The ultimate guide to hiring a web developer in 2021
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Network Security is an important component of IT solutions as it keeps organizations safe from cyber threats. A Network Security Consultant can help ensure a company's network is properly secured. They provide a range of expert services including evaluation of the existing security posture, recommending security solutions, providing project management and software solutions, monitoring and reporting on usage, incident response and forensics. Network Security requires a deep understanding of the underlying systems and processes.
Here's some projects that our expert Network Security Consultants made real:
Network Security is essential for any organization to remain safe from cyber threats online. Whether you need to review your existing Network Security posture, implement secure protection systems or create educational materials for internal staff, an experienced Network Security Consultant on Freelancer.com can help bring your ideas to life. Contact one now on the world's leading freelancing website and get the peace of mind that comes with secure networks.
Daripada 24,374 ulasan, klien menilai Network Security Consultants 4.83 daripada 5 bintang.Network Security is an important component of IT solutions as it keeps organizations safe from cyber threats. A Network Security Consultant can help ensure a company's network is properly secured. They provide a range of expert services including evaluation of the existing security posture, recommending security solutions, providing project management and software solutions, monitoring and reporting on usage, incident response and forensics. Network Security requires a deep understanding of the underlying systems and processes.
Here's some projects that our expert Network Security Consultants made real:
Network Security is essential for any organization to remain safe from cyber threats online. Whether you need to review your existing Network Security posture, implement secure protection systems or create educational materials for internal staff, an experienced Network Security Consultant on Freelancer.com can help bring your ideas to life. Contact one now on the world's leading freelancing website and get the peace of mind that comes with secure networks.
Daripada 24,374 ulasan, klien menilai Network Security Consultants 4.83 daripada 5 bintang.I’m stuck turning an Apple MDM .csr file into the required .pem file. I’m doing the conversion inside Keychain Access on macOS, but every attempt ends with the “Certificate conversion failed” message. What I need from you: walk me through – or remotely perform – the correct steps to generate a valid .pem file from my existing .csr, verify the result, and explain any tweaks (OpenSSL commands, Keychain settings, file-permission changes, etc.) so I can repeat the process on my own next time. Deliverable • A working .pem file derived from my provided .csr • A concise set of repeatable instructions outlining what you did and why, so I can update future MDM push certificates without hitting the same roadblock.
We need a WatchGuard AuthPoint specialist to integrate our authentication system with Atlassian Access for Single Sign-On (SSO) and Multi-Factor Authentication (MFA) as we migrate to Atlassian Cloud. Requirements: • Proven experience with WatchGuard AuthPoint implementation and configuration • Extensive knowledge of Atlassian tools, particularly Atlassian Access • Experience integrating SSO and MFA solutions • Strong understanding of security compliance and industry standards • Ability to create comprehensive technical documentation • Excellent communication skills for training IT staff and end-users • WatchGuard and Atlassian certifications preferred Deliverables: • Complete assessment of current authentication infrastructure • Detailed integ...
I’m finalising an MDM solution and the last step is converting my certificate signing request into the .pem file the system expects. On macOS I create the .csr with a GUI app, yet when I feed that file into the conversion process I consistently get “File access denied”. I need you to: • diagnose why this particular .csr is being rejected, • successfully generate the required .pem, and • show me the repeatable steps (or correct settings/permissions) so I can recreate the file myself when the certificate renews. If you prefer using Terminal-based OpenSSL or have another reliable workflow, that’s fine as long as the end result is a valid .pem that my MDM server accepts. Quick turnaround is appreciated; as soon as the file works I’ll rel...
Hi I will share the details with the shortlisted candidates. Thanks
I’m running a Linux VPS on Ubuntu and need a fresh OpenVPN installation configured as a site-to-site tunnel to my office network. Default security settings are fine—no extra encryption tweaks or two-factor layers required—so the goal is simply a reliable, auto-starting link that routes selected subnets both ways. Here’s what I expect from you: • Install the latest OpenVPN packages, enable IP forwarding, and apply any necessary UFW/iptables rules. • Create the CA, keys, and certificates, then build matching server and peer configurations. • Supply the peer-side .ovpn (or equivalent) file and guide me through importing it on our edge router or secondary Linux box. • Verify traffic flow end-to-end (ping, basic service checks) and ensure the ...
I run an e-commerce site and need a specialist to connect the domain to Cloudflare, tune it for best practice security, and make sure the key response headers are in place. Here is what I’m after: • End-to-end Cloudflare configuration on my primary domain, including DNS records moved or verified inside the Cloudflare dashboard and the site fully proxied behind their network. • An active, valid SSL/TLS chain so every page loads via HTTPS without mixed-content warnings. • Implementation of modern security headers—at minimum Content-Security-Policy, Strict-Transport-Security, and X-Frame-Options—plus any others you recommend for an online store. • A quick performance sanity check (caching rules, Brotli, image optimization, etc.) so I’m ge...
I’m looking for rapid, hands-on help to diagnose and fix a production server that is currently misbehaving. The priority is to identify the root cause, apply a clean fix, and document what was done so the issue does not re-appear. Please tell me about the similar server problems you have resolved in the past, the technologies or operating systems you are most comfortable with, and roughly how quickly you can begin. Solid, relevant experience is what will guide my choice.
Please find new request for Norway. ETA: Monday at 9 AM LT. Engineer should be competent to handle the access switch replacement/installation on his own. There won’t be any onsite support. Note Engineer should bring Label printer in small in size Engineer should have Laptop with WebEx installed and other necessary tools i.e. Screw driver, laptop, console cable, network cable and phone with hotspot, Address: Stokkastrandvegen 85, 5578 Nedre Vats, Norway
I need a security specialist to help me lock down the personal data we hold. At the moment information can be viewed too broadly; my goal is to make sure that only properly-authorised staff ever see it, and that every access attempt is recorded and auditable. Here is what I’m after: • Map the data flows and identify every location where personal information is stored or processed. • Design and implement role-based access controls so the system automatically limits visibility to authorised personnel only. • Integrate strong authentication (MFA preferred) and session management that times out inactive users. • Set up detailed audit logging and alerting so I can review who accessed what, when, and from where. • Provide concise documentation and a hand-...
My Huawei MA5600T-01 needs to report itself as a different model in the system. The specific target is flexible—MA5600T-02, ‑03 or even ‑04—so long as the change is recognised by the OLT’s software and downstream management tools. I am pursuing this for internal technical reasons rather than a feature upgrade or hardware repair, so the board, firmware and service profiles must remain fully functional after the swap. Here is what I expect from you: • Identify the safest method (CLI, XML config, board ID rewrite, or firmware patch) to alter the model string. • Provide or execute the exact commands/patch, verify the new identifier shows correctly in display version / display board, and ensure services come back online. • Supply a concise rollback proce...
I need a seasoned ethical hacker to carry out a full-scope security assessment of my environment. The end goal is simple: uncover any vulnerabilities before malicious actors can exploit them, then give me clear, actionable steps to fix them. Please outline your relevant experience when you reply—real-world projects, certifications (e.g., OSCP, CEH), and any notable results will help me understand how you approach engagements like this. Scope • Reconnaissance and vulnerability discovery • Exploitation and privilege escalation (within agreed boundaries) • Post-exploitation risk analysis • Clean, well-structured reporting that ranks issues by severity and urgency Deliverables 1. Executive-level summary (non-technical) 2. Detailed technical report...
I hold a non-provisional patent and five CIPs, all free of prior art, that describe a new way to move malware detection out of individual devices and into an ISP’s core. The vision is outlined at ; now I’m ready to turn the concept into a production-grade operating system. I need a developer who can architect and code the entire stack—kernel through management layer—in Python (preferred), and/or choosing whatever base platform makes the most technical sense. High-speed, in-line detection is the top priority, yet the OS must remain easy to manage and scale seamlessly across millions of subscriber links. A clean, intuitive interface for network operators is essential. Cursor users are especially welcome, and I’m aiming for a long-term relationship that could e...
I need a full on-site Wi-Fi survey carried out in a commercial building using an Ekahau Sidekick and the latest Ekahau software. The sole objective is to capture accurate signal-strength data throughout the premises so I can visualise coverage, spot dead zones, and back up any upgrade decisions with hard numbers. During each walkthrough please log not only RSSI values but any factors that could be degrading the signal. I am particularly mindful of three common culprits—electronic devices that radiate noise, structural obstacles such as reinforced walls or tinted glass, and neighbouring networks that may be crowding the same channels—so be sure these are annotated in the project file. At hand-off I expect: • The complete Ekahau project file (.esx) with all raw measureme...
I’m facing persistent outbound packet loss on my Linux server. The problem appeared a few days ago, right after I upgraded my hosting plan, and it has started to affect production-level traffic. Latency is acceptable and inbound packets arrive cleanly; only the outbound stream is dropping frames. I need someone who can jump in immediately, trace the root cause, and apply a permanent fix. Typical tools for the job might include tcpdump, traceroute, iptables, nftables, netstat, or any monitoring utilities you prefer—as long as the solution is clearly explained and reproducible. Acceptance criteria: • Outbound traffic shows 0 % (or normal-range) packet loss under load tests. • A short summary of what was wrong and the exact commands or configuration changes you app...
Requerimiento de Técnico capacitado para configurar el equipamiento de red de acuerdo al detalle que figura a continuación: Propuesta Técnica Completa – Laboratorio de Informática (VERSIÓN CORREGIDA) 1. Situación Actual 1.1 Infraestructura de Servidores Dos servidores, clones y poseen: • CPU: Intel Xeon E3-1225 (4c/4t – 3.2 GHz, sin hyper-threading) • RAM: 32 GB • Almacenamiento: SSD SATA (suficiente para la carga actual) • Sistema Operativo: Windows Server 2016 • Rol: Host de sesiones para terminales NComputing (vSpace) • Carga actual: o 17/18 L300 NComputing por servidor (35 totales) o Uso: navegación, multimedia, multitarea ligera/media ________________________________________ 1.2 Redes • Sw...
My encrypted Excel workbook needs a realistic security workout. The file is protected with AWS, not sure what exact security is there, and I want to be confident that an unpaid or otherwise unauthorised user could not slip past that single control. The scope focuses on breaking the protection that could ultimately give an outsider access to the file without the key. Please capture every step, tool, and timeframe you use. Deliverables • Replicable proof-of-concept showing how access was (or was not) gained • A concise report summarising methods attempted, level of effort, and recommendations for hardening the workbook against similar attacks If the bypassing period is too short, the project will not end till we improve the security ourself and retest it with you If you...
I need immediate help fixing an OBS streaming setup that has stopped working. The system was previously set up but the connection has broken. The video stream from a MacBook Pro is no longer reaching the receiving computer. What needs to be done: • Reconnect OBS between MacBook Pro and Windows mini PC • Restore the video stream so it sends over the internet reliably • Ensure the Windows mini PC outputs the video via HDMI • Confirm the HDMI feed goes into a UGREEN HDMI to USB capture card • Ensure the capture card appears as a webcam in Microsoft Teams • Connect an additional third computer to also receive the same video stream Requirements: • Must be able to work remotely via AnyDesk or similar • Strong experience with OBS and streaming setups &...
Our campus network runs on a Fortinet stack—FortiGate firewalls at the core and FortiAP access points across three buildings. I need an experienced Fortinet administrator to tighten security, build out VPN connectivity, and tune ongoing visibility. Scope of work • FortiGate Firewall – create or refine security policies that segment users, servers, and guest traffic while following best-practice hardening. • FortiGate Firewall – set up site-to-site and remote-access VPNs, test fail-over, and document the steps so I can replicate them. • FortiGate & FortiAP – enable and verify logging to our existing syslog/SIEM, ensuring alerts surface the right information without noise. • FortiAP – confirm wireless profiles and VLAN assignment...
I’m putting in a modest public Wi-Fi service—think 200 Hectars Farm size—and I need an engineer who can own the end-to-end network setup. The target load is no more than 50 simultaneous users, so the design should balance rock-solid reliability with sensible hardware costs. Here’s what I’m after: • Produce a simple network plan that covers coverage mapping, access-point count/placement, and backhaul requirements. • Recommend specific hardware (APs, controller or cloud-managed option, PoE switch, firewall) that’s readily available in my region. • Configure the SSID(s), security (WPA2/WPA3-Personal plus guest isolation), basic traffic shaping, and a branded captive portal for terms-of-service acceptance. • Provide clear documenta...
Busco un profesional con experiencia real en recuperación de webs comprometidas, hardening de servidores Linux, seguridad web y configuración avanzada de Cloudflare. Hemos sufrido un ataque: comprometieron nuestra web y el servidor fue infectado hasta el punto de que terminó participando en un ataque DDoS hacia terceros. Como consecuencia, Google marcó nuestro dominio como spam, pese a que antes teníamos una reputación muy buena. Situación actual Tenemos una copia de seguridad completa de la web. Disponemos del servidor con Ubuntu 24.04. La web ya estaba detrás de Cloudflare, pero aun así fue comprometida. Necesitamos volver a publicar la web, dejarla plenamente operativa y blindar la infraestructura al máximo. Qu&eacu...
I need a full-featured VPN application built for Android, iOS, and Windows. The core experience must feel identical on every platform: users pick a server, hit connect, and enjoy a secure, leak-free tunnel. Essential functionality • Server list that can be refreshed remotely, sorted by real-time ping, and filtered before connection • One-tap Server selection plus an Auto-connect option that obeys user rules (on app launch, on unsafe Wi-Fi, etc.) • Always-on Kill switch that survives network changes and guarantees zero traffic outside the tunnel • DNS management inside the app so I can point users to custom resolvers or a local blocker Protocol support OpenVPN (TCP & UDP), WireGuard, L2TP, and an HTTPS Proxy mode must be selectable per server or globally. Swi...
I’m looking for an experienced developer or system/network specialist to help me configure a Windows-based AI proxy application. What I need: Configure SSL properly for the application Modify Windows hosts file and routing so that API requests are redirected Ensure all requests to providers like OpenAI / Anthropic go through the app instead of default endpoints (e.g. ) Verify everything works correctly with my current setup My current setup: I already have access to multiple GPT accounts I use APIs and tools like OpenClaw / OpenCode The app I want configured is installed from Microsoft Store: Requirements: Strong experience with: Windows networking SSL / certificates Hosts file and traffic redirection API routing / proxy tools Must be able to remote into my PC (via AnyDesk / T...
Saya sedang mengembangkan sektor teknologi perusahaan dan kini memasuki tahap pembangunan infrastruktur IT. Fokusnya adalah merancang serta mengimplementasikan pusat data dan rangkaian server yang andal. Apa yang saya butuhkan: • Desain teknis pusat data lengkap—layout ruang, kapasitas daya, pendinginan, dan redundansi • Spesifikasi hardware server beserta rekomendasi rack, UPS, dan sistem monitoring • Rencana implementasi tahap-demi-tahap: pengadaan, instalasi, konfigurasi, dan uji beban • Dokumentasi konfigurasi, prosedur pemulihan bencana, serta panduan operasional harian Lingkungan kerja kami bersifat modern; kami terbuka menggunakan solusi virtualisasi (VMware, Proxmox, atau alternatif setara) dan otomatisasi (Ansible, Terraform) selama meningkatkan e...
My PC gaming sessions in Dubai are being plagued by high ping, random connection drops, packet loss, and a range of other performance hiccups. I’m on a cable line right now, but it clearly isn’t tuned for competitive play. I’d like an expert who can visit my apartment, run proper diagnostics on-site, and leave me with a rock-solid, low-latency connection. Here’s the flow I have in mind: • On-site assessment of the current cable setup (modem, router, internal wiring, NIC settings). • Immediate optimisation or replacement of any mis-configured hardware or cabling you find. • Clear before-and-after metrics—ping, jitter, and packet-loss reports—so I can see the improvement. If additional gear or an ISP plan change is advisable, walk m...
The Envision 1500 unit is already on-site at the customer location in Bø i Telemark, Norway. I need an English-speaking field engineer to visit, connect the device to the local network, complete the on-box configuration, and run a basic functional test so we can sign off the job remotely. You’ll be leaning mainly on your experience in networking installation, device configuration, and troubleshooting to make sure the system comes online without issues. Once the unit is up, a quick walk-through with my remote team (video or phone) will confirm all status checks pass. Deliverables • Physical installation verified and neatly cabled • Network connectivity established (IP address assigned and reachable) • Core configuration applied per the quick-start documen...
I need a certified ethical hacker to put my production web application through a thorough vulnerability assessment. The assignment is strictly white-hat: you will have full, written authorization to probe the app so long as no customer data is altered or deleted. My sole objective is to identify every exploitable weakness you can find—misconfigurations, logic flaws, injection points, broken authentication, anything that could be abused in the real world. Tools such as Burp Suite, OWASP ZAP, Nikto, or custom scripts are welcome as long as the methodology is reproducible and aligns with current OWASP Top 10 practices. Deliverables • A clear, well-structured report that lists each vulnerability, proof-of-concept evidence, severity ranking, and recommended remediation steps....
Environment Dedicated server on OVH OS: Linux DNS server: BIND (named) Nameservers: → → (OVH failover IP) Problem Domains (e.g. , ) are configured and working locally, but fail globally with: SERVFAIL No Reachable Authority Example: dig @8.8.8.8 → SERVFAIL What has been verified BIND is running correctly Zones are properly configured and loaded SOA records respond correctly on both nameservers Both NS respond locally Glue records are correctly configured at the registrar Nameservers are correctly delegated at the TLD level Firewall (iptables) allows TCP/UDP port 53 DNS service is listening on both IPs Failover IP is assigned to the server interface Key Findings From another OVH server: dig @ → timeout dig @ → timeout Packet loss detected when pinging the ...
My cPanel/WHM mail server for keeps landing on the Spamhaus blocklist and mail flow stops every time it happens. The stack is straightforward—IBM hardware → VMware ESXi → AlmaLinux VM running WHM/cPanel—all hosted in our own data-center. I have already opened tickets with Spamhaus, but the listing returns as soon as they clear it, so the root cause clearly sits on our side. static IP we bought from Airtel What I need from you is a thorough audit of the server and its surrounding network to identify exactly why Spamhaus keeps flagging us and then to implement a lasting fix. That may include reviewing rDNS, SPF, DKIM, DMARC, HELO practices, outbound filtering, queue hygiene, firewall rules, and any reputation or relay issues you discover. If you spot configuration we...
I want a system, whenever a file has been transferred to another pc via networking that pc will play a custom sound message something like new file arrived kindly check.
I need my new FortiGate 80F installed and fully integrated into the existing LAN so that the whole environment benefits from stronger security without sacrificing speed. The key outcome is a balance of protection and performance: traffic must be scanned, filtered, and shaped while keeping latency low for everyday business applications. Configuration requirements • Security posture – enable intrusion-prevention, anti-virus, and web filtering profiles that block known threats and unwanted content. • Internet use control – create policies that (a) block or allow specific websites, (b) throttle bandwidth for heavy-use categories like streaming, and (c) log user activity for later review. • Performance tuning – apply best-practice SD-WAN and bandwidth all...
I am currently working on a cybersecurity-focused project and am seeking an experienced professional or company to collaborate with. The ideal partner should have strong expertise in penetration testing (pentesting) and the ability to provide and/or develop cybersecurity software solutions. Scope of Work: Perform penetration testing on systems and applications Identify vulnerabilities and provide detailed security reports Develop or integrate cybersecurity tools and software Support the design and development of secure applications Recommend best practices for strengthening overall security posture Requirements: Proven experience in penetration testing and vulnerability assessment Strong background in cybersecurity tools and frameworks Experience in developing cybersecurity application...
We are looking for a highly skilled Network Engineer with deep experience in MikroTik and ISP-level networking. You will be responsible for designing, managing, and optimizing our global network infrastructure, ensuring high availability, low latency, and strong protection against abuse and attacks. This role is critical to maintaining performance and stability across our VPS and hosting platforms. Key Responsibilities Design, deploy, and manage MikroTik-based network infrastructure Configure and maintain BGP sessions with multiple upstream providers (e.g. HE, IX, transit providers) Perform traffic engineering (local-pref, MED, communities, route filtering) Implement and optimize DDoS mitigation strategies (L3/L4 protection, filtering, rate limiting) Monitor network performance (latency, p...
I'm seeking assistance to fix a connectivity issue with my Brother multifunction model 8710-DW scanner, which is connected to a network router. Currently, the scanner is not recognized on the network. Ideal Skills and Experience: - Experience with networked devices and routers - Familiarity with Brother multifunction printers and scanners - Strong troubleshooting skills for network connectivity issues Please provide a detailed plan and timeline for the repair.
Sila Dafter atau Log masuk untuk melihat butiran.
Preciso colocar um Ubiquiti UniFi Gateway USG Pro 4 para funcionar em minha rede residencial cabeada. Quero que todo o processo de configuração inicial fique pronto, incluindo: • Definição das interfaces WAN/LAN, VLANs e DHCP • Aplicação das melhores práticas de segurança básicas do UniFi Controller • Ajustes para garantir estabilidade em uma estrutura somente cabeada (não haverá Wi-Fi neste projeto) Já possuo acesso ao UniFi Controller e ao equipamento instalado no rack; falta mesmo é a configuração detalhada. Aceito que o trabalho seja feito por acesso remoto, desde que me explique cada etapa para que eu possa manter o sistema depois.
I need a static, dedicated IPv4 address that geolocates to Altoona, Pennsylvania so I can log into my company’s Cato Networks VPN while I’m working from Medellín, Colombia. The goal is simple: when I connect, all company systems must see me as if I’m physically in Altoona, enabling full remote-work access with no compliance flags or location warnings. Because Cato Networks sits between the endpoint and the corporate network, the solution has to play nicely with their client or socket. If you’ve done custom routing or IP whitelisting with Cato before, that experience will help a lot, but solid networking skills and an understanding of how to present a clean residential or business-class IP to geolocation services are what really matter. I’m not complet...
I need a qualified technician to plan and install a complete CCTV system in my residence. The property layout still has to be assessed, so the exact number of cameras will be decided on-site after you review blind spots, entry points, and any local wiring constraints. Key expectations • Advise on the most appropriate camera types, DVR/NVR, cabling, and storage solution for a typical family home. • Handle the full physical installation: mounting, power, and clean cable runs. • Configure recording schedules, motion alerts, and remote-view access on mobile and desktop. • Walk me through basic maintenance and troubleshooting once the system is live. I already have a stable internet connection and am open to your recommendation on brands or keeping it brand-agn...
I have a single Windows workstation that suddenly refuses to load or log in to 3CX, no matter which browser I try. Every other user in the office reaches 3CX without a hitch, so the fault is clearly isolated to this one PC. No recent changes have been made to its firewall rules or any other system settings, which makes me suspect a small, overlooked configuration conflict. I need someone who can connect remotely, inspect the current Windows firewall behaviour, pinpoint whatever is blocking 3CX, and restore normal access. Once the fix is applied I want to be able to open the web client and the desktop app without hits or time-outs. Please let me know how soon you can jump in, what remote tool you prefer, and roughly how long you anticipate the repair will take.
I’m upgrading the network in our office building and need a specialist to supply, install, and configure three to five wireless routers. The job covers everything from mounting the hardware and running any necessary cabling to optimising the settings so staff on every floor enjoy a stable, secure connection. You’ll start with a quick walkthrough of the premises to confirm ideal router placement, then handle the physical installation (wall or ceiling mounts, power, and data connections). Once the units are up, I’ll need you to configure SSIDs, security, VLANs, and QoS so the network is ready for immediate use. Please finish with signal-strength testing in each workspace and provide a concise hand-over document that lists router login details, final channel maps, and any r...
If you want to stay competitive in 2021, you need a high quality website. Learn how to hire the best possible web developer for your business fast.
Learn how to find and work with a top-rated Google Chrome Developer for your project today!
Learn how to find and work with a skilled Geolocation Developer for your project. Tips and tricks to ensure successful collaboration.