Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Angajează Computer Security Consultants
conduct a wireless or mobile security tool demo Demo requirements: - Set up and demo a wireless or mobile device security tool - Demo the WiFi Pineapple - Demo a Bluetooth exploitation - Build an Android pen testing platform (recommend using a spare phone if you choose this option) - Mobile malware Demo using Kali Linux and a throw away mobile device - Other as approved by the instructor Accompany your Demo with an essay: - Team essay will need to describe the steps you took to build it, including time spent. Documentation is very important and in the event that you can’t get it working I can still evaluate the level of effort - You will need to capture a video/screencast of the tool working, with a description of what is happening. - The essay will also need to describe h...
We are developing a consumer device that provides an output signed with an asymetric encryption algorithm, using as little power as possible as the device will be solar-powered. The minimum standard security measures to implement are hardware-based isolation and root of trust, as well as secure boot, bootloader and storage. The asymetric key pair must be shielded from any user short of well-funded state attackers.
I just rented a dedicated server, and installed Microsoft Server 2019. I will be running a game's server on it, and need a specialist to help me make my server secure. Please have expensive knowledge in cybersecurity and microsoft servers. Please also be a native English speaker. Spoke to someone and they told me this isn't a very complicated task for someone who knows what they are doing.
I'm working on a project which I've built using the SEAL library. SEAL library is an open-source library for fully homomorphic schemes. In my project, I'm using a scheme called the CKKS scheme. The main issue that I'm facing is how to take the square root of an encrypted number. Therefore, I decided to use another method; however, the other method requires comparing ciphertexts, which I have no idea how to do. Therefore, I'm looking for someone expert to help me out of this.
My project is about the "Embedding Application Security Requirements within Software Development Lifecycle (SDLC) for in-house software development in Public Transport Entities. I have done my review session and I received comments from the panel committee that need to be fixed for my MIT project. The freelancer must have an experience in security management and academic writing stills.
Need a customization of a framework written in python - cybersecurity. Deadline 31st January
I need to develop a python script that takes an execution file and analyze it with cuckoo sandbox and then print if the file malicious or not ( I need this to be ready within 24 hours)
In this project, I am trying to analyze and mitigate a number of risks, considering ALL the possible risks that can hinder the progress of the proper functioning of a SOC and cause a delay in the most important level 1 decisions in a small scope security operation centers.
I need a Professional technical writer to Proof Security Analysis mathematical Hash function Called "MAP_ABCH" Please read the instructions for the uploaded document
I need some who can bond 2-3 internet connection with mikrotik router. We have 2 100Mbps line and would like to bond both connection to obtain 200Mbps when connecting to the LAN port. You must understand the requirement and have some form of experience with bonding, mikrotik and networking. You will provide a script to upload to complete the bonding interface. Let me know if you have any questions and happy bidding. I am looking to pay no more than $50.00
What's in it for you: Annual bonus scheme where you can earn up to 5%of base salary Holiday starting at 20days plus a personal day rising to 22days after 12months (plus 8Bank holidays) On-site state of the art gym at our Welwyn Campus with discounted “Gympass” membership & free health checks via Nuffield Health Retirement savings plan, save between 4%and 7.5%, Tesco will match your contribution Life Assurance. 5x contractual pay Share Schemes – Join our ‘Buy As You Earn’ & ‘Save As You Earn’ share schemes after 3months service Colleague Clubcard (including a 2ndcard for a family member) after 3months service Colleague Discounts: 10%increasing to 15%after every pay day for a four day period,off most purchases at Tesco 10%off One Stop 10...
I have some IPV4 proxies whose IP address is configured with domain name. And these proxies never expire. I want to convert those proxies from numeric IP address and provide it to the users. And it also has an expiry limit... Needed Consultancy & Development.
We are a local marketing company looking for Google Business verification help. We will pay $150 per business you help us verify. Please reply to us with your email, phone number, and major cross streets so our team can reach out to give you more details on this project. Thank you!
need outlook email connected to snovio with the smtp settings set up this is for campaign outreach need to get my emailed connected asap
There is a lot of things that is going to go inside of this website and app and design that I need developer the software that I am thinking about I don't have a name for it I don't know how to describe it although I know that I can't code or developed the software for it if I'm able to contacts someone near Detroit Michigan area I would love to touch bases what's that person
It's a problem. I found out how they've been getting into some of the things, but others I don't know. This isn't a quick gig. It's several devices and we have to figure out a solution including a hardwired firewall to be installed in the house.