Data Porn

The meaning of the word is knowledge that is transmitted and produced in order to reach a conclusion, an investigation, a reasoning. The data are used actively in every field in daily life. For example, the information you enter when you register to a website is written to the site database.

Then the content of the site is created using this information. Every function you perform is written to the database using your own information. When you upload a photo, the information of the photo is written in the database with your profile number and used to show this information again. When this kind of information is accumulated, a data stack is formed about you in the database and this information is stored for later use.

Using this information, similar content can be displayed on your site as well as on previously purchased ads. When you click on the ads, the information that was clicked using your profile number again generates another piece of data. In this way, it is possible to display the contents of the ads that are most suitable for you.

This loop continues to repeat as long as you remain in the site, and large databases are created. General statistics are available in these databases. Larger masses are always used to generate larger content sets. In this way, the movement and circulation that you do each year is stored for hundreds of years. In any case, this information is used over and over again. The infinite loop created by storing the information in this way can be used by malicious people as well as good content for malicious purposes as it is divided into large data groups over time. Continue reading “Data Porn”

ODZNAMES: What happens to the local server?

Malicious intrusion attempts have been initiated. In the near future, all malicious software running on the yada will try to block new applications written in that language in the struggle with those who try to gain access to uninfected folders.

I ran the first bad site cleaning tool I wrote with that language on my server. The results seem impressive to the general public. When administrators access unauthorized access to the system, server logs are automatically checked for errors, and sites and accounts are automatically deactivated in a server-side query.

In addition, all servers added to the blacklist are disconnected before they can connect to the server. This increases server security. I’ll share the source code for it after the tests are over in the coming days. In the meantime, many sites were blacklisted and their accounts were closed.

O Language: Database Management (and Object Relation Mapper)

O Language, you can write data directly into its own or SQL-based databases. With object-oriented data management, you can easily extract and manipulate your data. I will describe these database features in O Language in detail and with documentation using examples. This will tell you the features and how simple it is to make database management on O Language. This will save you extra time lost.

Continue reading “O Language: Database Management (and Object Relation Mapper)”