Vmdk forensics työt

Suodata

Viimeisimmät hakuni
Suodatusperuste:
Budjetti
asti
asti
asti
Tyyppi
Taidot
Kielet
    Työn tila
    1,271 vmdk forensics työtä löytyi, hinnoittelu EUR
    Suspicious Activity Investigation Expert 6 päivää left
    VARMENNETTU

    I am in need of an experienced hacking professional. I have been detecting suspicious activity on my personal website and mobile numbe...an experienced hacking professional. I have been detecting suspicious activity on my personal website and mobile number and need assistance. Your main task would be to: - Investigate the specific incidents - Retrieve access logs To successfully accomplish this, you must have: - Prior experience in ethical hacking - Strong background in data investigation - Thorough knowledge of digital forensics As the legal owner of the website and mobile number, I am looking for transparent and ethical work only. Any foul play will not be tolerated. Please place a bid only if you are comfortable with these requirements and can provide a full investigati...

    €35 (Avg Bid)
    €35 Keskimäär. tarjous
    5 tarjoukset

    I need a professional who can dissect my iPhone logs and provide detailed insights. The ideal candidate should be proficient in the following areas: - iPhone log analysis: You should have experience in extracting and analyzing iPhone logs, especially the requested data like app usage, location, and potential malware, suspicious or kernel access. - Data interpretation: You should be skilled at understanding log data and transforming it into comprehensive, understandable reports. - Security: A strong background in cybersecurity is essential, as you will be examining for potential threats, breaches, or unauthorized access. Please note, I have the logs in a text file already. This project requires a high level of attention to detail, a thorough understanding of iPhone logging, and the a...

    €81 (Avg Bid)
    €81 Keskimäär. tarjous
    3 tarjoukset

    ...strong background in this field, with proven expertise and enhanced skills. Expectations from the investigation include: • High level of detail: I need precise features clearly identified, even clear text if possible. The ultimate goal is to achieve the best possible clarity on the obscured parts of these crucial images. Therefore, this job best suits individuals who are proficient in digital forensics, image enhancement algorithms, and any related visual data extraction techniques....

    €124 (Avg Bid)
    €124 Keskimäär. tarjous
    14 tarjoukset

    ...playbooks - Assess DDoS detective and preventive controls from a technology infrastructure and security perspective - Audit the configuration and setup of network appliances (routers, switches, firewalls) for security best practices - Review and optimize the SIEM (Security Information and Event Management) solution's use cases for quality, coverage, and effectiveness - Conduct a comprehensive Digital Forensics and Incident Response (DFIR) assessment, including producing a detailed incident report - Provide recommendations for enhancing DDoS mitigation capabilities, incident response processes, and overall security posture - Collaborate with client stakeholders, including IT security teams, network administrators, and executive leadership Qualifications: - Minimum 5 years o...

    €74 / hr (Avg Bid)
    €74 / hr Keskimäär. tarjous
    5 tarjoukset
    Advanced CTF Challenges Solving 2 päivää left
    VARMENNETTU

    I'm looking for a skilled professional who can solve advanced level CTF challenges, in various categories. I need someone who can tackle challenges in Web Exploitation, Binary Exploitation, Cryptography, as well as other categories like web, forensics, osint, and more. Key Responsibilities: - Solve advanced level CTF challenges in multiple categories Ideal Skills and Experience: - Extensive experience with CTF challenges - Proficiency in solving challenges in Web Exploitation, Binary Exploitation, Cryptography, web, forensics, osint, etc. - Proven track record of solving advanced level CTF challenges - An understanding of security concepts Please note that the specific programming languages or platforms to be used in solving the challenges are not specified, but yo...

    €586 (Avg Bid)
    €586 Keskimäär. tarjous
    30 tarjoukset

    I urgently require a professional with a solid background in digital forensics. Your primary task would be to recover deleted content from a PDF, despite the lack of the original for comparison. The recovered data will be utilized for data analysis. Key Details: - Urgency: The project needs to be completed within the next two days, so please only apply if you can meet this deadline. - Purpose: The primary objective is data analysis, so the quality and completeness of the recovered content is crucial. Ideal Candidate: - Strong Background: A professional with proven experience in digital forensics. - Time Management: Ability to work quickly and effectively to meet the ASAP deadline. - Attention to Detail: A meticulous approach to recovering, examining, and presenting the data...

    €98 (Avg Bid)
    €98 Keskimäär. tarjous
    5 tarjoukset

    I've detected suspicious activity on my home network and need a detailed analysis of my network traffic. The primary devices and services on my network that I'm concerned about include personal computers, smart home devices, and networking equipment (routers, switches).

    €26 / hr (Avg Bid)
    €26 / hr Keskimäär. tarjous
    19 tarjoukset

    ...unauthorized access to my devices, which have been ongoing for more than a month. - Identify and eliminate any tracking mechanisms placed on my laptop, phone, Roku TV, and vehicle. - Diagnose and repair any unusual device behavior or performance issues that may be attributable to hacking or tracking. The ideal candidate should have: - Proven experience and expertise in cybersecurity, digital forensics, and ethical hacking. - Up-to-date knowledge of the latest hacking and tracking methods. - Proficiency in diagnosing and resolving unusual device behavior and performance issues. - Strong problem-solving and analytical skills. - Excellent communication skills to provide regular updates on the progress of the security sweep and eradication. I am looking for someone who is trustwort...

    €535 (Avg Bid)
    €535 Keskimäär. tarjous
    9 tarjoukset

    I am seeking a professional with a strong background in digital forensics who can assist in recovering deleted content from a PDF file. I do not have the original file for comparison, and I am not aware of the specific content that has been deleted. Key Requirements: - Proven experience in digital forensics, specifically with PDF files - Ability to recover deleted content without access to the original file - Excellent problem-solving skills to investigate and identify potential content deletion - Comprehensive report providing the recovered content and the changes made to the file. Ideal Candidate: - Holds a degree in computer science, cyber security or related field - Has handled similar projects in the past proficient in digital forensic software and tools - Communicat...

    €58 (Avg Bid)
    €58 Keskimäär. tarjous
    4 tarjoukset

    I have a voice recording which I need helps to determine the source of a specific noise. The recording originates from a phone and the noise occurs at the beginning of the recording. Key requirements are: * Audio forensics experience * Familiarity with sounds and noises specific to phones and their internal workings * Ability to provide a clear, understandable explanation of the identified noise. Your task will focus solely on identifying that particular noise. No transcribing or other tasks are required. Your expertise in auditory analysis will decide the success of this project.

    €39 (Avg Bid)
    €39 Keskimäär. tarjous
    11 tarjoukset

    ...noise reduction. This is an infidelity situation so there may be NSFW sounds throughout the recording. Key Requirements: - Audio Expertise: Experience in forensic audio analysis, particularly in noise reduction and clarity enhancement, is essential for this project. - WAV Format: The files are in WAV format, so proficiency in this format is crucial. Ideal Candidate: - Experienced in Audio Forensics: You should have prior experience handling similar personal audio restoration projects. - Strong Technical Skills: Proficiency with tools and techniques to enhance audio clarity and reduce noise. - Excellent Communication: Ability to understand the nature of the audio recordings and deliver clear, improved versions. The file was too big to upload so here is the link on Google dri...

    €72 (Avg Bid)
    €72 Keskimäär. tarjous
    28 tarjoukset

    Hi all, I have urgent requirement for a specialist in forensic video analysis to verify the credibility of a CCTV footage captured from an indoor surveillance camera. The exact resolution is uncertain. Skills and experience required: - Expertise in video forensics - Ability to deal with all degrees of video resolution - Familiarity with indoor CCTV systems, also outdoors. Your task will involve determining the authenticity of the footage which could include identifying any signs of tampering or editing. Your professional insight is essential in this task. A detailed report backing your findings would be appreciated. Potentially more work on a job well done ? N. 0412 458 441

    €85 (Avg Bid)
    €85 Keskimäär. tarjous
    6 tarjoukset

    I'm in need of an intermediate level -senior incident response/digital forensics specialist /Linux sysadmin familiar with triage, mitigation/containment , remediation and report writing. To do a on the job walk through of challenging tasks. So I can shadow watch ad take notes, for my thesis and upcoming internship. • Skills and Experience: - Incident response - Linux sysadmin - SOC Analysis with Sentinel, Splunk, Crowdstrike etc - Digital forensics - Report writing We are looking to record step by step actions taken on any job of your choice, preferably something you are already working on , company names will be changed . This project is to support my thesis and also to help improve skills and speed with incidents Looking for an affordable...

    €64 (Avg Bid)
    €64 Keskimäär. tarjous
    17 tarjoukset

    ...Requirements: - Detecting Image Substitution: I'm particularly concerned with identifying whether the image has been substituted or tampered with in any way. - Patient Identifiers Inconsistencies: I want to check for inconsistencies in patient identifiers, especially regarding mismatched patient names or incorrect patient ID numbers. Ideal Skills & Experience: - Proficiency in image analysis and forensics. - Experience working with medical image data. - Knowledge of common image tampering techniques. - Strong understanding of patient identifier standards in medical imaging. - Ability to provide a detailed report on the analysis findings. Please include in your proposal your relevant experience and approach to this task. A successful candidate should be able to provide ...

    €952 (Avg Bid)
    Salassapitosopimus
    €952 Keskimäär. tarjous
    9 tarjoukset

    I'm currently seeking someone skilled in telecommunications and cloud-based systems to help me uncover who is using a specified cloud number to send me text messages. Critical aspects of this task include: - The cloud number in question is 3018510207. - I have been receiving suspicious and unwanted messages from...have been receiving suspicious and unwanted messages from this number. - The information I have so far comprises the number itself, the timing of messages, and their content. An ideal candidate for this project would be proficient in investigating and identifying users of cloud numbers, with specific expertise in Google Voice, Twilio or Skype numbers. A background in cybersecurity or digital forensics would be advantageous. Confidentiality and discretion are crucial...

    €490 (Avg Bid)
    €490 Keskimäär. tarjous
    18 tarjoukset

    As a professional looking to enhance my knowledge of cybersecurity, I'm seeking an online trainer with advanced-level expertise. The trainer must be proficient in the following areas: - Network Security - Software Security - Incident Response and Forensics - Azure Cloud Security My preference is for online training, so skilled use of web-based interactive platforms is a must. Schedule: Monday to Thursday 1 hour each. US (CST) time zone in the evening. 8.30 pm to 9.30pm or 8.00pm to 9.00pm (CST) Successful applicants ought to present verifiable credentials in the field of cybersecurity and professional experience as an advanced-level educator. Proposals should detail course plans and methodologies, showing a clear understanding of how to convey complex concepts in an enga...

    €550 (Avg Bid)
    €550 Keskimäär. tarjous
    22 tarjoukset

    ...relevant notation and write out equations using Equation Editor in Word. e. Note – the rule of thumb is that any reader can pick up your report and replicate your results by following the methods. 2. Use mean values of each parameter to construct an “average” solution. a. Unit of interest – a DNA sample collected by a CSI. That is, each sample must be modelled individually. b. Assume both CSI and forensics lab operations work 24/7. c. Model precisely ONE WEEK of sampling – any samples that are have not been completely processed by one week are not included in your analysis. d. The unit of time to use in the model is minutes. e. There is one Rapid DNA sequencer, which is only run once all eight spaces in the cartridge are filled with samples. f. You M...

    €157 (Avg Bid)
    €157 Keskimäär. tarjous
    22 tarjoukset

    ...relevant notation and write out equations using Equation Editor in Word. e. Note – the rule of thumb is that any reader can pick up your report and replicate your results by following the methods. 2. Use mean values of each parameter to construct an “average” solution. a. Unit of interest – a DNA sample collected by a CSI. That is, each sample must be modelled individually. b. Assume both CSI and forensics lab operations work 24/7. c. Model precisely ONE WEEK of sampling – any samples that are have not been completely processed by one week are not included in your analysis. d. The unit of time to use in the model is minutes. e. There is one Rapid DNA sequencer, which is only run once all eight spaces in the cartridge are filled with samples. f. You ...

    €118 (Avg Bid)
    €118 Keskimäär. tarjous
    24 tarjoukset

    I am looking for a creative designer with experience in creating logos, especially in technical forensics (non-government or crime). The brief involves creating a modern logo for my technical consulting work. This is what I am looking for: - I want the following colours dark blue,grey, white, black silver and or gold to be incorporated into the logo design. They are crucial to the overall look and feel. - The registered name is << ********** >> - The style should lean more towards modern. Yet it should fit with technical consultancy and my professional attitude. -In addition, the logo design should be incorporated into letterheads , letters, notepads, envelopes, name cards, other cards, you know Designers with experience in designing for the consultancy world are h...

    €33 (Avg Bid)
    €33 Keskimäär. tarjous
    60 tarjoukset

    I am currently dealing with the aftermath of a trolling incident. I am looking for an expert in email forensics and cybersecurity to help me identify the person who's been flooding my inbox with troll messages. Even though I successfully blocked the sender, I am confident that I know this individual personally. Hence, I need to uncover their identity. The ideal candidate for this job will have: - A solid background in email forensics - Proven experience in channel tracing and identification - Knowledge of IP tracing would be a massive plus - An ability to maintain utmost confidentiality - Excellent problem-solving abilities. Please note that this is a sensitive issue and only serious, professional freelancers are requested to bid for this project.

    €133 (Avg Bid)
    €133 Keskimäär. tarjous
    8 tarjoukset

    ...relevant notation and write out equations using Equation Editor in Word. e. Note – the rule of thumb is that any reader can pick up your report and replicate your results by following the methods. 2. Use mean values of each parameter to construct an “average” solution. a. Unit of interest – a DNA sample collected by a CSI. That is, each sample must be modelled individually. b. Assume both CSI and forensics lab operations work 24/7. c. Model precisely ONE WEEK of sampling – any samples that are have not been completely processed by one week are not included in your analysis. d. The unit of time to use in the model is minutes. e. There is one Rapid DNA sequencer, which is only run once all eight spaces in the cartridge are filled with samples. f. You ...

    €155 (Avg Bid)
    €155 Keskimäär. tarjous
    30 tarjoukset

    Seeking an expert in digital photo enhancement for a personal project. The goal is to improve resolution on two car license plate photos to enable number and letter identification. Requirements: * Apply resolution enhancer to ensure license plate details be...on two car license plate photos to enable number and letter identification. Requirements: * Apply resolution enhancer to ensure license plate details become readable * Previous experience in photo enhancement and resolution improvement is necessary * Please respect the intent for this task, which is solely identification purposes. This task would best suit those with a background in digital forensics or similar. Your ability to maintain discretion and confidentiality is highly appreciated. With your help, we can make the ha...

    €24 (Avg Bid)
    €24 Keskimäär. tarjous
    74 tarjoukset

    As I'm curre...minutes. I am seeking a review of less than one minute of video and specifically a few seconds of the quoted audio "Fuck You" to use for comparative resources. I'm anticipating your professional input in: - Speech enhancement The ideal candidate would bring extensive experience in audio forensics, with an ability to reliably confirm audio authenticity for legal purposes. Experience in working with MOV file formats would be a major plus. At APPROXIMATELY 2:00 minutes in a series of "Push Push Push" begins and "Fuck You" has some channel anomalies occurring where we believe potential ducking is a possibility. We need to know with certainty if this audio has been altered.

    €62 (Avg Bid)
    Kiireellinen
    €62 Keskimäär. tarjous
    16 tarjoukset

    ...with the means and a federal prosecutor brother to know to go and get tested by a lab immediately after they did, also hire an MRO…. But the whole-of-community to prevent, protect against, mitigate, respond to, and recover from this, I don’t think people understand false arrests can be the cops killing you not by gun but by smearing your name so bad you want to give up. Here actually I blame forensics more, but we will chat. Please apply if this is you!...

    €311 (Avg Bid)
    €311 Keskimäär. tarjous
    9 tarjoukset
    €28 Keskimäär. tarjous
    1 tarjoukset

    I am seeking a skilled investigator ...proficient in tracking IP addresses and locations from emails and VoIP. - Ability to provide a detailed regional breakdown of the identified location. - Should be competent in processing and analyzing large data sets, as I will provide all the necessary emails and VoIP phone numbers for tracking. Desired experience: - Previous experience in similar projects concerning cyber security and digital forensics is a big plus. - Advanced analytical and problem-solving skills are necessary. - Proficiency in tools related to data gathering, IP tracking, and location identification is expected. Looking for a professional who can accomplish this task accurately and effectively in a stipulated timeframe ensuring data confidentiality throughout th...

    €180 (Avg Bid)
    €180 Keskimäär. tarjous
    6 tarjoukset

    I have a Network Forensics work that requires me to do the following: 1. Apply a research-based approach to forensic analysis. 2. Analyse and interpret digital evidence from a variety of sources. 3. Present findings to both executive and technical audiences. I will share more details and files. Ideal Skills and Experiences: • Extensive knowledge of network forensics • Proficient in vulnerability assessment • Experience handling both real-time and historical network data • Great adaptability in their investigative approach Objectives: • Identify potential vulnerabilities in our network • Offer actionable steps to improve network security • Provide a detailed report with findings and recommendations Your thorough understanding of netw...

    €351 (Avg Bid)
    €351 Keskimäär. tarjous
    12 tarjoukset

    I'm seeking a talented academic writer to craft a research article/thesis in the field of cybersecurity and digital forensics. The project encompasses: - Research Article Focus: The article will delve into the nuances of any one of the following topics; 1. Methods for Improving Industrial Control System Security OR 2. An enhanced encryption-compression method for digital image security OR 3. Green cybersecurity OR 4. Resilience using UAVs - Research Gap: The aim is to identify and address a critical research gap. The content must be fresh, engaging, supported by existing research articles or journals and must contribute significantly to the existing body of knowledge in the field. - Emphasis: The focus should be on presenting a concise yet comprehensive view of the subject ma...

    €393 (Avg Bid)
    €393 Keskimäär. tarjous
    61 tarjoukset

    ...this task with the utmost discretion to protect my privacy and prevent any further misuse of this content. I need this content removed from the following devices: - Smartphone - Computer - Tablet Your experience and skills should include: - Proficient in Android system: Since my devices run on Android, it's essential that you are well-versed in its operating system. - Digital Forensics: A background in digital forensics or similar fields will be beneficial in conducting a thorough search for the sensitive content. - Cybersecurity: Knowledge of cybersecurity will be crucial to ensure the permanent deletion of these materials and protect my devices from any further security breaches. Please only apply if you can handle this task with the utmost care and professionali...

    €324 (Avg Bid)
    Kiireellinen
    €324 Keskimäär. tarjous
    16 tarjoukset

    Hi there, We have already done the analysis and collected evidences and looking for someone to create a report of every task we have performed during analysis and about avidences. We only get 4 hours left for the submission and looking for someone who is good enough with Cyber security, Digital Forensics using Autopsy, Encase and familiar with contenmporary notes. The following report structure is expected: Title page – Include module code, assignment title and student ID number. Introduction - Include a discussion of case management. Evidence analysis. Findings and Conclusions - Include critical discussion of the investigation. References. Appendix – Include contemporaneous notes. 2 hours left! Thank you

    €24 / hr (Avg Bid)
    €24 / hr Keskimäär. tarjous
    20 tarjoukset

    Hi there, We have already done the analysis and collected evidences and looking for someone to create a report of every task we have performed during analysis and about avidences. We only get 4 hours left for the submission and looking for someone who is good enough with Cyber security, Digital Forensics using Autopsy, Encase and familiar with contenmporary notes. Thank you

    €23 / hr (Avg Bid)
    €23 / hr Keskimäär. tarjous
    19 tarjoukset

    I'm in need of a skilled professional in digital forensics to help me investigate a cybercrime. You are a digital forensic analyst, working for a law enforcement agency in the UK and have been assigned to an investigation, working in partnership with an international agency. A member of the investigation team has been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image...

    €104 (Avg Bid)
    €104 Keskimäär. tarjous
    25 tarjoukset

    I'm in need of a skilled professional in digital forensics to help me investigate a cybercrime. You are a digital forensic analyst, working for a law enforcement agency in the UK and have been assigned to an investigation, working in partnership with an international agency. A member of the investigation team has been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image...

    €19 / hr (Avg Bid)
    €19 / hr Keskimäär. tarjous
    17 tarjoukset

    In my pursuit of establishing authenticity for several family photos for a court case, I am seeking an experienced photo analyst or forensic photographer. Ideal expertise needed: - Extensive experience in photo verification and forensic analysis. - Excellent attention to detail. - Familiarity with legal standards and court admissibility for photographic evidence. Proj...admissibility for photographic evidence. Project Objective: - Authenticate people present in the photos. - Verify the date and time the photos were taken. - Establish the exact location where the photos were taken. Your meticulous analysis will be crucial in this litigation. Your work will directly impact the success of the case. Please submit your bid detailing your past experience in photo forensics and authe...

    €36 / hr (Avg Bid)
    €36 / hr Keskimäär. tarjous
    14 tarjoukset

    I'm seeking an adept professional experienced in various areas of cyber security and digital forensics. The focus of the project will be on case forensics with an emphasis on: - Computer forensics - Mobile device forensics - Network forensics The scope of the project involves in-depth work with the following operating systems: - Windows - macOS In addition, the ideal candidate should possess: - Proficiency in malware analysis - Expertise in incident response - Proven experience with network security This extensive project requires comprehensive knowledge and experience, lending to efficient and methodical work. Your ability to provide detailed reports and reliable solutions to any potential issues will be highly prized. Please connect if you...

    €123 (Avg Bid)
    €123 Keskimäär. tarjous
    27 tarjoukset

    I'm in need of an audio sound specialist with advanced skills in separating and analyzing sounds within an MP3 file. The primary goal is to enhance the audio quality of the file. I also need the freelancer to potentially identify and isolate specific sounds or voices within the audio. Key requirements: - Expertise in audio forensics or sound separation - Proficiency in analyzing and manipulating MP3 files - Ability to enhance audio quality without losing original content - Experience with identifying and isolating specific sounds or voices within an audio file The final deliverable is expected to be an enhanced audio file with identified sounds, and we would also appreciate if the freelancer could provide probabilities to certain criteria as requested. Further details will b...

    €21 / hr (Avg Bid)
    €21 / hr Keskimäär. tarjous
    18 tarjoukset

    ...virtual disk (.vmdk) files to/from storage connected to a VMware ESXi host server given specific parameters (see requirements). Requirements: - Programming Language: C++ - Development Environment: Microsoft Visual Studio 2022 - Runtime Platform: Application must be able to run on Windows and Linux - Application Type: Console (non-GUI) - Application Parameters: • host server (required IF topology = 1 or 3: FQDN or IP) • host server port (required IF topology = 1 or 3: port used for connecting to host server) • username (required IF topology = 1 or 3: username for connecting to host server) • password (required IF topology = 1 or 3: password for connecting to host server) • topolog...

    €1008 (Avg Bid)
    €1008 Keskimäär. tarjous
    38 tarjoukset

    ...of a proprietary iOS application, I am currently looking for an experienced mobile device forensics specialist. Here's my requirement breakdown: - Proficiency in iOS device forensics: The reliability and accuracy of analysis is the top priority. Previous experience with iOS devices is a requirement. - Emphasis on Usage Analysis: I need a proficient professional capable of deciphering patterns in software usage. This will help in understanding user behaviour as well as identifying potential issues in the user interface. - Confidentiality Contribution: Understand that any analysed data remains strictly confidential. Please ensure that your bid reflects your expertise and understanding of iOS forensics specifically. I'm keen on details, so don't shy aw...

    €226 (Avg Bid)
    €226 Keskimäär. tarjous
    22 tarjoukset

    ...Debian Ubuntu 20.04 (MATE Desktop). This project involves adapting the Velociraptor software, an open-source security tool , to work seamlessly on the Odroid N2+ platform, a powerful ARM-based single-board computer. The primary goal is to ensure that Velociraptor runs efficiently on Odroid N2+, leveraging the device's capabilities for security monitoring and digital forensics operations. For more details on the platform, visit: Objectives: 1. Assess the compatibility of Velociraptor with the Odroid N2+ hardware and ARM architecture. 2. Modify the Velociraptor source code for optimal performance on the Odroid N2+. 3. Ensure all Velociraptor functionalities are operational on the new platform. 4. Conduct thorough testing

    €1252 (Avg Bid)
    €1252 Keskimäär. tarjous
    29 tarjoukset

    As a client, I am seeking a skilled analyst to conduct a comprehensive investigation into a specific PDF document. Key requirements for this project include: - A thorough report detailing the creation of the PDF, including the original author's name...of the PDF, including the original author's name. - Close scrutiny of the PDF including tracking any and all modifications made post-creation. Please note, no additional information about the author is required beyond their name. Ideal applicants for this project should possess extensive experience with software that can examine and analyze PDF files. Additionally, a background in digital forensics would be a distinct advantage. The project requires a keen eye for detail and the ability to provide a well-structured and...

    €29 / hr (Avg Bid)
    Kiireellinen
    €29 / hr Keskimäär. tarjous
    5 tarjoukset

    I have a project requiring the expertise of a forensic audio specialist. The crucial tasks include: - Enhancing the quality of the sound, - Identifying voices in the audio, - Reducing the noise to extract critical information from the recording. The original format of the audio files is WAV, which should be preserved during the processing phase. Also, please provide a written transcript of only the key conversations extracted from the enhanced audio. For this task, proficiency in audio forensic software, experience with the WAV format, and excellent transcription skills are ideal.

    €299 (Avg Bid)
    €299 Keskimäär. tarjous
    33 tarjoukset

    I am currently being falsely accused of having a...falsely accused of having a fake ID and urgently need the assistance of highly knowledgeable cybersecurity expert who can aid in my defense. - I lack direct evidence of my innocence, hence I am in crucial need of your help. - I possess digital records that substantiate my claims. These include emails, text messages and social media posts. - The ideal candidate should have a knack for digital forensics with the ability to analyze and extrapolate data from digital records. An understanding of legal issues related to identity fraud would be highly beneficial. - As this issue is urgent, I require professionals who are responsive and can act swiftly and discreetly. Your help can return my life back to normalcy. I eagerly await your a...

    €205 (Avg Bid)
    €205 Keskimäär. tarjous
    3 tarjoukset

    I'm seeking a professional with a strong understanding of iPhone software and security systems. Your task would involve: - Investigating and identifying the software that has been used to monitor my iPhones - Removing this s...software and security systems. Your task would involve: - Investigating and identifying the software that has been used to monitor my iPhones - Removing this software to cease any current monitoring - Bolstering the security of my devices to prevent future infiltration All iPhones are running on the same version of iOS. Expertise in iOS software and a background in cybersecurity or technology forensics is highly desired. A clear and effective communication style to guide me through this process would also be valued. Ability to deliver the service remo...

    €19 / hr (Avg Bid)
    €19 / hr Keskimäär. tarjous
    40 tarjoukset
    €11 / hr Keskimäär. tarjous
    1 tarjoukset

    I'm looking for a proficient digital security and forensics expert to make a comprehensive report. This report will focus primarily on: Task-1: Forensic Investigation 2000 words Task-2: Cyber Security Report 2000 words. Experience in similar projects, enriched by a robust understanding of cyber security and digital forensics, would be greatly desirable for this project. Please, if this resonates with your skill set, let's make it work! Deadline: 24 March Night

    €116 (Avg Bid)
    €116 Keskimäär. tarjous
    43 tarjoukset

    I require immediate assistance in hacking a phone for investigative purposes. This is a legal request and solely for the purposes of obtaining: - Call logs - Text messages - Pictures Timing is critical, and I therefore expect the work to be completed ASAP. An ideal freelancer for this project would have expertise in ethical hacking, digital forensics, and cyber investigations. Experience with information security and a proven track record in similar projects is greatly appreciated. Please note, strict adherence to ethical guidelines and professionalism is mandatory.

    €307 (Avg Bid)
    €307 Keskimäär. tarjous
    24 tarjoukset

    ...project is to accomplish the following tasks: - Convert and import a number of VMware virtual machines (VMDK) that are currently stored on an NTFS USB3 drive connected to my Proxmox server. - Store the converted/imported VMs in the local storage of my Proxmox server. I want to work with someone who can ensure the smooth and efficient transfer of VMs from the NTFS USB3 drive to the Proxmox server without any data loss. Should you be able to successfully implement these tasks, the VMs should function as expected within the Proxmox environment, using default Proxmox settings. The ideal freelancer for this project should possess: - In-depth knowledge of Proxmox - Previous experience with VMDK (VMware) file systems - Skills in VM conversion and importation - Understanding a...

    €214 (Avg Bid)
    €214 Keskimäär. tarjous
    19 tarjoukset

    As the client, I ...analysis serves three purposes: - Authorship Identification: To determine the identity of the author(s) of the document. - Tampering Detection: To uncover any alterations, tracking movements that might suggest the document has been manipulated. - Evidence Gathering: To collect data that could potentially be valuable in a legal context. Skills and experience desired: - Expertise in digital forensics, particularly related to Microsoft Word. - Familiarity with forensic toolkits and other related tools. - Knowledge of the legal aspects surrounding digital evidence. - Track record in identifying document authorship and detecting tampering. This task necessitates in-depth understanding, and I seek a freelancer who can meet the project specifics with diligence and ...

    €40 / hr (Avg Bid)
    €40 / hr Keskimäär. tarjous
    2 tarjoukset

    I urgently need someone experienced in digital forensics and content removal to assist me in getting illegal photos and videos removed from various personal and illicit websites. As this is a sensitive issue, discretion and professionalism are absolutely essential. This project requires immediate attention. Ideal skills and experience include: - Extensive knowledge and experience in digital forensics and content removal - Familiarity with legal procedures and guidelines related to cyber crime - High level of understanding and expertise in online security - Proficient negotiating skills to deal with website administrators - Proven track record of similar projects executed in a highly professional and timely manner.

    €139 (Avg Bid)
    €139 Keskimäär. tarjous
    4 tarjoukset

    I am looking for an expert in audio engineering to enhance the quality of sound taken from a security camera. The primary objective is: * To advance voice clarity, * Identify, decipher, and reduce background noises, * And reduce sound di...minimal background noise, and clearly comprehendable dialogue. The desired outcome: * Clear and easily understandable dialogue * Reduced background noise * Ability to identify the number of people in the room based on the audio. Ideal skills for this project: Expertise in sound engineering, proficiency in using digital audio workstations (DAWs), and excellent hearing skills. Experience in forensics audio would be an added advantage. I’ve edited 2 of the files and there is the original would like them compared please and a final conci...

    €31 (Avg Bid)
    €31 Keskimäär. tarjous
    18 tarjoukset