<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 07:37:23 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/footprinting/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Ethical Hacking ( Footprinting )]]></title><description><![CDATA[Google Hacking The Google Hacking Database ( GHDB ) is a compiled list of common mistakes web/servers admins make, which can be easily search by using Goggle. Administrator Consoles Password Files Credit]]></description><link>http://direct.ecency.com/busy/@edu-4-everyone/2esagq-ethical-hacking-footprinting</link><guid isPermaLink="true">http://direct.ecency.com/busy/@edu-4-everyone/2esagq-ethical-hacking-footprinting</guid><category><![CDATA[busy]]></category><dc:creator><![CDATA[edu-4-everyone]]></dc:creator><pubDate>Sun, 18 Mar 2018 06:08:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWMGm4Xa2MvD5AT2bJsSA8F9WeC71v1s1fKfGkK9mMKuc3LcvF4KigbWg9UsrpEPZ2GwwDMj5JyQZRNX4p3MPBccVtryGUaB1gTg6H75rVZG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Ethical Hacking ( Footprinting Websites & Softwares)]]></title><description><![CDATA[Tools that are mostly used in footprinting. Google Searching www.hackersforcharity.com www.exploit-db.com HTTracker Website Copier Email Tracker Pro Ping Tracert Spam Spade www.archive.com]]></description><link>http://direct.ecency.com/busy/@edu-4-everyone/ethical-hacking-footprinting-websites-and-softwares</link><guid isPermaLink="true">http://direct.ecency.com/busy/@edu-4-everyone/ethical-hacking-footprinting-websites-and-softwares</guid><category><![CDATA[busy]]></category><dc:creator><![CDATA[edu-4-everyone]]></dc:creator><pubDate>Sun, 11 Mar 2018 04:18:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWMGm4Xa2MvD5AT2bJsSA8F9WeC71v1s1fKfGkK9mMKuc3LcvF4KigbWg9UsrpEPYxS5Gc5gFu9QCb7VMR4YTBHF9PQRRbqpQNiF6Ch3dFBk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Ethical Hacking ( Footprinting )]]></title><description><![CDATA[Footprinting The fine art of gathering information is called Footprinting. There are two major types of Footprinting. 1 - Passive Footprinting Passive footprinting is a method in which the attacker never]]></description><link>http://direct.ecency.com/busy/@edu-4-everyone/ethical-hacking-footprinting</link><guid isPermaLink="true">http://direct.ecency.com/busy/@edu-4-everyone/ethical-hacking-footprinting</guid><category><![CDATA[busy]]></category><dc:creator><![CDATA[edu-4-everyone]]></dc:creator><pubDate>Fri, 09 Mar 2018 05:06:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWMGm4Xa2MvD5AT2bJsSA8F9WeC71v1s1fKfGkK9mMKuc3LcvF4KigbWg9UsrpEPYxQKH9a1chW3n8C7broi9VVGmv622SPuyzLKf1vrmWZ4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Footprinting Menggunakan Ping Utility || Percobaan 1]]></title><description><![CDATA[hy stemian, kali ini aku akan melanjutkan pembahsan mengenai Footprinting. Di postingan sebelumnya aku suda menjelaskan Footprinting itu apa dan apa kegunaanya dalam dunia cyber. Di postingan kali ini]]></description><link>http://direct.ecency.com/tutorial/@beastt/footprinting-menggunakan-ping-utility-or-or-percobaan-1</link><guid isPermaLink="true">http://direct.ecency.com/tutorial/@beastt/footprinting-menggunakan-ping-utility-or-or-percobaan-1</guid><category><![CDATA[tutorial]]></category><dc:creator><![CDATA[beastt]]></dc:creator><pubDate>Thu, 01 Mar 2018 17:19:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/FxX5caie56yqUbvo2DTJv1i6qm8z4ixTabBTrjod5qAvmbwiB9ftGREZdZ7kyCm5gtEZjtuekH1Fc8pCRG2t3gMMrQhGD6Jho1KpWq9119fC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Footprinting, Hal  pertama yang dilakukan Attacker]]></title><description><![CDATA[Selamat malam sobat Stemian, menurut data dari Hootsuite, jumlah pengguna Internet di Indonesia di Tahun 2018 mencapai 132.7 Juta dari total 265.4 Juta populasi. Dapat kita lihat kurang lebih sekitar 50%]]></description><link>http://direct.ecency.com/cyber/@beastt/footprinting-hal-pertama-yang-dilakukan-attacker</link><guid isPermaLink="true">http://direct.ecency.com/cyber/@beastt/footprinting-hal-pertama-yang-dilakukan-attacker</guid><category><![CDATA[cyber]]></category><dc:creator><![CDATA[beastt]]></dc:creator><pubDate>Wed, 21 Feb 2018 16:55:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/D5zH9SyxCKdBnJaFeHnL3svQi9ZN2XzXDbzH7Wc9v9DuRU3oExkjNze4AEUsuF1b4ZB9cJb7UoLJbzmqPoYzqnX3g6rzYYerrynmyRULjb4zpmg2pPSqGzEC1MWUtQZrspKdTt?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>