Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.
I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.
My expertise includes:
* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing
To read some of my musings, I blog on my dev site at pinkhatcode.com.
Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.
A new cybersecurity cookie attribute has been introduced to help developers avoid exploits such as cross-site request forgery (CSRF) attacks. The SameSite attribute restricts when cookies are sent to third-party servers. Using this attribute, developers can keep customer data safer in their web development applications. | Read More →Words: 1033 Downloads: 0 Category: Web Development By: Lysis
Most applications have third-party dependencies and libraries imported into source code. These libraries perform functions so that developers do not need to code features, which saves development time. Importing third-party code is convenient, but it adds cybersecurity risk to the application if it's not properly monitored. | Read More →Words: 1062 Downloads: 0 Category: Web Development By: Lysis
Application firewalls have replaced many older layer 3 firewalls. An application (layer 7 of the OSI model) firewall can read and analyze much more information than just a port and IP address from Internet traffic. If you want to implement cybersecurity on your network including protection from DDoS attacks, an application firewall has many benefits. | Read More →Words: 1083 Downloads: 0 Category: IT By: Lysis
Having an API is a great marketing tool for site owners. Developers pay a subscription fee to use your data in their own application projects. These third-party web development projects can boost your site's brand visibility, but API owners must take precautions to protect user data. OAuth can be used to work with proper authentication and authorization standards for data privacy. | Read More →Words: 1157 Downloads: 0 Category: Web Development By: Lysis
AES and SHA are two cryptographically secure ways to turn cleartext into ciphertext. Ciphertext is the hashed or encrypted data that is unreadable to humans, so it protects sensitive data whether it's stored in a database or passed over the internet. Before determining your cryptographic solutions during web development, you should understand the difference between the two algorithms. | Read More →Words: 1052 Downloads: 0 Category: Web Development By: Lysis
Application pools are a cybersecurity and web hosting component of Microsoft Windows IIS (Internet Information Services). They help Windows administrators work with multiple websites hosted on the same server and separate sites that need different CPU and memory resource management. Whether you host a website on an Azure virtual machine running the Windows server operating system or use cloud hosting on Windows-based hosts, you'll need to configure IIS and application pools. | Read More →Words: 1088 Downloads: 0 Category: IT By: Lysis
If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.Writer Registration