Is your country on the list?
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Hire Computer Security Consultants
Hi, I need someone who can help me migrate my emails, emails accounts and domain to a new g suite account.
Background A palindrome is a sequence that reads the same forwards and backwards. For example “1234321” is a number palindrome, but “123456” is not. Examples of word palindromes include “wow” and “Hannah”. Phrases are generally considered palindromes when punctuation and spacing is ignored, such as “Madam, I’m Adam”, “A man, a plan, a canal – Panama!” and “Able was I ere I saw Elba.” +++++ Overview: Write an ML program that determines if a string is a palindrome. Specifics: 1. The only predefined ML functions that you are allowed to use are explode, chr, and ord. Otherwise, you need to write your own functions. 2. You may not use ML iterative functions such as for or while. (You may use @, ::, if-the-else and recursive function calls.) 3. You are required to write a function named is_palindrome that takes a string as the argument and returns Boolean true if the string is a palindrome, and false if it is not. The user can include any spacing, capitalization, and punctuation they wish – your program just analyzes whether the alphabetic characters constitute a palindrome. For example, give the function call is_palindrome “A man, a plan, a canal – Panama!” your function should evaluate to true. For the function call is_palindrome “ML is the best language!” your function should evaluate to false. 4. Please see the tips below for suggestions. Style: For full credit, you must follow the programming style requirements for this class: • Include a header comment containing your name, the date, the name of the program, and the purpose of the program. • Comment sections of your code in enough detail for another programmer to understand what you are doing. (Generally, commenting what each separate task is doing is sufficient.) • Comment each function, describing the purpose of the function. This usually means that you will describe each argument of a function, and what the function evaluates to. • There should be no “match non-exhaustive” warnings, except in really special cases where it does not make logical sense to make exhaustive matches (ask me if you are uncertain). A Poly Equal warning is acceptable, but no other warnings are allowed. • In addition, for recursive functions you need to include a comment pointing out which is the base case and which is the recursive case. Tips: 1. At the beginning of your file, it may be useful to define some variables that contain lists and strings. You can then use them for testing your various functions. 2. I recommend that you start out by writing helper functions to perform useful tasks (but these are not required -- you can solve this in a different way if you wish, within the problem constraints): a. my_reverse: reverses a list (without using the built-in ML function reverse). The function call my_reverse [#”a”, #”b”, #”c”] should evaluate to [#”c”, #”b”, #”a”] b. removeNonAlphabetic: given a list of characters, this function returns a list where all non-letter characters have been removed. In other words, it deletes spaces, commas, other punctuation marks, and numbers. The function call removeNonAlphabetic [#”A”, #” “, #”b”, #”!”] should return [#”A”, #”b”]. Note that this is equivalent to the function call removeNonAlphabetic(explode “A b!”). c. changeToLowercase: given a list of characters, this function returns a list where all uppercase letters have been converted to lowercase letters. Hint: The ML functions ord and chr could be useful here, as would the knowledge of the ASCII values for A and a. The function call changeToLowercase [#”a”, #”A”] should return [#”a”, #”a”] d. getLast: given a list, this function returns the last item in the list. A function call getLast [1,2,3,4] should return 4 e. removeLast: given a list, this function returns a list with the last item removed. A function call removeLast [1,2,3,4] should return [1,2,3]
I need to identify limited level of access for each user in HikVision DVR
hello need ethical hackers and programming experts for my ongoing projects. the person should be well versed with all the points of the networking and coding. there will be one small demo anf if you pass that there will be bounty of projects to work on. please not I AM NOT PAYING for the demo project. thank you.
Objectives 1) Providing data communication security through hybrid protocol for multiple WBANs working at same time. This security protocol should consume low energy & also low memory space . 2) Prioritizing data/node based on critical physiological value sensed by sensors..(Data can be classified as critical data & non-critical data & accordingly prioritization should be done). Need to decide at which tier data prioritization should be done. 3) Handling node failures in all the 3 tiers as the WBAN consists of 3 tiers . >> At sensor level/tier 1--Cluster head failure where data aggregation will be done, >> tier-2-Personal server failure >> tier 3-Medical server failure Related to this point also deciding suitable network structure, topology & data routing mechanism ( algorithm) whether it should be ADHOC network or Infrastructure based network along with pros, cons of each & justification for deciding the chosen network structure.
This project is about accessing the desktop or device remotely by using VNC through mobile or another device.
We have game for android platform available on play store...live servers with many players already. We need someone to investigate our security holes. Namely is it possible to receive by our players free in game credits....as it has happened before.
Need help to solve a PGP signature validation issue and fast. our counter partner can not validate our signature. Need someone really understand the PGP framework and in&outs. Need to be good at c++, C# to help build the code.
I'm looking for someone who can build ms office silent doc builder (or one build) or refud exist one take for references CVE-2017 8570, 2017-8759, 2017-11882, 2017-0199 consider that the generated file (Output) should be 100% FUD not UD, and can bypass protection view The doc exploit must be SILENT type (Not Macro). The word document when opened must silently and automatically execute the provided file/URL/script The exploit should work by download and execute method as opposed to embedding the file/URL/script(js,vbs,powershell) within the document The output word document when downloaded from the internet should be able to run with protected view enabled without the victim having to enable editing. N.B: THE PROJECT IS FOR PENTEST PURPOSE FOR A SPECIFIC PENTEST AGREEMENT NO ILLEGAL USAGE IS INVOLVED
I need programming and scripting language experts for my ongoing job. The person should also be able to tweak errors in networking,vapt as well. Initially you will be given a demo project for free and you will start the earning when you complete it.
Hi, this is a simple socket programming project. We already have the connection and everything set up, you just have to help us send a HMAC to the server, the server would decrypt it if it is correct or else it would reject it. Text me up, if you wanna talk in detail!