Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Ajiri Computer Security Consultants
I bought bullet VPN and it was working perfectly well, however recently I had to change my location, and my VPN does not work on the new network location. I would like to get help to connect to this VPN as it is the only one that suits my purposes.
answer easy 5 questions on networks and cybersecurity.
Research writing for soccer prediction project using machine learning and artificial intelligence
Developing an application in java that can provide an authentication service to IoT clients. The application uses COAP loT protocol, which depends on encrypting the client biometric by a symmetric key (126 CCM) and validating the client in the server side by decrypting the symmetric key. more details in the inbox
A high scientific paper to be published by high ranked journal in AI applied on security area. - The candidate must be excellent in AI techniques mainly Machine Learning, deep learning and in security - The candidate must contribute in the innovative idea of the paper and in the redaction with english language - No plagiarism No plagiarism
I need someone for podcast ASAP, And He should have his expertise in Tech, Programming and Freelancing. I'll ask some questions and if I feel Satisfied with your answers I'll hire you. In my podcast I want everything to be real and it'll be shoted in one go and nothing will be removed.
Need to develop a cluster firewall stress test software. Many of the similar source codes are free on the Internet, but none of them is efficient in issuing packages and cannot save test costs! 1. Years of c/c++ development experience, with linux background 2. The minimum requirement for concurrent syn packets under the controlled end Linux gigabit uplink condition is more than 60% 3. Have the ...
Technical Writer (Computer Science) for Academic Reports (Only experienced writers) Bid only if you have samples ready Long Term Collaboration
i need a person who know network security at a basic level
I would just like very simple antivirus software that scans for files or broken files. I want it to be visual and have a premium system. This is low budget as there is no need for an AI, I just want a simple software with some simple detection, when scanned.
1. Create a visual information security user awareness model that guarantees safeguarding an organization from employee-related threats. 2. In form of a written report, describe and discuss the components of your user awareness model using appropriate literature.
I have 6 computers in my home. I have a single broadband internet connection along with the router. I need to configure VPN to customize my public IP o fall my 6 computers. For example: I need to choose different state and city in India for each computer open VPN setting If I check my computer's IP/location means it should show different states and cities in India. Please give me the best ...
I am looking for the developer and algorythm designer. First task is to uncode and re-write the algorytm code + add security. Second task to write the algorythm using parameters provided. Extensive computing and strong image processing / computer vision / Machine Learning background. Strong knowledge of C / C++ programming languages, Matlab, and Linux / Unix operating systems and scripting. ...
Explanation of Ideas Score Board Juice Shop’s existing Score Board has been rewritten from scratch once when the project moved from AngularJS/Bootstrap to Angular/Material. Since then, new features, filters and information has been added to it over the years. It has grown to a point where it can be confusing for beginners. It also became pretty slow to render over time. After a big facelift...
1. Cambium Networks / Motorola Canopy 9000SMC Connectorized Subscriber Module 900MHz [ingia ili uone URL] Networks / Motorola Canopy 9000APC Connectorized Access Point 900MHz
Technical Writer (Computer Science) for Academic Reports (Only experienced writers) Send samples in message. Long term collaboration
Your manager wants you to implement and execute the following administrative tasks on the networks implemented on the virtual platform. This is to ensure that the same tasks can be carried out when the physical network installation is carried out. You are also expected to carry out some further administrative tasks on the Linux server that is designative for administrative purposes only. To ensure...
Prerequisites and Preparation Element 1: For the practical part of this assignment, you will have to build Virtual Machines (VM), an exemplar scenario is clarified below but you can choose a different setup: 1. A Server o You could use a Linux (e.g. CentOS, Ubuntu Server), or a Windows Server o Minimum configuration required ▪ Two services of your own choice (e.g. DHCP, FTP, SMTP, SNMP, Web etc) 2...
Configuration tasks to be done using Packet Tracer: Switch security including port security. Enhanced LAN security with DHCP snooping, dynamic ARP inspection, PortFast, and BPDU guard Static, floating static and default routes in IPv4 and IPv6. Host routes in IPv4 and IPv6.