Ethereum MST token system
Publish: 2021-04-19 11:36:46
1. At present, all countries are in the research stage of virtual currency. blockchain is studied by large companies. Large companies have venture capital and will not go to ordinary people to invest. Therefore, the virtual currency and blockchain that ordinary people can invest in are fake.
2.
in order to create erc20 token, you need to write down the following contents
- token name
- token symbol
- token decimal
- number of tokens is in circulation
- Contract
- code verification source code
in addition to erc20, there are erc20, erc721, erc223, erc621, erc827, But for erc721, by the way, erc721 is a protocol mainly used for blockchain games. The blockchain games you often see are basically based on erc721
3. Token is used to call EOS system resources. As many tokens as you have, you can use as many resources@ Make complaints about blocks
4. Blockchain technology has a natural advantage in the realization of smart contracts
bitcoin, Ruitai coin, Laite coin, Ethereum and other digital cryptocurrencies all use blockchain technology
blockchain is an important concept of bitcoin, which is essentially a decentralized database. At the same time, as the underlying technology of bitcoin, it is used to verify the validity of its information (anti-counterfeiting) and generate the next block. Blockchain is a series of data blocks generated by cryptography, each of which contains the information of a bitcoin network transaction
bitcoin, Ruitai coin, Laite coin, Ethereum and other digital cryptocurrencies all use blockchain technology
blockchain is an important concept of bitcoin, which is essentially a decentralized database. At the same time, as the underlying technology of bitcoin, it is used to verify the validity of its information (anti-counterfeiting) and generate the next block. Blockchain is a series of data blocks generated by cryptography, each of which contains the information of a bitcoin network transaction
5. Win2000服务全集[转帖]
secedit.exe > Starts Security Editor help 自动安全性配置管理
services.exe > Controls all the services 控制所有服务
sethc.exe > Set High Contrast - changes colours and display mode Logoff to set it back to normal 设置高对比
setreg.exe > Shows the Software Publishing State Key Values 显示软件发布的国家语言
setup.exe > GUI box prompts you to goto control panel to configure system components 安装程序转到控制面板
setver.exe > Set Version for Files 设置 MS-DOS 子系统向程序报告的 MS-DOS 版本号
sfc.exe > System File Checker test and check system files for integrity 系统文件检查
sfmprint.exe > Print Services for Macintosh 打印Macintosh服务
sfmpsexe.exe >
sfmsvc.exe >
shadow.exe > Monitor another Terminal Services session. 监控另外一台中端服务器会话
share.exe > Windows 2000 和 MS-DOS 子系统不使用该命令接受该命令只是为了与 MS-DOS 文件兼容
shmgrate.exe >
shrpubw.exe > Create and Share folders 建立和共享文件夹
sigverif.exe > File Signature Verification 文件签名验证
skeys.exe > Serial Keys utility 序列号制作工具
smlogsvc.exe > Performance Logs and Alerts 性能日志和警报
smss.exe >
sndrec32.exe > starts the Windows Sound Recorder 录音机
sndvol32.exe > Display the current volume information 显示声音控制信息
snmp.exe > Simple Network Management Protocol used for Network Mangement 简单网络管理协议
snmptrap.exe > Utility used with SNMP SNMP工具
sol.exe > Windows Solitaire Game 纸牌
sort.exe > Compares files and Folders 读取输入、排序数据并将结果写到屏幕、文
secedit.exe > Starts Security Editor help 自动安全性配置管理
services.exe > Controls all the services 控制所有服务
sethc.exe > Set High Contrast - changes colours and display mode Logoff to set it back to normal 设置高对比
setreg.exe > Shows the Software Publishing State Key Values 显示软件发布的国家语言
setup.exe > GUI box prompts you to goto control panel to configure system components 安装程序转到控制面板
setver.exe > Set Version for Files 设置 MS-DOS 子系统向程序报告的 MS-DOS 版本号
sfc.exe > System File Checker test and check system files for integrity 系统文件检查
sfmprint.exe > Print Services for Macintosh 打印Macintosh服务
sfmpsexe.exe >
sfmsvc.exe >
shadow.exe > Monitor another Terminal Services session. 监控另外一台中端服务器会话
share.exe > Windows 2000 和 MS-DOS 子系统不使用该命令接受该命令只是为了与 MS-DOS 文件兼容
shmgrate.exe >
shrpubw.exe > Create and Share folders 建立和共享文件夹
sigverif.exe > File Signature Verification 文件签名验证
skeys.exe > Serial Keys utility 序列号制作工具
smlogsvc.exe > Performance Logs and Alerts 性能日志和警报
smss.exe >
sndrec32.exe > starts the Windows Sound Recorder 录音机
sndvol32.exe > Display the current volume information 显示声音控制信息
snmp.exe > Simple Network Management Protocol used for Network Mangement 简单网络管理协议
snmptrap.exe > Utility used with SNMP SNMP工具
sol.exe > Windows Solitaire Game 纸牌
sort.exe > Compares files and Folders 读取输入、排序数据并将结果写到屏幕、文
6. #1 [recommended] DOS common command details
dir column file name deltree delete directory tree CLS clear screen CD change current directory
file disk disk del delete file format format disk
edit text edit MEM view memory status MD create subdirectory move mobile file Change directory name
more split screen display type display file content Rd delete directory
sys make DOS system disk
Ren change file name x directory and file CHKDSK check disk attrib set file attribute
fdisk hard disk partition date display and modify date label set volume label Defrag Disk Defrag < B R / > MSD system detection path setting search directory share file sharing MemMaker memory optimization management
help restore restore restore backup file set setting environment variable time display and modification time
tree column directory tree debug random debugger doskey call DOS command again Prompt prompt prompt prompt undelete recovery deleted file ScanDisk detection Repair disk
uncommon DOS commands
diskcomp disk compare append set non executable file path
Expand restore DOS file FastHelp quick display help information
FC file compare interink start server
setver set version intersvr start client
subst Path replacement QBASIC integrated environment
vsafe antivirus unformat recover formatted disk
ver display DOS version number smartdrv set disk accelerator
Vol display disk volume label LH load program into high-end memory
CTTY change control device EMM386 expand memory management
Introction to common commands:
1. Dir
displays the list of directory files and subdirectories
wildcards (?) can be used? And *),? The table is configured with one character, * the table is configured with any character
*. Suffix
specifies the file to view the suffix. In fact, it can also be "suffix". For example, dir *. Exe equals dir. Exe
/ P
one list screen will be displayed at a time. To view the next screen, press any key on the keyboard
/ W
displays the list in a wide format, with up to five file or directory names on each line
/ s
lists each specified file name that appears in the specified directory and all subdirectories. It is much faster than the search in win environment
dir *. * - & gt; a. Txt write the current directory file list to a.txt
dir *. * / S - & gt; a. Txt write the list of current directory files to a.txt, including files under subdirectories< Second, attrib displays, sets or deletes the read-only, archive, system and hidden attributes assigned to a file or directory. If used without parameters, attrib displays the properties of all files in the current directory
+ R
set the read-only property
- R
clear the read-only attribute
+ a
set archive file properties
- a
clear archive attributes
+ s
set system properties
- s
clear system attributes
+ H
set hidden attributes
- H
clear hidden attributes< (3) CLS
clear all the information displayed in the command prompt window and return to the empty window, that is, "clear screen"
4. Exit
exit the current command interpreter and return to the system< 5. Format
format
/ Q
execute quick format. Delete the file table and root directory of a previously formatted volume, but do not scan for damaged areas between sectors. Using the / Q command line option, you should format only previously formatted sound volumes< 6. Ipconfig
displays all the current TCP / IP network configuration values and refreshes the Dynamic Host Configuration Protocol (DHCP) and domain name system (DNS) settings. Use ipconfig without parameters to display the IP address, subnet mask and default gateway of all adapters
/ all
displays the complete TCP / IP configuration information for all adapters
ipconfig is equivalent to winipcfg, which is available on me, 98 and 95. Although Windows XP does not provide a graphical interface like winipcfg command, you can use "network connection" to view and update the IP address. To do this, open a network connection, right-click a network connection, click status, and then click the support tab
this command is most suitable for computers configured to automatically obtain IP addresses. It enables users to determine which TCP / IP configuration values are configured by DHCP, automatic private IP address (APIPA), and other configurations< Seven, MD
create a directory or subdirectory; eight, move
move one or more files from a directory to a specified directory< 9. Nbtstat
displays NetBIOS statistics, NetBIOS name table and NetBIOS name cache based on TCP / IP (NetBt) protocol of local and remote computers. Nbtstat can refresh the NetBIOS name cache and registered Windows Internet Name Service (wins) names. Use nbtstat without parameters to display help. Nbtstat command line parameters are case sensitive
- a remotename
displays the NetBIOS name table of the remote computer, where remotename is the NetBIOS computer name of the remote computer
- a IPAddress
displays the NetBIOS name table of the remote computer, whose name is specified by the IP address of the remote computer (separated by decimal point)< Netstat
displays the active TCP connections, ports the computer listens to, Ethernet statistics, IP routing table, IPv4 Statistics (for IP, ICMP, TCP and UDP protocols) and IPv6 Statistics (for IPv6, ICMPv6, TCP over IPv6 and UDP over IPv6 protocols). If it is used without parameters, netstat displays the active TCP connection
- a
displays all active TCP connections and the TCP and UDP ports that the computer is listening on< 11. Ping
verifies the IP level connection with another TCP / IP computer by sending an ICMP echo request message. The reception of the echo response message will be displayed together with the number of round trips. Ping is the main TCP / IP command used to detect network connectivity, reachability and name resolution problems. If there are no parameters, Ping displays help. Name and IP address resolution is its simplest application and also the most used
- T
specifies that Ping can continuously send echo request information to the destination before interruption. To interrupt and display statistics, press ctrl-break. To interrupt and exit Ping, press ctrl-c
- lSize
specifies the length (in bytes) of the "data" field in the sent echo request message. The default value is 32. The maximum size is 65527< 12. Rename (ren)
change the name of the file
for example, Ren *. ABC *. CBA
13, set
display, set or delete environment variables. If there are no parameters, the set command displays the current environment settings< Shutdown allows you to shut down or restart a local or remote computer. If no parameter is used, shutdown logs off the current user
- M computername
specifies the computer to shut down
- t XX
set the timer for system shutdown to XX seconds. The default is 20 seconds
- L
log off the current user, which is the default setting- M computername is preferred
- s
shut down the local computer
- R
restart after shutdown
- a
stop closing. Except for - L and computername, other parameters are ignored. During the timeout period, you can only use - A< System file checker (SFC)
win. Scan and verify all protected system files after restarting the computer
/ scan now
scan all protected system files immediately
/ scanning
scan all protected system files at once
/ purgecache
immediately clear the "windows file protection" file cache and scan all protected system files
/ cachesize = x
set the file cache size of windows file protection in MB
16. Type
displays the content of the text file. Use the type command to view the text file or bat file without modifying the file
17, tree
to visualize the path or the directory structure of the disk in the drive
XVIII. X
files and directories, including subdirectories
/ s
non empty directories and subdirectories. If / S is omitted, x will work in a directory
/ E
all subdirectories, including empty ones<
19.
one or more files from one location to another location
20. Del
delete the specified file
there are too many subcommands for FTP and bat batch commands and for net and Telnet, but they are commonly used.
dir column file name deltree delete directory tree CLS clear screen CD change current directory
file disk disk del delete file format format disk
edit text edit MEM view memory status MD create subdirectory move mobile file Change directory name
more split screen display type display file content Rd delete directory
sys make DOS system disk
Ren change file name x directory and file CHKDSK check disk attrib set file attribute
fdisk hard disk partition date display and modify date label set volume label Defrag Disk Defrag < B R / > MSD system detection path setting search directory share file sharing MemMaker memory optimization management
help restore restore restore backup file set setting environment variable time display and modification time
tree column directory tree debug random debugger doskey call DOS command again Prompt prompt prompt prompt undelete recovery deleted file ScanDisk detection Repair disk
uncommon DOS commands
diskcomp disk compare append set non executable file path
Expand restore DOS file FastHelp quick display help information
FC file compare interink start server
setver set version intersvr start client
subst Path replacement QBASIC integrated environment
vsafe antivirus unformat recover formatted disk
ver display DOS version number smartdrv set disk accelerator
Vol display disk volume label LH load program into high-end memory
CTTY change control device EMM386 expand memory management
Introction to common commands:
1. Dir
displays the list of directory files and subdirectories
wildcards (?) can be used? And *),? The table is configured with one character, * the table is configured with any character
*. Suffix
specifies the file to view the suffix. In fact, it can also be "suffix". For example, dir *. Exe equals dir. Exe
/ P
one list screen will be displayed at a time. To view the next screen, press any key on the keyboard
/ W
displays the list in a wide format, with up to five file or directory names on each line
/ s
lists each specified file name that appears in the specified directory and all subdirectories. It is much faster than the search in win environment
dir *. * - & gt; a. Txt write the current directory file list to a.txt
dir *. * / S - & gt; a. Txt write the list of current directory files to a.txt, including files under subdirectories< Second, attrib displays, sets or deletes the read-only, archive, system and hidden attributes assigned to a file or directory. If used without parameters, attrib displays the properties of all files in the current directory
+ R
set the read-only property
- R
clear the read-only attribute
+ a
set archive file properties
- a
clear archive attributes
+ s
set system properties
- s
clear system attributes
+ H
set hidden attributes
- H
clear hidden attributes< (3) CLS
clear all the information displayed in the command prompt window and return to the empty window, that is, "clear screen"
4. Exit
exit the current command interpreter and return to the system< 5. Format
format
/ Q
execute quick format. Delete the file table and root directory of a previously formatted volume, but do not scan for damaged areas between sectors. Using the / Q command line option, you should format only previously formatted sound volumes< 6. Ipconfig
displays all the current TCP / IP network configuration values and refreshes the Dynamic Host Configuration Protocol (DHCP) and domain name system (DNS) settings. Use ipconfig without parameters to display the IP address, subnet mask and default gateway of all adapters
/ all
displays the complete TCP / IP configuration information for all adapters
ipconfig is equivalent to winipcfg, which is available on me, 98 and 95. Although Windows XP does not provide a graphical interface like winipcfg command, you can use "network connection" to view and update the IP address. To do this, open a network connection, right-click a network connection, click status, and then click the support tab
this command is most suitable for computers configured to automatically obtain IP addresses. It enables users to determine which TCP / IP configuration values are configured by DHCP, automatic private IP address (APIPA), and other configurations< Seven, MD
create a directory or subdirectory; eight, move
move one or more files from a directory to a specified directory< 9. Nbtstat
displays NetBIOS statistics, NetBIOS name table and NetBIOS name cache based on TCP / IP (NetBt) protocol of local and remote computers. Nbtstat can refresh the NetBIOS name cache and registered Windows Internet Name Service (wins) names. Use nbtstat without parameters to display help. Nbtstat command line parameters are case sensitive
- a remotename
displays the NetBIOS name table of the remote computer, where remotename is the NetBIOS computer name of the remote computer
- a IPAddress
displays the NetBIOS name table of the remote computer, whose name is specified by the IP address of the remote computer (separated by decimal point)< Netstat
displays the active TCP connections, ports the computer listens to, Ethernet statistics, IP routing table, IPv4 Statistics (for IP, ICMP, TCP and UDP protocols) and IPv6 Statistics (for IPv6, ICMPv6, TCP over IPv6 and UDP over IPv6 protocols). If it is used without parameters, netstat displays the active TCP connection
- a
displays all active TCP connections and the TCP and UDP ports that the computer is listening on< 11. Ping
verifies the IP level connection with another TCP / IP computer by sending an ICMP echo request message. The reception of the echo response message will be displayed together with the number of round trips. Ping is the main TCP / IP command used to detect network connectivity, reachability and name resolution problems. If there are no parameters, Ping displays help. Name and IP address resolution is its simplest application and also the most used
- T
specifies that Ping can continuously send echo request information to the destination before interruption. To interrupt and display statistics, press ctrl-break. To interrupt and exit Ping, press ctrl-c
- lSize
specifies the length (in bytes) of the "data" field in the sent echo request message. The default value is 32. The maximum size is 65527< 12. Rename (ren)
change the name of the file
for example, Ren *. ABC *. CBA
13, set
display, set or delete environment variables. If there are no parameters, the set command displays the current environment settings< Shutdown allows you to shut down or restart a local or remote computer. If no parameter is used, shutdown logs off the current user
- M computername
specifies the computer to shut down
- t XX
set the timer for system shutdown to XX seconds. The default is 20 seconds
- L
log off the current user, which is the default setting- M computername is preferred
- s
shut down the local computer
- R
restart after shutdown
- a
stop closing. Except for - L and computername, other parameters are ignored. During the timeout period, you can only use - A< System file checker (SFC)
win. Scan and verify all protected system files after restarting the computer
/ scan now
scan all protected system files immediately
/ scanning
scan all protected system files at once
/ purgecache
immediately clear the "windows file protection" file cache and scan all protected system files
/ cachesize = x
set the file cache size of windows file protection in MB
16. Type
displays the content of the text file. Use the type command to view the text file or bat file without modifying the file
17, tree
to visualize the path or the directory structure of the disk in the drive
XVIII. X
files and directories, including subdirectories
/ s
non empty directories and subdirectories. If / S is omitted, x will work in a directory
/ E
all subdirectories, including empty ones<
19.
one or more files from one location to another location
20. Del
delete the specified file
there are too many subcommands for FTP and bat batch commands and for net and Telnet, but they are commonly used.
7. In me sings nonsense. silver-á
Lý Sir the whole world and eyes blue
É I wish and now close my eyes and þ and now that þ að< br />Ó nei
Á stjö rnuhrað Inside the heart explodes, plane breaks, upper jö rð and singing
É I wish and now close my eyes and þ and low dance
Everything is forgotten for a little while and ræ that þ að< br />Open your eyes
Ó No, my best friend, every single one of them, Eacute. g swallowing tears and breathing hair Let's die ill, in fað my cry
Þ hold and hold við hittumst
Þ hold and hold við Kissumst
The lips burn, hö Eacute; g sé þ ig awake
É g six thorns; ♪ I'm naked ♪ ♪ Inside me, there's always crazy ♪ to vað a, við I'm running a game on everything ur smæ Sir, I'm sorry. in English rra
Are we að A, away go, my best friend, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go! my cry
É g swallowing tears and breathing hair
Þ hold and hold við hittumst
Þ hold and hold við Kissumst
The lips burn, hö lmst í henr
É g six thorns; ig awake
É g six thorns; I'm naked http://music..com/song/52668890
Lý Sir the whole world and eyes blue
É I wish and now close my eyes and þ and now that þ að< br />Ó nei
Á stjö rnuhrað Inside the heart explodes, plane breaks, upper jö rð and singing
É I wish and now close my eyes and þ and low dance
Everything is forgotten for a little while and ræ that þ að< br />Open your eyes
Ó No, my best friend, every single one of them, Eacute. g swallowing tears and breathing hair Let's die ill, in fað my cry
Þ hold and hold við hittumst
Þ hold and hold við Kissumst
The lips burn, hö Eacute; g sé þ ig awake
É g six thorns; ♪ I'm naked ♪ ♪ Inside me, there's always crazy ♪ to vað a, við I'm running a game on everything ur smæ Sir, I'm sorry. in English rra
Are we að A, away go, my best friend, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go, let's go! my cry
É g swallowing tears and breathing hair
Þ hold and hold við hittumst
Þ hold and hold við Kissumst
The lips burn, hö lmst í henr
É g six thorns; ig awake
É g six thorns; I'm naked http://music..com/song/52668890
Hot content
