<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 06 May 2026 13:41:06 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/scaning/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Network Attack Types]]></title><description><![CDATA[💐Please Read this full article for getting knowledge about types of attack that can be done by hacker.💐 You can also be a victim. Beware Criminals can pick from a long list of various network attack]]></description><link>http://direct.ecency.com/hacking/@kn12/network-attack-types-d882f9099cae5</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@kn12/network-attack-types-d882f9099cae5</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[kn12]]></dc:creator><pubDate>Wed, 03 Jan 2018 18:06:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAMgcMsWNYT58AJqeqrebx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[scaning hand]]></title><link>http://direct.ecency.com/scaning/@sahedihasan/scaning-hand</link><guid isPermaLink="true">http://direct.ecency.com/scaning/@sahedihasan/scaning-hand</guid><category><![CDATA[scaning]]></category><dc:creator><![CDATA[sahedihasan]]></dc:creator><pubDate>Fri, 13 Oct 2017 03:17:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/21PRtjKRXPQyotRPt1Hd7fPufGf1WCpCvB7qBKbTm9w1nm2M5jxj9JvuNeMkoaFz5NDRXATfgWsbfSC8QL7cEAvZYWCwarkwEMyFxiQYwd3cCm8DfzPptFSP2nGbhQm41uqW2xPU8Z7xhpRFbdY9TxS?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>