<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 11:30:01 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@pwnedu/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Covering Tracks on Windows - Link Dump]]></title><description><![CDATA[Windows Post Exploitation - Covering Your Tracks My last link dump contained materials covering Windows Privilege Escalation. A logical next step would be to hide the evidence that you were on the system]]></description><link>http://direct.ecency.com/hacking/@pwnedu/covering-tracks-on-windows-link-dump</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@pwnedu/covering-tracks-on-windows-link-dump</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Sun, 03 Sep 2017 17:59:18 GMT</pubDate></item><item><title><![CDATA[Windows Privilege Escalation Resources]]></title><description><![CDATA[Exploits BHaFSec's Window Privilege Escalation [This is GOLD] -   DeleteExpiredTaskAfter -   Tools PowerUp - Sysinternals Suite - FolderPermissions.ps1 - www.greyhathacker.net/docs/folderperm.zip]]></description><link>http://direct.ecency.com/hacking/@pwnedu/windows-privilege-escalation-resources</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@pwnedu/windows-privilege-escalation-resources</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Mon, 07 Aug 2017 23:07:09 GMT</pubDate></item><item><title><![CDATA[Steemit Forensics with Python]]></title><description><![CDATA[About a week ago, @JacKeown posted a thread titled Steemit-Trail Conspiracy?! which discusses a large number of upvotes and high curation rewards very quickly. In the comments, we discussed the ability]]></description><link>http://direct.ecency.com/python/@pwnedu/steemit-forensics-with-python</link><guid isPermaLink="true">http://direct.ecency.com/python/@pwnedu/steemit-forensics-with-python</guid><category><![CDATA[python]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Sun, 30 Jul 2017 00:01:24 GMT</pubDate></item><item><title><![CDATA[How do you change your DNS settings in Linux/Windows?]]></title><description><![CDATA[If you did not catch my post of information security job interview questions, you might want to give it a quick glance. While the majority of questions are security oriented, it really is a helpful list]]></description><link>http://direct.ecency.com/linux/@pwnedu/how-do-you-change-your-dns-settings-in-linux-windows</link><guid isPermaLink="true">http://direct.ecency.com/linux/@pwnedu/how-do-you-change-your-dns-settings-in-linux-windows</guid><category><![CDATA[linux]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Sat, 29 Jul 2017 15:22:27 GMT</pubDate></item><item><title><![CDATA[Are open-source projects more or less secure than proprietary ones?]]></title><description><![CDATA[I just recently posted on my blog  a long list of information security job interview questions. My intentions were, and still are, to begin sharing MY answers to those questions, but before I started]]></description><link>http://direct.ecency.com/asksteemit/@pwnedu/are-open-source-projects-more-or-less-secure-than-proprietary-ones</link><guid isPermaLink="true">http://direct.ecency.com/asksteemit/@pwnedu/are-open-source-projects-more-or-less-secure-than-proprietary-ones</guid><category><![CDATA[asksteemit]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Wed, 26 Jul 2017 00:24:36 GMT</pubDate></item><item><title><![CDATA[Information Security Job Interview Questions]]></title><description><![CDATA[InfoSec Job Interview Questions. At least try to be prepared.Job interviews are always nerve wracking. When it comes to the InfoSec industry, they can be even more so. The questions can range from trick]]></description><link>http://direct.ecency.com/security/@pwnedu/information-security-job-interview-questions</link><guid isPermaLink="true">http://direct.ecency.com/security/@pwnedu/information-security-job-interview-questions</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Tue, 25 Jul 2017 22:36:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj99Ky2Uh4WcRX5h16VpJTtYbwAX7BgJehnK9KBmbdM5k1Npg95jsERgDP2XVvRVWpctteErgXAiKdezDPAuaWJ8rFozVMosEfJyVRmPjvcD1M6NXY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Conscience of a Hacker - Written on January 8, 1986]]></title><description><![CDATA[Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. But did]]></description><link>http://direct.ecency.com/hacking/@pwnedu/the-conscience-of-a-hacker-written-on-january-8-1986</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@pwnedu/the-conscience-of-a-hacker-written-on-january-8-1986</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Wed, 19 Jul 2017 15:47:54 GMT</pubDate></item><item><title><![CDATA[6 Damaging things entrly-level cybersecurity job-seekers do]]></title><description><![CDATA[We have all heard that the number of "Cyber Security" job-openings continues to outpace the number of job-seekers. While we do continue to see the number of infosec professionals growing, many are struggling]]></description><link>http://direct.ecency.com/technology/@pwnedu/6-damaging-things-entrly-level-cybersecurity-job-seekers-do</link><guid isPermaLink="true">http://direct.ecency.com/technology/@pwnedu/6-damaging-things-entrly-level-cybersecurity-job-seekers-do</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Tue, 18 Jul 2017 21:34:30 GMT</pubDate></item><item><title><![CDATA[I have decided it is time to put together a new digital playground.]]></title><description><![CDATA[The goal of this playground is to get experience playing with new techniques and methods of Network Administration Server Administration Network and System Monitoring/Security Network and System Exploitation]]></description><link>http://direct.ecency.com/hacking/@pwnedu/i-have-decided-it-is-time-to-put-together-a-new-digital-playground</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@pwnedu/i-have-decided-it-is-time-to-put-together-a-new-digital-playground</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Sun, 16 Jul 2017 18:47:00 GMT</pubDate></item><item><title><![CDATA[What is your favorite client?]]></title><description><![CDATA[Being new to steemit, I just discovered eSteem. What other clients are out there, and which is your favorite?]]></description><link>http://direct.ecency.com/steemit/@pwnedu/what-is-your-favorite-client-2017715t20156546z</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@pwnedu/what-is-your-favorite-client-2017715t20156546z</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Sun, 16 Jul 2017 01:01:57 GMT</pubDate></item><item><title><![CDATA[Linux Privilege Escelation 2016 - 2017 + Exploits]]></title><description><![CDATA[The Stack Clash - CVE-2017-1000364 Details: Exploits: solaris: obenbsd: netbsd: freebsd: freebsd: Sudo's get_process_ttyname() CVE-2017-1000367 Details: Exploit: Linux Kernel 4.8.0-41-generic (Ubuntu)]]></description><link>http://direct.ecency.com/linux/@pwnedu/linux-privellege-escelation-2016-2017-exploits</link><guid isPermaLink="true">http://direct.ecency.com/linux/@pwnedu/linux-privellege-escelation-2016-2017-exploits</guid><category><![CDATA[linux]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Sat, 15 Jul 2017 22:05:33 GMT</pubDate></item><item><title><![CDATA[Linux on Windows 10 Released]]></title><description><![CDATA[Two months ago, Microsoft announced that Ubuntu, Fedora, and Suse would be available from the Windows Store. Just a few days ago Ubuntu was the first to  become available.  Instead of a dualboot,]]></description><link>http://direct.ecency.com/linux/@pwnedu/linux-on-windows-10-released</link><guid isPermaLink="true">http://direct.ecency.com/linux/@pwnedu/linux-on-windows-10-released</guid><category><![CDATA[linux]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Sat, 15 Jul 2017 21:16:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/ChYr1cJZCH5BScxTvdLQnCYxYiSSepkyBLBj4Qag6vZ499wzHJJFhZdXNCn52hqmkBbkeUxTfvCLXWrQ2XrDzjqMd9bLqaMxw35ANifVugX2DcqHfe9JgXwseegmPU79yBpFEC2PVFts5kw1mHUEq74iV7F386iVNrwE7Tv8wfHNxGrrmGgRRT7eR2cXLS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA["No one would want to hack me. I have nothing interesting." ha.]]></title><description><![CDATA[Everyone is a target. Rarely is it personal. Most people/computers are compromised at random. The overwhelming amount of untalented cyber criminals are just moving as fast as they can to spread code written]]></description><link>http://direct.ecency.com/steemit/@pwnedu/no-one-would-want-to-hack-me-i-have-nothing-interesting-ha</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@pwnedu/no-one-would-want-to-hack-me-i-have-nothing-interesting-ha</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Sat, 15 Jul 2017 19:20:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/FxX5caie56yovX18TJf4wPjkuyEoF3zt3t24EsLevojNXtdJdEd8Ee3C9i2ZsQftiiZEz4NssmBvkudEjpNF8nqQ7g6zjZdMWPH1mj43TVXU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Top Browser Privacy Plugins for Firefox - PT 2]]></title><description><![CDATA[HTTPS Everywhere Encrypt the web! HTTPS Everywhere is a Firefox extension to protect your communications by enabling HTTPS encryption automatically on sites that are known to support it, even when you]]></description><link>http://direct.ecency.com/privacy/@pwnedu/top-browser-privacy-plugins-for-firefox-pt-2</link><guid isPermaLink="true">http://direct.ecency.com/privacy/@pwnedu/top-browser-privacy-plugins-for-firefox-pt-2</guid><category><![CDATA[privacy]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Thu, 13 Jul 2017 02:22:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVG9jrhC8xtmGXm5tZ5TZzqNSntVaYAtRpHrey4xca3PMTEcrKneGDDaCqQqNBpdnk4YudCzuY2UkTYUxSB1Xb4dqgzLMKmtSeW8oa4Bq1ch6GXgPC3?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Top Browser Privacy Plugins for Firefox - PT 1]]></title><description><![CDATA[NoScript - This tool gives you the best available protection on the web. It allows JavaScript, Java and other executable content to run only from trusted domains of your choice, e.g. your home-banking]]></description><link>http://direct.ecency.com/privacy/@pwnedu/top-browser-privacy-plugins-for-firefox-pt-1</link><guid isPermaLink="true">http://direct.ecency.com/privacy/@pwnedu/top-browser-privacy-plugins-for-firefox-pt-1</guid><category><![CDATA[privacy]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Thu, 13 Jul 2017 02:01:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjVoH1KUJNrGdMh5WmDi8RmT9xwpiAEs2jAE3qFLsjqutLniXETKtFqsb1uAS47wE9EFct3yCrTCGtFeNE2xMFF9uBHgnr8CDhumcGJ3DjZdy?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[120M Records Exposed - Largest Breach of Data in India]]></title><description><![CDATA[The records of 120 Million Reliance Jio customers were exposed online a few nights ago. A website Magicapk.com  was being hosted by an unknown third-party which allowed for anyone to search through]]></description><link>http://direct.ecency.com/cybercrime/@pwnedu/120m-records-exposed-largest-breach-of-data-in-india</link><guid isPermaLink="true">http://direct.ecency.com/cybercrime/@pwnedu/120m-records-exposed-largest-breach-of-data-in-india</guid><category><![CDATA[cybercrime]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Tue, 11 Jul 2017 01:30:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/2dk2RRM2dZ8fDZitvAu5ZBMx3tVDfwCAx4e7XSQ5afmX5rJu6p65yfJsb6nwYET72pgmdVes7WMpm22w1xiyjDCNiFyqdAEykGK4aVBfpbYRtoEiQnQiVi6K6HG3hsHtGs1oLf4WwU8Jc1ayrvoqfMnAHNiMGt9ow3Mqckz2Hk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[DataBreach - Avanti Food Kiosks Hacked]]></title><description><![CDATA[Dear Valued Customers, Avanti Markets deeply values the relationships we have with individuals who utilize kiosks supported by Avanti Markets. This notice is to make you aware of an incident which may]]></description><link>http://direct.ecency.com/cybercrime/@pwnedu/databreach-avanti-food-kiosks-hacked</link><guid isPermaLink="true">http://direct.ecency.com/cybercrime/@pwnedu/databreach-avanti-food-kiosks-hacked</guid><category><![CDATA[cybercrime]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Sun, 09 Jul 2017 21:59:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUY6AWyD6JxEpDGFUE1cEUsbBpSQcwdDzWUvTa6Rzt1yCYfPSSZw7DW5bqAkEdnADtfwnzfDYFH1B8ceFututeaWa2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Do you follow back?]]></title><description><![CDATA[Being a new Steemian, I am still trying to figure out Steem Etiquette. Out of curiosity, is it considered proper, improper, or irrelevant to follow your followers?]]></description><link>http://direct.ecency.com/steemit/@pwnedu/do-you-follow-back</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@pwnedu/do-you-follow-back</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Sun, 09 Jul 2017 21:45:06 GMT</pubDate></item><item><title><![CDATA[How do I learn How to Hack? - Hands On Cybersecurity Experience]]></title><description><![CDATA[One of the top questions I hear is "How do I learn how to hack?" The short answer: by doing. Here is a list of websites that offer free hacking/programming/cybersecurity challenges that provide]]></description><link>http://direct.ecency.com/hacking/@pwnedu/how-do-i-learn-how-to-hack-hand-s-on-cybersecurity-experience</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@pwnedu/how-do-i-learn-how-to-hack-hand-s-on-cybersecurity-experience</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Sun, 09 Jul 2017 16:32:30 GMT</pubDate></item><item><title><![CDATA[Hack All the Things]]></title><link>http://direct.ecency.com/hacking/@pwnedu/hack-all-the-things-201778t202319361z</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@pwnedu/hack-all-the-things-201778t202319361z</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[pwnedu]]></dc:creator><pubDate>Sun, 09 Jul 2017 01:23:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e4KBcCbZK3y3ySvST8bVnZT9ZoQFNsR2S8e?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>