Save this Search
     
Sort by:
  • Posted Date
Posted: Within 7 days
Fixed Price: About $250   |  Posted: 5h, 23m ago  |  Ends: 14d, 18h  |   0 Proposals
I need to port original Tor files (crypto.c and tortls.c) from OpenSSL to CyaSSL libraries. CyaSSL have API compatibility layer with OpenSSL, almost complete (there are several API calls, required to be implemented on CyaSSL). For simplifying task, some defines can be used (DISABLE_ENGINES, for example). There are source:   [obscured]  /tor.git/tree/src/common/crypto.c and   [obscured]  /tor.git/tree/src/common/tortls.c There is CyaSSL:   [obscured]  /cyassl/cyassl Ported files must be compilable within Win32 tor solution, available in package.
Category: Networking & Security       
Skills: C, API Development       

f****ltd
 [?]
Sign in to view client's details.
| f****ltd
|    United Kingdom
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: 10h, 47m ago  |  Ends: 14d, 13h  |   1 Proposal
Hi Due to compliance requirements we got Netflix Auditor bundle. Server is setup and ready to go, we need help configuring the product so it can monitor and log our 1) Firewall 2) Servers on DMS 3) Servers on LAN 4) Desktops or user behavior all of this per HIPAA We need help setting it up and showing us how to do this. We are a busy shop and we prefer to pay you and deploy faster. Great phone skills are huge plus.
Category: Networking & Security       

m****ius
 [?]
Sign in to view client's details.
| m****ius
|    United States
Hourly Rate: More than $50 / hr   |  Duration: 7-9 months  |  Posted: 18h, 10m ago  |  Ends: 14d, 5h  |   6 Proposals
I am looking for CISSP and CCIE R&S certified engineers to perform network configurations and repairs needs that may arise in the near future. Have to be willing to operate on networks in Europe. Thank you, Jan
Category: Networking & Security       
Skills: Cisco, CCIE Routing and Switching, CCISP       

j****nes
 [?]
Sign in to view client's details.
| j****nes
|    Czech Republic
Fixed Price: $50 or less   |  Posted: 18h, 22m ago  |  Ends: 14d, 5h  |   5 Proposals
I have many Wordpress installations as well as Drupal installs on my server. For Wordpress I've tried a couple different security plugins (iThemes, Wordfence, All-in-one WP Security) with different settings to allow for tight security, but still allow the search engine bots (e.g., Googlebots) to have their access. However, Google Webmaster Tools is notifying me that their bots are still blocked from some parts of the installation which can adversely affect my search rankings. I need a security professional to work with at least one of my Wordpress installations to properly and completely resolve the above issue. The true test will be fetching the install from Google Webmaster tools to see if it completely passes the render test.
Category: Networking & Security       

s****w66
 [?]
Sign in to view client's details.
| s****w66
|    United States
Hourly Rate: Not Sure   |  Duration: 1-2 weeks  |  Posted: 19h, 3m ago  |  Ends: 14d, 4h  |   8 Proposals
We are an innovation company that is looking to create a fast, simple, and easy to use network. We are not IT people, and we don't want to be. That's why is so important to us that our network can be managed with ease, performs as fast as possible, and be low maintenance. We need help establishing our storage architecture (which servers do we need? which software? which brand? which configuration? which drives?) in a way that will fit our current needs, be future proof, and is as close to worry-free as possible. Goals: - Needs to be easy to manage and worry-free (almost no maintenance). - Scale out easily, as we grow. - High performance - Reliable - Easy to manage user permissions, shares... - Have a simple way for us to get qualified support, when needed. - Work for Mac and Windows users seamlessly. - Allow our employees to work directly from the server, as if they were accessing the files directly from their hard-drive. Storage Needs: - Virtual Environment - extremely fast storage...
Category: Networking & Security       

T****oup
 [?]
Sign in to view client's details.
| T****oup
|    United States
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: 22h, 51m ago  |  Ends: 6d, 1h  |   10 Proposals
Hello, Our web site server appears to be in several spam blacklists. We stopped postfix because we do not need to send email from that server and made a request to all blacklist servers that we're on to take us off their lists when the option was available (other ones remove you automatically over time), but after a day, we saw that we were added again to one of the blacklists due to having sent out spam. The others haven't removed us from their list, either. We are not sure how we sent out any spam because our postfix mail service is still disabled, but maybe there are other ways that the e-mail can be sent out. Looking further into this, it seems that according to one of the blacklist pages, our web site is infected with a trojan called "Stealrat". We need to remove the spam activity from the server, which probably means removing it. If you want the detailed information on our site + the virus that was detected, you can find the link and info here:   [obscured]  
Category: Networking & Security       
Skills: Internet Security, Security Analysis, CentOS       

C****ram
 [?]
Sign in to view client's details.
| C****ram
|    United Kingdom
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Jul 29, 2015  |  Ends: 13d, 17h  |   14 Proposals
Hi, I am looking a security expert to join my team to fix all hacked websites. Current job is as follows My client website hacked and hosting company locked my account. I only have a backup which was taken one week ago. I can only give you access to backup files then you have to work on that. Thanks
Category: Networking & Security       

M****_IT
 [?]
Sign in to view client's details.
| M****_IT
|    Pakistan
Hourly Rate: Not Sure   |  Duration: 1-2 weeks  |  Posted: Jul 28, 2015  |  Ends: 13d, 11h  |   5 Proposals
I am looking for someone to write a 30min-45 min presentation on Denial of Service attacks and the risks to an INTERNET SERVICE PROVIDER, especially a Wireless Mobile Provider LTE. IF you know Internet Hacking/Phreaking , DDOS, SQL injection and other internet risks, and have the ability to do some light research and summarize it as a powerpoint, then i would like to talk to you. ASAP- I need it fast (less than 2 weeks)
Category: Networking & Security       

r****son
 [?]
Sign in to view client's details.
| r****son
|    United States
Fixed Price: Not Sure   |  Posted: Jul 28, 2015  |  Ends: 13d, 8h  |   14 Proposals
Our website (or server (which contains multiple websites)) is infected and is sending out spam and we need someone to help fix it. We're looking for someone who can scan the server, remove the infection, remove the site from black lists and secure the site or server so that this doesn't happen again.
Category: Networking & Security       

G****gns
 [?]
Sign in to view client's details.
| G****gns
|    United States
Fixed Price: $500 - $1,500   |  Posted: Jul 28, 2015  |  Ends: 13d, 8h  |   2 Proposals
I have a Custom Website that's being Created as of now ? The Website Code/Script needs to be Transferred via Tor ? The website needs to have a Custom .Onion Domain Name & Hosting Via International Server ? Top Notch Server is Required ? Minimum 50 GB Storage Space ? Unlimited Bandwidth ? Hardened Gentoo Server ? 1 SQL Database ? Security is a Must for this Project! ? Strong Coding Skills are Required with Tor Experience. ? Tor Chat, SKYPE or Line is Required for Communication Purposes
Category: Networking & Security       

S****ahe
 [?]
Sign in to view client's details.
| S****ahe
|    United States
Fixed Price: Not Sure   |  Posted: Jul 28, 2015  |  Ends: 88d, 7h  |   7 Proposals
Need someone who is able of eliminating spam so that it does not reach our company Outlook inboxes. Right now, the majority of email in inboxes is spam. Deliverable: eliminating 99% or more of spam from reaching inbox sustained for at least 30 days without displacing legitimate emails intended for the inbox. Server is Unix/Linux. We have our own webhosting domain server that handles company email. We do not use Exchange Server.
Category: Networking & Security       

P****y88
 [?]
Sign in to view client's details.
| P****y88
|    United States
Hourly Rate: Not Sure   |  Duration: 1-2 weeks  |  Posted: Jul 28, 2015  |  Ends: 13d, 6h  |   6 Proposals
I bought a new Windows 8.1 PC and upgraded to Pro to get Bitlocker. I work in financial services and use Google Drive, need an encrypted space for the files sync'd with Drive. I have Bitlocker on the entire drive right now but am thinking I'd rather carve off a partition. My current IT department (i.e., me) tried this and didn't get very far - the Drive sync would go through about 12 files and stop, so I gave up. Currently have Bitlocker protecting the whole C drive. I would like to have a separate drive for Google Drive to sync to, plus instructions on how to correctly work with Bitlocker and the separate drive for security. No urgency. Thanks, Cheryl
Category: Networking & Security       
Skills: Windows 8 Administration       
Preferred Location: United States

C****nes
 [?]
Sign in to view client's details.
| C****nes
|    United States
Fixed Price: $35 - $45   |  Posted: Jul 28, 2015  |  Ends: 5d, 1h  |   3 Proposals
***Please refer to attached pdf document for detailed specification 1. Please note that this is an assignment which is due on 3rd of August Write (Java or C/C++) UDP programs allowing two parties to establish a secure communication channel. For simplicity, let us call the programs "Host" and "Client", which are executed by Alice and Bob, respectively. Alice and Bob share a common password PW, which contains 6 numeric characters, and the parameters (p, g) for Diffie-Hellman key exchange. They want to establish a secure communication channel that can provide data confidentiality and integrity. They aim to achieve this goal via the following steps: (1) use the shared information to establish a shared session key; (2) use the shared session key to secure the communication. Step 1 is done via the following key exchange protocol: 1: A ------> B: EPW(gx mod p) 2: B ------>A:EPW (gy modp) Alice and Bob then compute the shared key as K = H(gxy mod p). Alice and Bob...
Category: Networking & Security       
Skills: Java EE, Java       

i****sai
 [?]
Sign in to view client's details.
| i****sai
|    Singapore
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Jul 28, 2015  |  Ends: 13d, 0h  |   12 Proposals
Hello. We are looking for a Juniper Engineer to help us out with some router issues and configuration of our network. If you are interested please post your Juniper qualifications and your hourly rate. We are using OSPF, VRRP and BGP so these are a must. Thanks.
Category: Networking & Security       
Skills: Juniper       

u****t4u
 [?]
Sign in to view client's details.
| u****t4u
|    United Kingdom
Hourly Rate: $30 - $40 / hr   |  Duration: Not Sure  |  Posted: Jul 28, 2015  |  Ends: 12d, 23h  |   2 Proposals
We're looking for a High Level Expert at A10 Vendor, who is well familiar with WAAF deployments and troubleshooting,following stuff should be implemented: - DDOS Protection - XML Filtering - Web scraping - Brute Force Attack - Parameter tempering - Broken authentication and session management - Insecure Direct Object References - Security Misconfiguration - Sensitive Data Exposure - Missing Function Level Access Control - Using Known vulnerable Components - Unvalidated Redirects and Forwards - Cross Site Scripting(XSS) - Cross-Site Request Forgery(CSRF)
Category: Networking & Security       

r****lib
 [?]
Sign in to view client's details.
| r****lib
|    Israel
Fixed Price: Less than $500   |  Posted: Jul 28, 2015  |  Ends: 12d, 23h  |   28 Proposals
I need my website redesigned. I am looking for a more modern and nice looking website for IT Services. Please share your designs and i will choose based on the best I need something creative and nice looking. I am open to CMS and Adobe Dreamweaver. I would like something that i cn modify if need be. Thanks Louie
Category: Networking & Security       
Skills: Security Analysis, Security Engineering       

l****v22
 [?]
Sign in to view client's details.
| l****v22
|    United States
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Jul 28, 2015  |  Ends: 12d, 22h  |   0 Proposals
This job entails consultation and production of a short report centred around the factors required for two types of robust mesh network. The first guarantees that all nodes are in the same small space such as a room and can have a direct connection to each other. The purpose of this network is to enable real time collaborative applications and so should be able to transmit a wide variety of data. A main feature of this is the ability of an application on the first node to share data such as CAD files with copies of the same application on other nodes. Each node may edit the data, save local versions or may send changes back to the first node where the changes are saved. This type of network needs an SDK to allow application developers to integrate the network. The second network type is based on way live streaming of HD video and sound. There are two types of nodes; a set of nodes which send 1080p video data or possibly 2* 1080p to a second set of nodes which act as receivers. The f...
Category: Networking & Security       

b****eda
 [?]
Sign in to view client's details.
| b****eda
|    Ireland
Fixed Price: $50 - $60   |  Posted: Jul 28, 2015  |  Ends: 12d, 21h  |   12 Proposals
Greetings We are looking for a network expert to demonstrate the following network utilities : Ipconfig and ping You will be required to write a report about each step and with a snapshot also explain the purpose for each command (Ip config and ping) must be submitted by30 july many thanks
Category: Networking & Security       

s****ksa
 [?]
Sign in to view client's details.
| s****ksa
|    Saudi Arabia
Fixed Price: Not Sure   |  Posted: Jul 27, 2015  |  Ends: 12d, 15h  |   8 Proposals
I am seeking a senior network engineer and network security expert to build a virtual layer above my product. I am a PhD in telecommunications and am seeking individuals with expertise in network protocols, wireless access controller design, and network security, specifically related to 802.11 WiFi. Here are some additional requirements: -Cisco certified -TCP/IP Guru -802.11abgnk standard expert -VPN/tunneling expertise a major plus Additional details will be discussed with qualified candidates. Best of luck.
Category: Networking & Security       

G****u09
 [?]
Sign in to view client's details.
| G****u09
|    Canada
Fixed Price: Not Sure   |  Posted: Jul 27, 2015  |  Ends: 12d, 15h  |   10 Proposals
Hello, I am seeking a senior network engineer and security expert (two individuals) to build a virtual layer above my product. I am a PhD in telecommunications and am seeking individuals with expertise in network protocols, wireless access controller design, and network security, specifically related to WiFi. Additional requirements: -Cisco certified -TCP/IP Guru -802.11abgnk standard expert -VPN/tunneling expertise a major plus Additional details will be discussed with qualified candidates. Thank you for your interest.
Category: Networking & Security       

G****u09
 [?]
Sign in to view client's details.
| G****u09
|    Canada
Hourly Rate: Less than $10 / hr   |  Duration: Not Sure  |  Posted: Jul 27, 2015  |  Ends: 12d, 14h  |   8 Proposals
I have purchased a Virtual Private Server (VPS) machine .I am not that comfortable in Unix (new to Unix) .I am looking for somebody who can help me understanding the architecture.Creating couple of users with restrictions to file system. Deliverable will be a word document/ppt that will include instruction for 1>Creating, deleting Users and setting the privileges and access to file system directories and subdirectories with all the commands 2> to access the files system using a GUI tool 3> to connect to MYSQL database remotely using a tool like toad for mysql etc 4>Security 5>FTP Accounts 6>Anything else if essential Budget $10-$20 for this .I will have more work related to Unix after this ---------------------------------------------------------- Add me in Skype. Skypeid is shijut2000
Category: Networking & Security       

s****000
 [?]
Sign in to view client's details.
| s****000
|    United States
Fixed Price: Less than $500   |  Posted: Jul 27, 2015  |  Ends: 12d, 14h  |   5 Proposals
Configure the Trusted Platform Module v2.0 to work with Linux Fedora 22. The system is an Intel NUC workstation.
Category: Networking & Security       

D****x86
 [?]
Sign in to view client's details.
| D****x86
|    United States
Fixed Price: Less than $500   |  Posted: Jul 27, 2015  |  Ends: 12d, 8h  |   3 Proposals
I also need this removed as 'malicous'   [obscured]  /results/currentbankforeclosure.com/ ... (I fixed the error that was causing this btw) so some kind of online form needs to be filled out at their site. Also, why is my site at   [obscured]  /signupnow showing as a malicious site by McAfee Site Advisor in SOME browsers when browsed through Internet Explorer? I'd like to fix this. You'll have to somehow search McAfee site to figure this out to find why and possibly submit some kind of online form telling them it's fixed. Thanks! Trent
Category: Networking & Security       
Skills: PHP, WordPress, Security Engineering       

c****vin
 [?]
Sign in to view client's details.
| c****vin
|    United States
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: Jul 27, 2015  |  Ends: 12d, 0h  |   3 Proposals
Need a expert level Python or Bash Shell scripting developer This is a brief overview. Every organization has some basic security baselines, such as default user/pass should not be there, default sites should not be there on the browsers, default service should not be running on each server etc. Similarly we have such security standards with servers such as IIS, OS, Web server, Linux, DB servers, network devices, there is a baseline security standards. The challenge we are facing is that every year they have to review a lot of servers and devices per the security standards. The goal is to automate this process so the developer is required to write a python script / shell script / or any program which can connect to the remote server, check settings to see if it is compliant to the security standards and produce a report on the security audit. In the report, if compliant say compliant and reason and if non compliant reason for non compliant for each server as well as group of servers....
Category: Networking & Security       

A****ics
 [?]
Sign in to view client's details.
| A****ics
|    United States
Symbol Key
Payment method not yet verified
Payment verified
Purchased $1-$500
Purchased $500-$5,000
Purchased more than $5,000
You have already submitted a
proposal to this job