<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 13:54:35 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/network-security/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[DeceptionGrid 6.3 - Advanced threats defense]]></title><description><![CDATA[DeceptionGrid 6.3 Advanced threats defense Screenshots View ImageView ImageView Image Hunter's comment By dynamically baiting engaging & trapping attackers across networks, the TrapX DeceptionGrid]]></description><link>http://direct.ecency.com/steemhunt/@nigelmarkdias/deceptiongrid-6-3-advanced-threats-defense</link><guid isPermaLink="true">http://direct.ecency.com/steemhunt/@nigelmarkdias/deceptiongrid-6-3-advanced-threats-defense</guid><category><![CDATA[steemhunt]]></category><dc:creator><![CDATA[nigelmarkdias]]></dc:creator><pubDate>Sat, 08 Feb 2020 14:55:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/3RTd4iuWD6NV3bCZCHqGiZBWfaBqWFWG2T6XEV6Uh3UzvD6cCd2cmrFC1NjTmuxABh96LaBqahhYZKiyzMfTyVWUSaKs9MSzBJ2MMuCf46thzFBNi3fuVHCdAG4JYzsJ9vYW6cKRLgnTLcTefFMeE4evW7DcAbLmjVt6eN8uhNkHjU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Energy Re-Connect PdbU - Native Power over Ethernet Platform]]></title><description><![CDATA[Energy Re-Connect PdbU Native Power over Ethernet Platform Screenshots Hunter's comment The Energy Re-Connect PdbU (Power down back-up unit,) a native edge of network PoE (Power over Ethernet) platform]]></description><link>http://direct.ecency.com/steemhunt/@nigelmarkdias/energy-re-connect-pdbu-native-power-over-ethernet-platform</link><guid isPermaLink="true">http://direct.ecency.com/steemhunt/@nigelmarkdias/energy-re-connect-pdbu-native-power-over-ethernet-platform</guid><category><![CDATA[steemhunt]]></category><dc:creator><![CDATA[nigelmarkdias]]></dc:creator><pubDate>Wed, 04 Sep 2019 15:09:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/YpihifdXP4WTsLqXeoHFQ9j4kmbZ17dUyD8JZCDAXUBrfYBExjxgcdHzdeG8TVowXqxatUNt8ry64LUs9m4PmXEvNbdjg4ZpbWc2kiFKCcXGg52TbYEwLFZgBzH6kRxaNQLjPCzymkoBRACTExq33TSPAqR29cwtNiuDYc22tRmg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cigloo - Browser Isolation Management Platform]]></title><description><![CDATA[Cigloo Browser Isolation Management Platform Screenshots View ImageView Image Hunter's comment Acting like a web proxy between corporate users & the virtual technology environment, the Cigloo browsing]]></description><link>http://direct.ecency.com/steemhunt/@nigelmarkdias/cigloo-browser-isolation-management-platform</link><guid isPermaLink="true">http://direct.ecency.com/steemhunt/@nigelmarkdias/cigloo-browser-isolation-management-platform</guid><category><![CDATA[steemhunt]]></category><dc:creator><![CDATA[nigelmarkdias]]></dc:creator><pubDate>Tue, 13 Aug 2019 03:12:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/YpihifdXP4WTsLqXeoHFQ9j4kmbZ17dUyD8JZCDAXUBrfYBExjxgcdHzdeG8TVowXqxatUNt8ry64LUs9m4PmXEvNbdjg4ZpbWbx5VQPaiK4xY9nkfNe6JnhAHyyryCNiPQzVXR2F1NeakrKYPrnNYfLbCRBMxzi21nozUPckuAe?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Acalvio Shadowplex - Autonomous, Enterprise-Scale Distributed Deception Platform]]></title><description><![CDATA[Acalvio Shadowplex Autonomous, Enterprise-Scale Distributed Deception Platform Screenshots View ImageView ImageView Image Hunter's comment Designed for Enterprise IT, IoT & ICS environments; AI full]]></description><link>http://direct.ecency.com/steemhunt/@nigelmarkdias/acalvio-shadowplex-autonomous-enterprise-scale-distributed-deception-platform</link><guid isPermaLink="true">http://direct.ecency.com/steemhunt/@nigelmarkdias/acalvio-shadowplex-autonomous-enterprise-scale-distributed-deception-platform</guid><category><![CDATA[steemhunt]]></category><dc:creator><![CDATA[nigelmarkdias]]></dc:creator><pubDate>Thu, 25 Jul 2019 16:52:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/3RTd4iuWD6NV3bCZCHqGiZBWfaBqWFWG2T6XEV6Uh3UzvD6cCd2cmrFC1NjTmuxABh96LaBqahhYZKiyzMfTyVWUSaKs9MQjs5KeuThhFhGfA7mn18wzBacECXSE2yzwu3BBgYqX3zcksaZrR9LQzUr1bp9MLYcYCF852cQNyFHznJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[untangle - Delivers Simply Powerful Network Security]]></title><description><![CDATA[untangle Delivers Simply Powerful Network Security Screenshots Hunter's comment i just shared this great video this morning on steem about gaming router setup for optimizing your gaming network but i thought]]></description><link>http://direct.ecency.com/steemhunt/@teamhumble/untangle-delivers-simply-powerful-network-security</link><guid isPermaLink="true">http://direct.ecency.com/steemhunt/@teamhumble/untangle-delivers-simply-powerful-network-security</guid><category><![CDATA[steemhunt]]></category><dc:creator><![CDATA[teamhumble]]></dc:creator><pubDate>Thu, 23 May 2019 09:28:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/26uUsAjKTsXCQXme1bcTw2BcB8wEfASLRHYbWGzf9zSKSQEdxukYLMTWtN3yxJjZChW8VX3bT6ydwcmPuLEtrGzvBwij35C9vdyibcZ6r1zEFL5Ryh42jsnVatxereGC1S2yP8uYwrBA7y5JQwwH9tixcULD5eyT3Ds5CA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Global Cyber security as a Service Market: Network Security Services and Solution Segment Drives Demand Through 2025]]></title><description><![CDATA[Cyber security is one of the most talked about topic these days. With the advancement of the technology, the internet has made its place on the top of the priority list of everyone. Recently, a new study]]></description><link>http://direct.ecency.com/ict-industry/@ashina/global-cyber-security-as-a-service-market-network-security-services-and-solution-segment-drives-demand-through-2025</link><guid isPermaLink="true">http://direct.ecency.com/ict-industry/@ashina/global-cyber-security-as-a-service-market-network-security-services-and-solution-segment-drives-demand-through-2025</guid><category><![CDATA[ict-industry]]></category><dc:creator><![CDATA[ashina]]></dc:creator><pubDate>Mon, 26 Mar 2018 06:03:03 GMT</pubDate></item><item><title><![CDATA[Principles of Network Security & Cryptography]]></title><description><![CDATA[In this video tutorial we study the basic principles of Network security and also see the concept of Cryptography by understanding a basic example. Principles of Network Security to be discussed in this]]></description><link>http://direct.ecency.com/network-security/@simplesnippets/i0u1yumi</link><guid isPermaLink="true">http://direct.ecency.com/network-security/@simplesnippets/i0u1yumi</guid><category><![CDATA[network-security]]></category><dc:creator><![CDATA[simplesnippets]]></dc:creator><pubDate>Tue, 06 Mar 2018 12:02:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBqwzwxM6L1P6uLNceBDDCM6xu6SuchQqaW8bMZzUS2WQqTCoCHnZKczHJohPv1FUtzWQk79hsLEQ9DxpJk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Network Security - Basic Concepts Definitions & Types of Attacks]]></title><description><![CDATA[Click image to view this video on DTube This is a introductory video to a domain of Information technology that is Network security. Definition of Network Security: Network security is protection of the]]></description><link>http://direct.ecency.com/network-security/@simplesnippets/bs7lv8fu</link><guid isPermaLink="true">http://direct.ecency.com/network-security/@simplesnippets/bs7lv8fu</guid><category><![CDATA[network-security]]></category><dc:creator><![CDATA[simplesnippets]]></dc:creator><pubDate>Mon, 05 Mar 2018 11:13:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBqwzwxM6L1P6uLNceBDDCM6vJyAgGwZk7Lu8JWB4dc1cSDwj9SnQ4V6iZtx76aqzsbURrERyhETbqMeU4w?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Block PSExec.exe being running from remote computer]]></title><description><![CDATA[Hi, I Am Rohit Chauhan and today in this article we will see how to block psexec.exe being running from remote computer and for those who don't know what pstools is actually see this link let's get started]]></description><link>http://direct.ecency.com/windows-security/@rohitc9537/block-psexec-exe-being-running-from-remote-computer</link><guid isPermaLink="true">http://direct.ecency.com/windows-security/@rohitc9537/block-psexec-exe-being-running-from-remote-computer</guid><category><![CDATA[windows-security]]></category><dc:creator><![CDATA[rohitc9537]]></dc:creator><pubDate>Sun, 24 Dec 2017 04:39:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWPGGUiZ9pqnZoj8JHYxCCp9dtn2QVevNRW1tpdygQRjkkmmWhitu5xDbqnb2kAtd2TwxTLuKz2YP6hSxCGvDDprHdk7MUnDPvRPLw1Vi9U2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[The Library] North Korea and China Share Much More Than Shady Economic Ties: Bureau 21]]></title><description><![CDATA[China and North Korea Share More Than Shady Economic Ties: Bureau 21 Hey Library Readers! It's been a bit since I put anything up on here, much longer since it was Library material. Life has been busy,]]></description><link>http://direct.ecency.com/politics/@odinthelibrarian/the-library-north-kora-and-china-share-much-more-than-shady-economic-ties-bureau-21</link><guid isPermaLink="true">http://direct.ecency.com/politics/@odinthelibrarian/the-library-north-kora-and-china-share-much-more-than-shady-economic-ties-bureau-21</guid><category><![CDATA[politics]]></category><dc:creator><![CDATA[odinthelibrarian]]></dc:creator><pubDate>Fri, 07 Jul 2017 01:08:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/5CEvyaAfMXbTuaDgHTPfb5v4P45GoNxTu2jjzrkaTVA25rBiUesc1QG2ngv4kV6TwL4x437Mmmf99zqk2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[A Break For Politics] DoD Ban on Kaspersky Antivirus Software]]></title><description><![CDATA[Image Source Primary inspiration for this article This is a break for politics. I'll be taking these on occasion to break from the normal Library investigation to talk about something going on in the]]></description><link>http://direct.ecency.com/politics/@odinthelibrarian/a-break-for-politics-dod-ban-on-kaspersky-antivirus-software</link><guid isPermaLink="true">http://direct.ecency.com/politics/@odinthelibrarian/a-break-for-politics-dod-ban-on-kaspersky-antivirus-software</guid><category><![CDATA[politics]]></category><dc:creator><![CDATA[odinthelibrarian]]></dc:creator><pubDate>Sun, 02 Jul 2017 01:11:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYCsxNfc3nqovYVJ9BCM4795dekUuaSDnfZnwaR9zvEkzwxDwShQ1vNqQzZvcLNG2zB1UU11xqk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How Highschoolers Kinda Hacked the CIA -- The Library Presents: CWA]]></title><description><![CDATA[Threat Group: CWA Aliases Crackas With Attitude // DotGovs Criminal History: Social Engineering several high ranking government officials Posting Personally Identifiable Information (PII) of ~30k government]]></description><link>http://direct.ecency.com/hacking/@odinthelibrarian/how-highschoolers-kinda-hacked-the-cia-the-library-presents-cwa</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@odinthelibrarian/how-highschoolers-kinda-hacked-the-cia-the-library-presents-cwa</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[odinthelibrarian]]></dc:creator><pubDate>Sat, 01 Jul 2017 23:17:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYXPEiK5wzVWFFArTovVdcRsc4JfhsHvZQpisdKTMBmzAzbV2PJdn5tQa5CqDvDoznNuc2GvQMC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber Threat Analysis -- Why Do I Read A Chinese Language Forum 4+ Hours A Day?]]></title><description><![CDATA[I could wow you with a PR-style speech about how we are now in a new era. I could use the words cyber, nation-state, attribution, and other big-boy buzzwords that are populating the mainstream media today.]]></description><link>http://direct.ecency.com/introduceyourself/@odinthelibrarian/cyber-threat-analysis-why-do-i-read-a-chinese-language-forum-4-hours-a-day</link><guid isPermaLink="true">http://direct.ecency.com/introduceyourself/@odinthelibrarian/cyber-threat-analysis-why-do-i-read-a-chinese-language-forum-4-hours-a-day</guid><category><![CDATA[introduceyourself]]></category><dc:creator><![CDATA[odinthelibrarian]]></dc:creator><pubDate>Sat, 01 Jul 2017 21:09:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXa8rX7nb5ZhaHNfHmU5wdAwnHTikZ69hZb1hnZXBtLDVAZttU6ni3rdpFoanvKJGupreSY4XRzW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Who is Odin?]]></title><description><![CDATA[New readers, old readers, and those who are curious about who the hell does research on nation states hackers and script kiddies, I welcome you to The Library! Formerly on GitHub, The Library is my personal]]></description><link>http://direct.ecency.com/network-security/@odinthelibrarian/who-is-odin</link><guid isPermaLink="true">http://direct.ecency.com/network-security/@odinthelibrarian/who-is-odin</guid><category><![CDATA[network-security]]></category><dc:creator><![CDATA[odinthelibrarian]]></dc:creator><pubDate>Sat, 01 Jul 2017 20:41:33 GMT</pubDate></item></channel></rss>