PostsCommentsPayoutschaintuts (51)in Programming & Dev • 20 hours agoInsidious Inputs - Three Types of Common Software Vulnerabilities (Video Version)Software #vulnerabilities are a big part of security. Learn about path traversal, cross-site scripting, and buffer overflows with this free and open-licensed #tutorial, including…chaintuts (51)in Programming & Dev • 6 days agoInsidious Inputs - Three Common Types of Software VulnerabilitiesCurious about how attackers exploit vulnerable software, and how those vulnerabilities work? My latest free and open licensed #tutorial dives into three common software…chaintuts (51)in HODL • 2 months agoFun Crypto-Crypto Facts - The Cryptography of CryptocurrenciesLearn about 5 fun #cryptocurrency #cryptography facts with my latest free and open #tutorial. This dives into the applied crypto used in #bitcoin with some interesting facts.…chaintuts (51)in Programming & Dev • 6 months agoPassword Privkey Pummeling Power – The Math and Words of Dictionary Cracking (Multi Code Companion)Learn about cracking passwords and private keys with my latest free and open license #tutorial. We discuss the math of brute-force, and why dictionary attacks are necessary - all…chaintuts (51)in HODL • 6 months agoVisualizing Proof-of-Stake Algorithms with Microcontrollers (StakeSim Code Companion)Learn how Proof-of-Stake consensus works for blockchains like #ethereum with this fun toy algorithm and microcontrollers. This videos dives into POS internals with a simple…chaintuts (51)in Cryptocurrency • 7 months agoCrypto Compromise - Data Breaches and Security ScenariosLearn about how data breaches can affect #cryptocurrency users with my latest free and open license #tutorial. This security tutorial helps you understand data breaches that put…chaintuts (51)in STEMGeeks • 7 months agoDeveloping a DIY Bitcoin Offline Address Generator - uBitAddr2 Code CompanionDon't miss my latest #tutorial on a fun code project - developing a revamped DIY #bitcoin offline address generator for Adafruit M4 microcontrollers using pure CircuitPython.…chaintuts (51)in HODL • 7 months agoBecoming a Phish Fighter - Training to Spot Phishing ScamsDoes this corny, MMA themed thumbnail have your attention? Good! I have a great new tutorial for you on fighting...phishing scams that is! I've got real world examples and great…chaintuts (51)in Cryptocurrency • 9 months agoYour Secret Stash: Seed Phrases, Password Managers, and Secret HygieneProtect your secret stash! Learn about the security implications of storing your cryptocurrency seed phrase in a password manager, and things to consider when making a…chaintuts (51)in STEMGeeks • last yearPassword Cracking Power – How Passwords Are Stored and CrackedEver wonder how attackers crack #passwords from stolen databases? Learn about common password cracking techniques with this free and open licensed #tutorial! You'll learn about…chaintuts (51)in Programming & Dev • last yearSeed Scanning Malware Educational Demo: Cryptocurrency Seed Security.Seed scanning malware demo: why you should never store a cryptocurrency seed phrase in plain text! Learn about security and development with this fun, educational video.…chaintuts (51)in STEMGeeks • last yearWhy You Should Never Store Cryptocurrency Seed Phrases in Plain TextMy Python project SeedScanner demonstrates why you should never store a seed phrase in plain text (unencrypted). It's trivial to scan files and pull out seed phrases with some…chaintuts (51)in Programming & Dev • 2 years agoFile Verification - Hashes and SignaturesLearn about software hash & signature verification (integrity & authentication) with this free and CC-licensed video. This dives into how software sharing can be secured.…chaintuts (51)in #blog • 2 years agochaintuts - Free and Open Source Computer Science TutorialsHi friends, I'm Josh (chaintuts) and I make free and open license computer science content. Outside of that, I love staying active with lots of different things and tinkering.…chaintuts (51)in STEMGeeks • 2 years agoUnderstanding Lossless File Compression (.zip)New tutorial day, no foolin'! Learn about lossless file compression algorithms with the free and open license #tutorial. #computerscience #learningchaintuts (51)in STEMGeeks • 2 years agoSocial Media Account Takeover ScamsEver wonder how scammers steal Instagram (and other social media) accounts? Learn about account takeover attacks and how to prevent them with my free and open license #security tutorial. #learningchaintuts (51)in STEMGeeks • 2 years agoBasic Programming Logic: if/loopsEver wonder how computers think? Learn the broad basics of programming logic with my free and creative commons tutorial. We dive into if statements and loops for any programming…chaintuts (51)in Programming & Dev • 2 years agoLet's Get Testy: The Basics of Software TestingLet's get testy! Learn about the basics of software #testing with my free and creative commons tutorial. This dives into ways to keep your code reliable and usable. #development #tutorial #learningchaintuts (51)in STEMGeeks • 2 years agoCoded a demo of a Bitcoin address-swapping malware called AddrJack to teach security & dev concepts!#Bitcoin address swapping malware is a #security threat to #cryptocurrency users. Learn to code a C# or Python demo of this concept with my free creative commons tutorial!chaintuts (51)in Programming & Dev • 2 years agoCoded a demo of a Bitcoin address-swapping malware called AddrJack to teach security & dev concepts!#Bitcoin address swapping malware is a #security threat to #cryptocurrency users. Learn to code a C# or Python demo of this concept with my free creative commons tutorial!