The ultimate guide to hiring a web developer in 2021
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
De 105,197 opiniones, los clientes califican nuestro Computer Security Consultants 4.9 de un total de 5 estrellas.Computer Security is a critical and demanding field that involves the protection of data, networks, software and other information-related assets. It uses a number of tools and practices to stop malicious attacks while avoiding compromising the usability or availability of the resources needed by your organization. A Computer Security Consultant can provide customizable advice to tailor your organization’s security infrastructure. They can audit your existing security systems to identify potential weakness, offer suggestions on how to best protect against attacks, and develop an overall strategy for protecting digital resources. Furthermore, they will help create security policies for staff and make sure data is secure both in storage and when it’s transmitted between different systems.
Here's some projects that our expert Computer Security Consultant made real:
Our experts have a proven track record of using Computer Security best practices to make sure businesses always stay ahead of any possible threat. From protecting against malicious actors to crafting secure disaster recovery plans, they bring a wealth of knowledge they can plug into existing security infrastructure to strengthen defences. With their help businesses stay on top of new vulnerabilities while running efficiently – without compromising the mission.
With the help of an expert Computer Security Consultant, businesses are able to stay one step ahead of potential threats such as cybercrime or theft. If you're ready to take the next step in proactively protecting your IT infrastructure and want a tailored solution that fits your needs – post a project today on Freelancer.com and hire an experienced Computer Security Consultant to guarantee you’re always safe online!
De 105,197 opiniones, los clientes califican nuestro Computer Security Consultants 4.9 de un total de 5 estrellas.Hello, I need an expert in AnyLogic. I have a business and want to develop it. Specialization: Computer Systems and Information Security.
We need onsite engineer for one day work. The scope will be Rack and Stack of Cisco devices So, the scope of work will include: • Installation of network devices (routers, switches, firewalls, wireless access points), including racking, stacking, powering on, patching cables per network diagrams, and enabling console access for remote engineers. • Basic troubleshooting and support for desktops, laptops, printers, imaging, and other end-user hardware
Windows Security & Credential Protection Specialist (Freelance – Authorized Testing Only)** #### **Project Overview** We are seeking a highly skilled and ethically grounded security professional to assist in **authorized security assessments** related to Windows authentication mechanisms and credential storage. The goal is to **evaluate, demonstrate, or harden** systems against known credential extraction techniques—strictly within a controlled, legal, and pre-approved environment. This engagement is **not for unauthorized access** but for **defensive research, red team validation, or forensic capability development** under explicit written consent. --- #### **Key Responsibilities** - Perform authorized memory and process analysis on Windows systems to assess credenti...
Our small office in Edmonton has been struggling with intermittent connectivity on a few workstations. The ISP link and router appear fine, so we suspect a local issue—possibly the cabling runs, the docking stations, or another piece of hardware we have not yet identified. I need someone who can come on-site, isolate the fault, and restore a rock-solid connection the same day if possible. You should arrive ready to test cabling (Cat-5e/Cat-6), swap or re-terminate ends, check docking-station throughput, and verify switch ports with your own tools (Fluke tester, multimeter, laptop, etc.). Once the root cause is found, I’ll need you to implement a fix or advise on any replacement parts and install them on the spot if feasible. Deliverables • Stable, consistently working ...
I have an existing AWS environment that now needs an impartial health check focused on two fronts: security/compliance and performance/scalability. I’m looking for a specialist who can probe the stack with real stress-level traffic, then dig into the configuration details to confirm that data encryption, access management, and all relevant industry standards are met. Here’s what I expect from you: • Design and execute stress testing that reflects a banking-style workload, pushing our current limits and revealing hidden performance or scaling bottlenecks. • Review IAM policies, KMS usage, network segmentation, and logging (CloudTrail, Config, GuardDuty) to verify strong access controls and encrypted data flows. • Map the findings against PCI-DSS, ISO 27001, ...
I need a hands-on network engineer who can spend a single day at our client’s site completing a clean install and initial turn-up of the new infrastructure. Detailed network diagrams are already prepared, so you will be able to follow clear port-by-port instructions. Your primary focus will be racking, stacking, powering on, and patching all specified devices—namely the routers, switches, and wireless access points—exactly as shown in the diagrams. Once each unit is in place, please enable console access so our remote engineers can jump in for final configuration. During any gaps in the schedule, the client may ask for light break-fix help on user equipment such as desktops, laptops, or printers. Nothing complex here—just straightforward troubleshooting to keep th...
My private server farm runs entirely on Windows Server 2019/2022 and I want a single, reliable point of contact to keep it both secure and resilient. Day-to-day, you will be hardening the network with advanced threat-detection practices—think real-time log analysis, strict firewall policy reviews, prompt patching, and well-documented incident response plans. All data protection flows through Veeam. I rely on daily image-level backups, off-site replication, and periodic restore tests, so you’ll need to stay on top of job success reports, storage consumption, and any failure remediation without waiting for me to ask. Support is part of the arrangement: when an issue or change request lands in the ticket queue, I expect timely follow-through and clear communication until closure...
We are seeking a Network Engineer (freelancer) to provide onsite support to our client for a one-day activity. Scope of work will include: • Installation of network devices (routers, switches, firewalls, wireless access points), including racking, stacking, powering on, patching cables per network diagrams, and enabling console access for remote engineers. • Basic troubleshooting and support for desktops, laptops, printers, imaging, and other end-user hardware
I'm looking for someone to set up a new Windows laptop and provide training on Microsoft Office 365. Requirements: - Install and configure Windows and Office 365 - Ensure laptop is secure and functional - Provide comprehensive, user-friendly training on Office 365 Ideal Skills: - Experience with Windows OS and Office 365 - Strong teaching and communication skills - Patience and ability to cater to beginners I need someone in person. I can come to you or you to me - I live in Dacula, GA
My home Wi-Fi was recently breached and I can still see unfamiliar devices connecting even after I changed the password. I need an experienced network-security freelancer who can jump in remotely, pinpoint how the unauthorized access is happening, and lock the network down for good. Here’s what I expect: • Run a quick audit of my existing router settings, logs, and connected clients to confirm the intrusion vectors. • Reconfigure the router with stronger protections—WPA3 where available, hidden SSID if practical, MAC filtering, upgraded firewall rules, and a properly segmented guest network. • Verify and, if necessary, update firmware, disable insecure services (WPS, UPnP, weak remote-admin ports), and adjust DNS or VPN settings to shield traffic. •...
I’m setting up a new Survival-only Minecraft world and want it ready to welcome roughly 50-100 players without lag or downtime. Your task is to stand up the server, harden its performance and load in the exact plugins I’ll share once we begin (economy, land-claim, anti-cheat and a few quality-of-life extras). A Paper or other high-performance Spigot fork is preferred, so please configure the JVM flags, view-distance and garbage collection settings that keep the tick rate stable even during peak hours. After installing the plugins, sort out their dependencies, tune every config file, and run stress tests to be sure permissions and features behave as expected. Deliverables • A live, fully configured Survival server running the latest Paper/Spigot build • All r...
I can no longer send mail from my Microsoft 365 personal account—every message bounces back with: “This message couldn't be delivered because the sending email address was not recognized as a valid sender. The most common reason for this error is that the email address is, or was, suspected of sending spam. Contact the organization's email admin for help and give them this error message.” Nothing about my usage looks suspicious, and I have not altered security settings or changed the password recently. Outgoing mail worked fine until this block appeared, so I suspect it is a reputation or authentication issue (possible spam flag, disabled mailbox, or mis-configured SPF / DKIM / DMARC entry). Access will be provided through AnyDesk for a live session on my Win...
My Hostinger VPS was automatically shut down after malware activity was detected. It runs on Linux and already has basic antivirus software in place, yet something slipped through. I have not been able to pinpoint any suspicious files or processes so far, so the machine will need a full forensic sweep before it is brought back online. Here’s what I need, step-by-step: • Power the VPS up safely through hPanel or SSH rescue mode and capture a snapshot for analysis. • Audit every running service, scheduled task, and startup script, identifying and terminating malicious or unnecessary processes. • Locate, isolate, and delete infected files or code injections (web roots, crontabs, tmp folders, hidden binaries, etc.). • Patch vulnerabilities and harden the syst...
We are looking for an experienced Cyber Security & Ethical Hacking Trainer for live online training sessions. The trainer must be able to teach clearly in Malayalam and handle students with basic IT knowledge. Training Mode: Live online sessions (Google Meet / Zoom) Malayalam language (mandatory) Topics Required: Ethical Hacking fundamentals Networking basics Kali Linux Footprinting & Reconnaissance Vulnerability Assessment Web Application Security Basic Penetration Testing Cyber Security concepts & career guidance Trainer Requirements: Strong practical knowledge in Cyber Security / Ethical Hacking Prior teaching or training experience preferred Ability to explain concepts in simple Malayalam Punctual and professional Duration & Payment: Short-term / hour...
I am launching a new cross-platform VPN that has to stand shoulder-to-shoulder with NordVPN, ExpressVPN and the rest of the current market leaders. The finished product will ship as two native clients—one for Google Play, one for the App Store—built on the same secure core. Security is non-negotiable: the tunnel must run AES-256 with WireGuard, enforce a true No-Logs policy and expose a Kill Switch. On performance, I expect consistently high speeds and smart routing logic that automatically selects the fastest exit without user input. From the first launch the experience needs to feel effortless: one-tap connect, a clean, modern UI in line with the guidelines at , and an auto-reconnect that silently restores protection after any drop. To differentiate, I also want native ...
I am launching a new cross-platform VPN that has to stand shoulder-to-shoulder with NordVPN, ExpressVPN and the rest of the current market leaders. The finished product will ship as two native clients—one for Google Play, one for the App Store—built on the same secure core. Security is non-negotiable: the tunnel must run AES-256 with WireGuard, enforce a true No-Logs policy and expose a Kill Switch. On performance, I expect consistently high speeds and smart routing logic that automatically selects the fastest exit without user input. From the first launch the experience needs to feel effortless: one-tap connect, a clean, modern UI in line with the guidelines at , and an auto-reconnect that silently restores protection after any drop. To differentiate, I also want native ...
I’m looking for a seasoned ethical hacker to walk me through a full-scale security consultation. My end goal is to understand where my current defenses fall short and what concrete steps I should take next. Here’s what I need from you: • An initial review session where we discuss my existing environment, assets and risk tolerance. • A structured security assessment—penetration-testing techniques, threat modeling or code review—tailored to my setup. • A clear, prioritized remediation roadmap with short-term quick wins and longer-term strategic fixes. • A follow-up call to make sure I’ve interpreted and implemented your recommendations correctly. I’m open to exploring network, application or database security—whichever you...
I'm seeking an experienced security professional to remove a firmware rootkit from my ASUS Windows computer. Requirements: - Expertise in rootkit detection and removal - Experience with Windows OS and ASUS hardware - Strong background in cybersecurity Ideal Skills: - Advanced knowledge of firmware and hardware security - Familiarity with anti-rootkit tools and methods - Problem-solving skills and attention to detail Please provide a detailed plan and timeline with your bid.
My Plex Media Server is up and running on an Nvidia-powered box, yet 4K and even some 1080p videos stall, buffer, or drop quality when I watch on my Smart TV. On mobile I sometimes see the same buffering and lag. I’m looking for someone who can jump in remotely, inspect my current Plex settings, check Nvidia GPU hardware-acceleration, and tune the server so streams reach my TV (and phones) smoothly without constant transcodes or network spikes. You’ll likely need to: • Audit current server configuration, libraries, and storage paths. • Verify Nvidia driver versions and ensure hardware transcoding is enabled correctly in Plex. • Adjust streaming and remote-access parameters for both LAN and external viewing. • Identify network bottlenecks (router, Wi...
I’m part of the Simplifi HR and Payroll team and need an extra pair of skilled hands to keep our recruitment funnel running smoothly. Day to day, you’ll jump on short screening calls with applicants, record concise notes in our cloud-based ATS, and make sure every offer letter, I-9, and compliance form is uploaded and verified before onboarding moves forward. You’ll receive a full software stack—ATS, HRIS, secure e-signature platform—and walk-through videos that explain our exact workflow, so there’s no guesswork. What I value most is clear communication, respect for confidentiality, and the ability to keep digital records tidy and up to date. Deliverables I measure: • Completed screening interviews with notes logged the same day • Onboa...
Project Overview Designed and implemented an intelligent DDoS detection and mitigation framework for Software-Defined Networking (SDN) based Vehicular Ad-hoc Networks (VANETs) to ensure secure, reliable, and low-latency vehicle-to-infrastructure (V2I) communication. The system leverages SDN’s centralized control to dynamically monitor network traffic and mitigate DDoS attacks in real time, ensuring uninterrupted safety-critical vehicular services. Key Innovations: SDN-Based Centralized Security Control OpenFlow-enabled SDN controller Global view of VANET traffic behavior Intelligent DDoS Detection Flow-level traffic analysis Anomaly detection using ML / Deep Learning (LSTM Autoencoder / Hybrid model) Real-Time Mitigation Strategy Malicious vehicle flow isolation Dynamic ru...
My personal Gmail has been compromised and all standard recovery steps I know—namely the recovery-email and phone prompts—have failed. Google’s automated flow keeps looping me back to “unable to verify,” so I’m locked out even though I can still see activity alerts landing on my phone. I’m looking for someone who knows Google’s account-recovery system inside out, can guide me through the right sequences (or submit the correct escalation forms), and help me regain full access without violating Google’s Terms of Service. Ideally you have a track record of restoring accounts after similar unauthorized takeovers and can show me how to harden security once we’re back in. Deliverables • Verified step-by-step plan tailored to my...
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Learn how to find and work with a top-rated Google Chrome Developer for your project today!
Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.