The ultimate guide to hiring a web developer in 2021
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Network Security is an important component of IT solutions as it keeps organizations safe from cyber threats. A Network Security Consultant can help ensure a company's network is properly secured. They provide a range of expert services including evaluation of the existing security posture, recommending security solutions, providing project management and software solutions, monitoring and reporting on usage, incident response and forensics. Network Security requires a deep understanding of the underlying systems and processes.
Here's some projects that our expert Network Security Consultants made real:
Network Security is essential for any organization to remain safe from cyber threats online. Whether you need to review your existing Network Security posture, implement secure protection systems or create educational materials for internal staff, an experienced Network Security Consultant on Freelancer.com can help bring your ideas to life. Contact one now on the world's leading freelancing website and get the peace of mind that comes with secure networks.
Từ 25,228 nhận xét, các khách hàng đã đánh giá Network Security Consultants 4.9 trên 5 sao.Network Security is an important component of IT solutions as it keeps organizations safe from cyber threats. A Network Security Consultant can help ensure a company's network is properly secured. They provide a range of expert services including evaluation of the existing security posture, recommending security solutions, providing project management and software solutions, monitoring and reporting on usage, incident response and forensics. Network Security requires a deep understanding of the underlying systems and processes.
Here's some projects that our expert Network Security Consultants made real:
Network Security is essential for any organization to remain safe from cyber threats online. Whether you need to review your existing Network Security posture, implement secure protection systems or create educational materials for internal staff, an experienced Network Security Consultant on Freelancer.com can help bring your ideas to life. Contact one now on the world's leading freelancing website and get the peace of mind that comes with secure networks.
Từ 25,228 nhận xét, các khách hàng đã đánh giá Network Security Consultants 4.9 trên 5 sao.I need a network setup for our condominium management company. We have an administration team and a manager that need to be connected for efficient file sharing. Requirements: - Facilitate file sharing, primarily software and applications - Integrate with our preferred email communication system Ideal Skills and Experience: - Experience in setting up secure and efficient networks for small to medium-sized teams - Familiarity with file-sharing protocols and software - Strong understanding of integrating networks with email systems Please provide a portfolio of similar work and an estimated timeline.
My primary goal is to lock down one Instagram account against hacking attempts. I’ve already enabled basic security features, yet I still receive suspicious login alerts and would like a deeper, professional hardening of the profile. What I’m looking for: • A concise security audit highlighting current vulnerabilities specific to Instagram. • Step-by-step remediation: tightening login credentials, revisiting device authorizations, and configuring advanced two-factor options. • Practical guidance on spotting and blocking future hacking tactics—especially credential-stuffing attacks and session hijacks. • A brief, plain-English checklist I can reference weekly to keep the account secure. Please outline your approach, the tools or methods you typi...
Project Description: I am looking for a Cybersecurity Specialist to perform a comprehensive security audit on a newly developed desktop application. The goal is to evaluate the robustness of the authentication framework and provide a risk assessment report. Scope of Work: Conduct a Vulnerability Assessment on the application's login and validation protocols. Test the integrity of the software's validation logic against unauthorized access. Evaluate the effectiveness of current obfuscation and anti-tamper measures. Provide a detailed report with recommendations for hardening the software and improving data protection. Requirements: Proven experience in Application Security Testing and OWASP standards. Strong background in binary analysis and software protection mechanisms...
Project Overview: I am currently constructing a 4,500 sq. ft. custom home and need a comprehensive Low Voltage Design & Wiring Schedule. I am looking to design a "Rough-In Plan" that I can hand to my electrician/cabling installer. I have a strong preference for the Ubiquiti (UniFi) ecosystem for networking and security. Scope of Work: Home Network (Ethernet/Wi-Fi): Design a robust Ubiquiti UniFi network topology. Determine optimal Wireless Access Point (AP) placement for coverage across three floors + outdoor areas. Plan CAT6a drop locations for TVs, office workstations, and backhaul. Whole House Audio: Design wiring zones for multi-room audio (in-ceiling/in-wall speakers). Designate "Home Run" locations to a central rack/AV closet. Recommend speaker place...
I’ve built a custom web application and it’s almost ready for production. Before the public rollout, I want a rigorous penetration test that will expose any weakness and help tighten every layer of security. The assessment must be hands-on and realistic, covering the full stack rather than a purely theoretical review. Scope My priorities are clear: • Code review – comb through the source for injection points, authentication flaws, insecure dependencies, and logic errors. • Network-level probing – map open ports, misconfigured firewalls, and potential lateral-movement paths. • Server configuration – evaluate patch levels, TLS setup, permissions, and hardening of the underlying OS and web server. Primary Goal The sole purpose is to imp...
I need a capable network engineer who can spend a full working day at my client’s premises acting as our hands-on field resource while my remote team carries out all configuration tasks. Your focus will be purely physical: rack-mounting the servers, switches, and firewalls; dressing and labeling power and Ethernet runs; attaching console and management leads; then powering everything up so we can reach it remotely. Once each device is live you’ll run quick sanity checks—simple pings, basic connectivity, and a printer test—to confirm the build is progressing as planned. Desktops and laptops must join the network without issue, and at least one printer needs to produce a clean test page before you leave. I’ll supply a clear step-by-step build guide and remain ...
Cloud Security Specialist – Immediate Infrastructure Hardening (Short Term) Project Overview Duration: 3 to 5 days Location: Remote Start: Immediate A healthcare technology platform requires a Cloud Security Specialist to implement quick security improvements identified in a recent penetration assessment. This is a focused, short-term assignment aimed at reducing immediate attack surface exposure at the infrastructure layer. Scope of Work All listed tasks must be completed. 1. Server Version Disclosure Prevention Remove server and framework version information from HTTP responses. Responsibilities Configure AWS Application Load Balancer to remove server headers Update CloudFront response headers policy Disable X Powered By headers in Customize error responses to prevent ve...
Cloud Security Specialist – Immediate Infrastructure Hardening (Short Term) Project Overview Duration: 3 to 5 days Location: Remote Start: Immediate A healthcare technology platform requires a Cloud Security Specialist to implement quick security improvements identified in a recent penetration assessment. This is a focused, short-term assignment aimed at reducing immediate attack surface exposure at the infrastructure layer. Scope of Work All listed tasks must be completed. 1. Server Version Disclosure Prevention Remove server and framework version information from HTTP responses. Responsibilities Configure AWS Application Load Balancer to remove server headers Update CloudFront response headers policy Disable X Powered By headers in Customize error responses to prevent ve...
is seeking an experienced web application security specialist to address specific vulnerabilities identified in our recent penetration testing assessment. As a healthcare technology company specializing in innovative oral health monitoring solutions, we prioritize robust security standards and regulatory compliance. This is a focused, short-term engagement to remediate six specific security findings in our web application infrastructure. We need an independent contractor who can take full ownership of implementing these security fixes efficiently and professionally. Scope of Work - Specific Vulnerability Remediations Based on our completed Web Penetration Testing assessment, you will address the following security findings: 1.-n/a 2. Server Version Disclosure Prevention • Task Ty...
is seeking an experienced web application security specialist to address specific vulnerabilities identified in our recent penetration testing assessment. As a healthcare technology company specializing in innovative oral health monitoring solutions, we prioritize robust security standards and regulatory compliance. This is a focused, short-term engagement to remediate six specific security findings in our web application infrastructure. We need an independent contractor who can take full ownership of implementing these security fixes efficiently and professionally. Scope of Work - Specific Vulnerability Remediations Based on our completed Web Penetration Testing assessment, you will address the following security findings: 1.-n/a 2. Server Version Disclosure Prevention • Task Ty...
I’m starting from scratch and want to build a solid foundation in ethical hacking, not the shady stuff. What I need is a structured, online-based learning path that moves me steadily from absolute beginner through the essentials of reconnaissance, vulnerability scanning, exploitation, and post-exploitation—all with a clear focus on legal, responsible practice. Here’s what I’m looking for you to deliver: • A step-by-step syllabus broken into logical modules that I can follow in my own time, with estimated completion times and milestone quizzes. • Curated links to reputable online courses, labs, and CTF platforms (Think TryHackMe, Hack The Box, or equivalent), together with your notes on why each resource is worth my time. • A concise toolkit setu...
I need help tracing harassment issues related to cyberstalking. I suspect my LinkedIn account has been compromised, and I'm receiving harassment on email and other online platforms. Key tasks include: - Investigating unauthorized logins and profile changes on my LinkedIn. - Identifying sources of harassment on email and other platforms. - Providing a report of findings and recommendations to secure my accounts. Ideal skills and experience: - Experience with cybersecurity - Familiarity with LinkedIn security protocols - Strong investigative skills - Ability to provide clear, actionable reports
Je souhaite établir une collaboration sur la durée avec un(e) spécialiste capable de renforcer la sécurité de nos réseaux d’entreprise, de nos environnements cloud et de notre parc IoT. Objectifs prioritaires • Mettre en place une protection active contre les intrusions (IDS/IPS, segmentation, règles firewall affinées). • Sécuriser les données en transit et au repos : chiffrement, gestion des clés, politiques de sauvegarde vérifiables. • Structurer la gestion des accès : Zero-Trust, MFA, revues de droits périodiques. Défis actuels – Menaces internes : droits excessifs, shadow IT, comportement à risque. – Attaques externes : phishin...
Hi, I have a domain for which I am using hostgator as a hosting provider, I want to change the hosting to my dedicated server. My domain registrar updated the SOA to my server IP but the domain is not resolving. Need urgent help. Thanks VIdhya Sagar dixit
I need a fully functional Remote Access VPN that my team and I can log into from anywhere without relying on third-party subscription services. Your solution must work on the following: • Devices: Desktop, Mobile, Tablet • Operating systems: Windows, macOS Scope – Spin up and harden the VPN server (any reliable cloud provider or bare-metal host I supply). – Configure a modern, open-source protocol such as WireGuard, IKEv2, or OpenVPN with strong encryption. – Generate client profiles/installers so that connecting is a one-click experience on the platforms listed above. – Provide clear step-by-step deployment and maintenance documentation so I can recreate or scale the setup later. Acceptance Criteria 1. I can import or run the client configura...
Saya mencari seorang ahli jaringan yang dapat menyusun proposal komprehensif untuk peningkatan infrastruktur jaringan kami, dengan penekanan khusus pada kecepatan dan kinerja. Lingkup yang saya butuhkan meliputi: • Audit singkat kondisi jaringan saat ini (topologi, perangkat aktif, jalur komunikasi). • Rekomendasi teknis peningkatan – perangkat keras, konfigurasi, dan arsitektur yang diusulkan. • Proyeksi peningkatan throughput serta metrik performa lain yang relevan. • Estimasi biaya perangkat & lisensi beserta timeline implementasi bertahap. • Rencana mitigasi risiko dan strategi rollback bila diperlukan. Proposal harus ditulis jelas, mudah dipahami tim manajemen non-teknis, namun tetap menyertakan detail teknis yang cukup untuk tim TI i...
I operate two offices and I purchased two UniFi UDM Pro, and I want them linked so that staff can reach internal resources from either location as if they were on the same LAN or to work remotely (VPN access). Nothing is in place yet, so the full security stack must be designed and deployed from scratch. Scope of work • Build and test a site-to-site VPN between the two UDM Pros for seamless remote access. • Create granular firewall rules that allow only the traffic we specify while blocking everything else. • Enable and tune UniFi’s intrusion-detection/prevention features to catch unwanted activity without flooding us with false alarms. • Document every setting—screenshots or exported configs—so I can replicate or restore the setup if needed. ...
I need an experienced field engineer to spend a day on-site installing and bringing online new network hardware. Your main focus will be on routers and switches: rack them, stack them, power them up, run the patch cables exactly as shown in the diagrams I will share, then attach a console lead so my remote team can verify access. While you are there, please handle light break/fix tasks for the end-user area—simple checks on desktops, laptops, printers, or imaging stations to keep everyone productive during the change window. Nothing in-depth, just the typical cable reseats, peripheral swaps, and basic diagnostics. Deliverables – Routers and switches correctly mounted, powered, patched, and reachable via console from our NOC. – Quick photo log (front and back) of eac...
I'm seeking a contractor with deep expertise in Microsoft Active Directory Certificate Services (ADCS) to help us properly configure and stabilize our internal Certificate Authority. Current State: - Fully configured but unstable. Key Issues: -Enterprise CA configuration and hardening -Certificate template design (Kerberos Authentication, Computer/Wi‑Fi, NPS/RADIUS) -Integration with NPS for EAP‑TLS and Wi‑Fi/VPN authentication -Ensuring domain controllers receive and renew the correct Kerberos Authentication certificates -General PKI best practices and remediation Ideal Skills and Experience: - Extensive experience with ADCS. - Strong troubleshooting skills. - Ability to configure and optimize certificate templates. - Familiarity with Active Directory and related services. Your ...
I have already completed the full implementation of my anomaly-detection model for network traffic and gathered all experimental results; what I still need is a polished, publication-ready research paper that turns this technical work into a clear, compelling narrative. The target length is 15–20 pages, formatted according to the IEEE citation style. Because I have not locked down a specific outline, I’d like you to recommend the ideal academic structure—something along the lines of abstract, introduction, related work, methodology, results, discussion, and conclusion—and then flesh it out after we agree. I will supply you with the code, datasets, graphs, and raw result tables so you can focus on literature integration, critical analysis, and crisp technical writing...
I need a proven Airtel Black SIP configuration running on my Ubuntu machine and handled through Linphone. The goal is a clean, documented initial setup—no trial-and-error learning on my system, please. If you have already registered an Airtel SIP trunk on Linux, you’ll know the exact registrar format, the unusual port mapping Airtel uses, and the little tweaks that keep audio flowing both ways behind NAT. Here’s the workflow I’m expecting: • Install or verify the latest Linphone and any required dependencies on my Ubuntu box. • Register the Airtel Black SIP account, applying the correct proxy, authentication string, and codec priorities. • Prove the setup with at least one inbound and one outbound call (I can join you on a test call). •...
I'd need to create a social network with , I'd need hardening plus ensuring the platform will be deployable and production-ready
My network edge relies on a Sophos XG appliance and a Fortinet FortiGate unit. Both devices are in production, but their current configuration is a mix of legacy rules and quick fixes that now interfere with performance and security. I want a seasoned firewall engineer to step in, examine every setting, correct what is wrong, and design a clean, least-privilege rule base. Scope of work • Configuration – back up the existing setups, remove or refine redundant rules, and align all interfaces, NAT, VPN, IPS and logging options with best-practice guidelines for Sophos SFOS and FortiOS. • Troubleshooting – identify and eliminate the intermittent drops we see on site-to-site VPN and outbound web traffic. Validation must include live traffic tests and log review. &bul...
I operate a cluster of Windows Server 2019 machines and need an experienced set of hands to keep everything running smoothly. Your focus will be three-fold: maintaining the servers themselves, getting our Veeam Backup & Replication environment dialled-in, and stepping in whenever a network hiccup or whitelist request appears. On the Veeam side I already have repositories in place; what’s missing is a clean, reliable backup configuration and the regular monitoring that guarantees every job finishes without warning bells. Restoration testing and documented recovery steps will be part of the routine so we can prove our RPO/RTO targets at any moment. Networking support centres on troubleshooting issues as they arise and processing whitelist updates for partners and applications tha...
Vui lòng Đăng Ký hoặc Đăng Nhập để xem thông tin.
I run a Canadian real-estate search engine that must stay lightning-fast for genuine home-hunters while remaining fully crawlable by Google, Bing and other reputable AI/search bots. Right now Cloudflare shows ±100 k daily hits from malicious, spam and scraper bots; that traffic spikes the servers, ruins bounce-rate metrics and occasionally knocks the site offline. I have already: • Placed the site on Cloudflare, • Allowed full, captcha-free access for visitors inside Canada, • Forced most other countries through a captcha, • Experimented with firewall rules, IP and UA blocking. Unfortunately, Google’s crawler activity drops whenever the shield becomes too strict, so I’m looking for an expert who can strike the sweet spot: block malicious...
My web application is ready to go; what’s missing is a clean, reliable deployment on AWS. I want the site running on standard-configured EC2 instances—no special hardware or exotic AMIs—inside a secure VPC. You’ll handle everything from spinning up the instance, installing the required runtime and web server, to pulling my code from GitHub (or a private repo I’ll grant access to) and exposing the app over HTTPS. Please configure security groups with the least-privilege approach, set up environment variables, and make sure logs are easy for me to access later. These AWS serviON: ✔ EC2 (1 instance) ✔ EBS ✔ S3 ✔ IAM ✔ CloudWatch (basic) When the work is done I expect: • A live, reachable HTTPS endpoint for the application • SSH access and ad...
I need an experienced low voltage technician to install a data network in a commercial building. ON SITE in USA The installation will include: - Ethernet Cabling - Network Switches - Patch Panels Ideal skills and experience: - Proficiency in low voltage cabling - Experience with commercial data network setups - Knowledge of networking equipment and installation Please provide relevant experience in your bid.
My QRadar deployment needs a sharper eye on phishing. I want a set of custom Alert and Correlation rules that reliably pick up everything from the first suspicious e-mail event to follow-up user activity that hints the attack is moving forward. Scope • Build correlation logic that ties together indicators such as mail-gateway detections, odd mailbox rules, risky web clicks, and any subsequent authentication anomalies. • Create alert rules that trigger actionable offenses the moment a phishing pattern emerges. The rules must fit neatly into existing QRadar best practices: use building blocks where appropriate, keep AQL searches efficient, and document each rule so another analyst can tune or extend it later. Acceptance A rule set that fires during lab replay of know...
I need a concise, CPTS-style penetration test focused on network infrastructure. You will receive a shortlist of public-facing domains plus several internal subnets that I want examined end-to-end. The engagement should mirror a real-world attack path: reconnaissance, exploitation, limited post-exploitation, and clear documentation of every step. Scope • Targets: the domains I provide and the connected internal network segments. • Methodology: full penetration testing, not just a vulnerability scan. Feel free to mix automated tools (nmap, Nessus, OpenVAS, Metasploit, BloodHound) with manual techniques. • Duration: this is a quick assessment, so I expect focused work rather than an open-ended engagement. Deliverables 1. Executive summary highlighting business impact in ...
My Panasonic Ns500 PBX sits on but cannot “see” the rest of my network. Everything else flows through a FortiGate 60F firewall, a FortiSwitch 424E-Fiber core, and a FortiSwitch 124F-FPOE at the edge. I need someone to shape the network so this Panasonic box can handle VoIP communication smoothly. What I already know • The PBX will run pure SIP. • Dedicated VoIP rules on the FortiGate are required; simple, generic access is not enough. What I need from you • Review the current FortiGate policy set, VLAN layout, and switch port profiles. • Create or adjust firewall rules, NAT, and any SIP ALG or helper settings so that SIP registration, signalling, and RTP streams pass without one-way audio or dropped calls. • Tag or untag the appropriate swi...
looking for an experienced OT / Industrial IIoT freelancer to develop a small on-premise technical demo (PoC) related to an automotive Paint Shop (Pre-Treatment & E-Coat). The goal is to demonstrate a realistic Industry 4.0 data flow, fully on-premise, without modifying PLC control logic, and aligned with industrial cybersecurity best practices.
我将在美国孟菲斯办公室进行为期两周的端点安全集中部署,需要你全程驻场并以中英双语与当地 IT 团队顺畅沟通。现场环境主要是 Windows 桌面与 Windows Server,而我尤为看重你在 Windows Server 场景中的部署经验。 本次项目聚焦三大产品——ESET、Bitdefender 以及 Dynarose 微隔离。你必须熟练掌握它们的安装、激活、策略下发与故障排查流程,并能同时维护两套独立的管理控制台。 核心工作 • 现场盘点全部桌面、服务器与关键工作站 • 为每台设备完成 ESET 与 Bitdefender 的安装、激活并接入各自控制台 • 在控制台监控实时保护与病毒库更新状态,排除告警 • 部署 Dynarose 微隔离规则,立即验证跨分区访问控制效果 • 执行功能测试,确保自动更新、实时防护与隔离策略均运行正常 • 快速定位并解决任何兼容性或网络连通问题 • 编写简明交接文档(关键配置、恢复方法等),并通过现场演示完成交付 验收标准 1. 所有设备已正常连入 ESET 与 Bitdefender 控制台,无警报 2. Dynarose 规则在关键服务器与工作站上生效,跨分区访问受控 3. 交接文档完整,现场演示通过 申请须知 – 请简要说明你以往在 Windows Server 环境中实施 ESET、Bitdefender、Dynarose 的实际经验 – 提供可赴孟菲斯现场的具体日期 – 英语口语须流利,能够与本地团队无障碍沟通 符合条件且可按期到场的工程师请尽快联系,我会与合适人选进一步确认行程与细节。
我计划在 Billingham, TS23 1LE 的办公室进行为期两周的端点安全集中部署,需要一位经验丰富的网络工程师全程驻场协助完成。主要目标包括为所有 Windows 桌面与 Windows Server 设备安装并配置 ESET、Bitdefender 以及 Dynarose 微隔离方案。 需要中英文交流。 工作内容 • 现场盘点并确认所有桌面、服务器及关键工作站清单 • 为每台设备安装、激活并更新 ESET 与 Bitdefender,并分别接入 ESET 管理控制台和 Bitdefender 管理控制台 • 部署 Dynarose 微隔离策略,确保各业务分区之间的访问控制生效 • 执行功能测试:病毒库更新、实时防护与隔离策略均需通过验证 • 编写简明交接文档,涵盖安装步骤、关键配置与快速恢复方法 • 在两周驻场期间即时处理任何兼容性或网络连通问题 已知前置条件 – 现场目前没有其他防病毒软件,因此安装前无需执行卸载步骤 – 我希望同时使用 ESET 与 Bitdefender 的管理平台来监控各自状态 关键要求 – 精通 Windows 桌面及 Windows Server 环境 – 具备端点防护及微隔离产品实施经验,能够熟练操作 ESET、Bitdefender、Dynarose – 英语沟通流畅,可与本地 IT 团队高效协同 – 能在约定时间段内全程驻场,两周内完成全部交付项 交付验收 设备全部连入两套管理平台,策略无报错;Dynarose 规则在关键服务器及工作站上生效;完成交接文档并通过现场演示。 若你符合以上条件,请简要说明相关项目经验及可到场的日期。
I need a turnkey deployment of ZoneMinder—or another equally dependable free or low-cost alternative—capable of monitoring dozens of NVRs and cameras distributed across multiple locations. The objective is to have an at-a-glance view confirming that every stream is live, recordings are being written properly, and storage pools remain healthy. Platform selection is flexible; Windows, Linux, or macOS are all acceptable, provided the final environment is stable, secure, and easy to maintain with regular updates. The key requirement is a web-based dashboard that presents real-time device status, allows deep dives into historical performance metrics, and generates fully customizable alerts whenever any parameter moves outside defined thresholds. Instead of integrating with an exte...
I need to obtain hard-to-reach details—specifically the IP address, associated phone number, and any location-related information—linked to one particular Telegram account. Standard OSINT searches have already been exhausted, so I’m explicitly open to advanced, purely technical hacking techniques that dig directly into Telegram traffic or MTProto behaviour. If this is within your skill set, tell me how you would approach the task, which tools or exploits you prefer to leverage, and what minimal input you require from my side (e.g., username, recent message, session file). Deliverables • Verified current or last-seen IP address for the target account • Recovered phone number (or clear statement if technically impossible) • Any additional address or geo...
I need a custom-built screen-sharing application for Windows that feels as seamless as TeamViewer or AnyDesk but remains persistent even if the host user tries to remove or disable it. The service must install itself as a background process, automatically launch at every system start-up, and quietly reconnect without any manual action. Core capabilities I expect • Full remote-control of the host PC, including keyboard and mouse input, with smooth, real-time streaming. • Secure file transfer in both directions. • Single sign-on authentication so my team can log in with our existing identity provider rather than juggling extra passwords. Please focus only on Windows for the first release; 32- and 64-bit compatibility is required. Strong encryption, minimal latency, and...
My iPhones and several smart-home devices have almost certainly been compromised. Unexplained behaviour, network slow-downs and repeated password lockouts suggest an active intrusion that I have not been able to stop remotely. I need an experienced cyber-security professional to visit in person, trace the breach and leave every device—and the Wi-Fi network itself—clean, secured and fully documented. What I expect during the visit • A thorough forensic check of each affected iPhone and the smart-home hub/gear, including router or mesh nodes you judge relevant. • Immediate containment and removal of any malicious profiles, apps, firmware or network configurations you uncover. • Clear advice on whether each device can be salvaged or should be replaced, follow...
My Linux server is ready, Laravel is in place, and I now need gblicense v15 fully installed, configured, and served through an Nginx reverse-proxy. Default gblicense settings are acceptable; the key requirement is that every feature runs smoothly behind the proxy without breaking existing Laravel routes. What you will do • Compile or obtain the correct gblicense v15 binaries, deploy them to the server, and wire them up to the current Laravel stack. • Configure Nginx as the single entry point, including HTTPS termination (certbot is already available) and clean routing so that gblicense runs on its intended port while remaining invisible to the end user. • Optimise basic network security inside the app and proxy layers (a separate firewall is not planned). • Tro...
Need experienced Linux System Administrator for server hardening. Tasks include security audit, firewall configuration, SSH hardening, user access control, patch management, and security monitoring setup. Must have experience with Ubuntu/CentOS and tools like Fail2ban, SELinux. Provide documentation of all changes.
I’m completing a networking and security module at school and the current assignment requires a fully-configured Cisco Packet Tracer project. If you’ve tutored or prepared Packet Tracer or such kind of assingment please help me
A recently rebuilt Windows workstation needs a bullet-proof antivirus setup carried out over a remote session. The job begins with selecting an effective AV suite (I am open to your recommendation—Norton, McAfee, Kaspersky, or another best-in-class option) and continues through full installation, optimisation, and hardening. Key protection goals • Online banking: isolate browser sessions, enable real-time phishing & key-logger defences, and verify safe-transaction modules are active. • Confidential files: enforce on-access scanning, tune heuristic settings for maximum detection, and lock down local folders with password-protected vaults or encryption available within the AV. • Google Drive sync: ensure cloud-storage scanning is enabled, block malicious file ...
I need help setting up my newly purchased Bitcoin miner to work with public pool mining and connect to my Bitcoin Core node. Ideal skills and experience: - Experience with Bitcoin mining - Familiarity with public mining - Knowledge of Bitcoin Core setup and configuration - Technical troubleshooting skills
The goal is straightforward: as soon as an ESP device is present—whether connected over Wi-Fi or broadcasting in monitor mode could be spotted in hidden places
My security cameras stopped showing live video and recorded footage on the monitoring app. The wiring and power seem fine, so I’m convinced the problem sits on the software side—likely a mis-configuration or corrupted firmware. I need someone who can jump in quickly, diagnose the software fault, and get every camera streaming and recording again without wiping my existing footage or settings. You should be comfortable with typical NVR/DVR interfaces, remote desktop tools, and updating or rolling back firmware when necessary. Once the feeds are restored, I’d like a short explanation of what went wrong and the steps you took so I can avoid the same outage in future.
I run a production-level Windows server that now needs steady, professional care. The box is already up and live; what I need is someone who can step in and take over the routine work that keeps it healthy and secure. Your core responsibility will be ongoing maintenance—installing patches, checking logs, pruning obsolete services, and making sure performance never drifts. In parallel, I want proactive security updates: closing vulnerabilities quickly, hardening configurations, and documenting every change so there are no surprises later. A typical month might include: • Scheduling and applying Microsoft updates with minimal downtime • Reviewing Event Viewer and other logs for early warning signs • Updating firewall rules or IPS policies when new threats emerge ...
We are currently looking for freelance Network Engineers in your city to support ongoing onsite requirements for our customers and act as the eyes and hands for the remote configuration team. Typical visit • Arrive at the customer location, meet the local contact, and review the work order • Rack, stack, and cable routers, switches, firewalls, or wireless access points exactly as marked on the network diagram. • Power on the gear, provide console access back to our remote engineers, and stay on-site while they push the configs and run their tests. • Perform basic physical troubleshooting if something doesn’t light up as expected and coordinate with the remote team until sign-off. What you need to bring Your own laptop, a console cable, and any basic hand tools y...
I’m upgrading security at a commercial site in the heart of Kochi, Kerala and need a hands-on specialist who can handle the complete CCTV rollout. The priority is to guard every entrance, exit, and the entire parking area with reliable bullet cameras that can stand up to Kerala’s humidity and give me crisp night-time footage. Here’s how I see the job: • Start with a quick site survey so we can agree on the exact camera count and mounting points. • Supply and install weather-proof bullet cameras, run the necessary cabling, and conceal everything neatly. • Set up the DVR/NVR, link it to my existing network, and make sure remote-view access works on both mobile and desktop. • Tweak motion detection, retention settings, and provide a brief hand-ove...
My Server4You VPS has triggered an abuse report and I need a one-time, decisive intervention. The first order of business is malware removal—locating and eradicating any malicious code sitting inside the WordPress installs. While doing so, I also need you to pinpoint which site is behind the current XML-RPC and brute-force login traffic, disable XML-RPC wherever it isn’t explicitly required, and verify no backdoor scripts are left behind. You will receive root (or sudo) SSH access. Once inside, please: • Scan every WordPress instance and the underlying file system, remove malware, and patch obvious vulnerabilities. • Trace the origin of the XML-RPC abuse and stop it without breaking legitimate functionality. • Review cron jobs, tighten file and directory pe...
I’m expanding our field team and need on-site technicians who can rack, cable, and turn up routers, switches, and firewalls across the UAE, Bahrain, Saudi Arabia, most African nations, and a wide stretch of Eastern Europe—including Poland, Hungary, the Czech Republic, Greece, Slovakia, Slovenia, Croatia, Bulgaria, Romania, and Turkey. Most of the gear you’ll see is Cisco—Catalyst, Nexus, Meraki—as well as Aruba, Lanner, and the occasional white-label device. Jobs range from a single cabinet in an office to multi-rack deployments in Tier III data centers or rugged industrial plants. You’ll work with my remote engineering team over Webex or Teams while you handle the physical layer: unboxing, rack & stack, structured cabling, console access, initial i...
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Learn how to find and work with a top-rated Google Chrome Developer for your project today!
Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.