The ultimate guide to hiring a web developer in 2021
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Network Security is an important component of IT solutions as it keeps organizations safe from cyber threats. A Network Security Consultant can help ensure a company's network is properly secured. They provide a range of expert services including evaluation of the existing security posture, recommending security solutions, providing project management and software solutions, monitoring and reporting on usage, incident response and forensics. Network Security requires a deep understanding of the underlying systems and processes.
Here's some projects that our expert Network Security Consultants made real:
Network Security is essential for any organization to remain safe from cyber threats online. Whether you need to review your existing Network Security posture, implement secure protection systems or create educational materials for internal staff, an experienced Network Security Consultant on Freelancer.com can help bring your ideas to life. Contact one now on the world's leading freelancing website and get the peace of mind that comes with secure networks.
From 25,815 reviews, clients rate our Network Security Consultants 4.9 out of 5 stars.Network Security is an important component of IT solutions as it keeps organizations safe from cyber threats. A Network Security Consultant can help ensure a company's network is properly secured. They provide a range of expert services including evaluation of the existing security posture, recommending security solutions, providing project management and software solutions, monitoring and reporting on usage, incident response and forensics. Network Security requires a deep understanding of the underlying systems and processes.
Here's some projects that our expert Network Security Consultants made real:
Network Security is essential for any organization to remain safe from cyber threats online. Whether you need to review your existing Network Security posture, implement secure protection systems or create educational materials for internal staff, an experienced Network Security Consultant on Freelancer.com can help bring your ideas to life. Contact one now on the world's leading freelancing website and get the peace of mind that comes with secure networks.
From 25,815 reviews, clients rate our Network Security Consultants 4.9 out of 5 stars.I need a purpose-built Wi-Fi modem that can sit in the field, discover and manage between twenty and thirty of my smart prepaid electric meters at once, then forward their information to a third-party server. Core requirements • Meter side: maintain a stable local link to each prepaid electric meter, poll at configurable intervals, queue data when the Wi-Fi link is down, and reconcile immediately after reconnection. • Network side: connect via standard 2.4 GHz Wi-Fi, authenticate securely (WPA2 minimum), and push three distinct data streams—usage statistics, diagnostics snapshots and real-time alerts—through the API endpoints I will supply. • Throughput: normal operating load is small, but latency for real-time alerts must stay below two seconds under fu...
I need a robust web server configured specifically for storing and managing transaction records. The entire environment must meet recognized industry standards such as PCI DSS, so every layer—from operating system hardening to database encryption and network configuration—has to align with those controls. Here is what success looks like to me: • Provision a scalable server (cloud or on-prem, your recommendation) built for high-volume transaction data. • Implement advanced encryption at rest and in transit, with key management that satisfies PCI DSS. • Configure access controls, logging, and monitoring so audit trails are complete and tamper-proof. • Provide clear documentation of the architecture, compliance checkpoints, and any scripts or automation ...
I hold written authorization from the system owner and need an experienced ethical-hacking professional to carry out a controlled breach of our production environment. The assignment goes beyond a traditional penetration test: I want you to replicate a real-world, end-to-end intrusion scenario so we can measure how our monitoring, logging and incident-response teams react under pressure. Scope • Obtain initial access using any non-destructive vector you discover (phishing simulation, misconfigurations, credential weakness, etc.). • Laterally move, escalate privileges and demonstrate data access without altering or deleting information. • Leave tamper-proof evidence (flags) in pre-agreed directories so we can verify compromise. • Conclude with a thorough report that det...
I’m ready to move from concept to a fully functioning Wide Area Network and need an experienced networking specialist to guide every step. The job starts with assessing my current sites and bandwidth needs, then designing a scalable WAN topology that keeps latency low and uptime high. From there you’ll source or specify the right hardware, configure routing, implement security policies, test end-to-end connectivity, and leave me with clear documentation so my team can handle routine maintenance. If you’ve rolled out multi-site WANs before and can communicate technical details in plain language, let’s talk timelines and milestones.
We have a very well working ingestion based cloud application, based on a RUST - Python stack with various databases. This is connected via a authentication system to a frontend which is also a combination of SVELTE - and a various of stack on top of that. We are looking for someone to help us productionlize this system and continously work with us to add new features and improve it. We can spit out logic quickly but need it properly engineered when going to production. Please note that the system is already working in a PoC manner and documented.
My provider has suspended my Ubuntu VPS after flagging a hack on the web-server layer (Apache/Nginx, exact stack is in the incident report I will share once we start). At the moment I have zero hardening in place—no firewall rules, no SSL, nothing—so the attacker clearly found an easy way in. I do have a recent full backup, so you can work safely and roll back if needed. Your mission is to identify the entry point, remove any malicious code or files, close the vulnerability, and leave the server in a state that convinces the host to lift the ban. You are welcome to use tools such as fail2ban, UFW/iptables, ClamAV, rkhunter, ModSecurity, or any other utilities you normally rely on. Deliverables • Clean, uncompromised web root and services reinstated • Detailed ...
I need help in building my own mobile proxy set up: More details: Is this project for business or personal use? For an existing business What information should successful freelancers include in their application? Detailed project proposals How soon do you need your project completed? ASAP
I need a secure, lightweight VPN application built for both and Android. The interface can stay minimal; stability, speed, and protocol flexibility are the real priorities. Core capabilities I expect: • Kill switch that reliably blocks traffic if the tunnel drops • Split tunneling so the user can choose which apps bypass the VPN • Support for the following protocols or transport layers: ssh, ssl, udp, v2ray, and websocket • A menu of multiple server locations that I can expand later through simple JSON or similar remote config No in-app user-authentication flow is required; the build should assume pre-provisioned profiles or embedded credentials. Deliverables: 1. Clean, well-commented source code (/Kotlin or Java/) 2. Signed release builds ready for TestFli...
We are getting multiple OT projects and need more hands to support us in terms of this. I’m consolidating several Industry-grade PCs that run bespoke Python applications into our existing Operational Technology environment. The immediate goal is to create a clean, well-documented integration pathway that lets these machines exchange data safely with the rest of the plant network while respecting every cyber-security control already in place. Here’s what I’ll hand over on day one: current network maps, the Python sources, and a short list of approved protocols (mainly Modbus/RTU). From you I need a streamlined integration plan, the actual Python interface code or refactor, and clear documentation that anyone on the OT team can follow without hunting for tribal knowledge....
I need a working proof-of-concept that hardens my wireless network by analysing live traffic and flagging hostile activity the moment it appears. The model must reliably catch the attacks that worry me most: Denial of Service (DoS), Man-in-the-Middle (MitM) intrusions, classic packet sniffing, and ARP spoofing. Everything has to run in real time on a modest on-prem machine, so efficient feature extraction and lightweight inference are a priority. The task breaks down naturally into three parts. First, capture and label representative WLAN traffic—public datasets are fine as a starting point, but I also want a small tool that lets me pipe raw pcap streams into the training set so the system can learn my network's quirks. Second, build and train the detection engine: a well-comme...
I need a field engineer to be physically present at Goa Airport on 16 and 17 February. You must bring a laptop loaded with your preferred terminal software, a complete basic toolkit, and your own console cable so we can move quickly once onsite. The job is straightforward but time-critical: unbox, rack and power up one new router and one new switch, then run through the full console-based configuration, saving clean start-up configs before we hand the network over to airport IT. I will supply the configuration files. We may need to patch into a couple of existing lines for testing, so please be ready to verify link LEDs. Once everything is up, finish with a round of connectivity testing—ping, traceroute and a quick throughput check—to confirm that the airport LAN and upst...
I need a Japanese national DID or any other VOIP number that can reliably forward calls to my chosen destination. The line will serve both personal and business purposes, so stability, clear audio and the ability to register the caller ID on common soft-phone or SIP devices is essential. Please supply, activate and demonstrate the number working via simple call-forwarding within the shortest possible time; my preference is ASAP. If you already have an inventory of Japanese DIDs, even better—let me know the formats available and any documentation requirements. Acceptance is straightforward: once I can receive and place test calls through the number without drops or quality issues, the milestone is cleared.
I need a network setup for our condominium management company. We have an administration team and a manager that need to be connected for efficient file sharing. Requirements: - Facilitate file sharing, primarily software and applications - Integrate with our preferred email communication system Ideal Skills and Experience: - Experience in setting up secure and efficient networks for small to medium-sized teams - Familiarity with file-sharing protocols and software - Strong understanding of integrating networks with email systems Please provide a portfolio of similar work and an estimated timeline.
Project Description: I am looking for a Cybersecurity Specialist to perform a comprehensive security audit on a newly developed desktop application. The goal is to evaluate the robustness of the authentication framework and provide a risk assessment report. Scope of Work: Conduct a Vulnerability Assessment on the application's login and validation protocols. Test the integrity of the software's validation logic against unauthorized access. Evaluate the effectiveness of current obfuscation and anti-tamper measures. Provide a detailed report with recommendations for hardening the software and improving data protection. Requirements: Proven experience in Application Security Testing and OWASP standards. Strong background in binary analysis and software protection mechanisms...
Project Overview: I am currently constructing a 4,500 sq. ft. custom home and need a comprehensive Low Voltage Design & Wiring Schedule. I am looking to design a "Rough-In Plan" that I can hand to my electrician/cabling installer. I have a strong preference for the Ubiquiti (UniFi) ecosystem for networking and security. Scope of Work: Home Network (Ethernet/Wi-Fi): Design a robust Ubiquiti UniFi network topology. Determine optimal Wireless Access Point (AP) placement for coverage across three floors + outdoor areas. Plan CAT6a drop locations for TVs, office workstations, and backhaul. Whole House Audio: Design wiring zones for multi-room audio (in-ceiling/in-wall speakers). Designate "Home Run" locations to a central rack/AV closet. Recommend speaker place...
I’ve built a custom web application and it’s almost ready for production. Before the public rollout, I want a rigorous penetration test that will expose any weakness and help tighten every layer of security. The assessment must be hands-on and realistic, covering the full stack rather than a purely theoretical review. Scope My priorities are clear: • Code review – comb through the source for injection points, authentication flaws, insecure dependencies, and logic errors. • Network-level probing – map open ports, misconfigured firewalls, and potential lateral-movement paths. • Server configuration – evaluate patch levels, TLS setup, permissions, and hardening of the underlying OS and web server. Primary Goal The sole purpose is to imp...
I need a capable network engineer who can spend a full working day at my client’s premises acting as our hands-on field resource while my remote team carries out all configuration tasks. Your focus will be purely physical: rack-mounting the servers, switches, and firewalls; dressing and labeling power and Ethernet runs; attaching console and management leads; then powering everything up so we can reach it remotely. Once each device is live you’ll run quick sanity checks—simple pings, basic connectivity, and a printer test—to confirm the build is progressing as planned. Desktops and laptops must join the network without issue, and at least one printer needs to produce a clean test page before you leave. I’ll supply a clear step-by-step build guide and remain ...
Cloud Security Specialist – Immediate Infrastructure Hardening (Short Term) Project Overview Duration: 3 to 5 days Location: Remote Start: Immediate A healthcare technology platform requires a Cloud Security Specialist to implement quick security improvements identified in a recent penetration assessment. This is a focused, short-term assignment aimed at reducing immediate attack surface exposure at the infrastructure layer. Scope of Work All listed tasks must be completed. 1. Server Version Disclosure Prevention Remove server and framework version information from HTTP responses. Responsibilities Configure AWS Application Load Balancer to remove server headers Update CloudFront response headers policy Disable X Powered By headers in Customize error responses to prevent ve...
Cloud Security Specialist – Immediate Infrastructure Hardening (Short Term) Project Overview Duration: 3 to 5 days Location: Remote Start: Immediate A healthcare technology platform requires a Cloud Security Specialist to implement quick security improvements identified in a recent penetration assessment. This is a focused, short-term assignment aimed at reducing immediate attack surface exposure at the infrastructure layer. Scope of Work All listed tasks must be completed. 1. Server Version Disclosure Prevention Remove server and framework version information from HTTP responses. Responsibilities Configure AWS Application Load Balancer to remove server headers Update CloudFront response headers policy Disable X Powered By headers in Customize error responses to prevent ve...
is seeking an experienced web application security specialist to address specific vulnerabilities identified in our recent penetration testing assessment. As a healthcare technology company specializing in innovative oral health monitoring solutions, we prioritize robust security standards and regulatory compliance. This is a focused, short-term engagement to remediate six specific security findings in our web application infrastructure. We need an independent contractor who can take full ownership of implementing these security fixes efficiently and professionally. Scope of Work - Specific Vulnerability Remediations Based on our completed Web Penetration Testing assessment, you will address the following security findings: 1.-n/a 2. Server Version Disclosure Prevention • Task Ty...
is seeking an experienced web application security specialist to address specific vulnerabilities identified in our recent penetration testing assessment. As a healthcare technology company specializing in innovative oral health monitoring solutions, we prioritize robust security standards and regulatory compliance. This is a focused, short-term engagement to remediate six specific security findings in our web application infrastructure. We need an independent contractor who can take full ownership of implementing these security fixes efficiently and professionally. Scope of Work - Specific Vulnerability Remediations Based on our completed Web Penetration Testing assessment, you will address the following security findings: 1.-n/a 2. Server Version Disclosure Prevention • Task Ty...
I’m starting from scratch and want to build a solid foundation in ethical hacking, not the shady stuff. What I need is a structured, online-based learning path that moves me steadily from absolute beginner through the essentials of reconnaissance, vulnerability scanning, exploitation, and post-exploitation—all with a clear focus on legal, responsible practice. Here’s what I’m looking for you to deliver: • A step-by-step syllabus broken into logical modules that I can follow in my own time, with estimated completion times and milestone quizzes. • Curated links to reputable online courses, labs, and CTF platforms (Think TryHackMe, Hack The Box, or equivalent), together with your notes on why each resource is worth my time. • A concise toolkit setu...
I need help tracing harassment issues related to cyberstalking. I suspect my LinkedIn account has been compromised, and I'm receiving harassment on email and other online platforms. Key tasks include: - Investigating unauthorized logins and profile changes on my LinkedIn. - Identifying sources of harassment on email and other platforms. - Providing a report of findings and recommendations to secure my accounts. Ideal skills and experience: - Experience with cybersecurity - Familiarity with LinkedIn security protocols - Strong investigative skills - Ability to provide clear, actionable reports
Hi, I have a domain for which I am using hostgator as a hosting provider, I want to change the hosting to my dedicated server. My domain registrar updated the SOA to my server IP but the domain is not resolving. Need urgent help. Thanks VIdhya Sagar dixit
I need a fully functional Remote Access VPN that my team and I can log into from anywhere without relying on third-party subscription services. Your solution must work on the following: • Devices: Desktop, Mobile, Tablet • Operating systems: Windows, macOS Scope – Spin up and harden the VPN server (any reliable cloud provider or bare-metal host I supply). – Configure a modern, open-source protocol such as WireGuard, IKEv2, or OpenVPN with strong encryption. – Generate client profiles/installers so that connecting is a one-click experience on the platforms listed above. – Provide clear step-by-step deployment and maintenance documentation so I can recreate or scale the setup later. Acceptance Criteria 1. I can import or run the client configura...
I operate two offices and I purchased two UniFi UDM Pro, and I want them linked so that staff can reach internal resources from either location as if they were on the same LAN or to work remotely (VPN access). Nothing is in place yet, so the full security stack must be designed and deployed from scratch. Scope of work • Build and test a site-to-site VPN between the two UDM Pros for seamless remote access. • Create granular firewall rules that allow only the traffic we specify while blocking everything else. • Enable and tune UniFi’s intrusion-detection/prevention features to catch unwanted activity without flooding us with false alarms. • Document every setting—screenshots or exported configs—so I can replicate or restore the setup if needed. ...
I need an experienced field engineer to spend a day on-site installing and bringing online new network hardware. Your main focus will be on routers and switches: rack them, stack them, power them up, run the patch cables exactly as shown in the diagrams I will share, then attach a console lead so my remote team can verify access. While you are there, please handle light break/fix tasks for the end-user area—simple checks on desktops, laptops, printers, or imaging stations to keep everyone productive during the change window. Nothing in-depth, just the typical cable reseats, peripheral swaps, and basic diagnostics. Deliverables – Routers and switches correctly mounted, powered, patched, and reachable via console from our NOC. – Quick photo log (front and back) of eac...
I'm seeking a contractor with deep expertise in Microsoft Active Directory Certificate Services (ADCS) to help us properly configure and stabilize our internal Certificate Authority. Current State: - Fully configured but unstable. Key Issues: -Enterprise CA configuration and hardening -Certificate template design (Kerberos Authentication, Computer/Wi‑Fi, NPS/RADIUS) -Integration with NPS for EAP‑TLS and Wi‑Fi/VPN authentication -Ensuring domain controllers receive and renew the correct Kerberos Authentication certificates -General PKI best practices and remediation Ideal Skills and Experience: - Extensive experience with ADCS. - Strong troubleshooting skills. - Ability to configure and optimize certificate templates. - Familiarity with Active Directory and related services. Your ...
I have already completed the full implementation of my anomaly-detection model for network traffic and gathered all experimental results; what I still need is a polished, publication-ready research paper that turns this technical work into a clear, compelling narrative. The target length is 15–20 pages, formatted according to the IEEE citation style. Because I have not locked down a specific outline, I’d like you to recommend the ideal academic structure—something along the lines of abstract, introduction, related work, methodology, results, discussion, and conclusion—and then flesh it out after we agree. I will supply you with the code, datasets, graphs, and raw result tables so you can focus on literature integration, critical analysis, and crisp technical writing...
I need a proven Airtel Black SIP configuration running on my Ubuntu machine and handled through Linphone. The goal is a clean, documented initial setup—no trial-and-error learning on my system, please. If you have already registered an Airtel SIP trunk on Linux, you’ll know the exact registrar format, the unusual port mapping Airtel uses, and the little tweaks that keep audio flowing both ways behind NAT. Here’s the workflow I’m expecting: • Install or verify the latest Linphone and any required dependencies on my Ubuntu box. • Register the Airtel Black SIP account, applying the correct proxy, authentication string, and codec priorities. • Prove the setup with at least one inbound and one outbound call (I can join you on a test call). •...
I'd need to create a social network with , I'd need hardening plus ensuring the platform will be deployable and production-ready
My network edge relies on a Sophos XG appliance and a Fortinet FortiGate unit. Both devices are in production, but their current configuration is a mix of legacy rules and quick fixes that now interfere with performance and security. I want a seasoned firewall engineer to step in, examine every setting, correct what is wrong, and design a clean, least-privilege rule base. Scope of work • Configuration – back up the existing setups, remove or refine redundant rules, and align all interfaces, NAT, VPN, IPS and logging options with best-practice guidelines for Sophos SFOS and FortiOS. • Troubleshooting – identify and eliminate the intermittent drops we see on site-to-site VPN and outbound web traffic. Validation must include live traffic tests and log review. &bul...
I operate a cluster of Windows Server 2019 machines and need an experienced set of hands to keep everything running smoothly. Your focus will be three-fold: maintaining the servers themselves, getting our Veeam Backup & Replication environment dialled-in, and stepping in whenever a network hiccup or whitelist request appears. On the Veeam side I already have repositories in place; what’s missing is a clean, reliable backup configuration and the regular monitoring that guarantees every job finishes without warning bells. Restoration testing and documented recovery steps will be part of the routine so we can prove our RPO/RTO targets at any moment. Networking support centres on troubleshooting issues as they arise and processing whitelist updates for partners and applications tha...
I run a Canadian real-estate search engine that must stay lightning-fast for genuine home-hunters while remaining fully crawlable by Google, Bing and other reputable AI/search bots. Right now Cloudflare shows ±100 k daily hits from malicious, spam and scraper bots; that traffic spikes the servers, ruins bounce-rate metrics and occasionally knocks the site offline. I have already: • Placed the site on Cloudflare, • Allowed full, captcha-free access for visitors inside Canada, • Forced most other countries through a captcha, • Experimented with firewall rules, IP and UA blocking. Unfortunately, Google’s crawler activity drops whenever the shield becomes too strict, so I’m looking for an expert who can strike the sweet spot: block malicious...
My web application is ready to go; what’s missing is a clean, reliable deployment on AWS. I want the site running on standard-configured EC2 instances—no special hardware or exotic AMIs—inside a secure VPC. You’ll handle everything from spinning up the instance, installing the required runtime and web server, to pulling my code from GitHub (or a private repo I’ll grant access to) and exposing the app over HTTPS. Please configure security groups with the least-privilege approach, set up environment variables, and make sure logs are easy for me to access later. These AWS serviON: ✔ EC2 (1 instance) ✔ EBS ✔ S3 ✔ IAM ✔ CloudWatch (basic) When the work is done I expect: • A live, reachable HTTPS endpoint for the application • SSH access and ad...
I need an experienced low voltage technician to install a data network in a commercial building. ON SITE in USA The installation will include: - Ethernet Cabling - Network Switches - Patch Panels Ideal skills and experience: - Proficiency in low voltage cabling - Experience with commercial data network setups - Knowledge of networking equipment and installation Please provide relevant experience in your bid.
My QRadar deployment needs a sharper eye on phishing. I want a set of custom Alert and Correlation rules that reliably pick up everything from the first suspicious e-mail event to follow-up user activity that hints the attack is moving forward. Scope • Build correlation logic that ties together indicators such as mail-gateway detections, odd mailbox rules, risky web clicks, and any subsequent authentication anomalies. • Create alert rules that trigger actionable offenses the moment a phishing pattern emerges. The rules must fit neatly into existing QRadar best practices: use building blocks where appropriate, keep AQL searches efficient, and document each rule so another analyst can tune or extend it later. Acceptance A rule set that fires during lab replay of know...
I need a concise, CPTS-style penetration test focused on network infrastructure. You will receive a shortlist of public-facing domains plus several internal subnets that I want examined end-to-end. The engagement should mirror a real-world attack path: reconnaissance, exploitation, limited post-exploitation, and clear documentation of every step. Scope • Targets: the domains I provide and the connected internal network segments. • Methodology: full penetration testing, not just a vulnerability scan. Feel free to mix automated tools (nmap, Nessus, OpenVAS, Metasploit, BloodHound) with manual techniques. • Duration: this is a quick assessment, so I expect focused work rather than an open-ended engagement. Deliverables 1. Executive summary highlighting business impact in ...
My Panasonic Ns500 PBX sits on but cannot “see” the rest of my network. Everything else flows through a FortiGate 60F firewall, a FortiSwitch 424E-Fiber core, and a FortiSwitch 124F-FPOE at the edge. I need someone to shape the network so this Panasonic box can handle VoIP communication smoothly. What I already know • The PBX will run pure SIP. • Dedicated VoIP rules on the FortiGate are required; simple, generic access is not enough. What I need from you • Review the current FortiGate policy set, VLAN layout, and switch port profiles. • Create or adjust firewall rules, NAT, and any SIP ALG or helper settings so that SIP registration, signalling, and RTP streams pass without one-way audio or dropped calls. • Tag or untag the appropriate swi...
looking for an experienced OT / Industrial IIoT freelancer to develop a small on-premise technical demo (PoC) related to an automotive Paint Shop (Pre-Treatment & E-Coat). The goal is to demonstrate a realistic Industry 4.0 data flow, fully on-premise, without modifying PLC control logic, and aligned with industrial cybersecurity best practices.
I need a turnkey deployment of ZoneMinder—or another equally dependable free or low-cost alternative—capable of monitoring dozens of NVRs and cameras distributed across multiple locations. The objective is to have an at-a-glance view confirming that every stream is live, recordings are being written properly, and storage pools remain healthy. Platform selection is flexible; Windows, Linux, or macOS are all acceptable, provided the final environment is stable, secure, and easy to maintain with regular updates. The key requirement is a web-based dashboard that presents real-time device status, allows deep dives into historical performance metrics, and generates fully customizable alerts whenever any parameter moves outside defined thresholds. Instead of integrating with an exte...
I need to obtain hard-to-reach details—specifically the IP address, associated phone number, and any location-related information—linked to one particular Telegram account. Standard OSINT searches have already been exhausted, so I’m explicitly open to advanced, purely technical hacking techniques that dig directly into Telegram traffic or MTProto behaviour. If this is within your skill set, tell me how you would approach the task, which tools or exploits you prefer to leverage, and what minimal input you require from my side (e.g., username, recent message, session file). Deliverables • Verified current or last-seen IP address for the target account • Recovered phone number (or clear statement if technically impossible) • Any additional address or geo...
I need a custom-built screen-sharing application for Windows that feels as seamless as TeamViewer or AnyDesk but remains persistent even if the host user tries to remove or disable it. The service must install itself as a background process, automatically launch at every system start-up, and quietly reconnect without any manual action. Core capabilities I expect • Full remote-control of the host PC, including keyboard and mouse input, with smooth, real-time streaming. • Secure file transfer in both directions. • Single sign-on authentication so my team can log in with our existing identity provider rather than juggling extra passwords. Please focus only on Windows for the first release; 32- and 64-bit compatibility is required. Strong encryption, minimal latency, and...
My iPhones and several smart-home devices have almost certainly been compromised. Unexplained behaviour, network slow-downs and repeated password lockouts suggest an active intrusion that I have not been able to stop remotely. I need an experienced cyber-security professional to visit in person, trace the breach and leave every device—and the Wi-Fi network itself—clean, secured and fully documented. What I expect during the visit • A thorough forensic check of each affected iPhone and the smart-home hub/gear, including router or mesh nodes you judge relevant. • Immediate containment and removal of any malicious profiles, apps, firmware or network configurations you uncover. • Clear advice on whether each device can be salvaged or should be replaced, follow...
My Linux server is ready, Laravel is in place, and I now need gblicense v15 fully installed, configured, and served through an Nginx reverse-proxy. Default gblicense settings are acceptable; the key requirement is that every feature runs smoothly behind the proxy without breaking existing Laravel routes. What you will do • Compile or obtain the correct gblicense v15 binaries, deploy them to the server, and wire them up to the current Laravel stack. • Configure Nginx as the single entry point, including HTTPS termination (certbot is already available) and clean routing so that gblicense runs on its intended port while remaining invisible to the end user. • Optimise basic network security inside the app and proxy layers (a separate firewall is not planned). • Tro...
I need an expert to configure reliable file synchronization between my QNAP NAS and my PC. The goal is to have all selected folders stay perfectly in-sync, whether I update a file on the NAS or on the computer. Scope of work • Enable and configure QNAP’s native tools—Qsync, RTRR, or Rsync—whichever is best for two-way file synchronization. • Create or adjust shared folders, user permissions, and versioning so that sync jobs run securely. • Schedule and test the sync tasks, confirming that adds, edits, and deletes replicate both ways without conflicts. • Provide a short, step-by-step document (or screen-share walkthrough) so I can repeat or modify the setup later. Nice-to-have If you see quick wins for extending the same workflow to mobile devic...
Dispongo de un servidor anfitrión y necesito que quede operativa una máquina virtual con Windows Server 2016. Dentro de esa VM yo instalo un ejecutable que corresponde a una aplicación de oficina. Objetivo – Que el ejecutable se pueda “exportar” de forma limpia (idealmente como MSI o paquete similar) y desplegarse en cualquier PC del dominio. – El usuario final debe iniciarlo mediante un acceso directo, como si fuera un programa local. No se usará Escritorio remoto ni navegador web. – El programa debe poder conectarse a las bases de datos corporativas sin problemas de permisos ni cortafuegos. Alcance de trabajo 1. Crear y configurar la VM en Windows Server 2016 (Hyper-V u otra tecnología disponible en el host). ...
Je souhaite établir une collaboration sur la durée avec un(e) spécialiste capable de renforcer la sécurité de nos réseaux d’entreprise, de nos environnements cloud et de notre parc IoT. Objectifs prioritaires • Mettre en place une protection active contre les intrusions (IDS/IPS, segmentation, règles firewall affinées). • Sécuriser les données en transit et au repos : chiffrement, gestion des clés, politiques de sauvegarde vérifiables. • Structurer la gestion des accès : Zero-Trust, MFA, revues de droits périodiques. Défis actuels – Menaces internes : droits excessifs, shadow IT, comportement à risque. – Attaques externes : phishin...
Saya mencari seorang ahli jaringan yang dapat menyusun proposal komprehensif untuk peningkatan infrastruktur jaringan kami, dengan penekanan khusus pada kecepatan dan kinerja. Lingkup yang saya butuhkan meliputi: • Audit singkat kondisi jaringan saat ini (topologi, perangkat aktif, jalur komunikasi). • Rekomendasi teknis peningkatan – perangkat keras, konfigurasi, dan arsitektur yang diusulkan. • Proyeksi peningkatan throughput serta metrik performa lain yang relevan. • Estimasi biaya perangkat & lisensi beserta timeline implementasi bertahap. • Rencana mitigasi risiko dan strategi rollback bila diperlukan. Proposal harus ditulis jelas, mudah dipahami tim manajemen non-teknis, namun tetap menyertakan detail teknis yang cukup untuk tim TI i...
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Learn how to find and work with a top-rated Google Chrome Developer for your project today!
Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.