<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Freelance Technical Writer | Expert in Technical Writing]]></title><description><![CDATA[Transform your technical writing with a Freelance Technical Writer. Get engaging, confident, and professional technical content that sets you apart.]]></description><link>https://freelancewriter.tech</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1653586841439/OLxPLnAal.jpg</url><title>Freelance Technical Writer | Expert in Technical Writing</title><link>https://freelancewriter.tech</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 14 Apr 2026 02:35:00 GMT</lastBuildDate><atom:link href="https://freelancewriter.tech/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Credential stuffing what is it?]]></title><description><![CDATA[A long time ago, when the internet was hitting its teen years, some vast names online and traditional brands got hit up by some hacker types. These bandits stole much of their user's data, and knowing that other bandits would pay a handsome price for...]]></description><link>https://freelancewriter.tech/credential-stuffing-what-is-it</link><guid isPermaLink="true">https://freelancewriter.tech/credential-stuffing-what-is-it</guid><category><![CDATA[Security]]></category><category><![CDATA[Web Development]]></category><category><![CDATA[passwords]]></category><dc:creator><![CDATA[Morlene Fisher]]></dc:creator><pubDate>Fri, 27 May 2022 12:55:07 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/unsplash/xG8IQMqMITM/upload/v1653655554831/8lA3F8sjg.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A long time ago, when the internet was hitting its teen years, some vast names online and traditional brands got hit up by some hacker types. These bandits stole much of their user's data, and knowing that other bandits would pay a handsome price for the booty, they sold off chunks of this data to the highest bidder. </p>
<p>The buyers and the original hackers would then use the data to try and gain access to user accounts across the internet. Not just on the sites that were breached but also on other domains, Working under the persuasive and well-known assumption that users mostly use the same credentials on many sites. </p>
<p>These breached usernames and password haul contained millions and millions of combinations. No self-respecting bandit would be trying to compromise sites manually, entering each username and password to see if they work. They would create some automated way of doing this using the tools found in any decent hackers toolkit or half-decent programmer. So this computerised practice of injecting username and password pairs to gain access to a user's accounts became known as credential stuffing.</p>
<p>Eventually, those treasure troves, including emails, passwords, and in some cases, more sensitive information, found their way into many people's hands. </p>
<h3 id="heading-listen-to-rework-podcast-on-credential-stuffing">Listen to Rework Podcast on Credential Stuffing</h3>
<p>There is a great podcast that describes how the Basecamp security team handled the attack on their services 
<a target="_blank" href="https://rework.fm/did-you-order-the-code-red/">Listen here</a></p>
]]></content:encoded></item><item><title><![CDATA[Managing your customers user accounts]]></title><description><![CDATA[Allowing your customers a frustration free account creation experience is the best thing you can ever do to give them a good first impression. 
Remember, they have decided they need to have a deeper interaction with you, they want more of your servic...]]></description><link>https://freelancewriter.tech/managing-your-customers-user-accounts</link><guid isPermaLink="true">https://freelancewriter.tech/managing-your-customers-user-accounts</guid><category><![CDATA[authentication]]></category><category><![CDATA[user experience]]></category><category><![CDATA[authorization]]></category><category><![CDATA[Auth0]]></category><dc:creator><![CDATA[Morlene Fisher]]></dc:creator><pubDate>Thu, 26 May 2022 19:06:45 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1653676608080/gBWAHNFjF.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Allowing your customers a frustration free account creation experience is <strong>the</strong> best thing you can ever do to give them a good first impression. </p>
<p>Remember, they have decided they need to have a deeper interaction with you, they want more of your services and or products, they have gone the extra mile and you've slapped them in the face and made them feel rejected or dejected if for some reason, they cannot sign up for an account on your digital platform.</p>
<h2 id="heading-case-one-no-money-from-me">Case One: No money from me</h2>
<p>I received a bill from my water supplier company. It wasn't the first bill I had from them, and I went to log into my account on their website, but found my login credentials were not recognised. Undaunted, I proceeded to sign up for an account, prompted even more so because they were promoting their new account service via the bill with the tag line 'you asked and we listened'</p>
<p>I entered the url of the page, and was presented with a simple form that asked for three things</p>
<ul>
<li>My Account number</li>
<li>My postcode</li>
<li>My email address</li>
</ul>
<p>Nice, I entered the details and pressed the 'Register' button. The system told me my email address was already in use. Hmmm, ok so my next course of action was to go to the forgotten password link. I entered my email address and was told an email was winging it's way to my inbox with instructions of how to reset my password. </p>
<p>Success! or so I thought.</p>
<p>The next 15 minutes was spent in a frustrating cycle of password resets, lockouts, entering verification codes and bollocks!</p>
<p>In the end, I gave up. I also didn't pay my bill. Whilst I will pay it using some other means, because I have to, the company has failed to secure renumeration from a customer who was willing to give it to them, due to a failure in their account creation/login system.</p>
<p>Imagine if I didn't have to use this company at all, they would have lost my money forever.</p>
<h2 id="heading-case-two-what-the-hell">Case Two: What the hell?</h2>
<p>This second case is equally as annoying as the first. Whilst I have an account with this second company, again a utility company, they have some strange phenomena that only logs my  account in if I use a link that was previously sent in an earlier email. If I hit the login link from their website it doesn't recognise my credentials. </p>
<p>This has happened on numerous occasions and frankly I've had enough and will be switching from them very shortly. </p>
<h2 id="heading-prevention-is-better-than-a-cure">Prevention is better than a cure</h2>
<p>Without a through Quality Assurance (QA) process, you cannot be sure that your account creation/login system works for the customer 100% of the time, or at least ir 99.9993% of the time. </p>
<p>An account management system must have the following processes</p>
<ul>
<li>Sign up (new account creation)</li>
<li>Verification</li>
<li>Login</li>
<li>Forgotten/Reset password</li>
<li>Forgotten username</li>
<li>Logout</li>
</ul>
<p>Each of these processes should be thoroughly tested to ensure the user journey can be completed with minimal fuss and disruption. </p>
<p>We would suggest the following test scenarios in each journey</p>
<h3 id="heading-sign-up">Sign up</h3>
<ul>
<li>Can the user access the sign up page easily from any page on your site</li>
<li>Can the account be created with minimal information</li>
<li>Does your sign up verify the user's email or phone </li>
<li>Can the user create their own username</li>
<li>Does the verfication process work effortlessly</li>
<li>Do you show validation messages for fields that required strict formats or criteria (e.g. correct email formatting or password length/composition)</li>
</ul>
<h3 id="heading-verification">Verification</h3>
<ul>
<li>Does verification via phone (usually sms) work</li>
<li>Does veritication via email work</li>
<li>Is verification form accessible via a link from your website</li>
<li>Once verification complete is the user automatically logged in or is user re-directed to the login page</li>
</ul>
<h3 id="heading-login">Login</h3>
<ul>
<li>Can the user access the login page easily from any page on your site</li>
<li>Does the system allow passwords to be copied and pasted into the password field (primary importance for users that use password generator systems)</li>
<li>Does the user receive clear messages and instructions if login has failed</li>
<li>If the account is not found, is the user directed to create an account</li>
</ul>
<p>There are other checks that you can do but you should have the bare bones above to help you design a system that works for you and for your customers. </p>
]]></content:encoded></item><item><title><![CDATA[Welcome to Be Tech Savvy: CSS A to Z.]]></title><description><![CDATA[In this series, we present concepts that you may find helpful to know about the presentation layer of your web application.
Cascading Style Sheets (CSS) were developed so that you can describe how to render your web pages separately from the HTML or ...]]></description><link>https://freelancewriter.tech/welcome-to-be-tech-savvy-css-a-to-z</link><guid isPermaLink="true">https://freelancewriter.tech/welcome-to-be-tech-savvy-css-a-to-z</guid><category><![CDATA[CSS]]></category><category><![CDATA[Web Development]]></category><category><![CDATA[Frontend Development]]></category><category><![CDATA[UI]]></category><dc:creator><![CDATA[Morlene Fisher]]></dc:creator><pubDate>Thu, 26 May 2022 17:54:27 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1653676707335/rGfc4NGNY.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this series, we present concepts that you may find helpful to know about the presentation layer of your web application.</p>
<p>Cascading Style Sheets (CSS) were developed so that you can describe how to render your web pages separately from the HTML or XML markup.</p>
<p>If we don't separate the layers, we find that maintenance or improvements can be fraught with issues.</p>
<p>Separation is essential in modern web application development. This is due mainly to our constant need to make changes to our applications to allow for new and improved user experiences or business needs. </p>
<p>Sometimes our new stuff breaks the old stuff; things don't look the same or appear in the wrong places. There are even times when we break working functionality. This can be detrimental to the way our users experience our applications or website. It can also cost us money.</p>
<p>If you are someone that has been involved in launch day changes that have had to be rolled back because the customer services switchboard has lit up like an 80's rave, then you know what I mean.
As with all the books in this series, I've attempted to simplify the descriptions and explanations. There are very few code examples in this book as it is not aimed a people who write the code. 
The information in this book is abstracted to a level that I think is appropriate for managers, team leaders, product managers and business owners. If you work in any of these roles, this book was written explicitly for you.</p>
<p>With this series, you will no longer be in the dark about what your developers are saying. You'll understand some of the terminologies and feel comfortable that the tech doublespeak is not going conclusively over your head. </p>
<p>You will have enough knowledge to feel comfortable and not bamboozled with tech speak. With CSS A to Z, you will become Tech Savvy.</p>
<p>Enjoy!</p>
]]></content:encoded></item></channel></rss>