Save this Search
     
Sort by:
  • Posted Date
Hiring Open
Fixed Price: Less than $500   |  Posted: Mar 25, 2015  |  Ends: 12d, 12h  |   4 Proposals
to analyze various PE-CE Protection techniques and mechanisms in MPLS network for both L2 CE and L3 CE
Category: Networking & Security       

j****689
 [?]
Sign in to view client's details.
| j****689
|    Canada
Fixed Price: $500 - $1,000   |  Posted: Mar 24, 2015  |  Ends: 12d, 8h  |   5 Proposals
to analyze various PE-CE Protection techniques and mechanisms in MPLS network for both L2 CE and L3 CE
Category: Networking & Security       

j****690
 [?]
Sign in to view client's details.
| j****690
|    Canada
Fixed Price: Less than $500   |  Posted: Mar 24, 2015  |  Ends: 12d, 6h  |   3 Proposals
I am looking for a program that will run on localhost and direct all traffic through Tor exit nodes. For anyone who doesn't know what Tor is, it is a network that lets you browse the internet, but it will anonymize your IP address. The reason I want this is that it will provide an 'unlimited' supply of free proxies, as Tor is free. I am aware that Tor has a built in 'proxy' feature, meaning you can use it as a proxy in your program and it will direct all traffic through the Tor exit nodes to the internet (you can add "127.0.0.1:9051" as a proxy and it will direct it through Tor). But that does not work if my program has multithreading (I use a lot of social media bots), as it only uses one exit node (each exit node has a different IP), so all connections are on the same IP address. I am looking for a program that uses a user specified range of ports on the localhost to direct traffic to the exit nodes (each port has a different exit node). I would like it to refresh the exit ...
Category: Networking & Security       
Skills: Python, VB.NET, Visual Basic, C#, C++       

r****ven
 [?]
Sign in to view client's details.
| r****ven
|    Netherlands
Hourly Rate: Not Sure   |  Duration: 4-6 months  |  Posted: Mar 24, 2015  |  Ends: 12d, 4h  |   8 Proposals
I am working on a very large project and I am in need of a few contractors (Extremely Fast and Mobile you would need to be on the ground here in Kampala by the first of April) I have the opportunity for 3 - 6 months these consultants need to be extremely technical and willing to travel quickly. We pay for Airfare, Healthcare, Accommodations, and Local Transportation. * Identify and investigate anomalous log entries and possible implications on security, integrity and performance of CUSTOMER's IT infrastructure. Escalate recommendations to the Manager, IT Architecture and Security. * Prepare periodic security/risk assessment report and circulate to all relevant stakeholders. * Liaise with relevant unit/ team/function in carrying out all relevant activities. * Attend team/divisional/departmental meetings as required. * Assist in providing technical support to end users of CUSTOMER's IT network infrastructure organisation-wide. * Assist in ensuring the prompt resolution of escalated faul...
Category: Networking & Security       

B****ons
 [?]
Sign in to view client's details.
| B****ons
Hourly Rate: Less than $10 / hr   |  Duration: 1-2 weeks  |  Posted: Mar 24, 2015  |  Ends: 12d, 1h  |   7 Proposals
Cpanel server problem solve Cpanel server problem solve Cpanel server problem solve Cpanel server problem solve Cpanel server problem solve
Category: Networking & Security       

s****ani
 [?]
Sign in to view client's details.
| s****ani
|    Bangladesh
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Mar 24, 2015  |  Ends: 12d, 0h  |   20 Proposals
We are looking fro a new IT consultant to help us update and troubleshoot our existing network - we moved and got a new ip and are having connectivity issues with printers, desktops, VPN, and VoIP. Existing system includes: Forti Wifi 60 router/ firewall Qnap 4 bay file server with elephant drive cloud backup Cisco SG200-26P switch (2) shared Brother network printers (WLAN and WAN) (5) network users with PC (1) Mac mini - primarily used for music and internet. Can be re-purposed. (2) VPN remote access. (5) VoIP phones (currently have google voice but no longer using due to poor performance). After we get the core items above, would like to establish remote desktop sharing among office pc's, screen sharing on a collaborative monitor, and develop a server based processor and graphics card for CAD/BIM and rendering.
Category: Networking & Security       

w****lld
 [?]
Sign in to view client's details.
| w****lld
|    United States
Fixed Price: Less than $500   |  Posted: Mar 24, 2015  |  Ends: 11d, 20h  |   8 Proposals
I have two laptops, a PC and a MAC. I want to use a program called Synergy (  [obscured]  -project.org/) to use one keyboard and one mouse between the two. I need to get both machines connected wirelessly. I need you to get on Skype with me and walk me though the steps to get everything set up. Windows OS: Windows 8 MAC: 10.8.3
Category: Networking & Security       

l****276
 [?]
Sign in to view client's details.
| l****276
|    United States
Hourly Rate: $10 - $15 / hr   |  Duration: Not Sure  |  Posted: Mar 23, 2015  |  Ends: 26d, 11h  |   7 Proposals
I have two NS5200 that needs to be configured for the following HA - Active / Backup VPN configuration so clients can connect from outside Internal / External routing Virtual routers for hybrid cloud setup This is initial setup and will be ongoing Thanks Nandan
Category: Networking & Security       
Skills: Cisco, Network Administration, VPN       
Preferred Location: Canada

p****eln
 [?]
Sign in to view client's details.
| p****eln
|    Canada
Fixed Price: $100 or less   |  Posted: Mar 23, 2015  |  Ends: 11d, 5h  |   32 Proposals
Hi there, I'm looking for someone to help me configure my asa 5505 (8.4.3) and VPN. I have a basic configuration that you can work off of, but it doesn't seem to allow traffic out onto the internet or to the VPN. I need a site-to-site IPSec VPN to connect to a partner site. It has some particular configurations that I will share with the winning candidate. Basic objectives are: Site-to-Site VPN for our major partner SSL VPN enabled on our ASA so our staff can work remotely Basic NAT configuration so that our staff can get out on the net. If you can trouble shoot my config, or send me the commands for a working config, or the working config to upload to the ASA, (prefereably all of the above) that would be ideal.
Category: Networking & Security       
Skills: Firewall, VPN, Cisco ASA, SSL VPN       

c****ker
 [?]
Sign in to view client's details.
| c****ker
|    Canada
Hourly Rate: Less than $10 / hr   |  Duration: Not Sure  |  Posted: Mar 23, 2015  |  Ends: 11d, 4h  |   17 Proposals
I have a client with an old 2003 server and an office with 6 computers. The server needs to be removed. The client is now cloud based with Google Apps and Google Drive. I require someone who can; - Disconnect each computer from the server - Set up each computer to run getting it's IP from the router instead - Install various software etc.
Category: Networking & Security       

s****ctv
 [?]
Sign in to view client's details.
| s****ctv
|    Australia
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Mar 23, 2015  |  Ends: 11d, 3h  |   12 Proposals
Background: We have been successfully running a 3CX voip pbx at our company for a few years. 30 end points, mainly polycom 501, 430, 331 phones. Our phone system and all end points use a completely separate network from our data network. The phone network connects to the internet using a dedicated T1. The only traffic on this line is from the phone network. The 3CX server and all phones use internet IP addresses. For now, no firewall exists. Ultimately we'd like a firewall in place and then provide the end-points (phones) with internal (NAT) IP addresses, but we were never able to get the system working with a firewall introduced into the mix. (Introducing a firewall could be a second project) The point for now, however, is that no firewall exists to mask the root of the problems that we're having. The server and all phones sit directly on the internet. Problem: We have long been experiencing what I can best describe as "spam" incoming calls. They happen regularly through...
Category: Networking & Security       

p****lon
 [?]
Sign in to view client's details.
| p****lon
|    United States
Fixed Price: Not Sure   |  Posted: Mar 23, 2015  |  Ends: 26d, 0h  |   6 Proposals
We require security work to be carried out on our website before we launch our phase 2 platform. Our primary site   [obscured]   runs as a multi-store setup, with each store front having its own sub-domain. We currently have 2 active storefronts setup. One is a   [obscured]   and the other is   [obscured]   as the name suggests the former is a teststore for our own use when developing new features and alterations to the site. Both of these multi-stores share the same wildcard security certificate.   [obscured]   links to the   [obscured]   site. How it works is when someone goes to the retailers site. (In this example   [obscured]  /product_1 ) they get to the website and see our Split the cost buttons both on the product pages and also on the shopping cart page. If the shopping cart button is clicked it takes the customer to the   [obscured]  /product_1 websit...
Category: Networking & Security       

k****tch
 [?]
Sign in to view client's details.
| k****tch
|    United Kingdom
Fixed Price: $500 - $1,000   |  Posted: Mar 23, 2015  |  Ends: 11d, 0h  |   8 Proposals
Appointment of a Service Provider to Supply, Install and Configure an IP based Network Storage System. 1. GENERAL / BACKGROUND NLB intends appointing a service provider to provide an onsite network storage solution. The storage capacity required is 120TB. 2. SCOPE OF WORK The prospective service provider will be required to provide but not limited to the following, namely: 2.1. Storage Capacity: 120TB. 2.2. VMWare interoperability. 2.3. Network interface: 100/1G Ethernet. 2.4. Required protocol support: 2.4.1. LDAP. 2.4.2. SNTP. 2.4.3. SNMP. 2.5. Network integration diagram. 2.6. Onsite training. 3. OUTPUT AND / OUTCOMES 3.1. The service provider is to provide a 24 hour a day; seven days a week technical support to the Customer for problems with the Service and liaise with the Customer to resolve these problems. 3.2. All critical calls (storage system down time) to be responded to within 1 hour and resolved within 5 hours. 3.3. All other calls to be responded to within 4 busin...
Category: Networking & Security       
Skills: Asterisk, Linux System Administration       

l****ane
 [?]
Sign in to view client's details.
| l****ane
|    South Africa
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Mar 23, 2015  |  Ends: 10d, 22h  |   28 Proposals
Need long term relationship for troubleshooting of various network infrastructure as needed. This could include any number of configuration assistance for cisco devices ranging from nexus to cisco pix with cisco switching, poe and layer 3 routing.
Category: Networking & Security       
Skills: Cisco, Network Design, Network Engineering       

m****ent
 [?]
Sign in to view client's details.
| m****ent
|    United States
Fixed Price: $20 - $80   |  Posted: Mar 23, 2015  |  Ends: 10d, 15h  |   17 Proposals
I would like to add an additional version of PHP to my VPS server. I have full SSH access to the server. Version 5.4 of PHP must be added as an additional version which i can select on a per domain basis from Virutalmin. The server is OS Ubuntu.
Category: Networking & Security       
Skills: Cisco, Linux System Administration, PHP, Ubuntu       

i****ion
 [?]
Sign in to view client's details.
| i****ion
|    United Kingdom
Fixed Price: Less than $500   |  Posted: Mar 23, 2015  |  Ends: 10d, 15h  |   7 Proposals
Objective: To provide effective trojan and virus screen solution for image upload module in our website. Our website will provide a button for people to upload their recent picture, from their browser, to our server or to an offsite server isolated from our server for the purpose of their job application. We have encountered hackers uploading trojan or worm to our server to distribute worms. Their trojan or malware is embedded within their image file. We are looking for experts who have previous experience in dealing with this particular threat. Ideally, your solution should detect the malware before it is uploaded onto the server. We are open to listen to your professional advice.
Category: Networking & Security       

p****011
 [?]
Sign in to view client's details.
| p****011
|    Hong Kong SAR, PRC
Fixed Price: $500 - $1,000   |  Posted: Mar 23, 2015  |  Ends: 10d, 12h  |   11 Proposals
Hi there, I require someone to be able to perform a penetration testing to try to obtain certain databases from a website. Please bid if you are able to accomplish the task in 24-48 hours.
Category: Networking & Security       
Skills: Penetration Testing       

w****arz
 [?]
Sign in to view client's details.
| w****arz *
|    Malaysia
Hourly Rate: $10 - $15 / hr   |  Duration: 1-2 weeks  |  Posted: Mar 22, 2015  |  Ends: 10d, 0h  |   5 Proposals
I'm looking for a python script that will perform the following actions: 1. Prompt for IP Address. If no address is supplied the script exits and prints usage parameters. 2. Takes IP address and does a URL brute force discovery based on a provided File listed URLs to test against (ex: /admin, /wp-admin, /rss, ...) 3. For every found URL write to a new File named "ExposedURLs" that listed the successfully found URLs 4. Also perform user brute force login attack based on a provided File that contains a password list. 5. For ever successfully authenticated account, write to a new File named "ExposedAccounts". I have two functional scripts that do this but I'm looking for someone with more expertise than me to make this one script as well as more efficient and cleaner. I'm looking to move quick on this. I need a workable script by Tues March 24 2015 at 8pm Eastern Standard American Time.
Category: Networking & Security       
Skills: Python       

S****Ack
 [?]
Sign in to view client's details.
| S****Ack
|    United States
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Mar 21, 2015  |  Ends: 9d, 2h  |   14 Proposals
We need a linux administrator to help us deal with this: we have a ubuntu machine. The machine has a public interface and a private interface (class B). We need to set a ipsec based vpn on this machine and allow 100 users to connect via vpn. After connecting to the VPN each user should have access to: 1. A shared class C network. (lets say 192.168.5.0/24) 2. A private class C network corresponding to their user-id. e.g. user 10 should have access to : 192.168.5.0/24 and 192.168.10.0/24 user 11 should have access to 192.168.5.0/24 and 192.168.11.0/24 The vpn should be easy to set-up for end user. We do not want to distribute a config file; but only username, password (and may be a group password). Users should not be able to route traffic to subnet they are not allowed to.
Category: Networking & Security       

s****d24
 [?]
Sign in to view client's details.
| s****d24 *
|    United Kingdom
Fixed Price: $1,000 - $5,000   |  Posted: Mar 21, 2015  |  Ends: 1d, 0h  |   11 Proposals
Penetration tester with 99% hack rate. Seeking highly qualified hacker who can deliver results. This directory listing is public:   [obscured]  /images/ Can you provide the directory listing for these:   [obscured]  /images/   [obscured]  /wp-content/uploads/2013/05/   [obscured]  /data/storage/attachments/   [obscured]  /wp-content/uploads/2013/11/   [obscured]  /images/   [obscured]  /storage/ This is fairly simple. For each of the sites, you deliver a current directory listing along with an explanation of how you obtained it. The actual websites will be provided to the winning bidder.
Category: Networking & Security       

s****149
 [?]
Sign in to view client's details.
| s****149
|    United States
Fixed Price: Less than $500   |  Posted: Mar 21, 2015  |  Ends: 20h, 8m  |   2 Proposals
Need of a technical writer for a GAP Analysis Case Study. Candidate must work well under time constraints and pressure. Candidate must be willing to be paid after assignment is completed to customer satisfaction. However, a 20% / 80% payment can be arranged. (20% up front - 80% when completed). Details of project(s) will be given upon acknowledgement and receipt of contract.
Category: Networking & Security       
Preferred Location: United States

o****llc
 [?]
Sign in to view client's details.
| o****llc
|    United States
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Mar 21, 2015  |  Ends: 8d, 18h  |   12 Proposals
Ethical hacker needed! Gain access to website/database. Locate a specific record. Credentials/login are not available for this website/database.
Category: Networking & Security       

c****ing
 [?]
Sign in to view client's details.
| c****ing
|    United States
Fixed Price: $1,000 - $2,500   |  Posted: Mar 20, 2015  |  Ends: 8d, 11h  |   3 Proposals
Please do not submit a proposal without the developer environment video as specified below. Without this video to demonstrate you have things ready to do this work your proposal will not be considered. Thanks for understanding! This is a very specialized technical assignment and you must have access to an development environment with: - Git - Active Directory - nginx - C environment to work on modules mentioned below. In order to be considered for this job you must submit a video of your development environment with these systems running and showing your approach. The task to be completed within 1 week is to: Fork the existing "spnego-http-auth-nginx-module" nginx module and add the ability to retrieve Active Directory groups from the kerberos token.   [obscured]  /stnoonan/spnego-http-auth-nginx-module The module already retrieves the user and makes it available in the `$remote_user` variable, we'd also like a `$remote_user_groups` variable which contains a comma...
Category: Networking & Security       
Skills: C, Active Directory, Nginx       

A****ort
 [?]
Sign in to view client's details.
| A****ort
|    Australia
Hourly Rate: $5 - $15 / hr   |  Duration: 1-2 weeks  |  Posted: Mar 20, 2015  |  Ends: 8d, 8h  |   1 Proposal
I'm forwarding an application log to my AlienVault OSSIM using syslog. I need a custom decoder created in order for AlienVault to understand it and create a alarm. I'm looking for someone with previous AlienVault experience. Please don't bother apply if you've never worked with AlienVault before.
Category: Networking & Security       
Skills: AlienVault, IDS, OSSIM, SIEM, Syslog       

p****mes
 [?]
Sign in to view client's details.
| p****mes
|    United States
Symbol Key
Payment method not yet verified
Payment verified
Purchased $1-$500
Purchased $500-$5,000
Purchased more than $5,000
You have already submitted a
proposal to this job