Lysis Available!

Lysis

Usage
Licenses Sold

41

Unique
Licenses Sold

3

Full Rights
Licenses Sold

713

Total Articles
Written

965

Writer Biography

Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.

I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.

My expertise includes:

* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing

To read some of my musings, I blog on my dev site at pinkhatcode.com.


Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.

To See Detailed Writer Profiles

Sign Up or Login

Using SameSite Cookies in Web Development to Avoid Cross-Site Request Forgery Attacks

A new cybersecurity cookie attribute has been introduced to help developers avoid exploits such as cross-site request forgery (CSRF) attacks. The SameSite attribute restricts when cookies are sent to third-party servers. Using this attribute, developers can keep customer data safer in their web development applications. | Read More →

Words: 1033   Downloads: 0   Category: Web Development   By: Lysis

What is an IDN Homograph Attack and How is It Used in Phishing?

Internet Domain Name (IDN) homographic attacks take advantage of different Unicode values used to display letters in various languages. For instance, the letter "a" looks the same in English as it does in Russian. However, different binary values represent each letter. Using letters that look similar, an attacker can trick users into accessing malicious domains used for phishing. This attack requires no email address spoofing and very little social engineering, but it can lead to a major corporate data breach. | Read More →

Words: 1082   Downloads: 0   Category: IT   By: Lysis

How OAuth Works to Protect Your API Data

Having an API is a great marketing tool for site owners. Developers pay a subscription fee to use your data in their own application projects. These third-party web development projects can boost your site's brand visibility, but API owners must take precautions to protect user data. OAuth can be used to work with proper authentication and authorization standards for data privacy. | Read More →

Words: 1157   Downloads: 0   Category: Web Development   By: Lysis

What is an Application Pool in IIS?

Application pools are a cybersecurity and web hosting component of Microsoft Windows IIS (Internet Information Services). They help Windows administrators work with multiple websites hosted on the same server and separate sites that need different CPU and memory resource management. Whether you host a website on an Azure virtual machine running the Windows server operating system or use cloud hosting on Windows-based hosts, you'll need to configure IIS and application pools. | Read More →

Words: 1088   Downloads: 0   Category: IT   By: Lysis

Creating a Database Backup Plan for Disaster Recovery

A disaster recovery plan has several components, but backups are one of the most critical for business continuity. A good backup plan ensures that all data is secured in case of a compromise, physical theft or a natural disaster. When designing a new plan, it's important to have several key elements and understand how it ties into disaster recovery. | Read More →

Words: 1062   Downloads: 0   Category: IT   By: Lysis

A Brief Overview of the Way an API Uses OAuth

OAuth is a standard for allowing users to authorize a third-party application to access their data. It's a cybersecurity standard for authentication and authorization using credentials stored on an API. For instance, when you log into a site using your Google credentials, you use OAuth to let Google know that you give permissions to a third-party to access components of your Google account. If you plan to create your own internal API for developers, you will need to know OAuth standards to create an authorization and permission workflow. | Read More →

Words: 1193   Downloads: 0   Category: Web Development   By: Lysis

New to Constant Content? Please signup to continue:


Already registered? click here to login.

Please Verify The Following Data

Please Enter a Name
Please Enter an Email
Please Enter an Phone Number
Please Select a Country
Passwords must be minimum of 6 characters
Please Enter a Valid Password
Please Enter a Valid Confirmation Password
Passwords Do Not Match

  Fields with * are required
Name  *
Email  *
Password  *
Confirm Password  *
Phone Number  *
Country:  *

By creating an account I confirm that:
I understand the licensing rights and accept the full terms and conditions.

*Constant-Content.com is the sole owner of the information collected on this site.
We will not sell, share, or rent your email address or any other personal information.


Login

Not registered? Click here to register.

Please Verify The Following Data

Enter an Email
Enter a Password

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Want to
Write for Us?

If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.

Writer Registration