Bilgisayar Güvenliği Jobs
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Computer Security Consultants İşe AlınIt's all about Computer networking management (Cyber security) Need experienced people Price is fixed
Computer network management (Cyber security) Need to do this work Price is fixed
Necesito crear un pool de mineria, la moneda esta creada en el algoritmo sha-256
Hi So it’s about computer networking (cyber security) I need well experienced person Please Dm Indian
10+ years in cybersecurity, offering Pentest services, SAST & DAST services!
Need someone who can help me with Cyber Security Project
I need someone to give me advice on navigating the internet. Spammers are welcomed as well
✔️ Email monitoring ✔️ Directory monitoring ✔️ Network monitoring✔️ Security notices ✔️ Vulnerability scans ✔️ 24/7 support
For Amazon Macie - just want my first job - I setup an S3 bucket with a DL name, SSI #, personal name and birthday and none of this information is getting flagged? Any hints ? Will pay quick and leave 5 stars. Please give your best possible for your bid ? Please note there is hope we can mutually complete this task; we can leave each other nice comments and 5 stars for each? Look at feed...
For Amazon Macie - just want my first job - I setup an S3 bucket with a DL name, SSI #, personal name and birthday and none of this information is getting flagged? Any hints ? Will pay quick and leave 5 stars. Please give your best possible for your bid ? Please note there is hope we can mutually complete this task; we can leave each other nice comments and 5 stars for each? Look at feed...
I need someone to help me with a network security lab The Lab Objectives: 1. To see how the PKI works. 2. To use PKI to secure web browsing.
What is Organ Symphony Assistant? Organ Symphony Assistant (OSA) is a collection of audio files which recreate the ensemble section only of musical works composed for the combination of these ensembles plus organ. These works are select ones of my choosing and comprise music from the 18th century through today. The collection is of both well-known and less obscure works. Purpose These a...
I need some network related expert person who has good experience of Linux Environment , Eclipse, OpenFlow Libraries. I have some basic level tasks I need work at Low budget
I need to connect businesses with VPN connection, main reason is to print out documents at different lcoations, i need individual computers to log into vpn and be able to print out, i have multiple brands of routhers i really like IP-SEC
You need to create emulator to emulate a device on windows 10 environment. Freelancers need to have experience in hardware emulation and hardware security. You will have the device that needs to be emulated available in a clean windows 10 installation. More information in messages.
I'm looking for a specialist in communication network who has the ability to help me with some task please see the attached file
Hi, Looking for expert in below skillset Two or more years of hands on experience in a network operations team. Hands on experience with Cisco and Juniper routers, switches, and firewalls. Experience with Servicenow. Good customer service experience and communication skills required. Ability to multi-task. Ability to work independently. NOC experience preferred, with ability to direct and coord...
[URL'yi görüntülemek için giriş yapın] can you help me for this two small projects then contact me.
We are searching for a senior Linux administrator who can train our team to improve our Linux servers' security and improve our security protocols. Also, we are searching for someone who we can hire for Adhoc Linux server maintenance work. The person we are searching for needs to be interested in long term cooperation. Important capabilities: 1. Proven experience in managing Linux server secu...
We are currently engaged in many different areas of research that we cannot disclose. Related technologies and areas include supply chain, blockchain, quantum computing, cryptography, with many more related areas of interest. We are looking for people that can apply their scientifically rigorous minds to different types of problems. Self-starters and self-motivated people preferred.
I want someone can solve questions in computer engineering
Encryption and decryption using : 1) Rail Fence 2) Hill Cipher 3) Columnar & Key Columnar 4) RSA
Encryption and decryption 1) Rail Fence 2) Hill Cipher 3) Columnar & Key Columnar 4) RSA
Hello I need an expert in Digital Forensics and Investigation including expertise in Kali Linux. Please apply if you have the right expertise.
I have 2 questions related to Cryptography and would like to have an expert to help on it. The question is to prove some function not secure.
I need some network related expert person who has good experience of Linux Environment , Eclipse, OpenFlow Libraries. I have some basic level tasks I need work at Low budget
THE BRIEF/INSTRUCTIONS This assessment is worth 50% of the overall module mark and avoid plagiarism. In this assignment you will be given a malware topic. You must create a PowerPoint presentation. Each slide should have a voice over recording explain the content of the slide. You will be assigned a piece of Malware to explain. You have a maximum of 10 content slides and 10 minutes. In the pr...
I need someone good in Technology in computer science / IT
Packet Tracer y Snort. Hay que cumplimentar el archivo adjunto Solo idioma Español
Tenemos promociones de hasta 30% de descuento en cadauna de estas fundas, ¡pregunta por ellas! Contamos con fundas para ¿phone, Samsung, Hawei, Xiaomi, Motorola, Oppo y LG
Hi! I had this PC that I got for my 14th birthday that I used for over 5 years and then passed on to the less fortunate (my siblings lol) who accidentaly wiped it clean and basically started from scratch about 2+ years ago. (This was because the PC had many issues and would randomly turn off, and would take like 5 attempts to turn on - all of these problems disapeared when I replaced the HDD wit...
Details will be shared in chat box directly
Setup remote desktop on our windows pro 10 computers and set the network security options so the code will not be stolen
We need certified ethical hacking person to secure our site.
Below are some example projects. . For each project, we will be applying a real attack, then we will detect it, and we will demonstrate how to mitigate these attacks. First, you will be proposing a team and a proposal paragraph on your project where you will be explaining which environment you are targeting, what kind of attacks you will be applying, how you are planning to detect and also mitig...
Decrypt 4-5 encrypted string which i will share and explain the encryption and decryption process using PHP. NOTE :- Only expertise shall bid.
I need a Cyber Security Expert to help me in my project.
I need a hardware ID spoofer that will change serial numbers, model and manufacture with user friendly instructions. Applications that request hardware data should not receive real data, but those that will be emulated by your application. The real data about the hardware of the computer for application should be hidden. I need it to spoof serial numbers, model and Manufacturer: Obigious condit...
Developing an app to block Denial Of Service attacks on a machine
Write a security report on the basis of notes that we have found ourselves that may become a vulnerability if we do not manage everything carefully. The security report must be written in English and should not become a book but a short easy to read security report about our notes. Budget 500
Hello I need an expert in Computer Networking in a few hours. Please reply if you have the required expertise.
For our mobile platform we require one security engineer who can advise us regarding security, quick overview if we are on the right track as an third party reviewing other persons work. Budget is about 250 - 300
It a sort of software that actually monitors kid’s activities on tablets/smart phone/desktops/laptops and restricts access to applications or websites defined and allow to certain. It must include but not limited to the followings: 1- Software that can be installed in android and windows (tablets and laptops, desktop). 2- Should give a full report of what has been done in the device. 3- The ...