<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 12 May 2026 07:26:37 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@salmanbadhon/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Cyber Crime (Part - 4)]]></title><description><![CDATA[Cyber Fraud and Cyber Cheating Though both the terms look similar but have some differences between them due to purpose of using. Fraud is used to define civil cases where cheating is used to describe]]></description><link>http://direct.ecency.com/writing/@salmanbadhon/cyber-crime-part-4</link><guid isPermaLink="true">http://direct.ecency.com/writing/@salmanbadhon/cyber-crime-part-4</guid><category><![CDATA[writing]]></category><dc:creator><![CDATA[salmanbadhon]]></dc:creator><pubDate>Mon, 06 Nov 2017 19:37:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXZ5WeupKvaDuQ2N5HWS8C6jcGF9TKRJD78tmdqVd8B8GRVD1xqZYZTiioj678kEP3Yvaw7XFJdC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber Crime (Part - 3)]]></title><description><![CDATA[Cyber crime on social networking sites does not fall within the category of computer as the target but widely fall under rest three. For example: pornography, hate crime falls under computer as incidental]]></description><link>http://direct.ecency.com/writing/@salmanbadhon/cyber-crime-part-3</link><guid isPermaLink="true">http://direct.ecency.com/writing/@salmanbadhon/cyber-crime-part-3</guid><category><![CDATA[writing]]></category><dc:creator><![CDATA[salmanbadhon]]></dc:creator><pubDate>Sat, 04 Nov 2017 21:45:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYSSz1GVXQXZX3aTFN5Z1ouuUXWFNZK6iJinnEb1h3tssXAPcvZaXysDmvjP1mkfz5skj5HWBNv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber Crime (Part - 2)]]></title><description><![CDATA[Reasons for Cyber Crime on Social Networking Sites Following factors are facilitating cyber crime on social networking sites:- Easy to Access: The problem encountered in guarding a computer system from]]></description><link>http://direct.ecency.com/writing/@salmanbadhon/cyber-crime-part-2</link><guid isPermaLink="true">http://direct.ecency.com/writing/@salmanbadhon/cyber-crime-part-2</guid><category><![CDATA[writing]]></category><dc:creator><![CDATA[salmanbadhon]]></dc:creator><pubDate>Fri, 03 Nov 2017 18:41:15 GMT</pubDate></item><item><title><![CDATA[Cyber Crime (Part -1)]]></title><description><![CDATA[This 21st century is all about internet technology. It’s allowing us to have all information within the shortest time. It has become a very important tool for modern human life. It has facilitated people]]></description><link>http://direct.ecency.com/writing/@salmanbadhon/6y4daz-cyber-crime-part-1</link><guid isPermaLink="true">http://direct.ecency.com/writing/@salmanbadhon/6y4daz-cyber-crime-part-1</guid><category><![CDATA[writing]]></category><dc:creator><![CDATA[salmanbadhon]]></dc:creator><pubDate>Tue, 31 Oct 2017 10:13:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/vM1pGHgNcyCiaxZmdb555hkjecmqomntNdRp7jgAqPx93vuHHbrfGevPHLAgggiUqyPwjxEDSW4Lrsw74AtFbgWgR7429a5t8WfKbE9jcMxZiDosvp8xisdftxNqpc45WPjeZa6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber Crime (Part 1)]]></title><description><![CDATA[This 21st century is all about internet technology. It’s allowing us to have all information within the shortest time. It has become a very important tool for modern human life. It has facilitated people]]></description><link>http://direct.ecency.com/w/@salmanbadhon/cyber-crime-part-1</link><guid isPermaLink="true">http://direct.ecency.com/w/@salmanbadhon/cyber-crime-part-1</guid><category><![CDATA[w]]></category><dc:creator><![CDATA[salmanbadhon]]></dc:creator><pubDate>Tue, 31 Oct 2017 09:39:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/vM1pGHgNcyCiaxZmdb555hkjecmqomntNdRp7jgAqPx93vuHHbrfGevPHLAgggiUqyPwjxEDSW4Lrsw74AtFbgWgR7429a5t8WfKbE9jcMxZiDosvp8xisdftxNqpc45WPjeZa6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[DOTA 2 - Hero Items]]></title><description><![CDATA[Must build Item for these heroes 😁 Riki - Shadow Blade Sven - Battle Fury Anti Mage - Blink Dagger Queen of Pain - Blink Dagger Troll Warlord - Basher]]></description><link>http://direct.ecency.com/game/@salmanbadhon/dota-2-hero-items</link><guid isPermaLink="true">http://direct.ecency.com/game/@salmanbadhon/dota-2-hero-items</guid><category><![CDATA[game]]></category><dc:creator><![CDATA[salmanbadhon]]></dc:creator><pubDate>Mon, 30 Oct 2017 17:14:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXZte1i6LNM5tBpBkgNook3XqZ2PmXeHbWeoLnZXMG9E7w53EmXNBrd5KicWLUgRXaNB2PFSqAZL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Power of Mind-mapping]]></title><description><![CDATA[Mind-map (Part -1) What is Mind-map? A mind-map is a diagram, which is used to visually organize information. A mind map is hierarchical and shows relationships among pieces of the whole. Guidelines to]]></description><link>http://direct.ecency.com/writing/@salmanbadhon/the-power-of-mind-mapping</link><guid isPermaLink="true">http://direct.ecency.com/writing/@salmanbadhon/the-power-of-mind-mapping</guid><category><![CDATA[writing]]></category><dc:creator><![CDATA[salmanbadhon]]></dc:creator><pubDate>Wed, 25 Oct 2017 15:57:21 GMT</pubDate></item></channel></rss>