<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: stepcellwolf</title><link>https://news.ycombinator.com/user?id=stepcellwolf</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 15 May 2026 17:18:17 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=stepcellwolf" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by stepcellwolf in "Apple Watch Series 3"]]></title><description><![CDATA[
<p>I will buy it only when they fix the issue swimming in an ocean and loosing your watch. It happens to me in an open ocean. First fix the wrist and then I'll buy a new one.</p>
]]></description><pubDate>Wed, 20 Sep 2017 14:32:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=15294145</link><dc:creator>stepcellwolf</dc:creator><comments>https://news.ycombinator.com/item?id=15294145</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15294145</guid></item><item><title><![CDATA[What is Risk Assessment?]]></title><description><![CDATA[
<p>Article URL: <a href="http://predragtasevski.com/cyber-risk/what-is-risk-assessment/">http://predragtasevski.com/cyber-risk/what-is-risk-assessment/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=7457266">https://news.ycombinator.com/item?id=7457266</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 24 Mar 2014 08:47:11 +0000</pubDate><link>http://predragtasevski.com/cyber-risk/what-is-risk-assessment/</link><dc:creator>stepcellwolf</dc:creator><comments>https://news.ycombinator.com/item?id=7457266</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7457266</guid></item><item><title><![CDATA[Human rights vs data protection]]></title><description><![CDATA[
<p>Article URL: <a href="http://predragtasevski.com/cybersecurity/human-rights-vs-data-protection/">http://predragtasevski.com/cybersecurity/human-rights-vs-data-protection/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=7050198">https://news.ycombinator.com/item?id=7050198</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 13 Jan 2014 12:42:24 +0000</pubDate><link>http://predragtasevski.com/cybersecurity/human-rights-vs-data-protection/</link><dc:creator>stepcellwolf</dc:creator><comments>https://news.ycombinator.com/item?id=7050198</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7050198</guid></item><item><title><![CDATA[Penetration Testing vs. Vulnerability Assessment]]></title><description><![CDATA[
<p>Article URL: <a href="http://predragtasevski.com/cybersecurity/penetration-testing/penetration-testing-vs-vulnerability-assessment/">http://predragtasevski.com/cybersecurity/penetration-testing/penetration-testing-vs-vulnerability-assessment/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=6714949">https://news.ycombinator.com/item?id=6714949</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 11 Nov 2013 23:58:01 +0000</pubDate><link>http://predragtasevski.com/cybersecurity/penetration-testing/penetration-testing-vs-vulnerability-assessment/</link><dc:creator>stepcellwolf</dc:creator><comments>https://news.ycombinator.com/item?id=6714949</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=6714949</guid></item><item><title><![CDATA[How to identify and remove Malware or suspicious code in WordPress site]]></title><description><![CDATA[
<p>Article URL: <a href="http://predragtasevski.com/wordpress/how-to-identify-malware-or-suspicious-code-in-wordpress-site/">http://predragtasevski.com/wordpress/how-to-identify-malware-or-suspicious-code-in-wordpress-site/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=6200594">https://news.ycombinator.com/item?id=6200594</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 12 Aug 2013 17:56:11 +0000</pubDate><link>http://predragtasevski.com/wordpress/how-to-identify-malware-or-suspicious-code-in-wordpress-site/</link><dc:creator>stepcellwolf</dc:creator><comments>https://news.ycombinator.com/item?id=6200594</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=6200594</guid></item></channel></rss>