Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.雇佣Computer Security Consultants
Opsify needs to design, build and deploy open source Data Protection Loss (DLP) either OpenDLP or MyDLP for Endpoint monitoring from a host server in the cloud. OPenDLP or MyDLP are both open source and all-in-one data loss prevention software that runs with multi-site configurations on network servers and endpoint computers. We need a Data At Loss (Endpoint DLP) workstations, laptops, mobile pho...
Problem 1. Simulate an authentication process in WEP. You will need to explain your approach to the following questions in plain words (not in programming scripts). Problem 2. Simulate an authentication process based on 802.1x in WPA. You will need to explain your approach to the following questions in plain words (not in programming scripts).
Hello, Hope you are doing well. This is Aarti from the Rexus Group. We have a project in Korea and I would like to know if you can assist us. Please see below for more details and let me know if you can assist. I have attached a more detailed scope of work. The project is for the implementation of an SDWAN solution. This Project is based on 3 phases for each site: 1. Site Assessment with P...
I want someone to search the internet for published papers in computer science for a topic.
I need help with technical problems related to Computer Communications. If you are familiar with these topics, and are able to solve technical problems related to Computer Communications you might be able to help me: Application Layer Transport Layer Network Layer:Data Plane, Control Plane Link Layer and LANs
Hi For some odd reason I cannot connect the drives from my Synology to a freshly installed Windows 10. I have done this lot's of times, even today on another fresh install. But with this PC I get some odd errors like cannot authenticate, although the user and PW definitely are correct. I need help ASAP - now if you are online. Please note that OS is in GERMAN!!!! Take care Erik
1. Go through 4 papers and then use Ban Logic that can reduce a mathematical expression Moreover, the algorithm should reduce computation, memory and process time. To achieve mutual authentication property. To achieve anonymity property. To achieve secure localization property. To reduce computation overhead. To achieve mutual authentication property. To achieve anonymity property. To achieve secu...
I'm trying to build a Crossfire DDoS Simulation using a nsbench application ([登录来查看链接]) that will simulate a scenario of the attack. and will answer few more questions that I have please contact me for more information.
The requirement is to program a standalone single screen cybersecurity heat map. The frontend shall be HTML,CSS, JS. The backend(server side) coding shall be in PHP and database shall be MySQL. The software product shall work in WordPress environment in a SaaS portal. The screen will be added as part of an existing Cybersecurity Risk determination product. *The Developer shall be well versed in...
Need help with problems related to digital logic and computer architecture. Please apply only if you have an understanding of these. More details in the chat. Amount mentioned is only a placeholder. Amount will be mentioned later.
We are Looking for a device or solution which helps to Control the Usage of User over the Local Network. such as this [登录来查看链接] but we need a device which does whole function ... control. Monitor . Report . Block . Block . Based on User Usage . Ip address or Mac Address.
Hello I need an expert in Snort programming for some simulations. Please check and apply in case you can do it.
Hi, I am looking for someone to design Logo and content technical content writing on the below topic; Information Security, IT Governance Risk and Compliance, Digital Forensic, Pen testing, Auditing Industrial Control Systems
hello, I need help from a server malware expert if you have experience in deep cleaning of websites, i will highly appreciate knowledge in Ubuntu, Vesta Cp and Server cleaning will be an added advantage please mind your budget because we have the corona virus pandemic so the economy
Using Bindiff, I have to find vulnerabilities in the given firmware versions.
In my project i want to connect around 40 computers from 3 differend city and make them connect with each other in cisco packet tracer
I am looking for cybersecurity expert with Master level writing skill to help me Master degree assignment
hello i am going to start an ISP soon. and i need to have control remotely to my clients Routers. i am going to use fritzbox 7530 routers and that router support TR069 so i need someone deeply knowledge on this. i think i will make my own TR069 server based on freeacs or something else so if you have done this type of job please apply thanks
Problem Solutions Methodology
Please check the below requirement carefully before you bid this project. Mandatory: Network Security/ Firewall Engineer/ Palo Alto/ Cisco ASA Firewall/Checkpoint, Juniper Firewall/ Routing and Switching - Expert Level experience needed Need someone with Basic Routing/Switching and Network Security Engineer/Firewall Engineer background to complete the task. Experience - 8+ Years Good Experience ...