<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 28 Apr 2026 07:24:05 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/haking/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Haking Android por hakblack]]></title><link>http://direct.ecency.com/haking/@hakblack/haking-android-por-hakblack</link><guid isPermaLink="true">http://direct.ecency.com/haking/@hakblack/haking-android-por-hakblack</guid><category><![CDATA[haking]]></category><dc:creator><![CDATA[hakblack]]></dc:creator><pubDate>Sun, 05 Jan 2020 01:22:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eHYcdd9H34ZBVhWrbb7nAdC1Xo7koYJHppv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[돌핀이] 테이스팀 해킹 정지중]]></title><description><![CDATA[안녕하십니까 돌핀이 @asd5710 입니다 원래 매주 월요일이 되면 테이스팀에 가서 제 포인트 올릴려고 하는데 위에 보신것처럼 지금 정지중에 있습니다 지금 테이스팀 계정이 해킹으로 인해서 모든 게 정지되어 있는 상태라고 합니다 저도 테이스팀 포스팅 할려고 주말에 열심히 음식점 다녀왔는데 테이스팀이 다시 아무런 문제 없이 복귀될때까지 기다리면서 자료 모아놔야겠네요]]></description><link>http://direct.ecency.com/kr/@asd5710/2g6y4n</link><guid isPermaLink="true">http://direct.ecency.com/kr/@asd5710/2g6y4n</guid><category><![CDATA[kr]]></category><dc:creator><![CDATA[asd5710]]></dc:creator><pubDate>Mon, 27 May 2019 14:15:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUMp8dW6yuJTR9MKNu8P8DCXDU9qmmhdRX2GKKZASAZ9SyKEh2TDpTeTFcneaN5Fm4GkSz4Y2mVfB41rwdz9eZhfJu?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[সন্দেহেই জেনো সম্পর্কের ফাটল ধরলো]]></title><description><![CDATA[সেদিনের কথা গুলো মনে করে সত্যিই আমি লজ্জিত হই কারন তুমি আমার আপন ভাগ্নে না হলেও আমি তোমাকে আমার আপন ভাগ্নের চেয়েও বেশি ভালোবাসিা। তোমার আমার সম্পর্কে ফাটল ধরাতে আমার facebook id টা কে জানি haking করেছিলো।]]></description><link>http://direct.ecency.com/haking/@bangladesh71/6xqjfr</link><guid isPermaLink="true">http://direct.ecency.com/haking/@bangladesh71/6xqjfr</guid><category><![CDATA[haking]]></category><dc:creator><![CDATA[bangladesh71]]></dc:creator><pubDate>Tue, 02 Oct 2018 12:09:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUMp8dW6yuJTR9MKNu8P8DCXDU9qmmpTosA3tkxAMuQtJY7X8PzffJSfg69o3WVUjjGkkqXUgbcr8eVEHKbqqbxDDJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[ Como hackers pueden robar criptomonedas]]></title><description><![CDATA[3 maneras en que los hackers pueden robar criptomonedas como Bitcoin, Ethereum, Monero, etc. Muchas veces, los consejos de seguridad que se brindan a consumidores y empresas no están sincronizados con]]></description><link>http://direct.ecency.com/trading/@mediaboxent/9r8p87gd</link><guid isPermaLink="true">http://direct.ecency.com/trading/@mediaboxent/9r8p87gd</guid><category><![CDATA[trading]]></category><dc:creator><![CDATA[mediaboxent]]></dc:creator><pubDate>Tue, 07 Aug 2018 23:56:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBqwzwxM6L1P6uLNceBDDCM9DriAWsmkJmXDTLd3txwLnRp5wFSupNb4LtRvybviMqDmWvgogKtuGfEJs2K?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Backdoors Keep Appearing In Cisco's Routers !]]></title><description><![CDATA[hello friends Backdoors Keep Appearing In Cisco's Routers Cisco Architecture for Lawful Intercept Way back in 2004, Cisco wrote an IETF proposal for a “lawful intercept” backdoor for routers, which law]]></description><link>http://direct.ecency.com/hack/@blockdaily/backdoors-keep-appearing-in-cisco-s-routers</link><guid isPermaLink="true">http://direct.ecency.com/hack/@blockdaily/backdoors-keep-appearing-in-cisco-s-routers</guid><category><![CDATA[hack]]></category><dc:creator><![CDATA[blockdaily]]></dc:creator><pubDate>Fri, 20 Jul 2018 16:52:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/hgjbks2vRxvgeEigDRtRZ9QYHapC6i9B5n6yzhngTKmysiTNZEFpqsUuDJH79c72HEyVvbAxubWsrcQMWyKNyHCbH8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Singapore's largest healthcare group – SingHealth – suffers a massive data breach]]></title><description><![CDATA[Hello Singapore's largest healthcare group – SingHealth – suffers a massive data breach Hackers stole personal information on 1.5 million patients (a quarter of the country's population) and outpatient]]></description><link>http://direct.ecency.com/hack/@blockdaily/singapore-s-largest-healthcare-group-singhealth-suffers-a-massive-data-breach</link><guid isPermaLink="true">http://direct.ecency.com/hack/@blockdaily/singapore-s-largest-healthcare-group-singhealth-suffers-a-massive-data-breach</guid><category><![CDATA[hack]]></category><dc:creator><![CDATA[blockdaily]]></dc:creator><pubDate>Fri, 20 Jul 2018 13:29:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/sML2JBPsdAyMUJWzxvYnDYtKNvrTaMv1eeo9E5PZ4Gxs46t1YivchBrnrc5jKoSN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[돌핀이]코인레일 레일토큰 소각]]></title><description><![CDATA[코인레일거래소 자체 토큰은 레일토큰을 두 번에 나눠서 토큰을 소각한다고 합니다 1차 75억개 2차 75억개 총 150억래 레일코인 총 갯수 1100억래 토큰소각 150억개 남은 토큭 950억개 약 10프로 넘게 속가을 합니다 하...950억개 그렇게 많이도 많나요 뭐 토큰소각으로 토큰 가격 올려볼려고 하는 꼼수같은데 장난치지 마십시오 코인레일 진짜 양아치짓이]]></description><link>http://direct.ecency.com/kr/@asd5710/2pampq</link><guid isPermaLink="true">http://direct.ecency.com/kr/@asd5710/2pampq</guid><category><![CDATA[kr]]></category><dc:creator><![CDATA[asd5710]]></dc:creator><pubDate>Mon, 16 Jul 2018 22:34:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQCG7ifgqspTb9tkspbz1z1nkebxkb7uHNSfqBWFKfqAeXSv62KR8FwFWMHC5NTXeytZqLYuwSv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Russian Hacking compain Analysis]]></title><description><![CDATA[SAN FRANCISCO — In mid 2016, Russian knowledge officers got another crap upl of the virtual cash Bitcoin. They rapidly set the computerized cash to work. The Russian government agents utilized a portion]]></description><link>http://direct.ecency.com/haking/@khuram088/russian-hacking-compain-analysis</link><guid isPermaLink="true">http://direct.ecency.com/haking/@khuram088/russian-hacking-compain-analysis</guid><category><![CDATA[haking]]></category><dc:creator><![CDATA[khuram088]]></dc:creator><pubDate>Sat, 14 Jul 2018 06:09:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJQfQgENfxADE6EVYabczqmSF5KeWefV5WL9WAfngjcHYNbdzuVfuj51NfMqkNSyw8mVDHoFmNHNfA4eoayw9UWmNU4DWR5veUVKNi4DinchgBjY5UuaBsRG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Can Hackers Crack the Ivory Towers?]]></title><description><![CDATA[Just like leaders in every other field you can imagine, academics have been hard at work studying information security. Most fields aren't as replete with hackers as information security, though, and their]]></description><link>http://direct.ecency.com/haking/@vijender6214/can-hackers-crack-the-ivory-towers</link><guid isPermaLink="true">http://direct.ecency.com/haking/@vijender6214/can-hackers-crack-the-ivory-towers</guid><category><![CDATA[haking]]></category><dc:creator><![CDATA[vijender6214]]></dc:creator><pubDate>Sat, 07 Jul 2018 04:26:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/LcTxR7u1XKaa3e4T1EBuBP18JezPvjFFo8gNuE9CiKHBn5KA9SarApfk4kUprrnFAz1afoyjLKrV6QzzoqcizHWJ1Yekc9wDmbQngvFWPcDQea5Qp4DU4i8ezRXMzaG8dTgZWtiZFfbhpvwythhXaVGTx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[FROM THE CRAZY TO THE COOL,  THE SERIOUS TO THE SILLY,  THERE ARE TONS OF WAYS,  TO MAKE  MONEY]]></title><description><![CDATA[TOP 5 WEIRD,UNIQUE AND INTERESTING JOB'S UNEMPLOYED! " FROM THE CRAZY TO THE COOL, THE SERIOUS TO THE SILLY, THERE ARE TONS OF WAYS, TO MAKE MONEY " Some people have forgone the most common routes]]></description><link>http://direct.ecency.com/vishwas/@vishu999/hello-everyone-to-find-your-own-job</link><guid isPermaLink="true">http://direct.ecency.com/vishwas/@vishu999/hello-everyone-to-find-your-own-job</guid><category><![CDATA[vishwas]]></category><dc:creator><![CDATA[vishu999]]></dc:creator><pubDate>Thu, 05 Jul 2018 14:04:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pEPvDbJDzhdNXM7mjt1tbr2kM3X28F6SraZk8ogCjrm3MAV7BF3uxgn5G6PHJyZrHbcETRd9ZVWU2aWhBdMuFEwdFiYHrwwKkwSSofyyAzCiD4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Do not share some information on Facebook to protect hackers]]></title><description><![CDATA[Do not share some information on Facebook to protect hackers.... Facebook is one of the most influential and powerful social media in the world with the current technological presence due to billions of]]></description><link>http://direct.ecency.com/facebook/@muktadir/do-not-share-some-information-on-facebook-to-protect-hackers-87b4cc460c0ce</link><guid isPermaLink="true">http://direct.ecency.com/facebook/@muktadir/do-not-share-some-information-on-facebook-to-protect-hackers-87b4cc460c0ce</guid><category><![CDATA[facebook]]></category><dc:creator><![CDATA[muktadir]]></dc:creator><pubDate>Thu, 10 May 2018 16:45:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/3MxaK27PJLaXTxqMvN3Go74iDjShcynNNejAhTjnUDfqLK8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Human Haking: the clustering illusion]]></title><description><![CDATA[In this "serie" we'll see what kind of euristic drive our decision every days. In this way we can learn how to exploit them to our advantage or how defend ourselves from them. The illusion cluster]]></description><link>http://direct.ecency.com/psychology/@bornstuborn/human-haking-the-clustering-illusion</link><guid isPermaLink="true">http://direct.ecency.com/psychology/@bornstuborn/human-haking-the-clustering-illusion</guid><category><![CDATA[psychology]]></category><dc:creator><![CDATA[bornstuborn]]></dc:creator><pubDate>Sun, 08 Apr 2018 14:36:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm4iYtFdzVNy1kt3F2tvRShXkTnWxjMtEW7nkMtCwwjyjVNxoJ8wLJSQ4UdJjn8fWhxiboPuvVMFBFxAoqrp1xQuNCwsoezp7SKK37RECVUvBL3GP18s8s7nYfNdks2E?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Human Haking: L'illusione dello schema]]></title><description><![CDATA[In questa serie andremo a vedere quali sono le euristiche di ragionamento a cui l'uomo si affida. In questo modo possiamo imparare ad usarle a nostro vantaggio o a difenderci da esse. L'illusione dello]]></description><link>http://direct.ecency.com/psychology/@bornstuborn/human-haking-l-illusione-dello-schema</link><guid isPermaLink="true">http://direct.ecency.com/psychology/@bornstuborn/human-haking-l-illusione-dello-schema</guid><category><![CDATA[psychology]]></category><dc:creator><![CDATA[bornstuborn]]></dc:creator><pubDate>Sun, 08 Apr 2018 14:21:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm4iYtFdzVNy1kt3F2tvRShXkTnWxjMtEW7nkMtCwwjyjVNxoJ8wLJSQ4UdJjn8fWhxiboPuvVMFBFxAoqrp1xQuNCwsoezp7SKK37RECVUvBL3GP18s8s7nYfNdks2E?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Easy way to haking facebook account without internet connection]]></title><description><![CDATA[What if the Facebook account can be hacked without internet? Is not it laughing? Listen, then hacking story and you become a little bit hacker! Generally a Facebook account can be opened in 2 ways (1)]]></description><link>http://direct.ecency.com/haking/@moshiur9100/easy-way-to-haking-facebook-account-without-internet-connection</link><guid isPermaLink="true">http://direct.ecency.com/haking/@moshiur9100/easy-way-to-haking-facebook-account-without-internet-connection</guid><category><![CDATA[haking]]></category><dc:creator><![CDATA[moshiur9100]]></dc:creator><pubDate>Tue, 03 Apr 2018 14:51:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/BgxWBRxjvNhppUjpaAaBDXJRZLu3AdaGMqihzn3ohbW9Qqc5w1rk8WEhpm4F7uDziy7G7CX7D9Pkzr7zGzywEytjWyUMuvBywtxwLpm4QMooLr7ifZ1qDozinCMCSeXBRX91Eh8QhKb8kxpuDwsFkrfux1GWs8Fjnawgk9tnnN8w2Lv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Natural forest charm]]></title><description><![CDATA[The forest is one of the most unspoiled places with clean and fresh air, many animals that live in the forest, so do not destroy the forest.]]></description><link>http://direct.ecency.com/forest/@ryandaexplorer/natural-forest-charm-1b89fa0ae9c1e</link><guid isPermaLink="true">http://direct.ecency.com/forest/@ryandaexplorer/natural-forest-charm-1b89fa0ae9c1e</guid><category><![CDATA[forest]]></category><dc:creator><![CDATA[ryandaexplorer]]></dc:creator><pubDate>Thu, 22 Feb 2018 05:15:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAN4yPCNEEyCyBaHfHF3xz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Joy of flashing the STEEM account-value!!]]></title><description><![CDATA[Not at all zip your currency around held my dad, it attracts thieves and thugs. protect it in your reduced-size or shield it cautious and out of espy of strangers. Because of a little million dollars on]]></description><link>http://direct.ecency.com/esteem/@sziu/the-joy-of-flashing-the-steem-account-value-82b13c1dadd8a</link><guid isPermaLink="true">http://direct.ecency.com/esteem/@sziu/the-joy-of-flashing-the-steem-account-value-82b13c1dadd8a</guid><category><![CDATA[esteem]]></category><dc:creator><![CDATA[sziu]]></dc:creator><pubDate>Sun, 18 Feb 2018 19:27:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAMzdBMXyRuwc4Dg62ntQE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hack, Hacking and Hacker, [Mega Tune]]]></title><description><![CDATA[Hacking: Now we understand that hacking is such that - stealing facebook passwords, using the free internet, games from the play store, or installing apps dollars. There are more people who can use computers,]]></description><link>http://direct.ecency.com/haking/@aahsann/hack-hacking-and-hacker-mega-tune</link><guid isPermaLink="true">http://direct.ecency.com/haking/@aahsann/hack-hacking-and-hacker-mega-tune</guid><category><![CDATA[haking]]></category><dc:creator><![CDATA[aahsann]]></dc:creator><pubDate>Tue, 06 Feb 2018 09:40:51 GMT</pubDate></item><item><title><![CDATA[Coin-check Site Hacking Cryptography Market Impact? (Discussion)]]></title><description><![CDATA[1, why did hackers hack the New Economy Movement (NEM)? 2, What is the wavelength for this case? 3, Is another exchange safe?]]></description><link>http://direct.ecency.com/haking/@rascoll/coin-check-site-hacking-cryptography-market-impact-discussion</link><guid isPermaLink="true">http://direct.ecency.com/haking/@rascoll/coin-check-site-hacking-cryptography-market-impact-discussion</guid><category><![CDATA[haking]]></category><dc:creator><![CDATA[rascoll]]></dc:creator><pubDate>Sun, 28 Jan 2018 12:46:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgaV8qiGEw1xifwYz2xp7RJEnNpBZq7dn2K5youC5ai1Ha5yS3gs2iNm3SRbjVftrpx35tRKxFWALFuRzdcFdo97ajUGmG1G62tMWA1g1xpirTrX7YqaCN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[New Report: North Korean Hackers Stole Funds From South Korean Cryptocurrency Exchanges]]></title><description><![CDATA[US cybersecurity firm Recorded Future has released a new report linking Lazarus, a North Korean hacking group, to various South Korean cryptocurrency exchange h...]]></description><link>http://direct.ecency.com/haking/@criptobox/new-report-north-korean-hackers-stole-funds-from-south-korean-cryptocurrency-exchanges</link><guid isPermaLink="true">http://direct.ecency.com/haking/@criptobox/new-report-north-korean-hackers-stole-funds-from-south-korean-cryptocurrency-exchanges</guid><category><![CDATA[haking]]></category><dc:creator><![CDATA[criptobox]]></dc:creator><pubDate>Tue, 23 Jan 2018 03:58:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/SiQni9EsHGr8Yuc9ua4nxujDXFys8hWX67DnEj9HHWCZtxKjemx49NgKkRV4Jt4K1j1SuE5218yjXJmyD4f5GuXcva2C8ceFsaQNRCGFgw4r7mTgT4RfhvWGCF2EK2XHyYnSj5ej9ZqJrXV6hmnMkJxxRhSwcG8bRSWYayhz6Xp6wBvyL95ssuqvVNiBHXQvRK1tQe?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[ប្រព័ន្ធប្រតិបត្តិការប្រើសំរាប់ Hacking ល្បីៗមួយចំនួន]]></title><description><![CDATA[អ្នកធ្លាប់បានលឺហើយថា “Hacking” ឬ ហៅថាពួក “Hacker” តែអ្នកមិនធ្លាប់ដឹងទេថាពួកគេប្រើប្រាស់ប្រព័ន្ធប្រតិបត្តិការ (OS) អ្វី មកធ្វើការ Hack នោះទេ។ សំរាប់ប្រព័ន្ធប្រតិបត្តិការ (OS) សំរាប់ Hack]]></description><link>http://direct.ecency.com/cambodia/@techfree/hacking</link><guid isPermaLink="true">http://direct.ecency.com/cambodia/@techfree/hacking</guid><category><![CDATA[cambodia]]></category><dc:creator><![CDATA[techfree]]></dc:creator><pubDate>Wed, 06 Dec 2017 03:17:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/99pyU5Ga1kws91ecJjkANAzfstp5ietJ4ACvk9NVTLxb6dszr5D6CgMQBfQ3d3DtcSFbwTytBy66YGrkQzmLf2EKHCD6i8Htxz8kZjvsdbNknejb6hftyDSsEzEj3Mw73k?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>