<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sat, 11 Apr 2026 02:55:44 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@genezyz/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[[5] End User Awareness - Malicious Emails]]></title><description><![CDATA[Protecting against Malicious Emails Emailing is one of the most used means of communication. Whether it’s an enterprise or individual use, you will always be exposed to the threat of receiving emails that]]></description><link>http://direct.ecency.com/email/@genezyz/4-end-user-awareness-malicious-emails</link><guid isPermaLink="true">http://direct.ecency.com/email/@genezyz/4-end-user-awareness-malicious-emails</guid><category><![CDATA[email]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Thu, 06 Feb 2020 08:03:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UonWToSX8tGXNY8jeXKSedJ2aRhGRj6HDecqrf58BiST3ZPsSd5fUGdwMy4nfWtUvkVoajXRJfAbVbM4ktBxDvdvn4J4PvqmTqECLZCLu37L?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Multiculturalism]]></title><description><![CDATA[Multiculturalism Multiculturalism today is the reason why Asian and Peruvian medicine has healed numerous of diseased people of Malaria. It has added color and community to many places in the world, breathing]]></description><link>http://direct.ecency.com/multuculturism/@genezyz/multiculturalism</link><guid isPermaLink="true">http://direct.ecency.com/multuculturism/@genezyz/multiculturalism</guid><category><![CDATA[multuculturism]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Wed, 27 Nov 2019 11:41:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/HNWT6DgoBc14riaEeLCzGYopkqYBKxpGKqfNWfgr368M9WcueuMBv3aSY4FPysjsDPBLnaPzJGNHB5fWy49ijw9bYbVaFqPZigFqJV3tESvFHJWhJMUeN2VNyYS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[4] Blog Update 20th November 2019]]></title><description><![CDATA[Picture coming soon Good evening, Steemit, and all you geeks who are reading my blogs! Today's topic is about Scanning and Enumeration of a network (or a network of hosts)- And I promise that it's going]]></description><link>http://direct.ecency.com/online/@genezyz/4-blog-update-20th-november-2019</link><guid isPermaLink="true">http://direct.ecency.com/online/@genezyz/4-blog-update-20th-november-2019</guid><category><![CDATA[online]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Wed, 20 Nov 2019 12:20:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/vM1pGHgNcyCXUWJECrZbvn1NMPj1oFGUo3gYfF3NNPRD9ZrD2hZzWWJmCHdz8vR7MnH6K7htP9eAQXtfZiWYHSUuDVCfgG49MBRRsRWLdHTR5wDDtvRPQnoXVxYg16MG1GyJVVQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Climate Change, Environment & Commitment]]></title><description><![CDATA[We’re already seeing the effects of human-caused climate change — but nature can help us. We’re already seeing the effects of climate change, but thankfully, we’re equipped with the most effective tool]]></description><link>http://direct.ecency.com/climatechange/@genezyz/climate-change-encironment-and-commitment</link><guid isPermaLink="true">http://direct.ecency.com/climatechange/@genezyz/climate-change-encironment-and-commitment</guid><category><![CDATA[climatechange]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Wed, 20 Nov 2019 10:50:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iNvE9npCcQeXBKRtWZL1i7CBU7BEMAWDa6GQYxtBFn8hXg7dp1F6DJgHR2hmy4DKNQrijeTYXRg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[3] Blog Update 11th November 2019]]></title><description><![CDATA[Hey Everyone I know it's been long since last time, and I'm sorry about that, but here comes new and juicy information about what has happened so far! :D So recently I had an Information Technology exam]]></description><link>http://direct.ecency.com/css/@genezyz/3-blog-update-11th-november-2019</link><guid isPermaLink="true">http://direct.ecency.com/css/@genezyz/3-blog-update-11th-november-2019</guid><category><![CDATA[css]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Mon, 11 Nov 2019 21:13:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvRHdo5bjDLueanX6ZhkzuLK3azrwd1ymd7y6KpvF8uhD81ihPmzjXxVcQqyPXYg1v6EjyM2m5nYdriK8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Overpopulation vs No Plan Bee]]></title><description><![CDATA[Overpopulation vs No Plan Bee You may think that taking in refugees or migration groups will overflow your own country, but that’s not the real enemy. Overpopulation all over the world is a topic that]]></description><link>http://direct.ecency.com/politics/@genezyz/overpopulation-vs-no-plan-bee</link><guid isPermaLink="true">http://direct.ecency.com/politics/@genezyz/overpopulation-vs-no-plan-bee</guid><category><![CDATA[politics]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Wed, 16 Oct 2019 09:42:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPEoRXJxposG1T2DqVXhAvpVJziwF9bYRbhFCemitR355dAVfeQZD5EYB9b2mXpEJsAqkx9rYk6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[About me, the writer behind these technical articles]]></title><link>http://direct.ecency.com/steemit/@genezyz/about-me-the-writer-behind-these-technical-articles</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@genezyz/about-me-the-writer-behind-these-technical-articles</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Wed, 18 Sep 2019 09:15:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/HNWT6DgoBc14riaEeLCzGYopkqYBKxpGKqfNWfgr368M9WiQctsWR7TYnEd3Kg9ZDiXFzXL6n83ZGufxBL7AfEapvwbk6DAT3LAcp9sTkBPyyM1CWSqthYnaUpW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[4] End User Awareness - Social Engineering]]></title><description><![CDATA[Protecting Against Social Engineering Social Engineering may present the greatest threat to confidentiality today, which is why it’s important to understand not all threats are technical attacks. Simply]]></description><link>http://direct.ecency.com/cybersecurity/@genezyz/4-end-user-awareness-social-engineering</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@genezyz/4-end-user-awareness-social-engineering</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Tue, 17 Sep 2019 18:19:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UonWToSX8tGXNY8jeXKSedJ2aRhGRj6HDecqrf58BiST3ZPsSd5fUGdwMy4nfWtUvkVoajXRJfAbVbM4ktBxDvdvn4J4PvqmTqECLZCLu37L?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[3] End User Awareness - Protecting Identities]]></title><description><![CDATA[Protecting your Identity Identity theft online is more common than you would believe. Take for instance a celebrity’s Instagram account, which most likely has been copied over a dozen times. Identities]]></description><link>http://direct.ecency.com/cybersecurity/@genezyz/3-end-user-awareness-protecting-identities</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@genezyz/3-end-user-awareness-protecting-identities</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Tue, 17 Sep 2019 17:44:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UonWToSX8tGXNY8jeXKSedJ2aRhGRj6HDecqrf58BiST3ZPsSd5fUGdwMy4nfWtUvkVoajXRJfAbVbM4ktBxDvdvn4J4PvqmTqECLZCLu37L?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[2] End User Awareness - Protecting Networks]]></title><description><![CDATA[Protecting Networks Network attacks are the most common technical threat to a network. Even if we keep our data safe on our computer, it may still be possible for an attacker to get ahold of our data while]]></description><link>http://direct.ecency.com/cybersecurity/@genezyz/2-end-user-awareness-protecting-networks</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@genezyz/2-end-user-awareness-protecting-networks</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Mon, 16 Sep 2019 17:01:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UonWToSX8tGXNY8jeXKSedJ2aRhGRj6HDecqrf58BiST3ZPsSd5fUGdwMy4nfWtUvkVoajXRJfAbVbM4ktBxDvdvn4J4PvqmTqECLZCLu37L?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[1] End User Awareness - Protecting the Physical]]></title><description><![CDATA[Protecting the Physical As we go on with our lives, we keep thinking of secure passwords, usernames, and logins- but we forget the physical part of it all. In this course, I will go through the different]]></description><link>http://direct.ecency.com/cybersecurity/@genezyz/1-end-user-awareness-protecting-the-physical</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@genezyz/1-end-user-awareness-protecting-the-physical</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Mon, 16 Sep 2019 14:44:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UonWToSX8tGXNY8jeXKSedJ2aRhGRj6HDecqrf58BiST3ZPsSd5fUGdwMy4nfWtUvkVoajXRJfAbVbM4ktBxDvdvn4J4PvqmTqECLZCLu37L?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[2] Blog Update 15th September 2019]]></title><description><![CDATA[Good morning Steemit! I’m happy to see that I’m getting recognition for the things I’m doing on here. I haven’t done huge projects, nor do I have a huge following, but I only care for progress! Thank you]]></description><link>http://direct.ecency.com/blog/@genezyz/2-blog-update-15th-september-2019</link><guid isPermaLink="true">http://direct.ecency.com/blog/@genezyz/2-blog-update-15th-september-2019</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Sun, 15 Sep 2019 17:43:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPZ77E57KFgMTsm3ZqkgayRSE7cm1DRazMPEVqCNHKH2zEeUPQyyB317uccbFyLTQMTighCE92N?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[1] Blog Update 7th September 2019]]></title><description><![CDATA[Hello everyone on Steemit! This is my first blog entry where I will be embarking on a self-development journey. I am currently working on various projects such as: Back-end development for a website Reaching]]></description><link>http://direct.ecency.com/blog/@genezyz/1-blog-update-7th-september-2019</link><guid isPermaLink="true">http://direct.ecency.com/blog/@genezyz/1-blog-update-7th-september-2019</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Sat, 07 Sep 2019 12:04:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgaV8qiFU89taP2MgKXzwntUGAvkoQiKU7VxyD37q9Dx4zzng6oLnjRBTppZ5zxWEFpGCb1NQGBps3aZcSzx4QW8v5UrTaXkfJvkodWtxtLzaXpZpEoJ1c?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What happens to Cyber Security with Artificial Intelligence in the future]]></title><description><![CDATA[When hearing «Artificial Intelligence» we think of complex systems taking form as robots or evil human-machines. While some of those ideas may come to fruition at some point, what will happen between the]]></description><link>http://direct.ecency.com/artificialintelligence/@genezyz/what-happens-to-cyber-security-with-artificial-intelligence-in-the-future</link><guid isPermaLink="true">http://direct.ecency.com/artificialintelligence/@genezyz/what-happens-to-cyber-security-with-artificial-intelligence-in-the-future</guid><category><![CDATA[artificialintelligence]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Fri, 06 Sep 2019 13:11:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPKKKXGJNYEn1bD68Z1PDbaE48TG2M9daYHJfBmn1FY2YpFMgwKPNaqNmVrTibkGYFfDhPWEXtA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Online Security]]></title><description><![CDATA[Understanding the internet To make something safe and secure, one needs to be aware of the threats. It’s difficult to know what to embrace yourself against if you don’t know the threats in the first place.]]></description><link>http://direct.ecency.com/online/@genezyz/online-security</link><guid isPermaLink="true">http://direct.ecency.com/online/@genezyz/online-security</guid><category><![CDATA[online]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Fri, 06 Sep 2019 09:24:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPEsjehT6jT3ueiMDYzFtQ4cXNkda8r6xMJjhbBP5QnNiU9Vt8iqcyB74oFn2wxqkY8g2q9nErr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Information Technology- Why choose it?]]></title><description><![CDATA[Information Technology- Why choose it? The Fourth Industrial Revolution (4IR) is the new wave of technology. From the very beginning back in the 18th centuries in Europe America, all the way to 2019 where]]></description><link>http://direct.ecency.com/it/@genezyz/information-technology-why-choose-it</link><guid isPermaLink="true">http://direct.ecency.com/it/@genezyz/information-technology-why-choose-it</guid><category><![CDATA[it]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Fri, 30 Aug 2019 07:26:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBM2jscGd4Sszpv94XxHH2uqxMY9z21vaqHt5C4PWZe719aFWTmoWwrNgsZuy3KYHHC3DbU5s5oWNKWYSRchgD3ob1RPrd9E7hyVzvf6heW7tMgf3L3av2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Digital footprints, publicity, and online choices]]></title><description><![CDATA[In today’s society, there are millions of people who utilize tools online to get to know others all around the globe. This includes voice calling, video chatting, texting, sharing posts and other fun things]]></description><link>http://direct.ecency.com/steempress/@genezyz/digital-footprints-publicity-and-online-choices</link><guid isPermaLink="true">http://direct.ecency.com/steempress/@genezyz/digital-footprints-publicity-and-online-choices</guid><category><![CDATA[steempress]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Thu, 08 Aug 2019 11:13:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/3jpR3paJ37V8JxyWvtbhvcm5k3roJwHBR4WTALx7XaoRovRK2nQUCmhf6B97782QxQSQvGXAxo1gE4keAuQmVbYxtcqVvEEGZa95u7QNaKQd8MynUSr33pBXa8sA6ah5neZwL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hello Steemit!]]></title><description><![CDATA[Hello Everyone! My name is Genezyz and I'm a passionate tech enthusiast. My goal in life is to be a cybersecurity professional and to have fun building technology from the very bottom. I love spending]]></description><link>http://direct.ecency.com/steemit/@genezyz/hello-steemit</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@genezyz/hello-steemit</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[genezyz]]></dc:creator><pubDate>Thu, 08 Aug 2019 10:56:36 GMT</pubDate></item></channel></rss>