<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 06 May 2026 04:50:59 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/u9852/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Unraveling the Wonders of Quantum Mechanics: Exploring the Quantum World]]></title><description><![CDATA[Welcome to a journey through the fascinating realm of quantum mechanics! In this article, we'll delve into the mind-bending concepts and revolutionary discoveries that have shaped our understanding of]]></description><link>http://direct.ecency.com/honouree/@ajcalcena12/unraveling-the-wonders-of-quantum-mechanics-exploring-the-quantum-world</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@ajcalcena12/unraveling-the-wonders-of-quantum-mechanics-exploring-the-quantum-world</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[ajcalcena12]]></dc:creator><pubDate>Tue, 09 Apr 2024 00:55:33 GMT</pubDate></item><item><title><![CDATA[Safeguarding Digital Asset: Overall guide to Information Security.]]></title><description><![CDATA[In today's generation where all communications, and transactions are being done online. the protection of sensitive personal information has become more important than before. Each of us needs to have]]></description><link>http://direct.ecency.com/honouree/@padz1313/safeguarding-digital-asset-overall-guide-to-information-security</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@padz1313/safeguarding-digital-asset-overall-guide-to-information-security</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[padz1313]]></dc:creator><pubDate>Mon, 08 Apr 2024 10:41:42 GMT</pubDate></item><item><title><![CDATA[Securing the Digital Realm: Understanding the Fundamentals of Information Security]]></title><description><![CDATA[In today's digital age, the importance of information security cannot be overstated. It becomes evident that the concept of information security is crucial for safeguarding sensitive data and ensuring]]></description><link>http://direct.ecency.com/honouree/@awwwwwwwwwww312/securing-the-digital-realm-understanding-the-fundamentals-of-information-security</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@awwwwwwwwwww312/securing-the-digital-realm-understanding-the-fundamentals-of-information-security</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[awwwwwwwwwww312]]></dc:creator><pubDate>Mon, 01 Apr 2024 15:49:51 GMT</pubDate></item><item><title><![CDATA[Secure Your Stuff: Information Security Made Simple]]></title><description><![CDATA[In our digital age, keeping our information and systems safe is more important than ever. This is where information security comes in. It's all about understanding the practices needed to protect our valuable]]></description><link>http://direct.ecency.com/honouree/@chldvch/secure-your-stuff-information-security-made-simple</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@chldvch/secure-your-stuff-information-security-made-simple</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[chldvch]]></dc:creator><pubDate>Sun, 31 Mar 2024 15:22:18 GMT</pubDate></item><item><title><![CDATA[Information Security: Making the Digital World a Safe haven]]></title><description><![CDATA[We are now living in a digital world where everything is interconnected. Revolutionizing how we live, work, and interact. Even our government is reliant on the internet, things such as public services,]]></description><link>http://direct.ecency.com/honouree/@lexuuuwu/information-security-making-the-digital-world-a-safe-haven</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@lexuuuwu/information-security-making-the-digital-world-a-safe-haven</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[lexuuuwu]]></dc:creator><pubDate>Sun, 31 Mar 2024 14:50:54 GMT</pubDate></item><item><title><![CDATA[Essentials of Information Security]]></title><description><![CDATA[Learning the basic and key concepts of information security is essential in this digital era. It helps us to keep our personal data secure from hackers. We can maintain the security of our data by being]]></description><link>http://direct.ecency.com/honouree/@mchljhnrj/understanding-information-security-essentials</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@mchljhnrj/understanding-information-security-essentials</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[mchljhnrj]]></dc:creator><pubDate>Sun, 31 Mar 2024 14:31:21 GMT</pubDate></item><item><title><![CDATA[The Digital World: A Student's Learning in Information Security]]></title><description><![CDATA[As a student navigating the vast landscape of information security, I find myself immersed in a world where every click, every download, and every login holds the potential for both opportunity and peril.]]></description><link>http://direct.ecency.com/honouree/@lanccyy12/the-digital-world-a-student-s-learning-in-information-security</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@lanccyy12/the-digital-world-a-student-s-learning-in-information-security</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[lanccyy12]]></dc:creator><pubDate>Sun, 31 Mar 2024 13:27:54 GMT</pubDate></item><item><title><![CDATA[The Importance of Cybersecurity in Today's Interconnected World]]></title><description><![CDATA[In the modern age, where information has become a valuable resource and cyber threats are everywhere, computer security is more important than ever. Many possible vulnerabilities exist in the computer]]></description><link>http://direct.ecency.com/honouree/@lloydryan1/the-importance-of-cybersecurity-in-today-s-interconnected-world</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@lloydryan1/the-importance-of-cybersecurity-in-today-s-interconnected-world</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[lloydryan1]]></dc:creator><pubDate>Sun, 31 Mar 2024 12:47:54 GMT</pubDate></item><item><title><![CDATA[Keeping Your Digital Stuff Safe: The Basics of Information Security]]></title><description><![CDATA[Hey there! Have you ever wondered how your online accounts and messages stay safe from hackers? Well, let me tell you about some cool people who work behind the scenes to make sure your digital stuff stays]]></description><link>http://direct.ecency.com/honouree/@xaze123/mar</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@xaze123/mar</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[xaze123]]></dc:creator><pubDate>Sun, 31 Mar 2024 12:24:30 GMT</pubDate></item><item><title><![CDATA[Information Security: A Forward to the Modern Era]]></title><description><![CDATA[Before we look at today's modernized way of cyber security, We have to look back on the past where the internet or network were not yet available in which people were mainly focused solely on providing]]></description><link>http://direct.ecency.com/honouree/@weehaxx/information-security-a-forward-to-the-modern-era</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@weehaxx/information-security-a-forward-to-the-modern-era</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[weehaxx]]></dc:creator><pubDate>Sun, 31 Mar 2024 11:50:42 GMT</pubDate></item><item><title><![CDATA[Understanding Computer Security Fundamentals]]></title><description><![CDATA[In the world of computing, where information holds significant power, ensuring its security stands as a vital priority. Throughout our course lessons, we delved into the fundamental aspects of computer]]></description><link>http://direct.ecency.com/honouree/@kayczns/understanding-computer-security-fundamentals</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@kayczns/understanding-computer-security-fundamentals</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[kayczns]]></dc:creator><pubDate>Sun, 31 Mar 2024 11:50:30 GMT</pubDate></item><item><title><![CDATA[The Silent Invaders: Tackling Malware and Software Threats]]></title><description><![CDATA[Technology is a big part on everyones daily life., especially computers and mobile devices. Technology is used by people for work, communication, entertainment, banking transactions, buying food, groceries,]]></description><link>http://direct.ecency.com/honouree/@cjvgldd1415/the-silent-invaders-tackling-malware-and-software-threats</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@cjvgldd1415/the-silent-invaders-tackling-malware-and-software-threats</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[cjvgldd1415]]></dc:creator><pubDate>Sun, 31 Mar 2024 10:58:15 GMT</pubDate></item><item><title><![CDATA[CYBER SECURITY: PROTECTING THE DIGITAL GOLD]]></title><description><![CDATA[Before the era of technologies, the civilizations have been recording data’s through writing in keeping them in shelves. How do they keep these data’s? Rewriting it over and over again. These method of]]></description><link>http://direct.ecency.com/honouree/@royeeengi/cyber-security-protecting-the-digital-gold</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@royeeengi/cyber-security-protecting-the-digital-gold</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[royeeengi]]></dc:creator><pubDate>Sun, 31 Mar 2024 07:56:06 GMT</pubDate></item><item><title><![CDATA[Secure Future]]></title><description><![CDATA[In this modern world every transaction is done in a digital way. From transferring cash, documents, letters and more it happens online through the use of the internet. What I have learned from week 1 isa]]></description><link>http://direct.ecency.com/honouree/@maescia1999/secure-future</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@maescia1999/secure-future</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[maescia1999]]></dc:creator><pubDate>Sun, 31 Mar 2024 07:11:09 GMT</pubDate></item><item><title><![CDATA[ Understanding Computer Security Fundamentals]]></title><description><![CDATA[In the world of computing, where information holds significant power, ensuring its security stands as a vital priority. Throughout our course lessons, we delved into the fundamental aspects of computer]]></description><link>http://direct.ecency.com/u9852/@kayczns/-understanding-computer-security-fundamentals</link><guid isPermaLink="true">http://direct.ecency.com/u9852/@kayczns/-understanding-computer-security-fundamentals</guid><category><![CDATA[u9852]]></category><dc:creator><![CDATA[kayczns]]></dc:creator><pubDate>Sat, 30 Mar 2024 20:02:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/4PYjjVwJ1UdtKm2UoLdRggqmP8si9jxVB3J5Gm5ocwLPr2CeQfQrmcFzTKR4uVv4q6KgsS6esvZr3no6m9JL3UccPgGcFrVNGXpgtjqCZb5?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Defenders of the Digital World]]></title><description><![CDATA[Information security, which is all about protecting our important digital stuff. It's like having a guard dog for your information, making sure no one can see, use, change, or destroy it without permission.]]></description><link>http://direct.ecency.com/honouree/@jehuaziz1111/defenders-of-the-digital-world</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@jehuaziz1111/defenders-of-the-digital-world</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[jehuaziz1111]]></dc:creator><pubDate>Sat, 30 Mar 2024 14:56:54 GMT</pubDate></item><item><title><![CDATA[Hackers, Malware, and More: Unveiling the Threats Lurking in Your System]]></title><description><![CDATA[In today's interconnected world, safeguarding digital assets has become paramount for individuals, organizations, and governments alike. As students delving into the realm of information security, it's]]></description><link>http://direct.ecency.com/honouree/@alphager/hackers-malware-and-more-unveiling-the-threats-lurking-in-your-system</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@alphager/hackers-malware-and-more-unveiling-the-threats-lurking-in-your-system</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[alphager]]></dc:creator><pubDate>Sat, 30 Mar 2024 14:49:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2923mN3pnd7PiNwC4SZeLRhDVTAfmVJHLuLE2GbfTzTtZnDYRo3TscFprHJLwJrZcgGEqw1mNBpDf7oSmdiB5R5DqT4Q69UrupggMXsL8gF3Qi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Guardians of Trust: The Importance of Security in all Platforms]]></title><description><![CDATA[In today’s world digital interconnectedness is dominating, the use of security is very important in all platforms. From mobile apps to websites, every platform is very useful to every user yet it is also]]></description><link>http://direct.ecency.com/honouree/@kressiah19/guardians-of-trust-the-importance-of-security-in-all-platfor</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@kressiah19/guardians-of-trust-the-importance-of-security-in-all-platfor</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[kressiah19]]></dc:creator><pubDate>Sat, 30 Mar 2024 13:52:18 GMT</pubDate></item><item><title><![CDATA[Cybersecurity: Safeguarding Our Digital Realm]]></title><description><![CDATA[Cybersecurity has become crucial in recent years. Many IT professionals now find their passion and career in this field. It has become vital for large companies to ensure the privacy and security of their]]></description><link>http://direct.ecency.com/hive-167922/@ielnard1234/cybersecurity-safeguarding-our-digital-realm</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@ielnard1234/cybersecurity-safeguarding-our-digital-realm</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[ielnard1234]]></dc:creator><pubDate>Sat, 30 Mar 2024 10:45:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjW4Pvz7KT3fErMxVcpdVC91eDNWXJab3sGjiXVy4136PGWH6Vd2DLfnT3BAqmES3zunnihr9u48uoniCpSqZPZu8LY7e7LksL6ywC3deBeDU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Information Security: A Key To Safe Space]]></title><description><![CDATA[Information security has become widely known throughout the world because of its advantages. With the rise of technology, people tend to use what is in the market, and is trending. Putting up photos, words,]]></description><link>http://direct.ecency.com/honouree/@kerby0807/information-security-a-key-to-safe-space</link><guid isPermaLink="true">http://direct.ecency.com/honouree/@kerby0807/information-security-a-key-to-safe-space</guid><category><![CDATA[honouree]]></category><dc:creator><![CDATA[kerby0807]]></dc:creator><pubDate>Sat, 30 Mar 2024 04:53:15 GMT</pubDate></item></channel></rss>