Datorsäkerhet Jobs
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Från 107,106 betyg, betygsätter kunder vår Computer Security Consultants 4.86 av 5 stjärnor.Anlita Computer Security Consultants
Position: SQA Engineer (Automation) Experience: 1+ year of experience with Cypress Requirements: Must be familiar with Web applications Testing. Good If have an experience in Automation Testing Have held lead role in an enterprise level application Experience with continuous integration, delivery, unit testing, static analysis, and automated integration tests. Experience with software and networking security Personal Qualities: Must be a finisher and not just a strong starter. Demonstrated ability to 100% complete projects and not leave lose ends. Must be very thorough and detail oriented. This must have come from learning from previous mistakes and can demonstrate detail examples of mistakes from not being careful. Organized, esp. with documentation and asset controls.
Hi, I'm looking for someone to help me block pornography and certain keyworks etc on my phone and laptop. I would like to block images on social media. Can someone help with this?
I need someone who has experience in programming, website security and hacking for a special project I need a programmer who has experience with payment and money transfer problems And security is cypriani
I want to make a configuration, in my mikrotik router, I want to manage the bandwidth I have, I want the best security rules for my navigation and protection, I want a good configuration of queues as I have many computers connected wireless through an access point of the same brand, I want to establish that my mikrotik router makes me a good connection to my PBX in the cloud ,
I want to find out my wifi password, for testing purpose only.
1. Download a program called Endless Motivation 2.0 and share with me to download 2. Download a 106GB Folders of Rapidshare and share with me to download
Hi, i want a Penetrationtest of my Application. You will get a isolated environment with credentials for all roles. I want a exact Checklist of whats done, which findings you got and how to fix them.
Written in pyhton, we would like the freelancer to create a web based applcation that simulates social engineering attacs. how the social engineering simulation training program will work: User Registration: Users will be required to register for the training program and provide basic information such as their name, email, and job role. Training Modules: The training program will consist of several modules, each covering a different type of social engineering attack. For example, one module might focus on phishing attacks, while another module might focus on pretexting. Each module will include a series of simulated scenarios that users will be required to complete. Scenario Simulation: Each simulated scenario will be designed to closely resemble a real-life social engineering attack, u...
Hello i want to set up a vpn connection that can allow me share my pc internet connection through vpn to my friends in different areas so that they just start the vpn and they are connected to the internet.
Need a full stack network expert。Proficient in Java, C programming language, WEB security, and various skills, I will describe my project in detail with my partners
Hi, I need a label generator web based which works with api to receive information and edit accordingly. The label contains the following: 2x 128 barcodes = (1 containing tracking number) (2nd containing "420"+zipcode) as for maxicode, much about it is written in this article at fig 5 page 14: Apart from barcodes, It contains shipping address, delivery address, shipper's name & phone, receiver's name & phone, service type, tracking, first 3 digit of zipcode+internal routing code Now, This tool will be provided with "Tracking numbers" & shipping/receiver's information along with weight and service type, the tools job is to generate a perfect label with that data and barcodes filled with correct information. I'll be attaching...
Smoke barrier for an assist living
I'll provide reference books only And chapters guidelines You will search the books to choose the content and add newer content to match the guidelines
I'll provide reference books only And chapters guidelines You will search the books to choose the content and add newer content to match the guidelines
HASH/ENCRYPTION: 07VHSAIZ"PS4-U4FDE47KDFT2NE+G8$$' DW#:JZLP need to know which type it is before you bid. Start bid with type of hash it is, only correct one will be entertained a conversation.
Need a vulnerability and pen test for web application with a report
I need an SSL certificate for 80 domains or more but need a freelancer to help me set that up so it is safe for my customers to get to my websites. Let me know cost and time frame to get this done
I have been scammed by a fake e commerce website, and I would like to get in touch with a cyber security person or web developer as I have been collecting some information but on the companies side, I have no knowledge in IT to get answers for the question I made to myself. Please contact me and you will get paid back for your research and time invested in me.
HI, Everybody. I need to analyze my files. So I am looking for IDA Pro expert. If you have rich experience on IDA pro or reverse engineering, don't hesitate to bid. Thanks.
Hello Looking for a capable Information Security Expert to help me recover my tokens. I never received tokens from the project.
HI, Everybody. I need to analyze my files. So I am looking for IDA Pro expert. If you are IDA pro expert, don't hesitate to bid. Thanks.
Face recognition and verification is a rapidly growing field with numerous applications in digital forensics and information security. This thesis presents a study on the development of a face recognition and verification system for these areas. First, we review the state-of-the-art in face recognition and verification techniques, including deep learning-based methods, and discuss their strengths and limitations. Next, we present the design and implementation of our system, including data collection, feature extraction, and performance evaluation. The system utilizes a deep convolutional neural network (DCNN) for feature extraction and a support vector machine (SVM) for classification. Experimental results show that our system outperforms traditional face recognition techniques in terms...
Hello, We would need an app that Automatically Extract Indicators of Compromise (IoCs) from Twitter, defang them and then upload to a mysql database
my company is registered with indeed. find me bug/problems need fixing using i am a bug bounty hunter with me and my company need some help with a bounty. and the more experience with bug hunting and testing the better. The stronger the bugs/problems and the more. The more i will pay. expected deadline: 25 days
Looking for a RTI PROGRAMMER to program a RTI REMOTE
I am looking for a facebook security expert for secure my facebook and website, only professional can apply for this post dont waste time
Hi Freelancers, I need to understand Teams messaging. For this assignment, can someone explain how it is possible for IT to see the activity of Microsoft Teams. I am a laywer and I need to understand my client case. My client is being accused of downloading files via team on phone app. Can this activity be tracked on the backend? How if so? Please write me a compelling argument if this is possible or not. 2-33 words with proof that it can or cannot be traced.
I need someone who knows about Computer Architecture??