Is your country on the list?
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.From 108557 reviews, clients rate our Computer Security Consultants 4.87 out of 5 stars.
I am looking for someone expert in this area. Cyber Security - Dynamic Control Flow Tracing - Reverse Engineering Familiar with GHIDRA
We have a few surveillance cameras in diferent places with Internet acces trough a need is to connect them to a 's posibble to connect them with Microtic VPN solution?In some places we have 2-3 cameras,some places with 1 camera.
You should Analyse the intelligence and security in 5G-Oriented Internet of Nano Things. > You should Show a practical work using a simulator/network simulator to prove there is Pros and cons using 5g in internet of nano things world. > Don't need to provide many practical examples using simulator. Just Need 2 practical examples for each pros and cons. >You should use MATHLAB, Simulink as a simulator to prove it. > If you are using any other network simulator, Please inform which simulator you will be using before Doing the project > After completing the practical work using simulator should also provide a 500 words which explain the Summary of work done using simulator (how it works, Pros and cons explained etc ) . (if you cannot provide 500 words just oexplai...
Hi im looking for an Expert ethical hacking capable of intercepting any US/Canadian based sms without physical access to the phone We will be using my phone for the project Only apply of you have the skillset for the job
We are looking for a cool, positive person to work with us, our partners and customers. A person who is not afraid of challenges and technology. Duties will include: - contacting clients (also in English) via email, LinkedIn, Facebook and chat - invoicing existing customers - contacting web portals to post articles - assisting in adding advertisements Requirements: - well spoken and written polish and english - experience in sales (preferably online) - proficient computer skills - availability minimum 4h a day Monday to Friday between 8 am and 5 pm. Welcome: - experience in marketing or recruitment - basic knowledge of SEO
Wanted Project Coordinator in CCTV & Security Systems We are one of the leading CCTV & Security Systems Service Provider/ We are looking for Project Coordinator to Coordinate the Installation teams onsite. Job Responsibility Site survey Providing a quality installation team in the most methodical and efficient manner, including the ability to digest detailed scope of works and working drawings Production of high quality commissioning and handover documentation and as fit drawings Maintaining safe work environment at all times and have a good understanding of Health and Safety i.e. Method, Risk assessments, safe working procedures etc. Training and demonstration of systems to explain the systems working and functionality Maintaining MIS Reports Responding to out of hours serv...
Internet security practices.. To provide training of 25 employees
I need help in a real-life ethical hacking project. Have been tasked to see if a RAT can bypass security measures and breach a server. Have a competent understanding of the operating system environment, programming and coding but need the practical help of implementing etc.
Hello, I need someone with packet tracer or wireshark knowledge, who can help me to understand and read data on network. It's a very short project but please bid if you have knowledge of packet tracer or wireshark. I will explain details in private message. Thanks
VPN issue on Windows server. (Firewall is SonicWall) VPN has been fine but suddenly not working after changing IP address from ISP, but I updated it already The remote connection was not made because the attempted VPN tunnels failed. The VPN server might be unreachable. if this connection is attempting to use an L2TP/IPsec tunnel, the security parameters required for IPsec negotiation might not be configured properly.
Hi, I'm looking for an expert in "Introduction to computer communication networks" for helping me in a project I have. If this project will go well, there are plenty more to come as I run a development agency. I attached 5 short questions to check if you have the relevant knowledge for this mission. Please start your message with - "today was a good day" Thanks
Edge computing is much vulnerable to various types of security attacks. Various approaches for detecting security threats in edge computing have been presented. Machine learning has been proposed by various researchers for attack detection. The schemes which have already been proposed have various phases of data preprocessing, feature extraction, and classification. It is analyzed that machine learning algorithms like SVM, KNN, DT, etc. give low accuracy for vulnerability detection. A novel machine learning algorithm is required which increases accuracy for vulnerability detection in edge computing. Note- [ Need new hybrid ML algorithm, not an existing one with GitHub available code.] The main objective of this project is to secure edge devices using a hybrid machine learning algorithm th...
Features required: -Digital Risk Protection -Brand Protection -Anti Phishing -Attack Surface Visibility -Threat Intelligence -Compliance
I'm Looking for Sales person who can help our start up organization to get clients. We are information security firm perform, Penetration Test, Vulnerability Assessment, Firewall Review, Web Application Testing. Payment terms will be once client onboard, we will pay you 20% of project value.
Looking for a conference paper ( Cryptography/ IoT security/ Network Security/ Federated learning ) ex: 1. A novel Continuous authN in IoT devices , Functional encryption for data privacy etc