<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://linuxsecurityblog.com/2024/07/03/the-art-of-connection/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2024/07/c35dd-fewer_post_3.png</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2024-07-03T15:58:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2024/07/03/beyond-the-obstacle/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2024/07/c190e-fewer_post_4.png</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2024-07-03T15:58:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2024/07/03/growth-unlocked/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2024/07/b32a6-fewer_post_5.png</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2024-07-03T15:58:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2024/07/03/collaboration-magic/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2024/07/7a39b-fewer_post_2.png</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2024-07-03T15:58:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2024/07/03/teamwork-triumphs/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2024/07/bffa5-fewer_orestad_2.png</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2024-07-03T15:58:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2024/07/03/adaptive-advantage/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2024/07/90e3e-fewer_post_1.png</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2024-07-03T15:58:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/about/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/06/prof.png</image:loc><image:title>prof</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/04/prof.png</image:loc><image:title>prof</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/05/prof.png</image:loc><image:title>prof</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/05/why.jpg</image:loc><image:title>why</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/05/10402901_10202186231273233_234223045217603380_n.jpg</image:loc><image:title>10402901_10202186231273233_234223045217603380_n</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/05/linux.png</image:loc><image:title>LINUX</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/05/me.jpg</image:loc><image:title>me</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/05/draft.jpg</image:loc><image:title>draft</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/05/11216574_10204376319224063_6197743085768765944_n.jpg</image:loc><image:title>11216574_10204376319224063_6197743085768765944_n</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/05/linux-secure.png</image:loc><image:title>Linux-Secure</image:title></image:image><lastmod>2021-10-15T19:47:34+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linuxsecurityblog.com/2016/03/12/sqlmap-testing-with-sql-injection/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/sqli.jpg</image:loc><image:title>sqli</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/sqlmap1.jpg</image:loc><image:title>sqlmap1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/sqlmap.jpg</image:loc><image:title>sqlmap</image:title></image:image><lastmod>2021-10-08T10:18:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2021/08/10/breaking-news-more-than-600-million-stolen-in-ethereum-and-other-cryptocurrencies-marking-one-of-cryptos-biggest-hacks-ever/</loc><lastmod>2021-08-10T18:54:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2021/02/28/comb-biggest-data-breach-of-all-time-explained/</loc><lastmod>2021-02-28T20:21:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2020/08/17/getting-anonymously-harassed-online-try-this/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/08/g9.png</image:loc><image:title>g9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/08/g8-e1597699807861.png</image:loc><image:title>g8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/08/g6.png</image:loc><image:title>g6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/08/g5.png</image:loc><image:title>g5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/08/g4-e1597699673105.png</image:loc><image:title>g4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/08/g3.png</image:loc><image:title>g3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/08/g2.png</image:loc><image:title>g2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/08/g1.png</image:loc><image:title>g1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/08/d1.png</image:loc><image:title>d1</image:title></image:image><lastmod>2020-08-17T21:30:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/09/13/create-a-persistent-back-door-with-kali-netcat-and-weevely/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/banner1.jpg</image:loc><image:title>banner1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/network.png</image:loc><image:title>network</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/topology.png</image:loc><image:title>topology</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/wee22.png</image:loc><image:title>wee22</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/wee21.png</image:loc><image:title>wee21</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/wee20.png</image:loc><image:title>wee20</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/wee19.jpg</image:loc><image:title>wee19</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/wee16.png</image:loc><image:title>wee16</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/wee15.png</image:loc><image:title>wee15</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/wee18.png</image:loc><image:title>wee18</image:title></image:image><lastmod>2020-08-15T18:40:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2020/07/26/how-to-easily-find-anyone-on-the-internet/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/sleuth.png</image:loc><image:title>sleuth</image:title></image:image><lastmod>2020-07-26T18:38:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/12/20/4000-a-z-dark-web-links/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/extensis2.png</image:loc><image:title>extensis2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/123.jpg</image:loc><image:title>123</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/simple-smile.png</image:loc><image:title>simple-smile</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/1f609.png</image:loc><image:title>1f609</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/2708.png</image:loc><image:title>2708</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/more-than-4000-deep-web-dark-web-links-2015-post.jpg</image:loc><image:title>more-than-4000-deep-web-dark-web-links-2015-post</image:title></image:image><lastmod>2020-07-24T15:10:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/20/best-dark-web-links/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/lfd432.png</image:loc><image:title>LFD432</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/dark.jpg</image:loc><image:title>dark</image:title></image:image><lastmod>2021-08-02T00:16:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2020/06/16/discover-attack-raspberry-pis-on-a-network/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/9-1.png</image:loc><image:title>9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/8-2.png</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/8-1.png</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/7-1.png</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/6-1.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/5-1.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/4-1.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2020-07-24T15:01:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2020/06/18/windows-takeover-with-a-pdf-file/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/11-1.png</image:loc><image:title>11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/10-1.png</image:loc><image:title>10</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/9-2.png</image:loc><image:title>9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/8-3.png</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/7-2.png</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/6-2.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/5-2.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/4-2.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/3-1.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/2-1.png</image:loc><image:title>2</image:title></image:image><lastmod>2020-07-24T14:59:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2020/07/08/exploiting-f5-big-ip-vulnerability-cve-2020-5902/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/7-1.png</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/7.png</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/6.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/5.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/4-1.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/4.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/1-1.png</image:loc><image:title>1</image:title></image:image><lastmod>2020-07-24T14:58:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/02/21/web-application-security/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/02/waf.jpg</image:loc><image:title>WAF</image:title></image:image><lastmod>2020-07-24T14:55:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/03/03/csrf-code-examples-and-defense/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/csrf.jpg</image:loc><image:title>csrf</image:title></image:image><lastmod>2020-07-24T14:54:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/03/05/exploiting-xxe-vulnerabilities/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/csrf-1.jpg</image:loc><image:title>csrf</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/xxe-1.png</image:loc><image:title>xxe#</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/xxe.png</image:loc><image:title>xxe</image:title></image:image><lastmod>2020-07-24T14:48:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/03/13/ghidra-first-impressions-of-the-nsa-reverse-engineering-tool/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/ghi.png</image:loc><image:title>ghi</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/lfd430.png</image:loc><image:title>LFD430</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/ghidra5.png</image:loc><image:title>ghidra5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/ghidra4.png</image:loc><image:title>ghidra4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/ghidra3.png</image:loc><image:title>ghidra3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/ghidra2.png</image:loc><image:title>ghidra2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/ghidra-1.png</image:loc><image:title>ghidra</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/ghidra.png</image:loc><image:title>ghidra</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/ghid7.png</image:loc><image:title>ghid7</image:title></image:image><lastmod>2020-07-24T14:46:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/03/14/smb-exploited/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/dal.png</image:loc><image:title>DAL</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/smb1.jpg</image:loc><image:title>smb1</image:title></image:image><lastmod>2020-07-24T14:45:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/03/26/netbios-auxiliary-modules/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/03/netbios.png</image:loc><image:title>netbios</image:title></image:image><lastmod>2020-07-24T14:44:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/04/07/the-darknet-2019/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/04/darknet.jpg</image:loc><image:title>darknet</image:title></image:image><lastmod>2021-02-13T09:30:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/04/11/emotet-the-banking-trojan/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/04/emotet.jpg</image:loc><image:title>emotet</image:title></image:image><lastmod>2020-07-24T14:41:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/04/15/adblock-plus-filter-lists-may-execute-arbitrary-code/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/04/adblock.png</image:loc><image:title>adblock</image:title></image:image><lastmod>2020-07-24T14:39:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/04/22/malware-analysis-with-valkyrie/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/04/vakyrie.png</image:loc><image:title>vakyrie</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/04/val2.png</image:loc><image:title>val2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/04/val1.png</image:loc><image:title>val1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/04/val0.png</image:loc><image:title>val0</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/04/file1.png</image:loc><image:title>file1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/04/filehash.png</image:loc><image:title>Filehash</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/04/vayrie.png</image:loc><image:title>vayrie</image:title></image:image><lastmod>2020-07-24T14:37:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/05/01/best-linux-distros-for-ethical-hacking-and-penetration-testing/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/linux-pentesting-distro.jpg</image:loc><image:title>Linux-Pentesting-Distro</image:title></image:image><lastmod>2020-07-24T14:36:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/05/06/new-exploits-for-insecure-sap-systems/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/sap.jpg</image:loc><image:title>SAP</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/sap1.png</image:loc><image:title>SAP1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/sap2.jpg</image:loc><image:title>SAP2</image:title></image:image><lastmod>2020-07-24T13:41:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/05/12/owasp-a2-broken-authentication-and-session-management-cause-and-prevention/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/owspa2.jpg</image:loc><image:title>OWSPA2</image:title></image:image><lastmod>2020-07-24T13:40:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/05/18/understanding-how-blockchain-works/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/block1.png</image:loc><image:title>block1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/block2.png</image:loc><image:title>block2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/blockchain.jpg</image:loc><image:title>blockchain</image:title></image:image><lastmod>2020-07-24T13:03:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/05/20/enabling-monitor-mode-packet-injection-on-the-raspberry-pi/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/pi-wifi.jpg</image:loc><image:title>SANYO DIGITAL CAMERA</image:title><image:caption>SANYO DIGITAL CAMERA</image:caption></image:image><lastmod>2020-07-24T12:54:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/05/22/handy-bash-one-liners/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/bash.jpeg</image:loc><image:title>bash</image:title></image:image><lastmod>2020-07-24T12:52:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/05/29/proxychains-for-anonymity/</loc><lastmod>2020-07-24T12:50:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/05/30/set-up-a-penetration-testing-lab-easily-with-vagrant/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/site.png</image:loc><image:title>site</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/vagrant102564.png</image:loc><image:title>vagrant102564</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/vag10.png</image:loc><image:title>vag10</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/vag9.png</image:loc><image:title>vag9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/vag8.png</image:loc><image:title>vag8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/vag7.png</image:loc><image:title>vag7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/vag5.png</image:loc><image:title>vag5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/vag4.png</image:loc><image:title>vag4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/vag3.png</image:loc><image:title>vag3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/05/vag2.png</image:loc><image:title>vag2</image:title></image:image><lastmod>2020-07-24T12:48:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/07/23/our-linux-sister-linuxsecurity-com-are-celebrating-their-20th-anniversary-by-launching-a-new-website/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/07/20-1.jpg</image:loc><image:title>20</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/07/20.jpg</image:loc><image:title>20</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/07/linsecom.png</image:loc><image:title>LinSeCom</image:title></image:image><lastmod>2020-07-24T12:45:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/07/30/managing-the-linux-tmp-directory-expertly/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/07/edhat.png</image:loc><image:title>edhat</image:title></image:image><lastmod>2020-07-24T12:44:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/08/21/write-a-ping-sweeper-in-4-lines-of-bash/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/pings7-2.jpg</image:loc><image:title>pings7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/pings7-1.jpg</image:loc><image:title>pings7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/pings7.jpg</image:loc><image:title>pings7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/pings6.png</image:loc><image:title>pings6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/pings5.png</image:loc><image:title>pings5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/pings4.png</image:loc><image:title>pings4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/pings3.png</image:loc><image:title>pings3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/pings2.png</image:loc><image:title>pings2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/pings1-e1566393755569.png</image:loc><image:title>pings1</image:title></image:image><lastmod>2020-07-24T12:43:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/08/22/securing-your-crypto-wallet/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/cr3.jpg</image:loc><image:title>cr3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/cr4.jpg</image:loc><image:title>cr4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/cr2.jpg</image:loc><image:title>cr2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/cr1.jpg</image:loc><image:title>cr1</image:title></image:image><lastmod>2021-07-20T06:19:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/09/02/set-up-some-honeypots-and-a-threat-map/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/hp15.png</image:loc><image:title>hp15</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/hp1.png</image:loc><image:title>hp1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/hp14.png</image:loc><image:title>hp14</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/hp13.png</image:loc><image:title>hp13</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/hp12.png</image:loc><image:title>hp12</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/hp11.png</image:loc><image:title>hp11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/hp10.png</image:loc><image:title>hp10</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/hp9.png</image:loc><image:title>hp9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/hp8.png</image:loc><image:title>hp8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/hp7.png</image:loc><image:title>hp7</image:title></image:image><lastmod>2020-07-24T12:40:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/09/04/hacking-android-with-metasploit/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/apk90.png</image:loc><image:title>apk90</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/apk8.png</image:loc><image:title>apk8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/apk7.png</image:loc><image:title>apk7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/apk6.png</image:loc><image:title>apk6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/apk4.png</image:loc><image:title>apk4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/apk3.png</image:loc><image:title>apk3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/apk2.png</image:loc><image:title>apk2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/apk1.png</image:loc><image:title>apk1</image:title></image:image><lastmod>2020-07-24T12:38:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/09/09/find-vulnerable-devices-on-the-internet-with-shodan/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/ten1.jpg</image:loc><image:title>ten1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/ten2.jpg</image:loc><image:title>ten2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/ten4.jpg</image:loc><image:title>ten4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/sho14.png</image:loc><image:title>sho14</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/sho13.png</image:loc><image:title>sho13</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/sho12.png</image:loc><image:title>sho12</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/sho11.png</image:loc><image:title>sho11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/sho10.png</image:loc><image:title>sho10</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/sho9.png</image:loc><image:title>sho9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/sho8.png</image:loc><image:title>sho8</image:title></image:image><lastmod>2020-07-24T12:37:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/09/26/exploiting-routers-with-routersploit/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/rsf12.png</image:loc><image:title>rsf12</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/rsf11-1.png</image:loc><image:title>rsf11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/rsf11.png</image:loc><image:title>rsf11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/rsf10.png</image:loc><image:title>rsf10</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/rsf9.png</image:loc><image:title>rsf9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/rsf8.png</image:loc><image:title>rsf8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/rsf7.png</image:loc><image:title>rsf7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/rsf6.png</image:loc><image:title>rsf6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/rsf5.png</image:loc><image:title>rsf5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/rsf4.png</image:loc><image:title>rsf4</image:title></image:image><lastmod>2020-07-24T12:36:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/09/28/create-a-backdoor-shell-script-in-python/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/py2.png</image:loc><image:title>py2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/lin4.jpg</image:loc><image:title>lin4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/lin5.jpeg</image:loc><image:title>lin5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/lin6.jpg</image:loc><image:title>lin6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/listen1.png</image:loc><image:title>listen1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/listen.png</image:loc><image:title>listen</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/py1.png</image:loc><image:title>py1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/lin1.jpg</image:loc><image:title>lin1</image:title><image:caption>Try Our Linux Foundation Courses Today!!</image:caption></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/lin2.jpg</image:loc><image:title>lin2</image:title><image:caption>Try Our Linux Foundation Courses Today!!</image:caption></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/lin3.jpg</image:loc><image:title>lin3</image:title><image:caption>Try Our Linux Foundation Courses Today!!</image:caption></image:image><lastmod>2020-07-24T12:34:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/10/02/send-secret-files-in-an-image-using-steganography/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/thatch_embed.jpg</image:loc><image:title>thatch_embed</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/steg9.png</image:loc><image:title>steg9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/steg8.png</image:loc><image:title>steg8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/steg7.png</image:loc><image:title>steg7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/steg6.png</image:loc><image:title>steg6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/steg5.png</image:loc><image:title>steg5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/steg4.png</image:loc><image:title>steg4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/steg3.png</image:loc><image:title>steg3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/steg2.png</image:loc><image:title>steg2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/steg1.png</image:loc><image:title>steg1</image:title></image:image><lastmod>2020-07-24T12:33:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/10/03/reverse-engineering-router-firmware/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/firm23.png</image:loc><image:title>firm23</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/firm21.png</image:loc><image:title>firm21</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/firm20.png</image:loc><image:title>firm20</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/firm19.png</image:loc><image:title>firm19</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/firm18.png</image:loc><image:title>firm18</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/firm17.png</image:loc><image:title>firm17</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/firm16.png</image:loc><image:title>firm16</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/firm15.png</image:loc><image:title>firm15</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/firm14.png</image:loc><image:title>firm14</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/firm13.png</image:loc><image:title>firm13</image:title></image:image><lastmod>2020-07-24T12:32:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/10/10/bluekeep-exploit-windows-rdp-vulnerability-remotely/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/bk11.png</image:loc><image:title>bk11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/bk10.png</image:loc><image:title>bk10</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/bk9.png</image:loc><image:title>bk9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/bk8.png</image:loc><image:title>bk8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/bk7.png</image:loc><image:title>bk7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/bk5.png</image:loc><image:title>bk5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/bk4.png</image:loc><image:title>bk4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/bk3.png</image:loc><image:title>bk3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/bk2.png</image:loc><image:title>bk2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/bk1.png</image:loc><image:title>bk1</image:title></image:image><lastmod>2020-07-24T12:29:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/10/29/crack-wpa-handshake-using-aircrack-with-kali-linux/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/wifi16.png</image:loc><image:title>wifi16</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/wifi15.png</image:loc><image:title>wifi15</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/wifi14.png</image:loc><image:title>wifi14</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/wifi13.png</image:loc><image:title>wifi13</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/wifi12.png</image:loc><image:title>wifi12</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/wifi11.png</image:loc><image:title>wifi11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/wifi10.png</image:loc><image:title>wifi10</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/wifi9.png</image:loc><image:title>wifi9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/wifi8.png</image:loc><image:title>wifi8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/wifi7.png</image:loc><image:title>wifi7</image:title></image:image><lastmod>2020-07-24T12:07:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/10/31/install-gns3-2-2-on-windows10-download-link-included/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/download.png</image:loc><image:title>download</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/ace0.png</image:loc><image:title>ace0</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/lsb15.png</image:loc><image:title>lsb15</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/gns18.png</image:loc><image:title>gns18</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/gns17.png</image:loc><image:title>gns17</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/gns16.png</image:loc><image:title>gns16</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/gns15.png</image:loc><image:title>gns15</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/gns13.png</image:loc><image:title>gns13</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/gns12.png</image:loc><image:title>gns12</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/gns11.png</image:loc><image:title>gns11</image:title></image:image><lastmod>2020-07-24T08:24:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/11/01/import-virtualbox-images-to-gns3/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/gns3vm1.png</image:loc><image:title>gns3vm1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/gns3vm.png</image:loc><image:title>gns3vm</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/gns37.png</image:loc><image:title>gns37</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/ns35.png</image:loc><image:title>ns35</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/gns34.png</image:loc><image:title>gns34</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/gns33.png</image:loc><image:title>gns33</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/gns32.png</image:loc><image:title>gns32</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/gns3import.png</image:loc><image:title>gns3Import</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/gns31.png</image:loc><image:title>gns31</image:title></image:image><lastmod>2020-07-24T08:21:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/11/14/gaining-access-to-windows10-through-vlc-exploit/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/chrome.png</image:loc><image:title>chrome</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/vlc18.png</image:loc><image:title>vlc18</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/vlc17.png</image:loc><image:title>vlc17</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/vlc16.png</image:loc><image:title>vlc16</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/vlc15.png</image:loc><image:title>vlc15</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/vlc14.png</image:loc><image:title>vlc14</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/vlc13.png</image:loc><image:title>vlc13</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/vlc12.png</image:loc><image:title>vlc12</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/vlc11.png</image:loc><image:title>vlc11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/vlc10.png</image:loc><image:title>vlc10</image:title></image:image><lastmod>2020-07-24T08:17:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/11/20/how-to-fully-anonymize-your-ip/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/ni4.png</image:loc><image:title>ni4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/ni3.png</image:loc><image:title>ni3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/ni2.png</image:loc><image:title>ni2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/ni1.png</image:loc><image:title>ni1</image:title></image:image><lastmod>2020-07-24T08:15:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/11/30/first-stack-buffer-overflow-to-modify-variable/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/overflow.png</image:loc><image:title>overflow</image:title></image:image><lastmod>2020-07-24T08:14:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/12/03/write-an-imap-fuzzing-tool/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/eip.png</image:loc><image:title>eip</image:title></image:image><lastmod>2020-07-24T08:14:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/12/06/pentesting-gaining-root-privileges-on-kioptrix/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/28.png</image:loc><image:title>28</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/27.png</image:loc><image:title>27</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/26.png</image:loc><image:title>26</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/25.png</image:loc><image:title>25</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/24.png</image:loc><image:title>24</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/23.png</image:loc><image:title>23</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/22.png</image:loc><image:title>22</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/21.png</image:loc><image:title>21</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/20.png</image:loc><image:title>20</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/19.png</image:loc><image:title>19</image:title></image:image><lastmod>2020-07-24T08:10:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/12/09/gaining-root-from-a-buffer-overflow-vulnerability/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/11-1.png</image:loc><image:title>11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/10-1.png</image:loc><image:title>10</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/9-1.png</image:loc><image:title>9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/8-3.png</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/8-2.png</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/7-1.png</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/6-1.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/5-1.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/4-1.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/3-1.png</image:loc><image:title>3</image:title></image:image><lastmod>2020-07-24T08:03:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/12/20/configuring-your-iam-securely-on-aws/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/iam2.png</image:loc><image:title>iam2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/12/iam.png</image:loc><image:title>iam</image:title></image:image><lastmod>2020-07-24T07:57:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2020/05/15/python-scripting-for-ethical-hacking-part-i/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/05/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/05/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/05/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2020-07-24T07:52:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2020/06/29/install-lightweight-ubuntu-and-apache-web-server-on-windows10/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/04.png</image:loc><image:title>04</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/03.png</image:loc><image:title>03</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/02.png</image:loc><image:title>02</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/01.png</image:loc><image:title>01</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/0.png</image:loc></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/9-4.png</image:loc><image:title>9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/9-3.png</image:loc><image:title>9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/8-4.png</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/7-3.png</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/6-3.png</image:loc><image:title>6</image:title></image:image><lastmod>2020-07-24T07:48:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2020/07/10/top-linux-interview-questions/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/14.png</image:loc><image:title>14</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/13.png</image:loc><image:title>13</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/01-1.png</image:loc><image:title>01</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/12.png</image:loc><image:title>12</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/11.png</image:loc><image:title>11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/10.png</image:loc><image:title>10</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/9.png</image:loc><image:title>9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/7-2.png</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/6-1.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/07/5-1.png</image:loc><image:title>5</image:title></image:image><lastmod>2020-07-24T07:46:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/02/26/drk-web-l1nk/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/darkweb.jpg</image:loc><image:title>darkweb</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/tor-network-anonymous-proxy.png</image:loc><image:title>tor-network-anonymous-proxy</image:title></image:image><lastmod>2020-07-10T21:33:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/05/11/rooting-your-android/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/android.png</image:loc><image:title>android</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/root-abstract.jpg</image:loc><image:title>root-abstract</image:title></image:image><lastmod>2020-06-25T18:59:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/04/20/setting-up-a-darknet-website-with-i2p-on-ubuntu/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/04/dark1.jpg</image:loc><image:title>dark</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/04/peers.png</image:loc><image:title>peers</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/04/i2psnorktorrents.png</image:loc><image:title>i2pSnorkTorrents</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/04/darket-what-is.jpg</image:loc><image:title>Darket-What-is</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/04/eepsitelive.png</image:loc><image:title>eepsitelive</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/04/localtunnels.png</image:loc><image:title>localTunnels</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/04/newsetupwebsitepage.png</image:loc><image:title>newSetUpWebsitePage</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/04/ws1.png</image:loc><image:title>ws1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/04/startingi2prouter.png</image:loc><image:title>startingi2prouter</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/04/i2pwebsite.png</image:loc><image:title>i2pwebsite</image:title></image:image><lastmod>2020-06-23T20:10:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2020/06/09/python-scripting-for-the-ethical-hacker-part-ii/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/20-1.png</image:loc><image:title>20</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/20.png</image:loc><image:title>20</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/19.png</image:loc><image:title>19</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/18.png</image:loc><image:title>18</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/17.png</image:loc><image:title>17</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/16.png</image:loc><image:title>16</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/15.png</image:loc><image:title>15</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/14.png</image:loc><image:title>14</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/13.png</image:loc><image:title>13</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/06/12.png</image:loc><image:title>12</image:title></image:image><lastmod>2020-06-18T21:29:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2020/02/01/heartbleed-discovery-and-exploit/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/heart13.png</image:loc><image:title>heart13</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/heart12.png</image:loc><image:title>heart12</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/heart11.png</image:loc><image:title>heart11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/heart10.png</image:loc><image:title>heart10</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/heart9.png</image:loc><image:title>heart9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/heart8.png</image:loc><image:title>heart8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/heart7.png</image:loc><image:title>heart7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/heart6.png</image:loc><image:title>heart6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/heart5.png</image:loc><image:title>heart5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/heart4.png</image:loc><image:title>heart4</image:title></image:image><lastmod>2020-06-18T21:08:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/12/23/your-linux-christmas-present/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/12/banner2.jpg</image:loc><image:title>banner2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/12/linux2.png</image:loc><image:title>linux2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/12/linux1.png</image:loc><image:title>linux1</image:title></image:image><lastmod>2020-05-14T20:40:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2020/04/02/how-linux-package-managers-work/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/04/packages.jpg</image:loc><image:title>Featured Image -- 7185</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/04/tux-package.png</image:loc><image:title>tux-package</image:title></image:image><lastmod>2020-04-02T18:52:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/05/09/ssh-tunneling/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/dynamicportforwarding.jpg</image:loc><image:title>dynamicportforwarding</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/scenario.jpg</image:loc><image:title>scenario</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/localportforwarding.jpg</image:loc><image:title>localportforwarding</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/sshsessionforwarding.jpg</image:loc><image:title>sshsessionforwarding</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/remoteportforwarding.jpg</image:loc><image:title>remoteportforwarding</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/ssh1.jpg</image:loc><image:title>ssh1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/ssh.jpg</image:loc><image:title>ssh</image:title></image:image><lastmod>2020-03-10T18:13:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/10/14/xml-external-entity-xxe-vulnerability/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/xxe7.png</image:loc><image:title>xxe7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/xxe6.png</image:loc><image:title>xxe6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/xxe5.png</image:loc><image:title>xxe5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/xxe4.png</image:loc><image:title>xxe4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/xxe3.png</image:loc><image:title>xxe3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/xxe2.png</image:loc><image:title>xxe2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/xxe1.png</image:loc><image:title>xxe1</image:title></image:image><lastmod>2020-03-09T20:24:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2020/02/09/regex-cheat-sheet/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/10.png</image:loc><image:title>10</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/9.png</image:loc><image:title>9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/8.png</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/7.png</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/6.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/4.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/5.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2020/02/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2020-02-11T23:03:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/04/23/build-a-beginner-hacking-kit-with-the-raspberry-pi-3-model-b/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/04/rp3.jpg</image:loc><image:title>rp3</image:title></image:image><lastmod>2020-02-06T18:35:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/02/owasp-security-shepherd-security-misconfiguration-solution-lsb/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/banner.png</image:loc><image:title>banner</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/linux.png</image:loc><image:title>linux</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/secmis4.png</image:loc><image:title>secmis4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/secmis3.png</image:loc><image:title>secmis3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/secmis2.png</image:loc><image:title>secmis2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/secmis1.png</image:loc><image:title>secmis1</image:title></image:image><lastmod>2019-12-12T17:56:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/05/25/how-to-use-netcat-to-establish-and-test-tcp-and-udp-connections/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/page_gone.png</image:loc><image:title>page_gone</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/page.png</image:loc><image:title>page</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/netcat1.jpg</image:loc><image:title>netcat1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/netcat.jpg</image:loc><image:title>netcat</image:title></image:image><lastmod>2019-12-02T18:06:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/news-feed/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/11/646171106.gif</image:loc><image:title>646171106</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/09/cyb.png</image:loc><image:title>cyb</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/cybersec1.png</image:loc><image:title>cyberSec1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/08/attack.gif</image:loc><image:title>attack</image:title></image:image><lastmod>2019-11-30T19:53:40+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linuxsecurityblog.com/2015/08/05/check-how-secure-your-code-is-from-hackers/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/javascanned.png</image:loc><image:title>javascanned</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/vcg.png</image:loc><image:title>vcg</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/scan1.png</image:loc><image:title>scan1</image:title></image:image><lastmod>2019-11-29T22:22:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/16/setup-a-vpn-on-kali-linux-for-anonymity/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/vpn.png</image:loc><image:title>vpn</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/e5194-kali_vpn_configuration_picateshackz10.jpg</image:loc><image:title>e5194-kali_vpn_configuration_picateshackz10</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/20c39-kali_vpn_configuration_picateshackz11.jpg</image:loc><image:title>20c39-kali_vpn_configuration_picateshackz11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/7d5b5-kali_vpn_configuration_picateshackz12.jpg</image:loc><image:title>7d5b5-kali_vpn_configuration_picateshackz12</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/6e588-kali_vpn_configuration_picateshackz13.jpg</image:loc><image:title>6e588-kali_vpn_configuration_picateshackz13</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/14d52-kali_vpn_configuration_picateshackz14.jpg</image:loc><image:title>14d52-kali_vpn_configuration_picateshackz14</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/71977-kali_vpn_configuration_picateshackz15.jpg</image:loc><image:title>71977-kali_vpn_configuration_picateshackz15</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/bc172-kali_vpn_configuration_picateshackz16.jpg</image:loc><image:title>bc172-kali_vpn_configuration_picateshackz16</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/1c2e6-kali_vpn_configuration_picateshackz6.jpg</image:loc><image:title>1c2e6-kali_vpn_configuration_picateshackz6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/d060e-kali_vpn_configuration_picateshackz7.jpg</image:loc><image:title>d060e-kali_vpn_configuration_picateshackz7</image:title></image:image><lastmod>2019-11-28T17:58:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/14/pen-testing-browsers-with-beef-%e2%80%a2-safenull/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/browsers.png</image:loc><image:title>browsers</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-hack-web-browsers-with-beef-w6546.jpg</image:loc><image:title>hack-like-pro-hack-web-browsers-with-beef-w6546</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-hack-web-browsers-with-beef-w6545.jpg</image:loc><image:title>hack-like-pro-hack-web-browsers-with-beef-w6545</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-hack-web-browsers-with-beef-w6544.jpg</image:loc><image:title>hack-like-pro-hack-web-browsers-with-beef-w6544</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-hack-web-browsers-with-beef-w6543.jpg</image:loc><image:title>hack-like-pro-hack-web-browsers-with-beef-w6543</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-hack-web-browsers-with-beef-w6542.jpg</image:loc><image:title>hack-like-pro-hack-web-browsers-with-beef-w6542</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-hack-web-browsers-with-beef-w6541.jpg</image:loc><image:title>hack-like-pro-hack-web-browsers-with-beef-w6541</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-hack-web-browsers-with-beef-w654.jpg</image:loc><image:title>hack-like-pro-hack-web-browsers-with-beef-w654</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/browser-hacking.png</image:loc><image:title>browser-hacking</image:title></image:image><lastmod>2019-11-28T17:35:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/11/14/snort-open-source-ids/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/snort.png</image:loc><image:title>snort</image:title></image:image><lastmod>2019-11-28T11:53:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/12/27/cuckoo-sandboxed-malware-analysis/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/12/cuckoo2.png</image:loc><image:title>cuckoo2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/12/cuckoo.jpg</image:loc><image:title>cuckoo</image:title></image:image><lastmod>2019-11-22T20:56:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/08/29/av-evading-with-veil/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/08/enroll2.png</image:loc><image:title>enroll</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/08/enroll1.png</image:loc><image:title>enroll</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/08/enroll.png</image:loc><image:title>enroll</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/08/veil.jpg</image:loc><image:title>veil</image:title></image:image><lastmod>2019-11-22T19:21:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/03/24/metasploit-msfvenom/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/03/venom.jpg</image:loc><image:title>venom</image:title></image:image><lastmod>2019-11-09T17:51:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/gns3-series/</loc><lastmod>2019-11-01T12:54:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linuxsecurityblog.com/2019/10/06/movies-featuring-the-nmap-security-scanner/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/10/nmap.png</image:loc><image:title>nmap</image:title></image:image><lastmod>2019-10-30T00:26:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/10/08/the-evil-twin-attack/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/10/evtwat.jpg</image:loc><image:title>evtwat</image:title></image:image><lastmod>2019-10-29T18:51:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/03/examination-of-the-vulnerabilities-of-the-cisco-ios/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/cisco-1.jpg</image:loc><image:title>cisco</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/topology1.png</image:loc><image:title>Topology</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/xhydrano-password.png</image:loc><image:title>xhydrano password</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/telnetsecuritybannertimeout.png</image:loc><image:title>telnetsecuritybannertimeout</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/cdpflooding.png</image:loc><image:title>cdpflooding</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/yersiniaattack.png</image:loc><image:title>yersiniaattack</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/xhydrapasswordsguessed.png</image:loc><image:title>xhydrapasswordsguessed</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/xhydraattack.png</image:loc><image:title>xhydraattack</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/wiresharkpacketcapture.png</image:loc><image:title>wiresharkpacketcapture</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/r1access.png</image:loc><image:title>R1Access</image:title></image:image><lastmod>2019-09-29T21:05:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/12/18/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/backdoor.jpg</image:loc><image:title>backdoor</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/juniper.jpg</image:loc><image:title>juniper</image:title><image:caption>Man lifting empty spotlit circle and entering hole below</image:caption></image:image><lastmod>2019-09-22T21:00:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/09/15/owasp-security-shepherd-sql-injection-solution-lsb/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/sql3.png</image:loc><image:title>sql3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/sql2.png</image:loc><image:title>sql2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/sql1.png</image:loc><image:title>sql1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/owasp1-sql-injection.jpg</image:loc><image:title>owasp1-sql-injection</image:title></image:image><lastmod>2019-09-19T21:51:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/06/21/python-scripting-for-the-ethical-hacker/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/06/py.jpg</image:loc><image:title>py</image:title></image:image><lastmod>2019-09-08T18:24:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/11/defending-against-csrf-attacks/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/csrf.jpg</image:loc><image:title>csrf</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/acx6.jpg</image:loc><image:title>acx6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/acx5.jpg</image:loc><image:title>acx5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/acx4.jpg</image:loc><image:title>acx4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/acx3.jpg</image:loc><image:title>acx3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/acx2.jpg</image:loc><image:title>acx2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/acx1.jpg</image:loc><image:title>acx1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/csrf-2.jpg</image:loc><image:title>csrf-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/csrf-1.jpg</image:loc><image:title>csrf-1</image:title></image:image><lastmod>2019-08-26T23:32:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/05/keeping-your-android-device-secure/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/cerberus.png</image:loc><image:title>cerberus</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/ratings.png</image:loc><image:title>ratings</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/telegram.jpg</image:loc><image:title>telegram</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/android.png</image:loc><image:title>android</image:title></image:image><lastmod>2019-08-25T21:19:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/04/sniffing-access-points-and-mac-addresses-using-python/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/snif-696x391.jpg</image:loc><image:title>snif-696x391</image:title></image:image><lastmod>2019-08-25T21:14:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/01/15/cracking-wpawpa2-encryption/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/01/wpa2.jpg</image:loc><image:title>wpa2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/01/workspace-1_0021.png</image:loc><image:title>workspace-1_0021</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/01/selection_00111.png</image:loc><image:title>selection_00111</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/01/selection_0131.png</image:loc><image:title>selection_0131</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/01/selection_0121.png</image:loc><image:title>selection_0121</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/01/selection_0111.png</image:loc><image:title>selection_0111</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/01/selection_0101.png</image:loc><image:title>selection_0101</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/01/selection_0091.png</image:loc><image:title>selection_0091</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/01/selection_0081.png</image:loc><image:title>selection_0081</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/01/selection_0071.png</image:loc><image:title>selection_0071</image:title></image:image><lastmod>2019-08-25T20:56:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/15/exploring-the-hacker-tools-of-mr-robot/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/remi.jpg</image:loc><image:title>remi</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/mrrobot.jpg</image:loc><image:title>mrrobot</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/mr1.jpg</image:loc><image:title>mr1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/windows95-netscape.png</image:loc><image:title>windows95-netscape</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/social-engineer-toolkit.png</image:loc><image:title>social-engineer-toolkit</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/meterpreter.png</image:loc><image:title>meterpreter</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/bluesniff-police-car.png</image:loc><image:title>bluesniff-police-car</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/btscanner-phone.png</image:loc><image:title>btscanner-phone</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/avast-winxp.png</image:loc><image:title>avast-winxp</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/canbus-hack.png</image:loc><image:title>canbus-hack</image:title></image:image><lastmod>2019-08-25T20:45:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/09/08/owasp-security-shepherd-poor-data-validation-solution-lsb/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/09/pdv10.png</image:loc><image:title>pdv10</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/09/pdv9.png</image:loc><image:title>pdv9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/09/pdv8.png</image:loc><image:title>pdv8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/09/pdv7.png</image:loc><image:title>pdv7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/09/pdv6.png</image:loc><image:title>pdv6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/09/pdv5.png</image:loc><image:title>pdv5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/09/pdv4.png</image:loc><image:title>pdv4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/09/pdv31.png</image:loc><image:title>pdv3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/09/pdv3.png</image:loc><image:title>pdv3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/09/pdv2.png</image:loc><image:title>pdv2</image:title></image:image><lastmod>2019-06-10T21:11:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/09/27/owasp-security-shepherd-failure-to-restrict-access-solution-lsb-2/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/owaspfra.png</image:loc><image:title>OWASPFRA</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/owasp8.jpg</image:loc><image:title>owasp8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/ftra52.png</image:loc><image:title>FTRA5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/ftra41.png</image:loc><image:title>FTRA4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/ftra31.png</image:loc><image:title>FTRA3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/ftra21.png</image:loc><image:title>FTRA2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/ftra11.png</image:loc><image:title>FTRA1</image:title></image:image><lastmod>2019-05-27T13:34:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/24/create-your-own-free-vpn-with-aws/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/vpn1.jpg</image:loc><image:title>vpn</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/vpn.jpg</image:loc><image:title>vpn</image:title></image:image><lastmod>2019-05-23T18:24:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/01/metasploit-for-the-aspiring-ethical-hacker-part-1/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/occupythewebotw-18x24.jpg</image:loc><image:title>occupythewebotw-18x24</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6549.jpg</image:loc><image:title>hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6549</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6548.jpg</image:loc><image:title>hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6548</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6547.jpg</image:loc><image:title>hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6547</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6546.jpg</image:loc><image:title>hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6546</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6545.jpg</image:loc><image:title>hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6545</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6544.jpg</image:loc><image:title>hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6544</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6543.jpg</image:loc><image:title>hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6543</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6542.jpg</image:loc><image:title>hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6542</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6541.jpg</image:loc><image:title>hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w6541</image:title></image:image><lastmod>2019-05-14T18:22:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/23/owasp-a1-injection-cause-and-prevention/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/a1.jpg</image:loc><image:title>a1</image:title></image:image><lastmod>2019-05-05T14:09:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/12/lets-untangle-blockchain/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/blockchain.png</image:loc><image:title>blockchain</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/iv-nlzwqid_lqbuhfm6egjbyzxgeqzs2upvg_pwbvq4.png</image:loc><image:title>iv-nlzwqid_lqbuhfm6egjbyzxgeqzs2upvg_pwbvq4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/dfwsbld88lcwtbl6pj5yfhy_vawl8q1mf50_uiejzfg.png</image:loc><image:title>dfwsbld88lcwtbl6pj5yfhy_vawl8q1mf50_uiejzfg</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/0h7f-xb_z2yb9yova6rbh1bvjtvkzyoxtro9x6bjv44.png</image:loc><image:title>0h7f-xb_z2yb9yova6rbh1bvjtvkzyoxtro9x6bjv44</image:title></image:image><lastmod>2019-04-26T22:02:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/04/07/create-an-sql-backdoor/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/04/back.png</image:loc><image:title>back</image:title></image:image><lastmod>2019-04-07T18:04:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/15/turning-firefox-into-a-pen-testing-tool/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/firefox.jpg</image:loc><image:title>firefox</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/hackbar1.png</image:loc><image:title>hackbar1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/firefox1.png</image:loc><image:title>firefox1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/hackbar.png</image:loc><image:title>hackbar</image:title><image:caption>HackBar in your browser.</image:caption></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/firefox.png</image:loc><image:title>firefox</image:title></image:image><lastmod>2019-03-18T12:06:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/22/exploiting-csrf-under-noscript-conditions/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/csrf.jpg</image:loc><image:title>csrf</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/csrf.png</image:loc><image:title>csrf</image:title></image:image><lastmod>2019-03-16T22:11:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/31/removing-malicious-adware-from-a-vulnerable-web-page/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/blocker.png</image:loc><image:title>blocker</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/html.png</image:loc><image:title>html</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/murray.png</image:loc><image:title>murray</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/inspect.png</image:loc><image:title>inspect</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/streamiing.png</image:loc><image:title>streamiing</image:title></image:image><lastmod>2019-03-15T19:37:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/20/a-guide-to-not-getting-hacked/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/hacked.png</image:loc><image:title>hacked</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/1510754288599-how-not-to-get-hacked-image1-1.png</image:loc><image:title>1510754288599-how-not-to-get-hacked-image1-1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/extensis11.png</image:loc><image:title>extensis11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/extensis21.png</image:loc><image:title>extensis21</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/banner111.png</image:loc><image:title>banner111</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/bitsbox111.png</image:loc><image:title>bitsbox111</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/1510754618566-screen-shot-2017-11-15-at-90309-am.png</image:loc><image:title>1510754618566-screen-shot-2017-11-15-at-90309-am</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/1231.jpg</image:loc><image:title>1231</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/extensis2.png</image:loc><image:title>extensis2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/extensis1.png</image:loc><image:title>extensis</image:title></image:image><lastmod>2019-03-05T23:04:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/11/11/the-hidden-wiki/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/hwiki.png</image:loc><image:title>hwiki</image:title></image:image><lastmod>2023-03-14T07:40:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/02/13/vfemail-suffers-catastrophic-hack/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/02/vfemail.png</image:loc><image:title>vfemail</image:title></image:image><lastmod>2019-02-13T14:18:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/05/24/password-cracking-with-john-the-ripper/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/05/john.png</image:loc><image:title>john</image:title></image:image><lastmod>2019-02-10T09:07:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/12/01/metasploit-for-the-aspiring-ethical-hacker-part-2/</loc><lastmod>2019-01-29T22:19:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/07/wafninja-web-application-firewall-attack-tool/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/ninja.jpg</image:loc><image:title>ninja</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/wafninja-web-application-firewall-attack-tool-waf-bypass-640x457.jpg</image:loc><image:title>wafninja-web-application-firewall-attack-tool-waf-bypass-640x457</image:title></image:image><lastmod>2019-01-29T20:36:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/11/11/now-is-the-time-linux-is-the-direction/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/1.png</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/engineer.jpg</image:loc><image:title>engineer</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/l6.png</image:loc><image:title>l6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/l5.png</image:loc><image:title>l5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/l4.png</image:loc><image:title>l4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/l3.png</image:loc><image:title>l3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/l2.png</image:loc><image:title>l2</image:title></image:image><lastmod>2019-01-24T22:41:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/01/20/its-time-to-take-back-our-internet/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/01/eyes.jpg</image:loc><image:title>eyes</image:title></image:image><lastmod>2019-01-28T21:36:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2019/01/07/intro-to-git-github-for-linux/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2019/01/git.png</image:loc><image:title>git</image:title></image:image><lastmod>2019-01-07T18:39:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/28/install-dvwa-on-ubuntu/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/dvwa.png</image:loc><image:title>dvwa</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/dvwa.jpg</image:loc><image:title>dvwa</image:title></image:image><lastmod>2019-01-03T21:54:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/12/05/nmap-scripts-for-recon/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/12/nmap.jpg</image:loc><image:title>nmap#</image:title></image:image><lastmod>2018-12-27T21:15:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/10/20/setup-and-run-apentest-lab-on-aws/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/image05-2.png</image:loc><image:title>image05-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/image16-2.png</image:loc><image:title>image16-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/image11-2.png</image:loc><image:title>image11-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/image08-2-1024x714.png</image:loc><image:title>image08-2-1024x714</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/image03-2.png</image:loc><image:title>image03-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/image00-2.png</image:loc><image:title>image00-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/image07-2.png</image:loc><image:title>image07-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/image10-2-1024x761.png</image:loc><image:title>image10-2-1024x761</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/image14-2-1024x713.png</image:loc><image:title>image14-2-1024x713</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/image12-2.png</image:loc><image:title>image12-2</image:title></image:image><lastmod>2018-12-27T20:37:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/12/23/create-a-backdoor-with-cryptcat/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/12/cryptcat.png</image:loc><image:title>cryptcat</image:title></image:image><lastmod>2018-12-23T17:21:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/12/17/veil-av-evasion-set-up-and-tutorial/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/12/cloak.jpg</image:loc><image:title>cloak</image:title></image:image><lastmod>2018-12-17T18:53:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/10/10/penetration-testing-complete-guide/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/10/pentest.jpg</image:loc><image:title>pentest</image:title></image:image><lastmod>2018-12-10T20:36:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/12/09/router-hardening-checklist/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/12/router.jpg</image:loc><image:title>router</image:title></image:image><lastmod>2018-12-09T19:33:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/11/30/500-million-marriott-guest-records-stolen/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/marriot.jpg</image:loc><image:title>marriot</image:title></image:image><lastmod>2018-12-08T19:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/11/26/cyber-monday-sale-starts-nowfor-a-week/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/go3.jpg</image:loc><image:title>go</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/go2.jpg</image:loc><image:title>go</image:title></image:image><lastmod>2018-11-30T18:35:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/11/20/sql-injection-attacks-2/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/sql.jpg</image:loc><image:title>sql</image:title></image:image><lastmod>2018-11-20T20:00:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/home/</loc><lastmod>2018-11-16T22:02:56+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linuxsecurityblog.com/2018/11/16/banks-must-embrace-crypto-or-bite-the-dust/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/crypto.png</image:loc><image:title>crypto</image:title></image:image><lastmod>2018-11-16T21:19:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/11/13/iptables-the-linux-firewall/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/iptables.png</image:loc><image:title>iptables</image:title></image:image><lastmod>2018-11-13T19:31:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/11/12/payload-in-pdf/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/meta.jpg</image:loc><image:title>meta</image:title></image:image><lastmod>2020-04-16T02:18:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/11/11/best-ad-blocker-apps-for-android/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/11/android.jpg</image:loc><image:title>android</image:title></image:image><lastmod>2018-11-11T21:45:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/10/25/linux-foundation-deals-for-lsb-followers/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/10/linux1.jpg</image:loc><image:title>linux1</image:title></image:image><lastmod>2018-10-25T20:50:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/08/20/security-shepherd-solutions/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/download-e1503241309198.jpg</image:loc><image:title>https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/secshep.jpg</image:loc><image:title>secshep</image:title></image:image><lastmod>2018-10-15T20:34:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/10/12/owasp-security-shepherd-session-management-challenge-one-solution-lsb/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/10/owasp.jpg</image:loc><image:title>owasp</image:title></image:image><lastmod>2018-10-12T21:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/09/21/owasp-security-shepherd-insecure-cryptographic-storage-challenge-1-solution-lsb/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/icsc2.png</image:loc><image:title>icsc2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/icsc1.png</image:loc><image:title>icsc1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/jpg.jpg</image:loc><image:title>jpg</image:title><image:caption>Vulnerabilities. Not encrypting sensitive data. Using home grown algorithms. Insecure use of strong algorithms. Continued use of proven weak algorithms (MD5, SHA-1, RC3, RC4, etc…) Hard coding keys, and storing keys in unprotected stores. Vulnerability. Preventing cryptographic flaws takes careful planning. The most common problems are: Not encrypting sensitive data. Using home grown algorithms. Insecure use of strong algorithms. Continued use of proven weak algorithms (MD5, SHA-1, RC3, RC4, etc…) Hard coding keys, and storing keys in unprotected stores.</image:caption></image:image><lastmod>2018-09-21T18:49:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/09/12/owasp-security-shepherd-cross-site-scripting-one-solution-lsb/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/grf.jpg</image:loc><image:title>grf</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/xss6.png</image:loc><image:title>xss6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/xss4.png</image:loc><image:title>xss4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/xss3.png</image:loc><image:title>xss3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/xss2.png</image:loc><image:title>xss2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/xss1.png</image:loc><image:title>xss1</image:title></image:image><lastmod>2018-09-12T20:47:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/09/12/join-us-in-the-fight-for-net-neutrality/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/nn.jpeg</image:loc><image:title>nn</image:title></image:image><lastmod>2018-09-12T20:29:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/09/10/owasp-security-shepherd-insecure-direct-object-reference-solution-lsb/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/idor11.jpg</image:loc><image:title>idor11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/idor4.png</image:loc><image:title>idor4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/idor3.png</image:loc><image:title>idor3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/idor2.png</image:loc><image:title>idor2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/idor1.png</image:loc><image:title>idor1</image:title></image:image><lastmod>2018-09-10T18:28:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/09/07/owasp-security-shepherd-failure-to-restrict-access-solution-lsb/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/secshep1.jpg</image:loc><image:title>secshep1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/ftra6.png</image:loc><image:title>FTRA6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/ftra51.png</image:loc><image:title>FTRA5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/ftra4.png</image:loc><image:title>FTRA4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/ftra5.png</image:loc><image:title>FTRA5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/ftra3.png</image:loc><image:title>FTRA3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/ftra2.png</image:loc><image:title>FTRA2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/09/ftra1.png</image:loc><image:title>FTRA1</image:title></image:image><lastmod>2018-09-07T21:20:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/29/000webhost-hacked-13-million-customers-exposed/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/screen-shot-2015-10-29-at-11-08-471.png</image:loc><image:title>screen-shot-2015-10-29-at-11-08-471</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/screen-shot-2015-10-29-at-11-08-47.png</image:loc><image:title>screen-shot-2015-10-29-at-11-08-47</image:title></image:image><lastmod>2018-09-06T12:54:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/08/20/wifite-hacking-wifi-the-easy-way/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/94e08-screenshot_wps.png</image:loc><image:title>94e08-screenshot_wps</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/c18d0-help.png</image:loc><image:title>c18d0-help</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/d9b00-screenshot_wep.png</image:loc><image:title>d9b00-screenshot_wep</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/e60da-attack.png</image:loc><image:title>e60da-attack</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/dd2c8-selecttarget.png</image:loc><image:title>dd2c8-selecttarget</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/screenshot_wps.png</image:loc><image:title>screenshot_wps</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/help.png</image:loc><image:title>help</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/screenshot_wep.png</image:loc><image:title>screenshot_wep</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/attack.png</image:loc><image:title>attack</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/wifite.png</image:loc><image:title>wifite</image:title></image:image><lastmod>2018-08-17T20:59:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/08/14/how-to-find-and-delete-where-google-knows-youve-been/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/08/photo.jpeg</image:loc><image:title>photo</image:title></image:image><lastmod>2018-08-14T21:48:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/10/30/you-dj-unlock-the-sampler/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/sampler.png</image:loc><image:title>samp[ler</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/miau.png</image:loc><image:title>miau</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/cropped2.png</image:loc><image:title>cropped2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/cropped.png</image:loc><image:title>cropped</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/menu.png</image:loc><image:title>menu</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/youdj.png</image:loc><image:title>youdj</image:title></image:image><lastmod>2018-08-10T19:31:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/08/09/w3af-walkthrough-and-tutorial/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/08/w3af.png</image:loc><image:title>w3af</image:title></image:image><lastmod>2018-08-09T17:15:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/08/23/security-shepherd-insecure-direct-object-reference-solution/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/avant.png</image:loc><image:title>avant</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/4.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/7.png</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/5.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/6.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/11.png</image:loc><image:title>11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/capture.png</image:loc><image:title>Capture</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/idor11.jpg</image:loc><image:title>IDOR1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/idor1.jpg</image:loc><image:title>IDOR1</image:title></image:image><lastmod>2018-08-01T17:08:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/08/21/installing-security-shepherd-on-vmware-workstation-12-player/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/owasp.jpg</image:loc><image:title>owasp</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/login.png</image:loc><image:title>login</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/bridge.png</image:loc><image:title>bridge</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/settings.png</image:loc><image:title>settings</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/secshep.png</image:loc><image:title>secshep</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/secshep1.jpg</image:loc><image:title>secshep</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/import2.png</image:loc><image:title>import2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/import.png</image:loc><image:title>import</image:title></image:image><lastmod>2018-07-26T20:35:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/07/25/national-sysadmin-appreciation-day/</loc><lastmod>2018-07-25T18:01:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/07/25/the-best-hacking-books-2018/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/07/handbook.jpg</image:loc><image:title>handbook</image:title></image:image><lastmod>2018-07-25T17:49:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/16/the-10-most-notorious-hacking-groups-of-all-time/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/syrian_electronic_army.jpg</image:loc><image:title>syrian_electronic_army</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/the_level_seven_crew_logo-300x158.jpg</image:loc><image:title>the_level_seven_crew_logo-300x158</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/anonymous-300x255.jpg</image:loc><image:title>anonymous-300x255</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/hacking-group-600x315.jpg</image:loc><image:title>hacking-group-600x315</image:title></image:image><lastmod>2018-07-05T19:03:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/24/owasp-a2-broken-authentication-and-session-management-lsb/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/a2.jpg</image:loc><image:title>a2</image:title></image:image><lastmod>2018-06-29T21:34:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/06/17/kubernetes-for-developers-lfd259/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/06/kubernetes2.jpg</image:loc><image:title>kubernetes2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/06/kubernetes.png</image:loc><image:title>kubernetes</image:title></image:image><lastmod>2018-06-27T21:02:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/06/21/linux-foundation-courses-certificates-on-offer-for-under-500-bucks-lsb/</loc><lastmod>2018-06-21T17:33:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/06/21/xss-in-canopy-login-page/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/06/linux.jpg</image:loc><image:title>linux</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/06/xss.jpg</image:loc><image:title>xss</image:title></image:image><lastmod>2018-06-21T10:33:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/06/21/ratecoin-xra/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/06/rate.png</image:loc><image:title>rate</image:title></image:image><lastmod>2018-06-21T08:42:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/05/27/10-off-linux-programming-development-training/</loc><lastmod>2018-05-27T17:38:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/05/27/stealing-signal-conversations-from-a-macbook/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/05/signal.jpg</image:loc><image:title>signal</image:title></image:image><lastmod>2018-05-27T16:51:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/05/24/setting-up-a-snort-ids-on-debian-linux/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/05/snort.gif</image:loc><image:title>snort</image:title></image:image><lastmod>2018-05-24T18:10:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/05/02/voise-once-in-a-generation-the-whole-game-changes/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/05/voise2.jpg</image:loc><image:title>voise2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/05/voise.png</image:loc><image:title>voise</image:title></image:image><lastmod>2018-05-02T15:20:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/01/03/spamming-facebook-messages/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/id3.png</image:loc><image:title>id</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/id1.png</image:loc><image:title>id</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/id21.png</image:loc><image:title>id2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/fac.png</image:loc><image:title>fac</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/bits.jpg</image:loc><image:title>bits</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/id2.png</image:loc><image:title>id2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/id.png</image:loc><image:title>id</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/mess.png</image:loc><image:title>mess</image:title></image:image><lastmod>2018-04-11T22:51:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/04/06/best-smb-firewalls/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/04/fire.png</image:loc><image:title>fire</image:title></image:image><lastmod>2018-04-06T19:46:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/03/31/how-does-ransomware-work/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/03/ran.jpg</image:loc><image:title>ran</image:title></image:image><lastmod>2018-03-31T20:36:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/15/best-onion-links/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/anon3-256x300.jpg</image:loc><image:title>anon3-256x300</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/anon2-242x300.jpg</image:loc><image:title>anon2-242x300</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/anon1-236x300.jpg</image:loc><image:title>anon1-236x300</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/deep-web-1000x595.jpg</image:loc><image:title>deep-web-1000x595</image:title></image:image><lastmod>2018-03-11T22:48:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/03/06/metal-mtl-shaping-digital-money/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/03/mtl.png</image:loc><image:title>mtl</image:title></image:image><lastmod>2018-03-06T18:01:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/02/20/top-ten-cryptocurrencies/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/02/lpt1.png</image:loc><image:title>lpt</image:title></image:image><lastmod>2018-02-20T23:14:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/02/12/15-off-enterprise-it-linux-system-admin/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/02/newl.jpg</image:loc><image:title>newL</image:title></image:image><lastmod>2018-02-12T14:42:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/02/02/enterprise-it-linux-system-administration-training/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/02/lizure.png</image:loc><image:title>lizure</image:title></image:image><lastmod>2018-02-06T12:00:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/01/30/etherium-crypto-royalty/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/eth.png</image:loc><image:title>eth</image:title></image:image><lastmod>2018-02-02T20:15:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/02/01/removing-network-malware/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/02/malware.jpg</image:loc><image:title>malware</image:title></image:image><lastmod>2018-02-02T20:04:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/01/30/removing-chrome-adware/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/malware.jpg</image:loc><image:title>malware</image:title></image:image><lastmod>2018-01-30T15:57:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/01/30/dascoin-taking-cryptocurrency-mainstream/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/das.png</image:loc><image:title>das</image:title></image:image><lastmod>2018-01-30T13:54:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/01/25/spectrecoin-xspec/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/spec.png</image:loc><image:title>spec</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/aly.jpg</image:loc><image:title>aly</image:title></image:image><lastmod>2018-01-25T19:15:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/01/22/could-cryptocurrencies-take-over-the-us-dollar-as-world-reserve-currency/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/cry.jpg</image:loc><image:title>cry</image:title></image:image><lastmod>2018-01-22T21:50:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/01/22/eryllium-ery/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/ery.jpg</image:loc><image:title>ery</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/ery.png</image:loc><image:title>ery</image:title></image:image><lastmod>2018-01-22T21:29:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/01/13/qubitcoin-q2c/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/qubit.png</image:loc><image:title>qubit</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/q2c.png</image:loc><image:title>q2c</image:title></image:image><lastmod>2018-01-14T14:32:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/01/11/will-2018-be-the-rise-of-the-altcoin/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/virta1.png</image:loc><image:title>virta</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/virta.png</image:loc><image:title>virta</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/vuc.png</image:loc><image:title>vuc</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/alt.png</image:loc><image:title>alt</image:title></image:image><lastmod>2018-01-13T23:10:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/01/12/how-to-crack-a-master-lock-combination-lock/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/safe.jpg</image:loc><image:title>safe</image:title></image:image><lastmod>2018-01-12T22:24:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/01/12/a-collection-of-secret-linux-humor/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/linux.jpg</image:loc><image:title>linux</image:title></image:image><lastmod>2018-01-12T20:47:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2018/01/04/how-to-get-started-in-trading-crypto-currency/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/screen.png</image:loc><image:title>screen</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/bit.jpg</image:loc><image:title>bit</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/trend.png</image:loc><image:title>trend</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2018/01/cry.png</image:loc><image:title>cry</image:title></image:image><lastmod>2018-01-04T22:51:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/12/04/light-ubuntu-lsb/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/12/lubuntu.jpg</image:loc><image:title>lubuntu</image:title></image:image><lastmod>2017-12-24T22:26:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/12/13/litecoin-ltc-making-a-killing/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/12/lite.jpg</image:loc><image:title>lite</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/12/lite2.png</image:loc><image:title>lite2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/12/lite1.png</image:loc><image:title>Litecoin in Euros</image:title><image:caption>Litecoin in Euros</image:caption></image:image><lastmod>2017-12-13T18:40:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/12/09/gpg-on-linux/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/12/gpg1.jpg</image:loc><image:title>gpg</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/12/gpg.jpg</image:loc><image:title>gpg</image:title></image:image><lastmod>2017-12-09T20:58:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/12/05/metasploit-for-the-aspiring-ethical-hacker-part-3-payloads-lsb/</loc><lastmod>2017-12-06T13:01:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/12/01/linux-log-files-lsb/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/12/linuxf.png</image:loc><image:title>linuxF</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/12/logs.jpg</image:loc><image:title>logs</image:title></image:image><lastmod>2017-12-04T17:51:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/27/metasploit-for-the-aspiring-ethical-hacker-part-1-2/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w65471.jpg</image:loc></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w65481.jpg</image:loc></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w65491.jpg</image:loc></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/occupythewebotw-18x241.jpg</image:loc><image:title>occupytheweb</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/12311.jpg</image:loc><image:title>1231</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w65411.jpg</image:loc></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/bitsbox1111.png</image:loc><image:title>bitsbox111</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w65421.jpg</image:loc></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/hack-like-pro-metasploit-for-aspiring-hacker-part-1-primer-overview-w65431.jpg</image:loc></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/extensis211.png</image:loc><image:title>extensis21</image:title></image:image><lastmod>2017-12-01T19:49:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/29/hackers-can-bypass-new-protections-in-macos-high-sierra/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/os.jpg</image:loc><image:title>os</image:title></image:image><lastmod>2018-06-22T00:51:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/22/black-friday-deals-lsb/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/newl.jpg</image:loc><image:title>newL</image:title></image:image><lastmod>2017-11-29T19:31:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/22/lsb-afilliate-programs/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/aff.png</image:loc><image:title>aff</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/avant1.png</image:loc><image:title>avant1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/1232.jpg</image:loc><image:title>1232</image:title></image:image><lastmod>2017-11-28T21:22:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/25/devs-check-out-how-vulnerable-your-code-is-to-hackers/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/vcg1.png</image:loc><image:title>vcg</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/scan11.png</image:loc><image:title>scan1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/vcg.png</image:loc><image:title>vcg</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/scan1.png</image:loc><image:title>scan1</image:title></image:image><lastmod>2017-11-25T22:52:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/25/create-an-effective-business-continuity-plan/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/bus.png</image:loc><image:title>bus</image:title></image:image><lastmod>2017-11-25T18:58:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/10/05/what-are-some-cool-deep-internet-websites/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/10/441px-deep_web_iceberg1.jpg</image:loc><image:title>441px-deep_web_iceberg</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/10/441px-deep_web_iceberg.jpg</image:loc><image:title>441px-deep_web_iceberg</image:title></image:image><lastmod>2017-11-20T20:53:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/16/google-dorking/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/extensis.png</image:loc><image:title>extensis</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/google.png</image:loc><image:title>google</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/250bf-google-hacking-tricks.png</image:loc><image:title>250bf-google-hacking-tricks</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/facd9-google-hacking-tricks1.png</image:loc><image:title>facd9-google-hacking-tricks1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/google-hacking-tricks1.png</image:loc><image:title>google-hacking-tricks1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/banner11.png</image:loc><image:title>banner11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/bitsbox11.png</image:loc><image:title>bitsbox11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/google-hacking-tricks.png</image:loc><image:title>google-hacking-tricks</image:title></image:image><lastmod>2017-11-20T16:23:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/16/amazon-key-lets-delivery-people-into-your-house-and-it-just-got-hacked/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/amazon.jpg</image:loc><image:title>amazon</image:title></image:image><lastmod>2017-11-16T20:27:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/16/best-firewalls-for-business/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/firewall.png</image:loc><image:title>firewall</image:title></image:image><lastmod>2017-11-16T00:16:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/14/linux-foundation-e-learning-courses-available-now-2/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/bitsbox1.png</image:loc><image:title>bitsbox</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/banner1.png</image:loc><image:title>banner</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/linux11.jpg</image:loc><image:title>Featured Image -- 5029</image:title></image:image><lastmod>2017-11-15T15:54:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/12/on-web-extensions-shortcomings-and-their-impact-on-add-on-security/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/web.png</image:loc><image:title>web</image:title></image:image><lastmod>2017-11-12T11:38:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/11/08/set-up-a-honeypot-on-aws/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/honey.jpg</image:loc><image:title>honey</image:title><image:caption>103030484</image:caption></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/awsssh.png</image:loc><image:title>awsssh</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/mhnsnort.png</image:loc><image:title>mhnsnort</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/awskey.png</image:loc><image:title>awskey</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/awsputtygen.png</image:loc><image:title>awsputtygen</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/awsputtykey.png</image:loc><image:title>awsputtykey</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/honeypot2.png</image:loc><image:title>honeypot2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/awsubuntu.png</image:loc><image:title>awsubuntu</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/awssecuritygroup.png</image:loc><image:title>awssecuritygroup</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/11/userinput-1.png</image:loc><image:title>userinput-1</image:title></image:image><lastmod>2017-11-08T19:33:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/08/28/how-to-hijack-web-browsers-using-beef/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/emnpaqa.png</image:loc><image:title>emnpaqa</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/gisvfko.png</image:loc><image:title>gisvfko</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/za8vhzp.png</image:loc><image:title>za8vhzp</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/fsum4sw.png</image:loc><image:title>fsum4sw</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/ephzqzt.png</image:loc><image:title>ephzqzt</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/sgfimol.png</image:loc><image:title>sgfimol</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/cgbueya.png</image:loc><image:title>cgbueya</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/loaflwk.png</image:loc><image:title>loaflwk</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/uap3l5a.png</image:loc><image:title>uap3l5a</image:title></image:image><lastmod>2017-11-07T23:53:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/08/15/edward-snowden-divulges-the-easiest-ways-to-protect-yourself-online/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/snowden.jpg</image:loc><image:title>snowden</image:title></image:image><lastmod>2017-11-07T23:50:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/10/19/kracking-wpa2/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/10/krack.jpg</image:loc><image:title>krack</image:title></image:image><lastmod>2017-10-19T18:40:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/08/29/linux-commands-everyone-should-know/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/example_netstat.png</image:loc><image:title>example_netstat</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/wang_rosemary.jpg</image:loc><image:title>wang_rosemary</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/example_topwithc.png</image:loc><image:title>example_topwithc</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/example_top.png</image:loc><image:title>example_top</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/example_tail.png</image:loc><image:title>example_tail</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/rh_003499_01_linux11x_cc.png</image:loc><image:title>rh_003499_01_linux11x_cc</image:title></image:image><lastmod>2017-08-29T22:50:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/08/28/nmap-to-map-your-network/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/nmap11.png</image:loc><image:title>nmap11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/nmap1.png</image:loc><image:title>nmap</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/nmap.png</image:loc><image:title>nmap</image:title></image:image><lastmod>2017-08-28T13:42:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/08/17/how-elliot-fsociety-made-their-hack-of-evil-corp-untraceable/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w145610.jpg</image:loc><image:title>hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w145610</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w145611.jpg</image:loc><image:title>hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w145611</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14565.jpg</image:loc><image:title>hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14565</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14566.jpg</image:loc><image:title>hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14566</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14567.jpg</image:loc><image:title>hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14567</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14568.jpg</image:loc><image:title>hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14568</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14569.jpg</image:loc><image:title>hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14569</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14562.jpg</image:loc><image:title>hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14562</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14563.jpg</image:loc><image:title>hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14563</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14564.jpg</image:loc><image:title>hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-w14564</image:title></image:image><lastmod>2017-08-17T08:09:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/08/16/build-your-own-linux/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/build.png</image:loc><image:title>build</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/linux1.jpg</image:loc><image:title>linux1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/linux.jpg</image:loc><image:title>linux</image:title></image:image><lastmod>2017-08-16T17:37:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/08/15/malware-types-explained/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/metasploit-cve-2015-5122-flash-exploit-5.jpg</image:loc><image:title>metasploit-cve-2015-5122-flash-exploit-5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/malware-types-explained-trojan-files.jpg</image:loc><image:title>malware-types-explained-trojan-files</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/malware-types-explained-e1463047084767.jpg</image:loc><image:title>malware-types-explained-e1463047084767</image:title></image:image><lastmod>2017-08-15T15:04:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/08/15/zanti2-session-cookie-hijacking-2/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/08/zanti1.png</image:loc><image:title>zanti1</image:title></image:image><lastmod>2017-08-15T14:47:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/07/29/aaron-swartz-and-mit-the-inside-story/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/icon-promo-quote-red.gif</image:loc><image:title>icon-promo-quote-red</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/swartz-surveillance-08.jpg</image:loc><image:title>swartz-surveillance-08</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/swartz-surveillance-05.jpg</image:loc><image:title>swartz-surveillance-05</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/swartz-surveillance-14.jpg</image:loc><image:title>swartz-surveillance-14</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/aaronswartzny.jpg</image:loc><image:title>aaronswartzny</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/swartz-surveillance-06.jpg</image:loc><image:title>swartz-surveillance-06</image:title></image:image><lastmod>2017-07-29T14:09:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/07/22/cyberwar-a-look-at-the-arms-race-of-the-future/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/nsa_css_threat_operations_center.jpg</image:loc><image:title>nsa_css_threat_operations_center</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/electric_grid_operations_systems_and_communications_mockup.png</image:loc><image:title>electric_grid_operations_systems_and_communications_mockup</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/aurora_generator_test.jpg</image:loc><image:title>aurora_generator_test</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/havex_source_code_excerpt.png</image:loc><image:title>havex_source_code_excerpt</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/cyber1.png</image:loc><image:title>cyber1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/cyber.png</image:loc><image:title>cyber</image:title></image:image><lastmod>2017-07-22T18:18:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/07/18/hacker-allegedly-steals-7-4-million-in-ethereum/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/1500311731630-shutterstock_342910907-2.jpeg</image:loc><image:title>1500311731630-shutterstock_342910907-2</image:title></image:image><lastmod>2017-07-18T08:41:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/07/07/how-the-copycat-malware-infected-android-devices-around-the-world/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/copycat_blog_260x260.jpg</image:loc><image:title>copycat_blog_260x260</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/copycat-by-the-numbers.jpg</image:loc><image:title>copycat-by-the-numbers</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/where-copycat-is-concentrated.jpg</image:loc><image:title>where-copycat-is-concentrated</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/infographic-how-copycat-earns-millions.jpg</image:loc><image:title>+CopyCat-Infographics_all</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/infographic-top-12-countries-300x200.jpg</image:loc><image:title>infographic-top-12-countries-300x200</image:title></image:image><lastmod>2017-07-07T07:46:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/07/04/systemd-flaw-leaves-many-linux-distros-open-to-attack/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/c76f12bf2855ab8f7aa88469e1665571_m.jpg</image:loc><image:title>c76f12bf2855ab8f7aa88469e1665571_m</image:title></image:image><lastmod>2017-07-04T08:06:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/07/02/lessons-from-petyanopetya/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/petya.jpg</image:loc><image:title>petya</image:title></image:image><lastmod>2017-07-03T20:38:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/07/03/rfid-hacking-in-the-workplaceschool/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/rfid.jpg</image:loc><image:title>Featured Image -- 4264</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/rfidscanner.png</image:loc><image:title>rfidscanner.PNG</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/cheaprfidscanner.png</image:loc><image:title>cheaprfidscanner.PNG</image:title></image:image><lastmod>2017-07-03T11:22:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/07/03/how-shipping-giant-maersk-dealt-with-a-malware-meltdown-and-other-security-news-this-week/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/07/maersk-featureart-452261027.jpg</image:loc><image:title>maersk-featureart-452261027</image:title></image:image><lastmod>2017-07-03T08:07:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/06/14/blackarch-linux-iso-available/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/06/black.png</image:loc><image:title>black</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/06/vn.png</image:loc><image:title>vn</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/06/tw.png</image:loc><image:title>tw</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/06/us.png</image:loc><image:title>us</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/06/ch.png</image:loc><image:title>ch</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/06/tr.png</image:loc><image:title>tr</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/06/sg.png</image:loc><image:title>sg</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/06/se.png</image:loc><image:title>se</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/06/ru.png</image:loc><image:title>ru</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/06/pl.png</image:loc><image:title>pl</image:title></image:image><lastmod>2017-06-14T14:59:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/06/07/using-appcache-and-serviceworker-for-evil/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/06/mk.png</image:loc><image:title>mk</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/06/appcache1.jpeg</image:loc><image:title>appcache1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/06/appcache.jpeg</image:loc><image:title>appcache</image:title></image:image><lastmod>2017-06-07T13:27:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/05/26/configuring-mysql-securely/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/sql1.jpeg</image:loc><image:title>sql1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/sql.jpeg</image:loc><image:title>sql</image:title></image:image><lastmod>2017-05-26T14:40:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/05/23/full-owasp-penetration-test-links-from-start-to-finish/</loc><lastmod>2017-05-25T18:27:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/05/18/how-to-install-applications-from-the-command-line-using-apt-dnf-and-zypper/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/linux101hero.jpg</image:loc><image:title>linux101hero</image:title></image:image><lastmod>2017-05-18T07:45:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/05/04/fake-google-docs-phishing-deluge-hits-gmail/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/unnamed.jpeg</image:loc><image:title>unnamed</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/asha-barbaschow-140-105.jpg</image:loc><image:title>asha-barbaschow-140-105</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/unnamed2.png</image:loc><image:title>unnamed2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/unnamed11.png</image:loc><image:title>unnamed11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/unnamed1.png</image:loc><image:title>unnamed1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/unnamed.png</image:loc><image:title>unnamed</image:title></image:image><lastmod>2017-05-04T14:43:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/10/25/iot-devices-need-to-be-secured/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/10/internet.png</image:loc><image:title>internet</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/10/iot.jpg</image:loc><image:title>iot</image:title></image:image><lastmod>2017-05-03T21:10:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/05/03/ddos-attacks-surge-organizations-struggle-to-respond/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/ddos1.jpeg</image:loc><image:title>ddos1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/jai-vijayan.jpg</image:loc><image:title>jai-vijayan</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/05/ddos.jpeg</image:loc><image:title>ddos</image:title></image:image><lastmod>2017-05-03T07:42:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/04/27/thousands-of-computers-now-compromised-with-leaked-nsa-tools/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/04/unnamed-1.png</image:loc><image:title>unnamed-1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/04/server.jpg</image:loc><image:title>server</image:title></image:image><lastmod>2017-04-27T18:35:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/04/27/how-to-install-webgoat-on-ubuntu/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/04/webgoat2.jpeg</image:loc><image:title>webgoat2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/04/webgoat-dom-injection-700x407.png</image:loc><image:title>webgoat-dom-injection-700x407</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/04/webgoat-lessons-621x460.png</image:loc><image:title>webgoat-lessons-621x460</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/04/webgoat-login-616x460-1.png</image:loc><image:title>webgoat-login-616x460-1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/04/webgoat1.jpeg</image:loc><image:title>webgoat1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/04/webgoat.jpeg</image:loc><image:title>webgoat</image:title></image:image><lastmod>2017-04-27T10:09:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/04/19/trying-to-make-a-difference-is-harder-than-you-may-think/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/04/end10.jpg</image:loc><image:title>end10</image:title></image:image><lastmod>2017-04-26T18:17:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/04/17/how-he-broke-into-hacking-team-servers/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/finfisher-s-account-of-how-he-broke-into-hackingteam-servers-503078-2.jpg</image:loc><image:title>finfisher-s-account-of-how-he-broke-into-hackingteam-servers-503078-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/finfisher-s-account-of-how-he-broke-into-hackingteam-servers-503078-3.jpg</image:loc><image:title>finfisher-s-account-of-how-he-broke-into-hackingteam-servers-503078-3</image:title></image:image><lastmod>2017-04-15T18:47:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/04/03/forget-vpns-for-private-browsing-get-involved-with-tor/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/04/tor.png</image:loc><image:title>tor</image:title></image:image><lastmod>2017-04-04T10:15:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/03/29/most-android-devices-lack-latest-security-patches/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/03/android_security-100586128-primary-idge.jpg</image:loc><image:title>android_security-100586128-primary-idge</image:title></image:image><lastmod>2017-03-29T07:39:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/12/19/the-coolest-hacks-of-2017-so-far/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/12/kelly_jackson_higgins.jpg</image:loc><image:title>kelly_jackson_higgins</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/12/hack1.jpg</image:loc><image:title>hack1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/12/hack.jpg</image:loc><image:title>hack</image:title></image:image><lastmod>2017-03-28T21:18:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/03/21/hackers-are-already-targeting-our-critical-infrastructure/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/03/1490037525657-5764388136_db779016d1_o.jpeg</image:loc><image:title>1490037525657-5764388136_db779016d1_o</image:title></image:image><lastmod>2017-03-21T14:44:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/03/20/inside-the-russian-hack-of-yahoo/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/03/170315-fbi-2-100713716-large.jpg</image:loc><image:title>170315-fbi-2-100713716-large</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/03/yahoo1.jpeg</image:loc><image:title>yahoo1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/03/yahoo.jpeg</image:loc><image:title>yahoo</image:title></image:image><lastmod>2017-03-20T08:39:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/03/19/sql-injection-attacks/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/03/sql1.jpg</image:loc><image:title>sql1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/03/steve1.jpg</image:loc><image:title>steve1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/03/sql.jpg</image:loc><image:title>sql</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/03/steve.jpg</image:loc><image:title>steve</image:title></image:image><lastmod>2017-03-19T17:31:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/03/19/in-the-wild-exploits-ramp-up-against-sites-using-apache-struts/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/03/cve-2017-5638-exploit-attempts-760x380.png</image:loc><image:title>cve-2017-5638-exploit-attempts-760x380</image:title></image:image><lastmod>2017-03-19T16:15:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/03/05/the-best-free-alternatives-to-paid-software/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/03/open.png</image:loc><image:title>open</image:title></image:image><lastmod>2017-03-05T15:18:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/02/24/serious-cloudflare-bug-exposes-secret-customer-data/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/secret-640x422.jpg</image:loc><image:title>secret-640x422</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/cloudflare-leak-300x112.png</image:loc><image:title>cloudflare-leak-300x112</image:title></image:image><lastmod>2017-02-24T14:38:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/11/19/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/11/ads-640x480.jpg</image:loc><image:title>ads-640x480</image:title></image:image><lastmod>2017-02-22T12:28:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/11/25/tor-project-appeals-for-help-to-continue/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/11/tor.jpg</image:loc><image:title>tor</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/11/tor.png</image:loc><image:title>tor</image:title></image:image><lastmod>2017-02-22T12:28:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/20/privacy-conscious-users-rejoice-facebooks-android-app-now-supports-tor-pcworld/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/tor-logo-100588038-orig.png</image:loc><image:title>tor-logo-100588038-orig</image:title></image:image><lastmod>2017-02-22T12:23:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/09/online-security-braces-for-quantum-revolution/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/for20web20gettyimages-564086461.jpg</image:loc><image:title>for20web20gettyimages-564086461</image:title></image:image><lastmod>2017-02-22T11:51:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/12/01/researchers-poke-hole-in-custom-crypto-built-for-aws/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/cookie-300x150.jpg</image:loc><image:title>cookie-300x150</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/aws-640x427.jpg</image:loc><image:title>aws-640x427</image:title></image:image><lastmod>2017-02-22T11:49:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/12/07/moves-to-rein-in-dark-networks/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/hacker_gettyimages.jpg</image:loc><image:title>hacker_gettyimages</image:title></image:image><lastmod>2017-02-22T11:48:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/06/dutch-government-embraces-encryption-denounces-backdoors/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/1368641239-bpfull-68x68.jpg</image:loc><image:title>1368641239-bpfull-68x68</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/shutterstock_256978837-680x400.jpg</image:loc><image:title>shutterstock_256978837-680x400</image:title></image:image><lastmod>2017-02-22T11:47:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/09/md5-function-torpedoes-crypto-protections-in-https-and-ipsec/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/unlocked-300x150.jpg</image:loc><image:title>unlocked-300x150</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/torpedo-640x457.jpg</image:loc><image:title>torpedo-640x457</image:title></image:image><lastmod>2017-02-22T11:43:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/12/02/the-attack-that-broke-the-dark-web/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/tor_fail_1a.gif</image:loc><image:title>tor_fail_1a</image:title></image:image><lastmod>2017-02-22T11:42:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/02/22/git-branches-in-a-nutshell/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/checkout-master.png</image:loc><image:title>checkout-master</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/advance-master.png</image:loc><image:title>advance-master</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/advance-testing.png</image:loc><image:title>advance-testing</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/head-to-testing.png</image:loc><image:title>head-to-testing</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/head-to-master.png</image:loc><image:title>head-to-master</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/two-branches.png</image:loc><image:title>two-branches</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/branch-and-history.png</image:loc><image:title>branch-and-history</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/commits-and-parents.png</image:loc><image:title>commits-and-parents</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/commit-and-tree1.png</image:loc><image:title>commit-and-tree1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/commit-and-tree.png</image:loc><image:title>commit-and-tree</image:title></image:image><lastmod>2017-02-22T10:51:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/07/22/shifting-from-windows-to-linux-ask-paul/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/linux.jpg</image:loc><image:title>linux</image:title></image:image><lastmod>2017-02-19T19:38:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/02/02/setup-lets-encrypt-with-nginx/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/lets-encrypt.png</image:loc><image:title>lets-encrypt</image:title></image:image><lastmod>2017-02-19T19:23:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/02/19/facebook-manifesto-redacted-to-omit-plans-for-ai-to-monitor-private-messages/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/liam-tung.jpg</image:loc><image:title>liam-tung</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/f8-facebook-mark-zuckerberg-0094.jpg</image:loc><image:title>f8-facebook-mark-zuckerberg-0094</image:title></image:image><lastmod>2017-02-19T18:30:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/02/09/think-like-a-hacker-to-secure-your-network/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/hacker1.jpg</image:loc><image:title>hacker1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/hacker.jpg</image:loc><image:title>hacker</image:title></image:image><lastmod>2017-02-09T09:32:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/02/01/how-trolls-hackers-and-spies-are-rewriting-the-rules-of-conflict/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/admiralrogers.jpg</image:loc><image:title>admiralrogers</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/img4683.jpg</image:loc><image:title>img4683</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/drone.jpg</image:loc><image:title>Drone silhouette</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/drone1.jpg</image:loc><image:title>Drone silhouette</image:title></image:image><lastmod>2017-02-03T16:23:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/02/03/creating-a-tcp-port-scanner-with-bash/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/source-code1.jpeg</image:loc><image:title>source-code1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/source-code.jpeg</image:loc><image:title>source-code</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/02/source-code11.jpeg</image:loc><image:title>source-code11</image:title></image:image><lastmod>2017-02-03T12:20:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2017/01/05/us-government-subcontractor-leaks-confidential-military-data/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/01/screen-shot-2016-12-31-at-12-25-07.jpg</image:loc><image:title>screen-shot-2016-12-31-at-12-25-07</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2017/01/the-pentagon.jpg</image:loc><image:title>the-pentagon</image:title></image:image><lastmod>2017-01-05T22:38:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/12/07/where-to-buy-your-stolen-data/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/12/01-image.png</image:loc><image:title>01-image</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/12/hacker1.jpg</image:loc><image:title>hacker1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/12/hacker.jpg</image:loc><image:title>hacker</image:title></image:image><lastmod>2016-12-07T19:45:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/11/30/apktool-demo/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/11/apk.png</image:loc><image:title>apk</image:title></image:image><lastmod>2016-11-30T22:10:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/11/30/beating-the-bad-guys-with-their-own-tricks/</loc><lastmod>2016-11-30T20:24:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/11/20/malware-asks-for-a-selfie-as-it-steals-your-information/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/11/malware.jpg</image:loc><image:title>malware</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/11/2016-10-17-image-41.png</image:loc><image:title>2016-10-17-image-41</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/11/2016-10-17-image-2.png</image:loc><image:title>2016-10-17-image-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/11/2016-10-17-image-4.png</image:loc><image:title>2016-10-17-image-4</image:title></image:image><lastmod>2019-03-11T09:03:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/05/lockpicking/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/lock-2.jpg</image:loc><image:title>lock-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/lock-6.jpg</image:loc><image:title>lock-6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/shim.jpg</image:loc><image:title>shim</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/lock-3.jpg</image:loc><image:title>lock-3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/lock-1.jpg</image:loc><image:title>lock-1</image:title></image:image><lastmod>2016-11-02T20:58:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/09/24/upgrade-your-ssh-keys/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/09/ssh_keys_tw1.jpg</image:loc><image:title>ssh_keys_tw</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/09/20160923_old_key_picture.jpg</image:loc><image:title>20160923_old_key_picture</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/09/ssh_keys_tw.jpg</image:loc><image:title>ssh_keys_tw</image:title></image:image><lastmod>2016-09-24T15:16:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/09/02/new-paypal-phishing-scam/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/09/angler-phishing-l.png</image:loc><image:title>angler-phishing-l</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/09/paypal.png</image:loc><image:title>paypal</image:title></image:image><lastmod>2016-09-08T12:27:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/28/create-a-persistent-backdoor-in-android-using-kali-linux/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/android-hacked.jpg</image:loc><image:title>Android-hacked</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/create-persistent-back-door-android-using-kali-linux-w6549.jpg</image:loc><image:title>create-persistent-back-door-android-using-kali-linux-w6549</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/create-persistent-back-door-android-using-kali-linux-w6547.jpg</image:loc><image:title>create-persistent-back-door-android-using-kali-linux-w6547</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/create-persistent-back-door-android-using-kali-linux-w6548.jpg</image:loc><image:title>create-persistent-back-door-android-using-kali-linux-w6548</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/create-persistent-back-door-android-using-kali-linux-w6545.jpg</image:loc><image:title>create-persistent-back-door-android-using-kali-linux-w6545</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/create-persistent-back-door-android-using-kali-linux-w6546.jpg</image:loc><image:title>create-persistent-back-door-android-using-kali-linux-w6546</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/create-persistent-back-door-android-using-kali-linux-w6544.jpg</image:loc><image:title>create-persistent-back-door-android-using-kali-linux-w6544</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/create-persistent-back-door-android-using-kali-linux-w6542.jpg</image:loc><image:title>create-persistent-back-door-android-using-kali-linux-w6542</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/create-persistent-back-door-android-using-kali-linux-w6543.jpg</image:loc><image:title>create-persistent-back-door-android-using-kali-linux-w6543</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/create-persistent-back-door-android-using-kali-linux-w6541.jpg</image:loc><image:title>create-persistent-back-door-android-using-kali-linux-w6541</image:title></image:image><lastmod>2016-09-01T20:26:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/09/01/a-new-tor-that-can-resist-next-generation-state-surveillance/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/09/vuvuzela-anonymity-network-graph-640x451.png</image:loc><image:title>vuvuzela-anonymity-network-graph-640x451</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/09/server.gif</image:loc><image:title>server</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/09/tor-stinks-snowden-doc-300x237.png</image:loc><image:title>tor-stinks-snowden-doc-300x237</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/09/userstats-relay-country-tr-2016-07-01-2016-07-20-off-300x188.png</image:loc><image:title>userstats-relay-country-tr-2016-07-01-2016-07-20-off-300x188</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/09/star-trek-next-generation-ncc-1701-d-760x380.jpg</image:loc><image:title>star-trek-next-generation-ncc-1701-d-760x380</image:title></image:image><lastmod>2016-09-01T13:59:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/08/17/littlewoods-ireland-blog-awards-vote-for-ls-blog/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/blog.png</image:loc><image:title>blog</image:title></image:image><lastmod>2016-08-17T14:54:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/08/11/security-with-machine-learning-artificial-intelligence-and-cognitive-computing/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/hunting-snark.jpg</image:loc><image:title>hunting-snark</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/machine-learning-threat-detection.jpg</image:loc><image:title>machine-learning-threat-detection</image:title></image:image><lastmod>2016-08-11T08:09:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/08/08/hacking-linux-with-armitage/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/armiitage.jpg</image:loc><image:title>armiitage</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/image11.png</image:loc><image:title>image11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/image10.png</image:loc><image:title>image10</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/image9.png</image:loc><image:title>image9</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/image8.png</image:loc><image:title>image8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/image7.png</image:loc><image:title>image7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/image6.png</image:loc><image:title>image6</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/image5.png</image:loc><image:title>image5</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/image4.png</image:loc><image:title>image4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/image3.png</image:loc><image:title>image3</image:title></image:image><lastmod>2016-08-08T14:01:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/05/26/shortened-urls-may-affect-our-privacy/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/longurl.jpg</image:loc><image:title>longurl</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/goodri.png</image:loc><image:title>goodri</image:title></image:image><lastmod>2016-08-06T18:17:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/08/02/cracking-the-adventure-time-cipher/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/equation3.gif</image:loc><image:title>equation3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/equation2.gif</image:loc><image:title>equation2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/equation1.gif</image:loc><image:title>equation1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/initialandfinalpigpen-1024x450.png</image:loc><image:title>initialandfinalpigpen-1024x450</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/pigpenknownkeys_4.png</image:loc><image:title>pigpenknownkeys_4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/pigpenknownkeys_3.png</image:loc><image:title>pigpenknownkeys_3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/ciphertext_2-1024x85.png</image:loc><image:title>ciphertext_2-1024x85</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/ciphertext_1-1024x38.png</image:loc><image:title>ciphertext_1-1024x38</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/repeatedciphersignature1.png</image:loc><image:title>repeatedciphersignature1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/08/english_letter_frequency-1024x819.png</image:loc><image:title>english_letter_frequency-1024x819</image:title></image:image><lastmod>2016-08-02T10:23:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/07/29/safe-skies-luggage-master-key-released-online-by-hackers/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/keyillustration5-003-100672714-large-idge.png</image:loc><image:title>keyillustration5-003-100672714-large-idge</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/steve-square-100610538-byline.jpg</image:loc><image:title>steve-square-100610538-byline</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/tsa-master_keys-travelsentry_xmas-2-100673378-large-idge.jpg</image:loc><image:title>tsa-master_keys-travelsentry_xmas-2-100673378-large-idge</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/tsa-master_keys-travelsentry_xmas-100673377-primary-idge.jpg</image:loc><image:title>tsa-master_keys-travelsentry_xmas-100673377-primary-idge</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/tsa-master-keys-100614098-large-idge.jpg</image:loc><image:title>tsa-master-keys-100614098-large-idge</image:title></image:image><lastmod>2016-07-29T13:05:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/07/27/malicious-computers-caught-snooping-on-dark-web-sites/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/malicious-tor-relays-640x214.jpg</image:loc><image:title>malicious-tor-relays-640x214</image:title></image:image><lastmod>2016-07-27T08:46:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/07/21/dna-based-encrypted-storage/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/dna2.jpg</image:loc><image:title>dna</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/stevezcloseup.jpg</image:loc><image:title>stevezcloseup</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/dna11.jpg</image:loc><image:title>dna11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/dna1.jpg</image:loc><image:title>dna</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/dna.jpg</image:loc><image:title>dna</image:title></image:image><lastmod>2016-07-21T12:54:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/07/15/schneier-has-joined-the-tor-project/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/god.jpg</image:loc><image:title>god</image:title></image:image><lastmod>2016-07-16T09:02:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/07/12/the-tor-network-security-and-crime/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/onionscan-transitive-12.png</image:loc><image:title>onionscan-transitive-12</image:title></image:image><lastmod>2016-07-12T08:49:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/07/05/lizard-squad-taking-over-cctv-devices-to-conduct-ddos-attacks/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/07/lizard-squad-taking-over-cctv-devices-to-conduct-ddos-attacks.jpg</image:loc><image:title>lizard-squad-taking-over-cctv-devices-to-conduct-ddos-attacks</image:title></image:image><lastmod>2016-07-05T14:01:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/06/29/655000-personal-medical-records-public/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/06/surgery-doctors-medical-health-580x358.jpg</image:loc><image:title>surgery-doctors-medical-health-580x358</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/06/dave-neal-inq-100x100.jpg</image:loc><image:title>dave-neal-inq-100x100</image:title></image:image><lastmod>2016-06-29T19:15:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/06/27/a-bug-in-chrome-makes-it-easy-to-pirate-movies-wired/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/06/chrome-fa-1024x683.jpg</image:loc><image:title>chrome-fa-1024x683</image:title></image:image><lastmod>2016-06-27T09:19:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/06/16/biggest-cybersecurity-threats-in-2016/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/06/102115067-488808075-530x298.jpg</image:loc><image:title>102115067-488808075-530x298</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/06/103108705-tayler_harriet_2015-60x60.jpg</image:loc><image:title>103108705-tayler_harriet_2015-60x60</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/06/102534578-482189037-530x298.jpg</image:loc><image:title>102534578-482189037-530x298</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/06/102728362-508482235-530x298.jpg</image:loc><image:title>102728362-508482235-530x298</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/06/101434928-461697665-80x60.jpg</image:loc><image:title>101434928-461697665-80x60</image:title></image:image><lastmod>2016-06-16T12:55:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/06/16/millions-potentially-impacted-by-verticalscope-hack/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/06/vert1.png</image:loc><image:title>vert1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/06/vert.png</image:loc><image:title>vert</image:title></image:image><lastmod>2016-06-16T12:43:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/06/07/malware-analysis-toolkit-using-free-tools/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/06/malware1.jpg</image:loc><image:title>malware1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/06/malware.jpg</image:loc><image:title>malware</image:title></image:image><lastmod>2016-06-07T07:45:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/05/30/update-router-firmware-in-6-steps/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/aid1467162-728px-update-router-firmware-step-2-version-2.jpg</image:loc><image:title>aid1467162-728px-update-router-firmware-step-2-version-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/aid1467162-728px-update-router-firmware-step-3-version-21.jpg</image:loc><image:title>aid1467162-728px-update-router-firmware-step-3-version-21</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/aid1467162-728px-update-router-firmware-step-4-version-2.jpg</image:loc><image:title>aid1467162-728px-update-router-firmware-step-4-version-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/aid1467162-728px-update-router-firmware-step-5-version-2.jpg</image:loc><image:title>aid1467162-728px-update-router-firmware-step-5-version-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/aid1467162-728px-update-router-firmware-step-6-version-2.jpg</image:loc><image:title>aid1467162-728px-update-router-firmware-step-6-version-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/aid1467162-728px-update-router-firmware-step-3-version-2.jpg</image:loc><image:title>aid1467162-728px-update-router-firmware-step-3-version-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/aid1467162-728px-update-router-firmware-step-1-version-2.jpg</image:loc><image:title>aid1467162-728px-update-router-firmware-step-1-version-2</image:title></image:image><lastmod>2016-05-30T14:59:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/05/28/app-tracks-where-governments-hack-activists-and-reporters-wired/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/screen-shot-2016-05-25-at-2-54-35-pm-2-582x470.png</image:loc><image:title>screen-shot-2016-05-25-at-2-54-35-pm-2-582x470</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/screen-shot-2016-05-25-at-1-33-55-pm-1-1024x564.png</image:loc><image:title>screen-shot-2016-05-25-at-1-33-55-pm-1-1024x564</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/ransomeware-600x338.jpg</image:loc><image:title>ransomeware-600x338</image:title></image:image><lastmod>2016-05-28T21:28:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/05/24/ransomware-master-decryption-key-released/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/new-locker-crypto-repents-imagecredsymantec.jpg</image:loc><image:title>new-locker-crypto-repents-imagecredsymantec</image:title></image:image><lastmod>2016-05-24T07:57:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/05/24/hacker-fans-give-mr-robot-website-free-security-checkup/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/screen-shot-2016-05-16-at-11-11-28-am-640x347.png</image:loc><image:title>screen-shot-2016-05-16-at-11-11-28-am-640x347</image:title></image:image><lastmod>2016-05-24T07:54:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/05/12/how-to-dual-boot-linux-and-windows/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/ff05it2h2wek4jt-medium.jpg</image:loc><image:title>ff05it2h2wek4jt-medium</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/fjh53jxh337klwf-medium.jpg</image:loc><image:title>fjh53jxh337klwf-medium</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/foip38ch337klpr-medium.jpg</image:loc><image:title>foip38ch337klpr-medium</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/f6pwgieh347fou3-medium.jpg</image:loc><image:title>f6pwgieh347fou3-medium</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/fllmkb0h337klms-medium.jpg</image:loc><image:title>fllmkb0h337klms-medium</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/f0in0olh347fou2-medium.jpg</image:loc><image:title>f0in0olh347fou2-medium</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/fpr4rich337kgf2-medium.jpg</image:loc><image:title>fpr4rich337kgf2-medium</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/f2i0pp2h2wexbin-medium.jpg</image:loc><image:title>f2i0pp2h2wexbin-medium</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/fspotl7h337kge6-medium.jpg</image:loc><image:title>fspotl7h337kge6-medium</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/f18l0mzh337klr9-medium.jpg</image:loc><image:title>f18l0mzh337klr9-medium</image:title></image:image><lastmod>2016-05-12T14:15:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/20/no-one-talks-about-zero-days/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/gettyimages-530881765-640x426.jpg</image:loc><image:title>gettyimages-530881765-640x426</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/defcon-carhackvill-copy-300x100.jpg</image:loc><image:title>defcon-carhackvill-copy-300x100</image:title></image:image><lastmod>2016-05-09T21:53:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/05/09/10-year-old-gets-bounty-for-finding-instagram-vulnerability/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/bieber-instagram-640x420.png</image:loc><image:title>bieber-instagram-640x420</image:title></image:image><lastmod>2016-05-09T09:58:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/05/06/how-to-install-and-use-logwatch-log-analyzer/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/logwatch1.jpg</image:loc><image:title>logwatch1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/05/logwatch.jpg</image:loc><image:title>logwatch</image:title></image:image><lastmod>2016-05-06T09:07:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/04/25/reconnaissance-information-gathering-for-the-ethical-hacker/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/recon.jpg</image:loc><image:title>recon</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/google.jpg</image:loc><image:title>google</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/trace.jpg</image:loc><image:title>trace</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/dns.jpg</image:loc><image:title>dns</image:title></image:image><lastmod>2016-04-25T11:03:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/04/23/tesla-model-s-hacked-to-play-movies/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/gentoo-model-s-3-630x308.jpg</image:loc><image:title>gentoo-model-s-3-630x308</image:title></image:image><lastmod>2016-04-23T15:37:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/04/20/locky-changes-communications-and-spreads-with-the-nuclear-ek/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/combinationlockclose-up-_248340-900x535.jpg</image:loc><image:title>combination lock close-up</image:title></image:image><lastmod>2016-04-20T15:12:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/04/20/the-buffer-overflow/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/basic-stack-exploit-rop-300x257.png</image:loc><image:title>basic-stack-exploit-rop-300x257</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/basic-stack-exploit-trampoline-300x367.png</image:loc><image:title>basic-stack-exploit-trampoline-300x367</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/visual-studio-980x339.png</image:loc><image:title>visual-studio-980x339</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/basic-stack-normal-usage-300x510.png</image:loc><image:title>basic-stack-normal-usage-300x510</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/basic-stack-300x510.png</image:loc><image:title>basic-stack-300x510</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/buffer-overflow.jpg</image:loc><image:title>buffer-overflow</image:title></image:image><lastmod>2016-04-20T14:20:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/04/19/keep-identity-anonymous-using-tor-and-vpn/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/tor-gif.gif</image:loc><image:title>tor-gif</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/these-small-anonabox-devices-keep-your-identity-anonymous-using-tor.png</image:loc><image:title>these-small-anonabox-devices-keep-your-identity-anonymous-using-tor</image:title></image:image><lastmod>2016-04-19T20:55:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/04/13/encrypt-your-digital-life/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/encypt.png</image:loc><image:title>encypt</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/hacker.gif</image:loc><image:title>hacker</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/encrypt3.png</image:loc><image:title>encrypt3</image:title></image:image><lastmod>2016-04-13T18:18:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/04/13/an-nsa-proof-twitter-built-with-code-from-bitcoin-and-bittorrent/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/miguel_by_enrico_marone-660x9901.jpg</image:loc><image:title>miguel_by_enrico_marone-660x9901</image:title></image:image><lastmod>2016-04-13T13:37:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/04/11/must-go-to-cybersecurity-conferences-for-hackers/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/conference-b-sides.png</image:loc><image:title>conference-b-sides</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/conference-hack-nuit.png</image:loc><image:title>conference-hack-nuit</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/conference-troopers.png</image:loc><image:title>conference-troopers</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/conference-blackhat.png</image:loc><image:title>conference-blackhat</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/conference-thotcon.png</image:loc><image:title>conference-thotcon</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/conference-rsa.png</image:loc><image:title>conference-rsa</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/conference-owasp.png</image:loc><image:title>conference-owasp</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/conference-toorcon.png</image:loc><image:title>conference-toorcon</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/conference-shmoocon.png</image:loc><image:title>conference-shmoocon</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/conference-defcon.png</image:loc><image:title>conference-defcon</image:title></image:image><lastmod>2016-04-11T09:56:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/04/09/free-https-encryption-for-all-wordpress-blogs/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/https.jpg</image:loc><image:title>https</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/swati.png</image:loc><image:title>swati</image:title></image:image><lastmod>2016-04-09T17:14:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/04/08/whos-tracking-your-location-just-about-everybody/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/mobile2.jpg</image:loc><image:title>mobile</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/mobile11.jpg</image:loc><image:title>mobile11</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/mobile1.jpg</image:loc><image:title>mobile</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/mobile.jpg</image:loc><image:title>mobile</image:title></image:image><lastmod>2016-04-08T13:10:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/04/08/the-rise-of-ransomware/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/ransom1.png</image:loc><image:title>ransom1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/ramsom2.png</image:loc><image:title>ramsom2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/ransom3.jpg</image:loc><image:title>ransom3</image:title></image:image><lastmod>2016-04-08T08:21:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/04/06/navigating-through-the-underground-internet/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/silkroadscreenshot-640x640.jpg</image:loc><image:title>silkroadscreenshot-640x640</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/anatomyoflayeredpacket-640x640.png</image:loc><image:title>anatomyoflayeredpacket-640x640</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/nodesillustration2-640x640.png</image:loc><image:title>nodesillustration2-640x640</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/04/tor-dark-web-private-browsing-security-2-1200x630-c.jpg</image:loc><image:title>tor-dark-web-private-browsing-security-2-1200x630-c</image:title></image:image><lastmod>2016-04-06T19:44:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/31/automatron-robot-scope-exploit/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/468px-vlcsnap-2016-03-29-09h17m09s631.png</image:loc><image:title>468px-vlcsnap-2016-03-29-09h17m09s631</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/468px-vlcsnap-2016-03-29-09h17m09s63.png</image:loc><image:title>468px-vlcsnap-2016-03-29-09h17m09s63</image:title></image:image><lastmod>2016-03-31T10:49:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/30/angler-malvertising-campaign-hits-top-publishers/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/angler_new.png</image:loc><image:title>angler_new</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/photodune-10328090-faceless-hooded-anonymous-computer-hacker-s.jpg</image:loc><image:title>Faceless hooded anonymous computer hacker</image:title></image:image><lastmod>2016-03-30T14:57:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/29/petya-ransomware-leverages-dropbox/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/petya_944586.png</image:loc><image:title>petya_944586</image:title></image:image><lastmod>2016-03-29T14:52:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/29/tor-project-says-it-can-quickly-catch-spying-code/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/tor-100646626-primary-idge.jpg</image:loc><image:title>tor-100646626-primary-idge</image:title></image:image><lastmod>2016-03-29T10:21:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/25/using-pgpgpg-like-a-pro/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/pgp.png</image:loc><image:title>pgp</image:title></image:image><lastmod>2016-03-25T18:34:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/24/snowden-was-the-target-in-the-lavabit-case/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/lavabit_snowden-email-582x518.jpg</image:loc><image:title>lavabit_snowden-email-582x518</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/snowden-ap_983291448293-660x442.jpg</image:loc><image:title>snowden-ap_983291448293-660x442</image:title></image:image><lastmod>2016-03-24T18:25:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/22/maltego-for-recon/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/dhsj266c_17z72wqgdq_b.gif</image:loc><image:title>dhsj266c_17z72wqgdq_b</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/dhsj266c_185hh4fhc8_b.gif</image:loc><image:title>dhsj266c_185hh4fhc8_b</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/dhsj266c_16tdrbkggg_b.gif</image:loc><image:title>dhsj266c_16tdrbkggg_b</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/dhsj266c_15hjgm8zhg_b.gif</image:loc><image:title>dhsj266c_15hjgm8zhg_b</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/dhsj266c_13dcjdwgdh_b.gif</image:loc><image:title>dhsj266c_13dcjdwgdh_b</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/dhsj266c_14jxwzg8cp_b.gif</image:loc><image:title>dhsj266c_14jxwzg8cp_b</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/icon_smile1.gif</image:loc><image:title>icon_smile1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/dhsj266c_12dnfwg6g4_b.gif</image:loc><image:title>dhsj266c_12dnfwg6g4_b</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/dhsj266c_11c8nbnxf5_b.gif</image:loc><image:title>dhsj266c_11c8nbnxf5_b</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/dhsj266c_20cjx35pdg_b.gif</image:loc><image:title>dhsj266c_20cjx35pdg_b</image:title></image:image><lastmod>2016-03-22T21:12:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/21/is-the-dark-web-the-largest-honeypot-ever-created/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/dweb.jpg</image:loc><image:title>dweb</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/jason-murdock.jpg</image:loc><image:title>jason-murdock</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/tor-web-browser1.jpg</image:loc><image:title>tor-web-browser1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/tor-web-browser.jpg</image:loc><image:title>tor-web-browser</image:title></image:image><lastmod>2016-03-21T16:10:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/21/is-someone-watching-you-online-the-security-risks-of-the-iot/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/image-20160308-15341-25eo4c.png</image:loc><image:title>image-20160308-15341-25eo4c</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/hack.jpg</image:loc><image:title>hack</image:title></image:image><lastmod>2016-03-21T12:14:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/19/ransomware-now-part-of-massive-spam-attack/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/ransomware7.jpg</image:loc><image:title>ransomware7</image:title></image:image><lastmod>2016-03-19T14:54:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/11/5-most-dangerous-cyber-security-vulnerabilities/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/dangersec2.jpg</image:loc><image:title>dangersec</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/2015-12-07_9-02-06-244x300.jpg</image:loc><image:title>2015-12-07_9-02-06-244x300</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/dangersec1.jpg</image:loc><image:title>dangersec1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/dangersec.jpg</image:loc><image:title>dangersec</image:title></image:image><lastmod>2016-03-11T19:47:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/09/contribute-to-privacy-configure-yourself-a-tor-relay/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/tor.png</image:loc><image:title>tor</image:title></image:image><lastmod>2016-03-09T21:48:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/07/staying-anonymous-with-tor/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/17rp9pzgs0jfypng.png</image:loc><image:title>17rp9pzgs0jfypng</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/18q2p7bjkerxyjpg.jpg</image:loc><image:title>18q2p7bjkerxyjpg</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/17xhl1us770ysjpg.jpg</image:loc><image:title>17xhl1us770ysjpg</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/18quinu2vkrxsjpg.jpg</image:loc><image:title>18quinu2vkrxsjpg</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/17roqiux3gryljpg.jpg</image:loc><image:title>17roqiux3gryljpg</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/19c53ejkivxszjpg.jpg</image:loc><image:title>19c53ejkivxszjpg</image:title></image:image><lastmod>2016-03-07T14:00:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/04/authmatrix-for-burp-suite/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/new_title.png</image:loc><image:title>new_title</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/img1-640x414.png</image:loc><image:title>img1-640x414</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/burp21.png</image:loc><image:title>burp21</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/burp2.png</image:loc><image:title>burp</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/burp1.png</image:loc><image:title>burp</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/burp.png</image:loc><image:title>burp</image:title></image:image><lastmod>2016-03-04T20:31:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/04/the-crypto-wars-are-global-motherboard/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/1403626558484577.jpg</image:loc><image:title>1403626558484577</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/1457121155949779.jpg</image:loc><image:title>1457121155949779</image:title></image:image><lastmod>2016-03-04T20:14:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/21/linux-mint-hacked/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/mint.png</image:loc><image:title>mint</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/linuxmint.jpg</image:loc><image:title>linuxmint</image:title></image:image><lastmod>2016-03-03T22:22:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/03/01/more-than-11-million-openssl-https-websites-at-risk/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/ssl.png</image:loc><image:title>ssl</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/1eea3-drown-attack.png</image:loc><image:title>1eea3-drown-attack</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/swati.png</image:loc><image:title>swati</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/drown-attack.png</image:loc><image:title>drown-attack</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/03/drown-attack-openssl-vulnerability.png</image:loc><image:title>drown-attack-openssl-vulnerability</image:title></image:image><lastmod>2016-03-01T18:53:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/23/cross-sire-scripting-cheat-sheet/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/xss.gif</image:loc><image:title>xss</image:title></image:image><lastmod>2016-02-29T18:36:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/29/threats-to-your-security-when-using-social-media/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/socialmedi.jpg</image:loc><image:title>socialMedi</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/ellib.jpg</image:loc><image:title>ellib</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/snetsec1.jpg</image:loc><image:title>snetsec1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/snetsec.jpg</image:loc><image:title>snetsec</image:title></image:image><lastmod>2016-02-29T18:22:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/24/the-darknet-faq/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/dark.png</image:loc><image:title>dark</image:title></image:image><lastmod>2016-02-24T20:14:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/23/how-mobile-ads-leak-personal-data/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/georgiatechd.jpg</image:loc><image:title>georgiatechd</image:title></image:image><lastmod>2016-02-23T21:24:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/22/vnc-server-discovered-in-comodo-gear/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/shutterstock_1523671971.jpg</image:loc><image:title>shutterstock_1523671971</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/shutterstock_152367197.jpg</image:loc><image:title>shutterstock_152367197</image:title></image:image><lastmod>2016-02-22T11:07:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/18/popular-tools-for-brute-force-attacks/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/maxresdefault.jpg</image:loc><image:title>maxresdefault</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/brute1.jpg</image:loc><image:title>brute1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/brute.jpg</image:loc><image:title>brute</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/brute.png</image:loc><image:title>brute</image:title></image:image><lastmod>2016-02-21T12:03:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/13/as-promised-hacker-leaks-contact-info-of-fbi-employees/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/fbi-agents-federal-bureau-of-investigation-2-e1455029506129.jpg</image:loc><image:title>fbi-agents-federal-bureau-of-investigation-2-e1455029506129</image:title></image:image><lastmod>2016-02-13T10:24:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/09/google-has-gathered-info-on-you-heres-how-to-delete-it/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/715.jpg</image:loc><image:title>715</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/615.jpg</image:loc><image:title>615</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/512.jpg</image:loc><image:title>512</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/414.jpg</image:loc><image:title>414</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/338.jpg</image:loc><image:title>338</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/2-1.jpg</image:loc><image:title>2-1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/228.jpg</image:loc><image:title>228</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/139.jpg</image:loc><image:title>139</image:title></image:image><lastmod>2016-02-09T19:14:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/08/whatsapp-scam-drops-malware-on-your-device/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/new-scam-tricks-whatsapp-users-into-opening-malware-2.jpg</image:loc><image:title>new-scam-tricks-whatsapp-users-into-opening-malware-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/new-scam-tricks-whatsapp-users-into-opening-malware.jpg</image:loc><image:title>new-scam-tricks-whatsapp-users-into-opening-malware</image:title></image:image><lastmod>2016-02-08T22:32:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/03/comodos-so-called-secure-internet-browser-comes-with-disabled-security-features/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/c13c4-chromodo-browser.png</image:loc><image:title>c13c4-chromodo-browser</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/chromodo-browser.png</image:loc><image:title>chromodo-browser</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/comodo-web-browser-security.png</image:loc><image:title>comodo-web-browser-security</image:title></image:image><lastmod>2016-02-03T16:08:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/02/02/police-used-stingrays-in-planes-to-spy-on-phones/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/02/dirtbox-02-1024x512.jpg</image:loc><image:title>dirtbox-02-1024x512</image:title></image:image><lastmod>2016-02-02T20:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/30/a-beginners-guide-to-i2p/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/darknet.png</image:loc><image:title>darknet</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/i2p-guide-hacker.png</image:loc><image:title>i2p-guide-hacker</image:title></image:image><lastmod>2016-02-25T16:43:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/30/start-your-defcon-24-homework-now/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/homework-100639139-primary-idge.jpg</image:loc><image:title>homework-100639139-primary-idge</image:title></image:image><lastmod>2016-02-01T20:25:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/31/giant-ddos-attacks-are-now-hitting-500gbps/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/ddosattack.jpg</image:loc><image:title>Online spy ware concept with hand wearing black leather glove pr</image:title></image:image><lastmod>2016-02-01T20:23:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/31/how-to-pick-a-lock/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/practice.jpg</image:loc><image:title>practice</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/rake.gif</image:loc><image:title>rake</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/rakeinsert.jpg</image:loc><image:title>rakeinsert</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/toomuchpressure.png</image:loc><image:title>toomuchpressure</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/pincatching.jpg</image:loc><image:title>pincatching</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/wrench.jpg</image:loc><image:title>wrench</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/pickset.jpg</image:loc><image:title>pickset</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/correctkey.jpg</image:loc><image:title>correctkey</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/wrongkey.jpg</image:loc><image:title>wrongkey</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/pins.gif</image:loc><image:title>pins</image:title></image:image><lastmod>2016-02-01T20:22:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/26/internet-security-blogs-you-should-be-reading/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/hs-must-read-internet-security-blogs.png</image:loc><image:title>hs-must-read-internet-security-blogs</image:title></image:image><lastmod>2016-01-26T16:24:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/23/azerbaijani-hackers-deface-nato-armenia-embassy-websites-in-40-countries/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/azerbaijani-hackers-defac-nato-armenia-and-embassy-domains-2.jpg</image:loc><image:title>azerbaijani-hackers-defac-nato-armenia-and-embassy-domains-2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/azerbaijani-hackers-defac-nato-armenia-and-embassy-domains-4.jpg</image:loc><image:title>azerbaijani-hackers-defac-nato-armenia-and-embassy-domains-4</image:title></image:image><lastmod>2016-01-23T21:48:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/23/us-is-not-seeking-backdoor-access-to-encrypted-communication-but-wants-backdoor/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/us.jpg</image:loc><image:title>us</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/kaspersky.jpg</image:loc><image:title>kaspersky</image:title></image:image><lastmod>2016-01-23T18:05:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/22/google-creates-fix-for-zero-day-kernel-flaw-effect-on-android-is-greatly-exaggerated/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/150817-google-marshmallow-06-100608187-primary-idge.jpg</image:loc><image:title>150817-google-marshmallow-06-100608187-primary-idge</image:title></image:image><lastmod>2016-01-22T14:07:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/18/install-and-configure-vsftpd-with-tls-on-debian-8/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/debian.png</image:loc><image:title>debian</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/vsftpd_interface.png</image:loc><image:title>vsftpd_interface</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/ssl_cert.png</image:loc><image:title>ssl_cert</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/filezilla_server_settings.png</image:loc><image:title>filezilla_server_settings</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/filezilla_menu.png</image:loc><image:title>filezilla_menu</image:title></image:image><lastmod>2016-01-18T19:45:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/14/us-intelligence-director-hacked/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/computer-hacker.jpg</image:loc><image:title>Computer-Hacker</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/brennan-cia_-1.jpg</image:loc><image:title>Intelligence Leaders Testify At House Hearing On World Wide Cyber Threats</image:title></image:image><lastmod>2016-01-15T12:01:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/10/create-a-botnet/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/bot.jpg</image:loc><image:title>bot</image:title></image:image><lastmod>2016-01-12T22:55:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/12/access-amazon-from-the-command-line-on-linux/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/rss_small.png</image:loc><image:title>rss_small</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/24245917661_ab0c9de7ee_c.jpg</image:loc><image:title>24245917661_ab0c9de7ee_c</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/24032851560_21172599d7_c.jpg</image:loc><image:title>24032851560_21172599d7_c</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/24220224552_e90781bf7c_c1.jpg</image:loc><image:title>24220224552_e90781bf7c_c1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/23700218514_2166bc4754_c.jpg</image:loc><image:title>23700218514_2166bc4754_c</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/24328438935_4413e742ac_c.jpg</image:loc><image:title>24328438935_4413e742ac_c</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/23960624109_ddf212436c_c.jpg</image:loc><image:title>23960624109_ddf212436c_c</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/24302253076_33019aea50_c.jpg</image:loc><image:title>24302253076_33019aea50_c</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/23701618293_d2ef9efa7e_c.jpg</image:loc><image:title>23701618293_d2ef9efa7e_c</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/24220224552_e90781bf7c_c.jpg</image:loc><image:title>24220224552_e90781bf7c_c</image:title></image:image><lastmod>2016-03-11T15:20:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/12/this-may-have-been-the-largest-ddos-attack-in-history/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/b5b18-swati.png</image:loc><image:title>b5b18-swati</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/ddos2.jpg</image:loc><image:title>ddos2</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/ddos1.jpg</image:loc><image:title>ddos1</image:title></image:image><lastmod>2016-01-12T21:05:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/04/bbc-trump-attacks-just-the-start-says-hacktivist-group/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/image1.png</image:loc><image:title>image1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/newsroom.jpg</image:loc><image:title>newsroom</image:title></image:image><lastmod>2016-01-04T17:58:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2016/01/01/chrome-users-are-at-risk/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2016/01/avgs-extension-is-flawed-chrome-users-are-at-risk.png</image:loc><image:title>avgs-extension-is-flawed-chrome-users-are-at-risk</image:title></image:image><lastmod>2016-01-01T21:12:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/12/21/hello-kitty-hacked-3-3-million-accounts-exposed/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/uk-may-legalize-spying-on-individuals-via-their-kids-toys.jpg</image:loc><image:title>uk-may-legalize-spying-on-individuals-via-their-kids-toys</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/hello-kitty-hacked-3-3-million-account-exposed.jpg</image:loc><image:title>Halo Kitty</image:title></image:image><lastmod>2015-12-21T20:00:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/12/18/vulnerability-in-united-airlines-website/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/hacker-earns-50000-free-airmiles-after-finding-flaw-in-united-airlines-site.jpg</image:loc><image:title>hacker-earns-50000-free-airmiles-after-finding-flaw-in-united-airlines-site</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/hacker-earns-50k-miles-by-exposing-vulnerability-in-united-airlines-website.jpg</image:loc><image:title>hacker-earns-50k-miles-by-exposing-vulnerability-in-united-airlines-website</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/united-airlines-website-vulnerability-reported.jpg</image:loc><image:title>united-airlines-website-vulnerability-reported</image:title></image:image><lastmod>2015-12-18T23:27:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/12/18/open-source-unleashes-blockchains-enterprise-potential/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/photo-100608200-byline.jpg</image:loc><image:title>photo-100608200-byline</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/blockchain-100633835-primary-idge.jpg</image:loc><image:title>blockchain-100633835-primary-idge</image:title></image:image><lastmod>2015-12-18T13:53:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/12/11/close-the-internet/</loc><lastmod>2015-12-11T21:49:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/12/10/tell-the-white-house-we-cant-sacrifice-security/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/12/crypto.jpg</image:loc><image:title>crypto</image:title></image:image><lastmod>2015-12-10T23:04:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/11/12/tor-says-feds-paid-carnegie-mellon-1m-to-help-unmask-users-wired/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/11/gettyimages-571701879-1024x710.jpg</image:loc><image:title>gettyimages-571701879-1024x710</image:title></image:image><lastmod>2015-11-12T21:28:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/11/06/cia-email-hackers-return-with-major-breach/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/11/jabs-582x432.png</image:loc><image:title>jabs-582x432</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/11/gettyimages-119091542-660x495.jpg</image:loc><image:title>gettyimages-119091542-660x495</image:title></image:image><lastmod>2015-11-06T19:14:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/11/03/internet-firms-to-be-banned-from-offering-unbreakable-encryption/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/11/whitehead_1461494j.jpg</image:loc><image:title>whitehead_1461494j</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/11/mi5_hq_thames_hous_3165519b.jpg</image:loc><image:title>mi5_hq_thames_hous_3165519b</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/11/iphone6_2988853b.jpg</image:loc><image:title>iphone6_2988853b</image:title></image:image><lastmod>2015-11-03T21:13:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/11/03/eu-parliament-clears-a-path-to-give-snowden-asylum/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/11/ed-snowden-platon-inline.jpg</image:loc><image:title>ed-snowden-platon-inline</image:title></image:image><lastmod>2015-11-03T21:04:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/11/02/tor-launches-anti-censorship-messenger-service-bbc-news/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/11/86406976_servers.jpg</image:loc><image:title>86406976_servers</image:title></image:image><lastmod>2015-11-02T12:27:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/29/cisa-data-sharing-bill-passes-a-sad-day-for-privacy-on-the-internet/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/screen-shot-2015-03-13-at-12-48-53-am.jpg</image:loc><image:title>screen-shot-2015-03-13-at-12-48-53-am</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/cyber.png</image:loc><image:title>cyber</image:title></image:image><lastmod>2015-10-29T00:07:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/23/is-it-still-possible-to-do-phone-phreaking-yes/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/phonephreaking13301.jpg</image:loc><image:title>phonephreaking1330</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/phonephreaking1330.jpg</image:loc><image:title>phonephreaking1330</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/jeremy_kirk-100029837-byline.jpg</image:loc><image:title>jeremy_kirk-100029837-byline</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/volte-attack-100622763-large.jpg</image:loc><image:title>volte-attack-100622763-large</image:title></image:image><lastmod>2015-10-27T15:46:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/22/10-sec-hack-delivers-first-ever-malware-to-fitness-trackers/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/fditbit.jpg</image:loc><image:title>fditbit</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/security87.jpg</image:loc><image:title>security87</image:title></image:image><lastmod>2015-10-22T10:36:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/19/teen-who-hacked-cia-directors-email-tells-how-he-did-it-wired/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/ap_771241671783-1200x630-e1445292594127.jpg</image:loc><image:title>John Brennan CIA Nomination Hearing</image:title></image:image><lastmod>2015-10-19T22:34:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/19/a-second-snowden-has-leaked-a-mother-lode-of-drone-docs/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/gettyimages-159531646-582x464.jpg</image:loc><image:title>gettyimages-159531646-582x464</image:title></image:image><lastmod>2015-10-19T14:27:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/17/how-the-nsa-can-break-trillions-of-encrypted-web-and-vpn-connections/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/nsa-hq-300x150.jpg</image:loc><image:title>nsa-hq-300x150</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/web-servers-300x150.jpg</image:loc><image:title>web-servers-300x150</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/data-center-640x425.jpg</image:loc><image:title>data-center-640x425</image:title></image:image><lastmod>2015-10-17T19:28:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/16/encryption-is-more-important-and-easier-than-ever-the-new-york-times/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/15encrypt-facebookjumbo.jpg</image:loc><image:title>15encrypt-facebookjumbo</image:title></image:image><lastmod>2015-10-16T09:53:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/14/daily-mail-readers-should-be-worried-about-the-angler-exploit-kit/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/malware-security-hooded-data-cyber-crime-criminal-crook.jpg</image:loc><image:title>malware-security-hooded-data-cyber-crime-criminal-crook</image:title></image:image><lastmod>2015-10-14T22:03:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/14/how-to-do-image-steganography-on-linux/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/pic_1.jpg</image:loc><image:title>pic_1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/pic_21.jpg</image:loc><image:title>pic_21</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/pic_2.jpg</image:loc><image:title>pic_2</image:title></image:image><lastmod>2015-10-14T11:57:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/13/california-now-has-the-nations-best-digital-privacy-law/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/online-privacy.jpg</image:loc><image:title>online-privacy</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/securityroundup_topart_01-600x450-e1440189716673.jpg</image:loc><image:title>securityroundup_topart_01-600x450-e1440189716673</image:title></image:image><lastmod>2015-10-13T20:55:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/12/anti-virus-bypass-with-shellter-5-1-on-kali-linux/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/daniel-w-dieterle-150x150.jpg</image:loc><image:title>daniel-w-dieterle-150x150</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/anti-virus-bypass-with-shellter-on-kali-linux-650x400.jpg</image:loc><image:title>anti-virus-bypass-with-shellter-on-kali-linux-650x400</image:title></image:image><lastmod>2015-10-12T23:14:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/10/critical-netgear-router-exploit-allows-anyone-to-hack-you-remotely/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/khyati.png</image:loc><image:title>khyati</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/netgear-router-hack.jpg</image:loc><image:title>netgear-router-hack</image:title></image:image><lastmod>2015-10-10T11:29:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/08/amazon-launches-web-application-firewall-for-aws/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/aws-appliance1.png</image:loc><image:title>aws-appliance1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/aws-appliance.png</image:loc><image:title>AWS-appliance</image:title></image:image><lastmod>2015-10-08T11:27:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/07/ddos-attacks-create-smokescreens-for-larceny/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/xl-2015-cyber-vulnerabilities-1.jpg</image:loc><image:title>xl-2015-cyber-vulnerabilities-1</image:title></image:image><lastmod>2015-10-07T17:04:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/06/linux-16-security-packages-against-windows-and-linux-malware-put-to-the-test/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/linvwin.jpeg</image:loc><image:title>linvwin</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/csm_0915_sophos_dashbaord_01_f6e8db53a4.png</image:loc><image:title>csm_0915_sophos_dashbaord_01_f6e8db53a4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/csm_0915_kaspersky_fileserver_01_d8b5c52919.png</image:loc><image:title>csm_0915_kaspersky_fileserver_01_d8b5c52919</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/csm_0915_eset_dashboard_01_c02c716c84.png</image:loc><image:title>csm_0915_eset_dashboard_01_c02c716c84</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/csm_0915_linux_tabelle_scanwerte_neu2_en_e39cb92ad7.png</image:loc><image:title>csm_0915_linux_tabelle_scanwerte_neu2_en_e39cb92ad7</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/csm_0915_linux_infografik_en_adaa477f49.png</image:loc><image:title>csm_0915_linux_infografik_en_adaa477f49</image:title></image:image><lastmod>2015-12-15T03:44:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/06/hacking-wireless-printers-with-phones-on-drones/</loc><lastmod>2015-10-06T20:17:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/06/landmark-eu-ruling-says-us-privacy-protections-are-inadequate/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/facebook-stock-1102-0-0.jpg</image:loc><image:title>facebook-stock-1102-0-0</image:title></image:image><lastmod>2015-10-06T10:08:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/03/welcome-to-the-darknet-the-underground-for-the-underground/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/darknet.jpg</image:loc><image:title>darknet</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/infographic-the-darknet-dark-web-tor.jpg</image:loc><image:title>infographic-the-darknet-dark-web-tor</image:title></image:image><lastmod>2015-12-15T03:48:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/02/how-hackers-use-your-ip-address-to-hack-your-computer/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/hackers-use-your-ip-address-hack-your-computer-stop-w6541.jpg</image:loc><image:title>hackers-use-your-ip-address-hack-your-computer-stop-w6541</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/hackers-use-your-ip-address-hack-your-computer-stop-w654.jpg</image:loc><image:title>hackers-use-your-ip-address-hack-your-computer-stop-w654</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/999.jpg</image:loc><image:title>999</image:title></image:image><lastmod>2015-10-02T22:39:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/02/patreon-was-warned-of-serious-website-flaw-5-days-before-it-was-hacked/</loc><lastmod>2015-10-02T22:17:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/02/car-hack-technique-uses-dealerships-to-spread-malware/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/img_20150929_1038381-582x445.jpg</image:loc><image:title>img_20150929_1038381-582x445</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/gettyimages-168859495-660x440.jpg</image:loc><image:title>gettyimages-168859495-660x440</image:title></image:image><lastmod>2015-10-02T11:54:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/10/01/storing-secret-crypto-keys-in-the-amazon-cloud-new-attack-can-steal-them/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/10/keys1-640x404.jpg</image:loc><image:title>keys1-640x404</image:title></image:image><lastmod>2015-10-01T14:55:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/30/hackers-crack-key-fob-encryption-used-by-26-automakers/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/screen-shot-2015-08-19-at-5-55-41-pm-626x825.png</image:loc><image:title>screen-shot-2015-08-19-at-5-55-41-pm-626x825</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/key-fob-626x382.jpg</image:loc><image:title>key-fob-626x382</image:title></image:image><lastmod>2015-09-30T23:39:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/30/security-firm-discovers-linux-botnet-that-hits-with-150-gbps-ddos-attacks/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/a773ta.jpg</image:loc><image:title>a773ta</image:title></image:image><lastmod>2015-09-30T12:20:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/26/apples-biggest-hack-ever-4000-malicious-ios-store-apps-linked-to-cia/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/swati.png</image:loc><image:title>swati</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/apple-app-store-hack-cia.jpg</image:loc><image:title>apple-app-store-hack-cia</image:title></image:image><lastmod>2015-09-26T19:21:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/26/privacy-group-calls-for-a-boycott-of-tech-companies-supporting-cisa/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/angry-peasants-100253846-primary-idge.jpg</image:loc><image:title>angry-peasants-100253846-primary-idge</image:title></image:image><lastmod>2015-09-26T10:10:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/26/tips-for-improving-the-linux-desktop-security-neurogadget-com/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/linux.jpg</image:loc><image:title>linux</image:title></image:image><lastmod>2015-09-26T10:03:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/23/the-man-who-got-no-whammies/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/person-break.png</image:loc><image:title>person-break</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/micheallarson4.png</image:loc><image:title>micheallarson4</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/screenshot2015-09-10at2-59-43pm.png</image:loc><image:title>screenshot2015-09-10at2-59-43pm</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/vqer3j.gif</image:loc><image:title>vqer3j</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/screenshot2015-09-10at3-00-03pm.png</image:loc><image:title>screenshot2015-09-10at3-00-03pm</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/spinstitle.png</image:loc><image:title>spinstitle</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/standings1.png</image:loc><image:title>standings1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/pressyourluckset.png</image:loc><image:title>pressyourluckset</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/pressyourluckboard4-8.png</image:loc><image:title>pressyourluckboard4-8</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/pressyourluckboard.png</image:loc><image:title>pressyourluckboard</image:title></image:image><lastmod>2015-09-23T13:19:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/22/the-rise-of-hacktivism/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/piracymanifesto_wall.jpg</image:loc><image:title>piracymanifesto_wall</image:title></image:image><lastmod>2015-09-22T23:11:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/22/hackers-launch-balloon-probe-into-the-stratosphere-to-spy-on-drones/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/belarus-deepsweep-landing-pose-482x643.jpg</image:loc><image:title>belarus-deepsweep-landing-pose-482x643</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/comp-mid-plot-0-582x437.png</image:loc><image:title>comp-mid-plot-0-582x437</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/pre-launch1-289x385.jpg</image:loc><image:title>pre-launch1-289x385</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/800-launch2-660x495.jpg</image:loc><image:title>800-launch2-660x495</image:title></image:image><lastmod>2015-09-22T17:48:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/13/lockpickers-3-d-print-tsa-master-luggage-keys-from-leaked-photos-wired/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/tsa-lock-featured-660x330.jpg</image:loc><image:title>Orange tsa luggage lock</image:title></image:image><lastmod>2015-09-22T15:54:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/13/tor-vs-i2p-the-great-onion-debate/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/darknet2.jpg</image:loc><image:title>darknet</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/darknet1.jpg</image:loc><image:title>darknet</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/tor-vs-i2p-great-onion-debate-w6542.jpg</image:loc><image:title>tor-vs-i2p-great-onion-debate-w6542</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/tor-vs-i2p-great-onion-debate-w6541.jpg</image:loc><image:title>tor-vs-i2p-great-onion-debate-w6541</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/tor-vs-i2p-great-onion-debate-w654.jpg</image:loc><image:title>tor-vs-i2p-great-onion-debate-w654</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/darknet.jpg</image:loc><image:title>darknet</image:title></image:image><lastmod>2016-08-10T16:11:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/15/tor-becomes-extra-secure-as-onion-becomes-special-use-domain-name/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/url17.jpg</image:loc><image:title>url17</image:title></image:image><lastmod>2015-09-22T15:51:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/15/hacking-team-computer-vulnerabilities-and-the-nsa/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/bruce.jpg</image:loc><image:title>bruce</image:title></image:image><lastmod>2015-09-22T15:49:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/15/implanted-cisco-routers-are-coming-after-you-and-your-insecurities/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/panic-button.jpg</image:loc><image:title>panic-button</image:title></image:image><lastmod>2015-09-22T15:47:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/17/russian-hacker-vladimir-drinkman-pleads-guilty-in-new-jersey-court/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/hacking.jpg</image:loc><image:title>hacking</image:title></image:image><lastmod>2015-09-22T15:39:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/18/mapping-how-tors-anonymity-network-spread-around-the-world/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/screen-shot-2015-09-14-at-10-39-32-am-660x358.png</image:loc><image:title>screen-shot-2015-09-14-at-10-39-32-am-660x358</image:title></image:image><lastmod>2015-09-22T15:23:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/18/hotspot-shield-launches-vpn-plugins-for-chrome-and-firefox/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/screen-shot-2015-09-18-at-9-49-16-am.png</image:loc><image:title>screen-shot-2015-09-18-at-9-49-16-am</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/screen-shot-2015-09-18-at-9-10-57-am.png</image:loc><image:title>screen-shot-2015-09-18-at-9-10-57-am</image:title></image:image><lastmod>2015-09-22T15:22:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/19/google-to-disable-weak-sslv3-and-rc4-protocols-to-boost-internet-security/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/ssl.png</image:loc><image:title>ssl</image:title></image:image><lastmod>2015-09-22T15:20:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/19/microsoft-windows-devices-responsible-for-80-of-malware-infections/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/malware-infection-share-windows-android.png</image:loc><image:title>malware-infection-share-windows-android</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/microsoft-windows-devices-responsible-for-80-of-malware-infections.jpg</image:loc><image:title>microsoft-windows-devices-responsible-for-80-of-malware-infections</image:title></image:image><lastmod>2015-09-22T15:17:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/19/cisco-routers-infected-with-backdoor-malware-called-synful/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/cisco.png</image:loc><image:title>cisco</image:title></image:image><lastmod>2015-09-22T15:16:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/20/microsoft-is-using-linux-to-run-its-cloud/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/featuredgettyimages-528338757-660x330.jpg</image:loc><image:title>featuredgettyimages-528338757-660x330</image:title></image:image><lastmod>2015-09-22T15:14:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/21/anonymous-hacks-vietnam-government-websites-to-protest-against-human-rights-abuse/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/anonymous-hacks-vietnam-government-against-censorship-human-rights-violations-1024x350.png</image:loc><image:title>anonymous-hacks-vietnam-government-against-censorship-human-rights-violations-1024x350</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/anonymous-hacking-e1442854328347.jpg</image:loc><image:title>anonymous-hacking-e1442854328347</image:title></image:image><lastmod>2015-09-22T15:13:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/05/08/new-tutorials/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/05/kali-linux-killerintech31.gif</image:loc><image:title>Kali-Linux-KillerInTech3</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/05/kali-linux-killerintech3.gif</image:loc><image:title>Kali-Linux-KillerInTech3</image:title></image:image><lastmod>2015-09-19T19:00:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/07/30/10-of-the-best-linux-distros-for-privacy-fiends-and-security-buffs-techradar/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/07/banner.jpg</image:loc><image:title>banner</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/07/caine-320-80.jpg</image:loc></image:image><lastmod>2016-03-10T13:09:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/08/android-porn-app-takes-a-selfie-and-demands-500-ransom/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/security-risk-summit.jpg</image:loc><image:title>security-risk-summit</image:title></image:image><lastmod>2015-09-16T11:31:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/08/60-device-spoofs-phantom-objects-and-tricks-self-driving-cars-into-stopping-network-world/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/google-self-driving-car-100612824-primary-idge.jpg</image:loc><image:title>google-self-driving-car-100612824-primary-idge</image:title></image:image><lastmod>2015-09-15T12:13:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/09/200-million-whatsapp-users-vulnerable/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/how-to-hack-whatsapp-vulnerability.png</image:loc><image:title>how-to-hack-whatsapp-vulnerability</image:title></image:image><lastmod>2015-09-15T12:12:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/10/california-assembly-passes-digital-privacy-bill/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/privacy3-100592523-primary-idge.jpg</image:loc><image:title>privacy3-100592523-primary-idge</image:title></image:image><lastmod>2015-09-15T12:10:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/10/flawed-tls-implementations-leak-rsa-keys/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/keys.jpg</image:loc><image:title>keys</image:title></image:image><lastmod>2015-09-15T12:09:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/10/hacker-mag-2600-laughs-off-getty-images-inkspots-copyright-claim-%e2%80%a2-the-register/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/ink_splatter_04_by_loadus1.jpg</image:loc><image:title>ink_splatter_04_by_loadus1</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/comparison.jpg</image:loc><image:title>comparison</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/ink_splatter_04_by_loadus.jpg</image:loc><image:title>ink_splatter_04_by_loadus</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/2600_2012.gif</image:loc><image:title>2600_2012</image:title></image:image><lastmod>2015-09-15T12:07:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/11/akamai-warns-of-increased-activity-from-ddos-extortion-group-sc-magazine/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/zeroaccess9_7205601.jpg</image:loc><image:title>zeroaccess9_7205601</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/zeroaccess9_720560.jpg</image:loc><image:title>zeroaccess9_720560</image:title></image:image><lastmod>2015-09-15T12:06:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/12/these-top-30-ashley-madison-passwords-are-just-as-terrible-as-youd-think/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/ashley-madison-passwords.png</image:loc><image:title>ashley-madison-passwords</image:title></image:image><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/khyati.png</image:loc><image:title>khyati</image:title></image:image><lastmod>2015-09-15T12:06:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/08/coder-pleads-guilty-to-writing-gozi-banking-trojan/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/cuffs_876345e54645223.jpg</image:loc><image:title>cuffs_876345e54645223</image:title></image:image><lastmod>2015-09-08T09:00:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/07/china-police-arrest-15000-suspects-for-alleged-cyber-crimes/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/chinese-cyber-hackers.jpg</image:loc><image:title>chinese-cyber-hackers</image:title></image:image><lastmod>2015-10-13T13:55:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/06/employees-put-business-data-at-risk-by-installing-gambling-apps-on-their-phones-cso-online/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/id-2963448-mobile-100603681-orig.jpg</image:loc><image:title>id-2963448-mobile-100603681-orig</image:title></image:image><lastmod>2015-09-06T10:50:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/05/attacker-compromised-mozilla-bug-system-stole-private-vulnerability-data/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/mozilla.jpg</image:loc><image:title>mozilla</image:title></image:image><lastmod>2016-01-21T02:04:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/05/hackers-spent-at-least-a-year-spying-on-mozilla-to-discover-firefox-security-holes-and-exploit-them-%e2%80%a2-the-register/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/hackers_fs.jpg</image:loc><image:title>hackers_fs</image:title></image:image><lastmod>2015-12-06T12:27:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/04/new-top-level-domains-pose-huge-online-security-risk-itproportal-com/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/domain-800x450.png</image:loc><image:title>domain-800x450</image:title></image:image><lastmod>2015-09-04T18:23:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/04/justice-department-cracks-down-on-the-use-of-cellphone-tracking-technology-forbes/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/640x0.jpg</image:loc><image:title>640x0</image:title></image:image><lastmod>2015-09-04T17:53:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/04/twitter-open-sources-diffy-that-automatically-catches-potential-bugs-in-code/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/diffy-bug-hacker.png</image:loc><image:title>diffy-bug-hacker</image:title></image:image><lastmod>2015-09-04T13:47:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/26/the-20-most-infamous-cyberattacks-of-the-21st-century-part-i-mit-technology-review/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/cyberattacks.png</image:loc></image:image><lastmod>2015-09-04T13:25:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/28/hardened-linux-stalwarts-grsecurity-pull-the-pin-after-legal-fight-%e2%80%a2-the-register/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/grsecurity.png</image:loc><image:title>grsecurity</image:title></image:image><lastmod>2015-09-04T12:20:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/31/linux-foundations-security-checklist-can-help-sysadmins-harden-workstations-pcworld/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/security-265130-100599846-large.jpg</image:loc><image:title>security-265130-100599846-large</image:title></image:image><lastmod>2016-03-10T10:07:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/01/lizard-squad-launches-ddos-against-uk-law-enforcement-agency-ars-technica/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/lizardsquad-640x456.png</image:loc><image:title>lizardsquad-640x456</image:title></image:image><lastmod>2015-09-04T12:07:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/02/the-era-of-cybercrime-why-businesses-must-learn-how-to-protect-their-online-systems-and-keep-up-to-date-with-modern-security/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/1430170426_why-businesses-must-learn-to-protect-their-users.jpg</image:loc><image:title>1430170426_why-businesses-must-learn-to-protect-their-users</image:title></image:image><lastmod>2015-09-04T12:06:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/03/google-chrome-45-security-patches-bug-bounty-awards-threatpost-the-first-stop-for-security-news/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/chrome_patch.jpg</image:loc><image:title>chrome_patch</image:title></image:image><lastmod>2015-09-04T12:05:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/03/bulletproof-admin-boxes-beat-the-toughest-hackers-infoworld/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/hackers-100580744-primary-idge.jpg</image:loc><image:title>hackers-100580744-primary-idge</image:title></image:image><lastmod>2015-09-04T12:04:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/09/03/popular-belkin-wi-fi-routers-plagued-by-unpatched-security-flaws/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/09/id-2958215-router_generic_01-100601612-orig.jpg</image:loc><image:title>id-2958215-router_generic_01-100601612-orig</image:title></image:image><lastmod>2015-10-18T05:01:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/07/20/hacker-attack-reported-on-ashley-madison-a-dating-service-the-new-york-times/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/07/21hack-web-superjumbo.jpg</image:loc></image:image><lastmod>2015-09-03T16:36:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/07/20/rc4-nomore-crypto-exploit-used-to-decrypt-user-cookies-in-mere-hours-zdnet/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/07/cipher-herocredcnet.jpg</image:loc></image:image><lastmod>2015-09-10T09:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/05/14/deepin-os-linux-security-blogstutorials-2/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/05/deepinos2.png</image:loc></image:image><lastmod>2015-09-03T16:28:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/19/ashley-madison-hackers-follow-through-on-threat-dump-user-data-online-naked-security/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/ashley-madison-logo-1200x627.png</image:loc></image:image><lastmod>2015-09-03T16:19:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/19/bittorrent-exploits-allow-lone-hackers-to-launch-large-ddos-attacks-zdnet/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/black-vine-header-imagecredsymantec.jpg</image:loc></image:image><lastmod>2015-09-02T12:36:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/19/linux-core-infrastructure-initiative-launches-security-badge-scheme-zdnet/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/zero-day-new010credsymantec.jpg</image:loc></image:image><lastmod>2015-09-01T09:42:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/21/busting-the-biggest-myth-of-cisa-that-the-program-is-voluntary-wired/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/gettyimages-474729514-289x289.jpg</image:loc></image:image><lastmod>2015-09-01T08:54:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/20/linus-torvalds-talks-linux-security-at-linuxcon/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/290_linus.jpg</image:loc></image:image><lastmod>2015-09-01T08:53:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/27/the-onion-router-is-being-cut-up-and-making-security-pros-cry-%e2%80%a2-the-register/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/vm_escape.jpg</image:loc><image:title>vm_escape</image:title></image:image><lastmod>2015-09-01T08:38:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/27/%e2%80%8bamazon-introduces-new-open-source-tls-implementation-s2n-zdnet/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/40154301-1-padlock-on-computer-circuit-board-security-610.jpg</image:loc><image:title>40154301-1-padlock-on-computer-circuit-board-security-610</image:title></image:image><lastmod>2015-09-01T08:36:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/18/view-from-the-top-governments-role-in-cybersecurity-3/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/newsdesk1.jpg</image:loc></image:image><lastmod>2015-08-18T11:25:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/16/8-linux-security-improvements-in-8-years-informationweek/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/tux-40601_1280.png</image:loc></image:image><lastmod>2015-08-16T14:29:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/15/bypassing-antivirus-with-shellter-4-0-on-kali-linux-darkmatters/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/pic11-640x400.jpg</image:loc></image:image><lastmod>2015-08-15T12:53:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/13/top-10-security-tools-in-kali-linux-1-0-6-network-world/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/slide_011114-kali-1-100295199-gallery-idge.jpg</image:loc></image:image><lastmod>2015-08-13T21:49:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/08/this-hackers-tiny-device-unlocks-cars-and-opens-garages-wired/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/rolljam3-582x437.jpg</image:loc></image:image><lastmod>2015-08-08T15:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/06/black-hat-2015-salted-hash-live-blog-day-1-cso-online/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/blackhatusa-100599553-primary-idge.jpg</image:loc></image:image><lastmod>2015-08-06T11:29:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/04/black-hat-2015-attackers-use-commercial-terracotta-vpn-to-launch-attacks-network-world/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/080415-panda-100600201-primary-idge.jpg</image:loc></image:image><lastmod>2015-08-04T19:44:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/04/operation-lotus-blossom-apt-elise-malware/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/elise-malware-apt.jpg</image:loc></image:image><lastmod>2015-08-04T10:05:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/03/major-flaw-could-let-lone-wolf-hacker-bring-down-huge-swaths-of-internet-ars-technica/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/bind9-crash-640x243.png</image:loc></image:image><lastmod>2015-08-03T13:56:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/08/01/hackers-could-heist-semis-by-exploiting-this-satellite-flaw-wired/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/08/gettyimages-83661454-1024x681.jpg</image:loc></image:image><lastmod>2015-08-01T12:37:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/07/31/new-vulnerability-can-put-android-phones-into-permanent-vegetative-state-ars-technica/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/07/mobile-shutdown-2-360x640.png</image:loc></image:image><lastmod>2015-07-31T08:49:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/07/30/new-android-malware-sprouting-like-weeds-mobile-linuxinsider/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/07/android-malware.jpg</image:loc></image:image><lastmod>2015-07-30T19:18:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com/2015/07/29/google-has-fixed-stagefright-problem-that-left-android-users-open-to-attack-the-inquirer/</loc><image:image><image:loc>https://linuxsecurityblog.com/wp-content/uploads/2015/07/stagefright-android-270x167.jpg</image:loc></image:image><lastmod>2015-07-29T16:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linuxsecurityblog.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-07-03T15:58:22+00:00</lastmod></url></urlset>
