<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sat, 11 Apr 2026 19:33:59 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@sh4rk/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[All You Need To Know About Passwords]]></title><description><![CDATA[Choosing and managing passwords is the fundamental security measure in client’s control. Even if the application and it’s server is impenetrable, it means absolutely nothing if your password can be cracked]]></description><link>http://direct.ecency.com/security/@sh4rk/all-you-need-to-know-about-passwords</link><guid isPermaLink="true">http://direct.ecency.com/security/@sh4rk/all-you-need-to-know-about-passwords</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[sh4rk]]></dc:creator><pubDate>Fri, 28 Jul 2017 13:46:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/FxX5caie56yrFjfYiaNGeRXzz38zY1VcqP2QepePHXqSCecAWuwN1Zcq8i5kpt3ChfyXZbTJ4yKpetpB2v6qL5UbeUbQ649J4MEsL1aPzh74?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Single Computer DoS - Slow Loris attack]]></title><description><![CDATA[Usually, hackers use a lot of computers (or toasters) to take down a server by overwhelming it with traffic. However, the same goal can sometimes be achieved with a single computer. In this article, I’m]]></description><link>http://direct.ecency.com/hacking/@sh4rk/single-computer-dos-slow-loris-attack</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@sh4rk/single-computer-dos-slow-loris-attack</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[sh4rk]]></dc:creator><pubDate>Wed, 26 Jul 2017 11:05:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvZzmfd7vsfLJmFi4W5j2a4WygU4vjt8VnWg3oi3tVNy5vMvaDEBGXmXtnSMDYc3hAxsrGBQQHxGdqhGj1Z693dVtj4c8JxEUmSaSA5c?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Abusing Bitcoin Blockchain for Fun and Profit]]></title><description><![CDATA[Hackers don’t stop at ‘What is it used for?’ but always extend their curiosity to ‘What it can be used for?’ and that’s part of what differentiates hacker’s mindset from many others. With that in mind,]]></description><link>http://direct.ecency.com/cryptocurrency/@sh4rk/abusing-bitcoin-blockchain-for-fun-and-profit</link><guid isPermaLink="true">http://direct.ecency.com/cryptocurrency/@sh4rk/abusing-bitcoin-blockchain-for-fun-and-profit</guid><category><![CDATA[cryptocurrency]]></category><dc:creator><![CDATA[sh4rk]]></dc:creator><pubDate>Tue, 11 Jul 2017 15:51:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYXer7jHqRs3TJUfBeScghu2Qi4LDHsaijeHt775LGk5yCiBMyUp8WPjqsYLMuSBqZbmFWaMsen?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Fundamental security flaws in USB]]></title><description><![CDATA[USB or Universal Serial Bus was not designed with security in mind. Windows, Linux and OS X basically trust anything plugged in USB port. If a hacker has a very short, but private time with your laptop,]]></description><link>http://direct.ecency.com/hacking/@sh4rk/fundamental-security-flaws-in-usb</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@sh4rk/fundamental-security-flaws-in-usb</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[sh4rk]]></dc:creator><pubDate>Mon, 10 Jul 2017 14:35:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/MG5aEqKFcQiBEm1Jrh9Uz8WEfnvrsEE1UNKu3JjyDcJaTYJEDdk3x9Qd2uURWt2n4MYtSXj2Rz6eUVVHjT99NtgXKxS3mzShk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[H1, 7h3Я3]]></title><description><![CDATA[Roaming the world wide web brought me to this place. Internet knows me as computer security enthusiast, researcher and author about the topic on My brain's favorite foods are hacking, programming, computer]]></description><link>http://direct.ecency.com/introduceyourself/@sh4rk/h1-7h3ya3</link><guid isPermaLink="true">http://direct.ecency.com/introduceyourself/@sh4rk/h1-7h3ya3</guid><category><![CDATA[introduceyourself]]></category><dc:creator><![CDATA[sh4rk]]></dc:creator><pubDate>Sat, 08 Jul 2017 13:10:09 GMT</pubDate></item></channel></rss>