<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>history Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/tag/history/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/tag/history/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Mon, 04 May 2020 14:08:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>History timeline of Internet Security</title>
		<link>https://itblogsec.com/a-history-of-internet-security/</link>
					<comments>https://itblogsec.com/a-history-of-internet-security/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 03 Jan 2017 13:25:50 +0000</pubDate>
				<category><![CDATA[Other]]></category>
		<category><![CDATA[history]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=69</guid>

					<description><![CDATA[<p>The Internet grew over several decades to become a huge complex network as we know it today. Since the beginning there were attempts to compromise security and to receive a profit from leaked data. Explore some of the milestones in the development of our insecure online world.</p>
<p>The post <a href="https://itblogsec.com/a-history-of-internet-security/">History timeline of Internet Security</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>History timeline of Internet Security</h2>
<p style="text-align: justify;">The Internet grew over several decades to become a huge complex network as we know it today. Since the beginning there were attempts to compromise security and to receive a profit from leaked data. Explore some of the milestones in the development of our insecure online world.</p>
<blockquote>
<p>We are not makers of history. We are made by history.<br />
Martin Luther King, Jr.</p>
</blockquote>
<p><iframe src="https://cdn.knightlab.com/libs/timeline3/latest/embed/index.html?source=1gvyLCakf9S2URiSGFRywRAbYo6IvBdfc4gdZV1hQ7YI&amp;font=Default&amp;lang=en&amp;initial_zoom=0&amp;height=650" width="100%" height="650" frameborder="0"></iframe></p>
<p>&nbsp;</p>
<p>The post <a href="https://itblogsec.com/a-history-of-internet-security/">History timeline of Internet Security</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/a-history-of-internet-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/142 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-12-02 00:10:28 by W3 Total Cache
-->