Lysis Available!


Licenses Sold


Licenses Sold


Full Rights
Licenses Sold


Total Articles


Writer Biography

Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.

I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.

My expertise includes:

* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing

To read some of my musings, I blog on my dev site at

Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.

To See Detailed Writer Profiles

Sign Up or Login

What Happens When a Hacker Finds a Vulnerable WordPress Site?

WordPress is the most common website hosting software and content management system. It makes the process of building a website easy. Every WordPress site has at least one plugin installed, and it's these plugins that can be the source of serious exploited vulnerabilities. To keep up with cybersecurity on a WordPress site, site owners and developers must keep WordPress and plugins patched with the latest software versions. | Read More →

Words: 1073   Downloads: 0   Category: Web Development   By: Lysis

Why It’s Important to Remove Header Details in Web Server Responses

By default, web application servers return infrastructure details about installed software and configurations. Hackers use this information to craft targeted attacks against your website or other applications. If you don't patch critical outdated software, leaving these headers open to the public could make your web server a target for cyber-attacks that take advantage of known vulnerabilities. | Read More →

Words: 1090   Downloads: 0   Category: Web Development   By: Lysis

Protecting Your Web Application from Path Traversal Attacks

Path traversal attacks are serious cyber-threats that could lead to a full compromise of your server, critical files, or the web application itself. Attackers probing a web application will usually include scripted code that will search for path traversal vulnerabilities. Web developers creating custom applications must include cybersecurity functionality in their code to block these threats. | Read More →

Words: 1116   Downloads: 0   Category: Web Development   By: Lysis

Are Microservices Right for Your Monolithic Codebase?

For older applications, developers continue to add features and updates to an application that eventually becomes difficult to manage. Code testing and deployment time increase, and the software development lifecycle from quality assurance (QA) to deployment can take weeks to complete. With microservices and containers, your business can speed up deployment, improve QA, and offer rapid development to your customers. | Read More →

Words: 1044   Downloads: 0   Category: Web Development   By: Lysis

How DevOps Speeds Up Software Development

Building DevOps into your software development lifecycle (SDLC) can reduce the time code moves from testing to production to mere hours with the right strategy. DevOps can help your organization speed up delivery of new software features to customers, and it can reduce the number of bugs that make it to the production environment. It can even reduce the window of opportunity for hackers to exploit a software vulnerability when a cybersecurity incident happens. | Read More →

Words: 1027   Downloads: 0   Category: Web Development   By: Lysis

How OAuth Works to Protect Your API Data

Having an API is a great marketing tool for site owners. Developers pay a subscription fee to use your data in their own application projects. These third-party web development projects can boost your site's brand visibility, but API owners must take precautions to protect user data. OAuth can be used to work with proper authentication and authorization standards for data privacy. | Read More →

Words: 1157   Downloads: 0   Category: Web Development   By: Lysis

New to Constant Content? Please signup to continue:

Already registered? click here to login.

Please Verify The Following Data

Please Enter a Name
Please Enter an Email
Please Enter an Phone Number
Please Select a Country
Passwords must be minimum of 6 characters
Please Enter a Valid Password
Please Enter a Valid Confirmation Password
Passwords Do Not Match

  Fields with * are required
Name  *
Email  *
Password  *
Confirm Password  *
Phone Number  *
Country:  *

By creating an account I confirm that:
I understand the licensing rights and accept the full terms and conditions.

* is the sole owner of the information collected on this site.
We will not sell, share, or rent your email address or any other personal information.


Not registered? Click here to register.

Please Verify The Following Data

Enter an Email
Enter a Password

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Want to
Write for Us?

If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.

Writer Registration