<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 15 Apr 2026 03:00:54 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@capehost/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[The New Vulnerability that Creates a Dangerous Watering Hole in Your Network]]></title><description><![CDATA[Security researchers with Vectra Threat Labs recently uncovered a critical vulnerability affecting all versions of Microsoft Windows reaching all the way back to Windows 95. The vulnerability allows an]]></description><link>http://direct.ecency.com/tech/@capehost/the-new-vulnerability-that-creates-a-dangerous-watering-hole-in-your-network</link><guid isPermaLink="true">http://direct.ecency.com/tech/@capehost/the-new-vulnerability-that-creates-a-dangerous-watering-hole-in-your-network</guid><category><![CDATA[tech]]></category><dc:creator><![CDATA[capehost]]></dc:creator><pubDate>Tue, 16 Aug 2016 08:19:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/Y2iXpNqZ2GJKo6DXu6S38T7RT4JLhdwSo13UTWWaqUrbx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Use GPU to Speed Up WPA/WPA2 Password Cracking]]></title><description><![CDATA[There are many ways to crack a WPA/WPA2 password. We all know that a GPU (Graphic Processing Unit) is way faster than a CPU in terms of computation. So, we’ll use the power of GPU to speed up WPA/WPA2]]></description><link>http://direct.ecency.com/password/@capehost/gpu-pwd-cracking</link><guid isPermaLink="true">http://direct.ecency.com/password/@capehost/gpu-pwd-cracking</guid><category><![CDATA[password]]></category><dc:creator><![CDATA[capehost]]></dc:creator><pubDate>Wed, 10 Aug 2016 21:21:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/3MxaK27PJLaXTx2giPpgDghnU6aRSvwhjSRG8w9UoCr5M18?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Avoid Detection Using Proxychains]]></title><description><![CDATA[Hi Computer Security Enthusiasts,In this tutorial, I’m going to explain how to stay anonymous and keep your internet traffic private. Before starting, you know that every hacker needs to hide his tracks.]]></description><link>http://direct.ecency.com/detection/@capehost/avoid-detection-using-proxychains</link><guid isPermaLink="true">http://direct.ecency.com/detection/@capehost/avoid-detection-using-proxychains</guid><category><![CDATA[detection]]></category><dc:creator><![CDATA[capehost]]></dc:creator><pubDate>Wed, 10 Aug 2016 06:38:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/Y2iXpNqZ2GJKnzvrhy7cxDQtuU4GqvdTwDiLr78hdvFhQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Today’s Question: What’s a Proxy Server?]]></title><description><![CDATA[Answer: A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A proxy server is associated with or part of a gateway server that separates]]></description><link>http://direct.ecency.com/techreview/@capehost/today-s-question-what-s-a-proxy-server</link><guid isPermaLink="true">http://direct.ecency.com/techreview/@capehost/today-s-question-what-s-a-proxy-server</guid><category><![CDATA[techreview]]></category><dc:creator><![CDATA[capehost]]></dc:creator><pubDate>Sat, 06 Aug 2016 09:16:33 GMT</pubDate></item><item><title><![CDATA[Today’s Question: What are Exploit Kits?]]></title><description><![CDATA[According to Wikipedia, “an exploit kit is a software kit designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it, and discovering]]></description><link>http://direct.ecency.com/exploit/@capehost/today-s-question-what-are-exploit-kits</link><guid isPermaLink="true">http://direct.ecency.com/exploit/@capehost/today-s-question-what-are-exploit-kits</guid><category><![CDATA[exploit]]></category><dc:creator><![CDATA[capehost]]></dc:creator><pubDate>Fri, 05 Aug 2016 13:40:48 GMT</pubDate></item></channel></rss>