Lysis Available!

Lysis

Usage
Licenses Sold

41

Unique
Licenses Sold

3

Full Rights
Licenses Sold

718

Total Articles
Written

970

Writer Biography

Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.

I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.

My expertise includes:

* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing

To read some of my musings, I blog on my dev site at pinkhatcode.com.


Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.

To See Detailed Writer Profiles

Sign Up or Login

How to Protect Your Home Network from Wardriving

Attackers who take advantage of poor network security aren't always thousands of miles away. Some attackers are right next door and use wardriving as a way to obtain sensitive data. Wardrivers use specially crafted applications that detect open, insecure Wi-Fi access points. When insecure wireless networks are found, the attacker can then connect and exfiltrate data directly from your home network devices. Home network users that have Wi-Fi hotspots set up should implement security procedures that protect from wardialing. | Read More →

Words: 1124   Downloads: 0   Category: IT   By: Lysis

Avoiding Insecure Direct Object References (IDOR) in Your Web Application

IDOR vulnerabilities could expose your entire customer database and cause critical data breaches in your web application. These vulnerabilities are easier to spot than other advanced cybersecurity issues but require the right access controls to prevent a successful attack. Testing for IDOR vulnerabilities should be a part of your quality assurance management when testing a web application prior to deployment. | Read More →

Words: 1053   Downloads: 0   Category: Web Development   By: Lysis

How Mobile App Certificate Pinning Adds Protection from Man-in-the-Middle Attacks

Certificate pinning is one method of cybersecurity that protects mobile apps from man-in-the-middle (MitM) attacks. It's a method that cuts out a public-key lookup step from a certificate authority and uses only certificates stored on the local mobile device. To protect users from MitM attacks on public Wi-Fi, mobile app developers should consider using this method when designing their software. | Read More →

Words: 1031   Downloads: 0   Category: Web Development   By: Lysis

Bank Account Hacks Using Two-Factor Authentication Security Flaws in SS7

Most users feel more secure when their bank (or any other provider) offers two-factor authentication. The system used to send two-factor PINs, however, is vulnerable to man-in-the-middle attacks. Signaling System 7 (SS7) vulnerabilities have been used to hack banking accounts across Europe, and SS7 still remains unpatched leaving any user susceptible to this cybersecurity attack. The result can mean severe financial loss for targeted users. | Read More →

Words: 1093   Downloads: 0   Category: IT   By: Lysis

Cybersecurity Server Response Headers to Protect Your Website from Hackers

It's not uncommon for web developers to make mistakes with coding features that leave a web application open to common vulnerabilities. Many of these vulnerabilities include Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), session hijacking, cookie hijacking and many others. Using the right cybersecurity server response headers, developers can mitigate many of these attacks and protect a web application. | Read More →

Words: 1048   Downloads: 0   Category: Web Development   By: Lysis

How Edge Computing Speeds Up Your Application

Most developers know that a CDN speeds up mobile applications, but edge computing is an additional service that creates an even faster experience that turns slow data speeds into real-time processing. Edge computing provides a mesh of servers surrounding the CDN's data center location and provides cached data processing. This technology benefits any developer or webmaster that needs an extra boost in performance for improvement in user experience. | Read More →

Words: 808   Downloads: 0   Category: IT   By: Lysis

New to Constant Content? Please signup to continue:


Already registered? click here to login.

Please Verify The Following Data

Please Enter a Name
Please Enter an Email
Please Enter an Phone Number
Please Select a Country
Passwords must be minimum of 6 characters
Please Enter a Valid Password
Please Enter a Valid Confirmation Password
Passwords Do Not Match

  Fields with * are required
Name  *
Email  *
Password  *
Confirm Password  *
Phone Number  *
Country:  *

By creating an account I confirm that:
I understand the licensing rights and accept the full terms and conditions.

*Constant-Content.com is the sole owner of the information collected on this site.
We will not sell, share, or rent your email address or any other personal information.


Login

Not registered? Click here to register.

Please Verify The Following Data

Enter an Email
Enter a Password

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Want to
Write for Us?

If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.

Writer Registration