Open in app

Sign In

Write

Sign In

SafeHouse
SafeHouse

16 Followers

Home

About

Published in CodeX

·Jul 23, 2021

Why Decentralization is the Future

Anyone who hasn’t been living under a rock has heard of Bitcoin. People have been debating for a long time about whether Bitcoin is “just a fad.” We don’t claim to be economists nor mind-readers. …

Technology

8 min read

Why Decentralization is the Future
Why Decentralization is the Future
Technology

8 min read


Published in CodeX

·Jul 13, 2021

AES: How the Most Advanced Encryption Actually Works

Governments, militaries, banks and corporations rely on it. It’s responsible for securing most, if not all of your personal and financial data. There are special CPU instructions for it. It is the only cryptographic algorithm approved by the NSA. We’re of course talking about the Advanced Encryption Standard (AES), the…

Technology

15 min read

AES: How the Most Advanced Encryption Actually Works
AES: How the Most Advanced Encryption Actually Works
Technology

15 min read


Jul 2, 2021

How TLS Protects Your Web Activity

In our many articles about how the internet works, we left out an important detail. Many common internet-facing applications secure data before it’s sent out into the world. But how? With an ingenious protocol known as TLS. What is TLS? In the olden days of the internet, communication was completely unencrypted. This meant…

Internet

5 min read

How TLS Protects Your Web Activity
How TLS Protects Your Web Activity
Internet

5 min read


Jun 25, 2021

Demystifying Ethernet and Fiber Optics

In our last article, we talked about TCP and UDP, the protocols that handle the delivery and verification of data sent over the internet. In this article we will shift our focus to hardware: how is data passed between devices? Ethernet and Fiber Optics are probably terms you’ve heard before…

Internet

4 min read

Demystifying Ethernet and Fiber Optics
Demystifying Ethernet and Fiber Optics
Internet

4 min read


Jun 18, 2021

TCP vs UDP, what’s the difference?

This is another entry in a series of articles in which we talk about the fundamentals of how the internet works. We started with switches and routers and moved onto a bird’s eye view of the entire network stack. In this article we will take a closer look at what…

Internet

4 min read

TCP vs UDP, what’s the difference?
TCP vs UDP, what’s the difference?
Internet

4 min read


Jun 10, 2021

OSI model and TCP/IP Explained with Example

In our last article we talked about switches and routers, two of the basic building blocks of the internet. In that article we mentioned that wires, switches and routers comprise the first three “layers” of a larger internet stack. Today, we will zoom out and discuss what the other…

Networking

4 min read

OSI model and TCP/IP Explained with Example
OSI model and TCP/IP Explained with Example
Networking

4 min read


Jun 4, 2021

Switches and Routers, what’s the difference?

Switches and Routers are essential hardware pieces for the foundation of a network. In the beginning stages of the development of the computer, the need arose for computers to be able to talk to each other. …

Router

5 min read

Switches and Routers, what’s the difference?
Switches and Routers, what’s the difference?
Router

5 min read


May 27, 2021

What is a Honeypot and How does it help my Business?

A honeypot is a decoy target that attracts cyber attacks, distracting hackers from other important targets, and learns about how hackers do what they do. In this article, we will discuss different types of honeypots and how they can help your business. How honeypots work A honeypot is supposed to imitate a real…

Honeypot

3 min read

What is a Honeypot and How does it help my Business?
What is a Honeypot and How does it help my Business?
Honeypot

3 min read


May 13, 2021

3 Security Quick Wins You Can Implement Right Now

There are lots of things that need to be done to ensure the security of a system or network. Sometimes this process can be long, tedious, and confusing to set up for yourself. Oftentimes you will need a professional to handle things for you. Here we will provide 3 easy…

Cybersecurity

4 min read

3 Security Quick Wins You Can Implement Right Now
3 Security Quick Wins You Can Implement Right Now
Cybersecurity

4 min read


Apr 28, 2021

Top 3 Cyber Threats that small businesses face

There are many different types of cyber threats that a hacker can take advantage of to gain what they want. Some include phishing, malware, SQL injections, Denial-of-Service, or brute-force. All these terms and phrases can get confusing at times. In this article, we break down for you the top 3…

Cybersecurity

4 min read

Top 3 Cyber Threats that small businesses face
Top 3 Cyber Threats that small businesses face
Cybersecurity

4 min read

SafeHouse

SafeHouse

16 Followers

Freedom through decentralization

Following
  • DFINITY

    DFINITY

  • Diana Rosado

    Diana Rosado

  • Samuel Schmitt

    Samuel Schmitt

  • Mukund Iyengar

    Mukund Iyengar

  • ms wubz

    ms wubz

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech