Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.
I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.
My expertise includes:
* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing
To read some of my musings, I blog on my dev site at pinkhatcode.com.
Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.
Attackers who take advantage of poor network security aren't always thousands of miles away. Some attackers are right next door and use wardriving as a way to obtain sensitive data. Wardrivers use specially crafted applications that detect open, insecure Wi-Fi access points. When insecure wireless networks are found, the attacker can then connect and exfiltrate data directly from your home network devices. Home network users that have Wi-Fi hotspots set up should implement security procedures that protect from wardialing. | Read More →Words: 1124 Downloads: 0 Category: IT By: Lysis
IDOR vulnerabilities could expose your entire customer database and cause critical data breaches in your web application. These vulnerabilities are easier to spot than other advanced cybersecurity issues but require the right access controls to prevent a successful attack. Testing for IDOR vulnerabilities should be a part of your quality assurance management when testing a web application prior to deployment. | Read More →Words: 1053 Downloads: 0 Category: Web Development By: Lysis
Certificate pinning is one method of cybersecurity that protects mobile apps from man-in-the-middle (MitM) attacks. It's a method that cuts out a public-key lookup step from a certificate authority and uses only certificates stored on the local mobile device. To protect users from MitM attacks on public Wi-Fi, mobile app developers should consider using this method when designing their software. | Read More →Words: 1031 Downloads: 0 Category: Web Development By: Lysis
Most users feel more secure when their bank (or any other provider) offers two-factor authentication. The system used to send two-factor PINs, however, is vulnerable to man-in-the-middle attacks. Signaling System 7 (SS7) vulnerabilities have been used to hack banking accounts across Europe, and SS7 still remains unpatched leaving any user susceptible to this cybersecurity attack. The result can mean severe financial loss for targeted users. | Read More →Words: 1093 Downloads: 0 Category: IT By: Lysis
It's not uncommon for web developers to make mistakes with coding features that leave a web application open to common vulnerabilities. Many of these vulnerabilities include Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), session hijacking, cookie hijacking and many others. Using the right cybersecurity server response headers, developers can mitigate many of these attacks and protect a web application. | Read More →Words: 1048 Downloads: 0 Category: Web Development By: Lysis
Most developers know that a CDN speeds up mobile applications, but edge computing is an additional service that creates an even faster experience that turns slow data speeds into real-time processing. Edge computing provides a mesh of servers surrounding the CDN's data center location and provides cached data processing. This technology benefits any developer or webmaster that needs an extra boost in performance for improvement in user experience. | Read More →Words: 808 Downloads: 0 Category: IT By: Lysis
If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.Writer Registration