Affordably Source Computer Virus Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Computer Virus Inquiries

Area Icon

Anti-malware

Exploit reported by google adwords bots - appears to be changing quickly all the time. Malware. Domain suspended in adwords. Our pages are being redirected and we cannot figure out how to fix the problem.

  1. Profile Picture

    Narendra |Director

    We are a consulting company in Cyber Security... m not clear as to what problem you are facing, plea...

    1.4 Days Later
  2. Profile Picture

    sheik |security analyst

    find the malware code and remove it! As per the google adwords or adsense policy, they won't pay if...

    1.5 Days Later
+3 Other Responses
Area Icon

Antivirus Software

I have developed software which is certified by digicert which is launching this week. I was told by my attorney that there is a process by which to get whitelisted or atleast stay in good standing with the 37 anti virus companies which is done via email mostly. I was told there is weekly maintenance that needs to be done and i need someone to help guide me exactly what needs to be done.

  1. Profile Picture

    Carmelo |CEO

    Hi Anti534M24, Can you please send me more *****t your software and what it does? I want ...

    8.9 Hours Later
  2. Profile Picture

    sheik |security analyst

    it is really simple- submit your sample in virus total, bit9 whitelisting, mcaffee whitelist- they w...

    55.5 Days Later
+2 Other Responses
Area Icon

Computer Security

Assist with protocols and develop collection tools; assist with data analysis, interpretation, reports; assist in writing final reports

  1. Profile Picture

    Lito |IT Consultant

    Hello I am an experienced *****yst and I am familiar with analysis tools. Would be good to talk,...

    6.7 Days Later
  2. Profile Picture

    Geoffrey |Consultant

    Have only now seen this Inquiry (21 Dec)! From limited *****lied, I doubt that my "data ...

    16 Days Later
+2 Other Responses
Area Icon

Network Security Auditing

We need a seasoned security expert to come physically to our los angeles based center and perform a security audit and network evaluation. We have need of an experience professional to do a full network discovery with an emphasis on uncovering potential vulnerabilities and inherent design flaws with our layout. Scope of work to include an external penetration test as well as internal auditing with recommendations and a plan of action to be laid out.

  1. Profile Picture

    Ryan |President

    I ***** compliance for my clients domestic and *****h encompasses full securit...

    29 Minutes Later
  2. Profile Picture

    Satyen |Zintro Expert

    Hi, I am based in LA and Security expert to conduct Security Assessment, Security Audit and Assessm...

    7.7 Hours Later
  3. Profile Picture

    PRakash |Information security sme

    Hi, We offer Virtual CISO services which include various *****rity services with continu...

    12.3 Hours Later
+8 Other Responses
Area Icon

Kaspersky

My company is deploying kaspersky and we are looking for a technical consultant to manage the project. This person needs to have experience with kaspersky security center 10 with both anti-virus and encryption using kaspersky security center – other like applications should not be considered – we want clearly someone with experience with our exact toolset.

  1. Profile Picture

    David |Owner

    I specifically have experience with Kaspersky Security Center 10. I have another client that has tha...

    3.8 Hours Later
  2. Profile Picture

    Adrian |Zintro Expert

    Hello, I have just received this inquiry from one of my colleagues that has an account on zintro fo...

    5.5 Days Later
+2 Other Responses
Area Icon

Malwarebytes

I want to create a package with malwarebytes 2.1.6.1002 with sccm server 2012. I will need to know the command line, uninstall path, how to change detection path, how to put product id and key. Also un-check auto updates and user notification. Could you please help me with this. I really need help. Thank you mohammed

  1. Profile Picture

    David |Consultant

    Mohammed Are you using the *****l in SCCM or plain packages?...

    12.2 Hours Later
  2. Profile Picture

    Joshua |CEO

    Mohammed, Good morning. I have packaged this program for deployment via SCCM 2012 R2. I have ...

    1.7 Days Later
+2 Other Responses
Area Icon

Computer Security In Insurance

Looking for experts in cyber security insurance law

  1. Profile Picture

    Rahul |Chief Technical Officer

    Thanks for your message. We have expertise and experience in Cyber Security domain including ISO 270...

    4.8 Hours Later
  2. Profile Picture

    Norman |Consultant

    Sir, There is no detail visible in your inquiry on Zintro thus difficult to know what to respond. I ...

    7.2 Hours Later
  3. Profile Picture

    Bryan |InfoSec

    I can help in external security. ...

    7.8 Hours Later
+6 Other Responses
Area Icon

Cyber Security Services Project

We are looking for multiple participants based in canada. Our client is conducting this market research study and would like to invite you to participate in our research to learn how companies choose third party providers for managed security services. They are looking for participants who recently evaluated third party managed security providers. This is for a paid 1-hour phone interview. **please note that we are only interested in your personal point of view and are not seeking confidential information. This is not a sales solicitation. All the information you provide us is kept strictly confidential. It is used for classification purposes only. Kindly respond to the questions below as to your relevance in this space: 1. Have you recently participated in the evaluation of third-party managed security providers? Yes/no 2. For the managed security service you evaluated, which of the following best describes the scope of services you were seeking from the third party: a. Standard security – my own it staff monitors, manages and resolves incidents or problems, plus manages moves / adds / changes b. Fully managed security – a service provider proactively monitors, manages and resolves incidents or problems, plus manages moves / adds / changes c. Neither

  1. Profile Picture

    Jonathan |Senior Manager

    1. Yes 2. B...

    2.5 Days Later
  2. Profile Picture

    Jeffrey L. |CEO | Founder | Principal Cybersecurity

    1. Yes 2. A...

    2.5 Days Later
  3. Profile Picture

    Jim |Sr. Cyber Security Principal Architect

    I have 23 years experience in Cybersecurity....

    2.5 Days Later
+303 Other Responses
Area Icon

Encryption Virus

I don't know if you can help with this issue. I was subject to a ransom encryption virus. It impacted the back up drive as well. The ransom was paid and the link was taken down. Do you offer services to help decrypt without a key or back up?

  1. Profile Picture

    Johnathan |Information Security Analyst II

    *****'re probably out of luck. There's a slight chance if the malware left behind a key....

    32 Minutes Later
  2. Profile Picture

    Clarence |Consultant

    Check historical backups they may be ok....

    45 Minutes Later
  3. Profile Picture

    Eric |Managing Partner

    agree - how many ***** does the backup tree goes...hope it's more than 1...start with th...

    4.2 Hours Later
+4 Other Responses
Area Icon

Technical Writing On Internet Security Architecture

Hope this message finds you well!  we have a new research project that may fall within your area of expertise. We are seeking an experienced technical writer who could write a white paper on industrial internet security architecture project. We are looking for someone with technical knowledge who has experience writing white papers.  as a first step, could you please confirm this is within your area of expertise and you are interested in learning more about this engagement as i would like to connect you with one of our team leaders who can explain this engagement in more detail.  thank you in advance, and we are looking forward to hearing from you. 

  1. Profile Picture

    Robert |Columnist

    I will be happy to speak with you on researching and authoring a White Paper on Industrial Internet ...

    46 Minutes Later
  2. Profile Picture

    Adam |Performance Development Professional

    I'd welcome the chance to help you achieve more, work less and *****n. I've spent years w...

    2.9 Hours Later
  3. Profile Picture

    Peter |Principal

    I think I fit the bill. I have Internet security and white paper writing experience....

    4.6 Hours Later
+13 Other Responses
Area Icon

Cyber Security

We require a subject matter expert in cyber security, more specifically ransomware as a guest/keynote speaker in a webinar planned for sept 22. The sme must have relevant experience in online & data security, solid communication skills and good understanding of ransomware attacks.

  1. Profile Picture

    John |President & Chief Forensic Examiner

    I was part of *****r which took down Cryptolocker and I run the Ransomware Working Group, a...

    1.3 Hours Later
  2. Profile Picture

    Raghavan |Principal

    I bring in SME expertise in malware security trends (trojan and ransomware) and have architected sec...

    3.3 Hours Later
  3. Profile Picture

    Anthony |Principal Consultant

    I am a software development professional with 20+ years in Med Device, Healthcare IT space. I held ...

    3.4 Hours Later
+17 Other Responses
Area Icon

Google Chrome

How does someone else's chrome history appear on my pc that has been reset to factory settings & they have no access to pc? I downloaded chrome on saturday, turned my pc off on sunday and did not turn it back on till tuesday pm to discover history in my browser for monday and tuesday when no-one was home. Happened again wed afternoon too. I need to understand how this can happen - is this person in my house or somehow logging into my pc? . .

  1. Profile Picture

    Charles |Chief Executive Officer

    Hello, It seems you have interesting concerns, but the issues likely have a logical explanation. I...

    1.5 Hours Later
  2. Profile Picture

    Anton |CEO

    Understand you're concerned about the issue. Where are you located?...

    58.2 Days Later
+3 Other Responses
See More Inquiries

A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.

Top Computer Virus Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+