Job Title | Budget | ||||
---|---|---|---|---|---|
SoftEther VPN Specialist, VPN Engineer (SoftEther Focused)
|
18 - 22 USD
/ hr
|
55 minutes ago |
Client Rank
- Excellent
$29'399 total spent
21 hires
, 9 active
60 jobs posted
35% hire rate,
1 open job
18.16 /hr avg hourly rate paid
1239 hours
5.00
of 14 reviews
Registered at: 11/02/2008
India
|
||
Required Connects: 16
Looking for a SoftEther VPN specialist with in-depth expertise in designing, implementing, managing, and troubleshooting SoftEther VPN solutions, including configuring servers, clusters, creating virtual hubs, managing user access, monitoring n optimizing network performance, and ensuring the overall security of VPN connections across various network environments. Strong understanding of SoftEther protocols and features to optimize network connectivity and security for clients.
Skills: Network Administration, SoftEther, SoftEther VPN, Network Security Engineer , SoftEther engineer, SoftEther VPN Engineer
Hourly rate:
18 - 22 USD
55 minutes ago
|
|||||
Palo Alto Networks Engineer – NGFW, Cortex XDR, and Prisma Access
|
10 - 50 USD
/ hr
|
2 hours ago |
Client Rank
- Medium
1 open job
Canada
|
||
Required Connects: 5
Responsibilities:
1. System Deployment & Configuration: Configure and stand up either: 1 PA-1400 Series NGFW, or 1 Prisma Access system (depending on the assigned project). Create and configure: 1 Security Profile. 2 Security Rules for inbound decryption and each Core Security Bundle CDSS (4 and 8, respectively). Save configurations to ensure they can be imported for additional client NGFWs. 2. Endpoint Security Deployment: Deploy approximately 20 XDR Pro Agents across diverse endpoint types and operating systems (e.g., ~5 each of four different types). 3. Logging Infrastructure: Stand up 1 HTTP logging server to support security event tracking and analysis. 4. Default Deployment Standards: Ensure all systems are deployed in alignment with default standards: ESS #1: Untrust/Internet = Ethernet 1; Trust/Intranet = Ethernet 2. ESS #2: Untrust = Internet; Trust = everything that is not the Internet. 5. Support and Maintenance: Provide ASC (Advanced Support Center) support for all deployed products, ensuring systems remain operational and aligned with client requirements.
Skills: Network Security, Network Administration, Network Equipment, VPN, Firewall, Network Engineering, Network Analysis
Hourly rate:
10 - 50 USD
2 hours ago
|
|||||
IP Networking
|
20 - 50 USD
/ hr
|
4 hours ago |
Client Rank
- Excellent
$1'100 total spent
63 hires
, 3 active
95 jobs posted
66% hire rate,
1 open job
8.00 /hr avg hourly rate paid
19 hours
4.77
of 95 reviews
Registered at: 18/01/2021
India
|
||
Required Connects: 10
Hey there,
I am looking for person who can help me out to setup IP Networking Currently i am using Airtel (ISP) residential wifi router and i need to setup IP setting Like: Previously when i was using it and when i switch it off and on then modem automatically change IP and city name but now today when i try out. It showing me same city with starting digit of IP only last 2-3 digit change. and DNS value same. Which is not works for me. As i want it change IP everytime by turn it ON/OFF but now as its now working anymore so if someone has idea how we can do it. NOTE: I don't need Proxy or VPN to change my IP. I need real IP from my modem just to figure out how we can change IP's like it had before
Skills: Network Security, VPN, Network Equipment, Network Administration
Hourly rate:
20 - 50 USD
4 hours ago
|
|||||
Comprehensive IT Services Scope of Work Open
|
~265 - 794 USD | 5 hours ago |
Client Rank
- Risky
1 open job
Registered at: 09/12/2024
Netherlands
|
||
I'm seeking a professional to generate a 20-page document, in font size 12, outlining a detailed scope of work for various IT services. This document should be specifically tailored for clients with no technical background, yet employing standard IT terminology. The IT services to be covered include: - IT Operation and Monitoring - IT Service Desk - Network and Infrastructure - Systems and Cloud Systems - Network Security - IT Consultation - IT Application and Solutions Each service description should follow the structure of: - Description - Implementation - Maintenance Ideal candidates for this project should have a strong background in IT and technical writing, with the ability to explain complex concepts in a simple and engaging manner. Experience in creating client-facing IT documents will be highly advantageous. Please avoid any technical jargon, but aim to use standard IT terminology throughout. The final document should be delivered in Word format. The tone of the document should be professional. Include relevant examples or case studies for each IT service. Please create a professional template for the document format. Do not include a glossary of terms. Include relevant visuals or diagrams to help explain the concepts. Include infographics to help explain the concepts.
Skills: Technical Writing, Ghostwriting, Article Writing, Research Writing, Content Writing
Fixed budget:
250 - 750 EUR
5 hours ago
|
|||||
Tracking down scammers from two phone numbers
|
not specified | 6 hours ago |
Client Rank
- Risky
1 open job
Singapore
|
||
Required Connects: 5
Will provide the two Singapore numbers used by the hackers on email
Skills: Ethical Hacking, Vulnerability Assessment, Network Security, System Security, Information Security, DevOps, Python, Technical Writing, Encryption, Kali Linux, Academic Research, Web App Penetration Testing, Network Penetration Testing, System Administration
Budget:
not specified
6 hours ago
|
|||||
Hotmail account recovery
|
not specified | 7 hours ago |
Client Rank
- Medium
1 open job
United States
|
||
Required Connects: 7
It has to do with recovering my hotmail account, it has been locked for months and can’t get recover it.
Not looking for second parties or have to buy ecrypts
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget:
not specified
7 hours ago
|
|||||
Comprehensive IT Services Scope of Work
|
30 - 250 USD | 8 hours ago |
Client Rank
- Good
$1'218 total spent
2 hires
1 open job
5.00
of 3 reviews
Registered at: 21/02/2021
Saudi Arabia
|
||
I'm seeking a professional to generate a 20-page document, in font size 12, outlining a detailed scope of work for various IT services. This document should be specifically tailored for clients with no technical background, yet employing standard IT terminology.
The IT services to be covered include: - IT Operation and Monitoring - IT Service Desk - Network and Infrastructure - Systems and Cloud Systems - Network Security - IT Consultation - IT Application and Solutions Each service description should follow the structure of: - Description - Implementation - Maintenance Ideal candidates for this project should have a strong background in IT and technical writing, with the ability to explain complex concepts in a simple and engaging manner. Experience in creating client-facing IT documents will be highly advantageous. Please avoid any technical jargon, but aim to use standard IT terminology throughout. The final document should be delivered in Word format. The tone of the document should be professional. Include relevant examples or case studies for each IT service. Please create a professional template for the document format. Do not include a glossary of terms. Include relevant visuals or diagrams to help explain the concepts. Include infographics to help explain the concepts. Skills: Technical Writing, Ghostwriting, Article Writing, Research Writing, Content Writing
Fixed budget:
30 - 250 USD
8 hours ago
|
|||||
Comprehensive IT Services Scope of Work
|
30 - 250 USD | 8 hours ago |
Client Rank
- Good
$1'218 total spent
2 hires
1 open job
5.00
of 3 reviews
Registered at: 21/02/2021
Saudi Arabia
|
||
I'm seeking a professional to generate a 20-page document, in font size 12, outlining a detailed scope of work for various IT services. This document should be specifically tailored for clients with no technical background, yet employing standard IT terminology.
The IT services to be covered include: - IT Operation and Monitoring - IT Service Desk - Network and Infrastructure - Systems and Cloud Systems - Network Security - IT Consultation - IT Application and Solutions Each service description should follow the structure of: - Description - Implementation - Maintenance Ideal candidates for this project should have a strong background in IT and technical writing, with the ability to explain complex concepts in a simple and engaging manner. Experience in creating client-facing IT documents will be highly advantageous. Please avoid any technical jargon, but aim to use standard IT terminology throughout. The final document should be delivered in Word format. The tone of the document should be professional. Include relevant examples or case studies for each IT service. Please create a professional template for the document format. Do not include a glossary of terms. Include relevant visuals or diagrams to help explain the concepts. Include infographics to help explain the concepts. Skills: Technical Writing, Ghostwriting, Article Writing, Research Writing, Content Writing
Fixed budget:
30 - 250 USD
8 hours ago
|
|||||
Security issues
|
not specified | 8 hours ago |
Client Rank
- Risky
1 open job
Hungary
|
||
Required Connects: 5
I have an issue regarding my email and password in which i have big consequences in case i can’t log in
Skills: Security Assessment & Testing, Security Testing, Ethical Hacking, Internet Security, Network Penetration Testing, Penetration Testing, Website Security, Information Security Consultation, Network Security, System Security, Vulnerability Assessment, Information Security, Malware Removal
Budget:
not specified
8 hours ago
|
|||||
Experienced Server Administrator - Ubuntu & Synology
|
not specified | 9 hours ago |
Client Rank
- Excellent
$267'554 total spent
201 hires
, 11 active
2562 jobs posted
8% hire rate,
4 open job
13.53 /hr avg hourly rate paid
17961 hours
4.75
of 127 reviews
Registered at: 03/07/2011
United Kingdom
|
||
Required Connects: 15
We require another experienced Server Admin to help support, design, document server related issues and at times implement networking solutions, with various resources, that has experience with;
• Ubuntu Environment • Synology Environments • Firewalls, Routers, Switches • Vlans & Networking Design and Implementation Conditions • Native English Preferred • Compliance knowledge and experience preferred • Readily Available • Good Honest Work Ethic To Apply Please supply a speedtest.net result
Skills: System Administration, Network Administration, Linux System Administration, Network Security, NGINX, Linux, Ubuntu, Apache HTTP Server, Bash, DNS
Budget:
not specified
9 hours ago
|
|||||
PCI DSS Consultant Needed in Bangalore
|
20 - 50 USD
/ hr
|
11 hours ago |
Client Rank
- Risky
1 open job
India
|
||
Required Connects: 7
We are seeking a qualified PCI DSS consultant based in Bangalore to assist our organization in achieving compliance with PCI DSS standards. The ideal candidate will conduct a thorough assessment of our current security measures, identify gaps, and provide actionable recommendations. You will work closely with our IT and security teams to implement these changes effectively. A strong understanding of payment card security regulations is essential. If you're passionate about helping organizations secure their payment systems, we would love to hear from you.
Skills: Network Security, Firewall, Information Security, Network Administration, PCI DSS
Hourly rate:
20 - 50 USD
11 hours ago
|
|||||
Hotmail account recovery
|
not specified | 11 hours ago |
Client Rank
- Risky
1 open job
United States
|
||
Required Connects: 5
It has to do with recovering my hotmail account, it has been locked for months and can get recover it
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget:
not specified
11 hours ago
|
|||||
Content AI Assisted Writing
|
500 USD | 13 hours ago |
Client Rank
- Excellent
$22'541 total spent
7 hires
, 4 active
16 jobs posted
44% hire rate,
4 open job
41.43 /hr avg hourly rate paid
529 hours
4.87
of 3 reviews
Registered at: 07/09/2012
United States
|
||
Required Connects: 13
I need to create AI assisted blog content and research on Bitcoin. Here is the type of content I am looking to create-
Beginner's Pathway Bitcoin 101: Demystifying the basics of Bitcoin. What is Bitcoin? How does Bitcoin work? Why should I care about Bitcoin? Your First Steps: A guide to buying, storing, and using Bitcoin. Choosing a Bitcoin wallet Making your first Bitcoin purchase Keeping your Bitcoin secure Bitcoin for Everyday Life: Practical applications of Bitcoin. Spending Bitcoin Sending Bitcoin to friends and family Using Bitcoin for online purchases Intermediate Ascent Investing in Bitcoin: Strategies and insights for smart investing. Dollar-cost averaging (DCA) Understanding market cycles Analyzing Bitcoin charts The Bitcoin Ecosystem: Exploring the broader world of Bitcoin. Bitcoin mining Bitcoin ETFs The Lightning Network Security Masterclass: Protecting your Bitcoin from threats. Hardware wallets Scams and fraud prevention Best practices for online security Advanced Odyssey Technical Deep Dive: Understanding the technology behind Bitcoin. Blockchain fundamentals Cryptography and Bitcoin The future of Bitcoin development Trading Strategies: Advanced techniques for experienced traders. Technical analysis Fundamental analysis Risk management The Future of Bitcoin: Exploring the potential impact of Bitcoin. Bitcoin and the global economy Decentralized finance (DeFi) The role of Bitcoin in a changing world Sign up for our newsletter! Stay informed about the latest Bitcoin news, insights, and updates. Topics: How Bitcoin Works Bitcoin Myths Bitcoin Billionaires Bitcoin's Price History Bitcoin vs. Gold The Future of Money Bitcoin's Environmental Impact Bitcoin and the Silk Road Bitcoin Security Bitcoin Wallets The Rise of the Bitcoin Billionaires: How Early Investors Made a Fortune From Pizza to Lambos: The Incredible Story of Bitcoin's Price Bitcoin vs. Gold: The Digital Gold Rush The Future of Money: Will Bitcoin Replace Traditional Currencies? The Environmental Impact of Bitcoin: Fact vs. Fiction Bitcoin and the Silk Road: The Dark Side of Crypto How Bitcoin Works: A Simple Explanation for Beginners The Top 5 Bitcoin Myths Debunked How to Secure Your Bitcoin: A Guide for Beginners The Best Bitcoin Wallets for 2024
Skills: Content Writing, Article Writing
Fixed budget:
500 USD
13 hours ago
|
|||||
Help with a loved ones email access
|
not specified | 14 hours ago |
Client Rank
- Risky
1 open job
United States
|
||
Required Connects: 5
I need to get a password from a dead relative to get his medical and insurance documents in order. We never recovered his cell phone or personal computer. Not really sure how to retrieve the icloud password if I don't have the supporting equipment. Anyone else out there had to do this before? Any help would be greatly appreciated.
Skills: Security Assessment & Testing, Security Testing, Ethical Hacking, Internet Security, Network Penetration Testing, Penetration Testing, Website Security, Information Security Consultation, Network Security, System Security, Vulnerability Assessment, Information Security, Malware Removal
Budget:
not specified
14 hours ago
|
|||||
Managed Services Provider (MSP)
|
3 - 7 USD
/ hr
|
15 hours ago |
Client Rank
- Medium
2 jobs posted
1 open job
Registered at: 17/09/2024
United States
|
||
Required Connects: 11
Provide comprehensive remote desktop support to address client issues promptly and effectively, ensuring minimal disruption to their operations.
Collaborate with clients to understand their business objectives and assist in project implementation to achieve those goals. Work closely with Project Managers to define project scopes, create plans, and execute technical projects efficiently and within deadlines. Act as a Level 2 escalation point for help desk issues, resolving complex technical challenges and providing guidance to junior team members. Play a key role in the onboarding process for new clients, ensuring smooth transitions and efficient setup of IT systems. Independently participate in requirements documentation, business systems configuration and defining/execution of acceptance criteria. Document issues and participate in their resolution. Translate business needs into high-level technical specifications and design. Identify gaps and ensure deployment of solutions. Provide technical support across various channels including phone, email, chat, and remote control, delivering exceptional customer service. Remote Issue Resolution: Provide remote technical support to resolve hardware, software, and network issues efficiently using remote troubleshooting tools. Technical Assistance: Assist with configuration and management of cloud services, preferably Azure or AWS, to support client needs and system functionality. Active Directory Management: Support basic Active Directory tasks including user account management and permissions, as needed. Analyzes the technology currently being used and develops plans and processes for improvement and expansion Ticketing System Management: Utilize ticketing tools to track, manage, and document support requests and resolutions, ensuring timely and accurate updates. Documentation: Maintain detailed records of support activities and solutions provided, ensuring documentation is clear and up to date. Customer Service: Deliver exceptional customer service by addressing and resolving client issues with professionalism and efficiency. Maintain clear and professional communication with clients through both verbal and written channels to ensure issues are understood and resolved effectively. General Responsibilities: Interpersonal Skills - Identifies and resolves problems in a timely manner; gathers and analyzes information skillfully and confidentially; maintains confidentiality. Escalates issues as appropriate Communication - Speaks clearly and persuasively in positive or negative situations; listens and gets clarification; responds well to questions; openly communicates with department leads on due dates and progress during a project Teamwork - Balances team and individual responsibilities; treats people with respect; gives and welcomes feedback; contributes to building a positive team spirit; puts success of team above own interests Organizational Support - Follows policies and procedures; completes administrative tasks correctly and on time; supports organization's goals and values. High energy level, comfortable performing multifaceted projects in conjunction with day-to-day activities Professionalism - Approaches others in a tactful manner; reacts well under pressure; accepts responsibility for own actions; works with ethically and with integrity Initiative - Seeks increased responsibilities; asks for and offers help when needed. Displays original thinking and creativity; meets challenges with resourcefulness; generates suggestions for improving work Language Skills - Ability to speak effectively before groups of customers or employees of organization
Skills: Microsoft Active Directory, Network Administration, Email Communication, Customer Support, Technical Support, Network Security, Windows Administration
Hourly rate:
3 - 7 USD
15 hours ago
|
|||||
Help me recover my stolen pokemon go account
|
not specified | 16 hours ago |
Client Rank
- Risky
1 open job
United Kingdom
|
||
Required Connects: 5
Hi
I hope this message finds you well. I’m reaching out because I’ve been struggling to recover my Pokémon GO account, and I’m wondering if you might be able to help. I’ve been playing Pokémon GO since its launch in 2016, and over the years, I’ve invested a lot of time and money into the game, creating countless memories along the way. Unfortunately, my account was hacked in August 2024. The hacker changed the email associated with the account, modified the username, and even deleted some of the items and progress I had worked so hard for. I contacted Niantic, the creators of the game, but they informed me that they couldn’t assist further and suggested I create a new account. Starting over feels incredibly disheartening, as that account holds so much sentimental value to me. I’ve exhausted every official avenue and don’t know where else to turn. I would be incredibly grateful if you could help me recover the account or offer any advice on what to do next. Thank you so much for your time, and I appreciate any assistance you can provide.
Skills: Security Assessment & Testing, Security Testing, Ethical Hacking, Internet Security, Network Penetration Testing, Penetration Testing, Website Security, Information Security Consultation, Network Security, System Security, Vulnerability Assessment, Information Security, Malware Removal
Budget:
not specified
16 hours ago
|
|||||
Question: Accessing Old Text Messages
|
not specified | 17 hours ago |
Client Rank
- Risky
1 open job
United States
|
||
Required Connects: 5
I want help acquiring old text messages I sent in 2022 and 2023 from my cell phone. I still have this phone number. I am in the process of writing a book and need this information for context. My phone carrier, Verizon, has been a nightmare, telling me I need a subpoena or an open court case to request this. My attorney told me that a forensic investigator could assist me by accessing my phone records. Is this request possible?
Skills: Network Security, WordPress, Virus Removal, Penetration Testing, Information Security, Web Application Security, Malware Removal, Digital Forensics, Kali Linux, System Security, Cybersecurity Tool, Vulnerability Assessment, WordPress Malware Removal, Security Analysis
Budget:
not specified
17 hours ago
|
|||||
Email recovery
|
not specified | 1 day ago |
Client Rank
- Risky
1 open job
United States
|
||
Required Connects: 5
I own a domain and my former partner blocked my access to the email. How do I recover the email since the domain is my property?
I own a domain and my former partner blocked my access to the email. How do I recover the email since the domain is my property?
Skills: Vulnerability Assessment, Penetration Testing, Network Security, Security Testing, Internet Security, Network Penetration Testing, Web App Penetration Testing, Ethical Hacking, Black Box Testing, Reverse Engineering, JavaScript, Web Application Security
Budget:
not specified
1 day ago
|
|||||
Hackers
|
31 - 60 USD
/ hr
|
1 day ago |
Client Rank
- Risky
1 open job
Registered at: 18/09/2024
United Kingdom
|
||
Required Connects: 8
Need access to an old email address that I no longer have the password to
Skills: Ethical Hacking, Penetration Testing, Network Security, Encryption, VPN
Hourly rate:
31 - 60 USD
1 day ago
|
|||||
Cybersecurity Expert Needed for Ethical Hacking Consultations
|
40 - 70 USD
/ hr
|
1 day ago |
Client Rank
- Risky
1 open job
India
|
||
Required Connects: 7
We are seeking a skilled ethical hacker or cybersecurity expert to assist us in assessing and enhancing our security protocols. Your primary responsibilities will include performing penetration testing, identifying vulnerabilities, and providing actionable recommendations to strengthen our defenses against cyber threats. A strong understanding of network security, threat analysis, and risk assessment is essential. The ideal candidate will have a proven track record in ethical hacking and a passion for keeping systems secure.
Skills: Vulnerability Assessment, Encryption, Information Security, Firewall, Security Analysis
Hourly rate:
40 - 70 USD
1 day ago
|
|||||
Experienced Ethical Hacker for Web Penetration Testing
|
500 USD | 1 day ago |
Client Rank
- Good
$5'847 total spent
26 hires
, 11 active
52 jobs posted
50% hire rate,
4 open job
16.34 /hr avg hourly rate paid
316 hours
4.19
of 14 reviews
Registered at: 13/07/2020
United States
|
||
Required Connects: 10
We are seeking a skilled ethical hacker to conduct comprehensive web penetration testing on our systems. The ideal candidate will have a strong understanding of web vulnerabilities and the ability to identify security weaknesses. You will be responsible for testing, reporting, and recommending solutions for our web applications. A proactive approach and strong communication skills are essential for collaborating with our development team. If you are passionate about cybersecurity and have a proven track record in ethical hacking, we would love to hear from you!
Skills: Penetration Testing, Vulnerability Assessment, Security Analysis, Information Security, Network Security
Fixed budget:
500 USD
1 day ago
|
|||||
Cyber Security Expert Trainer Needed for Penetration Testing Classes
|
not specified | 1 day ago |
Client Rank
- Excellent
$4'510 total spent
200 hires
, 12 active
287 jobs posted
70% hire rate,
2 open job
9.26 /hr avg hourly rate paid
44 hours
4.98
of 170 reviews
Registered at: 04/12/2009
Finland
|
||
Required Connects: 15
We're on the lookout for an awesome cyber security trainer who knows their stuff when it comes to penetration testing or red teaming. We want someone who's not just knowledgeable but also great at making classes fun and informative. If you've got a portfolio that shows off your skills and past training gigs, plus your pricing, we'd love to hear from you! Help us empower folks with the essential tools they need to tackle cyber security challenges!
Skills: Information Security, Encryption, Vulnerability Assessment, Penetration Testing, Network Security, Kali Linux, ISO 27001, Security Infrastructure, Security Analysis, Firewall
Budget:
not specified
1 day ago
|
|||||
Google Cloud Environment Setup with DNS & Cyber Security for MSSP Platform
|
15 - 20 USD
/ hr
|
1 day ago |
Client Rank
- Excellent
$12'717 total spent
12 hires
, 3 active
12 jobs posted
100% hire rate,
1 open job
25.34 /hr avg hourly rate paid
272 hours
4.97
of 19 reviews
Registered at: 25/04/2017
United Arab Emirates
|
||
Required Connects: 15
We are seeking an experienced professional to prepare a Google Cloud environment tailored for our MSSP platform. The project includes DNS configuration and implementing robust cyber security measures. Additionally, you will be responsible for preparing the environment to host our ERP system. The ideal candidate should have a deep understanding of cloud technologies and experience in cyber security practices. Your expertise will be crucial in ensuring a secure and efficient setup for our operations.
Skills: Linux System Administration, Network Administration, System Administration, Network Security, Google Cloud Platform
Hourly rate:
15 - 20 USD
1 day ago
|
|||||
IT Expert/Ethical Hacker needed to help me overcome error message
|
250 USD | 1 day ago |
Client Rank
- Medium
$96 total spent
4 hires
32 jobs posted
13% hire rate,
1 open job
4.50
of 2 reviews
Registered at: 17/01/2018
Nigeria
|
||
Required Connects: 9
I need an IT expert/ethical hacker to assist me submit a visa application on the VFS Global website.
I'm trying to submit an application but am experiencing a bug that is preventing me from submitting my application. Attached is a screenshot of the error message I'm getting. I need urgent help, and am happy to pay $250 for this. Visit this link: https://visas-immigration.service.gov.uk/resume/c5bc9b7b-0316-4291-a1c7-994d60b85335 Password: Ianotoole1540% Now click on "Provide documents & biometrics" and you'll be taken to VFS website. Now try booking a date between Tuesday, 10th Dec to Friday 13th Dec. for location: Lagos (Ikeja). Book a regular appointment (free) and be sure to select self-upload of docs (free). Now try booking me a slot. You will encounter the error message in the attachment. I need your help to overcome that error message in the screenshot. If you feel my posted budget is not enough for this, let me know your asking price, and I'll seriously consider it if you can do this Message me!
Skills: Ethical Hacking, Encryption, Network Security, Information Security, Security Analysis, Firewall, Linux System Administration
Fixed budget:
250 USD
1 day ago
|
|||||
OpenWRT Router Configuration Document for IPSec IKEv2 Setup
|
150 USD | 1 day ago |
Client Rank
- Excellent
$112'804 total spent
36 hires
, 5 active
45 jobs posted
80% hire rate,
1 open job
34.12 /hr avg hourly rate paid
2714 hours
5.00
of 27 reviews
Registered at: 15/04/2021
United States
|
||
Required Connects: 10
We are seeking an experienced freelancer to create a comprehensive configuration document for setting up a travel OpenWRT router (version 23.05) to connect to an IPSec IKEv2 gateway. The document should outline step-by-step instructions, necessary configurations, and troubleshooting tips. Familiarity with OpenWRT and IPSec protocols is essential. The end product should be clear and user-friendly to assist users in configuring their routers effectively. If you have a strong background in network configurations, we would love to hear from you!
Relevant skills: - OpenWRT - IPSec IKEv2 - Network Configuration - Technical Documentation - Troubleshooting
Skills: Network Administration, VPN, Network Security, Firewall, Linux
Fixed budget:
150 USD
1 day ago
|
|||||
Dedicated Ubuntu Server Migration & Security Configuration Project
|
100 USD | 1 day ago |
Client Rank
- Medium
1 open job
Registered at: 06/11/2024
Turkey
|
||
Required Connects: 8
I am currently seeking a highly skilled and experienced freelancer to assist in the migration of my existing dedicated Ubuntu server at Hetzner to a new dedicated server environment.
I'm having security issues sometimes with this current server and do not want to face them in the new server. I'm open to recommendations and also need some clean up work like removing unnecessary services and apps etc. This is a critical task that requires a thorough understanding of server management, application migration, and security protocols, as it involves transferring all current web applications (less than 10), databases, and configurations to the new server with efficiency and precision. The successful candidate will be responsible for a variety of tasks, including, but not limited to, the following: 1. Comprehensive Assessment: Conduct a detailed assessment of the current server environment, including all web applications, databases, and any associated services. I'll also help you to understand what is needed for me. 2. Transfer Plan: Create a brief transfer plan for me. I'll review and approve it. This will ensure that we both do not spend unnecessary time on the project and understand each other. 3. Data Transfer: Execute the transfer of all web applications, ensuring that data integrity is maintained throughout the process. This includes migrating databases, application files, and any necessary configurations to the new server. 4. Security Setup: Implement robust security measures on the new server to protect against potential vulnerabilities. This may include configuring firewalls, setting up SSL certificates, and ensuring that all applications are updated to the latest security standards. Also please configure user management for me. I am mostly using root user in my current server and I think that causes some security problems. 5. Testing and Validation: After the migration is complete, conduct thorough testing to validate that all applications are functioning correctly on the new server. This includes checking for any discrepancies in data, performance issues, or configuration errors. 6. Guidance and Support: Provide ongoing guidance and support throughout the entire migration process. This includes being available to answer questions, address concerns, and troubleshoot any issues that may arise. I'll ask some questions but not make you uncomfortable by asking too much. Please share your availability and estimated time for the project as well.
Skills: Linux System Administration, Network Administration, System Administration, Network Security
Fixed budget:
100 USD
1 day ago
|
|||||
Job Title: Forensic Analysis and Commentary on Outlook Emails
|
not specified | 1 day ago |
Client Rank
- Medium
$27 total spent
1 hires
3 jobs posted
33% hire rate,
2 open job
10.00 /hr avg hourly rate paid
2 hours
5.00
of 1 reviews
Registered at: 21/05/2024
India
|
||
Required Connects: 9
We are seeking a skilled digital forensics expert to perform two tasks:
1. Analysis of Outlook Email Format • Provide a comprehensive technical report on the structure, encoding, and metadata of Outlook emails stored in PST/OST format. • Include details on how to extract, interpret, and validate key metadata (e.g., headers, timestamps, sender/recipient information, etc.) for forensic purposes. • Highlight any common anomalies or red flags to look out for in email analysis. 2. Review and Commentary on an Existing Email Analysis Report • Provide expert commentary on the findings of an already-prepared email analysis report (without identifying the author). • Critically assess whether the analysis was thorough, accurate, and in line with digital forensic best practices. • Offer recommendations for improvement or alternative approaches if necessary. Requirements: • Proven experience in digital forensics and email analysis, particularly with Outlook PST/OST formats. • Familiarity with industry-standard tools such as FTK, EnCase, or SleuthKit/Autopsy. • Strong understanding of email metadata, headers, and forensic methodologies. • Ability to deliver a clear, concise, and professional report. Deliverables: • A detailed technical report on Outlook email format and forensic considerations. • A critical review of the provided email analysis report, including strengths, weaknesses, and suggestions for improvement. Budget: Flexible depending on experience and quality of deliverables. Timeline: Report and commentary are required within 10 days of accepting the project. Additional Notes: Confidentiality is critical. The provided analysis report must be reviewed without referencing the identity of its preparer or affiliated organization. Please confirm your agreement to this confidentiality requirement in your proposal.
Skills: Technical Writing, Intrusion Prevention System, Information Technology, Intrusion Detection System, Network Security, Computer Network, Digital Forensics, Website Security, Kali Linux, PfSense, Network Analysis, Ethical Hacking, Information Security, Wireshark, Snort
Budget:
not specified
1 day ago
|
|||||
Developer with Expertise in HTTP/3 QUIC Setup
|
~1,772 - 2,953 USD | 1 day ago |
Client Rank
- Medium
$312 total spent
1 hires
, 1 active
2 open job
5.00
of 2 reviews
Registered at: 17/08/2019
India
|
||
Job Description: Developer with Expertise in HTTP/3 QUIC Setup
We are seeking a skilled and experienced Developer to join our team for a specialized project involving Puppeteer. The ideal candidate will have a deep understanding of browser automation, proxy management, and modern network protocols, including HTTP/3 with QUIC. The goal is to ensure that all requests made through Puppeteer parallel browser instances appear genuine and mimic natural user behavior. Key Responsibilities: -Puppeteer Automation: -Develop and manage automation scripts using Puppeteer. -Set up and run parallel browser instances with different proxies. - Develop and implement robust error handling mechanisms to manage script failures gracefully. Proxy Management: -Configure and integrate multiple proxies into Puppeteer. -Implement proxy rotation and ensure efficient use of resources. -HTTP/3 QUIC Setup: -Configure Puppeteer or associated proxies to use HTTP/3 with QUIC protocol. -Optimize HTTP/3 connections to improve request authenticity and performance. Request Obfuscation: -Ensure that all automated requests closely mimic genuine human-like activity. -Integrate methods to bypass common bot detection techniques. Performance Optimization: -Monitor and improve the speed and reliability of automated tasks. -Debug and resolve issues related to network protocols, proxies, and Puppeteer setup. Required Skills: -Strong experience with Puppeteer and browser automation. -Proficiency in JavaScript/Node.js. -Solid understanding of proxy management and configurations. -Expertise in HTTP/3 and QUIC protocols. -Familiarity with web fingerprinting techniques and mitigation strategies. -Knowledge of browser headers, cookies, and request/response lifecycles. -Experience working with parallel browser instances and distributed systems. Preferred Qualifications: -Experience with network debugging tools like Wireshark or Fiddler. -Familiarity with anti-detection frameworks and techniques. -Strong analytical and problem-solving skills. -Ability to work independently and deliver within tight deadlines. If you are passionate about browser automation and network technologies and have the expertise to take on this challenge, we’d love to hear from you! The primary goal of this project is automation testing. Skills: Nginx, Internet Security, Programming, HTTP, Network Security
Fixed budget:
150,000 - 250,000 INR
1 day ago
|
|||||
Developer with Expertise in HTTP/3 QUIC Setup
|
~1,772 - 2,953 USD | 1 day ago |
Client Rank
- Medium
$312 total spent
1 hires
, 1 active
2 open job
5.00
of 2 reviews
Registered at: 17/08/2019
India
|
||
Job Description: Developer with Expertise in HTTP/3 QUIC Setup
We are seeking a skilled and experienced Developer to join our team for a specialized project involving Puppeteer. The ideal candidate will have a deep understanding of browser automation, proxy management, and modern network protocols, including HTTP/3 with QUIC. The goal is to ensure that all requests made through Puppeteer parallel browser instances appear genuine and mimic natural user behavior. Key Responsibilities: -Puppeteer Automation: -Develop and manage automation scripts using Puppeteer. -Set up and run parallel browser instances with different proxies. - Develop and implement robust error handling mechanisms to manage script failures gracefully. Proxy Management: -Configure and integrate multiple proxies into Puppeteer. -Implement proxy rotation and ensure efficient use of resources. -HTTP/3 QUIC Setup: -Configure Puppeteer or associated proxies to use HTTP/3 with QUIC protocol. -Optimize HTTP/3 connections to improve request authenticity and performance. Request Obfuscation: -Ensure that all automated requests closely mimic genuine human-like activity. -Integrate methods to bypass common bot detection techniques. Performance Optimization: -Monitor and improve the speed and reliability of automated tasks. -Debug and resolve issues related to network protocols, proxies, and Puppeteer setup. Required Skills: -Strong experience with Puppeteer and browser automation. -Proficiency in JavaScript/Node.js. -Solid understanding of proxy management and configurations. -Expertise in HTTP/3 and QUIC protocols. -Familiarity with web fingerprinting techniques and mitigation strategies. -Knowledge of browser headers, cookies, and request/response lifecycles. -Experience working with parallel browser instances and distributed systems. Preferred Qualifications: -Experience with network debugging tools like Wireshark or Fiddler. -Familiarity with anti-detection frameworks and techniques. -Strong analytical and problem-solving skills. -Ability to work independently and deliver within tight deadlines. If you are passionate about browser automation and network technologies and have the expertise to take on this challenge, we’d love to hear from you! The primary goal of this project is automation testing. Skills: Nginx, Internet Security, Programming, HTTP, Network Security
Fixed budget:
150,000 - 250,000 INR
1 day ago
|
|||||
Developer with Expertise in HTTP/3 QUIC Setup
|
~1,772 - 2,953 USD | 1 day ago |
Client Rank
- Medium
$312 total spent
1 hires
, 1 active
2 open job
5.00
of 2 reviews
Registered at: 17/08/2019
India
|
||
Job Description: Developer with Expertise in HTTP/3 QUIC Setup
We are seeking a skilled and experienced Developer to join our team for a specialized project involving Puppeteer. The ideal candidate will have a deep understanding of browser automation, proxy management, and modern network protocols, including HTTP/3 with QUIC. The goal is to ensure that all requests made through Puppeteer parallel browser instances appear genuine and mimic natural user behavior. Key Responsibilities: -Puppeteer Automation: -Develop and manage automation scripts using Puppeteer. -Set up and run parallel browser instances with different proxies. - Develop and implement robust error handling mechanisms to manage script failures gracefully. Proxy Management: -Configure and integrate multiple proxies into Puppeteer. -Implement proxy rotation and ensure efficient use of resources. -HTTP/3 QUIC Setup: -Configure Puppeteer or associated proxies to use HTTP/3 with QUIC protocol. -Optimize HTTP/3 connections to improve request authenticity and performance. Request Obfuscation: -Ensure that all automated requests closely mimic genuine human-like activity. -Integrate methods to bypass common bot detection techniques. Performance Optimization: -Monitor and improve the speed and reliability of automated tasks. -Debug and resolve issues related to network protocols, proxies, and Puppeteer setup. Required Skills: -Strong experience with Puppeteer and browser automation. -Proficiency in JavaScript/Node.js. -Solid understanding of proxy management and configurations. -Expertise in HTTP/3 and QUIC protocols. -Familiarity with web fingerprinting techniques and mitigation strategies. -Knowledge of browser headers, cookies, and request/response lifecycles. -Experience working with parallel browser instances and distributed systems. Preferred Qualifications: -Experience with network debugging tools like Wireshark or Fiddler. -Familiarity with anti-detection frameworks and techniques. -Strong analytical and problem-solving skills. -Ability to work independently and deliver within tight deadlines. If you are passionate about browser automation and network technologies and have the expertise to take on this challenge, we’d love to hear from you! The primary goal of this project is automation testing. Skills: Nginx, Internet Security, Programming, HTTP, Network Security
Fixed budget:
150,000 - 250,000 INR
1 day ago
|
Streamline your Upwork workflow and boost your earnings with our smart job search and filtering tools. Find better clients and land more contracts.