blog.nektra.com
microsoft-appv – Nektra Blog – Software Development Company
http://blog.nektra.com/main/tag/microsoft-appv
Nektra Blog – Software Development Company. Custom Software Development, Application Virtualization, Windows Internals and Add-Ons. SpyStudio Is Now Free: Create and Troubleshoot Application Packages for Windows. Custom Windows Software Development. Data Loss Prevention Development. Data Loss Prevention Solution Development. Audio recorder capture sdk g-talk lync skype. Comparing Data Loss Prevention Products. Benchmarking Windows Packet-Capture Methods for Windows Driver Development. Office / Office 365...
blog.coinfabrik.com
zk-SNARKs Technically Explained: Basic Principles - CoinFabrik Blog
http://blog.coinfabrik.com/zk-snarks-explained-basic-principles
Secure Cryptocurrency Applications Development. Zk-SNARKs Technically Explained: Basic Principles. December 14, 2016. December 15, 2016. The full technical article is available here. Payment confidentiality is a property for cryptocurrencies which allows the user to hide the sender and receiver, as well as the amount of a transaction in the blockchain. Monero Research Lab invented. ZkSNARKs in a Nutshell. Zero-Knowledge-Proofs: An illustrated Primer. For a good survey of Zero-Knowledge-Proof. If you like...
blog.coinfabrik.com
How to Run Multiple Geth Instances on a Private Ethereum Blockchain - CoinFabrik Blog
http://blog.coinfabrik.com/how-to-run-multiple-geth-instances-on-our-private-ethereum-blockchain
Secure Cryptocurrency Applications Development. How to Run Multiple Geth Instances on a Private Ethereum Blockchain. November 26, 2015. May 11, 2016. A private ethereum blockchain with multiple geth instances can be run over a network or on the same computer. We will explain how to do both, and also how to solve some common issues. Each geth instance should be run with the following parameters:. What all the instances will have in common is the genesis path and the network identification. The nodes w...
blog.coinfabrik.com
July 2016 - CoinFabrik Blog
http://blog.coinfabrik.com/2016/07
Secure Cryptocurrency Applications Development. Comparison of Cryptocurrency Developments. Working for our customers in our blockchain development company we built this spreadsheet which is a work in progress, comments are welcome here, which describes the features of multiple blockchain and sidechain technologies. Views about blockchain technologies range from hype to skepticism. A blockchain is a distributed database and consensus network that can be used to […]. Outlook 365 plugin development.
nektra.com
Audio Recorder API | Nektra - Fast Custom Software Development Company
http://www.nektra.com/products/audio-recorder-api
Data Loss Prevention Solution Development. Windows Live Mail API. X25BC; Next Steps. X25BC; Related Solutions. Data Loss Prevention Development. Windows Live Mail API. Secure Coupon Code Generator. Recording IM application's audio such as Skype, G-Talk, Lync. Requires the interception of MCI Wave API calls, IDirectSound interface and the new IAudioClient interface, part of the Windows Vista / Windows 7 Core Audio engine. We published a blog article ( DirectSound Capture using Deviare.
blog.coinfabrik.com
CoinFabrik Blog - Page 2 of 2 - Secure Cryptocurrency Applications Development
http://blog.coinfabrik.com/page/2
Secure Cryptocurrency Applications Development. How to Use Coinkite’s Multi-Signature Wallets with Bitcore (Beginner Friendly Article). September 3, 2015. September 3, 2015. We’re going to learn to use a 2-of-3 multisignature wallet with. And Bitcore. One cosigner will use a Coinkite account, and the other will use the Bitcore library in NodeJS. Setting Up Your Coinkite Multi-Signature Wallet. Enter an account name and select Bitcoin Testnet as currency. Choose 2-of-3 (the default value). Each of the thr...
blog.coinfabrik.com
May 2016 - CoinFabrik Blog
http://blog.coinfabrik.com/2016/05
Secure Cryptocurrency Applications Development. ECDSA Security in Bitcoin and Ethereum: a Research Survey. Elliptic curve cryptography is becoming more and more popular. One of its main supporters is the cryptocurrency system Bitcoin which uses an elliptic curve scheme for their digital signatures. Smaller key size, a more efficient implementation than the RSA system, and a similar level of security make elliptic curve cryptography an interesting alternative to RSA. […]. Outlook 365 plugin development.
blog.coinfabrik.com
Interdependent Transactions in Bitcoin, RSK and Ethereum - CoinFabrik Blog
http://blog.coinfabrik.com/interdependent-transactions-in-bitcoin-rsk-and-ethereum
Secure Cryptocurrency Applications Development. Interdependent Transactions in Bitcoin, RSK and Ethereum. June 14, 2016. June 15, 2016. A recent paper titled The Blockchain Anomaly. Transaction amount (large transactions require more confirmations to prevent double-spending). The properties of other transactions included in competing blocks (such as the presence of bribe fees) during the confirmation interval. The properties of other transactions included in the confirmation chain (to detect if these oth...
blog.coinfabrik.com
Fernando Tiberti, Author at CoinFabrik Blog
http://blog.coinfabrik.com/author/fernando-tiberti
Secure Cryptocurrency Applications Development. Swagger Specification for Coinbase API v2. Coinbase has official client libraries for Python, Ruby, PHP, Node.js and Java, but what about other languages? Enter Swagger. Swagger is an open-source project which includes an specification for describing APIs in JSON or YAML and tools for generating ready-to-go client libraries in several languages. Here at CoinFabrik, we have been writing a first draft […]. Independently Generating Your Private Key for Coinkite.
blog.nektra.com
hooking – Nektra Blog – Software Development Company
http://blog.nektra.com/main/tag/hooking
Nektra Blog – Software Development Company. Custom Software Development, Application Virtualization, Windows Internals and Add-Ons. SpyStudio Is Now Free: Create and Troubleshoot Application Packages for Windows. Instrumenting Direct3D Applications to Capture Video and Calculate FPS. What is your computer’s maximum render quality, resolution, and frames per second for Battlefield 3? Intercepting Direct3D COM Objects and Making Game Walls Invisible. Using Deviare to Cheat on Games This simple Deviare code...
SOCIAL ENGAGEMENT