SafeHouseinCodeXWhy Decentralization is the FutureAnyone who hasn’t been living under a rock has heard of Bitcoin. People have been debating for a long time about whether Bitcoin is “just…8 min read·Jul 23, 2021--1--1
SafeHouseinCodeXAES: How the Most Advanced Encryption Actually WorksGovernments, militaries, banks and corporations rely on it. It’s responsible for securing most, if not all of your personal and financial…15 min read·Jul 13, 2021--1--1
SafeHouseHow TLS Protects Your Web ActivityIn our many articles about how the internet works, we left out an important detail. Many common internet-facing applications secure data…5 min read·Jul 2, 2021----
SafeHouseDemystifying Ethernet and Fiber OpticsIn our last article, we talked about TCP and UDP, the protocols that handle the delivery and verification of data sent over the internet…4 min read·Jun 25, 2021----
SafeHouseTCP vs UDP, what’s the difference?This is another entry in a series of articles in which we talk about the fundamentals of how the internet works. We started with switches…4 min read·Jun 18, 2021----
SafeHouseOSI model and TCP/IP Explained with ExampleIn our last article we talked about switches and routers, two of the basic building blocks of the internet. In that article we mentioned…4 min read·Jun 10, 2021----
SafeHouseSwitches and Routers, what’s the difference?Switches and Routers are essential hardware pieces for the foundation of a network. In the beginning stages of the development of the…5 min read·Jun 4, 2021----
SafeHouseWhat is a Honeypot and How does it help my Business?A honeypot is a decoy target that attracts cyber attacks, distracting hackers from other important targets, and learns about how hackers do…3 min read·May 27, 2021----
SafeHouse3 Security Quick Wins You Can Implement Right NowThere are lots of things that need to be done to ensure the security of a system or network. Sometimes this process can be long, tedious…4 min read·May 13, 2021----
SafeHouseTop 3 Cyber Threats that small businesses faceThere are many different types of cyber threats that a hacker can take advantage of to gain what they want. Some include phishing, malware…4 min read·Apr 28, 2021----