Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Embaucher des Computer Security Consultants
I need a Java and Security expert to build and improve from a past Java project. Within the space of 2 weeks. - Java Application. - Block Chain Security. - Hashing Algorithm. - Smart Contracts. - Not a live application. - Users can purchase, test, verify tickets. Can place tickets in a basket, save for later, have an email reminder, purchase the tickets collectively. * Original work please, no third party applications. * If you can't complete the work please don't waste time and tell me early. NO TIME WASTERS!
Hi, i have bought WD My cloud 2TB hardware, few years ago. I have a lot of photos in there and now they asked me to upgrade it to newer OS. It is so hard or i´m stupid, but i´m not able to do it. Looking for someone, who can upgrade it for me
what has to be done --introduction --abstract -- literature review -- methodology -- result --conclusion --references
We have virtual server running Windows Server and Exchange Server that has some kind of exploit on it that is allowing spam to be generated from the server. After removing the viruses we could the infringing entity re-installs and resumes spam generation and installs additional viruses. We need help finding and fixing the intrusion and cleaning the server.
1. Rough draft must have all sources listed on works cited and include in-text citations and parenthetical citations. 2. A rough draft is a rough version of your COMPLETE essay and should be, at minimum, 3 pages long. 3. Use this outline for your rough draft.
I have a customer that runs a security operation center which requires employees to be vigilant and always ready to answer security alarms coming in from a centralized software installed on a PC. Often employees do not obey the rules and either sleep, or do other things on the computers while they are supposed to monitor sites and follow security operations in order to prevent theft, injuries and life threatening events. We often have employees work from remote offices and/or homes. We provide them laptops and we would like to have a solution that would allow us to vide the webcam remotely at any time, view/record the desktop and also save keys. This would allow us to monitor the activity and provide access to a supervisor that could monitor multiple employees at once. It is important tha...
For simulation use any software (such as OMNET++, OPNET, NS3) Topic: Security and privacy in information-centric networking: the future internet perspective NOT ALLOW BANGLADESHI, PAKISTANI, INDIAN
I need someone with professional knowledge in Instagram password recovery as its been locked for security reason. Needs to be done by today. The process with the verification through code has already been tried and with no success. please no time wasters. Thank you
For simulation use any software (such as OMNET++, OPNET, NS3) Topic: Security and privacy in information-centric networking: the future internet perspective NOT ALLOW BANGLADESH, PAKISTANI, INDIAN
Select architectures that implement security in aquaponics and hydroponics and discuss security implementation. design a generic intelligent system that implements the security aspect in different levels of the IoT architecture, namely the hardware, the protocols, the cloud, the attacks, etc.
For simulation use any software (such as OMNET++, OPNET, NS3) Topic: Security and privacy in information-centric networking: the future internet perspective NOT ALLOW BANGLADESH, PAKISTAN, INDIA
I need someone to disinfect, protect and advise on all of my personal social media and communication portals. This includes: - Getting me off of the dark web - Removing all spyware, ad trackers, viruses and similar - Installing protective software to prevent hacking and blocking all non-G-rated content - Removing and disinfecting all non-G-rated content, if any, from all of my devices and storage areas > cell phone > facebook > dropbox > Google and other storage areas Must have an impeccible reputation.
For simulation use any software (such as OMNET++, OPNET, NS3) Topic: Security and privacy in information-centric networking: the future internet perspective
We'd like to hire a smart contract developer (Polygon network) to review our contract to ensure there are no glaring security holes in it. Furthermore, we want the security professional to review the NFT minting website to ensure it's connected to the smart contract & the organization's wallet properly. The project will start on 12/5. Please include in your quote how many days the review would take.
I'm looking for a few couple of experts for computer science, information technology, computing department Deadline: 7 days 1. 80 pages 2. Total is 6 chapt-er 3. Plagiarism: less than 18% 4. Progress everyday Project: around
Development of an application that, after recording data on a USB memory, blocks it so that its content cannot be altered, copied or deleted, as well as preventing it from being overwritten or formatted.
I need one more person very skilled in offensive security, with OSCP or HTB Pro player and very experimented in CTF and related competion
I need help to write an article in Information Security (CAPTCHA). English high level (professional and Academic language ), The article should contain:: ¨ Title: ¨ Abstract: (to briefly describe your work and improvement) ¨ Keywords: ¨ Introduction: (importance and possible applications, previous work, your exact achievements, and briefing of the sections flow within the document) ¨ Related Works or Brief Theoretical Background covering linked available methods: (all background as well as presented different techniques, with your criticism on every related work) ¨ Proposal Presentation c...
Para la implementación de la política de Gobierno Digital, se han definido dos componentes y tres habilitadores transversales que definen lineamientos y estándares para el desarrollo de servicios digitales de confianza y calidad, procesos digitales seguros y eficientes, contar con datos e información de calidad para tomar decisiones, promover el la apropiación de la tecnología para empoderar al ciudadano y contar con ciudades y territorios inteligentes.
need a networking expect to setup port forwarding on my router
I have 3 computers to make work faster: 1, need to remove multiple ADMIN, leave just 1/ i have 4, DON'T LET ME REMOVE 2, My PC don't recognize my phone to download pictures 3, Check for any infections: virus, malware, spyware 4, I can't add printer, / when I plug cable from pc to printer, don't connect / ADMIN ISSUE !!! You Need to have 100 reviews on Freelancer, to be able to get answer, thanks
We are now looking for Android o/s-based network management app solutions. 1. 2. 3. 4. 5. 6. 7. I would appreciate it if you could connect a company that has a similar solution to 1.2. Even if it is not the 1.2 solution above, Android o/s-based security, network management, PC management, server management app.
computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are made up of telecommunication network technologies, based on physically wired, optical, and wireless radio-frequency methods that may be arranged in a variety of network topologies. The nodes of a computer network may include personal computers, servers, networking hardware, or other specialised or general-purpose hosts. They are identified by network addresses, and may have hostnames. Hostnames serve as memorable labels for the nodes, rarely changed after initial assignment. Network addresses serve for locating and identifying the nodes by communication pro...
Need detail information about reviewer making fake review for organisation. Cyber Security
I need a Java and Security expert to build and improve from a past Java project. Within the space of 2 weeks. - Java Application. - Block Chain Security. - Hashing Algorithm. - Smart Contracts. - Not a live application. - Users can purchase, test, verify tickets. Can place tickets in a basket, save for later, have an email reminder, purchase the tickets collectively. * Original work please, no third party applications. * If you can't complete the work please don't waste time and tell me early.
We are from an Online Tutoring Company and IT consulting firm We are looking for an expert to assist our client in INFORMATION GOVERNANCE AND CYBERSECURITY
We are now looking for an Android O/S based Network Management APP solution. 1. 2. 3. 4. 5. 6. 7. We would appreciate it if you could link a company that has a solution similar to above. Even if it is not the above solution, please introduce a company that has Android O/S-based security, network management, and server management APP solutions. *We would like to purchase a package similar to the "soho" app. This app only has a network scan function, but we need an app that can perform a more complete network scan and network repair than this. we want your to keep in mind that we want to purchase as a package, not develop. If possible, please provide the corresponding apk file for testing.
It's an exciting time! We've notified hundreds of freelancers about your project and you should start to receive bids from them in just a few moments.