<?phpxml version="1.0" encoding="utf-8"?>
<rss version="2.0" 
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
>
<channel>
<title>The Meetingpoint at Slavyanski.net / belindabatty / All</title>
<link>https://slavyanski.net/sb2020</link>
<description>Your Source for Social News and Networking</description>
<pubDate>Sat, 13 Aug 2022 04:47:53 +0000</pubDate>
<language>en</language>
<item>
	<title><![CDATA[types of computer viruses]]></title>
	<link>https://slavyanski.net/sb2020/story.php?title=types-of-computer-viruses-1</link>
	<source url="https://slavyanski.net/sb2020/story.php?title=types-of-computer-viruses-1"><![CDATA[types of computer viruses]]></source>
	<description><![CDATA[A computer virus is a piece of code that is developed to disrupt the typical performance of a computer system. Viruses can spread out rapidly and cause substantial damage to both private computers and networks. Some infections are harmless, while others can erase files, corrupt information, and even damage hardware. ]]></description>
	<pubDate>Sat, 13 Aug 2022 04:47:53 +0000</pubDate>
	<author>belindabatty</author>
	<category>News</category>
	<votes>1</votes>
	<guid>https://slavyanski.net/sb2020/story.php?title=types-of-computer-viruses-1</guid>
</item>

<item>
	<title><![CDATA[types of viruses in network security]]></title>
	<link>https://slavyanski.net/sb2020/story.php?title=types-of-viruses-in-network-security</link>
	<source url="https://slavyanski.net/sb2020/story.php?title=types-of-viruses-in-network-security"><![CDATA[types of viruses in network security]]></source>
	<description><![CDATA[A computer system infection is a piece of code that is designed to interrupt the regular functioning of a computer. Viruses can spread out quickly and trigger considerable damage to both individual computer systems and networks. Some viruses are harmless, while others can erase files, corrupt information, or even damage hardware. ]]></description>
	<pubDate>Sat, 13 Aug 2022 04:26:24 +0000</pubDate>
	<author>belindabatty</author>
	<category>News</category>
	<votes>1</votes>
	<guid>https://slavyanski.net/sb2020/story.php?title=types-of-viruses-in-network-security</guid>
</item>

<item>
	<title><![CDATA[computer worm examples]]></title>
	<link>https://slavyanski.net/sb2020/story.php?title=computer-worm-examples</link>
	<source url="https://slavyanski.net/sb2020/story.php?title=computer-worm-examples"><![CDATA[computer worm examples]]></source>
	<description><![CDATA[A trojan horse is a piece of code that is designed to interfere with the typical performance of a computer system. Infections can spread out quickly and trigger considerable damage to both private computer systems and networks. Some viruses are harmless, while others can delete files, corrupt information, or even damage hardware. ]]></description>
	<pubDate>Sat, 13 Aug 2022 03:58:57 +0000</pubDate>
	<author>belindabatty</author>
	<category>News</category>
	<votes>1</votes>
	<guid>https://slavyanski.net/sb2020/story.php?title=computer-worm-examples</guid>
</item>

</channel>
</rss>
