Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Assumi Computer Security Consultants
I need to look back on my search history over a specific period, but have deleted the history, and the activity log from my Google account. I'm hoping there will be another way to recover this search history. I'm also looking to improve the overall security of my laptop as I have concerns that I have been hacked.
Ok for this project you’ve been given several codes that you need to try and decode. You’ll need to research some of the most common encoding schemes used to try and break each of the codes. An experienced security expert can spot most encoding schemes very quickly, the trick is to check the character set used in the encoded message and the length of the encoded message, these will poi...
We need to simulate sinkhole or sybil attack using cooja simulator in RPL. Thus, we need to modify the source code of objective function that handles rank calculation. All this must be done in contiki OS 2.7
Mixed method data analysis quantitative using SPSS (simple statistics) then using MAXQDA for interview coding ) phd level then discussion
Looking for help setting up a Synology Diskstation with SSL and a private domain name, access through my router (the diskstation has an internal static IP) setting up tight security policies and firewall rules, and implementing best practices for data security, virus protection and automated backup.
Location of the Job: NEW YORK (USA) Type of the job: On-Site Duration: 1 to 2 Days Max Hi, We need a Cisco Field Engineer to do a LAN MAINTENANCE IN NEW YORK estimated job is one day. please see attached document for the job description let me know if you have questions.
Hi, I am working on a mini project on the topic, "Security analysis of RPL network protocol in IOT systems". I would like to simulate Blackhole attack against RPL using Contiki cooja simulator and analyse the performance of RPL under blackhole attack (power consumption with and without malicious motes). The requirements are as follows: 1. Setup a simulated environment capable of gat...
There is requirement to identify suspicious users from web server log file. Definition of suspicious users - Suspicious users are the users other than attack users. They are suspicious because they don't have any particular aim to visit a web application. They neither do hacking activities. But they even not normal users. They do other than normal activities without any purpose. For example,...
I am a penetration tester researcher for a corporate firm and I am looking for a well-detailed technical analysis on post-exploitation analysis.
A content writer with relevant IT experience who can provide all necessary data/reference/explanations etc with regards to the IT security topics given. The main topic are security properties, threats, vulnerabilities, CVE etc.
PLEASE APPLY ONLY IF YOU ARE QUALIFIED - THIS JOB IS FOR GENIUS ONLY I want to test the level of security for my website. I need you to hack my own website and check if you can steal my own email database. If you manage to do this, help me find secure the website. The job interview will be done in skype video call only.
I have a windows virtual machine. I want an expert who can do Authentication relay attack on it and document all the steps to do it. This is to be done to check the windows feature "Extended Protection for Authentication". Testing is to be done for IIS and SQL Server 2017.
The idea is to do a digital signature but with Encryption, in this case we can retrieve the text and image ( not just hashing). I already have code in Java that do that and android app but I need to convert it to C#
My computer is being attacked and datas are locked. Looking for someone to help unlock the datas. Below are messages I received when I turned on my computer. ? Your files are encrypted! ? -------------------------------------------------------------------------------- All your important data has been encrypted. To recover data you need decryptor. To get the decryptor you should: Send 1 test image...
We need someone who is good at networking. Need to work from remote. Analyse the network topology of our client and resolve all the issues that is there in their network. Basically there are caching issues in our client's network. Need to view the network topology, scan for any problems and give us the report. Once the report is submitted, based on client approval, need to resolve the issues.
Given a vulnerable program, Model the vulnerability (the length of the source of the data is greater than that of the destination data in the sprinf function) by starting with declaring with buf and error as strings. then leverage Z3 (Z3 theorem prover) to generate concrete inputs of buf to trigger this bug/vulnerability. Please mention your experience with cybersecurity, programming, and vulner...
I need an admin with VERY strong familiarity with both Amazon Web Services and Linux/Linux Security. The admin hired for this project will be tasked with uploading 4 virtual machines to my Amazon Web Services environment. The virtual machines are virtualbox virtual machines, so they will need to be converted to the OVF format, uploaded to S3, then imported as an EC2 instance in my VPC. OpenVPN AS...