Lysis Available!

Lysis

Usage
Licenses Sold

41

Unique
Licenses Sold

3

Full Rights
Licenses Sold

718

Total Articles
Written

970

Writer Biography

Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.

I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.

My expertise includes:

* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing

To read some of my musings, I blog on my dev site at pinkhatcode.com.


Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.

To See Detailed Writer Profiles

Sign Up or Login

How AI Protects Your Finance Account from Fraud

Financial fraud costs merchants, consumers and banks billions every year. Artificial intelligence (AI) helps fight fraudulent charges and unauthorized banking access by being proactive. With machine learning and AI, suspicious charges are caught before a merchant loses product to fraud, the consumer is protected from monetary loss, and banks can automate account locks making detection much faster and more efficient. | Read More →

Words: 1023   Downloads: 0   Category: Finance   By: Lysis

The Importance of Transaction Logs in Database Disaster Recovery

Disaster recovery plans require backups, and most IT administrators understand the importance of full data backups. What is often misunderstood is the role of transaction logs in disaster recovery. Logs allow administrators to perform a "Point in Time" recovery, and they are especially critical for busy servers that run hundreds or thousands of queries an hour. | Read More →

Words: 849   Downloads: 0   Category: IT   By: Lysis

The Lifecycle of a Botnet Used in DDoS Attacks

Thousands of computers comprise botnets, and just one successful DDoS attack can be devastating for a targeted organization. Workstations on a network are targets for attackers that can accumulate dozens of machines in one location including servers with high-end resources. To understand the way botnets work, it’s important to understand the way attackers build the perfect computer army. | Read More →

Words: 1314   Downloads: 0   Category: IT   By: Lysis

5 Tips for Creating a More Secure Login Page for Your Website

Unless you have a background in cyber security, understanding the way attackers break into a site based on poor authentication security is difficult. Even more difficult is setting up the right security standards on your website. Attackers use certain flags and observations to find vulnerabilities on your site. Use these authentication standards on your login page to protect from common security attacks. | Read More →

Words: 1038   Downloads: 0   Category: Web Development   By: Lysis

NewEgg Hacked by the Magecart Attack: Using Skimmers to Steal Credit Card Information

The latest attack on e-commerce stores introduces a simple JavaScript jQuery submission to a rogue server that collects credit card data. Magecart JavaScirpt code is injected into source code on an e-commerce store and silently steals credit card data from consumers. The latest attack affected NewEgg for about a month, and any consumer that used a credit card to buy a product from August 14 to September 18 should take the necessary steps to cancel the credit card account. | Read More →

Words: 803   Downloads: 0   Category: Web Development   By: Lysis

Understanding the Importance of Password Hashing in Cyber Security

Encrypting passwords in a database is a critical part of cyber security. Developers often misunderstand the importance of using one-way hashes rather than a two-way encryption algorithm to store sensitive data in a database. One-way hashes along with a salt can protect data from brute force attacks after a data breach. | Read More →

Words: 1115   Downloads: 0   Category: IT   By: Lysis

New to Constant Content? Please signup to continue:


Already registered? click here to login.

Please Verify The Following Data

Please Enter a Name
Please Enter an Email
Please Enter an Phone Number
Please Select a Country
Passwords must be minimum of 6 characters
Please Enter a Valid Password
Please Enter a Valid Confirmation Password
Passwords Do Not Match

  Fields with * are required
Name  *
Email  *
Password  *
Confirm Password  *
Phone Number  *
Country:  *

By creating an account I confirm that:
I understand the licensing rights and accept the full terms and conditions.

*Constant-Content.com is the sole owner of the information collected on this site.
We will not sell, share, or rent your email address or any other personal information.


Login

Not registered? Click here to register.

Please Verify The Following Data

Enter an Email
Enter a Password

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Want to
Write for Us?

If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.

Writer Registration