<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 01:16:28 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@abhi1/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Use Ctrl-C to Abort a Command]]></title><description><![CDATA[Just about any command can be stopped in its tracks with the abort command: Ctrl-C. If you haven't actually executed a command, you can just backspace and erase what you've typed, but if you've already]]></description><link>http://direct.ecency.com/hacking/@abhi1/use-ctrl-c-to-abort-a-command</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@abhi1/use-ctrl-c-to-abort-a-command</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[abhi1]]></dc:creator><pubDate>Thu, 09 Nov 2017 16:20:24 GMT</pubDate></item><item><title><![CDATA[Network Attacks: Protocol-Anomaly Attacks]]></title><description><![CDATA[Most network protocols were not designed with security in mind. An attacker can generate abnormal network packets that do not follow the expected format and purpose of the protocol, with the result that]]></description><link>http://direct.ecency.com/hacking/@abhi1/network-attacks-protocol-anomaly-attacks</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@abhi1/network-attacks-protocol-anomaly-attacks</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[abhi1]]></dc:creator><pubDate>Wed, 01 Nov 2017 06:45:24 GMT</pubDate></item><item><title><![CDATA[jQuery Official Blog Hacked — Stay Calm, Library is Safe!]]></title><description><![CDATA[The official blog of jQuery—most popular JavaScript library used by millions of websites—has been hacked by some unknown hackers, using the pseudonym "str0ng" and "n3tr1x." While there]]></description><link>http://direct.ecency.com/hacking/@abhi1/jquery-official-blog-hacked-stay-calm-library-is-safe</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@abhi1/jquery-official-blog-hacked-stay-calm-library-is-safe</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[abhi1]]></dc:creator><pubDate>Fri, 27 Oct 2017 00:59:21 GMT</pubDate></item><item><title><![CDATA[Websites of Indian Embassy in 7 Countries Hacked; Database Leaked Online]]></title><description><![CDATA[Indian embassy websites in seven different countries have been hacked, and attackers have leaked personal data, including full name, residential address, email address, passport number and phone number,]]></description><link>http://direct.ecency.com/hacking/@abhi1/websites-of-indian-embassy-in-7-countries-hacked-database-leaked-online</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@abhi1/websites-of-indian-embassy-in-7-countries-hacked-database-leaked-online</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[abhi1]]></dc:creator><pubDate>Wed, 25 Oct 2017 16:52:48 GMT</pubDate></item><item><title><![CDATA[Russia did not hack our voting systems, says California]]></title><description><![CDATA[California’s top elections official has rebutted a federal claim that hackers targeted the state’s elections infrastructure, one day after Wisconsin also cast doubt on the Department of Homeland Security’s]]></description><link>http://direct.ecency.com/hacking/@abhi1/russia-did-not-hack-our-voting-systems-says-california</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@abhi1/russia-did-not-hack-our-voting-systems-says-california</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[abhi1]]></dc:creator><pubDate>Sat, 21 Oct 2017 05:10:36 GMT</pubDate></item><item><title><![CDATA[Microsoft Said to Have Responded Quietly to Hack of Secret Bug Tracking Database]]></title><description><![CDATA[Microsoft Corp's secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking group more than four years ago, according to five former employees, in]]></description><link>http://direct.ecency.com/latest/@abhi1/microsoft-said-to-have-responded-quietly-to-hack-of-secret-bug-tracking-database</link><guid isPermaLink="true">http://direct.ecency.com/latest/@abhi1/microsoft-said-to-have-responded-quietly-to-hack-of-secret-bug-tracking-database</guid><category><![CDATA[latest]]></category><dc:creator><![CDATA[abhi1]]></dc:creator><pubDate>Fri, 20 Oct 2017 04:45:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/vM1pGHgNcyCiaxZmdb555hkjecmqomntNdRp7jgA3NL1VyLgPydBWzgbNRFe6v13BwSwntXZ2ERSZoH82SNvTiywF14n1YnrA3Yq3aPq2ABtjGmP73oAZ1itY89gq7ThYHVZ9Wv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[HACKING]]></title><description><![CDATA[Hacking ATM is now easier than ever before. Usually, hackers exploit hardware and software vulnerabilities to hack ATMs and force them to spit out cash, but now anyone can simply buy a malware to steal]]></description><link>http://direct.ecency.com/hacking/@abhi1/hacking</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@abhi1/hacking</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[abhi1]]></dc:creator><pubDate>Fri, 20 Oct 2017 04:35:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm4iYtFdzVNy1kt3F2tvRShXkTnWxjMpK6FRCF27q5WFL8XvHRtXWMRoBRKziTgMTAwxcXo8G5phKFT6ZuQavN5h6Zgum4Lm5wRv9rQqFwdrPjUC7reG6zsZpa7pQPB4?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>