<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>QooahPetya &#8211; Qooah</title>
	<atom:link href="https://qooah.com/tag/petya/feed/" rel="self" type="application/rss+xml" />
	<link>https://qooah.com</link>
	<description>生活與科技，加多點趣味</description>
	<lastBuildDate>Fri, 17 Apr 2026 08:51:32 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
<generator>https://wordpress.org/?v=6.6.1</generator>

<image>
	<url>https://qooah.com/wp-content/uploads/2017/05/cropped-Logo-Q-32x32.png</url>
	<title>Petya &#8211; Qooah</title>
	<link>https://qooah.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">83601685</site>	<item>
		<title>[緊急] 強化版變種勒索病毒 Petya 擴散升級，教你預防！</title>
		<link>https://qooah.com/2017/06/28/how-to-avoid-petya-ransomware-attack/</link>
		<comments>https://qooah.com/2017/06/28/how-to-avoid-petya-ransomware-attack/#respond</comments>
		<pubDate>Wed, 28 Jun 2017 08:07:26 +0000</pubDate>
		<dc:creator><![CDATA[Winson Lam]]></dc:creator>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Petya]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[WannaCry]]></category>

		<guid isPermaLink="false">https://qooah.com/?p=152451</guid>

					<description><![CDATA[文章來源：Qooah.com 上個月加密勒索病毒 WannaCry 全球大爆發，令到各地使用 Windows  [&#8230;]]]></description>
		
		<wfw:commentRss>https://qooah.com/2017/06/28/how-to-avoid-petya-ransomware-attack/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">152451</post-id>	</item>
	</channel>
</rss>
