Subject | Sender | Date |
---|
Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.
I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.
My expertise includes:
* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing
To read some of my musings, I blog on my dev site at pinkhatcode.com.
Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.
Financial fraud costs merchants, consumers and banks billions every year. Artificial intelligence (AI) helps fight fraudulent charges and unauthorized banking access by being proactive. With machine learning and AI, suspicious charges are caught before a merchant loses product to fraud, the consumer is protected from monetary loss, and banks can automate account locks making detection much faster and more efficient. | Read More →
Words: 1023 Downloads: 0 Category: Finance By: LysisDisaster recovery plans require backups, and most IT administrators understand the importance of full data backups. What is often misunderstood is the role of transaction logs in disaster recovery. Logs allow administrators to perform a "Point in Time" recovery, and they are especially critical for busy servers that run hundreds or thousands of queries an hour. | Read More →
Words: 849 Downloads: 0 Category: IT By: LysisThousands of computers comprise botnets, and just one successful DDoS attack can be devastating for a targeted organization. Workstations on a network are targets for attackers that can accumulate dozens of machines in one location including servers with high-end resources. To understand the way botnets work, it’s important to understand the way attackers build the perfect computer army. | Read More →
Words: 1314 Downloads: 0 Category: IT By: LysisUnless you have a background in cyber security, understanding the way attackers break into a site based on poor authentication security is difficult. Even more difficult is setting up the right security standards on your website. Attackers use certain flags and observations to find vulnerabilities on your site. Use these authentication standards on your login page to protect from common security attacks. | Read More →
Words: 1038 Downloads: 0 Category: Web Development By: LysisThe latest attack on e-commerce stores introduces a simple JavaScript jQuery submission to a rogue server that collects credit card data. Magecart JavaScirpt code is injected into source code on an e-commerce store and silently steals credit card data from consumers. The latest attack affected NewEgg for about a month, and any consumer that used a credit card to buy a product from August 14 to September 18 should take the necessary steps to cancel the credit card account. | Read More →
Words: 803 Downloads: 0 Category: Web Development By: LysisEncrypting passwords in a database is a critical part of cyber security. Developers often misunderstand the importance of using one-way hashes rather than a two-way encryption algorithm to store sensitive data in a database. One-way hashes along with a salt can protect data from brute force attacks after a data breach. | Read More →
Words: 1115 Downloads: 0 Category: IT By: LysisCreate an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.
Sign Up Today