<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 09 Apr 2026 12:17:24 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@mrhacker1024/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Crypto Markets Placid on 10th Anniversary of Bitcoin Whitepaper]]></title><description><![CDATA[Wednesday, Oct. 31: after a couple of days of mild losses, crypto markets have today stabilized, with most of the top twenty cryptocurrencies by market cap seeing slight fluctuations capped within a 2]]></description><link>http://direct.ecency.com/crypto/@mrhacker1024/crypto-markets-placid-on-10th-anniversary-of-bitcoin-whitepaper</link><guid isPermaLink="true">http://direct.ecency.com/crypto/@mrhacker1024/crypto-markets-placid-on-10th-anniversary-of-bitcoin-whitepaper</guid><category><![CDATA[crypto]]></category><dc:creator><![CDATA[mrhacker1024]]></dc:creator><pubDate>Fri, 02 Nov 2018 09:52:00 GMT</pubDate></item><item><title><![CDATA[Ripple Grapples With Its $21 Billion 'Gorilla': Crypto Asset Adoption]]></title><description><![CDATA[The organizers of Ripple's two-day Swell conference in San Francisco didn't beat around the bush when they named the final panel of the event "The 800-Pound Gorilla." The question of crypto asset]]></description><link>http://direct.ecency.com/xrp/@mrhacker1024/ripple-grapples-with-its-usd21-billion-gorilla-crypto-asset-adoption</link><guid isPermaLink="true">http://direct.ecency.com/xrp/@mrhacker1024/ripple-grapples-with-its-usd21-billion-gorilla-crypto-asset-adoption</guid><category><![CDATA[xrp]]></category><dc:creator><![CDATA[mrhacker1024]]></dc:creator><pubDate>Thu, 04 Oct 2018 08:52:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/2Snpznz7rwiEdJnR5TARASXq1nvxiHdLUMJ7vEsNzcUgVjrwDVXWp99p2m9Dkh4FwcLoJ3jiVREJ1NTqLf1PtJoRTPfZaTXRPCLgLtH12KJdonVJpj1MUQp8RjzbL23sfxUjyeb3sV2F3bWCmchPvTzpufJZ6uwyHx2HbdwN8rX6As4dm6dwwHTDLbKTb4H3sizJ1XTqG71aGesMRwk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Password Brute Force Attacks Threaten Millions of App Users]]></title><description><![CDATA[In September of 2014, private photos of a number of celebrities, including Kate Upton and Jennifer Lawrence, were leaked onto the image-based bulletin board 4chan. It was soon discovered that this leak]]></description><link>http://direct.ecency.com/hack/@mrhacker1024/password-brute-force-attacks-threaten-millions-of-app-users</link><guid isPermaLink="true">http://direct.ecency.com/hack/@mrhacker1024/password-brute-force-attacks-threaten-millions-of-app-users</guid><category><![CDATA[hack]]></category><dc:creator><![CDATA[mrhacker1024]]></dc:creator><pubDate>Sun, 23 Sep 2018 08:20:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/NTy4GV6ooFRkjTArCrebYc2WCCmX2KY4SfTbUDpHWg6ZYFAEQSFSorw5FdJBpivUVJCX3voAP2e26xMXMVPRyV6KgXfhovsizWgqT6NnE5yeDK9gfSdJmcuA5qh2QF5PUJTDTUHyMmf7Jyp3966n3RkfKQy3Fiq5FAgoHPQS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Here's everything we think we know about the OnePlus 6T Share on Facebook  Share on Twitter]]></title><description><![CDATA[Once upon a time ago, OnePlus used to release one flagship phone a year. But as the company has grown, it's moved to two. In 2016, we got the OnePlus 3 and then the 3T. Then in 2017, the OnePlus 5 and]]></description><link>http://direct.ecency.com/oneplus6/@mrhacker1024/here-s-everything-we-think-we-know-about-the-oneplus-6t-share-on-facebook-share-on-twitter</link><guid isPermaLink="true">http://direct.ecency.com/oneplus6/@mrhacker1024/here-s-everything-we-think-we-know-about-the-oneplus-6t-share-on-facebook-share-on-twitter</guid><category><![CDATA[oneplus6]]></category><dc:creator><![CDATA[mrhacker1024]]></dc:creator><pubDate>Sat, 22 Sep 2018 11:30:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/KNoz79cGRt58XHcjM3shjWsSEtKgRtxoVdChppmw4FvW2ErnN15yL2Pb4bxiAo29SoG3hYoSCW922HKxdwr6b3kKJdYXc9ExDoNALzZ9g6KbmCt1FCC1z1ZJrbEfh2RTi2nKQ8L8ezF9nu2hPwXncnVtH5XNZE55j5F8YRhquzFx7hQJ8Aa8opuNPv8mF71kaL9YaXWpEFEFgGoznWYHhkGog6cTBDgo4UYuWLhbmhsKRz4Nc5NVJXbTW2QWtXi9GL5Zi5NN2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What is blockchain? The most disruptive tech in decades]]></title><description><![CDATA[The distributed ledger technology, better known as blockchain, has the potential to eliminate huge amounts of record-keeping, save money and disrupt IT in ways not seen since the internet arrived. Blockchain]]></description><link>http://direct.ecency.com/bloackchain/@mrhacker1024/what-is-blockchain-the-most-disruptive-tech-in-decades</link><guid isPermaLink="true">http://direct.ecency.com/bloackchain/@mrhacker1024/what-is-blockchain-the-most-disruptive-tech-in-decades</guid><category><![CDATA[bloackchain]]></category><dc:creator><![CDATA[mrhacker1024]]></dc:creator><pubDate>Sat, 22 Sep 2018 08:53:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/2VZXybTSZJq1AreaDn1D7Jp7ZEvgLC9TvJctofX1ChMgSZzZvVGgNWixZg6e3RUYRjUJHgzbPYFP9Wer1ixkpNk2ukZoGSdGmccDEmjFmNiZE7Xt4xeRpF5oha7CrkH1y7AdtK8cf5ezB6oFJtUpHZKGHd8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Internet of Things (IoT)]]></title><description><![CDATA[The Internet of Things is the concept of everyday objects – from industrial machines to wearable devices – using built-in sensors to gather data and take action on that data across a network. So it’s a]]></description><link>http://direct.ecency.com/iot/@mrhacker1024/internet-of-things-iot</link><guid isPermaLink="true">http://direct.ecency.com/iot/@mrhacker1024/internet-of-things-iot</guid><category><![CDATA[iot]]></category><dc:creator><![CDATA[mrhacker1024]]></dc:creator><pubDate>Mon, 17 Sep 2018 10:11:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UonWToSX8tGXNY8jeXKSedJ2aRhGRj6HDecqrf4uB7rsqn46ZGfVod792MrkqB8CuYJdiaND9uXNtjgKPymtpMRioycDFvyyLYZvELW2ohPk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Healthy Eating!!]]></title><description><![CDATA[( Healthy eating is not about strict dietary limitations, staying unrealistically thin, or depriving yourself of the foods you love. Rather, it’s about feeling great, having more energy, improving your]]></description><link>http://direct.ecency.com/food/@mrhacker1024/healthy-eating</link><guid isPermaLink="true">http://direct.ecency.com/food/@mrhacker1024/healthy-eating</guid><category><![CDATA[food]]></category><dc:creator><![CDATA[mrhacker1024]]></dc:creator><pubDate>Mon, 17 Sep 2018 08:24:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQGSozHybMBgAxSJzwCaWdBGJ3XNq83jrd5FVL71Y7up83YEYMxyt23HyNQd1mWkMXD5YJpWwE6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[MS Office Built-In Feature Could be Exploited to Create Self-Replicating Malware]]></title><description><![CDATA[Earlier this month a cybersecurity researcher shared details of a security loophole with The Hacker News that affects all versions of Microsoft Office, allowing malicious actors to create and spread]]></description><link>http://direct.ecency.com/word/@mrhacker1024/ms-office-built-in-feature-could-be-exploited-to-create-self-replicating-malware</link><guid isPermaLink="true">http://direct.ecency.com/word/@mrhacker1024/ms-office-built-in-feature-could-be-exploited-to-create-self-replicating-malware</guid><category><![CDATA[word]]></category><dc:creator><![CDATA[mrhacker1024]]></dc:creator><pubDate>Mon, 27 Nov 2017 09:01:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJb4ARrxQxCjX4jizub4U5CAK3WwB89vZkS7GFei3nBxn64F8fDGRE1BwFG1W1TV4pTDuKYHHdJ1qZTvBHsifJtppNteztSiwxgjCpBmHx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What is cryptocurrency??? 21st-century unicorn – or the money of the future?]]></title><description><![CDATA[This introduction explains the most important thing about cryptocurrencies. After you‘ve read it, you‘ll know more about it than most other humans. Today cryptocurrencies have become a global phenomenon]]></description><link>http://direct.ecency.com/currency/@mrhacker1024/what-is-cryptocurrency-21st-century-unicorn-or-the-money-of-the-future</link><guid isPermaLink="true">http://direct.ecency.com/currency/@mrhacker1024/what-is-cryptocurrency-21st-century-unicorn-or-the-money-of-the-future</guid><category><![CDATA[currency]]></category><dc:creator><![CDATA[mrhacker1024]]></dc:creator><pubDate>Mon, 27 Nov 2017 08:52:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UondJxcjVaienfhVaNb7LJVWG6e787gaQq47Z772zAyoeSPpdNDT4djgtj6f5o8VnstnUbxN6B4BPekjffKsujMNXe3rxmB6XLRv8fvuE9ka?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[2. Ethical Hacking − Hacker Types]]></title><description><![CDATA[Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where]]></description><link>http://direct.ecency.com/ethical/@mrhacker1024/2-ethical-hacking-hacker-types</link><guid isPermaLink="true">http://direct.ecency.com/ethical/@mrhacker1024/2-ethical-hacking-hacker-types</guid><category><![CDATA[ethical]]></category><dc:creator><![CDATA[mrhacker1024]]></dc:creator><pubDate>Wed, 25 Oct 2017 20:00:15 GMT</pubDate></item><item><title><![CDATA[1. Ethical Hacking − Overview]]></title><description><![CDATA[Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and]]></description><link>http://direct.ecency.com/ethical/@mrhacker1024/1-ethical-hacking-overview</link><guid isPermaLink="true">http://direct.ecency.com/ethical/@mrhacker1024/1-ethical-hacking-overview</guid><category><![CDATA[ethical]]></category><dc:creator><![CDATA[mrhacker1024]]></dc:creator><pubDate>Wed, 25 Oct 2017 18:57:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/3RTd4iuWD6NV447XiVuNoLZ3Pja62GzP4N1PRsXzgBE7uHYRR6AfsNjVSfcmokVe3aHwGPN4jJ4fLmvJaaZ1nVbrQgCpDW45m65f8fx8bG76xqa7CCDyLFYxa88aW3ERWGDDWpyky9JgL9uBh4ttidGWV2ujfBxXaNzcHbHoZpZdq8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How technology is changing disaster relief.]]></title><description><![CDATA[Consider the efforts of the United Kingdom’s Royal Air Force in distributing to refugees in Northern Iraq the following: water; food; and the technology needed to communicate -- power for mobile phones.]]></description><link>http://direct.ecency.com/tecnology/@mrhacker1024/how-technology-is-changing-disaster-relief</link><guid isPermaLink="true">http://direct.ecency.com/tecnology/@mrhacker1024/how-technology-is-changing-disaster-relief</guid><category><![CDATA[tecnology]]></category><dc:creator><![CDATA[mrhacker1024]]></dc:creator><pubDate>Wed, 25 Oct 2017 18:43:09 GMT</pubDate></item></channel></rss>