GitHub - shadders/JavaBitcoin: Bitcoin client node written ...

CashScript docs are live!

The CashScript docs are live!
CashScript is a high-level language that allows you to write Cash Contracts in a straightforward and familiar way. It is inspired by Ethereum's Solidity, but it is not the same, and cash contracts work very differently from Ethereum's smart contracts.
CashScript features a compiler as a standalone command line tool, called cashc. It can be installed through npm and used to compile .cash files into .json artifact files. These artifact files can be imported into the CashScript JavaScript SDK (or other SDKs in the future). Note that the CashScript SDK also has a function to import and compile .cash files directly, so it is not required to use the cashc command line tool.
See the cashc documentation for more information on the cashc command line tool.
The main way to interact with cash contracts and integrate them into applications is using the CashScript SDK. This SDK allows you to compile .cash files or import .json artifact files, and convert them to Contract objects. These objects are used to create new contract instances. These instances are used to interact with the contracts using the functions that were implemented in the .cash file. For more information on the CashScript SDK, refer to the full SDK documentation.
If you want to see CashScript in action and check out its usage, there are several example contracts in the CashScript repository. The .cash files contain example contracts, and the .ts files contain example usage of the CashScript SDK to interact with these contracts.
Thanks to Rosco Kalis for this great contribution.
submitted by cgcardona to btc [link] [comments]

If you like watching tutorials to learn! Dump of Hacking/Programming Courses (, Coursera,

 /\ / \ _ __ ___ _ __ _ _ _ __ ___ ___ _ _ ___ / /\ \ | '_ \ / _ \| '_ \| | | | '_ ` _ \ / _ \| | | / __| / ____ \| | | | (_) | | | | |_| | | | | | | (_) | |_| \__ \ /_/ \_\_| |_|\___/|_| |_|\__, |_| |_| |_|\___/ \__,_|___/ __/ | |___/ 
Courses pirated & dumped by Case & S1rlancelot
* This series of videocourses will guide you through the core material that an entry-level "ethical" hacker needs.
* Go to (most links here are from there) and search the course if you want to see the table of contents.
* You may want to use a media player that allows you to increase the speed of the videos
* The number does not mean the order in which you should follow the courses, its just the order in which they were added.
* Use ?desc to check the description of a course. Eg: ?desc 81
* Special thanks to ClaudiaD who haxed her way and made downloading the videos a lot easier, you rock. I also reused the code of her IRC bot which lead to the birth of SexyTeacherBot. Thanks ;)
* Special thanks to S1rlancelot who has also dumped a great deal of courses as well and helps more than I could ever ask for in #learninghub and is also leet as fuck

Don't know where to start? <----------------------------------------------------------------------- Don't know where to start? <------------------------------------------------------------------------------------------------------------------------------------------------

-> BEGINNERS MUST WATCH: 10,000 foot view of penetration testing: 81.

-> The top 10 OWASP vulnerabilities explained & exploited. Good for getting a big picture of present day web hacking: 2.

-> A ~9 hour long course on website vulnerabilities and how to exploit/secure them: 1. (Hack Yourself First; How to go on the Cyber-Offense)

----------------------------------------------------------------------------- The rest of the courses listed below will go deeper into each step of hacking and the different attack techniques. <-------------------------------------------------------------------------------


# EC-Council's Certified Ethical Hacker (CEH)
  1. -- Reconnaissance/Footprinting
  2. SQL Injection
  3. Scanning Networks
  4. Enumeration
  5. -- Hacking Web Servers
  6. -- Hacking Web Applications
  7. Cryptography
  8. Sniffing
  9. Session Hijacking
  10. Social Engineering
  11. System Hacking
  12. Denial of Service
  13. -- Hacking Wireless Networks
  14. Malware Threats
  15. Evading IDS, Firewalls, and Honeypots
  16. Hacking Mobile Platforms

# More hacking courses
  1. Introduction to Pentesting and Ethical Hacking with Kali Linux
    1. -- Introduction to Firewalls
    2. Introduction to browser security headers
    3. -- Introduction to Wireshark
    4. -- Troubleshooting with Wireshark
    5. Wireshark 2.0
    6. Network Security Testing with Nmap
    7. -- All about buffer overflows
    8. Network Pentesting using Python and Kali linux
    9. Metasploit Basics
    10. CloudFlare Security
    11. -- Hack your API first
    12. -- SSCP: Risk Identification, Monitoring, and Analysis
    13. Check Point Certified Security Administrator; Install & Deploy
    14. -- Cloud Security
    15. -- Cloud Computing
    16. -- Introduction to Pentesting using Metasploit

# Computer Hacking Forensic Investigator (CHFI)
  1. —- Module 1 Introduction
  2. —- Module 2 Forensics & Investigation Process
  3. —- Module 3 Searching & Seizing
  4. —- Module 4 Digital Evidence
  5. —- Module 5 Responder Procedures
  6. —- Module 6 Forensic Lab
  7.—- Module 7 Hard Disks & File Systems
  8. —- Module 8 Windows Forensics
  9. —- Module 9 Data Akquisition & Duplication
  10. —- Module 10 Recovering deleted Files & & partitions
  11. —- Module 11 Using Access Data FTK
  12. —- Module 12 Using EnCase
  13. —- Module 13 Steganography
  14. —- Module 14 Password Crackers
  15. —- Module 15 Log Correlation
  16. —- Module 16 Network Forensics
  17. —- Module 17 Wireless Attacks
  18. —- Module 18 Web Attacks
  19. —- Module 19 Email Crimes
  20. —- Module 20 Mobile Investigation
  21. —- Module 21 Investigative Reports
  22. —- Module 22 Expert Witness

# Certified Information Systems Security Pro (CISSP)
  1. —- CISSP Module 1 Security and Risk Management
  2. —- CISSP Module 2 Asset Security
  3. —- CISSP Module 3 Security Engineering
  4. —- CISSP Module 4 Communication and Network Security
  5. —- CISSP Module 5 Identity and Access Management
  6.—- CISSP Module 6 Security Assessment Testing
  7. —- CISSP Module 7 Security Operations
  8. —- CISSP Module 8 Software Development Security

# Certified Information Systems Auditor (CISA)
  1.—- CISA Lesson 1
  2.—- CISA Lesson 2
  3.—- CISA Lesson 3
  4.—- CISA Lesson 4
  5.—- CISA Lesson 5
  6.—- CISA Lesson 6
  7.—- CISA Lesson 7

# Coursera
  1. Software Security
  2. Hardware Security
  3.[Princeton+University].7z -- Bitcoin & Cryptocurrency tech, by anominous - thanks!


# Programming
  1. C++ Fundamentals
  2. -- C++ Advanced topics
  3. -- C Fundamentals
  4. C in Action
  5. -- Java Fundamentals
  6. -- Javascript from Scratch
  7. -- Introduction to Javascript, by anominous - thanks dude, you rock!
  8. -- Introduction to HTML (for designers - you don't really need to be a designer)
  9. -- Introduction to JQuery
  10. -- Introduction to CSS
  11. Introduction to Arduino
  12. -- Get started with AngularJS
  13. -- Building Angular and Node JS Apps with the MEAN Stack
  14. -- ExtJS Desktop Fundamentals
  15. -- Python Fundamentals
  16. -- Python Beyond the basics
  17. -- Django Fundamentals
  18. -- Ruby 2.0, by anominous - thanks dude!
  19. -- Getting started with BackBone.js, by anominous - thanks dude!
  20. -- Introduction to PowerShell
  21. -- Raspberry Pi Home Server
  22. -- Raspberry Pi for Developers

# Cisco CCNA Security (640-554)
  1. -- Introduction to Network Security
  2. AAA and IP Security
  3. Firewalls and VPNs


# CompTIA A+ (220-801)
  1. CompTIA A+ Part 1: Computer Hardware
  2. -- CompTIA A+ Part 2: Networking
  3. -- CompTIA A+ Part 3: Peripherals and best practices
  4. CompTIA A+ Part 4: Operating System
  5. -- CompTIA A+ Part 5: Mobile Devices and Troubleshooting

# CompTIA Security+ (SY0-401)
  1. -- CompTIA Security+ Domain 1 - Network Security.

# CompTIA Network+ (N10-006)
  1. Network Architecture
  2. Network Operations
  3. Network Security

# Linux
  1. Linux Installation and Initial Configuration
  2. -- Introduction to the Bash Shell
  3. -- Shell Scripting with Bash
  4. -- Linux Command Line Interface Fundamentals

# Video editing
  1. -- Adobe Premiere Pro CC Fundamentals
  2. Animation and Video Editing in Photoshop CS6
  3. -- Color Correction and Grading in Adobe Premiere Pro and SpeedGrade
  4. -- Action Scene Editing Techniques in Adobe Premiere Pro
  5. -- Adobe Premiere Pro CS6 Setup [This is the software, not a course]

# Others
  1. Clean Code
  2. Test Driven Development with Brad Wilson
  3. The fundamentals of Scrum methodology
  4. -- Building a successful blog
  5. -- Building a high traffic profitable blog
  6. Fiddler

=== Other Resources === -- Useful PDFs about a huge amount of topics regarding hacking, extracted from -- Perl documents -- Red hat documents -- Reverse Engineering Assembly Free course series by University of Helsinki in collaboration with F-Secure -- 160 books on security stuff A curated list of awesome information security resources -- A curated list of awesome self hosted alternatives to cloud services. A curated list of resources for learning about application security. Contains books, websites, blog posts, and self-assessment quizzes. -- OSCP Prepare -- All you need to pass OSCP A collection of handy bookmarks

** Ask Case for PDFs and other stuff on a specific topic. There are also the following courses available which have not been categorized yet:
Introduction to game development with Unity
Digital audio fundamentals
Alchemy synth

=== Practice what you learn ===
* -> webclient and webserver challenges can be done on the go, Capture The Flag, etc.
* -> Very good for learning programming, has on-the-go exercises
* use fucking google

Other free hacking/IT videos:
Interesting github: -- Check out Hacking Team if you haven't!
submitted by imthagh0st to Hacking_Tutorials [link] [comments]

Factom Protocol Information

The Factom protocol is an open source general purpose data protocol built by an international group of technology companies that extends the security of blockchain to any type of data. Just as TCP / IP enables the WWW, the Factom Protocol enables countless applications to be built on top of it.
Factom is built from scratch and has novel design implementations that set it apart from all other blockchain protocols. We are confident these features will help propel Factom to become the internet's data integrity layer. You are invited to delve into our ecosystem and we look forward to answering any questions you have.
Token and Tokenomics
While the Factom Protocol is a two token system, only the Factoid (FCT) is transferable and able to be traded on exchanges. Entry Credits (EC) are obtained by burning FCT and are used to enter data into the Factom Protocol. Entry Credits are $.001 each and that price is fixed. Therefore, if FCT is worth $1.00 and you burn it, you receive 1,000 EC. If FCT is worth $10.00 each and you burn one, you receive 10,000 EC. This brilliant two token system allows for:
  1. The value of FCT to theoretically increase the more the Factom Protocol is utilized.
  2. Companies and governments can effectively budget for entering data onto the Protocol based upon their estimated usage.
  3. Subscription systems can be setup with 3rd parties where companies and governments don't have to hold cryptocurrency if they don't want to or can't for compliance reasons. FCT are still burned for EC by the 3rd party company but the subscriber is charged a small markup for the service.
Community Discussion
Block Explorers
Testnet Resources
Top Exchanges (by volume)
Authority Node Operators
Authority Node Operators are the coalition of companies that decentralize the Factom Protocol. .
Committees and Working Groups
As the Factom Protocol is one of the most decentralized blockchain projects in existence with no central authority, committees and working groups have been formed to deal with specific tasks.
Past Newsletters
submitted by DChapman77 to factom [link] [comments]

DuckDNS - improvements based on your feedback

Hello again, after a busy week we have learnt a lot and improved many aspects of our service, adding features requested by redditors.
Here is a short list:

Read - Write Cache

CyberconIII and I noticed that our DynamoDB Read / Writes were steadily climbing, and that we would have to do something soon.
We implemented caching on both reads (at the DNS server) and writes (at the update service), this has significantly reduced the amount of database traffic on our network. This has vastly improved our capacity, by reducing the load on our database - more statistics and graphs on our Google+ Community Page

SSL Certs

Many people on Mobile devices tell us that our SSL certificates are invalid - this was because our root chain certificate was not in the mobiles browsers store. We have switched to certs provided for Free by so that's fixed now.

Installed a Mail Server

However to get these we had to setup a EMail server, this meant that we had to learn how EMail servers work, and how best to run this on EC2. From this we produced a guide for others to follow

Reddit OAuth Login

As mentioned in a previous post we have added Reddit login to DuckDNS, enabling user to login with thier reddit account. We are working on Facebook Login (its done), but we are still in the review Queue. We shared the java code for Reddit Login with the rest of the world, we hope someone finds it useful.

DNS server improvements - meeting standards

We had a PM about our DNS server not meeting standards, and a really useful Online service highlighted all the issues we had IntoDNS. From this we have fixed quite a few bugs - and we seem to get a much better report now.

Command Line server tool

We have created a server side command line tool, this gives us features to see statistic on the number of record in our database and also allows us to upgrade users without having to muck about in the DyanmoDB Amazon Web Services web interface.

Abuse Policy

We now have an Abuse Policy on the FAQ page - it’s basic - but we should have one.

Donate via Bitcoin

Additional to Paypal, we can now accept donations via Bitcoin - 1CoHE96MHeDkygnqAFmy6Qn9NwP6wVF7bm
So overall we have had a really good week.
As always suggestions for improvements are welcome
EDIT: Facebook login now live - the minimal privacy settings they allow - Email, Basic public info and Friend List (FYI - we only pull & store the Email Address)
submitted by stevethepirateuk to raspberry_pi [link] [comments]

Bitcoin JSON-RPC Tutorial 1 Bitcoin from the Command Line - Sending Bitcoin ... Create JavaDoc From Unix CommandLine Bitcoin JSON-RPC Tutorial 4 - Command Line Interface - YouTube Generate Javadoc from command line - JAVA

JavaDoc ignores this tag until -version command-line argument is specified. @author-This tag adds an "Author:" entry in the documentation. author information like name, email id, etc will be placed on the JavaDoc command line, the author information will be called out especially in the generated HTML). If we have multiple authors, they must be placed consecutively. They will be placed in a ... A collection of various utility methods that are helpful for working with the Bitcoin protocol. To enable debug logging from the library, run with -Dbitcoinj.logging=true on your command line. Field Summary. Fields ; Modifier and Type Field and Description; static String: BITCOIN_SIGNED_MESSAGE_HEADER. The string that prefixes all text messages signed using Bitcoin keys. static byte[] BITCOIN ... Hi Jonny suggestion: use %pom_add_dep org.iq80.leveldb:leveldb::compile core "<optional>true</optional>" %pom_add_dep org.fusesource.hawtjni:hawtjni-runtime::compile ... javaw.exe -Xmx512m -Djava.library.path=\Bitcoin\JavaBitcoin -jar \Bitcoin\JavaBitcoin\JavaBitcoin.jar PROD Replace javaw.exe with java.exe if you want to run from a command prompt. This will allow you to view log messages as they occur. Provides a standard implementation of a Bitcoin URI with support for the following: URLEncoded URIs (as passed in by IE on the command line) BIP21 names (including the "req-" prefix handling requirements) Accepted formats. The following input forms are accepted: bitcoin:<address> bitcoin:<address>?<name1>=<value1>&<name2>=<value2> with multiple additional name/value pairs; The name/value pairs ...

[index] [26977] [33606] [18838] [28614] [11299] [23382] [10113] [9850] [6037] [46955]

Bitcoin JSON-RPC Tutorial 1

Bitcoin from the Command Line - Sending Bitcoin Transactions Programmatically with Javascript - Duration: 17:07. Decypher Media 11,413 views. 17:07. How to Generate JavaDocumentation using java doc tool - java doc command - Duration: 22:57. Java Mojo 1,475 views. 22:57. How To Lay Block Fast and Easy! - Duration: 8:42. One of the common complaints with Bitcoin is that it’s pretty hard to get started, and there’s a lot of overhead to making accounts and sending transactions.... generate java documentation in HTML from command line command C:\projects javadoc -d [path to javadoc destination directory] [package name] to learn more abo... (full course) This will demo creating a Bitcoin address and transaction using JavaScript and the library. Full source ...