FMZ Quantfmzquant.hashnode.dev·Dec 2, 2024Discussion on Strategy Testing Method Based on Random Ticker GeneratorPreface The backtesting system of the FMZ Quant Trading Platform is a backtesting system that is constantly iterating, updating and upgrading. It adds functions and optimizes performance gradually from the initial basic backtesting function. With the...DiscussStrategy
elc4br4elc4br4.hashnode.dev·Aug 24, 2024Export Forensic Challenge - HackTheBoxEsta vez estoy ante un challenge forense sencillo para quien comience en el mundo del Análisis Forense. Analizaremos un archivo .raw de una captura de memoria de un sistema operativo Windows. Descripción del Challenge We spotted a suspicious conn...DiscussHackTheBox🦎CTF Writeup
FMZ Quantfmzquant.hashnode.dev·Jun 24, 2024Introducing the adaptive moving average KAMAAs the name implies, the Moving Average (KAMA) belongs to the Moving Average category, but unlike the traditional moving average, it is way “smarter” than normal MA. We know that the MA has many shortcomings. For example, the short-term moving averag...Discussmoving average
FMZ Quantfmzquant.hashnode.dev·Jun 17, 2024Thermostat Strategy using on crypto market by MyLanguageStrategy Name: Upgraded Thermostat Strategy Data cycle: 1H Support: Commodity Futures, Digital Currency Futures, Digital Currency Spot Main chart: upper track, formula: TOP^^MAC+N_TMPTMP; / / upper track of boll lower track, formula: BOTTOM^^M...Discussthermostat
FMZ Quantfmzquant.hashnode.dev·Jun 4, 2024Principle and compilation of stop-loss modelWhy stop-loss? Alligator Principle Suppose a crocodile bites your feet. If you try to break free your feet with your hands, the crocodile will bite your feet and hands at the same time. The more you struggle, the more you will be bitten. So, if the ...Discussstop loss,
FMZ Quantfmzquant.hashnode.dev·May 21, 2024Modeling and Analysis of Bitcoin Volatility Based on ARMA-EGARCH ModelRecently, I have made some analysis on the volatility of Bitcoin, which is wordy and spontaneous. So I simply share some of my understanding and code as follows. My ability is limited, and the code is not very perfect. If there is any mistake, please...DiscussBitcoin
cpuucpuu.hashnode.dev·Jan 26, 2023An Introduction to Volatility 3 and Installation GuideIntroduction Forensic experts are frequently summoned in the aftermath of a security breach or to ascertain whether an incident has transpired. Their primary objective is to obtain a snapshot of the compromised system's RAM to capture cryptographic k...Discuss·1 like·18.0K readsMemory Forensicsmemory forensics