<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 20 Apr 2026 16:50:08 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/cibersecurity/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Seguridad Informática ]]></title><description><![CDATA[Jjj]]></description><link>http://direct.ecency.com/hive-147010/@drakaryz/seguridad-informatica</link><guid isPermaLink="true">http://direct.ecency.com/hive-147010/@drakaryz/seguridad-informatica</guid><category><![CDATA[hive-147010]]></category><dc:creator><![CDATA[drakaryz]]></dc:creator><pubDate>Mon, 20 Apr 2026 12:34:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/32FTXiZsHoAW6noHJC4whDkkHNuKT6chKSdm4ZGB7arF5r3bEqLcGjwCSX8THDVa9zekHdzfRu4gUWD8o1z5N3MWCknrwh1KHfCSLptpcxZ3WPCUwxCAcAbWq8Gm9mozzZpyxSwCRybym9Cs?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Command required | Comando necesario (EN-ES)]]></title><description><![CDATA[Friends of HiveDevs, for a while now I've been looking for a community like this where I could actively participate with my SysAdmin knowledge and share my knowledge and recommendations that would be helpful]]></description><link>http://direct.ecency.com/hive-139531/@ortelioeph/command-required-or-comando-necesario-en-es</link><guid isPermaLink="true">http://direct.ecency.com/hive-139531/@ortelioeph/command-required-or-comando-necesario-en-es</guid><category><![CDATA[hive-139531]]></category><dc:creator><![CDATA[ortelioeph]]></dc:creator><pubDate>Sat, 13 Sep 2025 16:55:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/5s4dzRwnVbzGY5ssnCE4wXzkeAEXyVtgk1ApQTwHMTp6y5PvEo1yennBU4S22d4TAK22ZHoGfYxhJZKKzi5TWhk14JQN7hhhPPGvH7hLJWE2iRykvrz72QvKkmJu1d3eX9gEetj5nhRKQpZofdNdMwzZcgr4NNbGEPSnr2r?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Phishing en palabras sencillas - ¿cómo desaparece mi dinero del banco?]]></title><description><![CDATA[En el mundo digital la "suplantación de identidad" es muy común y abarca no solo la identidad de una persona, puede ser la suplantación de un sitio web, de una app, de un perfil en redes sociales]]></description><link>http://direct.ecency.com/hive-181335/@ubikalo/indsszpymp</link><guid isPermaLink="true">http://direct.ecency.com/hive-181335/@ubikalo/indsszpymp</guid><category><![CDATA[hive-181335]]></category><dc:creator><![CDATA[ubikalo]]></dc:creator><pubDate>Sat, 05 Apr 2025 20:57:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJQoosNsVw9WJafvPxyXbJFMpTYNQtoHMdKFpVGAGW9g7mUbYvZqdqn7Dw84JrdcxM2SiCvKwdFqCDcE4dThofe8MdwBhtweeUT3S9KtuAZ1T9PFjU72YWDv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Bloquear Ataques DDoS clave en ciberseguridad.]]></title><description><![CDATA[En el ámbito de la ciberseguridad, proteger contra ataques distribuídos de denegación de servicio (DDoS) es una tarea crucial. Los firewalls modernos, especialmente aquellos equipados con sistemas de detección]]></description><link>http://direct.ecency.com/hive-106817/@ortelioeph/bloquear-ataques-ddos-clave-en-ciberseguridad</link><guid isPermaLink="true">http://direct.ecency.com/hive-106817/@ortelioeph/bloquear-ataques-ddos-clave-en-ciberseguridad</guid><category><![CDATA[hive-106817]]></category><dc:creator><![CDATA[ortelioeph]]></dc:creator><pubDate>Fri, 13 Dec 2024 00:17:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/4HFqJv9qRjVecs4xkhd5EvhidWEEBnn9tCVDBkBhQpUFvab78MhbU1VuH4b99qgpTYTu4KMBFJVQyoM4ouznmyKGknvyWhwWgLM9pdR1bReS2fUEQkkNvG5gJpBCM6BE2CuotccpAx9H8pMsZDDh9J8rcRyt61jzbwU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[VPN Avanzado: IPsec vs. SSL/TLS para el Acceso Remoto Seguro (EN-ES)]]></title><description><![CDATA[En el panorama actual, donde el teletrabajo y el acceso remoto a recursos corporativos son la norma, la seguridad de las VPNs es crucial. Dejar de lado la seguridad de las VPNs es como dejar la puerta]]></description><link>http://direct.ecency.com/hive-106817/@ortelioeph/vpn-avanzado-ipsec-vs-ssltls-para-el-acceso-remoto-seguro</link><guid isPermaLink="true">http://direct.ecency.com/hive-106817/@ortelioeph/vpn-avanzado-ipsec-vs-ssltls-para-el-acceso-remoto-seguro</guid><category><![CDATA[hive-106817]]></category><dc:creator><![CDATA[ortelioeph]]></dc:creator><pubDate>Tue, 10 Dec 2024 14:47:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/4HFqJv9qRjVecs4xkhd5EvhidWEEBnn9tCVDBkBhQpUFvab78MhbU1VuH4b99qgpTYTu4KMBFJVQzrXRsTJiVa2CxkB76bW12me7PJMu7h6peXVfG2GXv8nuiKffQFTEjFQ1T9HyhxqkGC65GC7vkn7yKtxqr5wqz8n?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cómo Reconocer y Evitar el Phishing en Línea]]></title><description><![CDATA[Imagen de Tumisu en Pixabay y editada por mi en Photoshop Introducción:En el vasto mundo de la ciberseguridad, donde la tecnología avanza a pasos agigantados, una táctica maliciosa ha persistido a lo largo]]></description><link>http://direct.ecency.com/hive-10053/@thorkellnft/como-reconocer-y-evitar-el-phishing-en-linea</link><guid isPermaLink="true">http://direct.ecency.com/hive-10053/@thorkellnft/como-reconocer-y-evitar-el-phishing-en-linea</guid><category><![CDATA[hive-10053]]></category><dc:creator><![CDATA[thorkellnft]]></dc:creator><pubDate>Fri, 11 Aug 2023 10:58:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/NTy4GV6ooFRmaCXZ8UYgPhoud1kjiNX8QokLEZtbBKLuLWQ9yt7K3o4Vr3Chvy12yw3qo91QxJ2FbW8hH26aDf4kVBEjPzSUeLGsfMMq3A3q7NQzmZweuwPLhHuwfMBRmaZP6x6Q9B83SSXzDzRvKCSmdjbFWGyxneqb6ztn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[La Seguridad en el Universo de las Criptomonedas: Cómo Proteger tus Activos Digitales]]></title><description><![CDATA[Imagen de Fakhruddin Memon en Pixabay y editada por mi en Photoshop En el fascinante mundo de las criptomonedas, la seguridad se convierte en una preocupación fundamental. A medida que más personas se]]></description><link>http://direct.ecency.com/hive-10053/@thorkellnft/la-seguridad-en-el-universo-de-las-criptomonedas-como-proteger-tus-activos-digitales</link><guid isPermaLink="true">http://direct.ecency.com/hive-10053/@thorkellnft/la-seguridad-en-el-universo-de-las-criptomonedas-como-proteger-tus-activos-digitales</guid><category><![CDATA[hive-10053]]></category><dc:creator><![CDATA[thorkellnft]]></dc:creator><pubDate>Fri, 04 Aug 2023 17:11:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/NTy4GV6ooFRmaCXZ8UYgPhoud1kjiNX8QokLEZtbBKLuLWQ9yt7K3o4Vr3Chvy12yw3qo91QxHTRo4xFsMRfpSHQQuxsAbked4KAZAMrxhemRL9c64JPpZfr5if5zXNEYBUsgDYHAVXmcnjQDvJG14HQ9dkseKfGv9RdLPaW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Ciberseguridad al Día: Protegiendo Tu Presencia Digital]]></title><description><![CDATA[Foto de Mikhail Nilov ¡Bienvenidos a esta nueva sección de Ciberseguridad! ¡Hola a todos! Hoy estoy emocionado de dar la bienvenida a esta nueva sección, dedicada exclusivamente a la ciberseguridad. A]]></description><link>http://direct.ecency.com/hive-10053/@thorkellnft/ciberseguridad-al-dia-protegiendo-tu-precencia-digital</link><guid isPermaLink="true">http://direct.ecency.com/hive-10053/@thorkellnft/ciberseguridad-al-dia-protegiendo-tu-precencia-digital</guid><category><![CDATA[hive-10053]]></category><dc:creator><![CDATA[thorkellnft]]></dc:creator><pubDate>Fri, 28 Jul 2023 16:49:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/8DAuGnTQCLptZgjHUrRAJGcW4y1D4A5QVJJ7zjzqqKdfVHSS6NapSCCBxkQWudaKoc46dUXoExN8F31tkWrEXxGPPxnhPEJ55AXWi9fFUaLWfuZfCyvwFB5yfCuPboxo77qB4hkUKpTVpNgwVw83m93YNoXu58AoWN6rLSCPen2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Do you Know About Cibersecurity in Aviation? Some Fact... ✈]]></title><description><![CDATA[The term Cybersecurity, in recent years has been gaining strength, for many people when they hear that word they relate it to the computer security of the security systems of the States or with the financial]]></description><link>http://direct.ecency.com/hive-175254/@annrod33/do-you-know-about-cibersecurity-in-aviation-some-fact</link><guid isPermaLink="true">http://direct.ecency.com/hive-175254/@annrod33/do-you-know-about-cibersecurity-in-aviation-some-fact</guid><category><![CDATA[hive-175254]]></category><dc:creator><![CDATA[annrod33]]></dc:creator><pubDate>Mon, 05 Apr 2021 21:02:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/5s4dzRwnVbzGY5ssnCE4wXzkeAEXyVtgk1ApQTwHMTp6y5PvEo1yenn8VVC1AW7HCjZuJCyHKP8pW3XCSF97ZAGDhQYRjAY8PbaT5jnHSEwKpB2jddnrkfg4FW8mm9h3ERo22tY9qo8Hn33QfGPB3du6q43xGRvDhkD92BY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[ICT Security Guide - LINCE Evaluation Methodology / Guía de Seguridad de las TIC - Metodología de Evaluación LINCE]]></title><description><![CDATA[(pixabay.com) The National Cryptological Center (Spain) has just published the Security Guide that describes the LINCE methodology. The objective is to define the necessary steps to perform a basic safety]]></description><link>http://direct.ecency.com/cibersecurity/@newtechblog/ict-security-guide-lince-evaluation-methodology-guia-de-seguridad-de-las-tic-metodologia-de-evaluacion-lince</link><guid isPermaLink="true">http://direct.ecency.com/cibersecurity/@newtechblog/ict-security-guide-lince-evaluation-methodology-guia-de-seguridad-de-las-tic-metodologia-de-evaluacion-lince</guid><category><![CDATA[cibersecurity]]></category><dc:creator><![CDATA[newtechblog]]></dc:creator><pubDate>Tue, 11 Feb 2020 10:43:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pEPvDbJDzhdNXM7mjt1tbr2kM3X28F6SraZeQhzFazJSzuWNj4v26XequRQrPbNgT3drozemWZGfwWTeaGhCfWWxGpdaUb31eebhzPPytBptwg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Ciberseguridad: Cuidado con los cargadores baratos: estos jóvenes saben cómo los usan para robarte]]></title><description><![CDATA[¿Alguna vez has dudado de un ratón que conectas a un ordenador, o del cable de tu cargador del móvil? Seguramente la respuesta es que ni siquiera te lo has planteado. Cuando conectamos algo a nuestros]]></description><link>http://direct.ecency.com/dlike/@aniestudio/ciberseguridad-cuidado-con-los-cargadores-baratos-estos-jvenes-saben-cmo-los-usan-para-robarte</link><guid isPermaLink="true">http://direct.ecency.com/dlike/@aniestudio/ciberseguridad-cuidado-con-los-cargadores-baratos-estos-jvenes-saben-cmo-los-usan-para-robarte</guid><category><![CDATA[dlike]]></category><dc:creator><![CDATA[aniestudio]]></dc:creator><pubDate>Wed, 01 May 2019 08:49:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/BgxWBRxjvNhqNjTaHgAFXdL9bd4Qg7522grRS4z9FwGsgFsbyUDXEcGkrQuyeHH8GcCcT7VFfZzzDdHpqPTfoXTBPCjLMrZKyeGXTXyRwgqyTwHxc2hgPXhSGPU2d3KMGFP9HshtydzrQZNaTyCxwj6mSrWUhzzyxY7cWFY7vNnEhBW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[🔓📖 Libro en inglés. Ciberseguridad Industrial, 2017]]></title><description><![CDATA[456 páginas. Guía paso a paso que te enseñara técnicas y metodologías: #coding #cibersecurity #book #free #share2steem #ciberseguridad #industrial #libro #gratis External Link : Free eBook from Packt Download]]></description><link>http://direct.ecency.com/coding/@rosepac/rosepac-1556293338832--libro-en-ingls-ciberseguridad-industrial-2017</link><guid isPermaLink="true">http://direct.ecency.com/coding/@rosepac/rosepac-1556293338832--libro-en-ingls-ciberseguridad-industrial-2017</guid><category><![CDATA[coding]]></category><dc:creator><![CDATA[rosepac]]></dc:creator><pubDate>Fri, 26 Apr 2019 15:42:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/sML2JBPsdAyMUJWzxvYnDYtKNvrTaMv1eeo9E5PWtqwxarTcT1P1Tywh8ZXHyCSr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Experto en seguridad informática se suma al equipo de Academia Blockchain]]></title><description><![CDATA[Luis Hernández se aproximó a las criptomonedas y la tecnología blockchain por su trabajo. Ahora, nos compartirá sus conocimientos y consejos por medio de nuestro canal. Conócelo en esta breve entrevista]]></description><link>http://direct.ecency.com/cryptocurrency/@aca-blockchain/experto-en-seguridad-informatica-se-suma-al-equipo-de-academia-blockchain</link><guid isPermaLink="true">http://direct.ecency.com/cryptocurrency/@aca-blockchain/experto-en-seguridad-informatica-se-suma-al-equipo-de-academia-blockchain</guid><category><![CDATA[cryptocurrency]]></category><dc:creator><![CDATA[aca-blockchain]]></dc:creator><pubDate>Wed, 23 May 2018 22:28:36 GMT</pubDate></item><item><title><![CDATA[The Silent War Against Two Brothers, For The Security Of The WWW!]]></title><description><![CDATA[The silent war against two brothers, for the security of the WWW! As technology advances, many elements change, which are transparent for the common user, but for people who manage information traffic]]></description><link>http://direct.ecency.com/technology/@fregonzalez/the-silent-war-against-two-brothers-for-the-security-of-the-www</link><guid isPermaLink="true">http://direct.ecency.com/technology/@fregonzalez/the-silent-war-against-two-brothers-for-the-security-of-the-www</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[fregonzalez]]></dc:creator><pubDate>Fri, 11 May 2018 01:23:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBS5wvERDA3ZF4P2WKQy2VoZZet1QV2g21eTbYCAqXkXu3bdK1ShheQDY4yNxRQ5u85C2DgHwNm4xmKFogzHfWYv6mKV74RuiBm8kMvabMjLoh6h6syqhQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Teaching Cyber Security (U2/P3)]]></title><description><![CDATA[This post has moved to:]]></description><link>http://direct.ecency.com/cibersecurity/@alphydan/teaching-cyber-security-unit2-part3</link><guid isPermaLink="true">http://direct.ecency.com/cibersecurity/@alphydan/teaching-cyber-security-unit2-part3</guid><category><![CDATA[cibersecurity]]></category><dc:creator><![CDATA[alphydan]]></dc:creator><pubDate>Fri, 09 Feb 2018 08:39:24 GMT</pubDate></item><item><title><![CDATA[# The review of the blockchain project for ensuring cyber-security of devices - Riverz Security Project!]]></title><description><![CDATA[Note: For all the purchases of currencies you made after reading this article, you are solely responsible! As in any other investment, in purchases of crypto currencies there is a risk that can make you]]></description><link>http://direct.ecency.com/riverz/@coinlawyer/the-review-of-the-blockchain-project-for-ensuring-cyber-security-of-devices-riverz-security-project</link><guid isPermaLink="true">http://direct.ecency.com/riverz/@coinlawyer/the-review-of-the-blockchain-project-for-ensuring-cyber-security-of-devices-riverz-security-project</guid><category><![CDATA[riverz]]></category><dc:creator><![CDATA[coinlawyer]]></dc:creator><pubDate>Sun, 10 Sep 2017 15:13:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBS5wvERDA3ZF4P2WKQy2VoZZet1QV2f2mvZhWHFnJVqAMT3eA4ABZPeCcbBkY38mdMhs1W2aUqAWWMKTGiX3ZAeo3nQjd58SdW8oav1wGvJcy6LgEXvNJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Basic Tutorial Keepass 2 (open source software) Password Management]]></title><description><![CDATA[Following my previous post, I will be doing a little resume of what is is Keepass 2 before starting the tutorial. For those that don't know about Keepass 2, it is an open source password manager that helps]]></description><link>http://direct.ecency.com/cibersecurity/@jaskskull/basic-tutorial-keepass-2-open-source-software-password-management</link><guid isPermaLink="true">http://direct.ecency.com/cibersecurity/@jaskskull/basic-tutorial-keepass-2-open-source-software-password-management</guid><category><![CDATA[cibersecurity]]></category><dc:creator><![CDATA[jaskskull]]></dc:creator><pubDate>Wed, 05 Jul 2017 02:27:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/Kz4AvTzHkfLvQ5Y1BkLgyYsXj49ueCZDtznfppSkc92xARvRP2GbBoSc11nbGPLavo6JRcwdoLtzbpJqK7TGeaSWSKmv3MmGuxhJMdFh3ihubL6XdKYRap4nF67kqy6aU9Wgu3HJGmwX1dPJf3rTJMBMM8ah4guNgmoRTzbQDqGVqenQzYM9oiyjwBgzEHqmdeRVLV3xYNNneDUnw?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Manage the difficulty of your password with Keepass 2 (open source software)]]></title><description><![CDATA[Most users today have difficulty protecting their accounts online because to be honest there are tons of sites, services, applications, software, etc., that requires each one to register and of course]]></description><link>http://direct.ecency.com/password/@jaskskull/manage-the-difficulty-of-your-password-with-keepass-2-open-source-software</link><guid isPermaLink="true">http://direct.ecency.com/password/@jaskskull/manage-the-difficulty-of-your-password-with-keepass-2-open-source-software</guid><category><![CDATA[password]]></category><dc:creator><![CDATA[jaskskull]]></dc:creator><pubDate>Tue, 04 Jul 2017 04:02:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/FrDSZio5ZCzVABAfKiVLXXQFUFPCPqd7g5wzAsAw8y3sR8FGWUBNNdArxZWdmSsiJuEEGYsyVbgFmFR8EkpFMc2pMw9iBG7RfojcWVcaZxDWtaX6F7PwDamLFV45fy4WX9P1L3sAYYNx7hRbrQucTmF4riVwQpH8sjAMw7mLtbPX2FifrUKdoJFM9FB9rZaTjgQr1BCH8hL2xvcz3HqKMchKE3QH8EUP9B42GiqWekiJ3aKsLXPUkUwDB7ptZgDemybFvVUNAjoj3NcazQhoQwJzPpG1UL2JAkA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Kaspersky to US: Check Our Source Code]]></title><description><![CDATA[Cybersecurity expert Eugene Kaspersky has volunteered to turn over his company's software source code to allay fears about possible ties with the Russian government, The Australian reported last week.]]></description><link>http://direct.ecency.com/cibersecurity/@artech/kaspersky-to-us-check-our-source-code</link><guid isPermaLink="true">http://direct.ecency.com/cibersecurity/@artech/kaspersky-to-us-check-our-source-code</guid><category><![CDATA[cibersecurity]]></category><dc:creator><![CDATA[artech]]></dc:creator><pubDate>Thu, 15 Jun 2017 21:28:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNchGPKLQuxAL7oEwDJ42cT977qXjChaAZfLcPop4f42GWLh389eFNeiKMd5o7Ma5eZHmTikv1WgSeZByH11UkEd1928tJ1Dgde6Mrjbibmxj8?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>