<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 07:59:53 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/newshacker/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[delete post]]></title><description><![CDATA[delete post]]></description><link>http://direct.ecency.com/newshacker/@ranuganteng/new-ghosthook-attack-bypasses-windows-10-patchguard-protections</link><guid isPermaLink="true">http://direct.ecency.com/newshacker/@ranuganteng/new-ghosthook-attack-bypasses-windows-10-patchguard-protections</guid><category><![CDATA[newshacker]]></category><dc:creator><![CDATA[ranuganteng]]></dc:creator><pubDate>Sun, 25 Jun 2017 06:13:39 GMT</pubDate></item><item><title><![CDATA[delete post]]></title><description><![CDATA[delete post]]></description><link>http://direct.ecency.com/newshacker/@ranuganteng/british-parliament-hit-by-cyberattack-affecting-email-access-2017625t3831666z</link><guid isPermaLink="true">http://direct.ecency.com/newshacker/@ranuganteng/british-parliament-hit-by-cyberattack-affecting-email-access-2017625t3831666z</guid><category><![CDATA[newshacker]]></category><dc:creator><![CDATA[ranuganteng]]></dc:creator><pubDate>Sat, 24 Jun 2017 20:08:39 GMT</pubDate></item><item><title><![CDATA[What is the use of htaccess file in PHP?]]></title><description><![CDATA[@ranuganteng - htaccess stands for Hypertext Access and is a configuration file used by Apache-based web servers that manage live directories. htaccess file is a method to configure the website details]]></description><link>http://direct.ecency.com/newshacker/@ranuganteng/what-is-the-use-of-htaccess-file-in-php-2017619t124245922z</link><guid isPermaLink="true">http://direct.ecency.com/newshacker/@ranuganteng/what-is-the-use-of-htaccess-file-in-php-2017619t124245922z</guid><category><![CDATA[newshacker]]></category><dc:creator><![CDATA[ranuganteng]]></dc:creator><pubDate>Mon, 19 Jun 2017 05:43:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57stzCcFhWj7wg3tnqxkPok8chkAcLG9M8v5Xxzbtm74fA9Rx2S6iSbj2oGxS3o2CjDfsnds9MaVUMXN6hoQ3Ne?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Web application attacks: Remote code execution]]></title><description><![CDATA[PHP provides different functions which when called allow shell code execution on the server. This is a list of functions which are used for shell command execution: – system: Executes a command and returns]]></description><link>http://direct.ecency.com/newshacker/@ranuganteng/web-application-attacks-remote-code-execution-2017619t43247206z</link><guid isPermaLink="true">http://direct.ecency.com/newshacker/@ranuganteng/web-application-attacks-remote-code-execution-2017619t43247206z</guid><category><![CDATA[newshacker]]></category><dc:creator><![CDATA[ranuganteng]]></dc:creator><pubDate>Sun, 18 Jun 2017 21:32:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy6zvChRH7j9QCxXa7kn1JGAzPjCpQux5DQVYAwJRDprBEfycXTwQJG6DTXyq9FDbkhYg8wS3wyfivYpnXvZi3D84r9VdJCEBiSEaB9sYrcmoUjmnHUxznwJq4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The newest attack for stealing network data!]]></title><description><![CDATA[@ranuganteng - Israeli cyber security expert reveals the newest attack for stealing network data. Security researchers at the Ben-Gurion University of the Negev (BGU) found that attackers can secretly]]></description><link>http://direct.ecency.com/newshacker/@ranuganteng/the-newest-attack-for-stealing-network-data-2017619t42713778z</link><guid isPermaLink="true">http://direct.ecency.com/newshacker/@ranuganteng/the-newest-attack-for-stealing-network-data-2017619t42713778z</guid><category><![CDATA[newshacker]]></category><dc:creator><![CDATA[ranuganteng]]></dc:creator><pubDate>Sun, 18 Jun 2017 21:27:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP3vrQovkik6e66T8hnLhLPdqV7nVJzeRr5Sdvch7efXk337Lsrya9rEqtmuZp48iSw1eRmSa4yMVjBenLCYWQC3mdeNZwAW55p9NdU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Buckle confirms it suffered a credit card breach!]]></title><description><![CDATA[The Buckle, Inc. is a United States fashion retailer selling clothing, footwear, and accessories for men and women. The company operates 465 stores in 44 U.S. states. “On Friday morning, KrebsOnSecurity]]></description><link>http://direct.ecency.com/newshacker/@ranuganteng/buckle-confirms-it-suffered-a-credit-card-breach-2017618t9522173z</link><guid isPermaLink="true">http://direct.ecency.com/newshacker/@ranuganteng/buckle-confirms-it-suffered-a-credit-card-breach-2017618t9522173z</guid><category><![CDATA[newshacker]]></category><dc:creator><![CDATA[ranuganteng]]></dc:creator><pubDate>Sun, 18 Jun 2017 02:52:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/MG5aEqKFcQi8KqD2wHMZMi2fpbjkaL86Q4MBEhpiajpZfymNq2i5rAYcVK7tbzsmV8SfsBhRFQiwXng7xWZeW8DSM2DV2crEA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Be careful! your E-Cigarette can be used to hack your computer]]></title><description><![CDATA[Ross Bevington (a security researcher) found that an E-cigarette can hack a computer by fooling it to think that it was a keyboard. It was also able to hack the computer by interfering with its network]]></description><link>http://direct.ecency.com/newshacker/@ranuganteng/be-careful-your-e-cigarette-can-be-used-to-hack-your-computer-2017618t4561322z</link><guid isPermaLink="true">http://direct.ecency.com/newshacker/@ranuganteng/be-careful-your-e-cigarette-can-be-used-to-hack-your-computer-2017618t4561322z</guid><category><![CDATA[newshacker]]></category><dc:creator><![CDATA[ranuganteng]]></dc:creator><pubDate>Sat, 17 Jun 2017 21:56:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgaV8qiFuCTWkFvuu5WgJLySqUq4Ye72tSsp5JaXxUyES1JT1Vxo8SidJ1wquhcr9aUnqdCrhnDtA9B8RbpmoCZNRdCKh8wbiY3LmDJJitmn99ujDuiuQz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[New Fileless Ransomware with Code Injection Ability Detected in the Wild]]></title><description><![CDATA[It is no secret that hackers and cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day. While new forms of cybercrime are on the rise, traditional activities]]></description><link>http://direct.ecency.com/newshacker/@ranuganteng/new-fileless-ransomware-with-code-injection-ability-detected-in-the-wild-2017618t45021405z</link><guid isPermaLink="true">http://direct.ecency.com/newshacker/@ranuganteng/new-fileless-ransomware-with-code-injection-ability-detected-in-the-wild-2017618t45021405z</guid><category><![CDATA[newshacker]]></category><dc:creator><![CDATA[ranuganteng]]></dc:creator><pubDate>Sat, 17 Jun 2017 21:50:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAN4go2sfHhxN8z3b54Fx2?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>