<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sun, 12 Apr 2026 16:02:42 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/itsecurity/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[(Information Assurance Security)]]></title><description><![CDATA[What is an Information Security Assurance?| It is a combination of appliances,system, and solutions,software, alarms, and vulnerability scans working together. Security is also for PPT (People, Processes,]]></description><link>http://direct.ecency.com/hive-122108/@infotech24/information-assurance-security</link><guid isPermaLink="true">http://direct.ecency.com/hive-122108/@infotech24/information-assurance-security</guid><category><![CDATA[hive-122108]]></category><dc:creator><![CDATA[infotech24]]></dc:creator><pubDate>Sat, 16 Oct 2021 09:41:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/5s4dzRwnVbzGY5ssnCE4wXzkeAEXyVtgk1ApQTwHMTp6y5PvEo1yennABzFqEnfQmTbT4L3RE1BBmDYh4pWhzr14X3KpZGrHeFnddX65xzpZfsJVCU1jadbAwTnxB9LSqcfwgqYb7N95Xb1u1k6Q2KkVzTXtdTfmm89siXg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Is online education helps to hackers to collect data?]]></title><description><![CDATA[These days online education has became a trend and everyone is enrolling to studying online through their Laptop, Personal Computer, Tab/iPad or Smartphone. Actually due to Covid19 pandemic students are]]></description><link>http://direct.ecency.com/hive-175254/@face2face/is-online-education-helps-to-hackers-to-collect-data</link><guid isPermaLink="true">http://direct.ecency.com/hive-175254/@face2face/is-online-education-helps-to-hackers-to-collect-data</guid><category><![CDATA[hive-175254]]></category><dc:creator><![CDATA[face2face]]></dc:creator><pubDate>Mon, 11 May 2020 11:14:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/4HFqJv9qRjVekJZpULGprYBunCL6A66L91oPNEzJVWgJeHKxqakdmvHPUauWQRUKoZEdEGX4J86Rn53J8rpgrRZ5hPQmcvYuLjKUm9x47vNeLPqJ4t3hD5izrjBsQpgifUDHxegfm9vdUTNgdTp7NpmtTnuf8DoBBnW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Lightning Release]]></title><description><![CDATA[Summary We have released a new release that is improvingthe speed in our web interface a lot.As well as removing duplicate vulnerabilitieson focusing more on quality.You can check it out your self]]></description><link>http://direct.ecency.com/vulnerabilitiy/@firosolutions/lightning-release</link><guid isPermaLink="true">http://direct.ecency.com/vulnerabilitiy/@firosolutions/lightning-release</guid><category><![CDATA[vulnerabilitiy]]></category><dc:creator><![CDATA[firosolutions]]></dc:creator><pubDate>Fri, 21 Feb 2020 15:34:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/axopD2eJJx4XNhMSpRTSQRxpQXQYtaLrvBT9GEkCvTdtLT5LJYG2A23sMrZ4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Humble Bundle - Hacking Bundle]]></title><description><![CDATA[Vielleicht Interessiert es den ein oder anderen, für 15 Dollar(13 Euro) gibt es gerade 14 größtenteils gute oder zumindest brauchbare Bücher zu verschiedenen Themen aus der IT Security. Der eigentliche]]></description><link>http://direct.ecency.com/deutsch/@satren/humble-bundle-hacking-bundle</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@satren/humble-bundle-hacking-bundle</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[satren]]></dc:creator><pubDate>Wed, 29 May 2019 16:54:30 GMT</pubDate></item><item><title><![CDATA[Cyber Security Predictions- What to Expect in 2018]]></title><description><![CDATA[#Advertising #LevelNet #tokensale : The company #LevelNet has become very promising, it is now profitable to invest in #ICO and increase its capital! Do not lose this opportunity! Earn while they give]]></description><link>http://direct.ecency.com/cyberattacks/@mediastudycenter/cyber-security-predictions-what-to-expect-in-2018</link><guid isPermaLink="true">http://direct.ecency.com/cyberattacks/@mediastudycenter/cyber-security-predictions-what-to-expect-in-2018</guid><category><![CDATA[cyberattacks]]></category><dc:creator><![CDATA[mediastudycenter]]></dc:creator><pubDate>Fri, 11 May 2018 11:09:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVZ5NRzV2o8MyJEzowAL6rjbt8w3dTHcAiwqVHnURt6gX36hXLq2mRkW7qg9vreDCjFHxP11fML6CWGeATZETd2j47uoXaYC9nVroWLfKFU66CN2V74?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Current Top 3 "Bug Out" Books]]></title><description><![CDATA[Saanich Ethnobotany Applied Cryptography (2nd edition) John Ross's Unintended Consequences]]></description><link>http://direct.ecency.com/trump/@somena/current-top-3-bug-out-books</link><guid isPermaLink="true">http://direct.ecency.com/trump/@somena/current-top-3-bug-out-books</guid><category><![CDATA[trump]]></category><dc:creator><![CDATA[somena]]></dc:creator><pubDate>Fri, 23 Mar 2018 08:33:06 GMT</pubDate></item><item><title><![CDATA[Steem IT Security : Luminosity RAT projection by governments]]></title><description><![CDATA[The authorities have shut down the famous Luminosity RAT, which is known to penetrate devices and can not be accessed by users anymore. In a joint operation, law enforcement authorities from Australia,]]></description><link>http://direct.ecency.com/itsecurity/@ilyess/steem-it-security-luminosity-rat-projection-by-governments</link><guid isPermaLink="true">http://direct.ecency.com/itsecurity/@ilyess/steem-it-security-luminosity-rat-projection-by-governments</guid><category><![CDATA[itsecurity]]></category><dc:creator><![CDATA[ilyess]]></dc:creator><pubDate>Thu, 08 Feb 2018 18:14:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/7NqGr5y7HSV2UHNdR3CV919xze9G4P5Av13qP6kx8Gw2ueefUooJmZ9EQryKr1CiP5UtxB5enjnayheBjF6HCtaEGvATogDbZckCmggEUexG8zqBfFmPzTTaBtmj55gnBzQmxpCpf1EynNcDFkFgPb4xViPm74ZQv3vG7XecJGiwJsPYCgpLDZ9wBiBNYrMhguQkJKt8z7pYQ6H2vCfg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Primer on the OpenSSL “Heartbleed” Vulnerability]]></title><description><![CDATA[This is an older article I wrote somewhere else, but I felt that it might be helpful for people who wanted to learn a bit more about the vulnerability. While this is less of an issue now, it is the type]]></description><link>http://direct.ecency.com/itsecurity/@branniganslaw/primer-on-the-openssl-heartbleed-vulnerability</link><guid isPermaLink="true">http://direct.ecency.com/itsecurity/@branniganslaw/primer-on-the-openssl-heartbleed-vulnerability</guid><category><![CDATA[itsecurity]]></category><dc:creator><![CDATA[branniganslaw]]></dc:creator><pubDate>Mon, 29 Jan 2018 16:06:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXZovo97HguKLQdfLnFRzdMDc8Szi7ZAGVvwmZpM45Dq8zBaNLycEEYbc2Vpwjdwur2CJvMWTaCe?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What Podcasts do you listen to?]]></title><description><![CDATA[Over the years I have really come to enjoy a wide variety of podcasts. They provide such a wide variety of topics and personalities, and they are easily portable on your favorite device. Podcasts are now]]></description><link>http://direct.ecency.com/podcasts/@branniganslaw/what-podcasts-do-you-listen-to</link><guid isPermaLink="true">http://direct.ecency.com/podcasts/@branniganslaw/what-podcasts-do-you-listen-to</guid><category><![CDATA[podcasts]]></category><dc:creator><![CDATA[branniganslaw]]></dc:creator><pubDate>Thu, 25 Jan 2018 11:32:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXZp5PgzdzF5J7n6Um2ikZT9wRjT1YFU5mpgTwCouspXAv8ssmtqezk84agqZCkykvSmtkV9xtQn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Google Cloud Shell]]></title><description><![CDATA[If you have ever needed access to a Linux shell in the browser then you may be interested in the Google Cloud Shell: I only just found out about it, so I would bet that a lot of people have not heard of]]></description><link>http://direct.ecency.com/technology/@branniganslaw/google-cloud-shell</link><guid isPermaLink="true">http://direct.ecency.com/technology/@branniganslaw/google-cloud-shell</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[branniganslaw]]></dc:creator><pubDate>Wed, 24 Jan 2018 15:14:30 GMT</pubDate></item><item><title><![CDATA[Hello World]]></title><description><![CDATA[I just got started with Steemit, and so this is my introduction post, and as someone trained in computer programming I could think of no better way to start it, than with the traditional "Hello]]></description><link>http://direct.ecency.com/introduceyourself/@branniganslaw/hello-world</link><guid isPermaLink="true">http://direct.ecency.com/introduceyourself/@branniganslaw/hello-world</guid><category><![CDATA[introduceyourself]]></category><dc:creator><![CDATA[branniganslaw]]></dc:creator><pubDate>Wed, 24 Jan 2018 14:32:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYX9KhMX3VEZ7wkVhptKfzW5Pah9nTZo6HCtKJ3hv2o4NQKrYuZy8LUe3udGAxs18r1zUpWs1mp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Check Point Certified Security Expert Exam]]></title><description><![CDATA[Hello guys, There has been 18 days away from here. i was at course during this time. im going to take ccse exam tomorrow. Any luck wish will be apreciated. If here is anybody who is gonna take the exam]]></description><link>http://direct.ecency.com/checkpoint/@ahka/check-point-certified-security-expert-exam</link><guid isPermaLink="true">http://direct.ecency.com/checkpoint/@ahka/check-point-certified-security-expert-exam</guid><category><![CDATA[checkpoint]]></category><dc:creator><![CDATA[ahka]]></dc:creator><pubDate>Sun, 07 Jan 2018 21:07:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/EEEoA7hJqJarK9F8wwqhEtBgJCoTAbjUyfw3ZT6Ttv6QcEW6f4iRpFp4K1CUA5vZbtTzGftErVD41bMBVVJtzqV69C1eWyUaQ5vUeKoZhT5QQBBuYC5YtZApCH7swN633ny3N7NPFHwRfkQGPYFev?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Attracting the younger generation to IT Security]]></title><description><![CDATA[The IT security field is growing rapidly. More and more stuff is being connected to the internet, and existing services are expanding at a rapid pace. Consequently, there is a growing demand for IT security]]></description><link>http://direct.ecency.com/itsecurity/@jclohanx/attracting-the-younger-generation-to-it-security</link><guid isPermaLink="true">http://direct.ecency.com/itsecurity/@jclohanx/attracting-the-younger-generation-to-it-security</guid><category><![CDATA[itsecurity]]></category><dc:creator><![CDATA[jclohanx]]></dc:creator><pubDate>Sun, 29 Oct 2017 00:44:30 GMT</pubDate></item><item><title><![CDATA[How detect if a program is a virus without an antivirus | Come vedere se un programma è un virus senza un antivirus]]></title><description><![CDATA[Have you ever downloaded a file with the fear of getting a virus? Well, I have. By googling on the Internet I discovered a way to found out if the downloaded program is a bad one. You may say that antiviruses]]></description><link>http://direct.ecency.com/technology/@crob98/how-detect-if-a-program-is-a-virus-without-an-antivirus-or-come-vedere-se-un-programma-e-un-virus-senza-un-antivirus</link><guid isPermaLink="true">http://direct.ecency.com/technology/@crob98/how-detect-if-a-program-is-a-virus-without-an-antivirus-or-come-vedere-se-un-programma-e-un-virus-senza-un-antivirus</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[crob98]]></dc:creator><pubDate>Wed, 20 Sep 2017 13:30:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLyAJMrzqHfWLT7YbdgoprDQGwdeDRwrKMB9CJjjMu3wFYvtaw7we8nFuVv1U5rMCMWAMvpDWFApDUgAbw5VEv7eaugSwSQgpKGjpRyisW8mnKDNrK12hSfLc9t?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Android: Hack NFC-Credit-Cards (NFCproxy)]]></title><link>http://direct.ecency.com/netsec/@vector/android-hack-nfc-credit-cards-nfcproxy</link><guid isPermaLink="true">http://direct.ecency.com/netsec/@vector/android-hack-nfc-credit-cards-nfcproxy</guid><category><![CDATA[netsec]]></category><dc:creator><![CDATA[vector]]></dc:creator><pubDate>Tue, 20 Jun 2017 14:34:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eMAqKjuT5fi2a9kEt63a96DV89CkqgYvvXG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Metasploit: Exploit Eternalblue (Windows 7 & Server 8r2 RCE) MS17-010]]></title><link>http://direct.ecency.com/netsec/@vector/metasploit-exploit-eternalblue-windows-7-and-server-8r2-rce-ms17-010</link><guid isPermaLink="true">http://direct.ecency.com/netsec/@vector/metasploit-exploit-eternalblue-windows-7-and-server-8r2-rce-ms17-010</guid><category><![CDATA[netsec]]></category><dc:creator><![CDATA[vector]]></dc:creator><pubDate>Tue, 20 Jun 2017 14:27:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eKY7ZQ19awiyP3NCv8DCTom9fNW2fdrNXZQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to find a safe and trusted information technology source on internet]]></title><description><![CDATA[After 2012 the Information technology system becoming a very important part of every company or individuals sectors. The Scam or fraud, unsecured and fake information resources are also growing with this]]></description><link>http://direct.ecency.com/security/@sunnythakur9/how-to-find-a-safe-and-trusted-information-technology-source-on-internet</link><guid isPermaLink="true">http://direct.ecency.com/security/@sunnythakur9/how-to-find-a-safe-and-trusted-information-technology-source-on-internet</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[sunnythakur9]]></dc:creator><pubDate>Fri, 16 Jun 2017 04:43:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/2923mN3pnd7PrxqAS8My84z8QnDpEsSBnKFsBYXvnARG8rNsC2MeC7Bh2CQQJvS4vFaGeH58wbjU9JwoQwA1qZ1cgw8YJgzXAWghbPMSBSRauk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[New Advanced Vulnerability Scanning Reporting Videos]]></title><description><![CDATA[New Penetrator Features new advanced Vulnerability Scanning Reporting CLICK HERE ?? Be sure to subscribe to SecPoint's YouTube channel, watch some of the previous videos and Playlists, and look us up on]]></description><link>http://direct.ecency.com/secpoint/@secpoint/new-advanced-vulnerability-scanning-reporting-videos</link><guid isPermaLink="true">http://direct.ecency.com/secpoint/@secpoint/new-advanced-vulnerability-scanning-reporting-videos</guid><category><![CDATA[secpoint]]></category><dc:creator><![CDATA[secpoint]]></dc:creator><pubDate>Wed, 12 Apr 2017 14:58:30 GMT</pubDate></item><item><title><![CDATA[Constant Hack warnings prompt cyber 'security fatigue' resulting in people becoming complacent.]]></title><description><![CDATA[ Relentless cybersecurity warnings have given people "security fatigue" that stops them keeping themselves safe, suggests a study.Many ignored warnings they received, found the US National Institute]]></description><link>http://direct.ecency.com/itsecurity/@wpalczynski/constant-hack-warnings-prompt-cyber-security-fatigue-resulting-in-people-becoming-complacent</link><guid isPermaLink="true">http://direct.ecency.com/itsecurity/@wpalczynski/constant-hack-warnings-prompt-cyber-security-fatigue-resulting-in-people-becoming-complacent</guid><category><![CDATA[itsecurity]]></category><dc:creator><![CDATA[wpalczynski]]></dc:creator><pubDate>Thu, 06 Oct 2016 14:48:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQbWfyXBn6ozs7MSbkpZP3KDF5LvADGeSQvNMHvBWuZ26HU3T9vneimxmwrdP7xCeTfirJKEWZRqspdSGpJGLooSqwjD4pV2ReH2RQCgmGEqDpJr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Attack Sweet32 allows you to retrieve data to and from https and openvpn]]></title><description><![CDATA[Researchers from the French State Institute for Informatics and Automation Research (INRIA) have published a detailed report on new bugs , work-related 64 -bit cipher Triple DES (3DES) and Blowfish. Operation]]></description><link>http://direct.ecency.com/itsecurity/@ultratech/attack-sweet32-allows-you-to-retrieve-data-to-and-from-https-and-openvpn</link><guid isPermaLink="true">http://direct.ecency.com/itsecurity/@ultratech/attack-sweet32-allows-you-to-retrieve-data-to-and-from-https-and-openvpn</guid><category><![CDATA[itsecurity]]></category><dc:creator><![CDATA[ultratech]]></dc:creator><pubDate>Fri, 26 Aug 2016 12:38:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/368La1qZAv72k4UwDAU3myqZtHGnmTEYRWcbDAoGqbAQnovKcDiE2a7s22U1HyuwZk9LqqySsDxnhzchyDpSx2Mt?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>