<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-11-24-Introduction-(G%C3%ADsli)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-11-25-Virtual-Machines-(Fuad--and--Kim)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-11-26-Command-Line-Interface-(G%C3%ADsli)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-11-27-Operational-Systems-(G%C3%ADsli)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-11-27-Operational-Systems-(Ivan)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-11-27-Operational-Systems-(Kim)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-11-28-Phishing-and-AI</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-12-01-OSINT--and--Networks-(G%C3%ADsli)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-12-02-Networks---continuation-(G%C3%ADsli)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-12-03--Web-Security--and--Attack-Surfaces-(Fuad)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-12-03-AI-Security</loc>
    <lastmod>2026-03-09T13:47:02.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-12-03-Web-Security--and--Web-Attack-Surfaces-(G%C3%ADsli)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-12-04-AI-Security-(G%C3%ADsli)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-12-05-Binary-Exploitation-(G%C3%ADsli)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-12-08-Principles-of-Defence-(G%C3%ADsli)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-12-09-Information-Warfare-(G%C3%ADsli)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-12-09-Information-Warfare---Computer-System-Security-(Fuad)</loc>
    <lastmod>2026-03-09T13:52:06.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-12-10-Data-Privacy-(Fuad)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-12-11-Summary-(Fuad)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/2025-12-11-Summary-(G%C3%ADsli)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/CLI-Notes---Hreimur</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/FurtherStudies</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/IntroToCySec-Hreimur</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/Labs/Lab-11-CaptureTheFlag/Bitlocker-1</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/Labs/Lab-11-CaptureTheFlag/PIE-TIME</loc>
    <lastmod>2026-03-09T14:20:30.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/Labs/Lab-4-(G%C3%ADsli)-Operating-Systems</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/Labs/Lab-7-(G%C3%ADsli)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/OS-Notes---Hreimur</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/Virtualization-Hreimur</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Lecture-Notes/WebSecurity-Further-studies-JonIngi</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/2025-12-10</loc>
    <lastmod>2026-03-09T13:45:55.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/50-cent-brigade</loc>
    <lastmod>2026-03-09T13:59:51.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Acronyms-cheatsheet</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Artifical-Intelligence/Defensive-Strategies/Human-in-the-Loop-(HITL)</loc>
    <lastmod>2026-03-09T13:48:50.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Artifical-Intelligence/Defensive-Strategies/LLM-Guardrails</loc>
    <lastmod>2026-03-09T13:52:28.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Artifical-Intelligence/Defensive-Strategies/The-Sandwich-Defense</loc>
    <lastmod>2026-03-09T13:49:04.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Artifical-Intelligence/Generative-AI-Attack-Surface</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Artifical-Intelligence/Hallucination-Squatting</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Artifical-Intelligence/Insecure-Output-Handling</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Artifical-Intelligence/LLM</loc>
    <lastmod>2026-03-09T14:00:27.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Artifical-Intelligence/Model-Collapse</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Artifical-Intelligence/Model-Inversion,-Extraction,-Poisoning</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Artifical-Intelligence/Probabilistic-Software</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Artifical-Intelligence/Prompt-Injection</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attack-Surface</loc>
    <lastmod>2026-03-09T14:39:19.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/Backdoor</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/Botnet</loc>
    <lastmod>2026-03-09T14:37:51.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/Buffer-Overflow</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/Corporate-Espionage</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/KARMA-Attack</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/Malware/Malware</loc>
    <lastmod>2026-03-09T14:38:09.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/Malware/Ransomware</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/Malware/Trojan</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/Malware/Virus</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/Malware/Worm</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/PWD-(Phishing-Website-Detection)</loc>
    <lastmod>2026-03-09T14:38:45.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/Phishing</loc>
    <lastmod>2026-03-09T14:37:33.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/Race-condition</loc>
    <lastmod>2026-03-09T14:38:28.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/Spoofing</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attacks/XSS</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Attribute-inference-attacks</loc>
    <lastmod>2026-03-09T14:00:46.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Binary-Exploitation/Binary-Exploitation</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Binary-Exploitation/Process-Memory-Layout</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Binary-Exploitation/Pwntools</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Binary-Exploitation/Return-Oriented-Programming-(ROP)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Binary-Exploitation/Stack-buffer-overflow</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Binary-Exploitation/The-stack--and--function-calls</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Binary-Exploitation/ret2libc</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Bot-Holiday</loc>
    <lastmod>2026-03-09T14:01:03.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Chinese-rules-of-engagement</loc>
    <lastmod>2026-03-09T14:01:22.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Complete-mediation</loc>
    <lastmod>2026-03-09T14:01:41.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Cyber-Security</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Cybersecurity_Research_Advanced_Topics</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/Access-Control</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/Bug-Bounty</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/Capture-the-Flag-(CTF)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/Castle-and-Moat-security-model</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/Core-design-principles-of-Defense</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/Cyber-Defense</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/Defense-in-Depth</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/Economics-of-Defense</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/Firewall</loc>
    <lastmod>2026-03-09T14:39:03.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/Incident-Response--and--Recovery</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/Recovery-Point-Objective-(RPO)</loc>
    <lastmod>2026-03-09T13:49:19.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/Recovery-Time-Objective-(RTO)</loc>
    <lastmod>2026-03-09T13:49:33.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/Risk-Assesment</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/The-3-2-1-Backup-Rule</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense--and--Control/Zero-Trust-Architecture</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Defense-in-depth</loc>
    <lastmod>2026-03-09T14:02:01.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Denial-of-Service-Attack-DDos</loc>
    <lastmod>2026-03-09T14:02:20.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Differential-Privacy</loc>
    <lastmod>2026-03-09T14:02:41.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Insecure-Direct-Object-References-(IDOR)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Intrusion-Detection-System-(IDS)</loc>
    <lastmod>2026-03-09T14:03:00.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/K-anonymity</loc>
    <lastmod>2026-03-09T14:03:19.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Kate-Brown's-Manual-for-Survival</loc>
    <lastmod>2026-03-09T14:03:36.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Kate-Brown%E2%80%99s-Manual-for-Survival</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Kernel-Vs.-User-Space</loc>
    <lastmod>2026-03-09T13:53:20.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Membership-Inference-Attack</loc>
    <lastmod>2026-03-09T14:03:53.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Model-inversion-attack</loc>
    <lastmod>2026-03-09T13:54:22.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/ARP</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/AS</loc>
    <lastmod>2026-03-09T14:04:10.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/BGP</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/DHCP</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/DNS</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/Internet-Routing</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/LAN</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/MAC</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/NAT</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/Network-hardware/Hub</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/Network-hardware/Router</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/Network-hardware/Switch</loc>
    <lastmod>2026-03-09T14:41:06.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/OSI-Model/1-Physical-Layer</loc>
    <lastmod>2026-03-09T14:04:26.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/OSI-Model/2-Data-Link-Layer</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/OSI-Model/3-Network-Layer</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/OSI-Model/4-Transport-Layer</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/OSI-Model/5-Session-Layer</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/OSI-Model/6-Presentation-Layer</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/OSI-Model/7-Application-Layer</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/OSI-Model/OSI-Model</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/Packet-Switching</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/TCP-IP-Model/IP</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/TCP-IP-Model/TCP-IP-Model</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/TCP-IP-Model/TCP</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/TLS</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/Transfer-Protocols/FTP</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/Transfer-Protocols/HTTP</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/Transfer-Protocols/HTTPS</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/Transfer-Protocols/SMTP</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Networks/UDP</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Passive-leakage-LLMs</loc>
    <lastmod>2026-03-09T13:55:21.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Physical-View</loc>
    <lastmod>2026-03-09T14:40:32.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Polluting-the-information-Space</loc>
    <lastmod>2026-03-09T13:59:01.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Privacy-Vs.-Security</loc>
    <lastmod>2026-03-09T13:49:50.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Privacy-safeguards</loc>
    <lastmod>2026-03-09T13:57:36.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Repudiation</loc>
    <lastmod>2026-03-09T14:40:49.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Risk-mitigation</loc>
    <lastmod>2026-03-09T14:41:06.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/SLA-(Service-Level-Agreement)</loc>
    <lastmod>2026-03-09T14:40:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Systems--and--Plaforms/Kernel</loc>
    <lastmod>2026-03-09T13:59:30.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Systems--and--Plaforms/Operating-System</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Systems--and--Plaforms/POSIX</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Systems--and--Plaforms/Port</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Systems--and--Plaforms/Privileged-Kernel-mode</loc>
    <lastmod>2026-03-09T14:40:44.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Systems--and--Plaforms/Unix-Like</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Trajectory-recovery</loc>
    <lastmod>2026-03-09T13:50:07.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Host-Machine-(Host-OS)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Hypervisor</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Multi-Tenancy</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Side-Channel-Attack</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/VM-Escape</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Virtual-Machine-(VM)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Virtualization-Hardening--and--Operations/Image</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Virtualization-Hardening--and--Operations/Network-Segmentation</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Virtualization-Hardening--and--Operations/Orchestration</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Virtualization-Hardening--and--Operations/Virtualization-Hardening--and--Operations</loc>
    <lastmod>2026-03-09T13:50:56.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Virtualization-methods/Container</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Virtualization-methods/Emulation</loc>
    <lastmod>2026-03-09T14:41:27.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Virtualization-methods/Full-Virtualization</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Virtualization-methods/Hardware-Assisted-Virtualization</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Virtualization-methods/Hypercall</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Virtualization-methods/Paravirtualization</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Virtualization-methods/Virtualization-methods</loc>
    <lastmod>2026-03-09T14:41:43.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Virtualization/Virtualization</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Vulnerability-standards/CVE</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Vulnerability-standards/NVD</loc>
    <lastmod>2026-03-09T14:42:01.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Vulnerability</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Web-Security/Broken-Authentication</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Web-Security/OWASP</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Web-Security/SQL-Injection-(SQLi)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Wellington-House</loc>
    <lastmod>2026-03-09T13:57:58.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/Zero-Day-Vulnerability</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Terminology/gets()-in-c</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Tools-and-Commands/Attack-Detection--and--Monitoring/Attack-Detection--and--Monitoring</loc>
    <lastmod>2026-03-09T13:47:23.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Tools-and-Commands/Attack-Prevention--and--Hardening/Attack-Prevention--and--Hardening</loc>
    <lastmod>2026-03-09T13:47:41.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Tools-and-Commands/Basic-Bash-commands/Basic-Bash-commands</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Tools-and-Commands/Basic-Bash-commands/Regular-Expression-(e-g-regex)</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Tools-and-Commands/Basic-Bash-commands/find</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Tools-and-Commands/Basic-Bash-commands/grep</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Tools-and-Commands/Forensics--and--Incident-Response/Forensics--and--Incident-Response</loc>
    <lastmod>2026-03-09T13:48:08.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Tools-and-Commands/Setup--and--Config/Qemu</loc>
    <lastmod>2026-03-09T13:46:21.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/Tools-and-Commands/Vulnerability-Scanning--and--Assessment/Vulnerability-Scanning--and--Assessment</loc>
    <lastmod>2026-03-09T13:48:32.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/</loc>
    <lastmod>2023-08-23T19:09:04.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/resources/All-the-quizzes-and-the-correct-answers</loc>
    <lastmod>2025-12-12T12:47:12.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/resources/Online-Resources/TODO</loc>
    <lastmod>2026-03-09T13:46:43.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/resources/references</loc>
    <lastmod>2025-12-12T12:47:13.000Z</lastmod>
  </url><url>
    <loc>https://192.168.148.134/zAttachments/README</loc>
    <lastmod>2025-12-12T12:47:13.000Z</lastmod>
  </url></urlset>