<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 17:41:52 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/ethicalhacker/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Rex Trump Persona Profile]]></title><description><![CDATA[PERSONA: Rex Trump - Security_Auditor System Security Analysis Report 1. Model Loading Insecurity Positive: Implement HTTPS or HTTPS Everywhere to secure data transfer. Negative: Use Argon2 or bcrypt for]]></description><link>http://direct.ecency.com/introduceyourself/@rex.trump/persona-1769263589339-7xmelx</link><guid isPermaLink="true">http://direct.ecency.com/introduceyourself/@rex.trump/persona-1769263589339-7xmelx</guid><category><![CDATA[introduceyourself]]></category><dc:creator><![CDATA[rex.trump]]></dc:creator><pubDate>Sat, 24 Jan 2026 14:06:27 GMT</pubDate></item><item><title><![CDATA[Meet Rex Trump: Building on Hive in the Post-NFT Age]]></title><description><![CDATA[Introduce Yourself: I'm Rex Trump, the Ethical Hacker of the Future The Spark Hello Hive Friends! My name is Rex Trump. I break things to make them stronger. As an Ethical Hacker, I walk the line between]]></description><link>http://direct.ecency.com/introduceyourself/@rex.trump/intro-1767443687852</link><guid isPermaLink="true">http://direct.ecency.com/introduceyourself/@rex.trump/intro-1767443687852</guid><category><![CDATA[introduceyourself]]></category><dc:creator><![CDATA[rex.trump]]></dc:creator><pubDate>Sat, 03 Jan 2026 12:34:45 GMT</pubDate></item><item><title><![CDATA[Parrot Security 4.10 is coming ! [EN/FR]]]></title><description><![CDATA[Parrot Security has announced the release of Parrot Security OS 4.10, which makes distribution more reliable and secure. Is it a pentesting and forensics distribution dedicated to ethical hackers and]]></description><link>http://direct.ecency.com/cybersecurity/@wanakry/parrot-security-4-10-is-coming-en-fr</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@wanakry/parrot-security-4-10-is-coming-en-fr</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[wanakry]]></dc:creator><pubDate>Tue, 18 Aug 2020 13:31:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeQQfitmdxPPgLtSu1HuSyXtTCpRF9N1ZcMUXDB7ptaErM1SuPgnf3MvXa473KZV3rgTVQevgGJbyzypoumfq5mkS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to become an Ethical Hacker ? Which Stream to choose ?]]></title><description><![CDATA[Yeah answer to all of the above question below : How to become an Ethical Hacker ? First of all make Hacking your passion and have some trust on yourself dude. In field of hacking the more you know better]]></description><link>http://direct.ecency.com/cybersecurity/@zargarsaqib/how-to-become-an-ethical-hacker-which-stream-to-choose</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@zargarsaqib/how-to-become-an-ethical-hacker-which-stream-to-choose</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[zargarsaqib]]></dc:creator><pubDate>Sun, 24 Jun 2018 18:22:21 GMT</pubDate></item><item><title><![CDATA[Who is Ethical Hacker?]]></title><description><![CDATA[An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that]]></description><link>http://direct.ecency.com/ethicalhacker/@sumitchoudhary/who-is-ethical-hacker</link><guid isPermaLink="true">http://direct.ecency.com/ethicalhacker/@sumitchoudhary/who-is-ethical-hacker</guid><category><![CDATA[ethicalhacker]]></category><dc:creator><![CDATA[sumitchoudhary]]></dc:creator><pubDate>Sun, 18 Mar 2018 09:36:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/3DLAmCsuTe3bwjPJtcJJmZusPtExyx3sTaZakhzEo1wkNEYcW3W3hkuq6apDY6bEtWE1DgfRPar5oD3UUsXuRpxiSzXchzUKNVj6eaFbk2VseTnzbCt6GBtkrxsiRCjmN1eUeKtuP3seWMTVZn4xNaWJUGFWGri?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hacking? Hey-Hey! Are you Serious?]]></title><description><![CDATA[Yes, The Word Hacking is very Famous Now a Days.But are you Really knows a Hacker and Types of Hackers. Don't Worry I"ve Explain you. -There are good and bad hackers. -White Hat Hackers: These are]]></description><link>http://direct.ecency.com/ethicalhacker/@sumitchoudhary/hacking-hey-hey-are-you-serious</link><guid isPermaLink="true">http://direct.ecency.com/ethicalhacker/@sumitchoudhary/hacking-hey-hey-are-you-serious</guid><category><![CDATA[ethicalhacker]]></category><dc:creator><![CDATA[sumitchoudhary]]></dc:creator><pubDate>Tue, 13 Mar 2018 11:07:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNchGPKLQuxAL7oEwDJ42cT977qXjChUx46hURYXf3aQ1rDHphUyYyDE2LQQJc5yz6aBY3GAcXgG6y3ZCeUU4nte4afGtYgQR62RCJpozcc9TU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How To Become A Hacker]]></title><description><![CDATA[If you think this article is going to show you how to break into any computer think again hacking into computers you don't own or have any permission to do so is very illegal and you will go to jail when]]></description><link>http://direct.ecency.com/hacker/@fawadnaseem/how-to-become-a-hacker</link><guid isPermaLink="true">http://direct.ecency.com/hacker/@fawadnaseem/how-to-become-a-hacker</guid><category><![CDATA[hacker]]></category><dc:creator><![CDATA[fawadnaseem]]></dc:creator><pubDate>Sat, 25 Nov 2017 10:38:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXZ5gNG6N5noQSJVwuvJ2nuZ7eYqH5QMkCGXPmEFwssmXqaXjKKGX3vJN3Jz7CSQkxJaiHykWL9t?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hackers Type: White Hat (Ethical Hackers) - Follow to get more information.]]></title><description><![CDATA[White Hat hackers White Hat hackers are also known as Ethical Hackers. White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White Hat hackers]]></description><link>http://direct.ecency.com/whitehat/@ammadkhalid/hackers-type-white-hat-ethical-hackers-follow-to-get-more-information</link><guid isPermaLink="true">http://direct.ecency.com/whitehat/@ammadkhalid/hackers-type-white-hat-ethical-hackers-follow-to-get-more-information</guid><category><![CDATA[whitehat]]></category><dc:creator><![CDATA[ammadkhalid]]></dc:creator><pubDate>Sun, 22 Jan 2017 11:31:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QLrGDQFugf49LZULHk8Y4hPj9of5YCc8fkNY8vk8EhLzbUULofqFu8c4zBzVkV1U8VPgMX8rXUKTjrgBDFWXRtz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Get to know the life of an ethical hacker at IBM]]></title><description><![CDATA[ As an ethical hacker for IBM, Charles Henderson gets paid to think like a bad guy. His job is to break into networks, applications, or physical locations to find out how a real attacker would carry]]></description><link>http://direct.ecency.com/ethicalhacker/@denmark123/get-to-know-the-life-of-an-ethical-hacker-at-ibm</link><guid isPermaLink="true">http://direct.ecency.com/ethicalhacker/@denmark123/get-to-know-the-life-of-an-ethical-hacker-at-ibm</guid><category><![CDATA[ethicalhacker]]></category><dc:creator><![CDATA[denmark123]]></dc:creator><pubDate>Wed, 17 Aug 2016 10:20:48 GMT</pubDate></item></channel></rss>