<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Protecting</title> <atom:link href="https://www.iphere.com/tag/protecting/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Protecting Yourself From NSA Web Surveillance</title><link>https://www.iphere.com/protecting-yourself-from-nsa-web-surveillance</link> <comments>https://www.iphere.com/protecting-yourself-from-nsa-web-surveillance#comments</comments> <pubDate>Thu, 12 Sep 2013 02:13:04 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[from]]></category> <category><![CDATA[Protecting]]></category> <category><![CDATA[Surveillance]]></category> <category><![CDATA[Yourself]]></category> <guid
isPermaLink="false">http://www.iphere.com/protecting-yourself-from-nsa-web-surveillance</guid> <description><![CDATA[After new reports of NSA digital snooping, security expert Bruce Schneier advises Internet users to use public-domain encryption. Meanwhile, Google steps up its encryption efforts. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/protecting-yourself-from-nsa-web-surveillance/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Replication Key To Protecting Data</title><link>https://www.iphere.com/replication-key-to-protecting-data</link> <comments>https://www.iphere.com/replication-key-to-protecting-data#comments</comments> <pubDate>Fri, 16 Sep 2011 08:12:58 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[data]]></category> <category><![CDATA[Protecting]]></category> <category><![CDATA[Replication]]></category> <guid
isPermaLink="false">http://www.iphere.com/replication-key-to-protecting-data</guid> <description><![CDATA[IT&#8217;s role in keeping an organization&#8217;s doors open for business rest on a tripod &#8211; business continuity, disaster recovery and high availability &#8211; and increasingly these initiatives are being supported by replication technologies, says senior analyst David Chapa, Enterprise Strategy Group. The author of Replication Technologies for Business Continuity and Disaster Recovery, says this trio [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/replication-key-to-protecting-data/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>