<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 05:20:54 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/computersecurity/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Cyber Security Awarness Training For Business  ]]></title><description><![CDATA[When it comes to cyber security, employees are often the weakest link. Without an understanding of how to identify and respond to common threats, your employees are easy targets to exploit. However it]]></description><link>http://direct.ecency.com/cybersecurity/@phriendlyphishau/cyber-security-awarness-training-for</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@phriendlyphishau/cyber-security-awarness-training-for</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[phriendlyphishau]]></dc:creator><pubDate>Wed, 15 May 2024 01:36:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/3RTd4iuWD6NUjnoD8Yrh1Cy7awRojZWHzB7mii5CjDwpwwnq91fgEiSJ3vq49SWdxGaESpx8h1ciZxxa8N3eoqJmmipr9bEhYrm9vFma1CwE48nQ2wgQ3qmN3nXrAqqpfcnmthEwYpk359xyE2Z1FNyHt7FjZQVLjkVUZEgRtJHmUi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Intel Computers Remain Vulnerable to IME Exploits Since 2017]]></title><description><![CDATA[I have long followed Rob Braxman of @RobBraxmanTech on Odysee. I find he is able to explain complex security issues so that I can understand them - or at least think I do. In his latest video he explains]]></description><link>http://direct.ecency.com/life/@valued-customer/intel-computers-remain-vulnerable-to-ime-exploits-since-2017</link><guid isPermaLink="true">http://direct.ecency.com/life/@valued-customer/intel-computers-remain-vulnerable-to-ime-exploits-since-2017</guid><category><![CDATA[life]]></category><dc:creator><![CDATA[valued-customer]]></dc:creator><pubDate>Thu, 20 Apr 2023 17:00:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/pBMyo3B2Sao45kGEB1kRY9cJBFGQnrPp2qChGHkgVjzu1y6XFCd4yc3hJLbnhZzAancPT4s8ZTNAbXevm112t69ac19DHwcz8LLsAwDkUP2XEdHZucpEfYtgKxcGEvT8L9oousS3yDXiKA6iLpBcmTeqQnwErmC23QAScMX7Zo87EvCn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[There should never be a limit]]></title><description><![CDATA[What possible reason should there be a limit on the password! Maybe a computer science person that can tell me.]]></description><link>http://direct.ecency.com/blog/@jeffmackinnon/thereshouldneverbealimit-t9fav1f18mj8p887f1f7</link><guid isPermaLink="true">http://direct.ecency.com/blog/@jeffmackinnon/thereshouldneverbealimit-t9fav1f18mj8p887f1f7</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[jeffmackinnon]]></dc:creator><pubDate>Mon, 07 Dec 2020 16:35:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/7DceLgR4szFxEckHZEPNbcLQmWzwXuPM5p4uvs4nEGBjfXjjaY6i8p2CY85kD9qUCqgua2u4U7hh4DQZQ45mx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[There should never be a limit]]></title><description><![CDATA[What possible reason should there be a limit on the password! Maybe a computer science person that can tell me.]]></description><link>http://direct.ecency.com/blog/@jeffmackinnon/thereshouldneverbealimit-dc35aac8da7xb8fm0etd</link><guid isPermaLink="true">http://direct.ecency.com/blog/@jeffmackinnon/thereshouldneverbealimit-dc35aac8da7xb8fm0etd</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[jeffmackinnon]]></dc:creator><pubDate>Mon, 07 Dec 2020 15:50:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/7DceLgR4szFxEckHZEPNbcLQmWzwXuPM5p4uvs4nEGBjfXjjaY6i8p2CY85kD9qUCqgua2u4U7hh4DQZQ45mx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[eStream Studios' Feed : 2019/02/08 14:41:09]]></title><description><![CDATA[#Security #computersecurity Thousands of industrial refrigerators can be remotely defrosted, thanks to default passwords | External Link : Thousands of industrial refrigerators can be remotely defrosted,]]></description><link>http://direct.ecency.com/security/@estream.studios/estreamstudios-1549633269764-estream-studios-feed--20190208-144109</link><guid isPermaLink="true">http://direct.ecency.com/security/@estream.studios/estreamstudios-1549633269764-estream-studios-feed--20190208-144109</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[estream.studios]]></dc:creator><pubDate>Fri, 08 Feb 2019 13:41:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/sML2JBPsdAyMUJWzxvYnDYtKNvrTaMv1eeo9E5PZiG6PRvHLyAHZEXks52VUqPiN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How To Encrypt Keyboard To Avoid Keyloggers]]></title><description><![CDATA[Let's start encrypting keyboard, If we start encrypting keystrokes of a keyboard the value that keylogger will record is different from the actual value, that means they would only record random characters.]]></description><link>http://direct.ecency.com/computersecurity/@milan98/how-to-encrypt-keyboard-to-avoid-keyloggers</link><guid isPermaLink="true">http://direct.ecency.com/computersecurity/@milan98/how-to-encrypt-keyboard-to-avoid-keyloggers</guid><category><![CDATA[computersecurity]]></category><dc:creator><![CDATA[milan98]]></dc:creator><pubDate>Fri, 19 Oct 2018 14:50:00 GMT</pubDate></item><item><title><![CDATA[Jokes that will make all Microsoft Windows users laugh, then cry. Part 2]]></title><description><![CDATA[Whether you're a Mac OS or Windows user (c'mon, nobody is actually running Linux), you've probably heard at least one Windows joke. Since its initial release 32 years ago, Windows has had quite a few bugs]]></description><link>http://direct.ecency.com/company/@losangle/jokesthatwillmakeallmicrosoftwindowsuserslaughthencrypart2-ulldz2hpf2</link><guid isPermaLink="true">http://direct.ecency.com/company/@losangle/jokesthatwillmakeallmicrosoftwindowsuserslaughthencrypart2-ulldz2hpf2</guid><category><![CDATA[company]]></category><dc:creator><![CDATA[losangle]]></dc:creator><pubDate>Mon, 27 Aug 2018 20:51:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/4HFqJv9qRjVesj1WFWsYFNRPjsvxAZi3oJMqKrVp4wJNX7uWWihLJXCjMPZxnMBRYCSstnmcJmNgjXTuiXrNUaZa2cv2e2T5oDLeYE4kYgJXEPBtPDaG8GEKnDY9F4VvGh9vxmr1G2MsiyY1ErnP7Szw41bwqReuLrr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Jokes that will make all Microsoft Windows users laugh, then cry. Part 1]]></title><description><![CDATA[Whether you're a Mac OS or Windows user (c'mon, nobody is actually running Linux), you've probably heard at least one Windows joke. Since its initial release 32 years ago, Windows has had quite a few bugs]]></description><link>http://direct.ecency.com/company/@losangle/jokesthatwillmakeallmicrosoftwindowsuserslaughthencrypart1-l8b4h4wyyx</link><guid isPermaLink="true">http://direct.ecency.com/company/@losangle/jokesthatwillmakeallmicrosoftwindowsuserslaughthencrypart1-l8b4h4wyyx</guid><category><![CDATA[company]]></category><dc:creator><![CDATA[losangle]]></dc:creator><pubDate>Sun, 26 Aug 2018 14:16:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/4HFqJv9qRjVesj1WFWsYFNRPjsvxAZi3oJMqKrVp4wJNX7uWWihLJXCjMPZxnMBRYCSstnmcJmNgjXTuiXrNUaZa2cv2e2T5oDLeYE4kYgJXEPBtPDaG8GEKnDY9F4VvGh9vxmr1G2MsiyY1ErnP7Szw41bwqYCSB18?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How DxChain and QuarkChain can maintain all the three mainstays of the blockchain]]></title><description><![CDATA[There are three most important and necessary things which need to be dealt with care to perform transactions efficiently. The blockchain is basically generating more and more projects to make transactions]]></description><link>http://direct.ecency.com/blockchain/@cheefling/how-dxchain-and-quarkchain-can-maintain-all-the-three-mainstays-of-the-blockchain</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@cheefling/how-dxchain-and-quarkchain-can-maintain-all-the-three-mainstays-of-the-blockchain</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[cheefling]]></dc:creator><pubDate>Fri, 27 Jul 2018 10:05:36 GMT</pubDate></item><item><title><![CDATA[Are you smart enough to name parts of the internet?]]></title><description><![CDATA[<br/How much of a computer geek are you! Do you know how this thing we are constantly connect to is actually working? [playbuzz-item item="5f491376-1a26-48d7-81dd-2454de0837d3"]]></description><link>http://direct.ecency.com/computer/@losangle/areyousmartenoughtonamepartsoftheinternet-v9xbqa3n7b</link><guid isPermaLink="true">http://direct.ecency.com/computer/@losangle/areyousmartenoughtonamepartsoftheinternet-v9xbqa3n7b</guid><category><![CDATA[computer]]></category><dc:creator><![CDATA[losangle]]></dc:creator><pubDate>Sat, 07 Jul 2018 12:31:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/2N61tyyncFaFfAikjpjCNd3K5dEgiuoGWStCkZmEpKLDyNS7VbRvhomdTNC7bBx3gaoMjHvyVrp8MtnfWCE9qpQSL4HAiVhbGstRrhSrzHqCpojxQbu8Nd6EpgP98G67h79VdzWeKLYv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Meningkatkan Pertahanan Password]]></title><description><![CDATA[Ancaman serangan terhadap password sangat tinggi, organisasi dan pengguna mereka harus menerapkan perilaku dan tindakan teknis yang tepat untuk mengurangi risiko ancaman tersebut. Tindakan cenderung melibatkan]]></description><link>http://direct.ecency.com/password/@onnopurbo/meningkatkan-pertahanan-password</link><guid isPermaLink="true">http://direct.ecency.com/password/@onnopurbo/meningkatkan-pertahanan-password</guid><category><![CDATA[password]]></category><dc:creator><![CDATA[onnopurbo]]></dc:creator><pubDate>Thu, 15 Feb 2018 08:37:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pQYiuVvgYiUBP16WHGGN7UNn1BCdGdUAw6e2vNpYSDxRonJ2HiZD7j9HWzYqa4yMRCLiJsdomhMWrofnvHZFjyhgfHKd86YaZCM3JogpGws1MG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Teknik Enumerasi Kelemahan Password]]></title><description><![CDATA[Ada sedikit keraguan bahwa password adalah ketidaknyamanan. Sayangnya, penggunaan password tetap merupakan cara paling praktis bagi sebagian besar dari kita untuk menjaga identitas on-line kita agar tetap]]></description><link>http://direct.ecency.com/computersecurity/@onnopurbo/teknik-enumerasi-kelemahan-password</link><guid isPermaLink="true">http://direct.ecency.com/computersecurity/@onnopurbo/teknik-enumerasi-kelemahan-password</guid><category><![CDATA[computersecurity]]></category><dc:creator><![CDATA[onnopurbo]]></dc:creator><pubDate>Thu, 15 Feb 2018 08:30:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pQYiuVvgYiUBP16WHGGN7UNn1BCdGdUAw6e2vNpYSDxRonJ2HiZD7j9HWzYqa4yMRCLiJsdomhMWrofnvHZFjyhgfHKd86YaZCM3JogpGws1MG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Crack WiFi dengan fern-wifi-cracker]]></title><description><![CDATA[Fern-Wifi-Cracker adalah tool free berbasis GUI yang menggunakan suite aircrack untuk menyerang jaringan wireless. Fern dapat diluncurkan dari menu aplikasi Kali Linux di bawah Wireless Attacks | Wireless]]></description><link>http://direct.ecency.com/wifihack/@onnopurbo/crack-wifi-dengan-fern-wifi-cracker</link><guid isPermaLink="true">http://direct.ecency.com/wifihack/@onnopurbo/crack-wifi-dengan-fern-wifi-cracker</guid><category><![CDATA[wifihack]]></category><dc:creator><![CDATA[onnopurbo]]></dc:creator><pubDate>Tue, 13 Feb 2018 11:19:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/Gr7d242AAPKgbKabpjWaeqyHnnjCxTc6cRb3hGVTSTMK6UHPqAmp4bbrGtaf28yqVumvLsHf3KGiZFWZ1C7UBvHmANs9w9kF747PJD2bBDnacyY6pP7LmVX1pp4Y9c3n5EGLPx4QHDRr89mSJKJXmt2PSFTaCPUvCM8DBvKquvUmMmqrwMY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Onno: Esensi Evaluasi Ketahanan Jaringan WiFi]]></title><description><![CDATA[Keamanan jaringan adalah tugas yang tidak pernah berakhir; ini membutuhkan kewaspadaan terus menerus. Mengamankan jaringan wireless anda bisa sangat rumit karena penyusup pengguna dapat secara diam-diam]]></description><link>http://direct.ecency.com/wifi/@onnopurbo/onno-esensi-evaluasi-ketahanan-jaringan-wifi</link><guid isPermaLink="true">http://direct.ecency.com/wifi/@onnopurbo/onno-esensi-evaluasi-ketahanan-jaringan-wifi</guid><category><![CDATA[wifi]]></category><dc:creator><![CDATA[onnopurbo]]></dc:creator><pubDate>Tue, 13 Feb 2018 08:49:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pQYiuVvgYiUBP16WHGGN7UNn1BCdGe9srHzjW7mPQFZhHwoRPbYaGasq6ccMvzq2qErH7juCoXgCKUJ79m2DT9uVLQLhcrrPj6i63mvaHQZ5Ch?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Generation Z Media]]></title><description><![CDATA[#REDDIT adds 2-factor authentication for all - … #COMPUTERACCESSCONTROL #COMPUTERSECURITY #CRYPTOGRAPHY #LOGIN]]></description><link>http://direct.ecency.com/generation/@sumonmrbd/generation-z-media</link><guid isPermaLink="true">http://direct.ecency.com/generation/@sumonmrbd/generation-z-media</guid><category><![CDATA[generation]]></category><dc:creator><![CDATA[sumonmrbd]]></dc:creator><pubDate>Thu, 25 Jan 2018 10:20:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBS5wvERDA3ZF4P2WKQy2VoZZet1QV2dpaBCxnawAwQx77ozYXkpt2XvARXJbL89tsFZcrdhwGQtjpNach6vTHJkqT98RaWan2CHwqbP8yfEmBuvBEw7bU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Wireless Security]]></title><description><![CDATA[One of the tools used for wireless network detection is Kismet. Kismet is a tool that one can use to determine which wireless access points are accessible as well as wireless clients within range (Kismet]]></description><link>http://direct.ecency.com/cybersecurity/@dkabii/wireless-security</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@dkabii/wireless-security</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[dkabii]]></dc:creator><pubDate>Sat, 06 Jan 2018 11:07:42 GMT</pubDate></item><item><title><![CDATA[Before learning trading , learn Computer Security]]></title><description><![CDATA[  Before learning to do crypto-currency trading it is best to learn about computer security, hacking and the whole inner part of a digital currency project on the go. Learning the processes behind]]></description><link>http://direct.ecency.com/cryptocurrency/@jaimewilliam/before-learning-trading-learn-computer-security</link><guid isPermaLink="true">http://direct.ecency.com/cryptocurrency/@jaimewilliam/before-learning-trading-learn-computer-security</guid><category><![CDATA[cryptocurrency]]></category><dc:creator><![CDATA[jaimewilliam]]></dc:creator><pubDate>Fri, 27 Oct 2017 15:01:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/vM1pGDEAMLudBvhPYLLzhdB3MoVKzbiE4Wvo4a3ssBhKDXNaY7WVMfYgB9wwH3MR7D3f3MKk8RsFxPh2DThD78QxvmA1s5kNqHpTJ3svSNtdrdpmb6P6d8LynRWVmbkBYMGofta?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Securing the Internet of Things]]></title><description><![CDATA[ Internet of Things security is a nightmare in the making. Learn what smart enterprises can do to secure their IoT deployments.The computer industry seems to prefer playing catch-up when it comes]]></description><link>http://direct.ecency.com/security/@jonsmith/securing-the-internet-of-things</link><guid isPermaLink="true">http://direct.ecency.com/security/@jonsmith/securing-the-internet-of-things</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[jonsmith]]></dc:creator><pubDate>Wed, 08 Mar 2017 18:51:03 GMT</pubDate></item></channel></rss>