<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 10:26:54 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@abdelrahmanhsn/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Two British Men Arrested For Hacking Microsoft]]></title><description><![CDATA[ British police have arrested two men in the UK conspiring to hack into the computer networks of US tech giant Microsoft with plans to steal customers’ data from the software giant.   The]]></description><link>http://direct.ecency.com/hacking/@abdelrahmanhsn/two-british-men-arrested-for-hacking-microsoft</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@abdelrahmanhsn/two-british-men-arrested-for-hacking-microsoft</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[abdelrahmanhsn]]></dc:creator><pubDate>Sat, 24 Jun 2017 01:49:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/NTy4GV6ooFRXbGM5tGuFDrwDutRvxaoxW82em5Z3acJAejPDx9DVtY1raqj4YvnCxcsWiNf2g8Z2WJBZknqT95Tj3uwdKceWgbWT8eX7PTfWdcgkD8UqasJf5DpWdzJwmQ2mY99hxKk7NMtYa9RbnJAgBXWimqRP8n5xH6xE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why Bitcoins?]]></title><description><![CDATA[ Bitcoins can be used to buy merchandise anonymously. In addition, international payments are easy and cheap because bitcoins are not tied to any country or subject to regulation. Small businesses]]></description><link>http://direct.ecency.com/steemit/@abdelrahmanhsn/why-bitcoins</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@abdelrahmanhsn/why-bitcoins</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[abdelrahmanhsn]]></dc:creator><pubDate>Sat, 24 Jun 2017 01:30:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvz9vxu4AdmNoYSibr5FuXBWdBnSgxLhDWUSkNf8J7yyRcSQNogHwyP3MrQz8HHYnDff6KFjgz89fiEdNP1vdwkcGYc1NUh1jQc5ehbfnoD5eSgF4ctiPXTM5do?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why I Hate Job Interviews]]></title><description><![CDATA[  Why I Hate Job Interviews In a society where it's important to at least pretend everyone is equal, job interviews are a stark and constant reminder that we're not. Well, I suppose it's only constant]]></description><link>http://direct.ecency.com/life/@abdelrahmanhsn/why-i-hate-job-interviews</link><guid isPermaLink="true">http://direct.ecency.com/life/@abdelrahmanhsn/why-i-hate-job-interviews</guid><category><![CDATA[life]]></category><dc:creator><![CDATA[abdelrahmanhsn]]></dc:creator><pubDate>Sat, 24 Jun 2017 00:57:15 GMT</pubDate><enclosure url="https://images.ecency.com/0x0/https://c1.staticflickr.com/6/5816/22506109386_392e9d5ff2_b.jpg" length="0" type="image/jpeg"/></item><item><title><![CDATA[Founder and CEO Travis Kalanick has resigned from his Role at Uber Inc]]></title><description><![CDATA[ Mr. Kalanick’s resignation came under pressure after hours of arguments involving Uber’s investors, according to two people with an awareness of the situation, who asked to remain anonymous because]]></description><link>http://direct.ecency.com/photography/@abdelrahmanhsn/founder-and-ceo-travis-kalanick-has-resigned-from-his-role-at-uber-inc</link><guid isPermaLink="true">http://direct.ecency.com/photography/@abdelrahmanhsn/founder-and-ceo-travis-kalanick-has-resigned-from-his-role-at-uber-inc</guid><category><![CDATA[photography]]></category><dc:creator><![CDATA[abdelrahmanhsn]]></dc:creator><pubDate>Fri, 23 Jun 2017 21:45:57 GMT</pubDate></item><item><title><![CDATA[Who is a Hacker?]]></title><description><![CDATA[Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to gain access to a systemComputers have]]></description><link>http://direct.ecency.com/hacking/@abdelrahmanhsn/who-is-a-hacker</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@abdelrahmanhsn/who-is-a-hacker</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[abdelrahmanhsn]]></dc:creator><pubDate>Fri, 23 Jun 2017 20:48:48 GMT</pubDate></item><item><title><![CDATA[Introduction to Web Application Security]]></title><description><![CDATA[  Every newly deployed web application creates a new security hole and potential access of your organization’s data. Hackers gain access to data by sneaking through ports that are supposedly hidden]]></description><link>http://direct.ecency.com/hacking/@abdelrahmanhsn/introduction-to-web-application-security</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@abdelrahmanhsn/introduction-to-web-application-security</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[abdelrahmanhsn]]></dc:creator><pubDate>Fri, 23 Jun 2017 19:04:39 GMT</pubDate></item></channel></rss>