Find the best freelance Encryption jobs over 42 jobs for your full-time, part time or work from home opportunity and work with top rated clients on the top growing & trusted hiring platform connecting savvy businesses and professional freelancers.
My instagram has been hacked into by a fake link and they changed on my info on my account. I tried to reset my password but come to find out my email was changed and all my recovery emails and number was also changed. I got in contact with instagram and i have not heard back from them. This has been happening to many people and...read more
This position is for a dedicated and meticulous Network and Cybersecurity Administrator with the ability to operate independently. Responsible for ensuring our software, hardware, data and related components, are protected from cyber-attacks. First task will be to conduct a thorough vulnerability assessment and review current ar...read more
Hey, I'm trying to set up a proper security system for my home lab. I'm currently trying to set up SecurityOnion with Hyper-V but I'm unable to get anything other than OSSEC alerts in squert. I am monitoring the 1 NIC on the computer and the management NIC is using the Hyper-V virtual LAN.I am seeking someone who has a lot of ex...read more
SSL Certificate We are looking for a resource for deployment of Wild Card SSL Certificate - with support for Unified Communication Certificates, Organization Validation and Wild Card for multiple domains. There are total of 48 servers. Scope of work will include the following. Full Subject Alternative Name (SAN) control Organiz...read more
A reverse engineer who is excellent with unpacking and deobfuscating code (electron JS applications). One who can mimic authentication endpoints to yield a true response. We will be creating a similar patcher that will mimic the authentication and we will be creating our own authentication to call upon our authentication server...read more
Hii need to add a function to a my python script.It should work in this way1. send a request using 4 variables loaded in a txt file. As response you will get a new variableit must be saved in the txt 2. second a new request using 5 variables from a txt file plus another variable that must be encrypted