In the course of my research on the technology of Ethernet square, due to the relatively few data, it took a lot of detours. So here we will not first introduce the grammatical structure of solidity, but will be in the next phase, from the actual combat, to introduce you to Geth, browser-solidity, mist these three tools, and in the process of constantly explaining the basic concept of the ether.
Through the actual use of these tools, as well as the ba
Ethernet as a digital currency of the operating system, it is obvious that it will also have a wallet-like client program, to provide management account balances and other functions. We know that storage (or binding, affiliated) account of the ether, in the code with the address type variables exist, so the ability to manage multiple Ethernet square accounts should be one of the basic functions of the client program. This article starts with the code
Download Address: Https://pan.baidu.com/s/1kWCznOb
Ben Niu miner software for a variety of virtual coin mining, you can dig the ether square (ETH), Ethernet Classics (ETC), 0 (Zec), cloud storage currency (SC), decred (DCR). 1, this mining software will completely claymore the original core of the pump back, in the mining pool page will be a miner, the miner is returned.2, this mining software can double dig ETH and Sc,eth and DCR, as well as etc and
are completely unfamiliar with the concept of cryptography, such as Bitcoin and how it works, we suggest that you take a look at the first chapters of the Bitcoin book Andreas Antonopoulos and read the ether white paper. (see Http://ethfans.org/posts/ethereum-whitepaper for the Chinese version of the Ether white paper)
If you think the chapters in the White paper are too obscure, you can also get to know t
Lihe August 28, 2016
Many people are puzzled by the block chain and the etheric square, do not know how to learn, this article simply said some learning methods and resources.
I. The relationship between the ether Square and the block chain
From the history of the Block chain, the first birth of bitcoin, there is no block chain of this technology and terminology, and then the industry from the bitcoin extract the technical framework and system, c
This article summarizes how the transactions on the etheric square are built and broadcast all over the web.
Trading is the core of the block chain. When you interact with an Ethernet trader, you are essentially executing a transaction and changing its state. Are you curious as to what has happened in the process of being executed on the etheric square? Let's use an example to illustrate the nature of the ether trade, in this article we will cover the
See the following results: view accounts using a private chain
Eth.accounts
To create a user:
Personal.newaccount ("111111")
The password for the account in which the parameter is.
You can also create an account and then enter a password:
Personal.newaccount ()
viewing chunk data
Eth.blocknumber
Start Digging
Miner.start ()
Returns true to start successfully, and the performance can be viewed in the log. Stop Digging mine
Miner.stop ()
When the mining in the implementation of t
Where is the Win10 calculator? Three ways to open the Win10 calculator: graphic introduction, win10 Calculator
The brand-new windows 10 system has brought about many new features and changes. Among them, the position of the win10 calculator has changed a lot, so many netizens think that the win10
help functions
Common/bitutil the packet to achieve fast bit operation
Common/compiler wrapper solity Compiler executable file
Common/fdllimit--
Common/hexutil hexadecimal encoding with a prefix of 0x
Common/math Math Tools
Common/number--
Compression/rle implements RUN-LENGTH encoding encoding for ethereum data
Comsensus implements different Ethernet consensus engines.
Comsensus/clique realized the authoritative consensus engine
Comsensus/ethash engine work consensus ethash proof
Comsensus/mis
are completely unfamiliar with the concept of cryptography, such as Bitcoin and how it works, we suggest that you take a look at the first chapters of the Bitcoin book Andreas Antonopoulos and read the ether white paper. (see Http://ethfans.org/posts/ethereum-whitepaper for the Chinese version of the Ether white paper)
If you think the chapters in the White paper are too obscure, you can also get to know t
setting up a private chain environment based on Ethernet square
Through the methods and scripts in this article, we can quickly build their own private chain for block chain development test, this article based on the Ethernet workshop technology to build, divided into two parts, one is the Ubuntu under the building method, the other is windwos under the construction method,
One, install Geth client under Ubuntu
Ubuntu is used because the official side of the
Ethernet as a digital currency of the operating system, it is obvious that it will also have a wallet-like client program, to provide management account balances and other functions. We know that storage (or binding, affiliated) account of the ether, in the code with the address type variables exist, so the ability to manage multiple Ethernet square accounts should be one of the basic functions of the client program. This article starts with the code
Cryptokitties (ether square cloud cat) is a recent game on the chain of Etheric square blocks. Super cute cat image, and then with the breeding, breeding, auction such a rich game, all of a sudden detonated the block chain of the etheric square. The core of this game is the intelligent contract based on Ethernet, and the first intelligent contract based game. In addition to the game in the breeding of genetic engineering contract, other contracts are
process to write dead or randomly generated parameters into the JSON file, that is, the above fileCreate the core code of the account: (Accounts.keystore.keystore_passphrase.go)The Encryptkey method inFuncencryptkey (Key key,authstring,scryptn,scryptpint) ([]byte,error)Where key is an encrypted account, including ID, public private key, addressAuth is the password entered by the userSCRYPTN, is the n in the scrypt algorithmP in the Scryptp,scrypt algorithmDerivedkey, err: = Scrypt. Key (Autharr
rely on a more precise transaction, so eventually you can verify every transaction on the chain. In order to solve this problem, the concept of the Angela Tree of the etheric square will go further. The Merkel certificate of the ether squareEach of the block heads of the etheric square, not only contains a Merkel tree, but contains three Merkel trees, corresponding to three different objects:Transaction (transactions) receipt (receipts, basically, it
problem is the addition of the –dev.period value configuration entry. The default value for this configuration is 0, which means that only transactions with pending will be dug.Understand the meaning of this parameter, solve the problem is very simple answer, the previous –dev parameters are still used, and then add –dev.period 1, note that the parameter value is 1, not the default of 0.Then restart the node, and then perform the mining, regardless of whether the return is null, after execution
This article is reproduced from: http://blog.csdn.net/teaspring/article/details/78350888
Thank the original author Teaspring share. This article has obtained the original author's reprint permission.
Ethernet as a digital currency of the operating system, it is obvious that it will also have a wallet-like client program, to provide management account balances and other functions. We know that storage (or binding, affiliated) account of the ether, in
events and Logs (Logs) in the etheric square are a particularly confusing concept, and this article helps you to comb through them. Because of the previous article, we discussed the Ethernet square go-ethereum client query transaction list of some methods, this article, we specifically implement a filter of the discussion. Let's see how this approach is used in particular. Focus on the last part. Hope to play a certain role in helping to develop. We begin with the basic concepts and understand t
Block chain trust based on the characteristics of the data can not be modified, so that the traditional application has a very different place is once published on the block chain can not be modified (can not directly modify the original contract and then redistribute). It 's written in front .
Before reading this article, you should have an understanding of the ether, the smart contract, and the solidity language, and if you don't understand it, I su
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.