<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 09:07:31 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/chronic0ps/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Operational Rules | The Rules Part 6 (Final)]]></title><description><![CDATA[The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and study. Mistakes have been made and sometimes we learn the hard way. I am attempting to]]></description><link>http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-6-final</link><guid isPermaLink="true">http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-6-final</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Thu, 26 Jul 2018 17:24:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81Mm4TNoJLsbykXg22fjLcsW8TxeRj8ujWKJsi7a22Y81FZjwWP7RosGjXJyExxgyawja5tjWPV15HhnPzgg52aS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Operational Rules | The Rules Part 5]]></title><description><![CDATA[The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and study. Mistakes have been made and sometimes we learn the hard way. I am attempting to]]></description><link>http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-5</link><guid isPermaLink="true">http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-5</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Fri, 20 Jul 2018 13:25:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81Qu1pg37nw5kMgqRFvpspnqf2cRVkQyEw7DdzNGdsSvH8oAft97PyDH8x48xsSjwrGc28Tdd2uzP2XsNqcUTPPt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Operational Rules | The Rules Part 4]]></title><description><![CDATA[The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and study. Mistakes have been made and sometimes we learn the hard way. I am attempting to]]></description><link>http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-4</link><guid isPermaLink="true">http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-4</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Mon, 09 Jul 2018 21:15:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81Lgr6zRjPhs53CSP6f1JCUUEoqT3QaFXd4H3SuLWnksS1ynaZMGyQ24q8XhhT8Xm2jLxfLpEHbp7rS8ntLgMYZU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Operational Rules | The Rules Part 3]]></title><description><![CDATA[The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and study. Mistakes have been made and sometimes we learn the hard way. I am attempting to]]></description><link>http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-3</link><guid isPermaLink="true">http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-3</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Fri, 06 Jul 2018 11:04:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81RfBHfcY4211V7JX5wJLrcctHYFKZ2G1145FP5kSFMXn2DFsCzg98PuJx8GHWEbkyrS8qSTSdEMouPFMAoQG654?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Operational Rules | The Rules Part 2]]></title><description><![CDATA[The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and study. Mistakes have been made and sometimes we learn the hard way. I am attempting to]]></description><link>http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-2</link><guid isPermaLink="true">http://direct.ecency.com/technology/@fqdd7l32brrw/operational-rules-or-the-rules-part-2</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Wed, 27 Jun 2018 23:47:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81MijLqPKn2JaMFy95UiRHZa6HnvK99PfoWzs9aTfF1gE3W4w54zoceuPCfBLd8tzu64K3UfdTjad8oKMuRmfPLr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Operational Rules | The Rules Part 1]]></title><description><![CDATA[The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and study. Mistakes have been made and sometimes we learn the hard way. I am attempting to]]></description><link>http://direct.ecency.com/security/@fqdd7l32brrw/operational-rules-or-the-rules-part-1</link><guid isPermaLink="true">http://direct.ecency.com/security/@fqdd7l32brrw/operational-rules-or-the-rules-part-1</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[fqdd7l32brrw]]></dc:creator><pubDate>Sun, 24 Jun 2018 23:03:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81Ly3ZfaY1dmmxX6EyiNRzMFN2jnexrWsHjt3NPY8a8aEyVdHGupbc1imrTfcaax95ZENbpPhLFk41fGpRTmD6rS?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>