<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sun, 12 Apr 2026 13:16:51 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@techack/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Be happy.. Never ever give up]]></title><description><![CDATA[:)]]></description><link>http://direct.ecency.com/microsoft/@techack/5-interesting-facts-about-microsoft-ceo-satya-nadella</link><guid isPermaLink="true">http://direct.ecency.com/microsoft/@techack/5-interesting-facts-about-microsoft-ceo-satya-nadella</guid><category><![CDATA[microsoft]]></category><dc:creator><![CDATA[techack]]></dc:creator><pubDate>Thu, 24 Aug 2017 18:08:21 GMT</pubDate></item><item><title><![CDATA[Hackers Defeated! Hacker’s Website Gets Hacked By The Victim]]></title><description><![CDATA[There were lot’s of hacking stuff going on. Every other day, we hear about a website or internal networks getting hacked. Hackers are introducing new techniques before the tech industry develops ways to]]></description><link>http://direct.ecency.com/hackers/@techack/hackers-defeated-hacker-s-website-gets-hacked-by-the-victim</link><guid isPermaLink="true">http://direct.ecency.com/hackers/@techack/hackers-defeated-hacker-s-website-gets-hacked-by-the-victim</guid><category><![CDATA[hackers]]></category><dc:creator><![CDATA[techack]]></dc:creator><pubDate>Thu, 24 Aug 2017 17:57:00 GMT</pubDate></item><item><title><![CDATA[This AI Can Potentially Delete Buffering From Your Life]]></title><description><![CDATA[Currently, the algorithms are helping us to improve technological processes in the web and platforms as well as in devices. Now, we will tell you about one that uses artificial intelligence and that allows]]></description><link>http://direct.ecency.com/cool/@techack/this-ai-can-potentially-delete-buffering-from-your-life</link><guid isPermaLink="true">http://direct.ecency.com/cool/@techack/this-ai-can-potentially-delete-buffering-from-your-life</guid><category><![CDATA[cool]]></category><dc:creator><![CDATA[techack]]></dc:creator><pubDate>Sat, 19 Aug 2017 12:10:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/3jpR3paJ37V8t3d5gG8YxUrFtTrvhgCDjjN8jFs77d4cLBez68aximjnP9bwKZWrBV8gPeDgYhqT5nRoBEaa35wBmaFmahWVuysxqZN6iRsVjFW9TtuKtEJCfg5VbUd5td4vi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[iPhone HACK: A Hacker Has Decrypted The iPhone’s Security Chip]]></title><description><![CDATA[The tech giant Apple has, in recent years, invested heavily in the iPhone to ensure the safety of users and their data. There are several measures known to encrypt them and make them inaccessible, something]]></description><link>http://direct.ecency.com/tech/@techack/iphone-hack-a-hacker-has-decrypted-the-iphone-s-security-chip</link><guid isPermaLink="true">http://direct.ecency.com/tech/@techack/iphone-hack-a-hacker-has-decrypted-the-iphone-s-security-chip</guid><category><![CDATA[tech]]></category><dc:creator><![CDATA[techack]]></dc:creator><pubDate>Sat, 19 Aug 2017 12:00:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/3jpR3paJ37V8t3d5gG8YxUrFtTrvhgCDjjN8jFs78843VyLfCp8sbxJj8XpPJc3u8fUiGoxHL7iKMfFSmwdCz7gjRG7gExkRURxNECHAyq87HnxAJy8Bn3MPrYR3ZdiGWiUbG?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>