SafeHouseinCodeXWhy Decentralization is the FutureAnyone who hasn’t been living under a rock has heard of Bitcoin. People have been debating for a long time about whether Bitcoin is “just…Jul 23, 20211Jul 23, 20211
SafeHouseinCodeXAES: How the Most Advanced Encryption Actually WorksGovernments, militaries, banks and corporations rely on it. It’s responsible for securing most, if not all of your personal and financial…Jul 13, 20211Jul 13, 20211
SafeHouseHow TLS Protects Your Web ActivityIn our many articles about how the internet works, we left out an important detail. Many common internet-facing applications secure data…Jul 2, 2021Jul 2, 2021
SafeHouseDemystifying Ethernet and Fiber OpticsIn our last article, we talked about TCP and UDP, the protocols that handle the delivery and verification of data sent over the internet…Jun 25, 2021Jun 25, 2021
SafeHouseTCP vs UDP, what’s the difference?This is another entry in a series of articles in which we talk about the fundamentals of how the internet works. We started with switches…Jun 18, 2021Jun 18, 2021
SafeHouseOSI model and TCP/IP Explained with ExampleIn our last article we talked about switches and routers, two of the basic building blocks of the internet. In that article we mentioned…Jun 10, 2021Jun 10, 2021
SafeHouseSwitches and Routers, what’s the difference?Switches and Routers are essential hardware pieces for the foundation of a network. In the beginning stages of the development of the…Jun 4, 2021Jun 4, 2021
SafeHouseWhat is a Honeypot and How does it help my Business?A honeypot is a decoy target that attracts cyber attacks, distracting hackers from other important targets, and learns about how hackers do…May 27, 2021May 27, 2021
SafeHouse3 Security Quick Wins You Can Implement Right NowThere are lots of things that need to be done to ensure the security of a system or network. Sometimes this process can be long, tedious…May 13, 2021May 13, 2021
SafeHouseTop 3 Cyber Threats that small businesses faceThere are many different types of cyber threats that a hacker can take advantage of to gain what they want. Some include phishing, malware…Apr 28, 2021Apr 28, 2021