<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<?xml-stylesheet type="text/xsl" href="https://security-consulting.icu/blog/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  
  <url>
    <loc>https://security-consulting.icu/blog/2019/03/advanced-clickjacking-script/</loc>
    <lastmod>2019-03-14T07:05:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2019/02/script-mass-download-wordpress-plugins/</loc>
    <lastmod>2019-02-05T10:00:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2019/02/wordpress-forminator-persistent-xss-blind-sql-injection/</loc>
    <lastmod>2019-02-05T09:20:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2019/02/wordpress-contact-form-email-xss-csrf/</loc>
    <lastmod>2019-02-05T08:20:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2019/02/wordpress-quiz-and-survey-master-xss/</loc>
    <lastmod>2019-02-05T07:31:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2019/02/wordpress-give-xss/</loc>
    <lastmod>2019-02-05T07:15:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2019/02/wordpress-wp-livechat-xss/</loc>
    <lastmod>2019-02-05T07:15:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2019/02/wordpress-wpgooglemaps-xss/</loc>
    <lastmod>2019-02-05T07:14:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2019/02/wordpress-yop-poll-xss/</loc>
    <lastmod>2019-02-05T07:05:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2019/02/wordpress-blog2social-xss/</loc>
    <lastmod>2019-02-05T07:03:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2019/02/wordpress-kingcomposer-xss/</loc>
    <lastmod>2019-02-05T07:03:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2019/02/wordpress-font-organizer-xss/</loc>
    <lastmod>2019-02-05T07:02:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2019/02/wordpress-social-networks-auto-poster-xss/</loc>
    <lastmod>2019-02-05T07:00:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2018/06/tplink-wr841n-csrf-cve-2018-12574/</loc>
    <lastmod>2018-06-27T10:00:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2018/06/tplink-wr841n-code-exec-cve-2018-12577/</loc>
    <lastmod>2018-06-27T09:00:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2018/06/tplink-wr841n-broken-auth-cve-2018-12575/</loc>
    <lastmod>2018-06-27T08:00:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2018/04/tplink-wr841n-clickjacking-https/</loc>
    <lastmod>2018-06-27T07:00:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2015/07/getsimplecms-3-3-5-xss-code-execution-dos-password-leak-weak-authentication-misc/</loc>
    <lastmod>2015-07-15T10:32:10+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2015/07/second-order-sql-injection-reflected-xss-path-traversal-function-execution-vulnerability-zenphoto/</loc>
    <lastmod>2015-07-10T17:45:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2015/07/code-execution-csrf-xss-vulnerability-wordpress-file-upload-plugin/</loc>
    <lastmod>2015-07-02T21:24:31+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2015/06/session-fixation-xss-code-execution-vulnerability-pivotx/</loc>
    <lastmod>2015-06-27T09:21:48+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2015/06/persistent-xss-vulnerability-limesurvey-2-05/</loc>
    <lastmod>2015-06-27T08:36:45+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2015/06/reflected-xss-vulnerability-tinywebgallery/</loc>
    <lastmod>2015-06-27T08:12:06+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2015/06/xss-csrf-vulnerability-beehive-forum/</loc>
    <lastmod>2015-06-05T17:34:43+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/reviews/</loc>
    <lastmod>2015-05-16T08:15:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/programs-and-code/</loc>
    <lastmod>2015-05-16T07:58:17+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/games/</loc>
    <lastmod>2015-05-16T07:55:46+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/security-vulnerabilities/</loc>
    <lastmod>2015-05-16T07:53:20+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2015/05/sql-injection-reflected-xss-vulnerability-visual-form-builder/</loc>
    <lastmod>2015-05-15T12:33:35+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2015/05/arbitrary-file-override-reflected-xss-vulnerability-my-calendar/</loc>
    <lastmod>2015-05-15T12:33:27+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2015/05/reflected-xss-vulnerability-gotmls/</loc>
    <lastmod>2015-05-15T12:33:20+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2015/03/bypass-csrf-protection-via-xss/</loc>
    <lastmod>2015-03-29T12:43:24+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2015/02/mod_security-bypass-login-sql-injection/</loc>
    <lastmod>2015-02-25T18:39:24+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2015/02/comparison-java-code-quality-tools/</loc>
    <lastmod>2015-02-25T18:34:21+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2015/02/mongodb-nosql-injection-security/</loc>
    <lastmod>2015-02-18T15:16:02+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2014/11/reflected-xss-in-wordpress-contact-form-db-plugin/</loc>
    <lastmod>2014-11-26T21:02:47+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2014/10/java-timing-code/</loc>
    <lastmod>2014-10-19T13:30:59+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2014/09/refactoring-deeply-nested-if-statements/</loc>
    <lastmod>2014-09-29T19:10:35+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2014/09/refactoring-boolean-checks-if-statement/</loc>
    <lastmod>2014-09-29T19:03:58+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2014/08/bin-packing-algorithm-java/</loc>
    <lastmod>2014-08-17T08:27:09+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2014/08/linux-mint-remove-ppa/</loc>
    <lastmod>2014-08-09T14:51:55+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2014/05/comparison-of-free-uml-tools/</loc>
    <lastmod>2014-05-03T13:30:47+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2014/04/linux-installing-ruby-on-rails/</loc>
    <lastmod>2014-04-27T16:10:45+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2014/04/linux-install-qgis/</loc>
    <lastmod>2014-04-21T12:16:07+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2013/12/image-manipulation-android-linux/</loc>
    <lastmod>2013-12-22T14:03:42+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2013/12/pet-memory-game-android/</loc>
    <lastmod>2013-12-22T13:00:59+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2013/12/java-image-manipulation-bufferedimage/</loc>
    <lastmod>2013-12-14T09:32:05+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2013/11/php-string-functions-contains-equals-endswith/</loc>
    <lastmod>2013-11-23T10:15:41+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/12/linux-difference-between-find-locate-and-whereis/</loc>
    <lastmod>2012-12-14T20:12:50+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/11/symfony2-flash-message/</loc>
    <lastmod>2012-11-08T13:27:14+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/11/domain-name-price-comparison-name-suggestions/</loc>
    <lastmod>2012-11-05T10:24:33+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/11/linux-3-search-and-replace/</loc>
    <lastmod>2012-11-02T17:51:37+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/10/low-adsense-link-unit-coverage/</loc>
    <lastmod>2012-10-30T17:43:11+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/10/netbeans-php-autocomplete/</loc>
    <lastmod>2012-10-28T12:12:05+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/10/wordpress-link-image-post-to-parent-post/</loc>
    <lastmod>2012-10-25T19:07:56+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/10/moving-wordpress-to-production-server/</loc>
    <lastmod>2012-10-22T07:49:44+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/10/php-comma-seperated-list-from-array/</loc>
    <lastmod>2012-10-19T12:25:34+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/10/linux-2-search-for-a-file-by-filename/</loc>
    <lastmod>2012-10-18T10:23:30+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/10/wordpress-plugin-language-tagger-and-html-cleaner-2/</loc>
    <lastmod>2012-10-16T14:35:35+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/10/talk-2-twig-comma-separated-list/</loc>
    <lastmod>2012-10-13T06:42:18+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/10/linux-1-search-for-a-file-containing-text/</loc>
    <lastmod>2012-10-12T16:46:17+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/10/server-change/</loc>
    <lastmod>2012-10-12T08:41:58+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/10/reuse-apache-rules-in-multiple-directories-or-websites/</loc>
    <lastmod>2012-10-05T14:50:03+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/10/symfony2-tutorial-doctrine-entities-sql/</loc>
    <lastmod>2012-10-04T12:35:18+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/10/qa-1-java-performance-of-static-variable/</loc>
    <lastmod>2012-10-03T09:26:23+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/10/book-review-effective-java/</loc>
    <lastmod>2012-10-02T08:47:47+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/09/programming-book-recommendations/</loc>
    <lastmod>2012-09-30T15:01:15+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/09/breakout-game-java-code/</loc>
    <lastmod>2012-09-28T16:10:18+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/07/symfony2-tutorial-user-submissions-controller-forms-e-mails/</loc>
    <lastmod>2012-07-29T08:39:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/06/symfony2-tutorial-static-page-routing-templates-twig/</loc>
    <lastmod>2012-06-27T16:41:35+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/06/symfony2-tutorial-netbeans-and-symfony2-setting-everything-up/</loc>
    <lastmod>2012-06-23T12:57:07+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/06/symfony2-tutorial-the-planning-stage-of-website-development/</loc>
    <lastmod>2012-06-21T17:14:26+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/06/symfony2-tutorial-for-beginners/</loc>
    <lastmod>2012-06-21T17:04:53+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/03/logeval-java-server-log-analyzer-and-parser/</loc>
    <lastmod>2012-03-12T11:19:34+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/02/java-function-passing/</loc>
    <lastmod>2012-02-15T18:07:41+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/02/wordpress-security-general-strategy-guide/</loc>
    <lastmod>2012-02-10T13:09:10+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/02/when-and-how-to-improve-java-performance/</loc>
    <lastmod>2012-02-03T19:48:06+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/02/wordpress-html-language-meta-tag-depending-on-post-language/</loc>
    <lastmod>2012-02-01T20:44:49+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/01/using-svn-apache-subversion-command-line-tool/</loc>
    <lastmod>2012-01-30T17:39:11+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/01/netbeans-vs-eclipse-an-ide-comparison/</loc>
    <lastmod>2012-01-27T16:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/01/android-snake-game-source-code/</loc>
    <lastmod>2012-01-25T16:46:38+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/01/mill-the-board-game-including-an-ai-using-alpha-beta-pruning-java/</loc>
    <lastmod>2012-01-24T19:41:53+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/01/java-swing-snake-with-different-guis/</loc>
    <lastmod>2012-01-22T16:20:58+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/01/java-list-efficiency/</loc>
    <lastmod>2012-01-21T21:22:54+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/01/connect4/</loc>
    <lastmod>2012-01-16T16:12:57+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/01/java-read-write-file-webpage/</loc>
    <lastmod>2012-01-13T19:00:14+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/01/wordpress-username-leak/</loc>
    <lastmod>2012-01-12T17:18:09+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/01/java-heatmap-example/</loc>
    <lastmod>2012-01-11T15:01:36+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/01/a-star-java/</loc>
    <lastmod>2012-01-11T13:54:41+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/01/apes-throw-bananas/</loc>
    <lastmod>2012-01-11T13:00:37+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/01/java-side-scroller-source/</loc>
    <lastmod>2012-01-10T19:11:29+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/2012/01/test/</loc>
    <lastmod>2012-01-10T16:49:26+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/contact/</loc>
    <lastmod>2012-01-10T14:44:26+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/404/</loc>
    <lastmod>2012-01-10T14:44:17+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/about/</loc>
    <lastmod>2012-01-10T14:44:17+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/projects/</loc>
    <lastmod>2012-01-10T14:44:04+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/a-star/</loc>
    <lastmod>2012-01-11T13:54:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/adsense/</loc>
    <lastmod>2012-10-30T17:43:11+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/adsense-coverage/</loc>
    <lastmod>2012-10-30T17:43:11+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/advisory/</loc>
    <lastmod>2019-02-05T09:20:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/algorithm/</loc>
    <lastmod>2014-08-17T08:27:09+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/alpha-beta/</loc>
    <lastmod>2012-01-24T19:41:53+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/android/</loc>
    <lastmod>2013-12-22T14:03:42+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/android-application/</loc>
    <lastmod>2012-01-25T16:46:38+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/android-game/</loc>
    <lastmod>2012-09-28T16:10:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/apache/</loc>
    <lastmod>2012-10-05T14:50:03+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/apache/</loc>
    <lastmod>2015-02-25T18:39:24+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/apache-config/</loc>
    <lastmod>2012-10-05T14:50:03+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/apache-directory-conf/</loc>
    <lastmod>2012-10-05T14:50:03+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/apache-include/</loc>
    <lastmod>2012-10-05T14:50:03+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/arbitrary-file-override/</loc>
    <lastmod>2015-05-15T12:33:27+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/arcade-game/</loc>
    <lastmod>2012-09-28T16:10:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/arraylist/</loc>
    <lastmod>2012-01-21T21:22:54+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/artificial-intelligence/</loc>
    <lastmod>2012-01-24T19:41:53+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/authentication/</loc>
    <lastmod>2015-02-18T15:16:02+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/authentication/</loc>
    <lastmod>2018-06-27T08:00:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/author/</loc>
    <lastmod>2012-01-12T17:18:09+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/autocomplete/</loc>
    <lastmod>2012-10-28T12:12:05+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/availability/</loc>
    <lastmod>2012-11-05T10:24:33+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/bad-practice/</loc>
    <lastmod>2014-09-29T19:03:58+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/beehive-forum/</loc>
    <lastmod>2015-06-05T17:34:43+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/best-java-books/</loc>
    <lastmod>2012-10-02T08:47:47+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/bin-packing/</loc>
    <lastmod>2014-08-17T08:27:09+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/blog2social/</loc>
    <lastmod>2019-02-05T07:03:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/board-game/</loc>
    <lastmod>2012-01-24T19:41:53+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/book-recommendation/</loc>
    <lastmod>2012-09-30T15:01:15+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/book-review/</loc>
    <lastmod>2012-10-02T08:47:47+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/books-on-java/</loc>
    <lastmod>2012-10-02T08:47:47+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/books-on-java/</loc>
    <lastmod>2012-10-02T08:47:47+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/boolean-logic/</loc>
    <lastmod>2014-09-29T19:10:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/breakout/</loc>
    <lastmod>2012-09-28T16:10:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/brick-game/</loc>
    <lastmod>2012-09-28T16:10:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/brute-force/</loc>
    <lastmod>2014-08-17T08:27:09+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/bufferedimage/</loc>
    <lastmod>2013-12-14T09:32:05+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/bypass/</loc>
    <lastmod>2015-03-29T12:43:24+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/cardinality/</loc>
    <lastmod>2012-10-04T12:35:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/casual-game/</loc>
    <lastmod>2012-09-28T16:10:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/</loc>
    <lastmod>2012-10-30T17:43:11+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/change-server/</loc>
    <lastmod>2012-10-22T07:49:44+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/charts/</loc>
    <lastmod>2012-03-12T11:19:34+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/clickjacking/</loc>
    <lastmod>2019-03-14T07:05:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/code-analyzer/</loc>
    <lastmod>2015-02-25T18:34:21+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/code-cleanup/</loc>
    <lastmod>2015-02-25T18:34:21+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/code-execution/</loc>
    <lastmod>2015-07-15T10:32:10+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/code-execution/</loc>
    <lastmod>2018-06-27T09:00:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/code-snipped/</loc>
    <lastmod>2015-03-29T12:43:24+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/comma-separated-list/</loc>
    <lastmod>2012-10-19T12:25:34+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/command-injection/</loc>
    <lastmod>2018-06-27T09:00:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/command-line/</loc>
    <lastmod>2014-04-27T16:10:45+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/comparison/</loc>
    <lastmod>2015-02-25T18:34:21+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/configuration/</loc>
    <lastmod>2012-06-23T12:57:07+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/connect4/</loc>
    <lastmod>2012-01-16T16:12:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/contact-form-email/</loc>
    <lastmod>2019-02-05T08:20:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/contains/</loc>
    <lastmod>2013-11-23T10:15:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/cross-site-scripting/</loc>
    <lastmod>2014-11-26T21:02:47+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/csrf/</loc>
    <lastmod>2019-02-05T08:20:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/csrf-protection/</loc>
    <lastmod>2015-03-29T12:43:24+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/css/</loc>
    <lastmod>2012-06-27T16:41:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/cute-images/</loc>
    <lastmod>2013-12-22T13:00:59+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/data-fixtures/</loc>
    <lastmod>2012-10-04T12:35:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/debian-edition/</loc>
    <lastmod>2014-08-09T14:51:55+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/design-pattern/</loc>
    <lastmod>2012-02-15T18:07:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/developed-at-university/</loc>
    <lastmod>2012-01-24T19:41:53+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/developing-android-app/</loc>
    <lastmod>2012-01-25T16:46:38+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/display/</loc>
    <lastmod>2012-01-12T17:18:09+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/doctrine/</loc>
    <lastmod>2012-10-04T12:35:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/domain-name/</loc>
    <lastmod>2012-11-05T10:24:33+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/domain-name-idea/</loc>
    <lastmod>2012-11-05T10:24:33+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/dos/</loc>
    <lastmod>2015-07-15T10:32:10+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/download/</loc>
    <lastmod>2013-12-22T13:00:59+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/early-return/</loc>
    <lastmod>2014-09-29T19:10:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/eclipse/</loc>
    <lastmod>2012-01-27T16:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/effective-java/</loc>
    <lastmod>2012-10-02T08:47:47+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/effective-java-second-edition/</loc>
    <lastmod>2012-10-02T08:47:47+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/efficiency/</loc>
    <lastmod>2012-10-03T09:26:23+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/email/</loc>
    <lastmod>2012-07-29T08:39:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/endswith/</loc>
    <lastmod>2013-11-23T10:15:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/equals/</loc>
    <lastmod>2013-11-23T10:15:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/error-based-sql-injection/</loc>
    <lastmod>2015-07-10T17:45:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/example-code/</loc>
    <lastmod>2014-08-17T08:27:09+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/execution-time/</loc>
    <lastmod>2014-10-19T13:30:59+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/exploit/</loc>
    <lastmod>2019-03-14T07:05:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/file/</loc>
    <lastmod>2012-01-13T19:00:14+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/find/</loc>
    <lastmod>2012-12-14T20:12:50+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/find-file/</loc>
    <lastmod>2012-10-18T10:23:30+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/find-text/</loc>
    <lastmod>2012-10-12T16:46:17+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/first-fit-decreasing/</loc>
    <lastmod>2014-08-17T08:27:09+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/flash-message/</loc>
    <lastmod>2012-11-08T13:27:14+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/flashbag/</loc>
    <lastmod>2012-11-08T13:27:14+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/font_organizer/</loc>
    <lastmod>2019-02-05T07:02:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/form/</loc>
    <lastmod>2012-07-29T08:39:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/forminator/</loc>
    <lastmod>2019-02-05T09:20:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/free/</loc>
    <lastmod>2013-12-22T13:00:59+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/function-passing/</loc>
    <lastmod>2012-02-15T18:07:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/function-as-parameter/</loc>
    <lastmod>2012-02-15T18:07:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/game/</loc>
    <lastmod>2013-12-22T13:00:59+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/generator/</loc>
    <lastmod>2012-11-05T10:24:33+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/getsimple/</loc>
    <lastmod>2015-07-15T10:32:10+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/gis/</loc>
    <lastmod>2014-04-21T12:16:07+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/give/</loc>
    <lastmod>2019-02-05T07:15:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/gotmls/</loc>
    <lastmod>2015-05-15T12:33:20+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/graphic-representation/</loc>
    <lastmod>2012-03-12T11:19:34+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/grep/</loc>
    <lastmod>2012-10-12T16:46:17+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/gui/</loc>
    <lastmod>2012-01-25T16:46:38+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/heatmap/</loc>
    <lastmod>2012-01-11T15:01:36+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/how-to/</loc>
    <lastmod>2014-04-27T16:10:45+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/html/</loc>
    <lastmod>2012-06-27T16:41:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/https/</loc>
    <lastmod>2018-06-27T07:00:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/ide/</loc>
    <lastmod>2015-02-25T18:34:21+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/if-condition/</loc>
    <lastmod>2014-09-29T19:10:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/if-statement/</loc>
    <lastmod>2014-09-29T19:10:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/image-gallery/</loc>
    <lastmod>2015-06-27T08:12:06+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/image-handling/</loc>
    <lastmod>2013-12-14T09:32:05+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/image-manipulation/</loc>
    <lastmod>2013-12-22T14:03:42+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/image-post/</loc>
    <lastmod>2012-10-25T19:07:56+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/injection/</loc>
    <lastmod>2015-07-15T10:32:10+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/installation/</loc>
    <lastmod>2014-04-27T16:10:45+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/interactive-webpage/</loc>
    <lastmod>2012-07-29T08:39:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/java/</loc>
    <lastmod>2015-02-25T18:34:21+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/java-best-practices/</loc>
    <lastmod>2012-10-02T08:47:47+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/java-book/</loc>
    <lastmod>2012-10-02T08:47:47+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/java-books/</loc>
    <lastmod>2012-09-30T15:01:15+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/java-game/</loc>
    <lastmod>2012-01-10T19:11:29+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/java-performance/</loc>
    <lastmod>2012-10-03T09:26:23+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/java-question/</loc>
    <lastmod>2012-10-03T09:26:23+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/java-source-code/</loc>
    <lastmod>2012-09-28T16:10:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/javascript/</loc>
    <lastmod>2019-03-14T07:05:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/joshua-bloch/</loc>
    <lastmod>2012-10-02T08:47:47+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/jump-and-run/</loc>
    <lastmod>2012-01-10T19:11:29+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/kingcomposer/</loc>
    <lastmod>2019-02-05T07:03:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/lang-tag/</loc>
    <lastmod>2012-10-16T14:35:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/language-meta-tag/</loc>
    <lastmod>2012-10-16T14:35:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/libgdx/</loc>
    <lastmod>2012-09-28T16:10:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/limesurvey/</loc>
    <lastmod>2015-06-27T08:36:45+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/link-unit/</loc>
    <lastmod>2012-10-30T17:43:11+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/linkedlist/</loc>
    <lastmod>2012-01-21T21:22:54+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/linux/</loc>
    <lastmod>2014-08-09T14:51:55+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/linux-mint/</loc>
    <lastmod>2014-08-09T14:51:55+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/linux-mint-debian-edition/</loc>
    <lastmod>2014-04-27T16:10:45+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/list/</loc>
    <lastmod>2014-05-03T13:30:47+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/lmde/</loc>
    <lastmod>2014-08-09T14:51:55+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/load/</loc>
    <lastmod>2013-12-14T09:32:05+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/local-install/</loc>
    <lastmod>2012-10-22T07:49:44+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/locate/</loc>
    <lastmod>2012-12-14T20:12:50+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/log-analyzer/</loc>
    <lastmod>2012-03-12T11:19:34+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/log-file/</loc>
    <lastmod>2012-03-12T11:19:34+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/log-parser/</loc>
    <lastmod>2012-03-12T11:19:34+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/logging/</loc>
    <lastmod>2012-01-13T19:00:14+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/many-to-many/</loc>
    <lastmod>2012-10-04T12:35:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/memory/</loc>
    <lastmod>2013-12-22T13:00:59+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/minimax/</loc>
    <lastmod>2012-01-16T16:12:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/mod_security/</loc>
    <lastmod>2015-02-25T18:39:24+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/model/</loc>
    <lastmod>2012-06-21T17:14:26+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/modelviewcontroller/</loc>
    <lastmod>2012-01-22T16:20:58+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/mongodb/</loc>
    <lastmod>2015-02-18T15:16:02+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/move-wordpress/</loc>
    <lastmod>2012-10-22T07:49:44+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/mvc/</loc>
    <lastmod>2012-06-27T16:41:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/my-calendar/</loc>
    <lastmod>2015-05-15T12:33:27+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/nested-if-statement/</loc>
    <lastmod>2014-09-29T19:10:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/netbeans/</loc>
    <lastmod>2012-10-28T12:12:05+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/netbeans-vs-eclipse/</loc>
    <lastmod>2012-01-27T16:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/nginx/</loc>
    <lastmod>2012-03-12T11:19:34+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/nickname/</loc>
    <lastmod>2012-01-12T17:18:09+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/nosql/</loc>
    <lastmod>2015-02-18T15:16:02+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/nosql-injection/</loc>
    <lastmod>2015-02-18T15:16:02+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/opacity/</loc>
    <lastmod>2013-12-14T09:32:05+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/open-source/</loc>
    <lastmod>2019-02-05T10:00:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/optimize-images/</loc>
    <lastmod>2013-12-22T14:03:42+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/owasp-core-rule-set/</loc>
    <lastmod>2015-02-25T18:39:24+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/pagination/</loc>
    <lastmod>2012-10-16T14:35:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/password-leak/</loc>
    <lastmod>2015-07-15T10:32:10+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/path-traversal/</loc>
    <lastmod>2015-07-10T17:45:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/performance/</loc>
    <lastmod>2014-10-19T13:30:59+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/permalink/</loc>
    <lastmod>2012-01-12T17:18:09+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/persistence/</loc>
    <lastmod>2012-10-04T12:35:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/persistent-xss/</loc>
    <lastmod>2015-06-27T08:36:45+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/php/</loc>
    <lastmod>2012-10-28T12:12:05+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/php/</loc>
    <lastmod>2015-07-15T10:32:10+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/php-forum/</loc>
    <lastmod>2015-06-05T17:34:43+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/pivotx/</loc>
    <lastmod>2015-06-27T09:21:48+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/plugins/</loc>
    <lastmod>2019-02-05T10:00:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/png/</loc>
    <lastmod>2013-12-22T14:03:42+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/posts/</loc>
    <lastmod>2019-03-14T07:05:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/ppa/</loc>
    <lastmod>2014-08-09T14:51:55+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/price-comparison/</loc>
    <lastmod>2012-11-05T10:24:33+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/privatly-developed/</loc>
    <lastmod>2012-09-28T16:10:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/profiler/</loc>
    <lastmod>2012-02-03T19:48:06+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/programming-book/</loc>
    <lastmod>2012-09-30T15:01:15+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/python-script/</loc>
    <lastmod>2019-02-05T10:00:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/qampa/</loc>
    <lastmod>2012-10-03T09:26:23+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/qgis/</loc>
    <lastmod>2014-04-21T12:16:07+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/quality/</loc>
    <lastmod>2015-02-25T18:34:21+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/quiz-and-survey-master/</loc>
    <lastmod>2019-02-05T07:31:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/read/</loc>
    <lastmod>2012-01-13T19:00:14+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/refactoring/</loc>
    <lastmod>2014-09-29T19:10:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/registrar/</loc>
    <lastmod>2012-11-05T10:24:33+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/remove/</loc>
    <lastmod>2014-08-09T14:51:55+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/replace/</loc>
    <lastmod>2012-11-02T17:51:37+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/replace-url/</loc>
    <lastmod>2012-10-22T07:49:44+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/repository/</loc>
    <lastmod>2012-01-30T17:39:11+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/resize-images/</loc>
    <lastmod>2013-12-22T14:03:42+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/router/</loc>
    <lastmod>2018-06-27T10:00:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/routing/</loc>
    <lastmod>2012-07-29T08:39:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/ruby/</loc>
    <lastmod>2014-04-27T16:10:45+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/ruby-on-rails/</loc>
    <lastmod>2014-04-27T16:10:45+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/runtime/</loc>
    <lastmod>2014-10-19T13:30:59+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/same-origin-policy/</loc>
    <lastmod>2015-03-29T12:43:24+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/save/</loc>
    <lastmod>2013-12-14T09:32:05+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/search/</loc>
    <lastmod>2012-11-02T17:51:37+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/search-algorithm/</loc>
    <lastmod>2012-01-11T13:54:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/second-order-sql-injection/</loc>
    <lastmod>2015-07-10T17:45:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/security/</loc>
    <lastmod>2019-03-14T07:05:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/security-through-obscurity/</loc>
    <lastmod>2012-02-10T13:09:10+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/sed/</loc>
    <lastmod>2012-11-02T17:51:37+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/seo/</loc>
    <lastmod>2012-02-01T20:44:49+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/session/</loc>
    <lastmod>2012-11-08T13:27:14+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/session-fixation/</loc>
    <lastmod>2015-06-27T09:21:48+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/shortest-path/</loc>
    <lastmod>2012-01-11T13:54:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/side-scroller/</loc>
    <lastmod>2012-01-10T19:11:29+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/slick2d/</loc>
    <lastmod>2012-01-11T13:00:37+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/snake/</loc>
    <lastmod>2012-01-25T16:46:38+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/social-networks-auto-poster/</loc>
    <lastmod>2019-02-05T07:00:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/software/</loc>
    <lastmod>2015-02-25T18:34:21+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/source-code/</loc>
    <lastmod>2019-03-14T07:05:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/source-code/</loc>
    <lastmod>2015-02-18T15:16:02+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/source-code-analysis/</loc>
    <lastmod>2019-02-05T10:00:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/sql-injectio/</loc>
    <lastmod>2015-05-15T12:33:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/sql-injection/</loc>
    <lastmod>2015-07-10T17:45:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/sql-injection/</loc>
    <lastmod>2019-02-05T09:20:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/startswith/</loc>
    <lastmod>2013-11-23T10:15:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/static-variable/</loc>
    <lastmod>2012-10-03T09:26:23+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/step-by-step/</loc>
    <lastmod>2012-06-21T17:04:53+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/strategy-guide/</loc>
    <lastmod>2012-02-10T13:09:10+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/strategy-pattern/</loc>
    <lastmod>2012-02-15T18:07:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/string-from-array/</loc>
    <lastmod>2012-10-19T12:25:34+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/string-functions/</loc>
    <lastmod>2013-11-23T10:15:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/string-in-file/</loc>
    <lastmod>2012-10-12T16:46:17+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/subversion/</loc>
    <lastmod>2012-01-30T17:39:11+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/svn/</loc>
    <lastmod>2012-01-30T17:39:11+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/swing/</loc>
    <lastmod>2012-01-22T16:20:58+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/symfony2/</loc>
    <lastmod>2012-11-08T13:27:14+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/symfony2/</loc>
    <lastmod>2012-11-08T13:27:14+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/</loc>
    <lastmod>2012-01-11T13:54:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/talk/</loc>
    <lastmod>2012-10-22T07:49:44+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/template-method-pattern/</loc>
    <lastmod>2012-02-15T18:07:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/theme/</loc>
    <lastmod>2012-10-25T19:07:56+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/</loc>
    <lastmod>2019-03-14T07:05:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/timing/</loc>
    <lastmod>2014-10-19T13:30:59+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/tinywebgallery/</loc>
    <lastmod>2015-06-27T08:12:06+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/tl-wr841n/</loc>
    <lastmod>2018-06-27T10:00:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/tools/</loc>
    <lastmod>2015-02-25T18:34:21+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/tp-link/</loc>
    <lastmod>2018-06-27T10:00:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/trailing-comma/</loc>
    <lastmod>2012-10-19T12:25:34+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/tutorial/</loc>
    <lastmod>2012-10-04T12:35:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/tutorial/</loc>
    <lastmod>2012-10-04T12:35:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/twenty-eleven/</loc>
    <lastmod>2012-10-25T19:07:56+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/twig/</loc>
    <lastmod>2012-10-13T06:42:18+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/uml/</loc>
    <lastmod>2014-05-03T13:30:47+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/uml-class-diagram/</loc>
    <lastmod>2012-01-25T16:46:38+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/uml-tool/</loc>
    <lastmod>2014-05-03T13:30:47+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/uncategorized/</loc>
    <lastmod>2015-02-25T18:34:21+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/use-case/</loc>
    <lastmod>2012-06-21T17:14:26+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/user-experience/</loc>
    <lastmod>2012-10-25T19:07:56+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/username/</loc>
    <lastmod>2012-01-12T17:18:09+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/version-control/</loc>
    <lastmod>2012-01-30T17:39:11+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/visual-form-builder/</loc>
    <lastmod>2015-05-15T12:33:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/vulnerability/</loc>
    <lastmod>2015-06-27T09:21:48+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/vulnerability/</loc>
    <lastmod>2019-02-05T09:20:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/weak-authentication/</loc>
    <lastmod>2015-07-15T10:32:10+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/web-accessibility/</loc>
    <lastmod>2012-02-01T20:44:49+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/web-development/</loc>
    <lastmod>2013-11-23T10:15:41+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/webpage/</loc>
    <lastmod>2012-06-21T17:14:26+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/website-design/</loc>
    <lastmod>2012-06-21T17:04:53+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/website-development/</loc>
    <lastmod>2012-07-29T08:39:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/whereis/</loc>
    <lastmod>2012-12-14T20:12:50+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/wordpress/</loc>
    <lastmod>2012-10-25T19:07:56+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/wordpress/</loc>
    <lastmod>2019-02-05T10:00:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/wordpress-file-upload/</loc>
    <lastmod>2015-07-02T21:24:31+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/wordpress-functions/</loc>
    <lastmod>2012-10-16T14:35:35+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/wordpress-plugin/</loc>
    <lastmod>2015-07-02T21:24:31+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/wordpress-plugin/</loc>
    <lastmod>2019-02-05T09:20:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/wpgooglemaps/</loc>
    <lastmod>2019-02-05T07:14:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/write/</loc>
    <lastmod>2012-01-13T19:00:14+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/xss/</loc>
    <lastmod>2014-11-26T21:02:47+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/categories/xss/</loc>
    <lastmod>2019-02-05T09:20:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://security-consulting.icu/blog/tags/yop-poll/</loc>
    <lastmod>2019-02-05T07:15:57+00:00</lastmod>
    <priority>0</priority>
  </url>
  
</urlset>