<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://defensivedepth.com/2015/05/24/sysmon-security-onion-part-4-integrating-security-onion-and-sysmon/</loc><lastmod>2024-12-06T12:40:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2015/04/20/sysmon-security-onion-part-3-enterprise-security-monitoring/</loc><lastmod>2024-12-06T12:40:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2015/04/01/monitoring-key-windows-processes-for-anomalies/</loc><lastmod>2024-12-06T12:40:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2015/03/29/sysmon-security-onion-part-1-rise-of-the-encrypted-web/</loc><lastmod>2024-12-06T12:40:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2020/04/02/kolide-fleet-breaking-out-the-osquery-api-web-ui/</loc><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2020/03/2020-03-29_06-18-21.jpg</image:loc><image:title>2020-03-29_06-18-21</image:title></image:image><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2020/03/2020-03-29_06-15-07.jpg</image:loc><image:title>2020-03-29_06-15-07</image:title></image:image><lastmod>2021-02-21T19:05:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2020/04/28/osquery-handout-sql-filtering/</loc><lastmod>2020-04-28T14:55:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2020/04/14/osquery-performance-tuning-monitoring/</loc><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2020/04/perf5.jpg</image:loc><image:title>perf5</image:title></image:image><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2020/04/perf2.jpg</image:loc><image:title>perf2</image:title></image:image><lastmod>2020-04-15T13:37:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/osquery-handouts/</loc><lastmod>2020-04-15T13:33:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://defensivedepth.com/research/</loc><lastmod>2020-03-29T09:43:08+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://defensivedepth.com/2020/03/22/osquery-for-security-analysis-q1-2020-update/</loc><lastmod>2020-03-22T18:08:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2019/12/16/detecting-internet-exposed-services-that-shouldnt-be/</loc><lastmod>2019-12-17T16:39:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2018/04/25/bundling-custom-configs-with-osquery-msi/</loc><lastmod>2019-07-24T12:27:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2019/02/28/osquery-enriching-chrome-extension-data/</loc><lastmod>2019-02-28T16:52:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2019/02/21/osquery-join-with-users-table-not-returning-results/</loc><lastmod>2019-02-28T14:24:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2018/12/21/logstash-parsing-windows-eventlogs-shipped-by-osquery/</loc><lastmod>2018-12-21T17:58:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2018/11/11/tag-osquery-logs-with-attck-ids/</loc><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2018/11/osquery.jpg</image:loc><image:title>osquery</image:title></image:image><lastmod>2018-11-11T10:40:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2018/10/10/osquery-cheat-sheet-process-interrogation-persistence-techniques/</loc><lastmod>2018-10-18T19:25:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2018/10/19/integrating-osquery-into-security-onion/</loc><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2018/10/livequery2.jpg</image:loc><image:title>LiveQuery2</image:title></image:image><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2018/10/indicator-link.jpg</image:loc><image:title>Indicator-link</image:title></image:image><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2018/10/livequery.jpg</image:loc><image:title>LiveQuery</image:title></image:image><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2018/10/indicators-page.jpg</image:loc><image:title>indicators-page</image:title></image:image><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2018/10/osquery-dashboard.jpg</image:loc><image:title>osquery-dashboard</image:title></image:image><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2018/10/backlist021.jpg</image:loc><image:title>Backlist02</image:title></image:image><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2018/10/backlist02.jpg</image:loc><image:title>Backlist02</image:title></image:image><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2018/10/backlist01.jpg</image:loc><image:title>Backlist01</image:title></image:image><lastmod>2018-10-18T19:22:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/who-we-are/</loc><lastmod>2018-04-26T12:13:34+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://defensivedepth.com/2018/03/06/easily-automate-grafana-dashboard-snapshots/</loc><lastmod>2018-03-06T13:58:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2016/09/10/integrating-autoruns-with-security-onion/</loc><lastmod>2016-09-11T00:17:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2008/08/05/book-review-of-tao-of-network-security-monitoring/</loc><lastmod>2016-01-04T14:55:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/01/23/extrusion-detection-review-posted/</loc><lastmod>2016-01-04T14:55:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/04/28/hacker-techniques-exploits-incident-handling-a-review/</loc><lastmod>2016-01-04T14:55:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/04/21/youtube-vid-of-bejtlich-a-bsd-conference/</loc><lastmod>2016-01-04T14:54:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2016/01/04/strategic-defence-in-cyberspace-beyond-tools-tactics/</loc><lastmod>2016-01-04T14:51:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2015/12/19/new-sysmon-ossec-decoders/</loc><lastmod>2015-12-19T13:31:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2015/09/11/socaugusta-deck-sysmon-security-onion-integration/</loc><lastmod>2015-09-20T11:42:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2015/06/11/sysmon-security-onion-part-5-sysmon-event-collection/</loc><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2015/05/test.png</image:loc><image:title>Hybrid Collection</image:title></image:image><lastmod>2015-06-11T05:51:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2015/04/06/sysmon-security-onion-part-2-rise-of-intelligence-driven-computer-network-defense/</loc><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2015/03/pyramid.png</image:loc><image:title>Pyramid of Pain</image:title><image:caption>Pyramid of Pain</image:caption></image:image><lastmod>2015-05-24T16:10:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2015/03/27/using-sysmon-to-enrich-security-onions-host-level-capabilities/</loc><lastmod>2015-03-29T23:39:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/wintap/</loc><lastmod>2015-02-20T22:07:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://defensivedepth.com/2015/01/20/book-review-the-book-of-pf-a-no-nonsense-guide-to-the-openbsd-firewall/</loc><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2015/02/pf3e_cover01-e1422792805868.png</image:loc><image:title>pf3E_cover01</image:title></image:image><lastmod>2015-02-02T00:59:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2014/11/06/wirelurker/</loc><lastmod>2014-11-06T16:22:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2014/10/30/liability-insurance-digital-security-claims/</loc><lastmod>2014-10-30T11:33:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2014/10/27/prevention-eventually-fails/</loc><lastmod>2014-10-27T08:39:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2014/10/12/outbound-spam-filtering/</loc><lastmod>2014-10-13T00:15:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2014/07/28/governance-challenges-the-digital-side-of-duty-of-care/</loc><lastmod>2014-07-28T10:44:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2014/06/17/new-cs-rc-report-truecrypt-june-2014/</loc><lastmod>2014-06-17T11:00:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2014/05/01/ie6-ie11-0-day-vulnerability-aprilmay-2014/</loc><lastmod>2014-05-01T10:07:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2014/04/14/heartbleed-it-infrastructure-vulnerabilities/</loc><lastmod>2014-04-14T17:39:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2013/09/08/security-onion-cloud-client-nsm-for-the-cloud/</loc><lastmod>2013-09-26T05:31:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2013/09/05/introducing-wintap/</loc><lastmod>2013-09-05T08:35:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2013/03/11/a-preview/</loc><lastmod>2013-04-18T16:19:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2012/08/03/accepted-to-sti-more/</loc><lastmod>2012-08-03T10:50:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2012/01/26/book-review-the-tangled-web-a-guide-to-securing-modern-web-applications/</loc><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2012/01/tangledweb.png</image:loc><image:title>tangledweb</image:title></image:image><lastmod>2012-01-26T15:15:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2011/12/19/passed-the-giac-gcia-exam/</loc><lastmod>2012-06-08T13:04:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2011/09/05/book-review-practical-packet-analysis/</loc><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2011/09/practical-packet-analysis.jpg</image:loc><image:title>practical-packet-analysis</image:title></image:image><lastmod>2011-09-05T20:53:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2011/06/15/gsec-gold-paper-accepted-securely-integrating-ios-devices-into-the-business-environment/</loc><lastmod>2011-06-16T02:24:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2011/05/22/websense-policy-server-install-high-latency/</loc><lastmod>2013-05-02T15:58:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2011/04/27/pfsense-2-cookbook-a-technical-review/</loc><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2011/04/4866os_pfsense-2-0-cookbook.jpg</image:loc><image:title>pfSense 2.0 Cookbook</image:title></image:image><lastmod>2012-04-07T16:36:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2011/04/14/how-to-filter-cross-reference-isa-logs-for-owa-account-lockouts/</loc><lastmod>2011-04-15T00:30:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2011/04/11/joomla-is-becoming-a-liability-or-not/</loc><lastmod>2011-04-12T00:29:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2011/03/01/hbgary-juicy-fruit-0-day/</loc><lastmod>2011-03-01T14:17:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2011/02/03/ironkey-vs-knoxit-lok-it-a-subjective-comparison/</loc><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2011/02/2011-01-16_1536.png</image:loc><image:title>LOK-IT.net</image:title><image:caption>LOK-IT.net Serving Up Malware</image:caption></image:image><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2011/02/knox-it_img.jpg</image:loc><image:title>Knox-IT</image:title></image:image><image:image><image:loc>https://defensivedepth.com/wp-content/uploads/2011/02/ironkey-d200-32gb-flash-drive.jpg</image:loc><image:title>Ironkey</image:title></image:image><lastmod>2012-10-09T15:27:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2011/01/26/facebook-google-persistent-https-just-the-beginning/</loc><lastmod>2011-01-27T13:44:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2011/01/08/in-remembrance-of-bill-zeller/</loc><lastmod>2011-01-09T02:18:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2011/01/06/hyper-v-feature-request-promiscuous-mode/</loc><lastmod>2014-12-30T00:44:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2011/01/03/new-name-new-look-same-content/</loc><lastmod>2011-01-03T23:02:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2010/10/26/fire-in-the-sheep/</loc><lastmod>2010-10-26T21:18:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2010/09/30/school-of-hard-knocks-p2v-mac-addresses/</loc><lastmod>2010-09-30T14:49:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2010/09/12/book-review-posted-network-flow-analysis/</loc><lastmod>2010-09-12T18:45:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2010/07/26/formsite-authorize-net-pci-dss-compliance/</loc><lastmod>2010-08-26T17:52:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2010/07/25/unique-comment-spam/</loc><lastmod>2010-07-25T16:17:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2010/07/05/how-i-procured-a-free-copy-of-network-flow-analysis/</loc><lastmod>2010-07-05T12:32:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2010/06/13/anti-virus-as-it-has-been-done-the-past-20-years-is-dead/</loc><lastmod>2010-06-13T15:43:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2010/03/29/gcih-gold-paper-accepted/</loc><lastmod>2010-04-10T04:37:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2010/03/18/great-lakes-infragard-conference-2010-some-thoughts/</loc><lastmod>2010-03-18T12:49:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2010/03/08/review-of-time-management-for-system-administrators-posted/</loc><lastmod>2010-03-18T17:51:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2010/02/13/hurry-only-random_num-spots-left/</loc><lastmod>2010-12-13T12:34:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/11/22/social-engineering-neuro-lingustic-programming-nlp-profiling/</loc><lastmod>2011-05-07T13:15:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/11/07/josh-browers-gcih-gold-project/</loc><lastmod>2010-01-27T21:21:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/10/08/party-like-its-windows-7-or-how-i-became-a-houseparty-host-for-the-windows-7-launch/</loc><lastmod>2009-10-09T08:44:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/08/29/environment-monitoring-for-the-smb-server-room/</loc><lastmod>2013-01-28T20:44:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/08/09/sans-audit-521-meeting-the-minimum-pcidss-1-2-becoming-and-staying-compliant/</loc><lastmod>2009-09-29T14:51:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/06/19/reason-8-to-love-rackspace-free-red-bull/</loc><lastmod>2009-06-19T12:16:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/06/02/great-new-it-pro-qa-website/</loc><lastmod>2009-06-02T08:35:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/05/27/a-commodity-xenserver-the-xenserver-install/</loc><lastmod>2011-02-11T16:32:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/05/25/a-commodity-xenserver-the-build-specs/</loc><lastmod>2009-05-25T11:00:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/05/24/cutting-edge-spy-gear-by-sky-mall/</loc><lastmod>2009-05-24T12:30:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/04/23/posscon-2009/</loc><lastmod>2009-04-23T21:25:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/04/14/world-domination-part-2/</loc><lastmod>2009-04-14T12:50:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/04/05/building-a-firewall-pfsense-on-an-alix-2d3/</loc><lastmod>2013-07-23T02:03:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/03/27/april-1st-2009-the-sky-is-not-falling/</loc><lastmod>2009-03-27T16:12:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/03/19/internet-explorer-8-inprivate-browsing/</loc><lastmod>2010-01-10T05:37:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/03/12/firewall-script-your-next-silver-bullet/</loc><lastmod>2009-03-12T17:26:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/03/07/running-citrix-xen-server-on-my-laptop/</loc><lastmod>2009-12-29T16:26:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/03/03/anatomy-of-a-hack-the-phpbbcom-attack/</loc><lastmod>2009-03-03T16:01:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/02/27/a-sobering-reminder-renew-your-domains/</loc><lastmod>2009-02-27T18:07:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/01/15/system-network-administrator-does-not-equal-security-administrator/</loc><lastmod>2009-01-15T14:43:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2009/01/03/protecting-yourself-from-rogue-md5-signed-certificates/</loc><lastmod>2009-01-03T18:39:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2008/12/29/sans-security-policy-awareness-class-review/</loc><lastmod>2008-12-29T16:30:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2008/12/27/fun-with-welchia/</loc><lastmod>2008-12-27T16:15:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2008/12/27/fraud-alert-vistaprint/</loc><lastmod>2011-09-18T14:32:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2008/12/05/more-facebook-shenanigans/</loc><lastmod>2009-03-09T21:30:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2008/12/03/site-refresh/</loc><lastmod>2008-12-03T11:33:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2008/08/09/russia-georgia-the-cyberwar-angle/</loc><lastmod>2008-08-10T01:10:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2008/06/16/xen-joomla-how-to/</loc><lastmod>2008-06-16T17:39:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2008/06/05/business-continuity-planning-vs-disaster-recovery-planning/</loc><lastmod>2010-12-29T20:41:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2008/05/27/sniffing-voip-with-wireshark/</loc><lastmod>2008-06-29T23:32:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com/2008/04/24/ttl-rfc-spec-vs-real-life-implementation/</loc><lastmod>2008-04-24T11:35:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://defensivedepth.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-12-06T12:40:31+00:00</lastmod></url></urlset>
