Digital Archive
Search
Search
Dark mode
Light mode
Explorer
Blockchain
Bitcoin
Addresses
Bitcoin Address
Bitcoin Bech32 Address
Bitcoin Legacy Address
Transactions
Bitcoin Digital Signature
Bitcoin Transaction Fees
Bitcoin Transaction Flows
Bitcoin Transaction Scripts
Bitcoin Transactions
Transaction Structure
Bitcoin
Bitcoin Applications
Bitcoin Blocks
Bitcoin Core
Bitcoin Lightweight Clients
Bitcoin Mining
Bitcoin Network Communication
Bitcoin Test Blockchains
Digital Wallets
Wallet Recovery
Ethereum
Ethereum Address
Ethereum Basics
Ethereum Clients
Ethereum Overview
Blockchain
Cloud Service Providers
Aws
Aws Analytics Services
Redshift
Redshift
Redshift Architecture
Redshift Distribution Style
Redshift Sort Key
AWS Analytics Services
AWS Athena
Aws Compute Services
AWS Lambda
EC2 (Elastic Cloud Compute)
Aws Database Services
Dynamo Db
Dynamo DB
Dynamo DB Primary Key
Dynamo DB Secondary Index
AWS Database Services
Aws Other Services
Kinesis
AWS Kinesis
Kinesis Key Terms
AWS Glue
Aws Storage Services
S3
S3 (Simple Storage Service)
S3 Storage Classes
Transfer Acceleration
AWS Storage Services
AWS
Azure
Azure Analytics Services
Azure Synapse Analytics
Azure Synapse Analytics
Dynamic Data Masking
Partition & Distribution
Partition Switching & Splitting
Row Level & Column Level Security
Azure Analytics Services
Log Analytics Workspace
Azure Compute Services
Azure Compute Services
Azure Container Instance (ACI)
Azure Function App
Azure Kubernetes Service (AKS)
Azure Service Plan
Azure Virtual Machine
Azure Web App
Health Checks
Azure Concepts
Azure Documents
Azure Regions
Cost Reducing Approaches
Azure Datastore Services
Azure Cosmos Db
Apache TinkerPop
Azure Cosmos DB
Cosmos DB Consistency
Cosmos DB Partitioning
Cosmos DB Throughput
MongoDB API
Service-side Features
Table API
Azure Sql Db
Azure Elastic Pools
Azure SQL DB
Connectivity Mode
Hyperscale on Azure
Purchasing Model
SQL DB Security
SQL Edge Data Retention
Temporal Tables
Azure Tables
Azure Tables
Azure Tables Partitioning
Azure Datastore Services
Polybase
Azure Messaging Services
Azure Event Grid
Azure Event Hub
Azure Messaging Services
Azure Service Bus
Batch Processing
Streaming Units
Streaming Window Functions
Azure Networking Services
Azure DDoS Protection
Azure Firewall
Azure Networking Services
Azure Virtual Network
Network Security Groups (NSG)
Azure Other Services
Azure Automation
Azure Automation
Azure Configuration Management
Azure Caching Services
Azure Cache for Redis
Azure CDN
Azure Data Factory
Azure Data Factory
Data Factory Components
Monitoring & Version Control
Azure Devops
Azure DevOps
Azure Pipelines
Centralized vs. Distributed Source Control
DevOps Boards
Self-Hosted Agents
Azure Monitor
Application Insights
Azure Alerts
Azure Metrics & Logs
Azure Monitor
ARM Templates
Azure AI Services
Azure API Management
Azure IoT Services
Azure Logic App
Azure Notification Hub
Azure Security Services
Azure Active Directory
Application Identity Types
Azure Active Directory (AAD)
Azure AD Conditional Access
Azure AD Connect
Device Identity Management
External Identity Types
Azure Blueprints
Azure Defender for Cloud
Azure Disk Encryption (ADE)
Azure Key Vault
Azure Policy
Azure Resource Locks
Azure Security Services
Azure Web Application Firewall (WAF)
Role Based Access Control (RBAC)
Security Concepts
Transparent Data Encryption (TDE)
Zero-Trust Model
Azure Storage Services
Access Control Methods
Azure Blob Types
Azure Containers
Azure Data Lake Storage
Azure File Shares
Azure Queue
Azure Storage Account
Azure Storage Services
Blob Storage Security
Block Blob Access Tiers
Data Redundancy Options
Immutable Blob Storage
Partitioning in ADLS
Azure
Common Concepts
Benefits of Cloud Computing
CapEx and OpEx
Cloud Deployment Model
Cloud Responsibility Models
Service Level Agreement
Gcp
Digital Transformation
Google Cloud Solution Pillars
Innovation Waves
Gcp Ai Ml Services
GCP AI Services
GCP ML Services
Gcp Analytics Services
GCP Data Analytics Services
GCP ETL Services
Gcp Api Management Services
API Management Services
Apigee
Gcp Compute Services
App Engine
GCP Compute Services
Gcp Concepts
Assured Workloads
GCP Hierarchy Architecture
GCP Project & Folders
GCP Regions & Zones
GCP Resource Hierarchy
Google Cloud for Government
Gcp Container Services
GCP Container Services
Gcp Database Services
GCP Database Services
Gcp Hybrid Cloud Services
Anthos
GCP Hybrid Cloud Services
Gcp Migration Services
GCP Migration Services
Migration Path
Types of Migration
Gcp Networking Services
Cloud Interconnect
GCP Networking Services
GCP Virtual Private Cloud (VPC)
GCP VPC Services
Gcp Other Services
GCP Cloud Deployment Manager
GCP Developer Tools
GCP Internal Services
GCP Media & Gaming Services
Operations Suite Services
Gcp Security Services
BeyondCorp
Cloud Identity
Directory Service
GCP Compliance Standards
GCP IAM Services
GCP Security Services
Gcp Serverless Services
GCP Serverless Services
Gcp Storage Services
Cloud Storage
GCP Persistent Disk
GCP Storage Services
Gcp Support and Billing
Active Assist Recommender
Cloud Billing Account
Pricing Tiers Overview
GCP
Snowflake
Snowflake
Snowflake Architecture
Snowflake Migration Commands
Snowflake Table Types
Time Travel & Fail Safe
Cloud Service Providers
Computer Networks
Layer Wise Concepts
Data Link Layer Concepts
ARP (Address Resolution Protocol)
CSMA-CD
Data Link Layer Concepts
Ethernet
MAC (Media Access Control) Address
Spanning Tree Protocol (STP)
Virtual LANs (VLANs)
Network Layer Concepts
Ip Address
CIDR (Classless Inter-Domain Routing)
IP Address
IP Address Classes
IPv4 (Internet Protocol v4) Address
IPv4 to IPv6 Transition
IPv6 (Internet Protocol v6) Address
Public & Private IP Addresses
Routing Protocols
BGP (Border Gateway Protocol)
OSPF (Open Short Path First)
RIP & RIPv2 (Routing Information Protocol)
APIPA (Automatic Private IP Addressing)
Dynamic Routing Protocols
ICMP (Internet Control Message Protocol)
NAT (Network Address Translation)
Network Layer Concepts
Subnetting
Tunneling Protocols
Physical Layer Concepts
Cable Distribution
Copper Cable
Ethernet Standard
Fiber Optic Cable
Physical Layer Concepts
Transport Layer Concepts
Network Ports
QUIC (Quick UDP Internet Connections)
TCP (Transmission Control Protocol)
TCP Three-Way Handshake
Transport Layer Concepts
UDP (User Datagram Protocol)
Network Basics
Host to Host Communication
Internet of Things (IoT)
Network Architecture
Network Geography
Network Topologies
Network Infrastructure
Dns Server
DNS Attacks
DNS Name Servers
DNS Records
DNS Zone Types
Domain Name System (DNS)
Switch
Switch
Switch MAC Address Learning
Types of Switch
Bridge
Dynamic Host Configuration Protocol (DHCP)
Hub
Layer 3 Switch
Load Balancer
Modem
Network Devices
NIC (Network Interface Card)
Repeater
Router
WAP (Wireless Access Point)
Network Models
OSI Model
TCP-IP Model
Network Protocols
HSTS (HTTP Strict Transport Security)
HTTP(S) Protocol
IPSec Protocol Suite
Network Protocols
Simple Network Management Protocol (SNMP)
Network Security
Firewall
IDS and IPS
Network Access Control (NAC)
Network Security
Network Security Zones
Port Security
Proxy Server
Screened Subnet
Virtual Private Network (VPN)
Wide Area Network
Connection Methodologies
Asynchronous Transfer Mode (ATM)
Dial Up Connection
Digital Subscriber Line (DSL)
Fiber Distributed Data Interface (FDDI)
Frame Relay
Integrated Services Digital Network (ISDN)
Synchronous Optical Network (SONET)
T-Carrier and E-Carrier Digital Signal Lines
WAN Service Types
Wide Area Network (WAN)
Wireless Networking
CSMA-CA
IEEE 802.11 Standards
SSID (Service Set Identifier)
Wireless Encryption Standards
Wireless Networking
WPA2 (Wi-Fi Protected Access 2)
Computer Networks
Cyber Security
Access Management
Access Control Models
Access Control Types
Access Management
Authentication Factors
Federation
Identity and Access Management (IAM)
Identity Providers (IdP)
Lightweight Directory Access Protocol (LDAP)
OAuth 2.0
OAuth 2.0 Flows
OpenID Connect
Single Sign-On (SSO)
Asset Management
Asset Management
Change Management
Mobile Device Management
Audits and Assessments
External Audits
Internal Audits
Penetration Testing
Reconnaissance
Certifications
Comptia Cysa
CompTIA CySA+
Cybersecurity Roles
Comptia Security
Analyzing Vulnerabilities
Bluetooth Vulnerabilities and Attacks
CompTIA Security+
Digital Media Forensics
Email Security
Incident Response Procedure
NetFlow
Security Content Automation Protocol (SCAP)
SELinux
Web and DNS Filtering
Isc2 Cc
Business Continuity Plan (BCP)
Disaster Recovery Plan (DRP)
Governance Principles
ISC2: Certified in Cybersecurity
Laws and Regulations
Splunk
Cryptography
Algorithm
RSA Algorithm
Cryptographic Solutions
Digital Certificate
Encryption
Encryption Tools & Techniques
Hashing
Obfuscation
Math Concepts
Eulers Theorem
Eulers Totient Function
Fermats Little Theorem
GCD - Euclids Algorithm
Modular Arithmetic
Modular Exponentiation
Multiplicative Inverse
Primitive Roots
Relatively Prime Numbers
Cryptographic Attacks
Cryptography
Cyber Attacks
Malware
Indicators of Malware Attack
Malware Exploitation Techniques
Types of Malware
Social Engineering
Impersonation
Motivational Triggers
Phishing Attacks
Social Engineering Attacks
Sql Injection
BOOLEAN based (Blind) Injection
Burp Suite
Classic Injection Bypass
ERROR based (In-band) Injection
SQL Injection
SQLMap
TIME based (Blind) Injection
Types of SQL Injection
UNION based (In-band) Injection
Useful SQL Functions and Queries
Denial of Service (DoS) Attack
Server-Side Request Forgery (SSRF)
XSS (Cross Site Scripting)
Cyber Redundancy
Data Backup
Data Redundancy
High Availability
Powering Data Centers
RAID
Exploitation
Web App Exploitation
Web App Enumeration
Web App Exploitation
Windows Exploitation
Mimikatz
Windows Exploitation
Windows Manual Enumeration
Exploitation
Frameworks
AAA of Security
CIA Triad
General Concepts
Threat Actors
Deception Techniques
Threat Actor Motives
Threat Actors
CISSP Security Domains
CTF Challenge Checklist
Gap Analysis
Pyramid of Pain
Shadow IT
Threats & Vulnerabilities
Governance and Compliance
Compliance
Contract and Agreement
Governance
Policies
Standards & Procedures
Information Gathering
DNS Enumeration
Information Gathering
Service Enumeration
SMB Enumeration
SMTP Enumeration
Network Hacking
ARP Poisoning
Bypassing HTTPS (Hypertext Transfer Protocol Secure)
Changing MAC Address
De-Authentication Attack
DNS Spoofing
DNS Spoofing Attack
Enabling Monitor Mode
Injecting JavaScript Code
MITM (Man in the Middle) Attack
Network Hacking
Network Mapping
Packet Sniffing
WEP (Wired Equivalent Protection)
WEP Cracking
WPA - WPA2 Cracking
WPA (Wi-Fi Protected Access)
Password Cracking
Hashcat
Hydra
John the Ripper
Password Cracking
Risk Management
Business Impact Analysis (BIA)
Risk Analysis
Risk Appetite
Risk Assessment Frequency
Risk Identification
Risk Management
Risk Management Strategies
Risk Monitoring
Risk Register
Third-party Vendor Risks
Security Architecture
Cloud Security Concerns
Embedded Systems
ICS and SCADA Systems
SD-WAN and SASE
Software Defined Networking (SDN)
Virtualization
Security Controls
Data Protection
Data Classification
Data Loss Prevention (DLP)
Data Ownership
Data Protection Techniques
Data States & Types
Data Encryption
Endpoint Protection
Mobile Device Vulnerabilities
Physical Security
Security Controls
Threat Intelligence
Cyber Defense Frameworks
Cyber Threat Intelligence (CTI)
Threat Hunting
Threat Modeling
Yara
Tools
Bettercap
BetterCap
BetterCap GUI
Metasploit Framework
Exploit Configuration
Metasploit Framework
Meterpreter
Running Exploit
Selecting Exploit
Nmap
Firewall Detection & Evasion
Nmap
Nmap Scripting Engine (NSE)
Normal Scan Techniques
Rust Scan
Scan Timing and Performance
BeEF
Misc. Utilities
Cyber Security
Data Analytics
Analytics Concepts
ETL vs ELT
Fact & Dimension
File Formats
Slowly Changing Dimension (SCD)
Types of Analytics
Types of Dimension Tables
Apache Hadoop
Apache Hadoop
Hadoop Architecture
Hadoop Daemons
Hadoop Features
Hadoop Shell Commands
HDFS Operations
MapReduce
Apache Hive
Apache Hive
Hive Architecture
Hive Commands
Hive Custom Partitioning
Hive Default Partitioning
Hive File Formats
Hive Managed and External Tables
Apache Kafka
Apache Kafka
Kafka Architecture
Kafka Commands
Kafka Replication
Topics and Partition
Apache Spark
Spark Queries
Dataframe Commands
Join Query
Loading Table from Database
Partitioning & Bucketing
RDD Commands
Spark SQL Syntax
User Defined Schema
Spark Streaming
Output Sinks
Read from Folder
Spark Streaming
Spark Streaming Joins
Spark Streaming with Kafka
Spark Structure Streaming
Stream Processing
UDF (User Defined Function)
Watermarks
Window Transformations
Apache Spark
Delta Lake (Spark Queries)
RDD (Resilient Distributed Dataset)
Spark Architecture
Spark Clusters
Spark Compression
Spark Config & Settings
Spark Job, Task and Stage
Spark Joins
Spark Memory Management
Spark Operations
Spark SQL Optimization
Apache Sqoop
Apache Sqoop
Sqoop Commands
Data Visualization
Excel
Functions
Excel Arrays
Excel Evaluate Formula
Excel Function Tips
Excel Operators
Lookup Functions
OR and AND Criteria
SEARCH and FIND Function
Excel
Excel Shortcuts
Protecting Excel Workbooks
Types of Errors
Power Bi
Interactive Reports
Microsoft Power BI
Paginated Reports
Power BI
Power BI Embedded
Power BI Service
Databricks
Cloning & Overwriting (Delta Table)
Databricks
Databricks Auto Loader
Databricks Clusters
Databricks SQL (Misc.)
Databricks SQL (Tables)
Databricks SQL (Views)
Delta File Format
Delta Live Tables
Insert & Merge (Delta Table)
Medallion (Multi-Hop) Architecture
Data Analytics
Database Engineering
Database Concepts
Data Modeling
Row vs. Column Store
Types of Partitioning
Nosql
Database Theorems
Log Structure Merge (LSM) Tree
Types of NoSQL Databases
Sql
Oracle Sql
Data Control Language (DCL)
Data Definition Language (DDL)
Data Manipulation Language (DML)
Data Query Language (DQL)
Literal and Operators
Materialized View
Oracle SQL
Oracle SQL Functions
Subqueries
Transaction Control Language (TCL)
Types of Joins
Pl Sql
Control Flow and Loops
PL-SQL
PL-SQL Collections
PL-SQL Cursors
PL-SQL Functions
PL-SQL Packages
PL-SQL Procedures
PL-SQL Ref Cursors
PL-SQL Triggers
PL-SQL User Defined Exception
Row Type Variable
Variables and Constants
Sql Concepts
Count Command
Multiple Row Subquery Operator
Normalization
Query Processing Order
Relational Model
SQL Concepts
SQL Statement Order
Truncate, Delete & Drop Command
Types of Indexes
Types of Keys
Views
Sql Query Examples
SQL Join Examples
SQL Query Examples
SQL Window Function Examples
Oracle Database Config
Database Engineering
Electronics
Components
Capacitors
Inductors
Resistors
Transformers
AC & DC Current
Conventional Current
Current
Electronics
Power & Energy
Voltage
Languages
English
English
Parts of Speech
Philosophy
Schwa Sound
Japanese
Grammer
Japanese Grammar
X wa Y desu
Hiragana
Hiragana
Hiragana H-Column
Hiragana K-Column
Hiragana M-Column
Hiragana N-Column
Hiragana R-Column
Hiragana S-Column
Hiragana T-Column
Hiragana Vowels
Hiragana W-Column & N
Hiragana Y-Column
Kanji
Kanji
Katakana
Katakana
Katakana H-Column
Katakana K-Column
Katakana M-Column
Katakana N-Column
Katakana R-Column
Katakana S-Column
Katakana T-Column
Katakana Vowels
Katakana W-Column & N
Katakana Y-Column
Words
Japanese Words
Japanese
Languages
Operating System
Linux
Commands
Archival Commands
Copy Commands
cron Command
cURL Command
cut Command
dd Command
Device Information Commands
File Permission Commands
find Command
grep Command
Linux Commands
ln Command
lsof Command
Mount Commands
Network Related Commands
Package Management Commands
Process Management Commands
seq Command
Service Management Commands
sftp Command
sort & uniq Command
ssh Command
SSH Port Forwarding
User & Group Management Commands
xargs Command
xrandr Command
Linux System Concepts
Control Groups (cgroups)
Device Drivers
File Descriptors
File System Structure
Linux Kernel
Linux Memory Management
Linux Namespaces
Linux System Concepts
Shell Scripting
Bash
Bash Arrays
Bash Conditional Statements
Bash File Operations
Bash Functions
Bash Iteration Statements
Bash Special Symbols
Bash User Input
Bash Variables
Linux Environment Variables
Tools and Utilities
Linux Tools & Utilities
Tmux
Vim Editor
Linux Index
Linux Misc. Commands
Windows
Command Prompt
Download Commands
Encryption Commands
Folders as Virtual Drive
Network Commands
Symbolic Links
System Repair Commands
Task Management Commands
Microsoft Active Directory
Active Directory Terminologies
Domain Controller (DC)
Domain Services
Microsoft Active Directory
Misc Stuff
NTFS Alternative File Stream
Windows Files & Tweaks
Windows Shortcuts
Tools and Utilities
Windows Terminal
Winget Commands
WSL Configuration
Windows Index
Operating System
Process vs. Threads
Programming Languages
Aspnet
Action Result
ASP.NET
Entity Framework
Assembly
Assembly
C
Core Concepts
C Arithmetic Operators
C Arrays
C Basic Types
C Functions
C Fundamentals
C Loops
C Modules
C Pointers
C Selection Statements
C Strings
C Structs
Therotical Concepts
Compiling and Linking
Directives
Floating Point Numbers
C
C Sharp
Advanced Concepts
CSharp Generics
CSharp Lambda Expression
Extension Methods
Core Concepts
Arithmetic Operators
Casting Datatype
Control Flow Statements
CSharp Arrays
CSharp User Input
Datetime and Timespan
Enums
File & Directory Operations
Iteration Statements
Lists (Dynamic Arrays)
Primitives Datatype
Strings
Object Oriented Concepts
Abstract & Sealed Class
Access Modifiers
Boxing and Unboxing
Composition
CSharp Classes
CSharp Constructor
CSharp Indexers
CSharp Inheritance
CSharp Methods
Fields
Interface
Method Overriding
Properties
Structs
Upcasting and Downcasting
Theoretical Concepts
Architecture of .NET Application
CLR (Common Language Runtime)
Dotnet Framework Intoduction
Dotnet Implementations
C Sharp
Dependency Injection
Css
Core Concepts
CSS Box Model
CSS Element Types
CSS Inheritance
CSS Specificity
CSS Units
Layout
CSS Flexbox
CSS Grid Layout
CSS Positioning
CSS
CSS Colors & Typography
Javascript
Event Listeners
JavaScript
JS - Other Features
JS - Under the Hood
Nodejs
Bcrypt Usage
Dotenv Usage
EJS Syntax
Express
Mongoose
Node.js
Powershell
PowerShell
PowerShell Input & Output
PowerShell Objects
Python
Advanced Concepts
Python Async Programming
Python Metaclasses
Python Variable Scopes
Core Concepts
Bitwise Operator
Python Collections
Python Comprehension
Python Control Flow & Loops
Python Exception Handling
Python File Operations
Python Functions
Python Generators
Python String Formatting
Python Strings
Object Oriented Concepts
Attributes
Property
Python Abstract Class & Method
Python Access Modifiers
Python Classes
Python Constructor
Python Inheritance
Python Method Overriding
Python Methods
Theoretical Concepts
Python Memory Management
Python
Rust
Advanced Concepts
Rust Generics
Rust Lifetimes
Rust Traits
Core Concepts
Rust Collections
Rust Control Flow
Rust Datatypes
Rust Enums
Rust Error Handling
Rust Functions
Rust Match Expression
Rust Slices
Rust Structs
Theoritical Concepts
Rust Module Namespace
Rust Module System
Rust Ownership Model
Rust
Svelte
Svelte
Code Execution Models
Programming Languages
Software Engineering
Data Structures and Algorithms
Algorithms
Algorithms
Binary Search
Floyds Algorithm
Kadanes Algorithm
Union Find
Data Structures
Array
AVL Tree
Binary Heap
Binary Search Tree
Binary Tree
Bloom Filter
Data Structures
Graph
Hash Table
Linked List
Queue
Stack
Big-O Notation
Data Structures & Algorithms
Recursion
Devops
Docker
Building Docker Image
Building Docker Image
Docker File
Docker Hub
Docker Essentials
Container Management
Container Run Modes
Docker Compose
Docker Health Check
Docker Network
Docker Prune Command
Docker Volumes
Image Management
Docker Swarm
Swarm Architecture
Swarm Cluster Management
Swarm Network
Swarm Secrets
Swarm Service
Swarm Stacks
Docker
Docker Command Examples
Git
Commands
Git Add Command
Git Branch Command
Git Checkout Command
Git Clone Command
Git Commit Command
Git Config Command
Git Diff Command
Git Log Command
Git Merge Command
Git Pull Command
Git Push Command
Git Rebase Command
Git Remote Command
Git Revert & Reset Command
Git Rm Command
Git Stash Command
Git Tag Command
Git
Github Actions
GitHub Action Usage
GitHub Actions
GitHub Actions Commands
Kubernetes
Kubernetes Basics
Kubernetes Architecture
Kubernetes Components
Kubernetes Components
Kubernetes ConfigMap & Secrets
Kubernetes Deployments
Kubernetes HELM
Kubernetes Ingress
Kubernetes Namespace
Kubernetes Pods
Kubernetes Services
Kubernetes StatefulSet
Kubernetes Volumes
Kubernetes YAML File
Kubernetes
DevOps
Software Concepts
Application Security
Association, Aggregation and Composition
Fork vs. Spawn
Program Memory Management
Reference Type vs. Value Type
Regex
Software Concepts
Software Licensing
Stack and Heap Memory
System Design
Consistent Hashing
Deployment Strategy
System Design
Software Engineering
Home
❯
Blockchain
❯
Bitcoin
❯
Transactions
Folder: blockchain/bitcoin/transactions
6 items under this folder.
Oct 10, 2024
Bitcoin Transaction Fees
blockchain
cryptography
Oct 09, 2024
Bitcoin Digital Signature
blockchain
cryptography
Oct 08, 2024
Bitcoin Transaction Scripts
blockchain
cryptography
Sep 29, 2024
Transaction Structure
cryptography
blockchain
Sep 12, 2024
Bitcoin Transactions
blockchain
cryptography
Sep 12, 2024
Bitcoin Transaction Flows
blockchain
cryptography