Lysis Available!

Lysis

Usage
Licenses Sold

41

Unique
Licenses Sold

3

Full Rights
Licenses Sold

718

Total Articles
Written

970

Writer Biography

Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.

I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.

My expertise includes:

* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing

To read some of my musings, I blog on my dev site at pinkhatcode.com.


Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.

To See Detailed Writer Profiles

Sign Up or Login

Creating an Effective Password Policy That Doesn’t Affect Online Sales

Password policies are a critical component of cyber security for online stores and e-commerce sites. Site owners must balance between strong password policies and convenience for users. This can be a delicate design because poor password policies can lead to account compromise, but too much inconvenience frustrates users and compels them to leave the site. | Read More →

Words: 1031   Downloads: 0   Category: Web Development   By: Lysis

Understanding RAID Levels and Which One is Right for You

Redundant Array of Independent Disks (RAID) configurations are beneficial for individuals that need a backup solution for home computers or businesses that have critical servers with performance and data redundancy requirements. There are several RAID configurations available, but you should understand the limitations and benefits of each one to choose the right solution for your home or business network. The right RAID configuration depends on your goals whether it's redundancy, reliability or performance. | Read More →

Words: 734   Downloads: 0   Category: IT   By: Lysis

What Happens in a Buffer Overflow Attack?

The WhatsApp data breach stems from a buffer overflow in the application's code, and the result was 1.5 billion people were susceptible to remote code execution. Buffer overflow attacks are critical security bugs in any application, but they are also considered "needle in the haystack" finds for hackers. If programmers don't know how they work, it's difficult to identify functions and user-generated input methods that could result in an exploited application. | Read More →

Words: 1042   Downloads: 0   Category: Programming   By: Lysis

WhatsApp Buffer Overflow Vulnerability Allows Remote Code Execution

WhatsApp is the latest in a widespread, critical data breach. Although the company promises encryption and private communication between users, the mobile app was found to be vulnerable to remote code execution due to a buffer overflow exploit. Because of the critical nature of the vulnerability, susceptible users could have spyware installed that eavesdrops on voice communications. | Read More →

Words: 729   Downloads: 0   Category: IT   By: Lysis

The New Ransomware: Wiping Git Repositories for a Ransom

Ransomware malware is not uncommon, but the latest attacks target Git repositories. Attackers have been deleting commits and removing source code with threats to make it public if targeted users don't pay a fee in Bitcoin. Instead of encrypting files, attackers now target only accounts and hold critical files ransom, crippling developers across the globe. | Read More →

Words: 651   Downloads: 0   Category: IT   By: Lysis

One-Way Hashing in SQL Server

One-way hashing algorithms create a fixed-length value that you can store in a database. Combined with a salt, these hashing algorithms create a more cryptographically secure form of password storage. It's well known that storing plaintext passwords in a database is non-compliant and creates massive vulnerabilities after a data breach, but a one-way hash can protect user passwords should an attacker be able to disclose password fields from your SQL database. | Read More →

Words: 1013   Downloads: 0   Category: Web Development   By: Lysis

New to Constant Content? Please signup to continue:


Already registered? click here to login.

Please Verify The Following Data

Please Enter a Name
Please Enter an Email
Please Enter an Phone Number
Please Select a Country
Passwords must be minimum of 6 characters
Please Enter a Valid Password
Please Enter a Valid Confirmation Password
Passwords Do Not Match

  Fields with * are required
Name  *
Email  *
Password  *
Confirm Password  *
Phone Number  *
Country:  *

By creating an account I confirm that:
I understand the licensing rights and accept the full terms and conditions.

*Constant-Content.com is the sole owner of the information collected on this site.
We will not sell, share, or rent your email address or any other personal information.


Login

Not registered? Click here to register.

Please Verify The Following Data

Enter an Email
Enter a Password

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Want to
Write for Us?

If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.

Writer Registration