Skip to content

Instantly share code, notes, and snippets.

View MicrohexHQ's full-sized avatar
:octocat:
τέχνη

hexunitechno MicrohexHQ

:octocat:
τέχνη
View GitHub Profile

How to configure a Draytek router to update your dynamic DNS record with Google Domains

Draytek Dynamic DNS Configuration Page

  1. Choose the "WAN Interface" strategy to use when determining the IP address used when performing updates.
  2. In the "Service Provider" field, choose "User Defined". Additional configuration fields appear.
  3. In the "Provider Host" field, enter domains.google.com
  4. In the "Service API" field, enter /nic/update?myip=###IP###&hostname=your.hostname.here, replacing "your.hostname.here" with the fully qualified name of the record you wish to dynamically update.
  5. In the "Auth Type" field, choose "Basic" (this is the default).
  6. In the "Connection Type" field, choose "HTTPS".
@MicrohexHQ
MicrohexHQ / smurf.c
Created November 10, 2019 16:35 — forked from gustavohenrique/smurf.c
Smurf attack exploit
/*
*
* $Id smurf.c,v 4.0 1997/10/11 13:02:42 EST tfreak Exp $
*
* spoofs icmp packets from a host to various broadcast addresses resulting
* in multiple replies to that host from a single packet.
*
* mad head to:
* nyt, soldier, autopsy, legendnet, #c0de, irq for being my guinea pig,
* MissSatan for swallowing, napster for pimping my sister, the guy that
@MicrohexHQ
MicrohexHQ / tapbch.md
Created November 5, 2019 14:55 — forked from markblundeberg/tapbch.md
How might Taproot be implemented in BCH, and do we need it?

Taproot is an interesting technology to enable multiparty privacy on a bitcoin. Currently, there is a problem with multiparty contracts in that they are obvious deviation from the most common script type (P2PKH), which hurts privacy. The script that gets used will typically indicate exactly what kind of protocol was at play. Also complex P2SH scripts take extra resources (transaction size and CPU cycles).

The basic idea with Taproot is that instead of P2SH where a script is committed by a hash, you can hide a script (or set of possible scripts) as a commitment within a normal-looking public key. Now there are two ways to spend from this public key:

  1. Create a normal transaction signature using the public key, or,
  2. Reveal the commitment, and provide parameters that satisfy the revealed script.

To do #1, it means you need to know the private key, or, you have a set of signers who are able to produce a signature (that's where Schnor

@MicrohexHQ
MicrohexHQ / bitstamp
Last active December 21, 2021 02:48
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2
mQGNBFSwMxEBDACwuRwEUWsfBk+HtGzB+mid4G7rXBe86XoLqE/QaSu3B6l0iKue
HHfq2WVMkbhxreuuaGbNJvPLbZ8+FcLCJclwzipqoLeMH2q120tkz4gYR9P2Y8+1
iLBJ56hitHkj8HRI4BcbkUxt2zJeae7NuhcRNENwdTuQhCW1UZrcGhmt9QNdT8Ff
0j7tFcS6DSatsNASe4SQikXwq1qNlecGRtZk5TH3nXbX19gURwnGo6uRhAJ5EA/t
tjeUVCTOJr/3s+dRmHTFzrGtg8X6N6GjEdRjS6f6qGGD/Lo9ZvK+V0TzJN8ecf5g
tDhN9ccJxiQAvbuK6nyomtVgG4UBxcKW5KAJYDMsaOi5BlK2En6PKnBAzAPhLw/t
hkgaKR/JTPWdd86GA5zU+IEhByGwMRmL+7qPRlY9Fhw0M/63Nt6CCJHYiY7dh1HS
Independent Submission M-J. Saarinen, Ed.
Request for Comments: 7693 Queen's University Belfast
Category: Informational J-P. Aumasson
ISSN: 2070-1721 Kudelski Security
// Copyright (c) 2014-2018 The Bitcoin Core developers
// Distributed under the MIT software license, see the accompanying
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
#include <base58.h>
#include <hash.h>
#include <uint256.h>
#include <util/strencodings.h>
// Copyright (c) 2009-2010 Satoshi Nakamoto
// Copyright (c) 2009-2018 The Bitcoin Core developers
// Distributed under the MIT software license, see the accompanying
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
/**
* Why base-58 instead of standard base-64 encoding?
* - Don't want 0OIl characters that look the same in some fonts and
* could be used to create visually identical looking data.
* - A string with non-alphanumeric characters is not as easily accepted as input.
@MicrohexHQ
MicrohexHQ / ETH_XRP.md
Last active September 28, 2019 11:30 — forked from emschwartz/README.md
1st ETH -> XRP Interledger Escrow Payment

1st ETH -> XRP Interledger Escrow Payment

Here are the transaction IDs (and links to the block explorers) for the first livenet Ethereum and Ripple Consensus Ledger (RCL) escrowed transfers comprising an Interledger payment.

  1. Ethereum prepare: 0x00cbb6149b9cfb3cedf280251c3060b2a38776fa7792b578b6f9f39ce5ee0266
  2. RCL prepare: 7F0A5F16C84568D96DA6A66058CD9EAA881236237642BF7427A458957A752B6B
  3. RCL fulfill: 12A4CAFAE95254844513C5C11488A1195C08DEFF673C97AC74AAC121935DDE36
  4. Ethereum fulfill: 0xb59dd839ab0b5e7d4e663b7cfc0ddb70eaf73dd2785b3d3a4abdf1a61817007d

SHA-256 Condition: `d2

"""Eratosthenes.py
Space-efficient version of sieve of Eratosthenes.
D. Eppstein, May 2004.
The main storage of the algorithm is a hash table D with sqrt(n)
nonempty entries for a total of O(sqrt n) space.
At any point in the algorithm, each prime p occupies a cell with key at
most 2n. E.g. by Bertrand's postulate, there is another prime p'
between n/p and 2n/p, and p' can not yet have been included because it
A Cypherpunk's Manifesto
by Eric Hughes
Privacy is necessary for an open society in the electronic age.
Privacy is not secrecy. A private matter is something one doesn't
want the whole world to know, but a secret matter is something one
doesn't want anybody to know. Privacy is the power to selectively
reveal oneself to the world.