The popularity of cloud computing and mobile devices is revealing many opportunities for cyberattacks. In this article, learn why your organization should invest in cybersecurity and how you can get started.
Security
Allcode protects our clients online with industry-leading security. Everything we make is protected with powerful built-in security technologies that help detect and block threats before there is a problem.

Top 5 Data Security Threats to Healthcare
Top 5 Data Security Threats to Healthcare Every aspect of daily life has been permeated by technological progress: the “traditional” way of doing things, from even a generation ago, is now rendered obsolete and antiquated by the digital revolution. Accordingly, the...
5 Tips for Creating a Strong Password
5 Tips for Creating a Strong Password Passwords protect the vulnerable information that makes up your life. Whether it be your bank information or social media account, behind the password lies personal details, which can be detrimental to your life if the wrong...
5 Tips to Stay Safe Online
5 Tips to Stay Safe Online Over the past decade, the fabric of daily life has become interwoven with smartphones, social media, and the apps that make rapid-fire technological innovations feel indispensable. These device-driven distractions create a blur of browsing...
How to connect to a VPN on Mac OS X with OpenVPN, Tunnelblick, and DUO
How to connect to a VPN on Mac OS X with OpenVPN, Tunnelblick, and DUO Download Tunnelblick. - http://tunnelblick.net/downloads.html (stable version is advised) Install Tunnelblick.Launch TunnelblickDrop the opvn configuration file provided by your system...
Pareto Network's ERC20 Smart Contract Audit Report
1. Introduction This document is a security audit of Pareto Network’s ERC-20 token contract supporting their decentralized ecosystem. The scope of the security audit was restricted to: Scan the contracts listed above for generic security issues using automated systems...
Technical Analysis of the $31 Million Dollar Ethereum Hack
Here's an interesting analysis of the $31 Million Ethereum Hack. http://medium.freecodecamp.org/a-hacker-stole-31m-of-ether-how-it-happened-and-what-it-means-for-ethereum-9e5dc29e33ce From a technical standpoint, it appears as though the software developers who built...
How to Debug Ruby on Rails through SSL with RubyMine Foreman
If you’re required to debug Ruby on Rails in RubyMine Foreman through SSL, e.g. you’ve got a Facebook App, you will find the following useful.Unfortunately, I’ve not been able to find a way to debug by using the standard debug rails configuration. Instead, I had to...
AWS SSL Certificates for Elastic Beanstalk
AWS SSL Certificates for Elastic Beanstalk are a pain to configure so I put together the following. SSL certificates for your vanity domain will work correctly as long as users access your Elastic Beanstalk environment through your vanity domain name.Certs are not...
What do you do when your SSL Certificate expired?
I ran into this problem the other day. My SSL Certificate expired for my dev domain. I went to Network Solutions, snagged a new Certificate using my old Certificate Signing Request (CSR), and tried to import it into my keystore. In the past, I’ve always generated my...