<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="https://dr2.whrdmena.org"  xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>Sawt al Niswa | صوت النسوة - skills</title>
 <link>https://dr2.whrdmena.org/tags/skills</link>
 <description></description>
 <language>en</language>
<item>
 <title>Online Security is a myth: 4 useful tips.</title>
 <link>https://dr2.whrdmena.org/article/272</link>
 <description>&lt;div class=&quot;section field field-name-field-image field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;img src=&quot;https://dr2.whrdmena.org/sites/default/files/styles/500x/public/6993C450x283_onlinesecurity2.jpg?itok=vmRcMCJN&quot; width=&quot;450&quot; height=&quot;283&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-field-article-image-caption field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;image from https://www.cyber-arabs.com/?p=8157&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-field-article-author field-type-entityreference field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;Fatima Saad&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;Online security is almost a myth but what you can do is make it really hard for someone to hack your account or at least catch them while doing so.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;Below are some security tips that don’t include “choose a hard password” – “don’t use an easy password like your name or phone number” and so on – I am pretty sure that almost everybody has heard those tips and yet fails to apply them.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;Tip 1 : Securing you email &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;1-      Most of your accounts, blogs, online transactions, chat logs, contacts, “forget my password” forms end up in your email… so it is really basic to take extra measures to secure your account. The good news is that hacking Gmail/Hotmail is not that easy anymore – hackers have to rely on hacking “you” – they usually do so by guessing your password, installing a software on your computer that saves the keys you type, including your password or by sending you fake online login form (&lt;a href=&quot;http://en.wikipedia.org/wiki/Phishing&quot;&gt;phishing&lt;/a&gt;), viewing your saved passwords in your browser and so on.&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;Some common sense applied and you will not be victim of those attacks, but since this is a security tutorial, it is a must to assume that at some point, your password is compromised so you must :&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;a.       Make sure you can recover/prove you identity and recover your password&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;b.      Add a second layer of security&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;Here are some step by step instructions on how to do on your &lt;span data-scayt_word=&quot;gmail&quot; data-scaytid=&quot;1&quot;&gt;gmail&lt;/span&gt; account ( It will be too much doing the same tutorial for all the email providers, it is the same logic, just different screens, I  believe many people are using &lt;span data-scayt_word=&quot;gmail&quot; data-scaytid=&quot;2&quot;&gt;gmail&lt;/span&gt; anyhow )&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;go to &lt;a href=&quot;https://www.google.com/accounts/ManageAccount&quot;&gt;https://www.google.com/accounts/&lt;span data-scayt_word=&quot;ManageAccount&quot; data-scaytid=&quot;3&quot;&gt;ManageAccount&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;You will find a nice screen – on the top , there is the security settings &lt;/span&gt;&lt;br /&gt;
	&lt;img alt=&quot;&quot; height=&quot;293px;&quot; src=&quot;https://lh3.googleusercontent.com/pIOA8qajHb3G-cvEHSSYl8XeRZed2_vVZcc5Bbk4xR877n0Wii_mKRQGkSMDPmPf__pCoLqOQ_rIdeUxsu1pR4syUQIHkBeLRqUq9ZWWvRx5sxJRfg&quot; width=&quot;509px;&quot; /&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;The first thing to do is have your password recovery procedure covered. You can set a secondary email, specify a security question or you can specify your phone number and a SMS will be sent to you (It is bit creepy to tell google you phone number – but sometimes you have to choose the lesser evil )&lt;img alt=&quot;&quot; height=&quot;493px;&quot; src=&quot;https://lh5.googleusercontent.com/uwbtmzKTqpvhne6p2v4YTFrpK-0Rll-hReEsXGxQkEoAJAa-zACFcsiGdlwInu6xTisg98D1d2f_ay7NSw19tiRS44b6heDO96I4BV1Q8WONrYEeiw&quot; width=&quot;629px;&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;Step 2 : assuming things got worse and your account was compromised. You can add a second layer of security – this is called “two factor authentication” – it relies on – surprise – 2 factors : &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;a – that you know your username/password.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;b – it relies on your ownership of something physical – in this case your cell phone&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;The username and password part is easy and it was covered how to protect them, now here is how you can bring in your phone to the equation.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;After entering your password, a verification code is sent to your mobile phone via SMS, voice calls, or generated on an application you can install on your Android, BlackBerry or iPhone device. This makes it much more likely that you’re the only one accessing your data: even if someone has stolen your password, they’ll need more than that to access your account. You can also indicate when you’re using a computer you trust and don’t want to be asked for a verification code from that machine in the future ( ease of use )&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;218px;&quot; src=&quot;https://lh4.googleusercontent.com/k0Nm9_34GMiRnHZ6-vFk-QfImP8VBirwJ535JhMP9fQXs95ekKNwkfpBaQxe3juSm_GeXqOfHVWLPSTM83DqjLw_FHpueNdhU0xFX-73vy8zi5S9rQ&quot; width=&quot;422px;&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;Now that you have updated your account with a secure password, built a recovery procedure and have a second layer of authentication that can work in the background – you are probably more secure.&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;However those are additional steps you can take to make sure no one has access to your account : &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;1- check what apps/&lt;span data-scayt_word=&quot;3rd&quot; data-scaytid=&quot;11&quot;&gt;3rd&lt;/span&gt; parties have access to your account : with &lt;span data-scayt_word=&quot;OpenID&quot; data-scaytid=&quot;12&quot;&gt;OpenID&lt;/span&gt;, some applications use your already existing &lt;span data-scayt_word=&quot;gmail&quot; data-scaytid=&quot;5&quot;&gt;gmail&lt;/span&gt;/&lt;span data-scayt_word=&quot;hotmail&quot; data-scaytid=&quot;15&quot;&gt;hotmail&lt;/span&gt;/twitter/&lt;span data-scayt_word=&quot;facebook&quot; data-scaytid=&quot;16&quot;&gt;facebook&lt;/span&gt; account to login to the site. While they don’t have access to your password, they may have reading/writing abilities to your account – you can check this in your &lt;span data-scayt_word=&quot;gmail&quot; data-scaytid=&quot;6&quot;&gt;gmail&lt;/span&gt; by visiting &lt;a href=&quot;https://www.google.com/accounts/IssuedAuthSubTokens?hl=en&quot;&gt;https://www.google.com/accounts/&lt;span data-scayt_word=&quot;IssuedAuthSubTokens&quot; data-scaytid=&quot;17&quot;&gt;IssuedAuthSubTokens&lt;/span&gt;?hl=en&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;Revoke access to site that you don’t use anymore.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;2- from time to time, check who accessed your &lt;span data-scayt_word=&quot;gmail&quot; data-scaytid=&quot;9&quot;&gt;gmail&lt;/span&gt; account and from where , to do so, scroll to the bottom of the page in &lt;span data-scayt_word=&quot;gmail&quot; data-scaytid=&quot;10&quot;&gt;gmail&lt;/span&gt; , click details : &lt;img alt=&quot;&quot; height=&quot;108px;&quot; src=&quot;https://lh4.googleusercontent.com/RsOR6xva2LtJAkXV46zxtkBOAAWfu2aW0uBQZ9aJ51GnmWtlcKxiM7InpOFsxPhTpJF6r4VXFYjW2B4iiPPyc9nsZJYJOi5UANr7YohC6zg6t6ymsLw&quot; width=&quot;536px;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;You will be able to view a list of the &lt;span data-scayt_word=&quot;IPs&quot; data-scaytid=&quot;22&quot;&gt;IPs&lt;/span&gt;/Countries that accessed your account – if anything is suspicious, you can “log out” all the other people who are signed in and needless to say, change your password&lt;img alt=&quot;&quot; height=&quot;336px;&quot; src=&quot;https://lh5.googleusercontent.com/vLNwM3EXqgLGaaxR5D-21vNldoZUs555xntq7YTMgZ42_xmsUOEs0RM-yKMRhYbVGvXH97X4p4v1KvRBSWz58Rv9QH4bSAvaKNaxPS2UX_AybDhBSg&quot; width=&quot;707px;&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;if you click “sign out all other session” – everyone logged in will be signed out – you can also set an alert for “unusual&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;3- check your &lt;span data-scayt_word=&quot;autoforwarders&quot; data-scaytid=&quot;23&quot;&gt;autoforwarders&lt;/span&gt; list and mail rules : &lt;a href=&quot;https://mail.google.com/mail/?shva=1#settings/fwdandpop&quot;&gt;https://mail.google.com/mail/?&lt;span data-scayt_word=&quot;shva&quot; data-scaytid=&quot;24&quot;&gt;shva&lt;/span&gt;=1#settings/&lt;span data-scayt_word=&quot;fwdandpop&quot; data-scaytid=&quot;25&quot;&gt;fwdandpop&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;the first thing a smart hacker would do, is not changing your password, but adding an auto-forwarder so they can read your mail and collect more data about you. So check there are no forwarders and rules you are not aware of.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;4 – don’t leave out your phone unlocked – hanging around with access to your email &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;5 – Never use your company mail for personal stuff : IT people have a access to the mail server and can read out your emails, many mail servers that belong to a company are also silently aggregated. Also emails exchanged using your company address are not your property.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;Tip 2 : figuring out / investigating the people you are with&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;Sometimes personal trust is all you have to communicate and willingly share details. Building this trust is a human process that usually comes after endless hours of chat and &lt;span data-scayt_word=&quot;facebooking&quot; data-scaytid=&quot;26&quot;&gt;facebooking&lt;/span&gt; and blog reading.&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;However there are some basic steps you can  take to verify the online identity of someone.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;1 – find them on social networks : they must have a blog, they must be subscribed to linked in, they must have posted somewhere on a forum etc…  and ultimately – you could ask them to video chat , have a &lt;span data-scayt_word=&quot;skype&quot; data-scaytid=&quot;27&quot;&gt;skype&lt;/span&gt; voice call etc… not finding anything on them is “fishy” enough for you not to trust them …. (trust is a 2 way process, so don’t share details if they are not)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;2- Verify their websites/blog : if you are dealing with a blogger, chances are that they have a &lt;a href=&quot;about:blank&quot;&gt;.com&lt;/a&gt; /.info / &lt;a href=&quot;about:blank&quot;&gt;.net&lt;/a&gt; (domain name ) – if they do, you can check out to whom this belongs.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;You can do so using &lt;a href=&quot;http://whois.net/&quot;&gt;whois.net&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;here is an example of the info of “who is behind” &lt;span data-scayt_word=&quot;nasawiya&quot; data-scaytid=&quot;28&quot;&gt;nasawiya&lt;/span&gt; &lt;a href=&quot;http://www.whois.net/whois/nasawiya.org&quot;&gt;http://www.whois.net/&lt;span data-scayt_word=&quot;whois&quot; data-scaytid=&quot;29&quot;&gt;whois&lt;/span&gt;/nasawiya.org&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;this info is used to process credit card transaction to buy the domain name and is highly accurate. &lt;img alt=&quot;;)&quot; class=&quot;wp-smiley&quot; src=&quot;http://www.sawtalniswa.com/wp-includes/images/smilies/icon_wink.gif&quot; /&gt; &lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;656px;&quot; src=&quot;https://lh6.googleusercontent.com/W0ydfNmELtQOa6q2FJdqPyfLhKp2a0Nhb4IsKIr8b93ZcVX6I_v37-BxxFpBlCepENKD9krDmMg_wivDyGE2JgnndbiKX2zyba5cV58yJSnswYVHwko&quot; width=&quot;386px;&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;Some people however, but not everyone, protects this info by paying to the hosting company an extra fee, here is for example &lt;span data-scayt_word=&quot;sawtalneswa&quot; data-scaytid=&quot;31&quot;&gt;sawtalneswa&lt;/span&gt; site info &lt;a href=&quot;http://www.whois.net/whois/sawtalniswa.com&quot;&gt;http://www.whois.net/&lt;span data-scayt_word=&quot;whois&quot; data-scaytid=&quot;30&quot;&gt;whois&lt;/span&gt;/sawtalniswa.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;it pretty much tells nothing ;p&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;If someone protected their info, you can always wonder and ask why they did so&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;Tip 3 : https everywhere &lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;there is a nasty little &lt;span data-scayt_word=&quot;firefox&quot; data-scaytid=&quot;33&quot;&gt;firefox&lt;/span&gt; extension called https everywhere, this little thing will encrypt all your browsing traffic whenever possible, making it impossible for people to intercept this traffic and hack into it.&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;You can install https and read about it from here &lt;a href=&quot;http://www.eff.org/https-everywhere&quot;&gt;http://www.eff.org/https-everywhere&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;Tip 4 : stay tuned to security news&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;in the security world, there is always endless updates – the way to stay protected is to stay updated on what is going around – for activists &lt;span data-scayt_word=&quot;i’d&quot; data-scaytid=&quot;34&quot;&gt;i’d&lt;/span&gt; recommend to subscribe to Electronic Frontier Foundation Newsletter – it is &lt;span data-scayt_word=&quot;reffered&quot; data-scaytid=&quot;35&quot;&gt;reffered&lt;/span&gt; to as “the first line of defense” and it earned this reputation.&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;They have pretty nice newsletter to keep you posted somehow on the tech and security world ( it is not a pure newsletter ) – also the &lt;span data-scayt_word=&quot;EFF&quot; data-scaytid=&quot;37&quot;&gt;EFF&lt;/span&gt; have some pretty nice logos and their web address is pretty short and easy to remember &lt;a href=&quot;https://www.eff.org/&quot;&gt;https://www.eff.org&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;Hope this turned out useful, if you have questions, don’t hesitate to leave them here.&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: medium;&quot;&gt;If you are interested more into security, please send a request to &lt;span data-scayt_word=&quot;nasawiya&quot; data-scaytid=&quot;36&quot;&gt;nasawiya&lt;/span&gt; geeks in take back the tech to host a workshop on online security.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section field field-name-field-publisher field-type-entityreference field-label-inline clearfix&quot;&gt;&lt;h3 class=&quot;field-label&quot;&gt;Publisher:&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item odd&quot;&gt;Sawt al&amp;#039; Niswa&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;field field-name-field-section field-type-taxonomy-term-reference field-label-inline clearfix clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Section:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/sawt-sections/resources&quot;&gt;Resources&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;

&lt;div class=&quot;field field-name-field-category field-type-taxonomy-term-reference field-label-inline clearfix clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Category:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/category/activism&quot;&gt;Activism&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;

&lt;div class=&quot;field field-name-field-tags field-type-taxonomy-term-reference field-label-inline clearfix clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/tags/online-security&quot;&gt;online security&lt;/a&gt;      &lt;/li&gt;
          &lt;li class=&quot;field-item odd&quot;&gt;
        &lt;a href=&quot;/tags/internet&quot;&gt;internet&lt;/a&gt;      &lt;/li&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/tags/skills&quot;&gt;skills&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;

&lt;div class=&quot;field field-name-field-featuredslider field-type-taxonomy-term-reference field-label-above clearfix&quot;&gt;
      &lt;p class=&quot;field-label&quot;&gt;Featured:&amp;nbsp;&lt;/p&gt;
    &lt;ul class=&quot;field-items&quot;&gt;
          &lt;li class=&quot;field-item even&quot;&gt;
        &lt;a href=&quot;/featured/no&quot;&gt;No&lt;/a&gt;      &lt;/li&gt;
      &lt;/ul&gt;
&lt;/div&gt;
</description>
 <pubDate>Mon, 13 Jun 2011 21:00:00 +0000</pubDate>
 <dc:creator>Lamia Moghnie</dc:creator>
 <guid isPermaLink="false">272 at https://dr2.whrdmena.org</guid>
</item>
</channel>
</rss>
