Subject | Sender | Date |
---|
Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.
I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.
My expertise includes:
* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing
To read some of my musings, I blog on my dev site at pinkhatcode.com.
Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.
Password policies are a critical component of cyber security for online stores and e-commerce sites. Site owners must balance between strong password policies and convenience for users. This can be a delicate design because poor password policies can lead to account compromise, but too much inconvenience frustrates users and compels them to leave the site. | Read More →
Words: 1031 Downloads: 0 Category: Web Development By: LysisRedundant Array of Independent Disks (RAID) configurations are beneficial for individuals that need a backup solution for home computers or businesses that have critical servers with performance and data redundancy requirements. There are several RAID configurations available, but you should understand the limitations and benefits of each one to choose the right solution for your home or business network. The right RAID configuration depends on your goals whether it's redundancy, reliability or performance. | Read More →
Words: 734 Downloads: 0 Category: IT By: LysisThe WhatsApp data breach stems from a buffer overflow in the application's code, and the result was 1.5 billion people were susceptible to remote code execution. Buffer overflow attacks are critical security bugs in any application, but they are also considered "needle in the haystack" finds for hackers. If programmers don't know how they work, it's difficult to identify functions and user-generated input methods that could result in an exploited application. | Read More →
Words: 1042 Downloads: 0 Category: Programming By: LysisWhatsApp is the latest in a widespread, critical data breach. Although the company promises encryption and private communication between users, the mobile app was found to be vulnerable to remote code execution due to a buffer overflow exploit. Because of the critical nature of the vulnerability, susceptible users could have spyware installed that eavesdrops on voice communications. | Read More →
Words: 729 Downloads: 0 Category: IT By: LysisRansomware malware is not uncommon, but the latest attacks target Git repositories. Attackers have been deleting commits and removing source code with threats to make it public if targeted users don't pay a fee in Bitcoin. Instead of encrypting files, attackers now target only accounts and hold critical files ransom, crippling developers across the globe. | Read More →
Words: 651 Downloads: 0 Category: IT By: LysisOne-way hashing algorithms create a fixed-length value that you can store in a database. Combined with a salt, these hashing algorithms create a more cryptographically secure form of password storage. It's well known that storing plaintext passwords in a database is non-compliant and creates massive vulnerabilities after a data breach, but a one-way hash can protect user passwords should an attacker be able to disclose password fields from your SQL database. | Read More →
Words: 1013 Downloads: 0 Category: Web Development By: LysisCreate an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.
Sign Up Today