<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dw="https://www.dreamwidth.org">
  <id>tag:dreamwidth.org,2016-12-23:2575955</id>
  <title>gb0</title>
  <subtitle>gb0</subtitle>
  <author>
    <name>gb0</name>
  </author>
  <link rel="alternate" type="text/html" href="https://gb0.dreamwidth.org/"/>
  <link rel="self" type="text/xml" href="https://gb0.dreamwidth.org/data/atom"/>
  <updated>2017-05-06T01:13:15Z</updated>
  <dw:journal username="gb0" type="personal"/>
  <entry>
    <id>tag:dreamwidth.org,2016-12-23:2575955:304271</id>
    <link rel="alternate" type="text/html" href="https://gb0.dreamwidth.org/304271.html"/>
    <link rel="self" type="text/xml" href="https://gb0.dreamwidth.org/data/atom/?itemid=304271"/>
    <title>Мило</title>
    <published>2017-05-06T01:13:15Z</published>
    <updated>2017-05-06T01:13:15Z</updated>
    <category term="security"/>
    <category term="маразм"/>
    <category term="science&amp;technology"/>
    <dw:security>public</dw:security>
    <dw:reply-count>0</dw:reply-count>
    <content type="html">&lt;a href="https://threatpost.com/intel-patches-nine-year-old-critical-cpu-vulnerability/125331/"&gt;https://threatpost.com/intel-patches-nine-year-old-critical-cpu-vulnerability/125331/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Очень мило.&lt;br /&gt;&lt;br /&gt;&lt;img src="https://www.dreamwidth.org/tools/commentcount?user=gb0&amp;ditemid=304271" width="30" height="12" alt="comment count unavailable" style="vertical-align: middle;"/&gt; comments</content>
  </entry>
</feed>
