Lysis Available!

Lysis

Usage
Licenses Sold

41

Unique
Licenses Sold

3

Full Rights
Licenses Sold

728

Total Articles
Written

979

Writer Biography

Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.

I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.

My expertise includes:

* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing

To read some of my musings, I blog on my dev site at pinkhatcode.com.


Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.

To See Detailed Writer Profiles

Sign Up or Login

Improving Cybersecurity: Common Cyber Attacks on Embedded Linux Systems

Embedded Linux is a lightweight version of the open-source operating system, but it's often poorly secured. To improve the cybersecurity of your IoT devices, routers, home automation and network, you should follow some basic best practices. These cybersecurity standards will reduce risk and improve the security of your data. | Read More →

Words: 1010   Downloads: 0   Category: IT   By: Lysis

What is the Mirai Botnet?

The Mirai botnet and malware were able to bring down the internet using gigabytes of data sent to targeted businesses including Dyn, a provider of DNS. Botnets cause spikes in internet traffic that crash servers and critical web services, and Mirai is one of the most effective at it. Mirai infects IoT devices running embedded Linux, which powers much of the world's routers, cameras, mobile devices, smart home automation, and many other components. To add cybersecurity to your IoT devices, you must change the default password as soon as you install and use them in your home or business. | Read More →

Words: 1057   Downloads: 0   Category: IT   By: Lysis

What Is Application Performance Monitoring?

To better improve customer experience and overall revenue of your business, you need a fast application. Application performance monitoring tools detect usage spikes, errors, and poor user behavior patterns so that you can review your web application for issues. With the right application monitoring, you can retain customers and improve the user experience so that customers do not leave your site for a competitor. | Read More →

Words: 1034   Downloads: 0   Category: Web Development   By: Lysis

Understanding Why Math.random() Leaves Your Site Vulnerable to Hackers

Frontend developers for web applications use the Math.random() function in JavaScript to create random numbers. Although most developers think the generated number is random, it's actually not at all. The numbers generated by Math.random() are predictable, and because they are not truly random could make your application vulnerable to hackers. To maintain cybersecurity of a web application, developers should only use algorithms with enough entropy. | Read More →

Words: 1064   Downloads: 0   Category: Web Development   By: Lysis

Why is Log Management Critical for Security and Reliability of Infrastructure?

Log management is the process of organizing and aggregating events for infrastructure and applications across the network. By managing logs properly, organizations can use analytical software such as security information and event management (SIEM) software to accurately monitor the network. SIEMs are enterprise applications critical to the cybersecurity and reliability of a network including the cloud. Log management is the first step in building an efficient way to monitor on-premise and cloud infrastructure. | Read More →

Words: 1019   Downloads: 0   Category: IT   By: Lysis

Hacking Websites: the Difference between Reflected Cross-Site Scripting versus Persistent Cross-Site Scripting

When building a web application, keeping cybersecurity in mind to avoid the latest exploits and vulnerabilities is difficult for developers. Web development requires an understanding of the way hackers compromise code. Cross-site scripting (XSS) is a very common exploit that can be found in many applications when developers leave their code vulnerable to non-sanitized user input. | Read More →

Words: 1106   Downloads: 0   Category: Web Development   By: Lysis

New to Constant Content? Please signup to continue:


Already registered? click here to login.

Please Verify The Following Data

Please Enter a Name
Please Enter an Email
Please Enter an Phone Number
Please Select a Country
Passwords must be minimum of 6 characters
Please Enter a Valid Password
Please Enter a Valid Confirmation Password
Passwords Do Not Match

  Fields with * are required
Name  *
Email  *
Password  *
Confirm Password  *
Phone Number  *
Country:  *

By creating an account I confirm that:
I understand the licensing rights and accept the full terms and conditions.

*Constant-Content.com is the sole owner of the information collected on this site.
We will not sell, share, or rent your email address or any other personal information.


Login

Not registered? Click here to register.

Please Verify The Following Data

Enter an Email
Enter a Password

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Want to
Write for Us?

If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.

Writer Registration