Lysis Available!

Lysis

Usage
Licenses Sold

41

Unique
Licenses Sold

3

Full Rights
Licenses Sold

694

Total Articles
Written

960

Writer Biography

Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.

I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.

My expertise includes:

* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing

To read some of my musings, I blog on my dev site at pinkhatcode.com.


Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.

To See Detailed Writer Profiles

Sign Up or Login

How to Protect Employees from Phishing While Working From Home

The coronavirus pandemic has forced much of the world's workforce to perform business tasks at home. An at-home workforce is beneficial to productivity, but it opens up many more cybersecurity risks to the organization. Common threats such as phishing and social engineering are more effective on a work-from-home user, but you can take steps to protect your business data from attackers. | Read More →

Words: 1074   Downloads: 0   Category: IT   By: Lysis

Why Layer 7 Firewalls are Better for Cybersecurity Against DDoS Attacks

Application firewalls have replaced many older layer 3 firewalls. An application (layer 7 of the OSI model) firewall can read and analyze much more information than just a port and IP address from Internet traffic. If you want to implement cybersecurity on your network including protection from DDoS attacks, an application firewall has many benefits. | Read More →

Words: 1083   Downloads: 0   Category: IT   By: Lysis

How OAuth Works to Protect Your API Data

Having an API is a great marketing tool for site owners. Developers pay a subscription fee to use your data in their own application projects. These third-party web development projects can boost your site's brand visibility, but API owners must take precautions to protect user data. OAuth can be used to work with proper authentication and authorization standards for data privacy. | Read More →

Words: 1157   Downloads: 0   Category: Web Development   By: Lysis

How Often Should You Back Up a Database for Disaster Recovery?

Every good disaster recovery plan has a good backup schedule. Database backups ensure that your organization doesn't lose a critical productivity component and strengthens business continuity. The first question most business owners ask is how often backups should be performed for disaster recovery efforts. | Read More →

Words: 1026   Downloads: 0   Category: IT   By: Lysis

Understanding Chrome’s Password Notification After Authentication into a Web Application

A new feature in Google Chrome lets users know that their passwords have been exposed on the internet. This feature helps defend against phishing attacks. Although receiving this message means that your password has already been exposed, it could save you from losing money to an attacker who can authenticate into a site and use your credentials to receive stolen merchandise on your credit card. | Read More →

Words: 1102   Downloads: 0   Category: Internet   By: Lysis

Differences between SHA and AES and When You Should Use Each One

AES and SHA are two cryptographically secure ways to turn cleartext into ciphertext. Ciphertext is the hashed or encrypted data that is unreadable to humans, so it protects sensitive data whether it's stored in a database or passed over the internet. Before determining your cryptographic solutions during web development, you should understand the difference between the two algorithms. | Read More →

Words: 1052   Downloads: 0   Category: Web Development   By: Lysis

New to Constant Content? Please signup to continue:


Already registered? click here to login.

Please Verify The Following Data

Please Enter a Name
Please Enter an Email
Please Enter an Phone Number
Please Select a Country
Passwords must be minimum of 6 characters
Please Enter a Valid Password
Please Enter a Valid Confirmation Password
Passwords Do Not Match

  Fields with * are required
Name  *
Email  *
Password  *
Confirm Password  *
Phone Number  *
Country:  *

By creating an account I confirm that:
I understand the licensing rights and accept the full terms and conditions.

*Constant-Content.com is the sole owner of the information collected on this site.
We will not sell, share, or rent your email address or any other personal information.


Login

Not registered? Click here to register.

Please Verify The Following Data

Enter an Email
Enter a Password

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Want to
Write for Us?

If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.

Writer Registration