Computer Security Jobs and Contests

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site. Hire Computer Security Consultants on Freelancer
Signup and start earning
Signup to start earning Are you a Computer Security Consultant? You could be earning money working on these jobs!
Project/Contest Description Bids/Entries Skills Started Ends Price (AUD)
Need a accountant for jewellery showroom -- 2 Need a accountant for jewellery showroom,for computers 0 Computer Security Feb 12, 2016 Today6d 22h -
Need a accountant for jewellery showroom Need a accountant for jewellery showroom,for computers 0 Computer Security Feb 12, 2016 Today6d 22h -
Help with my Computer/Laptop/Device System Administrators are responsible for maintaining the computer systems of a company. Server management is a primary responsibility, and a System Administrator would be responsible for installing, maintaining and upgrading servers. They are also responsible for ensuring the servers are backed up, and that the server data is secure from unauthorized access. System administrators will also often ... 1 SQL, Computer Security, Active Directory, Microsoft, Windows Server Feb 12, 2016 Today6d 21h $160
suspicious object detection and writing the coding in c i need a c code for detection of a suspicious object in a room or in a building. it should detect the suspicious object and then it should raise an alarm. i receive image in frames. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depe... 0 PHP, Engineering, Computer Security, Software Architecture, MySQL Feb 11, 2016 Today6d 3h -
Cluster based wireless sensor network security model using a low cost pseudo random number generator Cluster based wireless sensor network security model using a low cost pseudo random number generator 1 .NET, Wireless, Computer Security, Algorithm Feb 11, 2016 Today6d 1h $84
Home based job Need home-based high salaried project 8 Web Security, Computer Security, Blog, Email Handling, Growth Hacking Feb 11, 2016 Today6d $162
pythone programe write a Python program to break passwords. 9 C Programming, Java, Python, Computer Security, Internet Security Feb 11, 2016 Feb 11, 20165d 22h $30
Need to prevent malware and hacks from web hosting account I have a website which is prone to malware and viruses. I recently got all the malware removed, however it's back. I need someone to secure my entire web hosting account to ensure that this problem will never happen again in the future (malware, viruses or hacking). As everytime it happens my entire hosting account gets shut down. I am running 3 main websites with the latest version of... 15 Web Security, Joomla, Computer Security, Web Hosting, Internet Security Feb 11, 2016 Feb 11, 20165d 18h $143
Write some Software I need help with Matlab coding. The idea is basically choosing a secret key (It can be randomally generated) then map this key to ECC(error correction code) like Reed -Solomon Code then the output will be considered as codeword. Then the codeword will be XOR with extraction fingerprint features. Then, the output of previous step (helper data) will be XOR with hash of the authentication. Please... 12 Engineering, Matlab & Mathematica, Computer Security, Software Architecture, Software Development Feb 10, 2016 Feb 10, 20165d 13h $550
data 1 2/10/2016 its an data structure that is missing some functions 3 Computer Security Feb 10, 2016 Feb 10, 20165d 7h $53
Bypass dongle security We have a fully paid/developed app that legitimately belongs to our company. The software house that we used to develop the app is no longer in business. The software runs alongside a usb dongle, and currently expires (as of November 2015). The project would be to bypass this security check completely. You would be given with an installable version of the software. The delivery would be mo... 6 Computer Security, Software Architecture Feb 10, 2016 Feb 10, 20164d 22h $635
Home based job Need home-based high salaried project 18 Web Security, Computer Security, Blog, Email Handling, Growth Hacking Feb 10, 2016 Feb 10, 20164d 19h $317
VPN for multiple locations I would like to setup VPN, preferably router to router setup. So i can share files, printer, and other network resources over multiple locations 33 Computer Security, VoIP, Database Administration, Database Programming, Network Administration Feb 9, 2016 Feb 9, 20163d 20h $181
Write a Technical Report I need an Executive Summary in about 8-10 hours on Research Point of Sales (“POS”) security infrastructure and recent attacks. The links to refer are provided in the doc attached along with the executive summary format. If you read this description then type i_read at the top of your message. Plagiarism check is very important for this. 27 Academic Writing, Articles, Computer Security, Report Writing, Technical Writing Feb 8, 2016 Feb 8, 20163d 12h $73
Literature review and proposal Literature review and proposal. Micro Project ($10-30 USD) 2 Computer Security Feb 8, 2016 Feb 8, 20163d 10h $42
Academic Writing Academic Writing. Very small project ($250-750 USD). i need a project that need to be complete in 14 weeks as of now i need a Literature Review and Proposal by 2/9/2016. and Iteration paper on 2/10/2016 52 Computer Security, Academic Writing Feb 8, 2016 Feb 8, 20163d 9h $460
Build a website for me - 4 I look forward to working with you. 18 Website Design, Web Security, Wordpress, Computer Security, MySQL Feb 8, 2016 Feb 8, 20163d 6h $10
image processing I want to encryption image using colors 23 Matlab & Mathematica, Computer Security, C# Programming, Imaging Feb 8, 2016 Feb 8, 20163d 4h $262
recover my data from formatted SD card I have formatted my sd card now I just want to recover my SD card. many recovery software failed to recover my data. First ensure me if you can do anything.... Solve this issue over TeamViewer ?? 17 Computer Security, Engineering, Software Architecture, Software Testing, Testing / QA Feb 8, 2016 Feb 8, 20163d $61
I need help getting a FB and a gmail password In order to protect myself from my ex (or soon to be ex) ... who has already cost me my job and has threatened worse, I need information and leverage. I need someone to help me be able to read his Facebook personal messages, and either his gmail or his cell phone text messages. (Or both.) As mentioned, I have lost my job due to this man. He will ruin my entire life if I don't stop him. ... 2 Computer Security Feb 8, 2016 Feb 8, 20162d 22h $35
Showing 1 to 20 of 28 entries
« 1 2 »