Is your country on the list?
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Hire Computer Security Consultants
Kindly go through the above Pdf to understand the job requirement.. Once you feel you can handle this project, message us and we will share you the website details. PS - We are not the owner of the website so we don't have any access to any credentials or Database.
basic principles and operations of Local Area Networks (LAN's). Such topics include basic data communications, the OSI model, protocols and topologies. experience with the installation, administration, and operating characteristics of such networking systems as Netware 3.12, Windows 2008, and Linux
Requirements For the practical part of this assignment, you will have to build three Virtual Machines (VM): 1. A Linux Server o You could use CentOS or Ubuntu Server o Minimum configuration required DNS An additional service of your own choice (e.g. DHCP, FTP, SMTP, SNMP etc) 2. A Client o Could be either Windows (Visa, 7, 8, 10 etc) or Linux (Fedora, Ubuntu etc) o You could create multiple copies of the client’s VM if you require more clients to demonstrate an attack 3. Attacker machine o Kali Linux (the most recent version is highly recommended)
One windows 10 computer with 4-5 hard drives got infected recently with ransomware ([url removed, login to view]) all it says in the notepad file is files encrypted email mr_nicee@[url removed, login to view] if you Know or think there is a chance of getting rid of this ransomware and restoring thr files plz bid
i have a package capture by wireshark and need someone that knows wireshark and can find me the live video stream url in it and extra it so i can play in in vlc or any other player.....
For a publication library Win32 app, I am looking to extract data from its proprietary and undocumented file format. * It is multilingual and precedes Unicode, most likely compressed. * The individual documents are search indexed (indices in separate files). * They are sorted into a hierarchy: Publication (file-level) > Chapter > Content. * Some publications are magazines, their hierarchy is: Publication (file-level) > Year > Issue > Chapter > Content. * The documents are interconnected with hyperlinks. * Few publications contain images, most is formatted text. Source: I will provide you with the entire library viewer app including all of its publication files (1+GB). Deliverables: * The tool you develop to read and convert the files to the following format. * I can work from a set of legible, interconnected HTML (and JPG) files with their TOC files, sorted into nested folders. * All formatting, links and footnotes need to be retained. * Indices should be on a separate file per publication, using HTML anchor tags < a id="uniqueID" > in the content files. * I should be able to use the same tool on more files of the same specification. * Delivering a command line tool for Win32, x64, Linux or macOS is fine.
I am looking for a security expert for a test of penetration and information retrieval, with this : technical report containing issue, issue background/impact , issue severity level remediation and poof of concep minimum OSCP certified CREST CERTIFICATION i need certified test
need a person that can thwart virus and guarantee a safe and virus free workforce . also have 25 computers that have been infected by deadly virus and hoping someone can salvage the computers or will have to destroy
I need some RPL protocol attacks to be implemented in cooja. the person should have deep understanding of the rpl protocol and socket and network programing. most of cooja code is done in C language . if you think you have the skill lets chat and see how it goes .