Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.
I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.
My expertise includes:
* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing
To read some of my musings, I blog on my dev site at pinkhatcode.com.
Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.
Financial fraud costs merchants, consumers and banks billions every year. Artificial intelligence (AI) helps fight fraudulent charges and unauthorized banking access by being proactive. With machine learning and AI, suspicious charges are caught before a merchant loses product to fraud, the consumer is protected from monetary loss, and banks can automate account locks making detection much faster and more efficient. | Read More →Words: 1023 Downloads: 0 Category: Finance By: Lysis
Disaster recovery plans require backups, and most IT administrators understand the importance of full data backups. What is often misunderstood is the role of transaction logs in disaster recovery. Logs allow administrators to perform a "Point in Time" recovery, and they are especially critical for busy servers that run hundreds or thousands of queries an hour. | Read More →Words: 849 Downloads: 0 Category: IT By: Lysis
Thousands of computers comprise botnets, and just one successful DDoS attack can be devastating for a targeted organization. Workstations on a network are targets for attackers that can accumulate dozens of machines in one location including servers with high-end resources. To understand the way botnets work, it’s important to understand the way attackers build the perfect computer army. | Read More →Words: 1314 Downloads: 0 Category: IT By: Lysis
Unless you have a background in cyber security, understanding the way attackers break into a site based on poor authentication security is difficult. Even more difficult is setting up the right security standards on your website. Attackers use certain flags and observations to find vulnerabilities on your site. Use these authentication standards on your login page to protect from common security attacks. | Read More →Words: 1038 Downloads: 0 Category: Web Development By: Lysis
Encrypting passwords in a database is a critical part of cyber security. Developers often misunderstand the importance of using one-way hashes rather than a two-way encryption algorithm to store sensitive data in a database. One-way hashes along with a salt can protect data from brute force attacks after a data breach. | Read More →Words: 1115 Downloads: 0 Category: IT By: Lysis
If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.Writer Registration