Datorsäkerhet Jobs
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Anlita Computer Security ConsultantsI have an office place with 6 PC and will open another office of 6 PC. I want both of them to be connected in the same LAN. I thought a good plan is to have a managed router, a Firewall and a static IP and a VPN Server. Or you are free to suggest another plan for connecting the two sites. I you want to have the task please comment or write a message of the plan you think about to work. Deadline is very Important !!! Unifi dream machine UDM Ubiquiti Unifi USG fast IP-adress VPN tunnel - Konfigurera VPN
I am looking for someone who is having good knowledge of Machine Learning and can write a paper on "Real-time ML-based security auditing for the cloud." I will share the more details in chat.
We want to implement a fortigate firewall with following feature: 1. HA 2. SSL-VPN 3. VPN 4. URL filtering 5. WiFi controller We will require 1. Detailed design 2. Hearing sheet 3. Configuration best practice 4. Configuration
hey, I need to edit my background "in academic writing" not all sections I am not finishing and I need help to finish on Friday. Just the sections with red highlights, not all I have edited the first and second sub-sections, just from "FHE With noise management". Please take a look at the word doc and if you are interesting send me
We are looking for senior IT Engineers to support in house projects and customer networks. Primary work will be performed remotely. Must have excellent internet service and reliable working computer. We are primarily looking for engineers in North America or able to work with our clients between 4:00am - 6:00pm PST. Must be able to speak and write proficiently in English. If you meet the criteria below and are interested in complex IT projects let me know. We have enough work for 2-4 full time team members. I will need a formal CV/Resume for all applicants before you will be considered. If you send me a generic chat you will not be considered. This posting is for individuals only. We cannot hire other organizations for this position. ===== REQUIREMENTS ===== - Microso...
Hello Do you have expertise in Computer Networking? I need to virtualise a network. If yes, please apply.
An expert is required to setup sonic wall on the laptops so that the laptops could be connected through VPN to a healthcare server in US.
I wanna require an ethical hacker to hack my cctv as i have forget the password
I need help with Network protocols, network security, DNS, IP subnets. i will send more details in the chat.
I need to edit my background I have already written and add information but I still not finished all there are more comments from Dr and adding more information
I have an exam tomorrow the subject is Assurance and privcy sec .
very small thing regarding ZKBioSecurity API
Dears, I need someone who worked as an admin for knowbe4 platform before
Need Freelance trainers on Cyber Security and Ethical Hacking for 3 Days Onsite Training un Chennai
Looking for a group of hackers to help me secure some sites and networks
We are trying to apply the rip & OSPF protocols over the project network, but we encountered errors that we could not solve in the tables and transmissions.
Hello, My business is based around a phone application. Before I launch I need to know more about cyber security. I need to protect my business and the users using the application.
It is represent the famous scholars who have strong trughts
Project will be described in detail once confirmed you can complete it.
Being blackmailed for personal pictures. Would like them deleted please
Using pbc.h library implementing proxy re-encryption scheme
This is regarding a real-time Intrusion Prevention System project using hybrid machine learning, which is based on two-level classification. The approach is from a base paper published by the IEEE, which is attached below. This needs to be of both the code and its live demonstration. Hope you'll accept it with reasonable consideration.
XG SOPPS 550 VPN SUPPORT USERS UNABLE TO CONNECT TO REMOTE VPN 08:22:57 2022 UDPv4 link remote: [AF_INET] Sat May 14 08:22:57 2022 MANAGEMENT: >STATE:1652512977,WAIT,,,,,, Sat May 14 08:23:57 2022 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Sat May 14 08:23:57 2022 TLS Error: TLS handshake failed Sat May 14 08:23:57 2022 SIGUSR1[soft,tls-error] received, process restarting Sat May 14 08:23:57 2022 MANAGEMENT: >STATE:1652513037,RECONNECTING,tls-error,,,,, Sat May 14 08:23:57 2022 Restart pause, 2 second(s) Sat May 14 08:23:59 2022 Socket Buffers: R=[65536->65536] S=[65536->65536] Sat May 14 08:23:59 2022 UDPv4 link local: [undef] Sat May 14 08:23:59 2022 UDPv4 link remote: [AF_INET] Sat May 14 08:23:59 2022 MANAGEMENT: &...
our website has been hacked. We need an developer to analyse and clean up our website and restore the member login page and security. Our website is
I need help with a simple software-based solution. More details will be shared in chat.
I need a DDOS script and a sinkhole for my local server for demonstration
searching for assistance in compiling bash .sh script to easily be launched and executed from the Windows computer material and more detail will be given when we speak
Hi there, we are working with the cloud security company and need a guy who is experienced in this topic and can write blog posts for us. You don't need to be an experienced writer but a good understanding of this field is really crucial.
You're searching for assistance in compiling bash .sh script to easily be launched and executed from the Windows computer material and more detail will be given when we speak
We are looking for ethical hackers who can HELP WITH application We will provide details about the app. Ethical Hacking for the application Ethical Hacking for the application
I need to see if anyone is accessing my email or my PC
I'm looking for someone who knows Wazuh inside and out and is an expert with Wazuh. We are needing someone to adjust the rule sets, alerts, triggers and etc to fit best practices and actually give us a solid XDR/SIEM solution that can be used to monitor and better our cyber security needs. If you are not an expert in Wazuh please do not bid.
Hello there Urgently need small digital forensic project to be developed by 14th may. Please apply ASAP if you can get it done by the deadline. Thanks
Intel Performance Monitoring Units (PMUs)
i have a server infected by loki locker ransomware virus