<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: 5 Popular Hacking Techniques – Do you know your enemies? (Part 2)</title>
	<atom:link href="http://www.gfi.com/blog/5-popular-hacking-techniques-enemies-part-2/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies-part-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5-popular-hacking-techniques-enemies-part-2</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Kevin Brown</title>
		<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies-part-2/comment-page-1/#comment-17058</link>
		<dc:creator>Kevin Brown</dc:creator>
		<pubDate>Tue, 28 Dec 2010 05:29:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3043#comment-17058</guid>
		<description><![CDATA[@robert

True enough. I think it was actually here in the GFI blog that I read an article on internet security being likened to actual military warfare. As exaggerated as that analogy may sound, I think there’s a lot of truth in the comparison. As IT professionals, we have to be able to adapt to the constant demands of our industry (security or otherwise), just as soldiers would adapt to the ever changing conditions of the battlefield.]]></description>
		<content:encoded><![CDATA[<p>@robert</p>
<p>True enough. I think it was actually here in the GFI blog that I read an article on internet security being likened to actual military warfare. As exaggerated as that analogy may sound, I think there’s a lot of truth in the comparison. As IT professionals, we have to be able to adapt to the constant demands of our industry (security or otherwise), just as soldiers would adapt to the ever changing conditions of the battlefield.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: robert evengson</title>
		<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies-part-2/comment-page-1/#comment-15990</link>
		<dc:creator>robert evengson</dc:creator>
		<pubDate>Tue, 14 Dec 2010 16:33:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3043#comment-15990</guid>
		<description><![CDATA[&quot;Remember that security is an ongoing process, not a goal.&quot;

Fantastic point. I&#039;ve always seen system security as that holy grail that every admin strives for but never truly achieves. It&#039;s actually gotten to a point a few months ago where continuously updating our security protocols seemed utterly pointless. However, seeing security as something that continuously changes puts a different perspective things. In a strange way, we seem to have this unspoken relationship with these hackers. They adapt to us. We adapt to them.]]></description>
		<content:encoded><![CDATA[<p>&#8220;Remember that security is an ongoing process, not a goal.&#8221;</p>
<p>Fantastic point. I&#8217;ve always seen system security as that holy grail that every admin strives for but never truly achieves. It&#8217;s actually gotten to a point a few months ago where continuously updating our security protocols seemed utterly pointless. However, seeing security as something that continuously changes puts a different perspective things. In a strange way, we seem to have this unspoken relationship with these hackers. They adapt to us. We adapt to them.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Giselle Borg Olivier</title>
		<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies-part-2/comment-page-1/#comment-15369</link>
		<dc:creator>Giselle Borg Olivier</dc:creator>
		<pubDate>Fri, 10 Dec 2010 09:39:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3043#comment-15369</guid>
		<description><![CDATA[Hi Pauline,

Yes you&#039;re right. We usually do that; I guess this one must&#039;ve escaped! Thanks for letting us know :)]]></description>
		<content:encoded><![CDATA[<p>Hi Pauline,</p>
<p>Yes you&#8217;re right. We usually do that; I guess this one must&#8217;ve escaped! Thanks for letting us know <img src='http://www.gfi.com/blog/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pauline</title>
		<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies-part-2/comment-page-1/#comment-15328</link>
		<dc:creator>Pauline</dc:creator>
		<pubDate>Fri, 10 Dec 2010 04:22:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3043#comment-15328</guid>
		<description><![CDATA[Good to see the 2nd part of the article being finally posted. However, it did take me awhile to find it. For future posts, would be possible to get the link to the second part included at the bottom of the first article? And vice versa? I do regularly read the articles on this blog and I appreciate the longer pieces being broken up into segments. But would surely help if the previous articles are linked in the body of the text. Thanks!]]></description>
		<content:encoded><![CDATA[<p>Good to see the 2nd part of the article being finally posted. However, it did take me awhile to find it. For future posts, would be possible to get the link to the second part included at the bottom of the first article? And vice versa? I do regularly read the articles on this blog and I appreciate the longer pieces being broken up into segments. But would surely help if the previous articles are linked in the body of the text. Thanks!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sue Walsh</title>
		<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies-part-2/comment-page-1/#comment-14688</link>
		<dc:creator>Sue Walsh</dc:creator>
		<pubDate>Wed, 01 Dec 2010 04:01:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3043#comment-14688</guid>
		<description><![CDATA[When I set up a wireless network in my office I installed a firewall with an intrusion detection feature. It was really stunning to see how many port scans and ping sweeps hit my network every day. The firewall and network security blocked them all but still, it was amazing to see first hand that our networks are *constantly* under attack.]]></description>
		<content:encoded><![CDATA[<p>When I set up a wireless network in my office I installed a firewall with an intrusion detection feature. It was really stunning to see how many port scans and ping sweeps hit my network every day. The firewall and network security blocked them all but still, it was amazing to see first hand that our networks are *constantly* under attack.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 07:03:48 by W3 Total Cache --