O Language: First Router

The router socket structure was created with the intention of creating an API over the HTTP/S protocol and exchanging data through the socket. In web based projects it is possible to write web server quickly and easily. In addition, the API can be created in micro-services.

hello.olm (as hello module):

def hello = fn(name){
 return "Hello, "+name+"! Welcome to Olang"
}

router.ola (as router script):

load "hello.olm"

def config = {
 "GET" : {
 "/" : "Welcome to the O-Lang Router!"
 },
 "POST":{
 "/:name" : hello("{{.name}}")
 }
}

show("Listening 0.0.0.0:8080... Ctrl+C to exit.")
router("8080", config);

GET method test:

~> curl -X GET localhost:8080
Welcome to the O-Lang Router!

POST method test (oytun as parameter value for name [ :name => {{.name}} ]):

~> curl -X POST localhost:8080/oytun
Hello, oytun! Welcome to Olang

As you can see in the example, we wrote a web micro service using port 8080 via get and post methods.

O Language: Functions and Literals

The only difference between functions and literatures is that one of the brackets can be operated without parentheses. In this way you can define your own definitions.

Functions

The system has function definition function. These functions can be used many times.

def main = fn(param){
    return param
};

main("Hello!"); 
# => main function result:"Hello!"

Literals

You benefit by creating static functions directly in the system literature.

literal example(param){
   println(param)
}

main "Hello!"
# => main literal result:"Hello!"

Now we can begin to learn scope definitions.

O Language: Getting Started (Part 2)

Installation

Click download link and select your own system or package after setup your development environment path to extracted path. If you need to If you want to do development, you can install golang and extract the codes with this command;

go get -v github.com/olproject/olang

and run

olang(.exe) (-r) (-d=true [debug mode])

Thats it.

Files

Olang files is to simple. Default file extension “.ola”. Let’s start by examining the programming language example.

def hello = fn(name){
  return "Hello, "+name+"! Welcome to O-lang!"
}
def result = hello("Oytun")
show(result)

Run:

$ chmod a+x test.ol
$ ./test.ol

or

$ olang test.ol

Output:

Hello, Oytun! Welcome to Olang

Read more “O Language: Getting Started (Part 2)”

The Do What The Fuck You Want To Public License

The Do What The Fuck You Want To Public License (WTFPL) is a free software license.

There is a long ongoing battle between GPL zealots and BSD fanatics, about which license type is the most free of the two. In fact, both license types have unacceptable obnoxious clauses (such as reproducing a huge disclaimer that is written in all caps) that severely restrain our freedoms. The WTFPL can solve this problem.

When analysing whether a license is free or not, you usually check that it allows free usage, modification and redistribution. Then you check that the additional restrictions do not impair fundamental freedoms. The WTFPL renders this task trivial: it allows everything and has no additional restrictions. How could life be easier? You just DO WHAT THE FUCK YOU WANT TO.

Full Text: copying.txt

Web Site: wtfpl.net

What is Pentest?

If you are working with web projects, you have to ensure the security of your sites. If you publish your site without Pentest, you risk a lot. These risks can make your site vulnerable and cause your information to be stolen by malicious people.

What do you need to do in this situation?

By putting your site into pentest vehicles and by doing pentests, you can test your site and see how confident your projects will travel on the internet.

Pentest concept; Penetration (Test) is a concept formed by the combination of the test (test) bias. All the contents of a system yada are attacked by aggressive people (yada robots), both software; Both hardware and tested by testing; Are those that are made during software or hardware delivery in the safest manner that the end user will use.

Kali Linux provides us with all the facilities we can use during the pentest phase.

These tests include;

  • External testing
  • Internal testing
  • Blind testing
  • Double blind testing

It shaped.

External testing

They are usually attacked from outside to control internal services and to cause damage. In these attacks, information is usually collected together with the targets to be attacked. Using this information later; Infiltration attacks are done. If one of these attacks is successful, the infiltration will be done externally.

Internal testing

These attacks are usually internal. Internal services are the whole of information used to infiltrate external sources. First, the information obtained in the internal network is used to infiltrate internal systems, and depending on what is needed afterwards, the attacker may use internal resources for external resources.

Blind testing

It is a test using some strategies and simulators. Using these simulators, the pentest process is performed on the target systems and the results are reported and the information is collected. Virtualization of the re-tests related to the vulnerabilities that occur afterwards ensures that system security vulnerabilities are minimized.

Double blind testing

In addition to blind tests, it is a monitor-based monitoring of strategies and simulators and is a method used to avoid security problems that may arise in the future.

In the next article, we will examine the pentest tools and do a sample blind test. See you next article.