<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sat, 09 May 2026 23:42:20 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@ritikbarnwal/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[How to give your social media security boost]]></title><description><![CDATA[➨How to give your social media security boost. Social media has become an important part of modern life for most people – one that can cause serious headaches if you’re sharing with a wider audience than]]></description><link>http://direct.ecency.com/security/@ritikbarnwal/how-to-give-your-social-media-security-boost</link><guid isPermaLink="true">http://direct.ecency.com/security/@ritikbarnwal/how-to-give-your-social-media-security-boost</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[ritikbarnwal]]></dc:creator><pubDate>Thu, 02 Aug 2018 12:10:00 GMT</pubDate></item><item><title><![CDATA[Cracking passwords]]></title><description><![CDATA[➠Cracking passwords. Social engineering The most popular low-tech method for gathering passwords is social engineering, which I cover in detail in Chapter 5. Social engineering takes advantage of the trusting]]></description><link>http://direct.ecency.com/hacking/@ritikbarnwal/cracking-passwords</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@ritikbarnwal/cracking-passwords</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[ritikbarnwal]]></dc:creator><pubDate>Sun, 29 Jul 2018 16:59:51 GMT</pubDate></item><item><title><![CDATA[How many types of hackers]]></title><description><![CDATA[➡How many types of hackers? Black Hat Hackers This category of hackers is also known as "crackers" . Hackers in this category are always tempted to gain privileges of someone(s) system without]]></description><link>http://direct.ecency.com/hacking/@ritikbarnwal/how-many-types-of-hackers</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@ritikbarnwal/how-many-types-of-hackers</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[ritikbarnwal]]></dc:creator><pubDate>Sat, 28 Jul 2018 06:17:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBM2jscGd4Sszpv94XxHH2uqxMY9z21vaqHt2tqtznvLBum3VXBuyjqNQYYUcfN21Tum3A44fnY2pCudZaFszqhLcpDBXrXjdLAuSVdyPU8W5hdD8vo55G?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What is hacking?]]></title><description><![CDATA[➡What is Hacking ? In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The]]></description><link>http://direct.ecency.com/hacking/@ritikbarnwal/what-is-hacking</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@ritikbarnwal/what-is-hacking</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[ritikbarnwal]]></dc:creator><pubDate>Sat, 28 Jul 2018 06:03:09 GMT</pubDate></item></channel></rss>