying it on the VPS and go live. My main concern is flaws on the source code and root access security. Apparently MS SQL db, Node.js, ASP.NET are used among others. Details are to be discussed. But save button is greyed out. You don't have to do anything physically. Just advice me and or teach me few key things I need to be aware. If yo...
Fortinet Guru wanted! - ipsec - Forticlient - Policy - Web Filter - Application Control - Intrusion Prevention Extensive and Professional Knowledge of Fortinet Firewall (GUI, CLI) required! No Beginners!! Freelancer located in New Zealand only! Valid NZ work visa required!
My Server got injected by virus (RSA Algorithm) ATTENTION! ALL YOUR DATA ARE PROTECTED WITH RSA ALGORITHM Your security system was vulnerable, so all of your files are encrypted. in the header of the letter indicate your encrypted ID (you can find it in the names of your encrypted files) If you do not receive a response within 24 hours, please contact us by [login to view URL] account: BE CAR...
We want to encrypt and decrypt video which must play only on our own player. It would be integrated into Android, iOS, and Web. Basically to secure video and prevent privacy. So that video shouldn't be downloadable, the screen can't be captured. Encryption/decryption to be done at the time of URL transmission also. Lifecycle: 1. User will upload video, it will be encrypted and uploaded ...
I need to protect my website from Level 7 / Application Level DDoS. I would like to know the best way to do it and a cheap method, I can't afford Imperva, etc. Cloudflare does insanely bad job at mitigating / preventing Layer 7 DDoS
We are needing and experienced programmer, developer and/or server manager to repair our website and secure it from hacking, spamming indefinitely. It is hardcoded in php with custom CMS-Admin.
I am looking for someone with a lot of knowledge about ip addresses top supply me with constant information about ip addresses in order to provide information and guidance to others seeking information about ip addresses. This guidance will be provided to them in the form of blogs and vlogs.
Our portal needs to adhere to Security requirement like : Data storage requirements (Singapore only) Office Security - Physical Controls Implementation of Physical Firewalls Interfacing with SingPass / CorpPass for Authentication
Can you wear a few different hats? If you want to be an investigator, think you have the skills to help me prove a fraud case...then I WANT YOU! I have a very sensitive and complex situation that would really need to be talked about in the text and in strictest confidentiality. There are two people involved, with fraud and romance....and there would need to be some way to connect the two parties o...
I have problem with my host .. the host keep deleting my files because there is malware .. i want expert to solve this by clean the files and without deleting my files because its style and system files
My site was hacked. I have backed it up and deleted the directory on the server. I've initiated 'under attack mode' on cloudflare. There are multiple hits to the firewall every few minutes. My hosting company says that other sites on my server have also been compromised but I don't see the effects at all.
Information Security Assignment – Integrity 1 Message Validator To ensure integrity, an XML message has been digitally signed using a security appliance. Your task is to develop a Java application to validate that XML message against the provided signature (assume the signature is valid) using the Bouncy Castle Crypto API. Refer to Section 3 for the XML message and signature.
I need someone who can makes the files inside our FTP or wordpress not downloadable nor copied able except by some specific certain users. So our developers can only edit/modify within the files, not even copy paste the codes inside it. we dont use cpanel, just use google cloud console and filezilla
DSLM smartAX MA5616 configuration and ready up many time showing error - the system is loading or backup or duplicating data or rollback or canceling rollback, please dispose of data later_ need to configure this issue immediately.
I need someone to look at my computer through team viewer and find the hack portal on my computer and give me the details to catch the person's IP address and maybe hack there system to see where it is coming from.
We have VM Hosts running FT. They connect to 2 Cisco 3800's We have 2 Internet providers. We want to setup the network for fault tolerance. If a switch or ISP fails, traffic will keep flowing on the backup network.
Ejemplo Sacar información de alguna Web automáticamente, por ejemplo de un API REST simple o de ficheros que haya en sitios con información de seguridad. - Grabar y leer algunos datos en una base de datos sencilla. - Tomar algunas trazas de red de algún tipo con las bibliotecas Python de Wireshark y procesarlas. - Simular todo generando algún tipo de alerta o ...