<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 13 Apr 2026 15:53:18 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/it-security/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[How a Steam Deck Runs Kali Linux and the Dark World of Zero-Day Exploits]]></title><description><![CDATA[I recently watched a video by the renowned YouTuber David Bombal, and I must say, it was an exhilarating experience. He showcased how to install Kali Linux on a Steam Deck, transforming it into a fully]]></description><link>http://direct.ecency.com/it-security/@louis88/how-a-steam-deck-runs-kali-linux-and-the-dark-world-of-zero-day-exploits</link><guid isPermaLink="true">http://direct.ecency.com/it-security/@louis88/how-a-steam-deck-runs-kali-linux-and-the-dark-world-of-zero-day-exploits</guid><category><![CDATA[it-security]]></category><dc:creator><![CDATA[louis88]]></dc:creator><pubDate>Sat, 25 May 2024 21:54:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e9titGxuHXjKLwnLmepknaXJb3kB6ffDzva?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Permissions of Chrome 'Hive Keychain' add-on]]></title><description><![CDATA[Well, I just created my Hive/PeakD account, and I have to say, its not really a good thing that this key management add-on requires 'Permission to read and change all data on all websites you visit'. You]]></description><link>http://direct.ecency.com/misc/@t-nil/permissions-of-chrome-hive-keychain-add-on</link><guid isPermaLink="true">http://direct.ecency.com/misc/@t-nil/permissions-of-chrome-hive-keychain-add-on</guid><category><![CDATA[misc]]></category><dc:creator><![CDATA[t-nil]]></dc:creator><pubDate>Wed, 19 May 2021 15:24:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/3DLAmCsuTe3ba2VJAE1ZhN2oVhekeqoshg9DUnSyUd2Cnt4YtUMpZp3t4WoweZ2d4ZYVqmYaxCEkv1ARL4QxPa9RpVgd5VSEBdPumNrLknFkkhgzt2gA63nnUKx6FMoqPEph92SKA3h82kAAr6ssWRVUSkKqjnE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Some Hacks Exploited Hmailserver]]></title><description><![CDATA[Hacks figured out how to exploit hmail servers recently and turn them into spamming machines very recently!]]></description><link>http://direct.ecency.com/it-security/@aawisdom.com/some-hacks-exploited-hmailserver</link><guid isPermaLink="true">http://direct.ecency.com/it-security/@aawisdom.com/some-hacks-exploited-hmailserver</guid><category><![CDATA[it-security]]></category><dc:creator><![CDATA[aawisdom.com]]></dc:creator><pubDate>Thu, 21 Nov 2019 06:45:48 GMT</pubDate></item><item><title><![CDATA[Stupid Lie of Movies]]></title><description><![CDATA[I saw Angel has Fallen, 2019 movie. A guy said, “see if there is an IP address from a Salient Global in Virginia”. Real hackers do not use their real IP. A hacker of that caliber will use VPN 100% certain.]]></description><link>http://direct.ecency.com/hollywood-lies/@aawisdom.com/stupid-lie-of-movies</link><guid isPermaLink="true">http://direct.ecency.com/hollywood-lies/@aawisdom.com/stupid-lie-of-movies</guid><category><![CDATA[hollywood-lies]]></category><dc:creator><![CDATA[aawisdom.com]]></dc:creator><pubDate>Mon, 18 Nov 2019 03:35:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBM2jscGd4Sszpv94XxHH2uqxMY9z21vaqHt2Zvtz7ZewRix2XzkDXsdWkNSmrhV7bjYNEvWAKCwgm1PSpXwFKPfTQxDEA8ZMSpgVKSpx6JVMEGT8hQ7h8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Joom]]></title><description><![CDATA[Hell]]></description><link>http://direct.ecency.com/seo/@seo-boss/joomla-security-update-information</link><guid isPermaLink="true">http://direct.ecency.com/seo/@seo-boss/joomla-security-update-information</guid><category><![CDATA[seo]]></category><dc:creator><![CDATA[seo-boss]]></dc:creator><pubDate>Thu, 09 May 2019 11:08:06 GMT</pubDate></item><item><title><![CDATA[Rettet Omas Computer]]></title><description><![CDATA[IT is key! Nein, ihr seid jetzt nicht in meinem Werbeblock gelandet. Aus gegebenem Anlass und weil ich es in meinem Artikel "Join the TEC Club" versprochen hatte, nehme ich mir heute mal die]]></description><link>http://direct.ecency.com/deutsch/@jeannedarc/rettet-omas-computer</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@jeannedarc/rettet-omas-computer</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[jeannedarc]]></dc:creator><pubDate>Sat, 27 Apr 2019 13:27:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQXmWvX7PgUi8ANPNhRjLAzrCiDp96oVfwFePFFLit1iMmsX9EJuW5Yw26SWyBLXNgPivESo3a6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber Security Rumble]]></title><description><![CDATA[In ca 20 Minuten beginnt die online Qualifikation zum Cyber Security Rumble Germany. Alle Studenten können sich unter anmelden. Wer es ins Finale schafft kann auch etwas gewinnen: Eine Reise zur Security]]></description><link>http://direct.ecency.com/deutsch/@darkstar-42/cyber-security-rumble</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@darkstar-42/cyber-security-rumble</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[darkstar-42]]></dc:creator><pubDate>Wed, 13 Mar 2019 08:41:30 GMT</pubDate></item><item><title><![CDATA[CSCG19 Online Qualifikation: Der erste Monat die ersten Aufgaben]]></title><description><![CDATA[Cyber Security Challenge Germany 2019 Online Qualifying 14 bis 20 Jahre AufgabentypNameSchwierigkeitsgrad Networking3045 Find the Tunnelmedium Malware/Android4282 Red Alert Malwareeasy Web Security7820]]></description><link>http://direct.ecency.com/deutsch/@darkstar-42/cscg19-online-qualifikation-der-erste-monat-die-ersten-aufgaben</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@darkstar-42/cscg19-online-qualifikation-der-erste-monat-die-ersten-aufgaben</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[darkstar-42]]></dc:creator><pubDate>Fri, 01 Mar 2019 08:11:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjVs3Hye1oHX44R9EcpQD5C9xXzj68nJaq3CeTy9cgpHkW4oJh1XHssqvFSMdzBNCwva4jgTYxE8mSuGigdDtSk9v4UKshRW4qmqvpbppGryk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Die CSCG19 Online Qualifikation startet in wenigen Tagen]]></title><description><![CDATA[Um direkt loslegen zu können wäre jetzt der richtige Zeitpunkt alle Tools auf den neuesten stand zu bringen. Anmelden könnt ihr euch unter]]></description><link>http://direct.ecency.com/it-security/@darkstar-42/die-cscg19-online-qualifikation-startet-in-wenigen-tagen</link><guid isPermaLink="true">http://direct.ecency.com/it-security/@darkstar-42/die-cscg19-online-qualifikation-startet-in-wenigen-tagen</guid><category><![CDATA[it-security]]></category><dc:creator><![CDATA[darkstar-42]]></dc:creator><pubDate>Wed, 27 Feb 2019 12:55:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjVs3Hye1oHX44R9EcpQD5C9xXzj68nJaq3CeTy9cgpHkW4oJh1XHssqvFSMdzBNCwva4jgTYxE8mSuGigdDtSk9v4UKshRW4qmqvpbppGryk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Bro IDS IP-based global whitelist for bro scripts]]></title><description><![CDATA[A Bro module that defines an IP-based global whitelist configuration file for all your bro scripts.]]></description><link>http://direct.ecency.com/bro/@rodrigokroll/bro-ids-ip-based-global-whitelist-for-bro-scripts</link><guid isPermaLink="true">http://direct.ecency.com/bro/@rodrigokroll/bro-ids-ip-based-global-whitelist-for-bro-scripts</guid><category><![CDATA[bro]]></category><dc:creator><![CDATA[rodrigokroll]]></dc:creator><pubDate>Sun, 03 Feb 2019 14:06:42 GMT</pubDate></item><item><title><![CDATA[Under Obama: US Became World’s Mega-Hub for Pedophilia]]></title><description><![CDATA[Heute komme ich euch mit einem sehr unerfreulichen Thema. Ich bringe das auf Steemit, damit niemand später sagen kann:“Ich habe nichts davon gewusst“. Vielleicht täusche ich mich – wie so oft – aber vielleicht]]></description><link>http://direct.ecency.com/deutsch/@jeannedarc/under-obama-us-became-world-s-mega-hub-for-pedophilia</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@jeannedarc/under-obama-us-became-world-s-mega-hub-for-pedophilia</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[jeannedarc]]></dc:creator><pubDate>Tue, 08 Jan 2019 19:23:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQBmXMAwVWe5gU3wHuafVMML8wMieV6cXGazq62cDCu1FgLDLtiwexD14NTMRc7GzbRUjwL3tm4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Top-5 IT Security Trends in 2018]]></title><description><![CDATA[Das Internet und die IT sind wichtige Hilfsmittel, die heute nicht mehr wegzudenken sind. Das gilt insbesondere für Unternehmen, die Buchhaltung, Bestellbearbeitung, E-Mail Verkehr, etc. über das World]]></description><link>http://direct.ecency.com/deutsch/@uruguru/top-5-it-security-trends-in-2018</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@uruguru/top-5-it-security-trends-in-2018</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[uruguru]]></dc:creator><pubDate>Sat, 15 Dec 2018 18:48:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBM2jscGd4Sszpv94XxHH2uqxMY9z21vaqHt2XUkQ3SQ6Vhqy6zHXS8VDuMuwWjUC8K2tF8fSfLcGmJqAXcU5xEx2PPHQNGrjBm5ztRp1TDp5ggaZfEtYE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Videoanleitung Cryptomator]]></title><description><![CDATA[Videoanleitung für das Tool Cryptomator. Mit Cryptomator können Sie ihre Daten verschlüsselt in der Cloud ablegen. ▶️ DTube ▶️ IPFS]]></description><link>http://direct.ecency.com/cryptomator/@lappen/f11lyfak</link><guid isPermaLink="true">http://direct.ecency.com/cryptomator/@lappen/f11lyfak</guid><category><![CDATA[cryptomator]]></category><dc:creator><![CDATA[lappen]]></dc:creator><pubDate>Sat, 22 Sep 2018 18:12:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBqwzwxM6L1P6uLNceBDDCM8YPWf6sgqp3Mzxyon7Y8tH1xt589K69bhbt2jo3ix5Q23mbV1Abzea8CfK62?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[EN] Theoretically Penetrationtesting #1]]></title><description><![CDATA[In this small series I would like to give a short introduction to the theoretical procedure of penetration tests. This series is divided into the following contributions: #1 What is penetration testing,]]></description><link>http://direct.ecency.com/penetrationtesting/@security101/en-theoretically-penetrationtesting-1</link><guid isPermaLink="true">http://direct.ecency.com/penetrationtesting/@security101/en-theoretically-penetrationtesting-1</guid><category><![CDATA[penetrationtesting]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Mon, 21 May 2018 09:07:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNchGPKLQuxAL7oEwDJ42cT977qXjChP5jf4TfSrJdhvxYgMExB7mCA52nz8G2JsViugML1KTvg5JQadM5EFwLPcpqnVdtgxadHwFndNW75he6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[7. IT Sicherheitskonferenz in Stralsund || Summary]]></title><description><![CDATA[Hallo liebe Steemians, wie einige am Dienstag schon entdeckt haben, fand an den beiden vergangenen Tagen bei uns an der Hochschule die 7. IT-Sicherheitskonferenz statt. Viele namhafte Unternehmen haben]]></description><link>http://direct.ecency.com/deutsch/@technotroll/7-it-sicherheitskonferenz-in-stralsund-or-or-summary</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@technotroll/7-it-sicherheitskonferenz-in-stralsund-or-or-summary</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[technotroll]]></dc:creator><pubDate>Thu, 17 May 2018 06:19:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eQoWqzbWqUcuEpzuSX7KLWdzbM8cChPRgei?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[EN] Linux file permissions - SUID]]></title><description><![CDATA[File permissions are a basic concept in Linux systems to manage permissions to write, read and execute files. In this article I would like to limit myself to a less common file right - the SUID-bit. By]]></description><link>http://direct.ecency.com/it-security/@security101/en-linux-file-permissions-suid</link><guid isPermaLink="true">http://direct.ecency.com/it-security/@security101/en-linux-file-permissions-suid</guid><category><![CDATA[it-security]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Sat, 05 May 2018 15:08:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/HNWT6DgoBc18GVREvvsnAjfLwLF5qHHFduNHKinq1Rex8do7kaNZD1Qb984ch3y6ESiMiqito5D9d815EWNQN8SfLD9EoSbfdZnPRk9uf1bfdTKhQGBya57mWZL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Software for lock up a disk (HDD/SDD)]]></title><description><![CDATA[Hey community, is there any software on the market which isn't already decoded by government?]]></description><link>http://direct.ecency.com/it-security/@otenmoten/software-for-lock-up-a-disk-hdd-sdd</link><guid isPermaLink="true">http://direct.ecency.com/it-security/@otenmoten/software-for-lock-up-a-disk-hdd-sdd</guid><category><![CDATA[it-security]]></category><dc:creator><![CDATA[otenmoten]]></dc:creator><pubDate>Tue, 10 Apr 2018 15:32:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP5xqHVTtgzxr9jRnPYTxeDK7ZMexdNdK5WosjB3bHyq6JXiwunyUgNw8mEW9aEoGdw7tKoeZC34AXJy6nh4ZSfwnLaojtJWvfv1iX8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[BSides Munich IT Security Conference (yesterday)]]></title><description><![CDATA[Thanks a lot to the team! It was a fun and learning event. Thanks also to our sponsors, especially Microsoft, for the excellent venue and superb lunch. There was a lot about the human factor in InfoSec]]></description><link>http://direct.ecency.com/cybersecurity/@erwin-muc/bsides-munich-it-security-conference-yesterday</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@erwin-muc/bsides-munich-it-security-conference-yesterday</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[erwin-muc]]></dc:creator><pubDate>Tue, 10 Apr 2018 10:42:54 GMT</pubDate></item><item><title><![CDATA[[EN] Bufferoverflow - Theoretical part]]></title><description><![CDATA[In a buffer overflow or buffer overflow, data that is often read in as user input is written to a memory area that was not intended for this purpose. As larger amounts of data are read in than actually]]></description><link>http://direct.ecency.com/it-security/@security101/en-bufferoverflow-theoretical-part</link><guid isPermaLink="true">http://direct.ecency.com/it-security/@security101/en-bufferoverflow-theoretical-part</guid><category><![CDATA[it-security]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Sat, 31 Mar 2018 10:02:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g774G2LPx8CTVHrbGQ778Sw45DBMcdCnbFSqd3szfuHce28nDod2iDVLASvAdUXoH7tYHCDWGrbs9ths5Dcq9XExw1yGzzgDb5MxKiuHNdtMcNUMsBPBLX6v43WdZg1zKuz5tBvR3DN6J6Pd3DfC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Vergleich von Sicherheits-Analysetools für Docker]]></title><description><![CDATA[Zu Zeiten der Cloud wird immer mehr auf Microservices umgestellt. Anwendungen laufen innerhalb isolierter Container, um Deployment und Management zu vereinfachen und sie sicherer zu machen. In der Arbeit]]></description><link>http://direct.ecency.com/docker/@anth0rx/vergleich-von-sicherheits-analysetools-fuer-docker</link><guid isPermaLink="true">http://direct.ecency.com/docker/@anth0rx/vergleich-von-sicherheits-analysetools-fuer-docker</guid><category><![CDATA[docker]]></category><dc:creator><![CDATA[anth0rx]]></dc:creator><pubDate>Fri, 30 Mar 2018 09:56:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/6gUbcKN7Uxen6Lx7vUXyhuetbxd5iL2i46wRK2KYrHaqG6ELhqSXkGKn8o415dTpBUbLb8?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>