Computer Security Jobs and Contests

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site. Hire Computer Security Consultants on Freelancer
Sign up and start earning
Signup to start earning Are you a Computer Security Consultant? You could be earning money working on these jobs!

Browse Jobs on Freelancer

Project/Contest Description Bids/Entries Skills Started Ends Price (AUD)
home security Question? can someone answer some of my questions involving home security and security cams 8 Computer Security, Home Automation, Home Organization, HomeKit Jan 24, 2017 Today6d 21h $32
Write a Technical Report I want essay on Cloud computing. i need 2 pages with APA format and proper reference. 15 Computer Security, Cloud Computing, Technical Writing, Report Writing, Research Writing Jan 24, 2017 Today6d 17h $409
Office Complete CISCO network setup - open to bidding Configure the office network. make the complete setting by enabling / disabling the resource usage to users in the network internet load balancing with Wireless EAP configuration create, modify VLAN structure for the office user access level restriction for usage of internet security of data NAS Dataserver access from the internet create VPN for the office train me to administrate the whole offic... 9 System Admin, Computer Security, Cisco, Windows Server, Network Administration Jan 24, 2017 Today6d 14h $13
Penetration Testing - Black Box Looking for an experienced Security expert or team (Hacker) to conduct external "Risk Assessment" for one of my clients. The goal is to get as much information about her environment, servers, devices and vulnerabilities as if we were a competitor. You will be provided with an external IP Address, Physical address and domain details. Ideally you will also have the capability to conduct... 13 Web Security, Computer Security, Windows Server, Risk Management, Internet Security Jan 24, 2017 Today6d 13h $42
power flow management in full bridge converter design new control ci 5 Web Security, Computer Security, Software Architecture Jan 23, 2017 Jan 23, 20175d 17h $332
Solve issue Computer I am facing the issue of usb not recognized, i can`t solve the problm properly who can help to solve the isseue 27 Website Design, Internet Marketing, SEO, Computer Security, Computer Help Jan 23, 2017 Jan 23, 20175d 17h $136
Writing we need IT related writers... apply if u can provide plagiarism free technical report of masters level.. also mention your rate for 1500 words report 27 Copywriting, Research, Computer Security, Technical Writing, Articles Jan 23, 2017 Jan 23, 20175d 12h $40
ICT Experience - Write about how you have learnt your IT skills I need you to write about ICT experience and where and how you have learnt the knowledge. The companies that you worked at can be made up and the IT experience can be made up. You have to explain how you have learnt the ICT knowledge when writing about the below subjects. You must detail the relationship between the areas of knowledge and your learning from your ICT experience. It needs to be s... 34 Web Security, Computer Security, Technical Writing, Research Writing, Network Administration Jan 22, 2017 Jan 22, 20174d 23h $132
Write Result & Discussion in LSB steganography, steganalysis and Neural network We looking for individual freelancer to write a Result & Discussion chapter with the following conditions: - *) Freelancer should hold a Master in Computer science or related field. *) Experience in writing Acadmic research. *) Not less than 8000 words. *) Experience in LSB steganography, steganalysis and Neural network *) Budget 150$ *) Deadline 4 days. *) Priority to 0 feedback or new ... 45 Research, Computer Security, Technical Writing, Research Writing Jan 22, 2017 Jan 22, 20174d 14h $234
Malware Analysis Need to analyze malware present in an image file and also from a network capture. Will provide files in email. 2 Web Security, Computer Security, Internet Security Jan 22, 2017 Jan 22, 20174d 11h $200
Website penetration test Need an ethical hacker to penetration test my website for me. Website has about 3-4 pages in total, it processes financial transactions. It's a very small, uncomplicated site so i've been told it should only take a couple hours. SUCCESSFUL CANDIDATE MUST HAVE SOME FORM OF REAL LIFE CERTIFICATION. I will require you show me the certification before i hire you. Examples of acceptable c... 2 Web Security, Computer Security Jan 21, 2017 Jan 21, 20173d 21h $325
dedicated server LOOKING FOR CHEAP DEDICATED SERVER FOR MY IPTV SERVICES , THIS SERVER WILL BE USED TO ADD MY PANEL ON IT AND MY CHANNELS , SERVER MUST BE UBUNTU VERSION 14.04.5 , SERVER MUST BE ATLEAST MINIMUM 8 CORES 16GB RAM 1TB DISK SPACE , I ALSO WANT THE ROOT ACCESS INFO FOR MY SERVER ALL INFO THAT COMES WITH IT INCLUDING SSH INFO FOR ME TO USE ON PUTTY , MY PROJECT PRICE I CAN PAY IS ON BUDGET MAXIMUM ... 23 Web Security, Engineering, Computer Security, MySQL, Web Hosting Jan 21, 2017 Jan 21, 20173d 21h $153
Networking Case study Need an expert on Network administration Budget- 35$ 5 System Admin, Linux, Computer Security, Cisco, Network Administration Jan 21, 2017 Jan 21, 20173d 13h $51
Academic Writing I need some one has an expert in Computer science research area. I have a subject is Resilience in cloud system I need three good papers and summery of each paper I need an academic paper from scholar or other academic engines. Also, I need three bad papers and a summery for each paper. at the end I need to choose my favorite paper and why ? 63 Research, Computer Security, Cloud Computing, Research Writing Jan 21, 2017 Jan 21, 20173d 13h $59
Open Jobs Job Title Proposals Messaged Offers/Hires Status Actions (250 lines apprx) This is a good opportunity for someone who wish to get more projects from our company. We are looking forward to get a remote code reviewer. We are going to pay bunch of people here to go through this code and find bugs in the code and report it. We will pay $50 upfront and rest after the work is finished. ts one single .c file with approx. 250 lines of code and comments etc. very basic buffer ... 1 Computer Security Jan 20, 2017 Jan 20, 20173d $66
Create Instructions to Get Network (Internet) for Sumuri Paladin build I am using a Linux build called Paladin. The latest version can be downloaded from Sumuri.com. I run it within a VMWare virtual machine. Since it is in forensics mode when it starts, it cannot connect to the internet. I need detailed instructions for setting it to non-forensics mode so that I can get out to the internet from the Paladin Linux build. 1 Linux, Computer Security Jan 20, 2017 Jan 20, 20172d 20h $233
Create Keygen for a simple .exe program I have a single .exe program that generate an ID and ask for a KEY based in this ID. I need a key generator that receives the ID and return an valid key! 13 C++ Programming, Computer Security, Cryptography, Debugging, x86/x64 Assembler Jan 20, 2017 Jan 20, 20172d 18h $57
Write some Software PSA - RMM software along the likes of [url removed, login to view] I have tons of feature Ideas but need the platform to get started 63 PHP, Computer Security, Software Architecture Jan 20, 2017 Jan 20, 20172d 13h $5724
Design a Website Mockup Project in designing related to computer network. 1 Computer Security, Software Architecture, Web Security Jan 19, 2017 Jan 19, 201712d 8h $13
Pentesting Vulnerability- and Pentesting of a Mediawiki- and Wordpress-Site. Work should be done in Romania. Languages: English or/and German. Final budget depends on the epxerts additional contributions. 20 Web Security, Computer Security, Website Testing Jan 19, 2017 Jan 19, 20171d 17h $1361
Vulnerability assessment report for small business Hey guys, I need to complete a time-critical vulnerability assessment on a small business. I have been provided with network/hardware/software details and have been asked to identify issues and offer remedies for them, in terms that senior management can understand. In-depth IT security knowledge is not required but a big plus, as most of the vulnerabilities can be found using google. Word coun... 10 Computer Security, Technical Writing Jan 19, 2017 Jan 19, 20171d 15h $97
error 502 blog de wordpress Error 502 en un blog de wordpress. Necesito experto que mire el servidor y la FTP y lo solucione. 16 PHP, WordPress, Computer Security, MySQL, Website Management Jan 18, 2017 Jan 18, 20171d 2h $78
Help with my Computer/Laptop/Device -- 5 - Repost - open to bidding This job needs to be done from United states.. Any state in US is fine. Will have to work on given keywords for research task. This needs 5 minutes of your time daily for 30 days. 15 Data Processing, Data Entry, Computer Security, Computer Graphics, Database Administration Jan 18, 2017 Jan 18, 20171d 2h $188
Verfassen eines Technischen Berichts Sheet with 5 Tasks to complete.. 4 Copywriting, Computer Security, Technical Writing, Mathematics, Internet Security Jan 18, 2017 Jan 18, 201722h 44m $49
To take over my Mac - Organise all my files, make space on the MAC I need someone to organise my MAC, by putting all files into organisation. To make space on my Mac, to clean all my applications up. To add applications which can make my mail, my calendar appear to organise better. 5 SQL, Computer Security, Technical Support, Desktop Support, Computer Help Jan 18, 2017 Jan 18, 201718h 26m $40
Writing a DLL (must use unique identifier, un-changeable) Basically, I'm searching for someone to create a DLL for my game, the whole idea of this is to send a unique identifier to limit the user (logging only 2) based on that unique identifier and the data will be sent through packet (already prepared) I did have someone create a DLL before and it was based on getting System Serial Number (GetVolumeInformation) and sadly it was bypassed via [url... 9 Computer Security, Objective C, Cryptography, C++ Programming, Assembly Jan 17, 2017 Jan 17, 20175h 37m $212
Help me buy USB hub that can charge all devices I want to buy a USB hub that can connect to a USB port in a car. Can someone give me the best choice? Portability is very important to me because I travel a lot with my husband. I will use the USB hub to charge multiple devices. I will pay $15 USD immediately after I have tested the USB port. 4 System Admin, Computer Security, Technical Support, Network Administration, Computer Help Jan 17, 2017 Jan 17, 2017Ended $25
lost raw code to my indicators and need the source code to reprogram for Ninja 8 I need the source code from a protected file for Ninja Trader. I have lost the raw code and need to reprogram for Ninja 8 version 5 Computer Security Jan 16, 2017 Jan 16, 2017Ended $789
Unlock Android Phone I need someone to unlock my Android phone. It was working fine until I messed with it and it list signal. I need to unlock it again. 14 Mobile Phone, Android, Computer Security, Telecommunications Engineering Jan 16, 2017 Jan 16, 2017Ended $41
Filter website using Macaddress I have a website in a dedicated server, need to allow access only to a list of macaddress. Server administrator will add / edit / delete the list. Need you to do the initial configuration 4 Web Security, Computer Security, Internet Security Jan 16, 2017 Jan 16, 2017Ended $59
Identify and Remove Visbot Malware from Magento Store PLEASE NOTE: Ony bid if you are Magento specialist with experience removing malware and updating to latest version, See attachments before bidding My Magento website has been infected by Visbot Malware . Detect and remove the malicious code, install patches and upgrades to ensure maximum security. 29 Computer Security, Magento, Internet Security, OpenSSL Jan 16, 2017 Jan 16, 2017Ended $168
Windows application development using C/C++ and Windows Filtering Platform(WFP). Hi, I need to develop a Windows application using C/C++ and Windows Filtering Platform(WFP). This is like a firewall, with facility to monitor ports and ip blocking. 12 C Programming, Windows Desktop, Computer Security, C++ Programming, Windows API Jan 16, 2017 Jan 16, 2017Ended $238
Computer Security Hello...I have work related to Computer Security. Please, check shared link for more details.... [url removed, login to view] I need work to be done in 10 days (approx).... PLEASE, STATE PRICE FOR 1 OR 2 OR ALL 3 PROBLEMS IN YOUR BID. Regards 8 C Programming, Web Security, Computer Security, Software Architecture, Internet Security Jan 16, 2017 Jan 16, 2017Ended $227
Make captive portal work on DD WRT even when hotspot has no active We are using DD WRT firmware on D-Link AC 3200. The router is use for creating a offline hotspot. The users connect to the hotspot to browse a website hosted locally on server connected to the hotspot directly. We have setup dnsmasq on the router to redirect the website url ([url removed, login to view]) to the ip address of the server. We want to configure captive portal on the router such... 1 Wireless, Computer Security, Technical Support, Computer Help Jan 16, 2017 Jan 16, 2017Ended $164
Non Clear Net (TOR) I am looking for someone who has experience on the non clear net to source me items. This person must be very good on remaining anonymous , can securely browse the non clear web, be very familiar with bitcoins and also have good stealth shipping options. Deep internet sourcing of products. Please chat to me on freelancer if you would like the opportunity to take this job. 2 Web Security, Product Sourcing, Computer Security, Supplier Sourcing, Logistics & Shipping Jan 15, 2017 Jan 15, 2017Ended $187
ETHICAL HACKER NEEDED SUPER EXPERT ETHICAL HACKER NEEDED TONS OF EXPERIENCE. CAN DO ALMOST ANYTHING. 14 Web Security, Computer Security, Internet Security Jan 15, 2017 Jan 15, 2017Ended $1553
Write some Software -- 2 this is my first project contain C programming and App developent 19 C Programming, Computer Security, Windows 8, Internet Research, App Developer Jan 15, 2017 Jan 15, 2017Ended $86
Update LR in LSB steganography We looking for individual freelancer to update Literature Review chapter with the following conditions: - *) Freelancer should hold a Master in Computer science or related field. *) Experience in writing Literature Review *) Experience in LSB steganography, steganalysis and Neural network *) Priority to 0 feedback or new registration 49 Research, Computer Security, Technical Writing, Research Writing Jan 15, 2017 Jan 15, 2017Ended $194
Write some Software this is my first project contain C programming and App developent 24 C Programming, Computer Security, Windows 8, Internet Research, App Developer Jan 15, 2017 Jan 15, 2017Ended $90
LSB steganography, steganalysis and Neural network Looking for indiviual expert freelancer in academic writing with the following skills: - *) Freelancer should hold a Master in Computer science or related field. *) Experience in Matlab *) Experience in writing Literature Review *) Experience in LSB steganography, steganalysis and Neural network *) Priority to 0 feedback or new registration This task will update available Literature Revi... 14 Research, Matlab and Mathematica, Computer Security, Research Writing Jan 15, 2017 Jan 15, 2017Ended $121
Build a bootable USB security toolkit (Similar to Kali Linux) – Build documentation Establish Problem Statement, Goals, Objectives, Scope. - Develop Requirements & High-level Design. - Detailed Design, Data Flows, Process Flows, Controls, Solution feature. - Begin development (Document, Match-up requirements, goal, and objectives) - Build presentation, final report, and assemble project documentation. 6 System Admin, Computer Security, Technical Writing Jan 14, 2017 Jan 14, 2017Ended $360
encrypt xml files to original and repair encrypt xml files to original and repair 2 Computer Security Jan 14, 2017 Jan 14, 2017Ended $32
Translate Something to Swedish contact me if you know Swedish 26 Research, Computer Security, Technical Writing, Report Writing Jan 14, 2017 Jan 14, 2017Ended $466
Help Setting up Pulse Secure Hi, We have Secure Pulse system. We are facing problem in setting up multiple machines login. Basically One login credentials should work on multiple machines simultaneously. The person should have proper internet connection and should be available on skype to guide us through screen share on how it can be done. It is hardly 5 mins job for a person who knows the work properly. We are just star... 2 Web Security, Computer Security, Software Architecture Jan 13, 2017 Jan 13, 2017Ended $223
Defense Program from Malware 2 Using a C++ and C codes, transport this technology to Delphi Embedded Create a complete function that protect EXE against Inject Dll attacks. The programmer must to have dominate Windows API. Have a very good knowledge about Types of Malware Attacks, like DLL Inject. The final source need to be stand alone, no DLLs or another resources, the EXE needs to protect yourself. For payment, its r... 0 Delphi, Computer Security, Windows API Jan 13, 2017 Jan 13, 2017Ended -
Write some Software Hi, We need a WHMCS addon to manage and sell squid proxies + setup guide for squid proxy on server with multiple subnets This must be very user friendly and fully automated. Experience in this field is a must! here the requirements for WHMCS Module: - Addon should work with latest version WHMCS - organized source code with comments. User control panel: * A menu in the user WHM... 16 PHP, Javascript, Web Security, Computer Security, Software Architecture Jan 12, 2017 Jan 12, 2017Ended $940
Help me buy USB hub that can charge all devices I want to buy a USB hub that can connect to a USB port in a car. Can someone give me the best choice? Portability is very important to me because I travel a lot with my husband. I will use the USB hub to charge multiple devices. I will pay $15 USD immediately after I have tested the USB port. 13 System Admin, Computer Security, Technical Support, Network Administration, Computer Help Jan 12, 2017 Jan 12, 2017Ended $24
sql server general support for ongoing MS SQL Server, Server administration, SSL certificates 0 Computer Security, Windows Server, VMware, Network Administration, Microsoft SQL Server Jan 12, 2017 Jan 12, 2017Ended -
Write 1000 word article about computer processing -- 2 Write 1000 word article about computer processing. There are 5 points which I will give you when I speak to you, 55 Windows Desktop, Computer Security, Research Writing, Computer Help Jan 11, 2017 Jan 11, 2017Ended $90
I need help with a research about ICT Management Hello, I need someone to help me with a research (IT & Management fields ). you should be experienced in: writing a research ICT Management Information Technology, Networking, Cloud and/or Security this project is going to be on for a few months please contact me for more information 35 Research, Computer Security, Cloud Computing, Research Writing, Network Administration Jan 11, 2017 Jan 11, 2017Ended $469
Write some Software Electronics to show the device characteristics of a diode Professor Victor Lang A simple diode conducts electricity in one direction and not in the opposite, reverse, direction. It does have a tiny reverse current that can become large if the reverse bias exceeds a 'breakdown voltage'. The forward current increases exponentially with bias until it saturates. This behavior can be... 25 PHP, Engineering, Computer Security, Software Architecture, C++ Programming Jan 11, 2017 Jan 11, 2017Ended $1629
Implement Vigenere Cipher (computer security and cryptograph) Implement the Encryption and Decryption algorithms for the Vigenere Cipher in Python or C or Java. Your program should take as an input the (key,plaintext) from the terminal or from a file. It should output the decrypted text. Run your program for different plaintext and key length. Your code should include necessary information for the reader to understand the code. 15 PHP, Computer Security, Software Architecture, Cryptography Jan 10, 2017 Jan 10, 2017Ended $41
Write 1000 word article about computer processing Write 1000 word article about computer processing. There are 5 points which I will give you when I speak to you, 21 Windows Desktop, Computer Security, Research Writing, Computer Help Jan 10, 2017 Jan 10, 2017Ended $42
Write 1000 word article about computer processing Write 1000 word article about computer processing. There are 5 points which I will give you when I speak to you, 36 Windows Desktop, Computer Security, Research Writing, Computer Help Jan 10, 2017 Jan 10, 2017Ended $36
build a website DESCRIPTION: the website is made by 3 pages: 1. home: home has to give an overview about every activity of the office, it is varied in layout and contents and has a contact form 2. services: services has 4 sections: energy audit, architecture, urban planning and research 3. blog: blog has 2 search engines: by tags and categories. All posts (from every section) can be sh... 88 WordPress, Computer Security, Technical Support, Web Hosting, Computer Help Jan 10, 2017 Jan 10, 2017Ended $246
install a VPN in a server & 7 POS - 10/01/2017 05:45 EST install a VPN in a server, and in 7 POS 20 Engineering, Computer Security, Windows Server, Network Administration, Storage Area Networks Jan 10, 2017 Jan 10, 2017Ended $493
IT & Cloud Computing Services I need someone to help me design and set up the IT infrastructure of my company (Azure Active Directory for user management, install virtual server etc., setup WatchGuard firewall) 20 Computer Security, Active Directory, Azure, Web Hosting, Network Administration Jan 10, 2017 Jan 10, 2017Ended $507
Deep Internet Sourcing I am looking for someone who has experience on the non clear net to source me items. This person must be very good on remaining anonymous , can securely browse the non clear web and also have good stealth shipping options. Deep internet sourcing of products. Please chat to me on freelancer if you would like the opportunity to take this job. 13 Web Security, Product Sourcing, Computer Security, Internet Security, Packing & Shipping Jan 9, 2017 Jan 9, 2017Ended $822
Write some Software 2 Build a threat aggregation and management system and include the following steps: 1- Build documentation Establish Problem Statement, Goals, Objectives, Scope. 2- Develop Requirements & High-level Design . 3- Detailed Design, Data Flows, Process Flows, Controls, Solution feature. 4- Begin development (Document, Match-up requirements, goal, and objectives) 5- Build presentation, final repo... 10 Python, Web Security, Computer Security, Software Architecture, Internet Security Jan 9, 2017 Jan 9, 2017Ended $249
Write an android security application with a dissertation report This is a vulnerability scanner application project the scanners need to be linked to CVE data based to check all vulnerabilities on an android phone. This project has has two big steps. First is port scanning event to find open ports on the network by TCP connect scan which you will need a 3 way handshake by socket. There are different methods of doing this process but this is what I prefer... 59 Mobile Phone, Android, Computer Security, C++ Programming, Mobile App Testing Jan 9, 2017 Jan 9, 2017Ended $1398
Setup an OpenVpn on an ASUS RT-AC53U Router for a Windows 7 client Need help getting OPENVPN on an ASUS router working with a Windows 7 client. I've tried it but keep getting an error when I try to connect and I'm not sure how to resolve it. I've enabled the OPENVPN Server from the Router VPN menu, added users, exported the config file. I've installed the OPENVPN client and used the exported config file. Here is the part of the log file ... 3 Computer Security Jan 9, 2017 Jan 9, 2017Ended $178
PT.MBS SEJAHTERA HELP COMPUTER ERROR 4 Computer Security Jan 9, 2017 Jan 9, 2017Ended $423
Recover data from servers that are affected by .dharma ransom Hello, please only apply if you have expierence in this field, i am affected with .dharma ransomewere and am not getting the keys from hackers, 8 Web Security, Computer Security, Data Mining, Internet Security Jan 9, 2017 Jan 9, 2017Ended $68
Help me Computer I want to install pro show producer to my computer anyone has the soft Please be come to chat with me for more details 17 Internet Marketing, SEO, Computer Security, Software Architecture, Computer Help Jan 8, 2017 Jan 8, 2017Ended $219
Java, Web Security, Computer Security, Software Architecture, RESTful Jan 8, 2017 Jan 8, 2017Ended
ethical hacker need to test company email and computer security systems 18 Web Security, Computer Security Jan 8, 2017 Jan 8, 2017Ended $1378
Web Application Pentesting I have a demo web application that I need help pen-testing, if you know what OWASP is, message me. 17 Web Security, Computer Security, MySQL Jan 8, 2017 Jan 8, 2017Ended $119
Artificial Intelligence snake 10 Computer Security, Palm, Machine Learning, Robotics, Artificial Intelligence Jan 8, 2017 Jan 8, 2017Ended $652
RESEARCH SENTINEL SECURITY SERVICES: A BRANCH OF CISA.... SIS: AN ADVANCED CYBER PROGRAM AND SECURITY SERVICE: THAT PROVIDES HIGH QUALITY impenetrable: CYBER SECURITY APPLICATIONS: AS WELL AS HIGHLY ADVANCED CAMERA THAT PROVIDE: impenetrable surveillance AND TOTAL COVERAGE.... Both from SPACE AND ON THE GROUND.... As well as secure alarm systems: laser guarded vaults.... digital lock encoding.... using advanced crystallography technology.... light beam p... 16 Web Security, Research, Computer Security, Scientific Research Jan 8, 2017 Jan 8, 2017Ended $267
RESEARCH MATRIX EVOLUTION CODER Research a decoder that: breaks: 2048 digit code in less than 1 second.... Also on the flip side: allows to encrypt a [url removed, login to view] digit password.... with randomized variables.... Allow it to be able to be downloaded and applied to any computer or network, server: including secure... also a software for encoding personal files, securing entire hard drives and individual as well as ... 7 Research, Computer Security, Codeigniter, Cryptography, LiveCode Jan 8, 2017 Jan 8, 2017Ended $277
Otros I need a person with computer skills, and be handled well in instagram, and computer security matters. The job would be to close several instagram accounts. The method you use does not matter. 5 Social Networking, Computer Security Jan 8, 2017 Jan 8, 2017Ended $51
RESEARCH URBAN CO-ORDINATED PREMPTIVE INTER-POLE ANTI TERROR UNIT Make a proposal for a unified intelligence system: that utilizes facial recognition in airports and ports of travel... as well as a universal information system... that provides intelligence to law enforcement globally... also maybe mention a universal pay system: that can be utilized by intelligence operatives while abroad... crypto-currency.... 19 Research, Computer Security, Technical Writing, Internet Security, Artificial Intelligence Jan 8, 2017 Jan 8, 2017Ended $5007
I need you to write an academic article. -- 2 I need you to write detailed information which include literature review about utilizing cryptosystem with biometric traits to secure communication channels. 51 Computer Security, Scientific Research, Technical Writing, Biotechnology, Research Writing Jan 8, 2017 Jan 8, 2017Ended $1193
Diffie-Hellman, cryptographic hash functions on computer security cryptography It is tempting to try to develop a variation on Diffie-Hellman that could be used as a digital signature. Here is one that is simpler than DSA and that does not require a secret random number in addition to the private key. Public elements: q prime number a a < q and a is a primitive root of q Private key: X X < q Public key: Y = a X mod q To sign a message M, compute h = H(M), the ... 11 Engineering, Computer Security, Technical Writing, Research Writing, Cryptography Jan 7, 2017 Jan 7, 2017Ended $74
searching computer security and cryptography well knowledge person for checking my finished project. i am working on one project. I ALMOST finish MY PROJECT. i just need somebody who is very good at about computer security and cryptography. i need help and last control.. 8 PHP, Computer Security, Software Architecture, Cryptography Jan 7, 2017 Jan 7, 2017Ended $36
Build additional Client(s) for Raspberry Pi OpenVPN Have running Raspberry Pi VPN with one client ([url removed, login to view]). Need instruction on building additional Client files. 3 Computer Security, Network Administration Jan 7, 2017 Jan 7, 2017Ended $37
I need you to develop some software for me. I would like this software to be developed -- 5 I need you to develop some software for me. I would like this software to be developed . I prefer this work to be done on Matlab , it will have three systems. Two of them will be dependent and the third is combination of the first two. I need this software to be written or coded neatly . Please contact me for further information. 38 Python, Matlab and Mathematica, Computer Security, Electrical Engineering, Software Development Jan 7, 2017 Jan 7, 2017Ended $1511
build a website myfreecams looking make myfreecams better. need help myfreecams with web design changes and trying to bring it back up to BBB [url removed, login to view] what i understand they are outdated and have no [url removed, login to view] supervisor,ect. 5 Windows Desktop, Computer Security, Microsoft, Website Management, Computer Help Jan 6, 2017 Jan 6, 2017Ended $62515
Write some Software if((someone with IDA-PRO) AND (RE skills) ): print "contact me" 5 Computer Security Jan 6, 2017 Jan 6, 2017Ended $36
Fix .dll error on VPS I am having a issue where one of my custom programs randomly started crashing due to a [url removed, login to view] error (on my VPS) - I can not figure what is causing it and how to fix it. This should be a simple fix for anyone who has knowledge with Windows. 13 Windows Desktop, Web Security, Computer Security, Windows Server, VPS Jan 6, 2017 Jan 6, 2017Ended $82
Security IT Sys Administrator We are looking for an IT with minimun 7 years of experience on Debian, CENTOS, Fedora Windows Systems. The System Engineer must be confident and fully able to conduct $ Servers migrations $ Servers configurations $ Penetration testings $ System Upgrades Please DO NOT candidate to this posistion 33 System Admin, Linux, Computer Security, Amazon Web Services, Windows Server Jan 6, 2017 Jan 6, 2017Ended $28
Maltego Machine Functions I use a custom version of LovelyHorse and would need someone to help me adding the following functions: 1) When an un-bookmark URL entity reach more than 2 inbound link: - Bookmark the entity to avoid processing it again after - Grab the origin tweet ID (parent) - Call a web url and pass the entity as param Ex: [url removed, login to view] 2) Extract all Author for a URL entity - After ... 3 Script Install, Computer Security, Data Mining, Internet Security Jan 5, 2017 Jan 5, 2017Ended $154
Project for rozeny2k Hi rozeny2k, I noticed your profile and would like to offer you my project. We can discuss any details over chat. 5 Computer Security, Technical Writing, Cisco, Research Writing, , Network Administration Jan 5, 2017 Jan 5, 2017Ended $342
Disc Image Forensics Looking for computer forensics specialist to analyse a bit-by-bit image to recover data and write a short report in good English using the template provided. THIS IS A PRACTICE ASSIGNMENT. You must be use and be familiar with the following tools: - Autopsy - Foremost - DCFLDD - Brute force cracking Please see the document for details. 13 Linux, Computer Security, UNIX Jan 5, 2017 Jan 5, 2017Ended $266
A cryptographer with good knowledge on computer security is needed now As described above, i need someone with knowlegge on this. Further details to be provided on chat 9 Engineering, Computer Security, Software Architecture, Cryptography Jan 5, 2017 Jan 5, 2017Ended $33
A cryptographer with good knowledge on computer security is needed -- 2 As described above, i need someone with knowlegge on this. Further details to be provided on chat 3 Engineering, Computer Security, Software Architecture, Cryptography Jan 5, 2017 Jan 5, 2017Ended $49
A cryptographer with good knowledge on computer security is needed As described above, i need someone with knowlegge on this. Further details to be provided on chat 4 Engineering, Computer Security, Software Architecture, Cryptography Jan 5, 2017 Jan 5, 2017Ended $472
Update and check out my lap top My laptop shows java not up to date , and it runs slow , I would to have it checked out to see if there are other things wrong with it , like using team viewer 19 Computer Security, Troubleshooting, Technical Support, Computer Help Jan 5, 2017 Jan 5, 2017Ended $33
AUTHENTICATION & COMPUTER SECURITY Please look at the attached files thoroughly , you will need to pick 5 questions and write an in-depth answer with a minimum of have a page and a maximum of a full page. 6 Computer Security, Cryptography, Word Processing Jan 5, 2017 Jan 5, 2017Ended $73
Information Systems & Security Paper ZXY Corporation has relocated to a new building that was wired and set up for a local area network (LAN). The company implemented a client/server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up. You have been hired to secure ZXY’... 5 Computer Security, Research Writing Jan 5, 2017 Jan 5, 2017Ended $87
Table based implementation of AES (reference openssl) The Advanced Encryption Standart (AES) was published by the National Insitute of Standarts and Tech- nology (NIST) in 2001. AES is a symmetric block cipher that is intended to replace DES (Data Encryption Standart) as the approved standart for a wide range of applications. AES operates on (8-bit) bytes and uses arithmetic in the finite field GF(28), with the irreducible poly- nomial m(x) = x8 + x... 4 PHP, Computer Security, Software Architecture, Cryptography Jan 5, 2017 Jan 5, 2017Ended $161
Help Need for Computer My computer image does not show properly as well as font is totaly chnaged i don`t know what happned who can help me to solve the issue 21 Internet Marketing, SEO, Computer Security, Computer Help Jan 5, 2017 Jan 5, 2017Ended $444
web security solutions I need who expert at this issue of WEB Security, writing and specific solutions about : Keywords : IP traceback SQL Injection attack malicious software be a virus cyber security Netflix Unix system SetUID Decrypt Caesar encryption biometric authentication Intrusion Detection System Dorothy Denning's XSS attack microblog more details will be provided if you need ... 26 Web Security, Computer Security, Technical Writing, Research Writing, Internet Security Jan 5, 2017 Jan 5, 2017Ended $182
SPF, DKIM , DMARC SPF, DKIM , DMARC IN OUR DNS 6 Web Security, Computer Security, Windows Server, Network Administration, Internet Security Jan 5, 2017 Jan 5, 2017Ended $100
SGX (Software Guard Extensions) - CPU Protected Enclave - Write some code to protect an app I have a VB app that obtains data from an externally connected device via USB. It might also be a device that is built into the PC. Once that data is obtained, lets call it a Password, it is used by the App for various functions. What I would like to know is, can the data be placed into the "Protected Enclave" and used by the App so that no other application, including Malware/Vi... 7 Visual Basic, Computer Security, C++ Programming, x86/x64 Assembler, VB.NET Jan 5, 2017 Jan 5, 2017Ended $321
table based implementation of AES (reference openssl)COMPUTER SECURITY AND CRYPTOGRAPHY The Advanced Encryption Standart (AES) was published by the National Insitute of Standarts and Tech- nology (NIST) in 2001. AES is a symmetric block cipher that is intended to replace DES (Data Encryption Standart) as the approved standart for a wide range of applications. AES operates on (8-bit) bytes and uses arithmetic in the finite field GF(28), with the irreducible poly- nomial m(x) = x8 + x... 5 PHP, Computer Security, Software Architecture, Cryptography Jan 4, 2017 Jan 4, 2017Ended $36
IPhone ICloud Hacker I need an iPhone app. I already have a design for it, I just need it to be built. 6 Mobile Phone, iPhone, Computer Security, Database Programming Jan 4, 2017 Jan 4, 2017Ended $353
Server code security I need some one to update a working project/server i have, its done to te best of my skills now i need a pro who can come in and really beef it up update code add to it make it better. i have a basic setup . 25 PHP, Computer Security, C++ Programming, Network Administration, Microsoft SQL Server Jan 4, 2017 Jan 4, 2017Ended $813
Advanced burp suite application configuration Configure the (burp suite application) in personal server as proxy 5 Computer Security, Network Administration, Internet Security Jan 3, 2017 Jan 3, 2017Ended $223
Secure our Business Enviroment Install Antivirus for Apple MACs Install Antivirus for MAC and remove Viruses or threats on the Computers We are small company from Paraguay. We recently adquired some RAMSOMWARE who encrypted our server. And we are now getting aware about Computer security. We need to install the best Antivirus Solution on six iMAC Desktop and laptops. They have various versions of MAC OS. Some are YOSEMITE, Maverick, some are EL ... 9 Web Security, Computer Security, Mac OS Jan 3, 2017 Jan 3, 2017Ended $212
Showing 1 to 100 of 223 entries
« 1 2 3 »