Usalama wa Kompyuta Jobs
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Ajiri Computer Security ConsultantsI bought bullet VPN and it was working perfectly well, however recently I had to change my location, and my VPN does not work on the new network location. I would like to get help to connect to this VPN as it is the only one that suits my purposes.
I want someone to help me to connect to a proxy
I need someone who is good and reliable in the field of computer security
answer easy 5 questions on networks and cybersecurity.
Research writing for soccer prediction project using machine learning and artificial intelligence
Interested candidates will need to implement an IoT honeypot-based real-time IDS. Get in touch for further deatails.
Developing an application in java that can provide an authentication service to IoT clients. The application uses COAP loT protocol, which depends on encrypting the client biometric by a symmetric key (126 CCM) and validating the client in the server side by decrypting the symmetric key. more details in the inbox
Hey, I have a task I need you to complete that will include the following topics. Network Security, Switching Routing, AppSecuirty, Ethernet, wired and wireless connection.
A high scientific paper to be published by high ranked journal in AI applied on security area. - The candidate must be excellent in AI techniques mainly Machine Learning, deep learning and in security - The candidate must contribute in the innovative idea of the paper and in the redaction with english language - No plagiarism No plagiarism
I need someone for podcast ASAP, And He should have his expertise in Tech, Programming and Freelancing. I'll ask some questions and if I feel Satisfied with your answers I'll hire you. In my podcast I want everything to be real and it'll be shoted in one go and nothing will be removed.
I'm looking for someone who know well machine learning/deep learning.
Need to develop a cluster firewall stress test software. Many of the similar source codes are free on the Internet, but none of them is efficient in issuing packages and cannot save test costs! 1. Years of c/c++ development experience, with linux background 2. The minimum requirement for concurrent syn packets under the controlled end Linux gigabit uplink condition is more than 60% 3. Have the ...
encryption algorithm report cyber security
Technical Writer (Computer Science) for Academic Reports (Only experienced writers) Bid only if you have samples ready Long Term Collaboration
i need a person who is good at network security
i need a person who know network security at a basic level
i need a person who is good at network security
Setup access and folders on Sharepoint based on the requirements
I would just like very simple antivirus software that scans for files or broken files. I want it to be visual and have a premium system. This is low budget as there is no need for an AI, I just want a simple software with some simple detection, when scanned.
1. Create a visual information security user awareness model that guarantees safeguarding an organization from employee-related threats. 2. In form of a written report, describe and discuss the components of your user awareness model using appropriate literature.
Hello I am looking for computer science engineer who could help me in CAO tasks.
Hello I am looking for computer science engineer who could help me in CAO tasks.
I have 6 computers in my home. I have a single broadband internet connection along with the router. I need to configure VPN to customize my public IP o fall my 6 computers. For example: I need to choose different state and city in India for each computer open VPN setting If I check my computer's IP/location means it should show different states and cities in India. Please give me the best ...
I need 2000 votes for an online contest within a few hours. Can you please help me!!
I am looking for the developer and algorythm designer. First task is to uncode and re-write the algorytm code + add security. Second task to write the algorythm using parameters provided. Extensive computing and strong image processing / computer vision / Machine Learning background. Strong knowledge of C / C++ programming languages, Matlab, and Linux / Unix operating systems and scripting. ...
Need knowledge of cisco packet tracer and VLAN.
I need someone to solve it having known os security and network security
I am a retired, recently widowed man with a malicious hacker living next door. This individual is trying to destroy my digital life. I need help quickly.
Need a little help with getting back into my insta
Something went wrong with my account I need to access my account
Explanation of Ideas Score Board Juice Shop’s existing Score Board has been rewritten from scratch once when the project moved from AngularJS/Bootstrap to Angular/Material. Since then, new features, filters and information has been added to it over the years. It has grown to a point where it can be confusing for beginners. It also became pretty slow to render over time. After a big facelift...
Need someone who can do networking using vcastle. Budget- $30
1. Cambium Networks / Motorola Canopy 9000SMC Connectorized Subscriber Module 900MHz [ingia ili uone URL] Networks / Motorola Canopy 9000APC Connectorized Access Point 900MHz
Technical Writer (Computer Science) for Academic Reports (Only experienced writers) Send samples in message. Long term collaboration
I want an ethical hacker for security purposes. Hacker need to be certified.
Articles on: 1- Security problems in the IoT. 2- integration of Blockchain with IoT. 3- How can we integrate the blockchain with the Internet of things.
Your manager wants you to implement and execute the following administrative tasks on the networks implemented on the virtual platform. This is to ensure that the same tasks can be carried out when the physical network installation is carried out. You are also expected to carry out some further administrative tasks on the Linux server that is designative for administrative purposes only. To ensure...
I have a cisco 4948E switch in which My BGP is established with my upstream provider. I want to make BGP with my other switch nexus 3064pq and advertise the /26 prefix from the core router.
Prerequisites and Preparation Element 1: For the practical part of this assignment, you will have to build Virtual Machines (VM), an exemplar scenario is clarified below but you can choose a different setup: 1. A Server o You could use a Linux (e.g. CentOS, Ubuntu Server), or a Windows Server o Minimum configuration required â–ª Two services of your own choice (e.g. DHCP, FTP, SMTP, SNMP, Web etc) 2...
Configuration tasks to be done using Packet Tracer: Switch security including port security. Enhanced LAN security with DHCP snooping, dynamic ARP inspection, PortFast, and BPDU guard Static, floating static and default routes in IPv4 and IPv6. Host routes in IPv4 and IPv6.
I need you to write a report for something.