<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://mobilesecurityanalyst.com/2025/09/07/get-ready-to-celebrate-star-trek-day/</loc><lastmod>2025-09-07T14:57:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2025/07/09/trusted-platform-modules/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2025/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-09T10:17:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2024/11/09/security-in-of-the-solution/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2024/11/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2024/11/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2024/11/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-12-02T16:12:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2024/07/30/crowdstrike-then-azure-and-now-digicert-oh-my/</loc><lastmod>2024-07-30T22:09:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2024/06/28/death-of-a-tls-salesman/</loc><lastmod>2024-06-28T13:19:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2024/04/30/before-there-was-a-security-dept/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2024/04/pxl_20240430_1204309796416385143978657117.jpg</image:loc><image:title>pxl_20240430_1204309796416385143978657117</image:title></image:image><lastmod>2024-04-30T12:12:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/about/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2011/01/mah036371.jpg</image:loc><image:title>MAH03637(1)</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2011/01/headshot-small-2015.jpg</image:loc><image:title>HeadShot-Small-2015</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2011/01/headshot-small.jpg</image:loc><image:title>Jeff Soehner</image:title></image:image><lastmod>2024-04-23T23:37:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://mobilesecurityanalyst.com/2024/04/19/why-your-business-should-never-accept-a-wildcard-certificate/</loc><lastmod>2024-04-21T11:58:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2024/03/30/forget-spam-why-not-backdoor-software-instead/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2024/03/screenshot_20240330-0839377563896240471661029.png</image:loc><image:title>screenshot_20240330-0839377563896240471661029</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2024/03/share_7421379349996876908892745281040747462.png</image:loc><image:title>share_7421379349996876908892745281040747462</image:title></image:image><lastmod>2024-03-30T13:03:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2024/03/29/old-tech-for-an-old-techy/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2024/03/pxl_20240329_1829064671230114933939089268.jpg</image:loc><image:title>pxl_20240329_1829064671230114933939089268</image:title></image:image><lastmod>2024-04-10T20:34:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2024/03/21/kubernetes-and-certificates/</loc><lastmod>2024-03-21T10:49:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2024/03/17/certificate-management-may-be-hard-but-you-dont-have-much-choice-any-longer/</loc><lastmod>2024-03-17T13:50:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2023/12/24/wsl-christmas-with-fedora/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2023/12/add-docker-components.jpg</image:loc><image:title>add-docker-components</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2023/12/dnf-plugins-core.jpg</image:loc><image:title>dnf-plugins-core</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2023/12/decorate-with-file.jpg</image:loc><image:title>decorate-with-file</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2023/12/bake-the-cake.jpg</image:loc><image:title>bake-the-cake</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2023/12/import-fedora-layer.jpg</image:loc><image:title>import-fedora-layer</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2023/12/extract-layer.tar_.jpg</image:loc><image:title>extract-layer.tar_</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2023/12/koji-fedora-container-images.jpg</image:loc><image:title>koji-fedora-container-images</image:title></image:image><lastmod>2023-12-24T12:47:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2023/09/09/where-can-i-put-my-secrets-then/</loc><lastmod>2023-09-09T11:40:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2023/07/16/container-lifecycle-management/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2023/07/vms-containers.gif</image:loc><image:title>vms-containers</image:title></image:image><lastmod>2023-07-16T16:40:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2023/06/11/run-fedora-wsl/</loc><lastmod>2023-06-11T23:25:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2022/08/03/build-maintain-your-own-golden-container-base-images/</loc><lastmod>2022-08-03T10:57:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2022/07/26/after-the-breach/</loc><lastmod>2022-07-26T18:18:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2022/07/25/infosec-not-your-job-but-your-responsibility-how-to-be-smarter-than-the-average-bear/</loc><lastmod>2022-07-25T16:28:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2022/07/22/cloud-vulnerabilities-security-issues-database/</loc><lastmod>2022-07-22T09:20:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2022/06/03/zero-day-exploitation-of-atlassian-confluence-volexity/</loc><lastmod>2022-06-03T13:25:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2022/05/08/slsa-supply-chain-levels-for-software-artifacts/</loc><lastmod>2022-05-08T12:37:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2022/05/06/bank-api-as-microservices-with-cqrs-in-typescript-level-up-coding/</loc><lastmod>2022-05-06T13:10:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2022/04/06/bank-had-no-firewall-license-intrusion-or-phishing-protection-guess-the-rest-the-register/</loc><lastmod>2022-04-06T09:36:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2022/02/17/how-modern-log-management-strengthens-enterprises-security-posture/</loc><lastmod>2022-02-17T17:36:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2022/02/12/how-to-implement-security-http-headers-to-prevent-vulnerabilities/</loc><lastmod>2022-02-12T10:25:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2022/01/30/howard-hesseman-the-hard-rocking-dj-on-wkrp-in-cincinnati-dies-at-81-cnn/</loc><lastmod>2022-01-30T22:16:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2022/01/01/google-cloud-anthos-multicloud-api-and-gke-on-azure-ga-google-cloud-blog/</loc><lastmod>2022-01-01T10:28:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/07/06/why-exfil-your-payload-via-ascii-a-picture-is-worth/</loc><lastmod>2020-07-06T16:52:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/06/30/thinking-of-rooting-your-android-think-again/</loc><lastmod>2020-06-30T09:06:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/06/26/how-to-create-a-solid-and-secure-content-security-policy/</loc><lastmod>2020-06-26T10:54:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/05/19/star-trek-strange-new-worlds-is-about-the-only-captain-that-predates-kirk/</loc><lastmod>2020-05-19T22:52:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/05/12/azure-sentinel-incidents-kpis-managed-sentinel/</loc><lastmod>2020-05-12T19:22:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/05/05/godaddy-confirms-data-breach-what-19-million-customers-need-to-know/</loc><lastmod>2020-05-05T22:33:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/04/22/hackers-have-breached-60-ad-servers-to-load-their-own-malicious-ads-zdnet/</loc><lastmod>2020-04-22T20:09:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/04/20/developers-network-behind-android-apps-with-69m-installs-unveiled/</loc><lastmod>2020-04-20T19:51:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/04/18/want-to-learn-how-to-counter-mobile-app-risks/</loc><lastmod>2020-04-18T22:32:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/04/12/great-news-for-all-you-ios-hackers/</loc><lastmod>2020-04-12T14:15:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/04/06/what-is-windows-virtual-desktop-the-redmond-cloud/</loc><lastmod>2020-04-06T18:12:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/04/04/owasp-mobile-top-10-comprehensive-guide-to-counter-mobile-app-risks/</loc><lastmod>2020-04-04T16:05:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/04/02/u-s-government-update-chrome-80-now-multiple-security-concerns-confirmed/</loc><lastmod>2020-04-02T23:23:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/04/01/incident-notification/</loc><lastmod>2020-04-01T16:49:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/03/20/cloud-database-leak-exposes-425gb-of-financial-data/</loc><lastmod>2020-03-20T09:57:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/03/13/think-open-source-software-is-secure-think-again/</loc><lastmod>2020-03-14T00:03:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/03/02/forbes-jack-welch-former-general-electric-ceo-and-chairman-dies-at-84/</loc><lastmod>2020-03-02T16:34:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/02/29/ntlmv2-no-problems/</loc><lastmod>2020-02-29T21:09:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/02/24/cert-pinning-bypass-on-okhttp/</loc><lastmod>2020-02-24T20:48:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/02/23/hackers-were-inside-citrix-for-five-months-krebs-on-security/</loc><lastmod>2020-02-23T22:34:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/02/10/docker-registries-expose-hundreds-of-orgs-to-malware-data-theft-threatpost/</loc><lastmod>2020-02-10T21:25:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2020/02/08/certificate-expiry-doh/</loc><lastmod>2020-02-08T12:40:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/12/27/are-you-a-secure-programmer/</loc><lastmod>2019-12-27T21:03:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/11/20/omg-i-use-that-site/</loc><lastmod>2019-12-20T11:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/11/17/snyk-found-over-four-times-more-vulnerabilities-in-rhel-debian-and-ubuntu-dzone-security/</loc><lastmod>2019-11-17T16:39:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/11/08/whats-in-a-container-image-meeting-the-legal-challenges-opensource-com/</loc><lastmod>2019-11-09T02:19:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/10/12/scotiabank-does-it-again/</loc><lastmod>2019-10-12T22:57:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/10/06/picard-is-back/</loc><lastmod>2019-10-06T20:45:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/09/30/debit-cards-and-td-are-in-trouble-again/</loc><lastmod>2019-09-30T21:57:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/09/30/multi-stage-fileless-nodersok-campaign-delivers-rare-node-js-based-malware-microsoft-security/</loc><lastmod>2019-09-30T12:10:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/09/21/over-1-million-google-chrome-users-affected-by-cookie-stuffing-from-two-popular-adblockers-cyware-hacker-news/</loc><lastmod>2019-09-21T13:50:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/09/20/cwe-2019-cwe-top-25-most-dangerous-software-errors/</loc><lastmod>2019-09-21T00:23:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/08/30/quality-of-code-doesnt-matter-much-in-open-source-contributions-study/</loc><lastmod>2019-08-30T21:37:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/08/22/warning-proceed-with-caution-%e2%9a%a0/</loc><lastmod>2019-08-22T23:44:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/08/19/kubernetes-steady-as-she-goes/</loc><lastmod>2019-08-19T14:26:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/08/09/black-hat-usa-2019-ibm-x-force-red-reveals-new-warshipping-hack-to-infiltrate-corporate-networks/</loc><lastmod>2019-08-09T18:49:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/07/31/are-you-sure-you-dont-want-a-capital-one-card-now/</loc><lastmod>2019-07-31T12:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/07/28/goodbye-docker-purging-is-such-sweet-sorrow-zwischenzugs/</loc><lastmod>2019-07-28T11:24:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/07/26/new-european-rules-for-mobile-banking-apps-coming-to-a-device-near-you/</loc><lastmod>2019-07-28T11:12:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/07/21/honest-it-was-like-that-when-i-drove-up/</loc><lastmod>2019-07-21T16:21:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/07/21/webinspect-has-3-great-new-features-micro-focus-community-1796294/</loc><lastmod>2019-07-21T16:20:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/07/21/malicious-python-libraries-targeting-linux-servers-removed-from-pypi-zdnet/</loc><lastmod>2019-07-21T16:20:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/07/21/strange-spotify-charges-with-td-accounts/</loc><lastmod>2019-07-21T16:19:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/07/21/how-to-gain-access-to-domain-credentials-without-being-on-a-targets-network/</loc><lastmod>2019-07-21T16:18:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/07/18/td-customers-question-how-visa-debit-chequing-accounts-were-compromised-cbc-news/</loc><lastmod>2019-07-18T23:39:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/07/18/slack-resets-thousands-of-user-passwords-four-years-after-hack-the-verge/</loc><lastmod>2019-07-18T23:14:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/07/16/google-joins-microsoft-and-deprecates-xss-auditor-for-chrome/</loc><lastmod>2019-07-17T02:46:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/05/11/lets-make-security-everyones-concern/</loc><lastmod>2019-05-11T22:01:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/03/07/common-vulnerabilities-in-the-21rst-century/</loc><lastmod>2019-03-08T03:51:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/02/28/password-advice-from-the-masses/</loc><lastmod>2019-03-08T03:50:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2019/02/28/maybe-we-will-see-elvis-again-this-year-in-vegas/</loc><lastmod>2019-02-28T17:50:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2018/12/02/phishing-as-easy-as-123/</loc><lastmod>2018-12-02T18:17:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2018/12/02/cyber-security-hub-incident-of-the-week-hsbc-bank-alerts-u-s-customers-of-data-breach/</loc><lastmod>2018-12-02T17:56:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2018/10/29/crackenbox2-how-to-repurpose-your-bitcoin-miner/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2017/04/crackenbox2-gpu.png</image:loc><image:title>crackenbox2-GPU</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2017/04/crackenbox2.png</image:loc><image:title>crackenbox2</image:title></image:image><lastmod>2018-10-29T19:26:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2018/09/08/gpyc-certified-at-last/</loc><lastmod>2018-12-28T16:28:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2018/08/18/do-web-tokens-actually-make-us-safer/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2018/08/cracking-jws.png</image:loc><image:title>Cracking-jws</image:title></image:image><lastmod>2018-08-18T10:52:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2018/07/01/happy-tls-new-year/</loc><lastmod>2018-07-01T16:32:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2018/04/28/web-servers-are-still-vulnerable/</loc><lastmod>2018-04-28T15:27:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2018/04/16/key-services-for-encryption/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2018/04/ipsw-downgrade-iphone-6.jpg</image:loc><image:title>ipsw-downgrade-iphone-6</image:title></image:image><lastmod>2018-04-16T15:03:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2018/02/25/burp-certificate-magic/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2018/02/image101.png</image:loc><image:title>image10</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2018/02/image13.png</image:loc><image:title>image13</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2018/02/image12.png</image:loc><image:title>image12</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2018/02/image11.png</image:loc><image:title>image11</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2018/02/image10.png</image:loc><image:title>image10</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2018/02/image9.png</image:loc><image:title>image9</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2018/02/image8.png</image:loc><image:title>image8</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2018/02/image7.png</image:loc><image:title>image7</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2018/02/image6.png</image:loc><image:title>image6</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2018/02/image5.png</image:loc><image:title>image5</image:title></image:image><lastmod>2018-02-25T19:01:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/12/02/thinking-of-using-your-debit-card-at-the-pump-think-again/</loc><lastmod>2016-12-14T11:08:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/12/08/bruteforce-your-identity-from-a-single-cc-number/</loc><lastmod>2016-12-08T14:43:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/12/07/malvertizing-just-got-a-whole-lot-smarter/</loc><lastmod>2016-12-07T22:15:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/11/29/newly-discovered-router-flaw-being-hammered-by-in-the-wild-attacks-ars-technica/</loc><lastmod>2016-11-29T12:50:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/11/28/safetynet-googles-tamper-detection-for-android-%c2%b7-john-kozyrakis-blog/</loc><lastmod>2016-11-29T02:40:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/11/28/stay-tuned-for-more-hacking/</loc><lastmod>2016-11-29T00:01:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/11/25/cirque-du-soleil-ole/</loc><lastmod>2016-11-26T04:56:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/11/19/bruce-schneier-on-the-most-recent-attack-vector-usb-sticks/</loc><lastmod>2016-11-19T19:49:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/11/11/rfid-hacking-for-fun-and-profit/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2016/11/proxcard21.png</image:loc><image:title>proxcard2</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2016/11/proxcard.png</image:loc><image:title>proxcard</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2016/11/proxmark3.png</image:loc><image:title>proxmark3</image:title></image:image><lastmod>2017-09-12T13:07:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/11/05/playing-with-aslr-for-linux/</loc><lastmod>2016-11-09T11:03:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/10/30/true-or-false-mobile-apps-only-need-to-use-https-when-sending-your-credentials/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2016/10/stealmylogin3.png</image:loc><image:title>stealmylogin3</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2016/10/stealmylogin1.png</image:loc><image:title>stealmylogin</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2016/10/stealmylogin2.png</image:loc><image:title>stealmylogin2</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2016/10/stealmylogin.png</image:loc><image:title>stealmylogin</image:title></image:image><lastmod>2016-10-30T16:23:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/10/30/pwn2own-its-not-just-for-browsers/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2016/10/pwn2own-2016-stats.jpg</image:loc><image:title>pwn2own-2016-stats</image:title></image:image><lastmod>2016-10-30T15:24:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/10/28/0-day-in-every-linux-system-introduced-by-linus-himself/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2016/10/dirty-cow-logo.png</image:loc><image:title>dirty-cow-logo</image:title></image:image><lastmod>2016-10-28T10:01:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/10/15/exploits-are-everywhere/</loc><lastmod>2016-10-19T09:48:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/10/01/attacking-mobile-devices-as-a-way-into-the-organization/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2016/10/2016-internet-trends-report-207-638.jpg</image:loc><image:title>2016-internet-trends-report-207-638</image:title></image:image><lastmod>2016-10-02T15:17:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/10/01/what-you-dont-know-about-your-smart-watch-is-alarming/</loc><lastmod>2016-10-01T19:48:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/04/12/feeling-better-that-you-bought-an-iphone/</loc><lastmod>2016-04-12T15:33:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/02/18/getting-ready-to-take-more-underwater-pictures/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2016/02/dsc_0279.jpg</image:loc><image:title>dsc_0279.jpg</image:title></image:image><lastmod>2016-02-19T01:29:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2016/02/12/article-on-krebs-about-iot-security/</loc><lastmod>2016-02-12T11:31:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/12/05/easy-vulnerability-assessments-nessus-and-powershell/</loc><lastmod>2015-12-05T09:22:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/10/24/key-exchange-protocol-is-under-attack-from-nsa/</loc><lastmod>2015-10-24T11:24:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/09/20/fbi-beginning-to-mean-federalists-for-a-better-internet/</loc><lastmod>2015-09-20T16:19:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/08/20/received-a-word-file-from-someone-how-bad-could-it-be-if-you-open-it/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/08/mal-tcp-redirect.png</image:loc><image:title>MAL-TCP-redirect</image:title><image:caption>Wireshark capture</image:caption></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/08/mal-module2.png</image:loc><image:title>MAL-Module2</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/08/mal-module1.png</image:loc><image:title>MAL-Module1</image:title></image:image><lastmod>2015-08-20T11:36:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/08/14/got-linux-great-here-is-another-bot-script-just-for-you/</loc><lastmod>2015-08-14T21:26:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/08/13/security-industry-reacts-to-oracles-cso-missive-cso-online/</loc><lastmod>2015-08-14T11:55:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/08/14/its-the-fbi-and-we-have-your-phone-surrounded/</loc><lastmod>2015-08-14T11:54:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/08/12/just-when-you-thought-it-was-safe-to-be-a-canadian/</loc><lastmod>2015-08-12T19:31:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/08/12/and-now-for-something-completely-different/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/08/waroftheworlds.png</image:loc><image:title>WaroftheWorlds</image:title></image:image><lastmod>2015-08-12T12:22:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/08/10/ubiquity-breach-a-few-months-back/</loc><lastmod>2015-08-10T11:31:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/07/30/testdrive-ubiquity-unifi-ap-enterprise-wi-fi-for-soho/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/07/ubiquity-management.png</image:loc><image:title>Ubiquity-Management</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/07/ubiquity-controller.png</image:loc><image:title>Ubiquity-Controller</image:title></image:image><lastmod>2015-07-30T16:03:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/07/29/own-a-new-chrysler-well-a-hacker-could-take-control-of-you-car-while-you-are-driving-it/</loc><lastmod>2015-07-29T21:13:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/07/19/drones-not-just-for-launching-missles-anymore/</loc><lastmod>2015-07-19T11:46:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/07/16/going-going-gone-that-all-for-windows-2003-server/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/07/w2k3-eol-270x167.jpg</image:loc><image:title>W2K3-eol-270x167</image:title></image:image><lastmod>2015-07-16T17:58:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/07/16/just-when-you-thought-your-pc-was-safe/</loc><lastmod>2015-07-16T15:32:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/07/15/tools-for-a-safer-pc-krebs-on-security/</loc><lastmod>2015-07-15T22:28:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/07/15/the-death-of-rc4-here-comes-armageddon/</loc><lastmod>2015-07-15T15:08:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/07/08/hack-in-the-box-alpha-testing-has-begun/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/07/data-security-hacker-password-security-breach-mobile-patch-theft.jpg</image:loc><image:title>data-security-hacker-password-security-breach-mobile-patch-theft</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/07/small-computer.png</image:loc><image:title>Small-Computer</image:title></image:image><lastmod>2015-07-08T22:10:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/06/24/in-a-flash-you-could-be-vulnerable/</loc><lastmod>2015-06-24T11:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/06/23/securing-the-small-office-logging-and-patch-management-on-a-budget/</loc><lastmod>2015-06-23T17:42:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/06/23/why-vmware-essentials-is-essential-for-your-business/</loc><lastmod>2015-06-23T11:31:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/06/08/interesting-facts-regarding-passwords-and-what-you-should-know-about-them/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/06/eight-characters1.png</image:loc><image:title>Eight Characters</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/06/seven-characters.png</image:loc><image:title>Seven Characters</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/06/eight-characters.png</image:loc><image:title>Eight Characters</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/06/nine-characters.png</image:loc><image:title>Nine Characters</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/06/ten-characters.png</image:loc><image:title>Ten Characters</image:title></image:image><lastmod>2015-06-23T11:24:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/06/08/security-controls-know-em-use-em/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/06/alienvault.png</image:loc><image:title>Alienvault</image:title><image:caption>OSSIM Version</image:caption></image:image><lastmod>2015-06-08T14:44:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/05/31/anatomy-of-a-basic-attack/</loc><lastmod>2015-06-03T18:16:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/05/28/do-you-know-your-rights-when-it-comes-to-your-security/</loc><lastmod>2015-05-28T16:24:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/05/28/mspy-debacle-keeps-on-giving/</loc><lastmod>2015-05-28T12:02:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/05/25/sqli-still-number-2-on-the-hackers-list/</loc><lastmod>2015-05-25T15:59:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/05/21/using-putty-for-remote-ssh-maybe-you-should-check-it/</loc><lastmod>2015-05-21T19:42:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/05/21/another-large-scale-breach/</loc><lastmod>2015-05-21T14:52:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/05/18/computer-breach-and-what-you-can-do-about-it/</loc><lastmod>2015-05-18T21:10:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/03/12/imagine-a-single-tool-that-hackers-could-use-to-break-into-your-network/</loc><lastmod>2015-03-13T10:02:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/02/05/still-using-short-passwords-in-your-organization/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/02/password-guessing-7.png</image:loc><image:title>Password-guessing-7</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2015/02/password-guessing-6.png</image:loc><image:title>Password-guessing-6</image:title></image:image><lastmod>2015-02-05T12:56:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2015/01/31/i-am-betting-that-2015-will-be-the-year-of-security/</loc><lastmod>2015-02-03T20:33:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2014/05/27/hey-dude-pass-the-hash/</loc><lastmod>2014-05-27T19:11:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2014/05/03/giac-certifications-are-very-difficult/</loc><lastmod>2014-05-03T21:47:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2013/11/19/kaseya-and-safe-mode/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/11/image_thumb1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/11/image1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/11/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/11/image.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/11/boot-to-safe-mode-windows-7_thumb.png</image:loc><image:title>Boot-to-Safe-Mode-Windows-7_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/11/boot-to-safe-mode-windows-7.png</image:loc><image:title>Boot-to-Safe-Mode-Windows-7.png</image:title></image:image><lastmod>2015-03-24T19:47:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2013/11/01/hyperv-2012-r2-preview/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/11/wlemoticon-smile.png</image:loc><image:title>wlEmoticon-smile.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/11/hyperv-r2-upgrade-issues_thumb.png</image:loc><image:title>HyperV-R2-Upgrade-Issues_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/11/hyperv-r2-upgrade-issues.png</image:loc><image:title>HyperV-R2-Upgrade-Issues.png</image:title></image:image><lastmod>2013-11-01T19:20:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2013/09/15/using-kaseya-to-deploy-logmein/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/09/image_thumb1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/09/image1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/09/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/09/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2013-09-15T13:20:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2013/06/04/using-vpro-with-the-kaseya-portal/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/06/amt-config.png</image:loc><image:title>AMT-config</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/06/vnc-plus.png</image:loc><image:title>VNC-Plus</image:title></image:image><lastmod>2013-06-04T13:49:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2013/04/11/the-power-of-automation/</loc><lastmod>2013-04-12T18:41:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2013/01/07/backing-up-with-hyperoo-2-is-better-than-ever/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/01/image_thumb1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/01/image1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/01/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2013/01/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2013-01-07T09:41:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/09/02/backing-up-your-hyper-v-cluster-with-trilead/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/09/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/09/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2012-11-02T11:42:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/04/28/how-to-extend-your-ntfs-partition-with-a-vmdk-file-on-esxi/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/04/image_thumb2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/04/image2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/04/image_thumb1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/04/image1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/04/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/04/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2012-11-02T11:41:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/10/28/cluster-aware-updating-really-works/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/10/image_thumb5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/10/image5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/10/image_thumb4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/10/image4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/10/image_thumb3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/10/image3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/10/image_thumb2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/10/image2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/10/image_thumb1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/10/image1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2012-11-02T11:37:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/10/11/new-hyper-v-replica-feature-makes-migration-easier/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/10/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/10/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2012-10-11T10:58:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/09/19/setting-up-your-2012-hyper-v-cluster/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/09/image_thumb3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/09/image3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/09/image_thumb2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/09/image2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/09/image_thumb1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/09/image1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2012-09-19T17:51:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/03/22/backing-up-your-hyper-v-cluster-isnt-expensive/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/03/image_thumb2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/03/image2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/03/image_thumb1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/03/image1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/03/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/03/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2012-03-22T18:14:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/02/06/deploy-hyper-v-cluster-image-using-platespin-migrate-9-1/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/platespin-discovery_thumb.jpg</image:loc><image:title>PlateSpin-Discovery_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/platespin-discovery.jpg</image:loc><image:title>PlateSpin-Discovery.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/hyper-v-memory-settings_thumb.jpg</image:loc><image:title>Hyper-V-memory-settings_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/hyper-v-memory-settings.jpg</image:loc><image:title>Hyper-V-memory-settings.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/platespin-migrate-boot-iso_thumb.jpg</image:loc><image:title>Platespin-Migrate-Boot-ISO_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/platespin-migrate-boot-iso.jpg</image:loc><image:title>Platespin-Migrate-Boot-ISO.jpg</image:title></image:image><lastmod>2012-02-05T13:23:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/02/05/want-to-recover-some-space-on-your-esxi-serverread-on/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/vm-disk-summary-after_thumb.jpg</image:loc><image:title>VM-disk-summary-after_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/vm-disk-summary-after.jpg</image:loc><image:title>VM-disk-summary-after.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/vm-disk-summary-before.jpg</image:loc><image:title>VM-disk-summary-before.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/vm-disk-summary-before_thumb.jpg</image:loc><image:title>VM-disk-summary-before_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/voptimizer_thumb.jpg</image:loc><image:title>vOptimizer_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/voptimizer.jpg</image:loc><image:title>vOptimizer.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/voptimizer-gui_thumb.jpg</image:loc><image:title>vOptimizer-GUI_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/voptimizer-gui.jpg</image:loc><image:title>vOptimizer-GUI.jpg</image:title></image:image><lastmod>2012-02-05T11:49:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/02/01/want-to-do-more-with-just-a-single-phone-lineask-us-how/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/voicemail_thumb.jpg</image:loc><image:title>Voicemail_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/voicemail.jpg</image:loc><image:title>Voicemail.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/asterisknow_thumb.jpg</image:loc><image:title>AsteriskNOW_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/02/asterisknow.jpg</image:loc><image:title>AsteriskNOW.jpg</image:title></image:image><lastmod>2012-02-01T17:17:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/01/30/migrating-asterisknow-vms-from-esxi-to-hyper-v/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/wlemoticon-winkingsmile1.png</image:loc><image:title>wlEmoticon-winkingsmile.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/asterisknow-failover_thumb.jpg</image:loc><image:title>AsteriskNOW-Failover_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/asterisknow-failover.jpg</image:loc><image:title>AsteriskNOW-Failover.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/asterisknow-ha_thumb.jpg</image:loc><image:title>AsteriskNOW-HA_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/asterisknow-ha.jpg</image:loc><image:title>AsteriskNOW-HA.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/hyper-v-linux-tools_thumb.jpg</image:loc><image:title>Hyper-V-Linux-Tools_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/hyper-v-linux-tools.jpg</image:loc><image:title>Hyper-V-Linux-Tools.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/asterisknow-config_thumb.jpg</image:loc><image:title>AsteriskNOW-config_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/asterisknow-config.jpg</image:loc><image:title>AsteriskNOW-config.jpg</image:title></image:image><lastmod>2012-01-30T19:15:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/01/22/a-look-at-windows-hyper-v-as-a-cluster/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/clip_image0014_thumb.png</image:loc><image:title>clip_image0014_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/clip_image0014.png</image:loc><image:title>clip_image0014.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/clip_image001_thumb.png</image:loc><image:title>clip_image001_thumb.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/clip_image001.png</image:loc><image:title>clip_image001.png</image:title></image:image><lastmod>2012-01-22T18:04:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2011/08/30/migrate-sles-11-in-about-half-an-hour/</loc><lastmod>2012-01-17T17:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/01/07/2012-is-the-year-of-the-virtual-server/</loc><lastmod>2012-01-17T16:05:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/01/08/oracles-vm-server-a-look-inside-part-1/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/vm-manager-reboot.jpg</image:loc><image:title>VM-Manager-Reboot</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/vm-manager-install-summary.jpg</image:loc><image:title>VM-Manager-Install-Summary</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/vm-manager-install-steps.jpg</image:loc><image:title>VM-Manager-Install-Steps</image:title></image:image><lastmod>2012-01-17T16:05:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/01/10/oracles-vm-server-a-look-inside-part-2/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/vnc-connection_thumb.jpg</image:loc><image:title>VNC-connection_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/vnc-connection.jpg</image:loc><image:title>VNC-connection.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/server-pool_thumb.jpg</image:loc><image:title>Server-Pool_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/server-pool.jpg</image:loc><image:title>Server-Pool.jpg</image:title></image:image><lastmod>2012-01-17T16:03:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/01/16/building-a-network-file-system-for-use-with-virtual-machines/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/reports-freenas_thumb.jpg</image:loc><image:title>Reports-FreeNAS_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/reports-freenas.jpg</image:loc><image:title>Reports-FreeNAS.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/freenas-system_thumb.jpg</image:loc><image:title>FreeNAS-System_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/freenas-system.jpg</image:loc><image:title>FreeNAS-System.jpg</image:title></image:image><lastmod>2012-01-16T22:50:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2012/01/16/a-look-at-the-new-xenserver-6/</loc><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/wlemoticon-winkingsmile.png</image:loc><image:title>wlEmoticon-winkingsmile.png</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/ping-capture_thumb.jpg</image:loc><image:title>Ping-Capture_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/ping-capture.jpg</image:loc><image:title>Ping-Capture.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/xenserver-update-log_thumb.jpg</image:loc><image:title>XenServer-Update-Log_thumb.jpg</image:title></image:image><image:image><image:loc>https://mobilesecurityanalyst.com/wp-content/uploads/2012/01/xenserver-update-log.jpg</image:loc><image:title>XenServer-Update-Log.jpg</image:title></image:image><lastmod>2012-01-16T22:21:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2011/09/25/platespin-now-fully-supports-free-esxi-5/</loc><lastmod>2011-09-25T12:28:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2011/09/19/esxi-5-will-only-run-with-vt-processors/</loc><lastmod>2011-09-19T12:42:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2011/09/06/esxi-5-0-is-out-and-it-has-some-nice-improvements/</loc><lastmod>2011-09-06T10:49:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2011/07/31/great-migration-software-for-your-windows-servers/</loc><lastmod>2011-09-06T10:31:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2011/06/04/more-virtualization-updates/</loc><lastmod>2011-06-11T14:58:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com/2011/06/02/virtualize-your-network-servers-and-save/</loc><lastmod>2011-06-02T19:02:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://mobilesecurityanalyst.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-09-07T14:57:42+00:00</lastmod></url></urlset>
