<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Database Archives - Datarecovery.com</title>
	<atom:link href="https://datarecovery.com/category/data-types/database/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Tue, 01 Dec 2020 17:30:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Microsoft SQL Server Database Recovery</title>
		<link>https://datarecovery.com/rd/microsoft-sql-server-database-recovery/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Fri, 20 Nov 2020 14:30:56 +0000</pubDate>
				<category><![CDATA[Data Types]]></category>
		<category><![CDATA[Database]]></category>
		<guid isPermaLink="false">http://datarecovery.com/?post_type=rd&#038;p=4015</guid>

					<description><![CDATA[<p>Our data recovery customers often ask that we target their databases, and Microsoft SQL Server databases are among the most frequently requested files. In many cases, a SQL Server database is the only important thing on a drive or server...</p>
<p>The post <a href="https://datarecovery.com/rd/microsoft-sql-server-database-recovery/">Microsoft SQL Server Database Recovery</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-full wp-image-4016" src="http://datarecovery.com/wp-content/uploads/2015/06/Microsoft-SQL-Server-Logo-303x95.png" alt="logo for Microsoft SQL Server database software" width="303" height="95" srcset="https://datarecovery.com/wp-content/uploads/2015/06/Microsoft-SQL-Server-Logo-303x95.png 303w, https://datarecovery.com/wp-content/uploads/2015/06/Microsoft-SQL-Server-Logo-303x95-300x95.png 300w" sizes="(max-width: 303px) 100vw, 303px" /></p>
<p>Our data recovery customers often ask that we target their databases, and Microsoft SQL Server databases are among the most frequently requested files. In many cases, a SQL Server database is the only important thing on a drive or server — clients don’t need anything else, and they ask our engineers to do anything and everything possible to get these critical files up and running again. As a result, we’ve developed some specialized methods for SQL Server recovery, including key software tools, and we’re always looking for ways to improve our processes.</p>
<p>There are a few factors to consider when planning Microsoft SQL Server data recovery.  SQL Server can be very sensitive to any issues such as bad sectors, mis-aligned or stale data. The databases can include large files, which increases the risk associated with recovery — any small issue in the recovered data will affect the entire database. Even with a 100 percent clean recovery, SQL Server may have trouble interpreting the recovered data if the database wasn’t shut down correctly (this problem has subsided somewhat with new revisions in recent versions of the software).</p>
<p>A database that will not attach — or that reports numerous errors when accessing data — is essentially useless to our clients. <strong>Our No Data, No Charge policy covers this situation, so we take the necessary steps to provide recovered database files that our clients can reattach and use cleanly.</strong>  The goal is to allow them to easily reintegrate the data into their systems. SQL Server functions with a variety of front-end applications, however, so we are not able to provide full reintegration support.</p>
<h2>Different Configurations and Microsoft SQL Server File Formats</h2>
<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-4017" src="http://datarecovery.com/wp-content/uploads/2015/06/Microsoft-SQL-Server-database-menu-attach.png" alt="Microsoft-SQL-Server-database-menu-attach" width="330" height="334" srcset="https://datarecovery.com/wp-content/uploads/2015/06/Microsoft-SQL-Server-database-menu-attach.png 330w, https://datarecovery.com/wp-content/uploads/2015/06/Microsoft-SQL-Server-database-menu-attach-296x300.png 296w, https://datarecovery.com/wp-content/uploads/2015/06/Microsoft-SQL-Server-database-menu-attach-90x90.png 90w" sizes="auto, (max-width: 330px) 100vw, 330px" /></p>
<p>In our laboratory, we work with hundreds of SQL database configurations due to the enormous popularity of the software. We often find that our clients run SQL Server on RAID systems, but it is not uncommon to find the software on standard consumer computers. Common versions of SQL server treated in our laboratories include:</p>
<ul>
<li>SQL Server 7 (1998)</li>
<li>SQL Server 2000</li>
<li>SQL Server 2005</li>
<li>SQL Server 2008</li>
<li>SQL Server 2008 R2</li>
<li>SQL Server 2012</li>
<li>SQL Server 2014 (12.0)</li>
<li>SQL Server 2016 (13.0)</li>
<li>SQL Server 2017 (14.0)</li>
<li>SQL Server 2019 (15.0)</li>
<li>All Future Versions</li>
</ul>
<p>In the paragraphs below, I’ll go a little further in-depth into our processes for the more difficult cases, but first I&#8217;ll attempt to provide a little background info on the actual database files associated with SQL Server.</p>
<p>The critical file types associated with SQL Server are MDF and LDF files (and rarely NDF). Both are required for a functioning database. The MDF file is the primary database file, and the LDF is the log file. The LDF records past transactions that occurred which allows for rolling back actions or recovering from problems since last backup, and it helps to guarantee data consistency. Generally the MDF file is the larger file, but we have seen that sometimes the LDF is larger (this depends on configuration and usage). Database backup files are generally BAK extension.</p>
<p>In most cases, recovered SQL Server database files test perfectly fine, but if the recovery was particularly difficult or there was significant damage to work around, we&#8217;ll often see a few issues arise. These can manifest in different ways.  The database might fail to attach or show errors upon querying data. In some cases, we&#8217;ll simply find bad data within the raw files, at which point we&#8217;ll need to dive a little deeper to figure out what&#8217;s going wrong.</p>
<p>Depending on the case, we may need to go back to our physical data recovery procedures to try to get a better clone of the original media. If the SQL server database files were located on a RAID, we&#8217;ll have to adjust the RAID recovery to get the cleanest possible extraction from all of the drive members. This is where our in-house software tools come into play, as these tools allow us to fill in gaps of data in the SQL Server MDF and LDF files with the correct data whenever it can be found elsewhere (not in the original recovered file).</p>
<p>In the case of a RAID, where multiple drives have failed at different points, it may allow us to use small parts of the normally undesirable “stale” drive to this purpose. In other situations, since we are often able to find different versions of similar database files among the data, we can point our automated tool to several versions and it will piece together the best possible result with the most recent data by replacing bad sectors with the missing data from another file. We will do what it takes to get the best result, and sometimes the process can take days (we cut turnaround times by any means necessary, but the quality of the data recovery is always the top priority.)</p>
<h2>Should I Use SQL Server Database Recovery Software or Repair Utilities?</h2>
<p>For the IT professional dealing with a damaged SQL Server database, there are plenty of commercial tools advertised as capable alternatives to a professional SQL server database recovery service. I&#8217;d recommend against these types of utilities, however, based on the issues that often occur in a fairly typical recovery. Basic software isn&#8217;t enough to get a clean recovery, and all of these tools require access to data in order to work. That&#8217;s usually a security risk.</p>
<p>Beyond that, these tools will rarely return a database that attaches properly and presents usable data. Stored Procedures and Views can be dumped (these are often required by software systems using the database). Table rows are often slashed in a rough fashion, as the utility does what it needs to do to create a functioning database without taking a real look at the data. There&#8217;s simply no ability for logical decision making, which will lead to usability issues.</p>
<p>Of course, some SQL Server database repair tools will function as a last resort, but they&#8217;re best suited for use by knowledgeable professionals. A capable data recovery service will give you better, safer, and more secure results.  If you are considering data recovery service with SQL Server data, please let us answer your questions – call 800.237.4200.</p>
<p>The post <a href="https://datarecovery.com/rd/microsoft-sql-server-database-recovery/">Microsoft SQL Server Database Recovery</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Ashley Madison Leak: What Information Was Released?</title>
		<link>https://datarecovery.com/rd/the-ashley-madison-leak-what-information-was-released/</link>
		
		<dc:creator><![CDATA[Ben Carmitchel]]></dc:creator>
		<pubDate>Thu, 27 Aug 2015 20:05:13 +0000</pubDate>
				<category><![CDATA[Computer Forensics]]></category>
		<category><![CDATA[Data Types]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[leak]]></category>
		<guid isPermaLink="false">http://datarecovery.com/?post_type=rd&#038;p=4290</guid>

					<description><![CDATA[<p>The Ashley Madison data leak is unquestionably the most high-profile IT security event of the last year, and members of the website face serious repercussions. Ashley Madison advertises as “the world’s leading married dating service for discreet encounters,” but that...</p>
<p>The post <a href="https://datarecovery.com/rd/the-ashley-madison-leak-what-information-was-released/">The Ashley Madison Leak: What Information Was Released?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">The Ashley Madison data leak is unquestionably the most high-profile IT security event of the last year, and members of the website face serious repercussions. Ashley Madison advertises as “the world’s leading married dating service for discreet encounters,” but that discretion was compromised as hackers released about 30 gigabytes of user data, including email addresses, names, and even GPS coordinates (likely collected from mobile users). </span></p>
<p><span style="font-weight: 400;">The leaked information came from a MySQL database, and many of the fields are fairly self-explanatory. “eye_color,” for instance, gives the user’s eye color (as input by the user when signing up for an Ashley Madison profile). For many accounts, some fields are left blank.</span></p>
<p><span style="font-weight: 400;">Credit card information is stored in a separate area, and most hackers will not be able to definitively link usernames with payment information. Furthermore, the leak did not contain complete credit card numbers, so payment information should be safe; even so, we would advise Ashley Madison users to contact their card providers and request a re-issued credit or debit card.</span></p>
<p>The Ashley Madison database contains the following fields—</p>
<p>Table: <strong>aminno_member_email</strong></p>
<table dir="ltr" style="width: 600px;" border="1" cellspacing="0" cellpadding="0">
<colgroup>
<col width="157" />
<col width="404" /></colgroup>
<tbody>
<tr>
<td data-sheets-value="[null,2,&quot;Field&quot;]"><strong>Field</strong></td>
<td data-sheets-value="[null,2,&quot;Description&quot;]"><strong>Description</strong></td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pnum&quot;]">pnum</td>
<td data-sheets-value="[null,2,&quot;The record's primary key. &quot;]">The record&#8217;s primary key.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;email&quot;]">email</td>
<td data-sheets-value="[null,2,&quot;The account email address.&quot;]">The account email address.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;isvalid&quot;]">isvalid</td>
<td></td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;html&quot;]">html</td>
<td></td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;optin&quot;]">optin</td>
<td data-sheets-value="[null,2,&quot;Whether or not the user opts in to the Ashley Madison newsletter. &quot;]">Whether or not the user opts in to the Ashley Madison newsletter.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;notify_newmail&quot;]">notify_newmail</td>
<td></td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;notify_newmember&quot;]">notify_newmember</td>
<td></td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;notify_login&quot;]">notify_login</td>
<td></td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;notify_offer&quot;]">notify_offer</td>
<td></td>
</tr>
</tbody>
</table>
<p>Table: <strong>member_details</strong></p>
<table dir="ltr" style="width: 600px;" border="1" cellspacing="0" cellpadding="0">
<colgroup>
<col width="157" />
<col width="404" /></colgroup>
<tbody>
<tr>
<td data-sheets-value="[null,2,&quot;pnum&quot;]">pnum</td>
<td data-sheets-value="[null,2,&quot;The record's primary key. &quot;]">The record&#8217;s primary key.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;eye_color&quot;]">eye_color</td>
<td data-sheets-value="[null,2,&quot;User's eye color. &quot;]">User&#8217;s eye color.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;hair_color&quot;]">hair_color</td>
<td data-sheets-value="[null,2,&quot;User's hair color. &quot;]">User&#8217;s hair color.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;dob&quot;]">dob</td>
<td data-sheets-value="[null,2,&quot;User's date of birth. &quot;]">User&#8217;s date of birth.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_caption&quot;]">profile_caption</td>
<td data-sheets-value="[null,2,&quot;User-generated caption, visible on account profile. &quot;]">User-generated caption, visible on account profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_ethnicity&quot;]">profile_ethnicity</td>
<td data-sheets-value="[null,2,&quot;User's self-identified ethnicity, expressed as a number. &quot;]">User&#8217;s self-identified ethnicity, expressed as a number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_weight&quot;]">profile_weight</td>
<td data-sheets-value="[null,2,&quot;User's weight, visible on profile. &quot;]">User&#8217;s weight, visible on profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_height&quot;]">profile_height</td>
<td data-sheets-value="[null,2,&quot;User's height, visible on profile. &quot;]">User&#8217;s height, visible on profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_bodytype&quot;]">profile_bodytype</td>
<td data-sheets-value="[null,2,&quot;User's body type, expressed as a number.  &quot;]">User&#8217;s body type, expressed as a number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_smoke&quot;]">profile_smoke</td>
<td data-sheets-value="[null,2,&quot;Whether or not the user smokes. Visible on profile. &quot;]">Whether or not the user smokes. Visible on profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_drink&quot;]">profile_drink</td>
<td data-sheets-value="[null,2,&quot;User's drinking status. Visible on profile. &quot;]">User&#8217;s drinking status. Visible on profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_initially_seeking&quot;]">profile_initially_seeking</td>
<td data-sheets-value="[null,2,&quot;Type of relationship user is initially seeking, visible on profile. &quot;]">Type of relationship user is initially seeking, visible on profile.</td>
</tr>
</tbody>
</table>
<p>Table: <strong>member_login</strong></p>
<table dir="ltr" style="width: 600px;" border="1" cellspacing="0" cellpadding="0">
<colgroup>
<col width="157" />
<col width="404" /></colgroup>
<tbody>
<tr>
<td data-sheets-value="[null,2,&quot;pnum&quot;]">pnum</td>
<td data-sheets-value="[null,2,&quot;The record's primary key. &quot;]">The record&#8217;s primary key.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;username&quot;]">username</td>
<td data-sheets-value="[null,2,&quot;User's username. &quot;]">User&#8217;s username.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;password&quot;]">password</td>
<td data-sheets-value="[null,2,&quot;User's password (these are mostly protected with bcrypt).&quot;]">User&#8217;s password (these are encrypted).</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;loginkey&quot;]">loginkey</td>
<td data-sheets-value="[null,2,&quot;Login keys are unique to each user, authenticating the user for logout.&quot;]">Login keys are unique to each user, authenticating the user for logout.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;notify&quot;]">notify</td>
<td></td>
</tr>
</tbody>
</table>
<p>Table: <strong>am_am_member</strong></p>
<table dir="ltr" style="width: 800px;" border="1" cellspacing="0" cellpadding="0">
<colgroup>
<col width="157" />
<col width="404" /></colgroup>
<tbody>
<tr>
<td data-sheets-value="[null,2,&quot;id&quot;]">id</td>
<td data-sheets-value="[null,2,&quot;User id number. &quot;]">User id number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;createdon&quot;]">createdon</td>
<td data-sheets-value="[null,2,&quot;Date and time the account was created. &quot;]">Date and time the account was created.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;createdby&quot;]">createdby</td>
<td data-sheets-value="[null,2,&quot;User who created the account. &quot;]">User who created the account.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;updatedon&quot;]">updatedon</td>
<td data-sheets-value="[null,2,&quot;Date and time (to second) the account was last updated. &quot;]">Date and time (to second) the account was last updated.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;updatedby&quot;]">updatedby</td>
<td data-sheets-value="[null,2,&quot;User who updated the account. &quot;]">User who updated the account.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;admin&quot;]">admin</td>
<td data-sheets-value="[null,2,&quot;Whether or not the user has administrative status in the system. &quot;]">Whether or not the user has administrative status in the system.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;status&quot;]">status</td>
<td data-sheets-value="[null,2,&quot;User's relationship status. &quot;]">User&#8217;s relationship status.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;account_type&quot;]">account_type</td>
<td data-sheets-value="[null,2,&quot;Type of account. &quot;]">Type of account.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;membership_status&quot;]">membership_status</td>
<td data-sheets-value="[null,2,&quot;User's membership status. &quot;]">User&#8217;s membership status.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;ad_source&quot;]">ad_source</td>
<td data-sheets-value="[null,2,&quot;Tracks site advertising. &quot;]">Tracks site advertising.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_number&quot;]">profile_number</td>
<td data-sheets-value="[null,2,&quot;User's profile number. &quot;]">User&#8217;s profile number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;nickname&quot;]">nickname</td>
<td data-sheets-value="[null,2,&quot;User's nickname. &quot;]">User&#8217;s nickname.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;first_name&quot;]">first_name</td>
<td data-sheets-value="[null,2,&quot;User's first name&quot;]">User&#8217;s first name</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;last_name&quot;]">last_name</td>
<td data-sheets-value="[null,2,&quot;User's last name. &quot;]">User&#8217;s last name.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;street1&quot;]">street1</td>
<td data-sheets-value="[null,2,&quot;User's street address. &quot;]">User&#8217;s street address.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;street2&quot;]">street2</td>
<td data-sheets-value="[null,2,&quot;Second line of user's street address (if applicable). &quot;]">Second line of user&#8217;s street address (if applicable).</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;city&quot;]">city</td>
<td data-sheets-value="[null,2,&quot;City listed in user's address. &quot;]">City listed in user&#8217;s address.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;zip&quot;]">zip</td>
<td data-sheets-value="[null,2,&quot;Zipcode listed in user's address. &quot;]">Zipcode listed in user&#8217;s address.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;state&quot;]">state</td>
<td data-sheets-value="[null,2,&quot;State listed in user's address. &quot;]">State listed in user&#8217;s address.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;latitude&quot;]">latitude</td>
<td data-sheets-value="[null,2,&quot;User's location latitude. &quot;]">User&#8217;s location latitude.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;longitude&quot;]">longitude</td>
<td data-sheets-value="[null,2,&quot;Longitude of user's location. &quot;]">Longitude of user&#8217;s location.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;country&quot;]">country</td>
<td data-sheets-value="[null,2,&quot;User's country of residence. &quot;]">User&#8217;s country of residence.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;phone&quot;]">phone</td>
<td data-sheets-value="[null,2,&quot;User's primary phone number. &quot;]">User&#8217;s primary phone number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;work_phone&quot;]">work_phone</td>
<td data-sheets-value="[null,2,&quot;User's work phone number .&quot;]">User&#8217;s work phone number .</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;mobile_phone&quot;]">mobile_phone</td>
<td data-sheets-value="[null,2,&quot;User's mobile phone number. &quot;]">User&#8217;s mobile phone number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;gender&quot;]">gender</td>
<td data-sheets-value="[null,2,&quot;User's gender. &quot;]">User&#8217;s gender.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;dob&quot;]">dob</td>
<td data-sheets-value="[null,2,&quot;User's date of birth. &quot;]">User&#8217;s date of birth.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_caption&quot;]">profile_caption</td>
<td data-sheets-value="[null,2,&quot;User-generated caption, visible on account profile. &quot;]">User-generated caption, visible on account profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_ethnicity&quot;]">profile_ethnicity</td>
<td data-sheets-value="[null,2,&quot;User's self-identified ethnicity, expressed as a number. &quot;]">User&#8217;s self-identified ethnicity, expressed as a number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_weight&quot;]">profile_weight</td>
<td data-sheets-value="[null,2,&quot;User's weight, visible on profile. &quot;]">User&#8217;s weight, visible on profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_height&quot;]">profile_height</td>
<td data-sheets-value="[null,2,&quot;User's height, visible on profile. &quot;]">User&#8217;s height, visible on profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_bodytype&quot;]">profile_bodytype</td>
<td data-sheets-value="[null,2,&quot;User's body type, expressed as a number.  &quot;]">User&#8217;s body type, expressed as a number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_smoke&quot;]">profile_smoke</td>
<td data-sheets-value="[null,2,&quot;Whether or not user reports smoking. &quot;]">Whether or not user reports smoking.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_drink&quot;]">profile_drink</td>
<td data-sheets-value="[null,2,&quot;Whether or not user reports drinking. &quot;]">Whether or not user reports drinking.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_initially_seeking&quot;]">profile_initially_seeking</td>
<td data-sheets-value="[null,2,&quot;What the user is initially seeking, expressed as a number. &quot;]">What the user is initially seeking, expressed as a number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_relationship&quot;]">profile_relationship</td>
<td data-sheets-value="[null,2,&quot;User's relationship status, expressed as a number. &quot;]">User&#8217;s relationship status, expressed as a number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_opento&quot;]">pref_opento</td>
<td data-sheets-value="[null,2,&quot;Type of experience the user is willing to try, listed as numbers. &quot;]">Type of experience the user says he or she is willing to try (or &#8220;open to&#8221;), listed as numbers.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_opento_other&quot;]">pref_opento_other</td>
<td data-sheets-value="[null,2,&quot;What the user hopes a match will be open to &quot;]">What the user hopes a match will be open to</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_opento_abstract&quot;]">pref_opento_abstract</td>
<td data-sheets-value="[null,2,&quot;User-written statement of what the user is willing to participate in. &quot;]">User-written statement of what the user is willing to participate in.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_turnsmeon&quot;]">pref_turnsmeon</td>
<td data-sheets-value="[null,2,&quot;List of things that excite the user. Expressed in numbers. &quot;]">Items that the user says he or she is interested in. Expressed in numbers.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_turnsmeon_other&quot;]">pref_turnsmeon_other</td>
<td data-sheets-value="[null,2,&quot;List of things that the user wants a match to be excited by. Numbers. &quot;]">List of things that the user wants a match to be interested in. Expressed in numbers.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_turnsmeon_abstract&quot;]">pref_turnsmeon_abstract</td>
<td data-sheets-value="[null,2,&quot;Written description of the user's turn-ons. &quot;]">Written description of the user&#8217;s &#8220;turn-ons.&#8221;</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_lookingfor&quot;]">pref_lookingfor</td>
<td data-sheets-value="[null,2,&quot;Attributes the user is looking for in a match/dating experience. &quot;]">Attributes the user is looking for in a match/dating experience.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_lookingfor_other&quot;]">pref_lookingfor_other</td>
<td data-sheets-value="[null,2,&quot;List of attributes the user hopes a match is looking for. &quot;]">List of attributes the user hopes a match is looking for.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_lookingfor_abstract&quot;]">pref_lookingfor_abstract</td>
<td data-sheets-value="[null,2,&quot;User's description of a preferred match. &quot;]">User&#8217;s description of a preferred match.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;main_photo&quot;]">main_photo</td>
<td data-sheets-value="[null,2,&quot;User's uploaded photo. &quot;]">User&#8217;s uploaded photo.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;security_question&quot;]">security_question</td>
<td data-sheets-value="[null,2,&quot;User's security question. &quot;]">User&#8217;s security question.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;security_answer&quot;]">security_answer</td>
<td data-sheets-value="[null,2,&quot;Answer to user's security question. &quot;]">Answer to user&#8217;s security question.</td>
</tr>
</tbody>
</table>
<p>This is a complete list of all of the fields in the MySQL portion of the database. However, s<span style="font-weight: 400;">everal of the fields use numerical codes to indicate a selection from the user. “profile_relationship” specifies the relationship status of the user as follows:</span></p>
<p>1: “Attached Female Seeking Male”<br />
<span style="font-weight: 400;">2: “Attached Male Seeking Female”<br />
</span><span style="font-weight: 400;">3: “Single Male Seeking Female”<br />
</span><span style="font-weight: 400;">4: “Single Female Seeking Male”<br />
</span><span style="font-weight: 400;">5: “Male Seeking Male”<br />
</span><span style="font-weight: 400;">6: “Female Seeking Female”</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">The “pref_opento” field contains a number that correlates to one of the following:</span></p>
<p><span style="font-weight: 400;">1: &#8220;Threesome&#8221;<br />
</span><span style="font-weight: 400;">3: &#8220;Being Dominant/Master&#8221;<br />
</span><span style="font-weight: 400;">4: &#8220;Being Submissive/Slave&#8221;<br />
</span><span style="font-weight: 400;">6: &#8220;Bondage&#8221;<br />
</span><span style="font-weight: 400;">7: &#8220;Conventional Sex&#8221;<br />
</span><span style="font-weight: 400;">11: &#8220;Fetishes&#8221;<br />
</span><span style="font-weight: 400;">14: &#8220;Nothing Kinky&#8221;<br />
</span><span style="font-weight: 400;">15: &#8220;One-Night Stands&#8221;<br />
</span><span style="font-weight: 400;">17: &#8220;Role Playing&#8221;<br />
</span><span style="font-weight: 400;">18: &#8220;Sex Talk&#8221;<br />
</span><span style="font-weight: 400;">19: &#8220;Spanking&#8221;<br />
</span><span style="font-weight: 400;">21: &#8220;Experimenting with Tantric Sex&#8221;<br />
</span><span style="font-weight: 400;">22: &#8220;Transvestitism&#8221;<br />
</span><span style="font-weight: 400;">23: &#8220;Experimenting with Sex Toys&#8221;<br />
</span><span style="font-weight: 400;">23: &#8220;Exploring with Sex Toys&#8221;<br />
</span><span style="font-weight: 400;">26: &#8220;Aggressiveness&#8221;<br />
</span><span style="font-weight: 400;">27: &#8220;Blindfolding&#8221;<br />
</span><span style="font-weight: 400;">28: &#8220;Bubble Bath for 2&#8221;<br />
</span><span style="font-weight: 400;">29: &#8220;Cuddling &amp; Hugging&#8221;<br />
</span><span style="font-weight: 400;">30: &#8220;Curious &#8211; Domination&#8221;<br />
</span><span style="font-weight: 400;">31: &#8220;Curious &#8211; Submission&#8221;<br />
</span><span style="font-weight: 400;">32: &#8220;Dressing Up/Lingerie&#8221;<br />
</span><span style="font-weight: 400;">33: &#8220;Erotic Movies&#8221;<br />
</span><span style="font-weight: 400;">34: &#8220;Erotic Tickling&#8221;<br />
</span><span style="font-weight: 400;">36: &#8220;Extended Foreplay/Teasing&#8221;<br />
</span><span style="font-weight: 400;">37: &#8220;Gentleness&#8221;<br />
</span><span style="font-weight: 400;">38: &#8220;Good With Your Hands&#8221;<br />
</span><span style="font-weight: 400;">39: &#8220;Kissing&#8221;<br />
</span><span style="font-weight: 400;">40: &#8220;Light Kinky Fun&#8221;<br />
</span><span style="font-weight: 400;">41: &#8220;Likes to be Watched/Exhibitionism&#8221;<br />
</span><span style="font-weight: 400;">42: &#8220;Likes to Give Oral Sex&#8221;<br />
</span><span style="font-weight: 400;">43: &#8220;Likes to Receive Oral Sex&#8221;<br />
</span><span style="font-weight: 400;">44: &#8220;Likes to Go Slow&#8221;<br />
</span><span style="font-weight: 400;">45: &#8220;Lots of Stamina&#8221;<br />
</span><span style="font-weight: 400;">46: &#8220;Open to Experimentation&#8221;<br />
</span><span style="font-weight: 400;">48: &#8220;Sensual Massage&#8221;<br />
</span><span style="font-weight: 400;">49: &#8220;Sharing Fantasies&#8221;<br />
</span><span style="font-weight: 400;">50: &#8220;Someone I Can Teach&#8221;<br />
</span><span style="font-weight: 400;">51: &#8220;Someone Who Can Teach Me&#8221;<br />
</span><span style="font-weight: 400;">52: &#8220;You Like to Cross Dress&#8221;</span></p>
<p><span style="font-weight: 400;">The &#8220;looking for&#8221; section also contains a number that correlates to the following:</span></p>
<p><span style="font-weight: 400;">1: &#8220;A Don Juan&#8221;<br />
</span><span style="font-weight: 400;">4: &#8220;Sense of Humor&#8221;<br />
</span><span style="font-weight: 400;">6: &#8220;Aggressive/Take Charge Nature&#8221;<br />
</span><span style="font-weight: 400;">9: &#8220;Average Sex Drive&#8221;<br />
</span><span style="font-weight: 400;">10: &#8220;Confidence&#8221;<br />
</span><span style="font-weight: 400;">11: &#8220;Discretion/Secrecy&#8221;<br />
</span><span style="font-weight: 400;">12: &#8220;Dislikes Routine&#8221;<br />
</span><span style="font-weight: 400;">14: &#8220;Good Personal Hygiene&#8221;<br />
</span><span style="font-weight: 400;">16: &#8220;Has a Secret Love Nest&#8221;<br />
</span><span style="font-weight: 400;">17: &#8220;High Sex Drive&#8221;<br />
</span><span style="font-weight: 400;">18: &#8220;Imagination&#8221;<br />
</span><span style="font-weight: 400;">19: &#8220;Likes Routine&#8221;<br />
</span><span style="font-weight: 400;">30: &#8220;A Professional/Well Groomed&#8221;<br />
</span><span style="font-weight: 400;">31: &#8220;Stylish/Classy&#8221;<br />
</span><span style="font-weight: 400;">32: &#8220;Casual Jeans/T-shirt Type&#8221;<br />
</span><span style="font-weight: 400;">33: &#8220;Tattoos&#8221;<br />
</span><span style="font-weight: 400;">34: &#8220;Body Piercing&#8221;<br />
</span><span style="font-weight: 400;">35: &#8220;BBW&#8221;<br />
</span><span style="font-weight: 400;">36: &#8220;Full Size Body&#8221;<br />
</span><span style="font-weight: 400;">37: &#8220;Muscular/Fit Body&#8221;<br />
</span><span style="font-weight: 400;">38: &#8220;Petite Figure&#8221;<br />
</span><span style="font-weight: 400;">39: &#8220;Slim to Average Body&#8221;<br />
</span><span style="font-weight: 400;">40: &#8220;Tall Height&#8221;<br />
</span><span style="font-weight: 400;">41: &#8220;Short Height&#8221;<br />
</span><span style="font-weight: 400;">42: &#8220;Long Hair&#8221;<br />
</span><span style="font-weight: 400;">43: &#8220;Short Hair&#8221;<br />
</span><span style="font-weight: 400;">44: &#8220;Girl Next Door&#8221;<br />
</span><span style="font-weight: 400;">45: &#8220;Naughty Girl&#8221;<br />
</span><span style="font-weight: 400;">46: &#8220;Bad Boy&#8221;<br />
</span><span style="font-weight: 400;">47: &#8220;Boy Next Door&#8221;<br />
</span><span style="font-weight: 400;">48: &#8220;Creative and Adventurous&#8221;<br />
</span><span style="font-weight: 400;">49: &#8220;Relaxed and Easy Going&#8221;<br />
</span><span style="font-weight: 400;">50: &#8220;Hopeless Romantic&#8221;<br />
</span><span style="font-weight: 400;">51: &#8220;A Father Figure&#8221;<br />
</span><span style="font-weight: 400;">52: &#8220;Not Possessive&#8221;<br />
</span><span style="font-weight: 400;">53: &#8220;A Good Listener&#8221;<br />
</span><span style="font-weight: 400;">54: &#8220;Good Communicator&#8221;<br />
</span><span style="font-weight: 400;">55: &#8220;Disease Free&#8221;<br />
</span><span style="font-weight: 400;">56: &#8220;Drug Free&#8221;<br />
</span><span style="font-weight: 400;">57: &#8220;Casual/Social Drinker&#8221;<br />
</span><span style="font-weight: 400;">58: &#8220;Seeking a Sugar Baby&#8221;<br />
</span><span style="font-weight: 400;">59: &#8220;Seeking a Sugar Daddy&#8221;<br />
</span><span style="font-weight: 400;">60: &#8220;Natural Breasts&#8221;<br />
</span><span style="font-weight: 400;">61: &#8220;Facial Hair&#8221;<br />
</span><span style="font-weight: 400;">62: &#8220;Tall, Dark and Handsome&#8221;</span></p>
<p><span style="font-weight: 400;">Datarecovery.com offers computer forensics services, which can help to verify the presence (or non-presence) of an individual’s information in the Ashley Madison leak. Given the nature of this leak, we offer this service exclusively to victims — not to spouses or other individuals. For more information, speak with a computer forensics expert by calling 1-800-237-4200.</span></p>
<p>The post <a href="https://datarecovery.com/rd/the-ashley-madison-leak-what-information-was-released/">The Ashley Madison Leak: What Information Was Released?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Datarecovery.com Offers Simple Way to Verify Ashley Madison Leaks</title>
		<link>https://datarecovery.com/2015/08/datarecovery-com-offers-simple-way-to-verify-ashley-madison-leaks/</link>
					<comments>https://datarecovery.com/2015/08/datarecovery-com-offers-simple-way-to-verify-ashley-madison-leaks/#respond</comments>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Thu, 27 Aug 2015 17:33:56 +0000</pubDate>
				<category><![CDATA[Computer Forensics]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Database]]></category>
		<guid isPermaLink="false">http://datarecovery.com/?p=4284</guid>

					<description><![CDATA[<p>Datarecovery.com, Inc., a world leader in computer forensics services, will provide customers with a simple way to verify whether their personally identifiable information has been made publicly accessible through high-profile security breaches, including the recent leaks from dating website Ashley...</p>
<p>The post <a href="https://datarecovery.com/2015/08/datarecovery-com-offers-simple-way-to-verify-ashley-madison-leaks/">Datarecovery.com Offers Simple Way to Verify Ashley Madison Leaks</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Datarecovery.com, Inc., a world leader in computer forensics services, will provide customers with a simple way to verify whether their personally identifiable information has been made publicly accessible through high-profile security breaches, including the recent leaks from dating website Ashley Madison.</p>
<p>“This is one of the most significant Internet security breaches in history”</p>
<p>Hackers began releasing the Ashley Madison data to torrent websites and the Dark Web (hidden networks that require specialized software to access) in late July, starting with more than 10 gigabytes of stolen data. Last week, another 20 gigabytes of data was released. The files contain personal information for millions of users.</p>
<p>The leaks have garnered significant media attention because of the unique nature of the Ashley Madison website, which markets its services towards people in committed relationships who want to start affairs. According to multiple sources, the released information has led to divorces and other serious consequences for some users.</p>
<p>“It’s a major breach of privacy, and users need to know whether or not they were affected,” said Ben Carmitchel, President of Datarecovery.com. “We’re offering the first computer forensics service specifically geared towards the victims of this type of data security breach.”</p>
<p>The computer forensics experts at Datarecovery.com can independently verify if an individual’s information was released, and to what extent. Customers can request information by using first and last name, email address and other personally identifiable information. The service is only available to primary users of hacked websites — not their spouses or other individuals.</p>
<p>While several websites have been set up to search through the leaked data, Ashley Madison has quickly taken them down by issuing Digital Millennial Copyright Act (DMCA) notices. Many of the remaining sites only search through some of the leaked data, and all sites ask for users’ email addresses, opening up additional security concerns.</p>
<p>“This is one of the most significant Internet security breaches in history,” said Carmitchel. “Our service is intended to help the affected users protect their sensitive data and retain some degree of privacy.”</p>
<p>Datarecovery.com is a worldwide leader in computer forensics and data recovery services. With four locations in <a href="https://datarecovery.com/about/bay-area/">California</a>, <a href="https://datarecovery.com/about/st-louis/">Illinois</a>, <a href="https://datarecovery.com/about/phoenix/">Arizona</a>, and <a href="https://datarecovery.com/about/toronto/">Toronto</a>, the company provides a variety of services to thousands of clients each year. Visit <a href="http://datarecovery.com">datarecovery.com</a> for more information.</p>
<p><strong>Contacts</strong></p>
<p>Datarecovery.com, Inc.<br />
Benjamin Carmitchel, CEO<br />
602-635-2020<br />
ben.carmitchel@datarecovery.com</p>
<p>The post <a href="https://datarecovery.com/2015/08/datarecovery-com-offers-simple-way-to-verify-ashley-madison-leaks/">Datarecovery.com Offers Simple Way to Verify Ashley Madison Leaks</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/2015/08/datarecovery-com-offers-simple-way-to-verify-ashley-madison-leaks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Data/Media Conversion Technologies</title>
		<link>https://datarecovery.com/rd/datamedia-conversion-technologies/</link>
		
		<dc:creator><![CDATA[Ben Carmitchel]]></dc:creator>
		<pubDate>Mon, 23 Jun 2014 10:08:15 +0000</pubDate>
				<category><![CDATA[Data Types]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Office Documents]]></category>
		<category><![CDATA[Photos & Images]]></category>
		<category><![CDATA[Services]]></category>
		<guid isPermaLink="false">http://datarecovery.com/?post_type=rd&#038;p=1988</guid>

					<description><![CDATA[<p>Data conversion is the process of changing data from one format to another, or migrating data to and from various formats. Conversion is used to change data to the correct format to work with the system and software specified by...</p>
<p>The post <a href="https://datarecovery.com/rd/datamedia-conversion-technologies/">Data/Media Conversion Technologies</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Data conversion is the process of changing data from one format to another, or migrating data to and from various formats. Conversion is used to change data to the correct format to work with the system and software specified by the customer, or to convert data from an original application format to a more accessible form . The process of Media Conversion varies according to the situation. Different conversion methods are utilized according to cost and data accuracy.</p>
<p>There are various types of Media Conversion, including word processor conversion, file conversion, image conversion, data base conversion, and computer systems conversion.</p>
<p>Word processor conversion may be necessary when developing an application that needs to read and/or write various file formats. Word processor file formats are very complex and new formats are constantly being introduced, so the demand for conversion is high.</p>
<p>File conversion is just converting files to a different format. It may be necessary in order to view multiple file types without the related application. For instance, instead of having to buy ten different types of word-processing software to view ten different files, the files can be converted to fit one word processing system.</p>
<p>Image conversion may be used to gain access to the various image processing methods from your favorite application development environment. Some popular image formats are JPEG, Photo CD, PNG, PDF, and GIF. It may be necessary to convert an image to a different format in order to resize, sharpen, change color, or add certain special effects to meet your standards.</p>
<p>Data base conversion is needed to change any files saved in an out-of-date database to a more modern data base program. More modern databases are generally more convenient and dependable so the advantage of data base conversion is obvious.</p>
<p>Basically, there are two very general methods of conversion: data and media. In general, Media Conversion is extracting the files off of the source media, followed by backing up the files to the destination media. Two types of Media Conversion are media transfer and media migration. The reasons for media transfer may be to transfer archived data into a more convenient format or to save on cost of equipment, and media migration may be utilized for a greater storage capacity, a more reliable media type, less expensive media cost per GB or flexibility of media. However, a full Media Conversion can be much more complicated, possibly including processing the data well beyond just copying files to a different type of media.</p>
<p>The post <a href="https://datarecovery.com/rd/datamedia-conversion-technologies/">Data/Media Conversion Technologies</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 87/113 objects using Memcached
Page Caching using Disk: Enhanced 
Minified using Disk

Served from: datarecovery.com @ 2026-04-13 19:03:05 by W3 Total Cache
-->