<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 08 Apr 2026 19:44:10 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@toalsty/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[How to setup a small Windows Domain in Virtualbox Part 1]]></title><description><![CDATA[We will setup a small Windows domain with the following virtualboxes: 1 debian system that acts as a Nat device 1 Windows 10 client 1 windows server core with ActiveDirectory and Dhcp enabled In general]]></description><link>http://direct.ecency.com/technology/@toalsty/how-to-setup-a-small-windows-domain-in-virtualbox-part-1</link><guid isPermaLink="true">http://direct.ecency.com/technology/@toalsty/how-to-setup-a-small-windows-domain-in-virtualbox-part-1</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Sat, 29 Feb 2020 15:47:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvSqsZhWAUPy23YqSu8Y6oe635Edxx2MbKmRSQC8DKi3JGD9z1cvQBME6ee3rqvdFvD1SR9xakHEfjMPC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Calculating correlation between two stocks with Python!]]></title><description><![CDATA[Today we‘ll look at how we can utilize python to give us the correlation between two stocks. Our goal is to write a command line programm that takes in two .csv files with the closing prices. Furthermore]]></description><link>http://direct.ecency.com/trading/@toalsty/calculating-correlation-between-two-stocks-with-python</link><guid isPermaLink="true">http://direct.ecency.com/trading/@toalsty/calculating-correlation-between-two-stocks-with-python</guid><category><![CDATA[trading]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Thu, 21 Feb 2019 13:59:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pEPvDbJDzhdNXM7mjt1tbr2kM3X28F6SraZmADZZgFqiqPwVh29bp3XBxHuMgQD3wVn7ucawhGwmJZVqckjXzoZJ9dNocWEUiw4PLcu2QVznHk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Checking your Windows Registry Pt. 1(Keys where viruses might hide)]]></title><description><![CDATA[The Registry: What is the Windows Registry? The Registry is a database containing several entries concerning Windows system settings and processes. The Registry is divided into five so called root]]></description><link>http://direct.ecency.com/windows/@toalsty/checking-your-windows-registry-pt-1-keys-where-viruses-might-hide</link><guid isPermaLink="true">http://direct.ecency.com/windows/@toalsty/checking-your-windows-registry-pt-1-keys-where-viruses-might-hide</guid><category><![CDATA[windows]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Sun, 10 Feb 2019 17:05:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UonWToSX8tGXNY8jeXKSedJ2aRhGRj6HDecqreZUhHcukVsiqyEvD7RLQqjeDzjbDYE7fnAUtgERGa796KcYafWiQizoqRkHNPt11uuSHZiE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Gator Indicator(Scripting in Tradingview 2)]]></title><description><![CDATA[Here is the link to the first part: Part One Today we will look at the so called alligator indicator and the gator oscillator and how they look like as a script in Pine. Alligator Indicator: The Alligator]]></description><link>http://direct.ecency.com/trading/@toalsty/the-gator-indicator-scripting-in-tradingview-2</link><guid isPermaLink="true">http://direct.ecency.com/trading/@toalsty/the-gator-indicator-scripting-in-tradingview-2</guid><category><![CDATA[trading]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Mon, 04 Feb 2019 19:56:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjVs3Hye1oHX44R9EcpQD5C9xXzj68nJaq3CeAuyrBtaREPACjbZ3K2u4sDELGchU7uDzcSKV9Lh8QtGqv6R2YKp2KGdHSgBF4fwgJ7HRWHYS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[An introduction to scripting in Tradingview!]]></title><description><![CDATA[Today we will look at some of the possibilities that come with Tradingviews scripting language, called Pine. It enables you to create your own indicators, mix several indicators up and even to write and]]></description><link>http://direct.ecency.com/tutorial/@toalsty/an-introduction-to-scripting-in-tradingview</link><guid isPermaLink="true">http://direct.ecency.com/tutorial/@toalsty/an-introduction-to-scripting-in-tradingview</guid><category><![CDATA[tutorial]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Sat, 02 Feb 2019 17:05:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UonWToSX8tGXNY8jeXKSedJ2aRhGRj6HDecqrebZ5EjsneNXSUCTF1qVMZY1zmgrfp7yGgcSDtLUXH97TtefxeYph1ZKziQjoNoDQZvsxx2S?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Librem 5, the privacy phone!]]></title><description><![CDATA[Hey guys, Today i just want to share with you the Librem 5. It's a smartphone that runs on PureOS which is linux distribution. The phone is constructed with privacy in mind. That's why it comes with hardware]]></description><link>http://direct.ecency.com/technology/@toalsty/librem-5-the-privacy-phone</link><guid isPermaLink="true">http://direct.ecency.com/technology/@toalsty/librem-5-the-privacy-phone</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Sat, 26 Jan 2019 11:41:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJQfQgENfxADE6EVYabczqmSF5KeWefV5WL9WFPbCTNwU1qFtcmJPwpoyYmGZgGTibqwCRYgwQTiFEUMNH5B2DW94zKtJoMTGnLkKoDcP2w11oNeoiHpSTfC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Chaos Computer Congress Talks]]></title><description><![CDATA[Happy New Year everybody, Just dropped by to share with you the talks from this years 35C3 I liked the most so far. Smart Home - Smart Hack A talk about IoT-devices used in smart homes and their weaknesses.]]></description><link>http://direct.ecency.com/security/@toalsty/chaos-computer-congress-talks</link><guid isPermaLink="true">http://direct.ecency.com/security/@toalsty/chaos-computer-congress-talks</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Thu, 10 Jan 2019 17:10:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e3VhS4EHyHRp39gidxdkyPNoLPdepgJ85PL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A little python script for evaluating subdomains!]]></title><description><![CDATA[So today we have a little python script i wrote that helps you evaluate subdomains for a given domain. We will look at the script step by step to help you understand. The script can be found here: The]]></description><link>http://direct.ecency.com/technology/@toalsty/a-little-python-script-for-evaluating-subdomains</link><guid isPermaLink="true">http://direct.ecency.com/technology/@toalsty/a-little-python-script-for-evaluating-subdomains</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Fri, 30 Nov 2018 14:08:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/HNWT6DgoBc14riaEeLCzGYopkqYBKxpGKqfNWfgr368M9VJBfCEzWRoogL9gyW4hKAkeR2PAWfEbBKXrVFL7tywi9BkyFwWubakaPkbbFNokNQ6GsnrqBiT1vAi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hacking with Word Macros!]]></title><description><![CDATA[Macros: So, what are macros? Macros are a way to automate tasks in office documents. You can record them or write your own macros in Visual Basic for Applications(VBA). Metasploit: Metasploit is Pentesting]]></description><link>http://direct.ecency.com/technology/@toalsty/how-to-hack-someone-using-word-macros</link><guid isPermaLink="true">http://direct.ecency.com/technology/@toalsty/how-to-hack-someone-using-word-macros</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Sun, 12 Aug 2018 09:36:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVJ2SVhDmmumdPfnVEcahMce9nMwwksSDdRvTNiBhzj7Ybpr1B2isY5FxXdEPTtqdnkGEQvYWyGjsjH4jg3ZEwvdiMcWbJzLvo3ZCy6PqvH44cdS7B4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to acquire a memory image for later analysis!(Forensics)]]></title><description><![CDATA[Why do we want to get a systems memory for later Analysis? Let‘s say you had an incident on a machine in your network and you suppose you have been „hacked“. A memory dump is a great way to see all the]]></description><link>http://direct.ecency.com/technology/@toalsty/how-to-acquire-a-memory-image-for-later-analysis-forensics</link><guid isPermaLink="true">http://direct.ecency.com/technology/@toalsty/how-to-acquire-a-memory-image-for-later-analysis-forensics</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Mon, 06 Aug 2018 11:56:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/HNWT6DgoBc14riaEeLCzGYopkqYBKxpGKqfNWfgr368M9ULohPfrVAxG41CYRMNovLisHyY4ZCpR5xG2t5zx1ehpD3Y3LM2Ft2G2YFeRFYRqKUz6Z2vDCTxczGN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Find hosts for tcpdump to use!]]></title><description><![CDATA[In the last little tutorial you might‘ve asked yourself where we got the IP-Addresses from when we typed the arpspoof command: First you find out what your IP-Address is by typing: ifconfig or ip a which]]></description><link>http://direct.ecency.com/technology/@toalsty/find-hosts-for-tcpdump-to-use</link><guid isPermaLink="true">http://direct.ecency.com/technology/@toalsty/find-hosts-for-tcpdump-to-use</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Fri, 06 Jul 2018 12:17:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQD5fXN7FkGnu1BzQUTW1XWrBnQ59BVQ4Q1a6DcLAsMzwa5TrVKU41HHARPAYi6Kx4LucAMd8Ez?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How the broker and trading industry works]]></title><description><![CDATA[Hey guys, Since I am interested in trading too, I wanted to drop by to share the following video I think is very useful. It gets into the depth's of how the brokers and trading educators work and why the]]></description><link>http://direct.ecency.com/trading/@toalsty/how-the-broker-and-trading-industry-works</link><guid isPermaLink="true">http://direct.ecency.com/trading/@toalsty/how-the-broker-and-trading-industry-works</guid><category><![CDATA[trading]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Tue, 03 Jul 2018 13:09:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e6e6qKC2ji4JucFbCd58ixgNqRhEWB5nqV8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to capture Network packets with Tcpdump!]]></title><description><![CDATA[In this part we‘ll have a look at packet-capturing and ARP-Spoofing. So what‘s going to happen now? We are going to tell Machine A(the target) that we are machine C(the router) and route the packets for]]></description><link>http://direct.ecency.com/technology/@toalsty/how-to-capture-network-packets-with-tcpdump</link><guid isPermaLink="true">http://direct.ecency.com/technology/@toalsty/how-to-capture-network-packets-with-tcpdump</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Sun, 01 Jul 2018 11:12:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQD5fXN7FkGnu1BzQUTW1XWrBnQ59BVQ4Q1a6DcLAsMzwa5TrVKU41HHARPAYi6Kx4LucAMd8Ez?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A little introduction to Network Packets 3(ARP)]]></title><description><![CDATA[MAC-Address: What is a MAC-Address? The MAC-Address is a hardware-address that is unique to every network interface card (NIC) and consists of 6 bytes that look like this: A1:23:BB:32:F8:01 The manufacturers]]></description><link>http://direct.ecency.com/hacking/@toalsty/a-little-introduction-to-network-packets-3-arp</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@toalsty/a-little-introduction-to-network-packets-3-arp</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Sat, 23 Jun 2018 10:53:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgaV8qiFU89taP2MgKXzwntUGAvkoQiKU7VxyD37q9XEXo9XiU37fXX1ghp3QG22oX7N1LCwVA33uiKqMNN2BU3NTt488arotCDCMw7sHAG3ypdATK4DGz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A little introduction to network packets 2]]></title><description><![CDATA[After the IP-layer comes the transport layer which is divided into TCP and UDP. This is just a general overview of the Protocols. Maybe we will have a look at the different header fields later on. TCP:]]></description><link>http://direct.ecency.com/technology/@toalsty/a-little-introduction-to-network-packets-2</link><guid isPermaLink="true">http://direct.ecency.com/technology/@toalsty/a-little-introduction-to-network-packets-2</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Tue, 19 Jun 2018 17:19:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgaV8qiFU89taP2MgKXzwntUGAvkoQiKU7VxyD37q9Fecf41oAXyHPh62fSf5xQrQrgoTqrnsAGgCxgdALQhJwuces4utSmUrUuvCYTC2M5C7FTVCBJ6j8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A little Introduction to network packets 1]]></title><description><![CDATA[So, what are network packets and protocols? A network packet is a unit of formatted data that is used for transmitting data over a network. Packets follow so called protocols. A protocol is a set of rules]]></description><link>http://direct.ecency.com/network/@toalsty/a-little-introduction-to-network-packets-1</link><guid isPermaLink="true">http://direct.ecency.com/network/@toalsty/a-little-introduction-to-network-packets-1</guid><category><![CDATA[network]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Mon, 18 Jun 2018 12:36:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm3sWQK3HKkuAMedF1JSX7yKgEqYjnyTKPwrcYPT7y62KDLXx9QQXb4PmrxYYhzhVzXZvLyLcZBiBZxot4A9ZNbt4soELi42gMiPao85pENafpRbEk5wZQFe7WTUepfx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Getting started with Pentesting!]]></title><description><![CDATA[Hey Guys and Girls, since I am interested in Pentesting I wanted to share some sources with you with great Tutorials. As pentesting is a big field you probably wonder where to get started. So let's start]]></description><link>http://direct.ecency.com/programming/@toalsty/getting-started-with-pentesting</link><guid isPermaLink="true">http://direct.ecency.com/programming/@toalsty/getting-started-with-pentesting</guid><category><![CDATA[programming]]></category><dc:creator><![CDATA[toalsty]]></dc:creator><pubDate>Wed, 18 Apr 2018 08:10:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45dvDR6fuQXehEZ9RNGebY5v37bBXNUzhFZFk?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>