<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sat, 11 Apr 2026 23:50:58 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@stellarlibrarian/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Ways to Ensure Browser Privacy and Security]]></title><description><![CDATA[image from pexels.com Have you ever wondered how much of a threat your regular internet browser could be to your data privacy and security? When worrying about your apps that could get hacked, we won’t]]></description><link>http://direct.ecency.com/cybersecurity/@stellarlibrarian/waystoensurebrowserprivacyandsecurity-srteyypsre6vdy11fppl</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@stellarlibrarian/waystoensurebrowserprivacyandsecurity-srteyypsre6vdy11fppl</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Tue, 26 Jan 2021 10:31:21 GMT</pubDate></item><item><title><![CDATA[McIntyre Iron Furnace Ruins]]></title><description><![CDATA[The McIntyre Iron Furnace is an old steel blast furnace that operated from 1827 to 1857 by the Adirondack Iron Works company. It is located on Upper Works Road in Newcomb, NY, just south of New York's]]></description><link>http://direct.ecency.com/abandoned/@stellarlibrarian/mcintyreironfurnaceruins-gu7j6n2wenesbq9ocni3</link><guid isPermaLink="true">http://direct.ecency.com/abandoned/@stellarlibrarian/mcintyreironfurnaceruins-gu7j6n2wenesbq9ocni3</guid><category><![CDATA[abandoned]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Sat, 28 Nov 2020 03:00:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/hgjbks2vRxvmw5J4X5kJXfq6xz6TfosA8thxfKwafurpAsLop4QKbM48Cr4xW9Hh1mSchZWXjpgggtUxCtCHHzch26?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The White Mountain Streams]]></title><description><![CDATA[Fresh mountain water flows through soil, stone, and earth, falling with the lands to the vast waters of the ocean. While the streams remain small, there is a lot to be captured. The water flows no matter]]></description><link>http://direct.ecency.com/longexposures/@stellarlibrarian/thewhitemountainstreams-6aan0tenbjmlcxf2uasb</link><guid isPermaLink="true">http://direct.ecency.com/longexposures/@stellarlibrarian/thewhitemountainstreams-6aan0tenbjmlcxf2uasb</guid><category><![CDATA[longexposures]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Fri, 27 Nov 2020 23:03:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrVF5LcHfbHXjBLP3WXByRwsJ7rJs5DyCoR1BhnVP1ZeyonnudjroY3qLX4LUVixsrFPoVhNoNJizanfmNgXrnwgkoQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Flashing Lights]]></title><description><![CDATA[Lights in the house, lights in the city, lights in the sky. But none are as bright as these crazy lights. So many lights to break through the darkness.]]></description><link>http://direct.ecency.com/colorful/@stellarlibrarian/flashinglights-ljdnhmfqepmv3aglj6qo</link><guid isPermaLink="true">http://direct.ecency.com/colorful/@stellarlibrarian/flashinglights-ljdnhmfqepmv3aglj6qo</guid><category><![CDATA[colorful]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Fri, 27 Nov 2020 06:23:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/hgjbks2vRxvmw5J4X5kJXfq6xz6TfosA8thxfKwafurpAsLop4QKbM48Cr4xW9Hh1mSchZWXjpn8cUX8o1b3sWS2bQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[New England City Night]]></title><link>http://direct.ecency.com/astronomy/@stellarlibrarian/uywnbjwl3xu4qdi7bg7b</link><guid isPermaLink="true">http://direct.ecency.com/astronomy/@stellarlibrarian/uywnbjwl3xu4qdi7bg7b</guid><category><![CDATA[astronomy]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Fri, 27 Nov 2020 05:36:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57su5jXNdkjNdvkpAJZvcWH4TzYMAozuNRhpJ5nfVMnyeLDKB1DcmrGTnNugE1vBj2KYmaNsumPY5sVQ37JWg7x?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Tunnel]]></title><description><![CDATA[In the middle of the city, under the highway, is the long tunnel leading down town. Deep at night this tunnel goes quiet, leaving mysterious lights floating about. This project was for New Hampshire Institute]]></description><link>http://direct.ecency.com/city/@stellarlibrarian/thetunnel-hjeee9hf54m9lxtdlyy3</link><guid isPermaLink="true">http://direct.ecency.com/city/@stellarlibrarian/thetunnel-hjeee9hf54m9lxtdlyy3</guid><category><![CDATA[city]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Fri, 27 Nov 2020 05:20:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UonZ32EJw6nMctrTQ6kTQ3swaDmbMFthWkNK3n3cvGhZfex3EYPo3TD7oZKaA13wfZWfDEQQFhHE2WyLvJ6HiLTirvzKAoepTBdLMHrcCUce?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[4 Tips to Protect yourself from Malware in the COVID Era]]></title><description><![CDATA[The COVID-19 pandemic took the world by storm and has drastically changed how we do things. With more people now forced to work from home, the world is now facing a rise in a new crop of problems. One]]></description><link>http://direct.ecency.com/cybersecurity/@stellarlibrarian/4tipstoprotectyourselffrommalwareinthecovidera-a3pms9r92k77gj496cmo</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@stellarlibrarian/4tipstoprotectyourselffrommalwareinthecovidera-a3pms9r92k77gj496cmo</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 16 Nov 2020 13:57:27 GMT</pubDate></item><item><title><![CDATA[Cybersecurity for Cryptocurrencies: Top Tips to Get You Going]]></title><description><![CDATA[Image from Pixabay.com Cryptocurrencies are a more secure way of transacting money but the anonymity behind their protocols has made it a hotbed for hackers and scammers. Most of the coins on the crypto]]></description><link>http://direct.ecency.com/blockchain/@stellarlibrarian/cybersecurityforcryptocurrenciestoptipstogetyougoing-pmdqw3iuruh1giajdisy</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@stellarlibrarian/cybersecurityforcryptocurrenciestoptipstogetyougoing-pmdqw3iuruh1giajdisy</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 02 Nov 2020 22:07:03 GMT</pubDate></item><item><title><![CDATA[4 Reasons Cyber Security is a Key Concern for Everyone]]></title><description><![CDATA[You’ll agree with me that the internet plays a crucial role in the lives of many people. It has become so powerful that it somehow impacts those who do not use it at all. Mailing, shopping, communicating,]]></description><link>http://direct.ecency.com/cyberdefense/@stellarlibrarian/4reasonscybersecurityisakeyconcernforeveryone-a5w0kzgods2m754jpxj7</link><guid isPermaLink="true">http://direct.ecency.com/cyberdefense/@stellarlibrarian/4reasonscybersecurityisakeyconcernforeveryone-a5w0kzgods2m754jpxj7</guid><category><![CDATA[cyberdefense]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 19 Oct 2020 17:21:45 GMT</pubDate></item><item><title><![CDATA[Cheap Tech - Why your privacy is at risk, and how to see private (public) web cams.]]></title><description><![CDATA[Introduction Everything has its pros and cons, before deciding something, we have to go through its pros and cons to make a valuable decision. If we neglect the pros and cons of a product we are going]]></description><link>http://direct.ecency.com/cybersecurity/@stellarlibrarian/cheaptech-whyyourprivacyisatriskandhowtoseeprivatepublicwebcams-3r3g30cx5v</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@stellarlibrarian/cheaptech-whyyourprivacyisatriskandhowtoseeprivatepublicwebcams-3r3g30cx5v</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 05 Oct 2020 14:57:24 GMT</pubDate></item><item><title><![CDATA[Open-source intelligence tools - Stay private and get informed]]></title><description><![CDATA[Introduction What does your neighbor do for a living? Was that guy that cut you off on the high way a criminal? Who was emailing me spam? Open-source intelligence means collecting information through various]]></description><link>http://direct.ecency.com/cyberinvestigations/@stellarlibrarian/open-sourceintelligencetools-stayprivateandgetinformed-30thcofapx</link><guid isPermaLink="true">http://direct.ecency.com/cyberinvestigations/@stellarlibrarian/open-sourceintelligencetools-stayprivateandgetinformed-30thcofapx</guid><category><![CDATA[cyberinvestigations]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 28 Sep 2020 12:02:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/3HaJVw3AYyXBGbqsDtBRQGnXHKRxG5fapeSc5jnmdp1eb8Fv6pVyc1are71jCJVvmWpYXBUbBNwwoxcFNEDDKfMdWc2GdkZ2gz7vKLA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Understanding Virtual Marketing - How to be seen.]]></title><description><![CDATA[Introduction Marketing is advertising publicity and sales technique. Once you start a business, now the next step is to tell people your services' robust marketing approach leads to good profit. Marketing]]></description><link>http://direct.ecency.com/guide/@stellarlibrarian/understandingvirtualmarketing-howtobeseen-s45w9qerhy</link><guid isPermaLink="true">http://direct.ecency.com/guide/@stellarlibrarian/understandingvirtualmarketing-howtobeseen-s45w9qerhy</guid><category><![CDATA[guide]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 14 Sep 2020 14:18:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/B69zEhWZA8UCKrngfrtzhifvf2M8uZbJHJG1qus21UVrud2qNgetqXaS6mYDEtEgKUcr8DEmrosWvGSaQhJuPNJ49fac1DENSVM3HfeE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What are Crypto Coins? Bananas? Fake money?]]></title><description><![CDATA[Introduction Technology can be hacked, bitcoin is for scams, and virtual money is just virtual money, right? Not necessarily. A cryptocurrency is a form of digital currency that uses the concept of]]></description><link>http://direct.ecency.com/crypto/@stellarlibrarian/whatarecryptocoinsbananasfakemoney-f3qhktsgbz</link><guid isPermaLink="true">http://direct.ecency.com/crypto/@stellarlibrarian/whatarecryptocoinsbananasfakemoney-f3qhktsgbz</guid><category><![CDATA[crypto]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Tue, 08 Sep 2020 11:32:24 GMT</pubDate></item><item><title><![CDATA[Cloud Security Basics]]></title><description><![CDATA[Cloud security, comprises of a lot of strategies, controls, methodology, and advancements that work together to ensure cloud-based frameworks, information, and foundation. These security measures are designed]]></description><link>http://direct.ecency.com/cloud/@stellarlibrarian/cloudsecuritybasics-4qzdfshtsr</link><guid isPermaLink="true">http://direct.ecency.com/cloud/@stellarlibrarian/cloudsecuritybasics-4qzdfshtsr</guid><category><![CDATA[cloud]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Tue, 08 Sep 2020 10:21:39 GMT</pubDate></item><item><title><![CDATA[What is Cryptocurrency?]]></title><description><![CDATA[Introduction Cryptocurrency is a simple, common name that refers to all (while not having one principal place of command) cryptocurrencies like Bitcoin, Ethereum, and many others. Cryptocurrency makes]]></description><link>http://direct.ecency.com/blockchain/@stellarlibrarian/whatiscryptocurrency-ijsp79tuec</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@stellarlibrarian/whatiscryptocurrency-ijsp79tuec</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 24 Aug 2020 13:31:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/B69zEhWZA8UCKrngfrtzhifvf2M8uZbJHJG1qus21UVrud2qNgetqXaS6mYDEtEgKUcr8DEmrosWvGSaQhJuPNJ49fac1DENRzTsDB7c?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How do Crypto Currency Exchanges work?]]></title><description><![CDATA[A cryptocurrency exchange is essentially a stage for coordinating purchasers and merchants. They work similarly as trading for different resources, for example, stocks. Individuals will, in general, call]]></description><link>http://direct.ecency.com/crypto/@stellarlibrarian/howdocryptocurrencyexchangeswork-ifg7k4kwu9</link><guid isPermaLink="true">http://direct.ecency.com/crypto/@stellarlibrarian/howdocryptocurrencyexchangeswork-ifg7k4kwu9</guid><category><![CDATA[crypto]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 10 Aug 2020 10:08:18 GMT</pubDate></item><item><title><![CDATA[Protect your crypto accounts from attackers]]></title><description><![CDATA[With cryptocurrencies, there is no centralized authority responsible for the security of your funds, while the dangers are abundant. Your wallet can be hacked, and your PC can be captured by a virus designed]]></description><link>http://direct.ecency.com/blockchain/@stellarlibrarian/protectyourcryptoaccountsfromattackers-t5yqo8k3mm</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@stellarlibrarian/protectyourcryptoaccountsfromattackers-t5yqo8k3mm</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 18 May 2020 09:36:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUMmsnBu1CsYA4ENxnKU6Re1q6rYNVkzGNipX6eA1aRAqAN5XWqqn2DKC2PCm6CvaHbKrmc4BCYzJ9cZrT6gCXwTnW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Log Analysis]]></title><description><![CDATA[In the technical milieu, a log is a continuously produced and time-stepped report of occurrences identified and reported in reaction to specific events. All frameworks and applications produce log records]]></description><link>http://direct.ecency.com/guide/@stellarlibrarian/loganalysis-jdmv533f6r</link><guid isPermaLink="true">http://direct.ecency.com/guide/@stellarlibrarian/loganalysis-jdmv533f6r</guid><category><![CDATA[guide]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 04 May 2020 10:13:36 GMT</pubDate></item><item><title><![CDATA[Cloud security]]></title><description><![CDATA[Cloud security, otherwise called cloud processing security, comprises of a lot of strategies, controls, methodology, and advancements that work together to ensure cloud-based frameworks, information, and]]></description><link>http://direct.ecency.com/cloud/@stellarlibrarian/cloudsecurity-ulmhsbdskv</link><guid isPermaLink="true">http://direct.ecency.com/cloud/@stellarlibrarian/cloudsecurity-ulmhsbdskv</guid><category><![CDATA[cloud]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 20 Apr 2020 08:39:27 GMT</pubDate></item><item><title><![CDATA[Intrusion Detection (IDS)]]></title><description><![CDATA[IDS is a system that monitors network traffic for suspicious action and alerts you when such advancement is perceived. This is a thing application that scans your network or system for harmful exercises]]></description><link>http://direct.ecency.com/cyber/@stellarlibrarian/intrusiondetectionids-rum1odb4mi</link><guid isPermaLink="true">http://direct.ecency.com/cyber/@stellarlibrarian/intrusiondetectionids-rum1odb4mi</guid><category><![CDATA[cyber]]></category><dc:creator><![CDATA[stellarlibrarian]]></dc:creator><pubDate>Mon, 06 Apr 2020 19:42:39 GMT</pubDate></item></channel></rss>