<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 22 Apr 2026 12:38:44 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@yehey/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[What to know about cryptocurrency and Bitcoin in the Philippines]]></title><description><![CDATA[Cryptocurrency is a digital or virtual asset designed to work as a medium of exchange. Bitcoin, the first and most well-known cryptocurrency, was created in 2009. Cryptocurrencies are decentralized, meaning]]></description><link>http://direct.ecency.com/bitcoin/@yehey/what-to-know-about-cryptocurrency-and-bitcoin-in-the-philippines</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@yehey/what-to-know-about-cryptocurrency-and-bitcoin-in-the-philippines</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Wed, 09 Nov 2022 15:18:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/5bEGgqZEHBMfEQPyFzZUJoXTMM3P78Fx9Wc1YC4iSyygfZfx6hg5TxtFjeh3Fetewo59H6AcwKfcDfnRfeFTAMERnvUv6g1t?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A day in life of Maynila local.]]></title><description><![CDATA[Assuming you would like a detailed description of a day in the life of a Maynila local: The day begins early in Maynila, with the sun rising over the cityscape at around 6am. The streets begin to fill]]></description><link>http://direct.ecency.com/travel/@yehey/a-day-in-life-of-maynila-local</link><guid isPermaLink="true">http://direct.ecency.com/travel/@yehey/a-day-in-life-of-maynila-local</guid><category><![CDATA[travel]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Thu, 13 Oct 2022 13:28:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/2923mN3pnd7PiB4j3jtRUKsfGBcxg2nZn5j8nhXsF8yQUq15YyKY2ukwrXsgxRupmpHdpy6jhDt1pKZmxs6PA5ySGjHPMwMknwT5WHcU47jC4W?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to hire a ethical hacker to penetration test your system]]></title><description><![CDATA[When looking to hire an ethical hacker, there are a few key things to consider. Firstly, you want to make sure that the ethical hacker has a good understanding of hacking methodologies and tools. Secondly,]]></description><link>http://direct.ecency.com/pentest/@yehey/how-to-hire-a-ethical-hacker-to-penetration-test-your-system</link><guid isPermaLink="true">http://direct.ecency.com/pentest/@yehey/how-to-hire-a-ethical-hacker-to-penetration-test-your-system</guid><category><![CDATA[pentest]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Tue, 11 Oct 2022 16:52:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/B69zEhWZA8UCJ1jKV5q8a1fcCbj7skbhkxM8R9MSAWrzkRv6TnRYXVPFFYxUyfdFXDzmRWxLrAD79Fb7eEA96ehSMMTuc8dKp1Y2J8Si?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How Robotics is Changing Cybersecurity]]></title><description><![CDATA[Robotics is changing the cybersecurity landscape in a number of ways. Firstly, the rapid pace of technological advancement is making it difficult for humans to keep up with the latest trends and developments]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/how-robotics-is-changing-cybersecurity</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/how-robotics-is-changing-cybersecurity</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Thu, 06 Oct 2022 17:39:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/4PYjjVwJ1UdtK9g3SCsAP9dh88YmC3Jv6gYHL6t4Xre8zf9RhkS83WqtT7WbkF5cbQr7YV1WvhgTrp6ZFDSzf9wpfe1TUfBPwdsjfKiHxpv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What is Penetration Testing?]]></title><description><![CDATA[Penetration testing, also known as pen testing or ethical hacking, is the process of testing a computer system, network, or web application to find security vulnerabilities that an attacker could exploit.]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/6jc9zs-what-is-penetration-testing</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/6jc9zs-what-is-penetration-testing</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Wed, 05 Oct 2022 17:55:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/4PYjjVwJ1UdtK9g3SCsAP9dh88YmC3Jv6gYHL6t4Xre8zf9RhkS83WqtT7WbkF5cbQr7YV1WvhgTrp6ZFDSzf9wpfe1N2FDiXAtkgm6F95Y?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What is Malware and How to Remove it]]></title><description><![CDATA[Malware is a type of software that is designed to damage or disable computers and computer systems. Malware is often spread through email attachments or by downloading infected files from the internet.]]></description><link>http://direct.ecency.com/malware/@yehey/what-is-malware-and-how-to-remove-it</link><guid isPermaLink="true">http://direct.ecency.com/malware/@yehey/what-is-malware-and-how-to-remove-it</guid><category><![CDATA[malware]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Mon, 03 Oct 2022 14:42:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/4PYjjVwJ1UdtK9g3SCsAP9dh88YmC3Jv6gYHL6t4Xre8zf9RhkS83WqtT7WbkF5cbQr7YV1WvhgTrp6ZFDSzf9wpfe1N1znM4Qz773P1p8N?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Bitcoin, Ethereum, and the Future of Cryptocurrency]]></title><description><![CDATA[The rise of Bitcoin and Ethereum has led to a renewed interest in cryptocurrency. Cryptocurrency is a type of digital asset that uses cryptography to secure its transactions and to control the creation]]></description><link>http://direct.ecency.com/bitcoin/@yehey/bitcoin-ethereum-and-the-future-of-cryptocurrency</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@yehey/bitcoin-ethereum-and-the-future-of-cryptocurrency</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Thu, 29 Sep 2022 03:20:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfifgjUAytqJ6Xfgiisa2WS2wSokWHgN2CZm8Ni?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Robotics in the Cybersecurity Industry]]></title><description><![CDATA[Robotics in the cybersecurity industry is an exciting and growing field. Robotics can be used in a number of ways to help secure networks and data, as well as to respond to and investigate incidents. There]]></description><link>http://direct.ecency.com/robotics/@yehey/robotics-in-the-cybersecurity-industry</link><guid isPermaLink="true">http://direct.ecency.com/robotics/@yehey/robotics-in-the-cybersecurity-industry</guid><category><![CDATA[robotics]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Tue, 20 Sep 2022 14:03:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfifgjUAytqJ6Xfgiisa2WS7HddXqXR9kciDS94?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What is Penetration Testing?]]></title><description><![CDATA[Penetration testing, also known as pen testing or ethical hacking, is the process of testing a computer system, network or web application to find vulnerabilities that could be exploited by malicious actors.]]></description><link>http://direct.ecency.com/blog/@yehey/what-is-penetration-testing</link><guid isPermaLink="true">http://direct.ecency.com/blog/@yehey/what-is-penetration-testing</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Tue, 20 Sep 2022 13:52:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfifgjUAytqJ6Xfgiisa2WS2vCqbKDPBhHqfGdt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to hunt down and stop cyberthreats]]></title><description><![CDATA[Cyberthreats can come from a variety of sources, including malicious software (malware), phishing attacks, and denial-of-service attacks. To protect your computer and your data, you should take steps to]]></description><link>http://direct.ecency.com/blog/@yehey/how-to-hunt-down-and-stop-cyberthreats</link><guid isPermaLink="true">http://direct.ecency.com/blog/@yehey/how-to-hunt-down-and-stop-cyberthreats</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Wed, 14 Sep 2022 21:37:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfifgjUAytqJ6Xfgiisa2WS58QH4DWbPd9gAgqt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to prevent your business from becoming a victim of ransomware]]></title><description><![CDATA[Ransomware is a type of malware that encrypts a victim’s files and demands a ransom to decrypt them. Ransomware attacks are becoming increasingly common, with businesses of all sizes falling victim. Here]]></description><link>http://direct.ecency.com/blog/@yehey/how-to-prevent-your-business-from-becoming-a-victim-of-ransomware</link><guid isPermaLink="true">http://direct.ecency.com/blog/@yehey/how-to-prevent-your-business-from-becoming-a-victim-of-ransomware</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Mon, 12 Sep 2022 18:48:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfifgjUAytqJ6Xfgiisa2WS7JsbjDYvjeWgQLUv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What is Cyberhunting?]]></title><description><![CDATA[Cyberhunting is the practice of using online resources to track down criminals or gather intelligence about them. It can involve the use of social media, search engines, and other online tools to find]]></description><link>http://direct.ecency.com/blog/@yehey/what-is-cyberhunting</link><guid isPermaLink="true">http://direct.ecency.com/blog/@yehey/what-is-cyberhunting</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Wed, 07 Sep 2022 15:28:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfiXr59vm8SvwWmU6D4EiXjGSfDAALsr4y69pzJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How Machine Learning is Transforming Business]]></title><description><![CDATA[1. How machine learning is transforming businesses Machine learning is a form of artificial intelligence that allows computers to learn from data, identify patterns and make predictions without being]]></description><link>http://direct.ecency.com/blog/@yehey/how-machine-learning-is-transforming-business</link><guid isPermaLink="true">http://direct.ecency.com/blog/@yehey/how-machine-learning-is-transforming-business</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Wed, 31 Aug 2022 13:47:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBrGg5m7VJdLJL1Vg7qDG9UReSiAGnjnAFvMb1dHp8TdDo9KUNzajzaQYhu4H7AXe6LCNXyuejwer5vQATQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Promise of Cryptocurrency]]></title><description><![CDATA[Cryptocurrency is a digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions, control the creation of additional units, and verify the transfer]]></description><link>http://direct.ecency.com/blog/@yehey/the-promise-of-cryptocurrency</link><guid isPermaLink="true">http://direct.ecency.com/blog/@yehey/the-promise-of-cryptocurrency</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Tue, 30 Aug 2022 13:51:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfiGAkXSKbgCdUy2qBRa6aKg9B3kYce3hosd2N2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Defi: The new way to invest]]></title><description><![CDATA[What is Defi? Decentralized finance, also known as “Defi,” is a new way to invest that is built on the Ethereum blockchain. With Defi, you can lend or borrow money, trade digital assets, and earn interest]]></description><link>http://direct.ecency.com/blog/@yehey/defi-the-new-way-to-invest</link><guid isPermaLink="true">http://direct.ecency.com/blog/@yehey/defi-the-new-way-to-invest</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Thu, 25 Aug 2022 19:47:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBrGg5m7VJdLJL1Vg7qDG9UReSiAGnjnAFvMb1dHp8TdDo9KUNzajzaQYhu4H7AXe6LCN3PKbnXMYP86zCn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to save Money as an OFW.]]></title><description><![CDATA[Many Overseas Filipino Workers (OFWs) leave their families in order to work abroad and earn a better living. However, living away from loved ones can be tough and expensive. Here are some tips on how to]]></description><link>http://direct.ecency.com/blog/@yehey/how-to-save-money-as-an-ofw</link><guid isPermaLink="true">http://direct.ecency.com/blog/@yehey/how-to-save-money-as-an-ofw</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Tue, 23 Aug 2022 00:37:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/5bEGgqZEHBMfEQPyFzZUJoXTMM3P78Fx9Wc1YC4iSyygfZfx6hg5TxtFjegTbkQKtzX8TPJSiZfQKVMFG76ZS85HfWEYLgRt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A bustling cities in the Philippines.]]></title><description><![CDATA[Cavite is a province located in the Philippines. The province is situated on the country’s southwestern coast, and its capital is Imus City. Cavite is bordered by the provinces of Batangas, Laguna, and]]></description><link>http://direct.ecency.com/blog/@yehey/a-bustling-cities-in-the-philippines</link><guid isPermaLink="true">http://direct.ecency.com/blog/@yehey/a-bustling-cities-in-the-philippines</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Thu, 18 Aug 2022 18:37:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/5bEGgqZEHBMfEQPyFzZUJoXTMM3P78Fx9Wc1YC4iSyygfZfx6hg5TxtFjegTbkQKtzX8TPJSiZfQKVMFG5rbBmSAKCnpw5MG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cryptocurrency: The Future of Money?]]></title><description><![CDATA[What is Cryptocurrency? Cryptocurrency is a digital or virtual asset designed to work as a medium of exchange. Cryptocurrencies are decentralized, meaning they are not subject to government or financial]]></description><link>http://direct.ecency.com/blog/@yehey/cryptocurrency-the-future-of-money</link><guid isPermaLink="true">http://direct.ecency.com/blog/@yehey/cryptocurrency-the-future-of-money</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Thu, 18 Aug 2022 15:11:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfiXr59vm8SvwWmU6D4EiXjHWfBYfcspsQKdB9G?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Top 5 Beaches in the Philippines]]></title><description><![CDATA[The Top 5 Beaches in the Philippines Source: Boracay Island – Boracay Island is located on the westernmost tip of the Philippine archipelago. This beautiful island is renowned for its white sand beaches,]]></description><link>http://direct.ecency.com/blog/@yehey/the-top-5-beaches-in-the-philippines</link><guid isPermaLink="true">http://direct.ecency.com/blog/@yehey/the-top-5-beaches-in-the-philippines</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Wed, 17 Aug 2022 14:36:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/MG5aEqKFcQiBkAGPKB4KXaMRJoTWa32zQZfXNfqPwgVC5DCvCAXUi1fE3FKAQNZxQUsyuTRzWTAVvc8MXRSyH8APgTREtYJ9C?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Drones: The Future of Aerial Transportation]]></title><description><![CDATA[The future of aerial transportation may very well be drones. Drones, or unmanned aerial vehicles (UAVs), are aircrafts without a human pilot onboard. They are controlled either by a human operator on the]]></description><link>http://direct.ecency.com/blog/@yehey/drones-the-future-of-aerial-transportation</link><guid isPermaLink="true">http://direct.ecency.com/blog/@yehey/drones-the-future-of-aerial-transportation</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Tue, 16 Aug 2022 14:19:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBrGg5m7VJdLJL1Vg7qDG9UReSiAGnjnAFvMb1dHp8TdDo9KUNzajzaQYhu4H7AXe6LCP2aZNHvDigcrA8N?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>