<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Computer Security Blog</title>
	<atom:link href="http://itcybersecurity.com/feed/" rel="self" type="application/rss+xml" />
	<link>http://itcybersecurity.com</link>
	<description>Everything About Computers Blog</description>
	<lastBuildDate>Thu, 04 Apr 2013 18:39:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Why do I need Encryption?</title>
		<link>http://itcybersecurity.com/why-do-i-need-encryption/</link>
		<comments>http://itcybersecurity.com/why-do-i-need-encryption/#comments</comments>
		<pubDate>Thu, 04 Apr 2013 18:39:22 +0000</pubDate>
		<dc:creator>RonE10</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://itcybersecurity.com/?p=80</guid>
		<description><![CDATA[When most people think about encryption, they think about secret agents and spy&#8217;s and state secrets. Most people never think about using encryption for themselves. I don&#8217;t have anything to hide, is a common thought. The question is, &#8216;Do you have something to hide?&#8217; If all you do on your computer is to check email ...</p><p><a href="http://itcybersecurity.com/why-do-i-need-encryption/" class="more-link">Continue reading &#8216;Why do I need Encryption?&#8217; &#187;</a>]]></description>
				<content:encoded><![CDATA[<p>When most people think about encryption, they think about secret agents and spy&#8217;s and state secrets.   Most people never think about using encryption for themselves.  I don&#8217;t have anything to hide, is a common thought.  </p>
<p>The question is, &#8216;Do you have something to hide?&#8217;  If all you do on your computer is to check email and Facebook, then you may not have anything to hide.  Do you do online banking?  Do you have your banks username and password saved so you can login to your account with one click?  Do you have income taxs returns on your computer?  </p>
<p>OK, I do online banking and I have tax returns on my computer.  Yes there is that picture I would not want my boss to see, but my computer is password protected, so I am safe.  Right?  Not really!  People forget their passwords all of the time.  Computer professionals, computer repair technicians, thief’s, and yes even curious teenagers know how to get around the Windows login password.  Its not that hard to find a way around the password.  </p>
<p>Then there is the professional that has a customer database on their computer.  If your laptop is lost or stolen, and that database becomes public, the results could bankrupt the company and destroy many life’s.  Who wants to do businesses with a company that has security leaks and looses its databases.  </p>
<p>So how do I encrypt?  It sounds scary!  Modern day encryption has been made easy through a number of programs that are available. (See the list after this article)  You can encrypt a folder, a partition or even an entire system drive.  The program I used when I first started to encrypt my data about 8 years ago, could only encrypt a folder or a partition.  I encrypted an entire partition on my hard drive and put all of my data into it.  </p>
<p>About 4 years ago, <a href="http://www.truecrypt.org/" title="Truecrypt direct link" target="_blank">Truecrypt</a> allowed for complete system encryption.  You may ask why do you need to encrypt the entire operating system?  Did you know that the web page of your bank account is saved on your hard drive for a period of time?  Anyone that knows where to look for this can see your account balances without even logging in to your account.  With the entire system encrypted, all of your history, temp files and swap page files are protected from snoopy eyes.  I have been using full disk encryption ever since.  You need it in the mortgage industry and many other business as well.</p>
<p>The most important thing to remember with encryption, is to pick a STRONG password.  See my article on passwords <a href="http://itcybersecurity.com/what-is-a-good-password/" title="What is a good password post" target="_blank">HERE</a>.  I would recommend a password of at least 20+ characters.  When I encrypt a complete system I have always used 40+ characters.  Truecrypt only allows up to 80 characters, which I think is a little weak.  But as I have said before, I am a proud password freak.  Hopefully Truecrypt will change this soon.  </p>
<p>Remember, Do Not Loose Your Password.  <a href="http://www.truecrypt.org/" title="Truecrypt direct link" target="_blank">Truecrypt</a> clearly states that if you do loose your password, your data is lost.  There is NO back door to their system.  The good news is that NO ONE will get your data.  Some of the other programs have a way to recover your data if you loose your password.  Do your research if you want that feature.  </p>
<p>One last thing to remember.  Be sure to properly shut down your computer so that the hard drive or folder is re-encrypted.  If you just close the lid on your laptop, the system will go to sleep and will not properly protect your data.  If you do not have to put in your big long password when you reopen your computer, than your data is at risk.  </p>
<p>As with all things in life, there are pluses and minuses in everything.  I have always used Truecrypt because it has an excellent reputation of being one of the best programs on the market.  There if no excuse for not having an encrypted hard drive as <a href="http://www.truecrypt.org/" title="Truecrypt direct link" target="_blank">Truecrypt</a> is a free download.  Be sure to look into the other programs listed below, and please purchase from my links and support the information you are receiving.</p>
<p>Until next time, be safe.</p>
<p>Ron</p>
<p><a href="http://www.truecrypt.org/" title="Truecrypt direct link" target="_blank">Truecrypt</a></p>
<p><a href="http://4da4bpqffp6z9v0d8bs4-o8peb.hop.clickbank.net/?tid=EFLOCK " title="Easy Folder Lock direct link" target="_blank">Easy Folder Look &#8211; Ultimate Data Protection Tool</a><br />
<a href="http://be862gujtsdv4ycko7xhjn5dco.hop.clickbank.net/?tid=USBPROTECT " title="Protect a USB flash drive" target="_blank"><br />
Protect the confidential files on your existing USB Flash Drive</a></p>
<p>Cypherix PE Data Security Software<br />
<iframe src="http://rcm.amazon.com/e/cm?t=efws-20&#038;o=1&#038;p=8&#038;l=as1&#038;asins=B0009YFO26&#038;ref=tf_til&#038;fc1=000000&#038;IS2=1&#038;lt1=_blank&#038;m=amazon&#038;lc1=0000FF&#038;bc1=000000&#038;bg1=FFFFFF&#038;f=ifr" style="width:120px;height:240px;" scrolling="no" marginwidth="0" marginheight="0" frameborder="0"></iframe></p>
<p>docLock 2012<br />
<iframe src="http://rcm.amazon.com/e/cm?t=efws-20&#038;o=1&#038;p=8&#038;l=as1&#038;asins=B008JJAGKI&#038;ref=tf_til&#038;fc1=000000&#038;IS2=1&#038;lt1=_blank&#038;m=amazon&#038;lc1=0000FF&#038;bc1=000000&#038;bg1=FFFFFF&#038;f=ifr" style="width:120px;height:240px;" scrolling="no" marginwidth="0" marginheight="0" frameborder="0"></iframe></p>
<p>SanDisk Cruzer 64 GB USB drive with built in encryption<br />
<iframe src="http://rcm.amazon.com/e/cm?t=efws-20&#038;o=1&#038;p=8&#038;l=as1&#038;asins=B007JR5304&#038;ref=tf_til&#038;fc1=000000&#038;IS2=1&#038;lt1=_blank&#038;m=amazon&#038;lc1=0000FF&#038;bc1=000000&#038;bg1=FFFFFF&#038;f=ifr" style="width:120px;height:240px;" scrolling="no" marginwidth="0" marginheight="0" frameborder="0"></iframe></p>]]></content:encoded>
			<wfw:commentRss>http://itcybersecurity.com/why-do-i-need-encryption/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What Anti-Virus should I use?</title>
		<link>http://itcybersecurity.com/what-anti-virus-should-i-use/</link>
		<comments>http://itcybersecurity.com/what-anti-virus-should-i-use/#comments</comments>
		<pubDate>Sat, 23 Mar 2013 22:08:15 +0000</pubDate>
		<dc:creator>RonE10</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://itcybersecurity.com/?p=53</guid>
		<description><![CDATA[The one issue that takes most of my time working with computers is virus removal. In the real estate and mortgage industries, most of the agents and loan officers use their own computers. I was amazed at how many of these computers did not have any anti-virus software on them. It should be no surprise ...</p><p><a href="http://itcybersecurity.com/what-anti-virus-should-i-use/" class="more-link">Continue reading &#8216;What Anti-Virus should I use?&#8217; &#187;</a>]]></description>
				<content:encoded><![CDATA[<p>The one issue that takes most of my time working with computers is virus removal.  In the real estate and mortgage industries, most of the agents and loan officers use their own computers.  I was amazed at how many of these computers did not have any anti-virus software on them.  It should be no surprise that their computer was infected and they wanted me to get rid of their computer viruses.  </p>
<p>I know there are plenty of articles on the internet that talk about how to remove viruses.  There is one step that is left out of most of them, so I am going to start with that.  The first thing I always do when someone brings me their computer to me, is to check to see if they have all of their Windows updates.  Always keep your Windows system, (XP, Vista, Windows 7, Windows 8), internet browser, (Internet Explorer, Firefox, Opera), and plugins ( Adobe Flash, Java) up to date.  </p>
<p>Although this will not keep you from getting a virus, it is your first line of defense.  You can set Windows to automatically download and install the updates.  To check if your computer is set to download automatically, click on your &#8216;Start&#8217; button, then &#8216;All Programs&#8217; and look for &#8216;Microsoft Update&#8217;.  Usually on the right hand side it will tell you that &#8216;Automatic Updates turned on&#8217; and give you a link to set the time and day that your operating system will look for updates.  Microsoft pushes their updates once a month, on the second Tuesday of the month, unless they find something really important and then they will push it out at any time.  You should be OK if you set it to check once a week.  I usually set it to check on Wednesday or Thursday.</p>
<p>There is no excuse not to have a anti-virus program on your computer.  There are free programs offered, like AVG and Avast.  I used the free version of AVG for a while and it is a great program.  I have often been asked why would anyone pay for anti-virus protection if there are free ones out there?  The answer is simple.  The free versions are an &#8216;on demand&#8217; scan of your computer.  My free AVG, did a scan automatically on boot up and then it was done.  </p>
<p>My paid version of </code><a href="http://www.amazon.com/gp/product/B00B2AQOAC/ref=as_li_ss_tl?ie=UTF8&#038;camp=1789&#038;creative=390957&#038;creativeASIN=B00B2AQOAC&#038;linkCode=as2&#038;tag=efws-20">AVG AntiVirus 2013</a><img src="http://www.assoc-amazon.com/e/ir?t=efws-20&#038;l=as2&#038;o=1&#038;a=B00B2AQOAC" width="1" height="1" border="0" alt="" style="border:none !important; margin:0px !important;" /> will do a complete scan of my computer and then continually look for suspicious activity on my computer.  It also scans for root kit viruses.  It has a firewall built into it, and it will scan my emails for suspicious emails.  It monitors me while I am on the internet.  If a program looks like it is searching my computer for information, like a identity theft, it will be shut down.  </p>
<p>The real difference is, the free version will look to see if anything is already on my computer, while the paid version will try to keep viruses from getting onto my computer.  Do you want active protection, or passive protection?  I think that active protection is the best if you can afford it.  If anyone that tells me they cannot afford it, I would ask which is cheaper?  Anti-virus software or paying me to remove the viruses?</p>
<p>If you would like to add Anti-Virus software to your computer, here is the program that I like and use myself:</p>
<p><a href="http://www.amazon.com/gp/product/B008MR328A/ref=as_li_tf_tl?ie=UTF8&#038;camp=1789&#038;creative=9325&#038;creativeASIN=B008MR328A&#038;linkCode=as2&#038;tag=efws-20">AVG Internet Security 2013 - 3 Users 1 Year</a><img src="http://www.assoc-amazon.com/e/ir?t=efws-20&#038;l=as2&#038;o=1&#038;a=B008MR328A" width="1" height="1" border="0" alt="" style="border:none !important; margin:0px !important;" /></p>
<p><a href="http://www.amazon.com/gp/product/B008MR328A/ref=as_li_tf_tl?ie=UTF8&#038;camp=1789&#038;creative=9325&#038;creativeASIN=B008MR328A&#038;linkCode=as2&#038;tag=efws-20">Here are some other anti-virus programs you can use</a><img src="http://www.assoc-amazon.com/e/ir?t=efws-20&#038;l=as2&#038;o=1&#038;a=B008MR328A" width="1" height="1" border="0" alt="" style="border:none !important; margin:0px !important;" /></p>
<p>Until next time, be safe.</p>
<p>Ron</p>]]></content:encoded>
			<wfw:commentRss>http://itcybersecurity.com/what-anti-virus-should-i-use/feed/</wfw:commentRss>
		<slash:comments>49</slash:comments>
		</item>
		<item>
		<title>Emergency Java Update</title>
		<link>http://itcybersecurity.com/emergency-java-update/</link>
		<comments>http://itcybersecurity.com/emergency-java-update/#comments</comments>
		<pubDate>Wed, 06 Mar 2013 20:15:36 +0000</pubDate>
		<dc:creator>RonE10</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://itcybersecurity.com/?p=49</guid>
		<description><![CDATA[I was working on my next post for this blog and I ran across an article about an emergency Java update. In that post (probably the next post) I will be talking about how important it is to keep your operating system and web browsers up to date. I felt that this Java update is ...</p><p><a href="http://itcybersecurity.com/emergency-java-update/" class="more-link">Continue reading &#8216;Emergency Java Update&#8217; &#187;</a>]]></description>
				<content:encoded><![CDATA[<p>I was working on my next post for this blog and I ran across an article about an emergency Java update.  In that post (probably the next post) I will be talking about how important it is to keep your operating system and web browsers up to date.  I felt that this Java update is important enough, to put that post on hold to get this information out to you.  I crashed this out, so you can take quick action to protect yourself.   </p>
<p>This is how to update Java on your computer.  Look in the notification area of your tool bar at the bottom right hand corner of screen, next to the clock.  You will probably have to expand it to see the Java notification icon.<br />
 <a href="http://itcybersecurity.com/wp-content/uploads/2013/03/JavaIcon.png"><img src="http://itcybersecurity.com/wp-content/uploads/2013/03/JavaIcon.png" alt="JavaIcon" width="14" height="14" class="alignnone size-full wp-image-50" /></a><br />
Click on this icon and follow the instructions to install the update.  Be sure to uncheck the box if you do not want the Ask toolbar automatically installed in the web browsers on your computer. </p>
<p>You can also access the Java control panel by clicking on the &#8216;Start&#8217; button and clicking on the &#8216;Control Panel&#8217;.  Once in the control panel, look for &#8216;Java&#8217;.  The control panel on my XP machine had a &#8216;Update&#8217; tab in the control panel, but my Windows 7 machine did not.  You may or may not be able to update from there.  </p>
<p>I hope this was helpful.  </p>
<p>Until next time, be safe.</p>
<p>Ron</p>]]></content:encoded>
			<wfw:commentRss>http://itcybersecurity.com/emergency-java-update/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>What is a good password?</title>
		<link>http://itcybersecurity.com/what-is-a-good-password/</link>
		<comments>http://itcybersecurity.com/what-is-a-good-password/#comments</comments>
		<pubDate>Mon, 04 Mar 2013 21:30:29 +0000</pubDate>
		<dc:creator>RonE10</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://itcybersecurity.com/?p=47</guid>
		<description><![CDATA[I was recently asked what I thought a strong password is. My reply was rather long as I believe that passwords are more important than most people think. After all, a password is your first line of security. Please give me a break and do not use something easy to guess, like your child&#8217;s name, ...</p><p><a href="http://itcybersecurity.com/what-is-a-good-password/" class="more-link">Continue reading &#8216;What is a good password?&#8217; &#187;</a>]]></description>
				<content:encoded><![CDATA[<p>I was recently asked what I thought a strong password is.  My reply was rather long as I believe that passwords are more important than most people think.  After all, a password is your first line of security.  Please give me a break and do not use something easy to guess, like your child&#8217;s name, or your child&#8217;s name and year of birth.  I have seen too many of these.  Microsoft Windows Server 2003 has the default settings requiring a minimum of 8 characters with upper and lower case letters, with at least one number and / or special characters.  You have probably had to use a password like this at work, school or any place you need to use passwords.  </p>
<p>I ran across &#8216;how long it takes to break a password&#8217; on the internet a while back.  I thought it was cool so I copied and pasted it to my computer.  I do not know where it came from originally, but here it is:</p>
<p>A good password today at a minimum of 8 characters, and can consist of any one of 95 keypresses on the keyboard. 95^8 = 6.6e15 combinations.<br />
If you don&#8217;t use special characters, that 8 character password is only 62^8 = 2.2^14 combinations.<br />
If you don&#8217;t use numbers, that 8 character password is only 52^8 = 5.3^13 combinations.<br />
And If you don&#8217;t even bother to change cases, that 8 character password is 26^8 = 2.1e11 combinations.</p>
<p>Those numbers don&#8217;t tell the real story. Old Windows XP passwords could be cracked on average 2011 hardware at about 10 million (1e7) combinations / second. The &#8220;good&#8221; password above would be cracked in 21 years (max). No special characters would be cracked in 8 months. No numbers in 2 months. And single-case only in 6 hours.</p>
<p>But today we have GPU password cracking, and much better hardware. A Radeon 5770 could crack the &#8220;good password&#8221;, 8 characters long in a mere 28 hours. That was hardware from 2 years ago.</p>
<p>With that in mind, the real question is; what information are you protecting?  If all you do with your computer is to check email and Facebook, then the 8 character password will be fine.  If you do online banking and have tax returns on your computer, then you may want to consider a 12 or 15 character password with upper and lower case letters as well as numbers and special characters.  When it comes to passwords, bigger is better, and using everything possible to create the password.  </p>
<p>I started my IT career in the mortgage industry, so security is important to me.  I not only use long passwords, but I also encrypt my sensitive data.  (Look forward to another post about encryption later)  If  I am encrypting a folder or a partition, I would suggest a minimum of 20+ characters.  When encrypting a system drive, I have been known to use 40+ or even 60+ characters for my passwords.  But then I am a proud password freak.  </p>
<p>I can hear you all now, because I have heard it before.  But Ron, but Ron, how do you remember those long passwords?  Use a passphrase or use short story.  Mix it up by using text speak and misspelling words.  Lets look at the passphrase, &#8216;to be or not to be&#8217;.</p>
<p>To – 2 or Two, tWo, twO, TWO or Too, tOo, toO, TOO or To, tO, To.  There are even more combinations you can think of.<br />
Be:  B, b or Be, bE, be, BE<br />
Or:  Or, oR, OR, or &#8211; @r, @R<br />
Not:  Not, nOt, noT, NOt, nOT, NOT, not etc.<br />
To:  2 or Two, tWo, twO, TWO or Too, tOo, toO, TOO or To, tO, To<br />
Be:  B, b or Be, bE, be, BE</p>
<p>As you can see, it will take you a while to break through this password even if you know what the password is.  Let your imagination run wild.  Here are some more ideas.  </p>
<p>I can be: I or i or even 1 or !<br />
A can be: A or a or even @<br />
H can be: H or h or even #<br />
O can be: O or o or even @<br />
V can be: V or v or even ^<br />
M can be: M or m or even ^^<br />
N can be: N or n or even ^<br />
At can be: At, aT, AT, at, or even @<br />
And can be: And, aNd, anD, or even &#038;<br />
Star can be: Star, sTar, staR, or even *</p>
<p>I am sure you can think of many more combinations.  The key to remembering the password is to use it regularly.  If you do write it down, do not have it anywhere near where the computer is.  A strong password is worthless if it is taped on the bottom of the keyboard or under the desktop calendar or blotter.  It reminds me of a lot of lame movies and how easy it is for someone to find a password.  </p>
<p>Another thing to keep in mind is that you should change your passwords regularly.  Once you have found yourself a good strong password, and started to use it, it is time to start looking for another password to use.  I always choose poor passwords when the server tells me it is time to change my password and I have not planned ahead.  I am also more likely to forget a password that I came up with in less than a minute.  The longer it takes you to create the password, the harder it will be to break the password.  </p>
<p>Passwords are a very important part of personal security.  How do you manage your passwords if you have a lot of sites that you log into on the internet.  Do you use one password and change them monthly?  Do you use different passwords and keep a &#8216;password&#8217; list on your computer?  (I can search &#8216;password&#8217; on your computer and find your list, no matter how well you hide it.)  Maybe you use a password safe like <a href="http://keepass.info/" title="KeyPass Web Address" target="_blank">Keepass</a>.  I may have to follow up with another post talking about passwords on the internet.  </p>
<p>Until then, be safe.</p>
<p>Ron</p>]]></content:encoded>
			<wfw:commentRss>http://itcybersecurity.com/what-is-a-good-password/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Welcome to the IT Cyber Security Blog</title>
		<link>http://itcybersecurity.com/welcome-to-the-it-cyber-security-blog-2/</link>
		<comments>http://itcybersecurity.com/welcome-to-the-it-cyber-security-blog-2/#comments</comments>
		<pubDate>Fri, 22 Feb 2013 01:24:33 +0000</pubDate>
		<dc:creator>RonE10</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://itcybersecurity.com/?p=44</guid>
		<description><![CDATA[Welcome to the IT Cyber Security Blog. As time goes on, this blog will discuss many issues on computer security, virus removal, and maybe even new computers and hardware and other related products that are coming out. In this first post I will give you a tour of the website. The &#8216;RSS Feed&#8217; tab takes ...</p><p><a href="http://itcybersecurity.com/welcome-to-the-it-cyber-security-blog-2/" class="more-link">Continue reading &#8216;Welcome to the IT Cyber Security Blog&#8217; &#187;</a>]]></description>
				<content:encoded><![CDATA[<p>Welcome to the IT Cyber Security Blog.  As time goes on, this blog will discuss many issues on computer security, virus removal, and maybe even new computers and hardware and other related  products that are coming out.  In this first post I will give you a tour of the website.  </p>
<p>The &#8216;RSS Feed&#8217; tab takes you to the page with three different computer security related RSS feeds.    Please note that these feeds run on JavaScript.  JavaScript is known to be buggy and full of security holes.  For each of the RSS feeds, you will be asked if you want to allow the script to run.  The feeds were built by ultra security people, so they want you to be sure you know your security risks.  Most sites do not ask if you want the risk and open you up to these security risks just so they can look real cool.  IT Cyber Security does not do this.  </p>
<p>These feeds are updated from over 4300 news sources every 20 minutes.  If you work in the industry or you are just interested in having your computer safe, then you need to check this page at least daily. </p>
<p>Use the &#8216;Contact Us&#8217; page if you have questions that you would like answered in a future post.  You can also contact us if you have a product or service that you would like us to talk about in a future post.  Webmasters that want to exchange links to us are welcome to ask in the contact page.  </p>
<p>The &#8216;This Weeks Hot Deals&#8217; page is a collection of items that readers of this blog will find interesting.  These products are sold through Amazon, so you will not be sending your money to some guy named Ron that you only know from reading a few posts.  Purchasing products through the links on my blog helps to support the content you will be reading.  After you click on the link, you can go and purchase luggage for all I care.  It all helps to support this content.  I thank you in advance for supporting the blog.  </p>
<p>Another page that is not up, at the time of this post, will be &#8216;How to Remove Viruses and Spyware&#8217; from your computer.  I am currently working on the content and how to deliver this information, so that  those that need it can get it.  Keep an eye out for this as it will be very valuable.  </p>
<p>I hope you check back on a regular basis and keep up on the newest and latest.  Please feel free to leave a comment at the bottom of any post that you would like to.  Comments always make the blog a better read.  </p>]]></content:encoded>
			<wfw:commentRss>http://itcybersecurity.com/welcome-to-the-it-cyber-security-blog-2/feed/</wfw:commentRss>
		<slash:comments>12</slash:comments>
		</item>
	</channel>
</rss>
