Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Kutoka kwa kaguzi 103565, wateja wetu wanakadiria nyota Computer Security Consultants 4.86 kati ya nyota 5.
The application would listen for UDP port and send incoming messages to an upstream server. Server’s replies are returned to corresponding client endpoints. Below are implementation details (many items are for reducing complexity of the task): - Implementation language C++14 or higher - Compiles and runs on Ubuntu or Debian - Synchronous application running in one thread and serving one client at a time * Optionally multi-threaded or event-driven concurrent operation - Console output to cout/cerr - Supports IPv4 and IPv6 for both incoming and outgoing requests - Uses standard socket API, no additional networking libraries - DNS queries with duplicate trans_id can be ignored - Error conditions don't require sending error packet to client - Listen endpoint is hardcoded to - U...
DATA ON PROCESSING POWER IN SERVERS & SMARTPHONES NEEDED: Historical data on the processing power of servers and smart phones (from 1995 to present). There is a few ways that this could be looked at: clock speed, number of transistors, or other studies that have looked at dealing with a task in particular and the speed with which that has increased. Considering GPU or CPU or both. For smart phones, if needs be, it’s OK to focus just on just the iPhone. Here’s an example of the kind of charts we’re looking to put together: Best, Ed
I need a Cyber Security Trainer from 10th Oct 2022 to 17th Oct 2022 at bengaluru. Primary job is to install, configure the OPEN SOURCE tools listed below and handle practical sessions for students where I will handle presentations 1) End point protection - 11th Oct 2) Firewalls, IDS/IPS, Antivirus/Antimalware... , Content filtering etc - 11th Oct 3) IAM/PAM - install, configure, logs 4) VAPT - install , configure, demonstrate , get students to do handson 5) Ethical Hacking - install , configure, demonstrate , get students to do handson 6) SIEM and SOC tools - - install , configure, demonstrate , get students to do handson
You will do an investigation of this apartment cyber issue, and provide me with a Cyber Forensic Report listing your findings. Neighbor is accessing: cable network, WiFi, android, apple devices, streaming accounts, bank account, retail online accounts, etc. The neighbor is constantly changing passwords. The maximum pay is $50 for this small residential neighbor Wifi (cable) project. I'll pay your freelancer fee. I'll provide you with a detailed list of the issues being experienced.
I need someone expert in computer, ( lanchbox) application, that run retro games , I have the application installed and premium license, but the games keep crashing and not working , i need someone to fix and teach me how to fix it Through team viewer
building IDS for IoT networks using supervised machine learning algorithms. software and hardware.
Network Security (Intrusion Detection, DDoS attack detection, Malware Detection, Feature Selection, Cloud Computing and allied topics), AI/Machine/Deep Learning, Data Analytics, Nature Inspired Optimization Techniques
Hi, need assistance with an iasme gold audit by accredited (must be iasme gold accredited assessor). my company is going through an iasme gold audit and as part we audit another company. Although I have completed the audit report I need some guidance on the report from an accredited assessor I've had feedback on the current report from an auditor, so will need someone to rewrite the report and follow the guidance. But its important they have iasme gold experience to understand the requirements.
Recently experienced a cyberattack. Now wanting to make sure the wifi is secure, vulnerabilities are minimized, there is no malicious behavior happening, and ultimately looking for peace of mind so I never have to worry about this again.
Email notification setup Monitor Browser history and keywords searched Monitor removable devices & external drives for file integrity Log when Copy / Paste / Cut are carried out ctrl+c / ctrl+v & ctrl+x Monitor running processes and alert if anything changed
Looking for anyone who can support with basic to advance cybersecurity knowledge. Please let me know anyone who can support on call daily basis based on need. Must have technical expertise on any of the below Firewall Email gateway Antivirus SIEM tools DLP Data Classification Servers Red teaming and Pentesting Cyber Security Consultation FreePBX Firewall Configuration My FreePBX Server is having issues with call deployment due to the firewall and fail2ban. I need someone who has hands on knowledge of configuring it all way to make it work. I am myself ...
We are a growing MSP that is partnered with Fortinet and under contract to support a large scale Fortinet network for a major ISP. This huge core network requires a Fortinet NSE4 or 7 with an NSE5 (FortiManager / FortiAnalyzer) specialty to assist us with both scoping and providing support, configuring the equipment per the client's spec and troubleshooting both the old and the new infrastructure as needed. This network is 100% managed via FortiManager. There will also be other assignments available to support other large Fortinet client networks & projects. Possible Contract to Hire Opportunity for someone looking at Charlotte, NC as a potential place to build a tech career. We have many other network projects and client networks to manage and support to offer as well.