<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / tag / security</title>
<link>http://netvouz.com/tag/security?feed=rss</link>
<description>Bookmarks tagged with &quot;security&quot; on Netvouz</description>
<item><title>Privacy International</title>
<link>https://www.privacyinternational.org/</link>
<description></description>
<category domain="http://netvouz.com/trio?category=8657712030689267641"></category>
<author>trio</author>
<pubDate>Thu, 09 Feb 2012 21:11:36 GMT</pubDate>
</item><item><title>AnonOps Communications</title>
<link>http://anonops.blogspot.com/</link>
<description></description>
<category domain="http://netvouz.com/trio?category=8657712030689267641"></category>
<author>trio</author>
<pubDate>Tue, 07 Feb 2012 18:47:13 GMT</pubDate>
</item><item><title>Cameo Tutorials</title>
<link>http://cameotutorials.blogspot.com/2010/03/beginning-java-ee-6-tutorial-part-3.html</link>
<description>Beginning Java EE 6. JSF 2.0 Tutorial. Part 3. Implementing Security. Access Control Logic via Annotations</description>
<category domain="http://netvouz.com/jendrek?category=4240903439773046059">Programmierung &gt; Java &gt; JSF2</category>
<author>jendrek</author>
<pubDate>Mon, 06 Feb 2012 09:50:10 GMT</pubDate>
</item><item><title>Bobby Warner » Custom Security Checks in Grails</title>
<link>http://www.bobbywarner.com/2011/04/11/custom-security-checks-in-grails/</link>
<description></description>
<category domain="http://netvouz.com/jendrek?category=8831937437724487034">Programmierung &gt; Java &gt; Groovy+Grails</category>
<author>jendrek</author>
<pubDate>Sun, 29 Jan 2012 19:39:37 GMT</pubDate>
</item><item><title>The U.S. Cyber Consequences Unit</title>
<link>http://www.usccu.us/</link>
<description></description>
<category domain="http://netvouz.com/trio?category=8657712030689267641"></category>
<author>trio</author>
<pubDate>Sat, 28 Jan 2012 02:38:11 GMT</pubDate>
</item><item><title>Google Hacking Database, GHDB, Google Dorks</title>
<link>http://www.exploit-db.com/google-dorks/</link>
<description></description>
<category domain="http://netvouz.com/trio?category=8657712030689267641"></category>
<author>trio</author>
<pubDate>Fri, 27 Jan 2012 20:51:29 GMT</pubDate>
</item><item><title>Exploits Database by Offensive Security</title>
<link>http://www.exploit-db.com/</link>
<description></description>
<category domain="http://netvouz.com/trio?category=8657712030689267641"></category>
<author>trio</author>
<pubDate>Fri, 27 Jan 2012 20:41:24 GMT</pubDate>
</item><item><title>Metasploit Penetration Testing Software</title>
<link>http://www.metasploit.com/</link>
<description>Metasploit Framework | Metasploit Project</description>
<category domain="http://netvouz.com/trio?category=8657712030689267641"></category>
<author>trio</author>
<pubDate>Fri, 27 Jan 2012 20:37:14 GMT</pubDate>
</item><item><title>Proxy Browsing</title>
<link>http://www.proxybrowsing.com/</link>
<description>Anonymous Web Browser</description>
<category domain="http://netvouz.com/mechanic?category=3082353939134668984"></category>
<author>mechanic</author>
<pubDate>Tue, 17 Jan 2012 11:03:07 GMT</pubDate>
</item><item><title>Zone-H.org</title>
<link>https://www.zone-h.org/</link>
<description>Unrestricted information</description>
<category domain="http://netvouz.com/trio?category=8657712030689267641"></category>
<author>trio</author>
<pubDate>Sat, 14 Jan 2012 05:14:40 GMT</pubDate>
</item></channel></rss>