<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments for ITBlogSec.com	</title>
	<atom:link href="https://itblogsec.com/comments/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Tue, 26 May 2020 13:27:40 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>
		Comment on Facts About Crypto Mining and Transactions Easily Explained 2019 (INFOGRAPHIC) by Barbora		</title>
		<link>https://itblogsec.com/facts-about-crypto-mining-and-transactions-easily-explained-2019-infographic/#comment-195</link>

		<dc:creator><![CDATA[Barbora]]></dc:creator>
		<pubDate>Tue, 26 May 2020 13:27:40 +0000</pubDate>
		<guid isPermaLink="false">https://itblogsec.com/?p=1154#comment-195</guid>

					<description><![CDATA[I love you.]]></description>
			<content:encoded><![CDATA[<p>I love you.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Build own OpenVPN server by using raspberry Pi (Part1/2) by Hacking for beginners #1 - Install the Kali Linux - ITBlogSec.com		</title>
		<link>https://itblogsec.com/build-own-openvpn-server-by-using-raspberry-pi-12/#comment-191</link>

		<dc:creator><![CDATA[Hacking for beginners #1 - Install the Kali Linux - ITBlogSec.com]]></dc:creator>
		<pubDate>Tue, 05 May 2020 13:44:37 +0000</pubDate>
		<guid isPermaLink="false">http://itblogsec.com/?p=269#comment-191</guid>

					<description><![CDATA[[&#8230;] you can use any virtualization platform you want, even there is ARM Kali Linux image available for rapsbperry PI, you can download it [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] you can use any virtualization platform you want, even there is ARM Kali Linux image available for rapsbperry PI, you can download it [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Google hacking (dorking) tutorial #1 by Amelia Smith		</title>
		<link>https://itblogsec.com/google-hacking-dorking-tutorial-1/#comment-152</link>

		<dc:creator><![CDATA[Amelia Smith]]></dc:creator>
		<pubDate>Wed, 13 Nov 2019 10:03:45 +0000</pubDate>
		<guid isPermaLink="false">http://itblogsec.com/?p=584#comment-152</guid>

					<description><![CDATA[I would sincerely express my thanks to the writer for bringing something
to the online world which is completely new.]]></description>
			<content:encoded><![CDATA[<p>I would sincerely express my thanks to the writer for bringing something<br />
to the online world which is completely new.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Tcpdump cheat sheet by admin		</title>
		<link>https://itblogsec.com/tcpdump-cheat-sheet/#comment-92</link>

		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 29 Jan 2019 09:46:46 +0000</pubDate>
		<guid isPermaLink="false">http://itblogsec.com/?p=622#comment-92</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://itblogsec.com/tcpdump-cheat-sheet/#comment-91&quot;&gt;CSPS Protocol&lt;/a&gt;.

you&#039;re welcome, enjoy useful information ;)]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://itblogsec.com/tcpdump-cheat-sheet/#comment-91">CSPS Protocol</a>.</p>
<p>you&#8217;re welcome, enjoy useful information 😉</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Tcpdump cheat sheet by CSPS Protocol		</title>
		<link>https://itblogsec.com/tcpdump-cheat-sheet/#comment-91</link>

		<dc:creator><![CDATA[CSPS Protocol]]></dc:creator>
		<pubDate>Tue, 29 Jan 2019 09:43:24 +0000</pubDate>
		<guid isPermaLink="false">http://itblogsec.com/?p=622#comment-91</guid>

					<description><![CDATA[Thanks for sharing kind information.]]></description>
			<content:encoded><![CDATA[<p>Thanks for sharing kind information.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Google hacking (dorking) tutorial #1 by somnath		</title>
		<link>https://itblogsec.com/google-hacking-dorking-tutorial-1/#comment-74</link>

		<dc:creator><![CDATA[somnath]]></dc:creator>
		<pubDate>Tue, 04 Dec 2018 13:20:41 +0000</pubDate>
		<guid isPermaLink="false">http://itblogsec.com/?p=584#comment-74</guid>

					<description><![CDATA[i really like this tutorial waiting for the next one.]]></description>
			<content:encoded><![CDATA[<p>i really like this tutorial waiting for the next one.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Build own OpenVPN server by using raspberry Pi (Part2/2) by admin		</title>
		<link>https://itblogsec.com/build-own-openvpn-server-by-using-raspberry-pi-part22/#comment-19</link>

		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 04 Jul 2017 15:29:58 +0000</pubDate>
		<guid isPermaLink="false">http://itblogsec.com/?p=285#comment-19</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://itblogsec.com/build-own-openvpn-server-by-using-raspberry-pi-part22/#comment-14&quot;&gt;kenny&lt;/a&gt;.

Thank you Kenny, it has been fixed ;)]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://itblogsec.com/build-own-openvpn-server-by-using-raspberry-pi-part22/#comment-14">kenny</a>.</p>
<p>Thank you Kenny, it has been fixed 😉</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Build own OpenVPN server by using raspberry Pi (Part2/2) by kenny		</title>
		<link>https://itblogsec.com/build-own-openvpn-server-by-using-raspberry-pi-part22/#comment-14</link>

		<dc:creator><![CDATA[kenny]]></dc:creator>
		<pubDate>Sun, 21 May 2017 22:21:54 +0000</pubDate>
		<guid isPermaLink="false">http://itblogsec.com/?p=285#comment-14</guid>

					<description><![CDATA[Great tutorial, worked like a charm after others failed.  Using tunnelblick on mac.  Only had to identify and make one correction.. where you say &quot;# insert base64 blog from file Client1.key&quot; it should be &quot;# insert base64 blog from file Client1.aes256.key&quot; noting the aes256, as both Client1.key and Client1.aes256.key exist based on setup.]]></description>
			<content:encoded><![CDATA[<p>Great tutorial, worked like a charm after others failed.  Using tunnelblick on mac.  Only had to identify and make one correction.. where you say &#8220;# insert base64 blog from file Client1.key&#8221; it should be &#8220;# insert base64 blog from file Client1.aes256.key&#8221; noting the aes256, as both Client1.key and Client1.aes256.key exist based on setup.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/199 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-12-01 23:57:59 by W3 Total Cache
-->