<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://thehackerproject.org/2023/09/28/language-overview-java/</loc><lastmod>2026-03-14T15:33:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/08/24/software-vs-hardware/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/08/pexels-photo-2588757.jpeg</image:loc><image:title>black and gray computer motherboard</image:title><image:caption>Photo by Valentine Tanasovich on &lt;a href="https://www.pexels.com/photo/black-and-gray-computer-motherboard-2588757/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2026-03-14T15:31:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/09/07/social-engineering-targeting-the-human-not-the-machine/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/09/pexels-photo-193003.jpeg</image:loc><image:title>black and gray digital device</image:title><image:caption>Photo by Torsten Dettlaff on &lt;a href="https://www.pexels.com/photo/black-and-gray-digital-device-193003/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2026-03-14T15:31:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2026/03/01/the-turing-test/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2026/02/pexels-photo-2599244.jpeg</image:loc><image:title>high angle photo of robot</image:title><image:caption>Photo by Alex Knight on &lt;a href="https://www.pexels.com/photo/high-angle-photo-of-robot-2599244/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2026-02-21T16:17:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2026/02/01/gift-card-scams/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2026/01/pexels-photo-35173951.jpeg</image:loc><image:title>colorful gift cards exchanged between two people</image:title><image:caption>Photo by 8pCarlos Morocho on &lt;a href="https://www.pexels.com/photo/colorful-gift-cards-exchanged-between-two-people-35173951/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2026-01-14T00:59:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2026/01/04/cloudflare/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/12/cloudflare_logo.svg_.png</image:loc><image:title>Cloudflare_Logo.svg</image:title></image:image><lastmod>2025-12-06T17:30:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2025/12/07/the-hexadecimal-number-system/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/11/pexels-photo-8014935.jpeg</image:loc><image:title>pexels-photo-8014935.jpeg</image:title><image:caption>Photo by Cup of  Couple on &lt;a href="https://www.pexels.com/photo/number-16-on-the-wall-8014935/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-11-11T01:17:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2025/11/02/ai-hallucinations-why-you-should-not-fully-trust-ai/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/10/pexels-photo-16245254.jpeg</image:loc><image:title>chatgpt a chatbot for your website</image:title><image:caption>Photo by Beyzaa Yurtkuran on &lt;a href="https://www.pexels.com/photo/chatgpt-a-chatbot-for-your-website-16245254/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-10-18T12:22:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/about-us/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/04/jbell-profile-1.png</image:loc><image:title>jbell-profile-1</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/04/jbell-profile.png</image:loc><image:title>jbell-profile</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/02/pexels-photo-3888585.jpeg</image:loc><image:title>dark clouds in the sky</image:title><image:caption>Photo by Alex Conchillos on &lt;a href="https://www.pexels.com/photo/dark-clouds-in-the-sky-3888585/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-10-18T12:11:20+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thehackerproject.org/2025/10/05/windows-10-support-ends-october-14th/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/09/pexels-photo-4567339.jpeg</image:loc><image:title>close up of a keyboard</image:title><image:caption>Photo by Nothing Ahead on &lt;a href="https://www.pexels.com/photo/close-up-of-a-keyboard-4567339/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-09-28T18:08:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2025/09/07/uptime-why-you-should-restart-your-device/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/08/pexels-photo-599705.jpeg</image:loc><image:title>pexels-photo-599705.jpeg</image:title><image:caption>Photo by Thomas Brenac on &lt;a href="https://www.pexels.com/photo/round-analog-clock-at-8-30-599705/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-08-23T15:45:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2025/08/03/networking-hardware-hubs-vs-switches/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/07/pexels-photo-442150.jpeg</image:loc><image:title>electronics engineer fixing cables on server</image:title><image:caption>Photo by Field Engineer on &lt;a href="https://www.pexels.com/photo/electronics-engineer-fixing-cables-on-server-442150/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-07-25T13:14:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2025/07/06/websites-not-loading-try-clearing-your-cache/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/06/pexels-photo-6941871.jpg</image:loc><image:title>person using macbook drinking coffee</image:title><image:caption>Photo by Firmbee.com on &lt;a href="https://www.pexels.com/photo/person-using-macbook-drinking-coffee-6941871/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-06-01T19:06:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/03/23/why-you-should-update-your-web-browser/</loc><lastmod>2025-06-01T19:01:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/12/08/malvertising-eye-catching-danger/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/12/malvertisement-image.png</image:loc><image:title>Malvertisement Image</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/12/malvertisement-example.jpg</image:loc><image:title>malvertisement-example</image:title></image:image><lastmod>2025-06-01T19:01:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/05/19/the-cia-triad-confidentiality-integrity-and-availability/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/cia-triad-image.png</image:loc><image:title>CIA Triad Image</image:title></image:image><lastmod>2025-04-16T16:03:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2025/04/06/man-in-the-middle-attacks/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/03/pexels-photo-7299488.jpeg</image:loc><image:title>photo of man listening to black headphones</image:title><image:caption>Photo by cottonbro studio on &lt;a href="https://www.pexels.com/photo/photo-of-man-listening-to-black-headphones-7299488/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-04-16T16:02:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2025/06/01/brute-force-attacks/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/04/pexels-photo-5192037.jpeg</image:loc><image:title>close up of padlock with code</image:title><image:caption>Photo by Modun Studio on &lt;a href="https://www.pexels.com/photo/close-up-of-padlock-with-code-5192037/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-04-16T15:28:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/02/24/beware-of-ransomware/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/screen-shot-2023-02-18-at-6.30.17-pm.png</image:loc><image:title>Screen Shot 2023-02-18 at 6.30.17 PM</image:title></image:image><lastmod>2025-03-12T16:00:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/06/09/dont-click-the-look-who-died-scam/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/06/look-who-died-splash.png</image:loc><image:title>Look Who Died Splash</image:title></image:image><lastmod>2025-03-12T15:59:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/02/18/worms-creepy-crawly-computer-compromisers/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/02/pexels-photo-4386491.jpeg</image:loc><image:title>red earthworm crawling on grassy soil</image:title><image:caption>Photo by Karolina Grabowska on &lt;a href="https://www.pexels.com/photo/red-earthworm-crawling-on-grassy-soil-4386491/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-03-12T15:58:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/04/07/what-is-a-virus/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/04/pexels-photo-3992933.jpeg</image:loc><image:title>coronavirus</image:title><image:caption>Photo by CDC on &lt;a href="https://www.pexels.com/photo/coronavirus-3992933/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-03-12T15:58:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/04/21/all-about-firewalls/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/04/firewall-graphic.png</image:loc><image:title>Firewall Graphic</image:title></image:image><lastmod>2025-03-12T15:57:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/05/26/how-to-stay-safe-when-using-public-wi-fi/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/pexels-photo-1307698.jpeg</image:loc><image:title>photo of cafe interior</image:title><image:caption>Photo by Igor Starkov on &lt;a href="https://www.pexels.com/photo/photo-of-cafe-interior-1307698/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-03-12T15:57:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/06/16/keyloggers-spying-on-your-keyboard/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/06/pexels-photo-373072.jpeg</image:loc><image:title>keyboard keys lot</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/keyboard-keys-lot-373072/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-03-12T15:56:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/10/06/smishing-a-text-you-should-not-answer/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/10/smishing-thumbnail.png</image:loc><image:title>Smishing Thumbnail</image:title></image:image><lastmod>2025-03-12T15:56:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2025/05/04/install-antivirus-software/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/03/security-protection-anti-virus-software-60504.jpeg</image:loc><image:title>security logo</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/security-logo-60504/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-03-12T15:53:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/10/12/google-advertises-a-passwordless-future/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/10/pexels-photo-5417844.jpeg</image:loc><image:title>iphone smartphone app i os</image:title><image:caption>Photo by Brett Jordan on &lt;a href="https://www.pexels.com/photo/iphone-smartphone-app-i-os-5417844/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/10/pexels-photo-6155000.jpeg</image:loc><image:title>close up shot of a person using a laptop</image:title><image:caption>Photo by Luca Sammarco on &lt;a href="https://www.pexels.com/photo/close-up-shot-of-a-person-using-a-laptop-6155000/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-03-05T16:05:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2025/03/02/all-about-trojan-horses/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/02/pexels-photo-9711427.jpeg</image:loc><image:title>trojan horse replica at the museum canakkale turkey</image:title><image:caption>Photo by Salih X on &lt;a href="https://www.pexels.com/photo/trojan-horse-replica-at-the-museum-canakkale-turkey-9711427/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-02-17T15:54:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/12/01/what-is-shoulder-surfing/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/12/pexels-photo-3966815.jpeg</image:loc><image:title>positive multiracial couple using laptop in decorated room</image:title><image:caption>Photo by Andrea Piacquadio on &lt;a href="https://www.pexels.com/photo/positive-multiracial-couple-using-laptop-in-decorated-room-3966815/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/11/pexels-photo-853151.jpeg</image:loc><image:title>man in red long sleeved shirt</image:title><image:caption>Photo by Andrea Piacquadio on &lt;a href="https://www.pexels.com/photo/man-in-red-long-sleeved-shirt-853151/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-01-29T16:22:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2025/02/16/put-a-privacy-screen-filter-on-your-device/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/01/pexels-photo-7742507.jpeg</image:loc><image:title>hand holding tempered glass</image:title><image:caption>Photo by Rann Vijay on &lt;a href="https://www.pexels.com/photo/hand-holding-tempered-glass-7742507/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-01-29T16:18:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2025/02/02/cover-your-webcam/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/01/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivchg3mjaxndctaw1hz2uta3d5b3exmxcuanbn.webp</image:loc><image:title>cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivchg3mjaxndctaw1hz2uta3d5b3exmxcuanbn</image:title></image:image><lastmod>2025-01-24T15:38:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/09/21/dont-plug-in-mysterious-usb-drives/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/09/pexels-photo-4318581.jpeg</image:loc><image:title>unrecognizable person showing usb on blurred background</image:title><image:caption>Photo by Kei Scampa on &lt;a href="https://www.pexels.com/photo/unrecognizable-person-showing-usb-on-blurred-background-4318581/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-01-20T15:13:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2025/01/05/how-to-navigate-the-linux-filesystem-via-command-line/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/01/pexels-photo-207580.jpeg</image:loc><image:title>computer codes</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/computer-codes-207580/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/01/pexels-photo-3803517.jpeg</image:loc><image:title>web banner with online information on computer</image:title><image:caption>Photo by Brett Sayles on &lt;a href="https://www.pexels.com/photo/web-banner-with-online-information-on-computer-3803517/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-01-15T17:18:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2025/01/19/file-permisions-in-linux/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2025/01/linux-file-permissions-image.png</image:loc><image:title>Linux File Permissions Image</image:title></image:image><lastmod>2025-01-15T17:14:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/10/20/when-should-you-change-your-password/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/10/pexels-photo-174938.jpeg</image:loc><image:title>person holding phone while logging in on instagram application</image:title><image:caption>Photo by energepic.com on &lt;a href="https://www.pexels.com/photo/person-holding-phone-while-logging-in-on-instagram-application-174938/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-12-11T17:53:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/11/03/language-overview-python/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/11/python-thumbnail.png</image:loc><image:title>Python Thumbnail</image:title></image:image><lastmod>2024-12-11T17:52:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/05/12/language-overview-html/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/image05.png</image:loc><image:title>image05</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/image04-1.png</image:loc><image:title>image04-1</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/image03.png</image:loc><image:title>image03</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/image04.png</image:loc><image:title>image04</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/image02.png</image:loc><image:title>image02</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/image01-1.png</image:loc><image:title>image01-1</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/image01.png</image:loc><image:title>image01</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/html5_logo_and_wordmark.png</image:loc><image:title>html5_logo_and_wordmark</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/html-image.png</image:loc><image:title>HTML Image</image:title></image:image><lastmod>2024-12-11T17:51:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/12/15/tailgating-more-than-a-pregame-party/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/12/pexels-photo-9461777.jpeg</image:loc><image:title>two people standing in front of a door</image:title><image:caption>Photo by Mike Jones on &lt;a href="https://www.pexels.com/photo/two-people-standing-in-front-of-a-door-9461777/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-12-11T17:29:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/11/17/comment-your-code/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/11/pexels-photo-546819.jpeg</image:loc><image:title>close up photo of programming of codes</image:title><image:caption>Photo by luis gomes on &lt;a href="https://www.pexels.com/photo/close-up-photo-of-programming-of-codes-546819/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-11-13T16:16:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/09/01/the-principle-of-least-privilege/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/08/play-stone-network-networked-interactive-163064.jpeg</image:loc><image:title>close up photography of yellow green red and brown plastic cones on white lined surface</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/close-up-photography-of-yellow-green-red-and-brown-plastic-cones-on-white-lined-surface-163064/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-09-12T17:01:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/09/15/zero-trust-network-access/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/09/pexels-photo-5926397.jpeg</image:loc><image:title>crop unrecognizable man using laptop in darkness</image:title><image:caption>Photo by Sora Shimazaki on &lt;a href="https://www.pexels.com/photo/crop-unrecognizable-man-using-laptop-in-darkness-5926397/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-09-12T17:01:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/08/18/try-rubber-duck-debugging/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/08/pexels-photo-12111917.jpeg</image:loc><image:title>yellow rubber duck by a swimming pool</image:title><image:caption>Photo by Magda Ehlers on &lt;a href="https://www.pexels.com/photo/yellow-rubber-duck-by-a-swimming-pool-12111917/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-08-12T14:21:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/08/04/crowdstrike-what-happened-lessons-learned/</loc><lastmod>2024-08-02T15:01:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/07/21/need-to-delay-an-email-use-schedule-send/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/06/pexels-photo-4491443.jpeg</image:loc><image:title>focused female employee reading information on computer in office</image:title><image:caption>Photo by Karolina Kaboompics on &lt;a href="https://www.pexels.com/photo/focused-female-employee-reading-information-on-computer-in-office-4491443/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/06/schedule-2.png</image:loc><image:title>Schedule 2</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/06/schedule-1.png</image:loc><image:title>Schedule 1</image:title></image:image><lastmod>2024-07-03T14:47:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/07/07/what-are-hdd-and-ssd/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/06/disc-reader-reading-arm-hard-drive.jpg</image:loc><image:title>silver hard drive interals</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/silver-hard-drive-interals-33278/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-06-29T15:59:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/06/30/lock-your-computer-before-leaving-your-desk/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/06/pexels-photo-4973899.jpeg</image:loc><image:title>a laptop over a round table</image:title><image:caption>Photo by Dan  Nelson on &lt;a href="https://www.pexels.com/photo/a-laptop-over-a-round-table-4973899/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/06/lockscreen-image02.png</image:loc><image:title>Lockscreen Image02</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/06/lockscreen-image01.png</image:loc><image:title>Lockscreen Image01</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/06/lockscreen-image03.png</image:loc><image:title>Lockscreen Image03</image:title></image:image><lastmod>2024-06-23T14:54:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/06/23/mcdonalds-ends-use-of-ai-in-drive-through-ordering/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/06/pexels-photo-1858115.jpeg</image:loc><image:title>mcdonald drive thru road signage</image:title><image:caption>Photo by Caroline Cagnin on &lt;a href="https://www.pexels.com/photo/mcdonald-drive-thru-road-signage-1858115/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-06-21T14:20:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/06/09/give-me-more-wearable-tech-not-tech-implants/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/pexels-photo-110471.jpeg</image:loc><image:title>space gray aluminum case white sport band strap apple watch</image:title><image:caption>Photo by energepic.com on &lt;a href="https://www.pexels.com/photo/space-gray-aluminum-case-white-sport-band-strap-apple-watch-110471/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/pexels-photo-267394.jpeg</image:loc><image:title>person wearing white silicone strap black smartwatch</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/person-wearing-white-silicone-strap-black-smartwatch-267394/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/pexels-photo-4436303.jpeg</image:loc><image:title>crop faceless person showing smart watch while using smartphone outdoors</image:title><image:caption>Photo by Ketut Subiyanto on &lt;a href="https://www.pexels.com/photo/crop-faceless-person-showing-smart-watch-while-using-smartphone-outdoors-4436303/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-06-12T18:25:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/06/02/try-using-do-not-disturb-to-maintain-focus/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/05/pexels-photo-8296048.jpeg</image:loc><image:title>a white and black text box</image:title><image:caption>Photo by Nothing Ahead on &lt;a href="https://www.pexels.com/photo/a-white-and-black-text-box-8296048/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-05-24T14:56:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/05/05/fcc-fines-wireless-data-carriers-sprint-t-mobile-att-and-verizon/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/04/pexels-photo-3483098.jpeg</image:loc><image:title>pexels-photo-3483098.jpeg</image:title><image:caption>Photo by John Guccione www.advergroup.com on &lt;a href="https://www.pexels.com/photo/100-us-dollar-banknotes-3483098/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-05-18T01:46:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2022/08/29/how-to-spot-a-phishing-email/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-013.png</image:loc><image:title>phishingemail-image-013</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-012.png</image:loc><image:title>phishingemail-image-012</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-011.png</image:loc><image:title>phishingemail-image-011</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-010.png</image:loc><image:title>phishingemail-image-010</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-09.png</image:loc><image:title>phishingemail-image-09</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-08.png</image:loc><image:title>phishingemail-image-08</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-07.png</image:loc><image:title>phishingemail-image-07</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-06.png</image:loc><image:title>phishingemail-image-06</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-05-1.png</image:loc><image:title>PhishingEmail Image 05</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-05.png</image:loc><image:title>phishingemail-image-05</image:title></image:image><lastmod>2024-05-02T19:39:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/04/14/are-blue-light-glasses-effective/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/04/pexels-photo-975668.jpeg</image:loc><image:title>selective focus photography of pink and black framed eyeglasses</image:title><image:caption>Photo by Designecologist on &lt;a href="https://www.pexels.com/photo/selective-focus-photography-of-pink-and-black-framed-eyeglasses-975668/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-05-01T00:21:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/04/28/how-to-filter-out-irrelevant-search-results/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/04/search-result-filtering-image-01.png</image:loc><image:title>Search Result FIltering Image 01</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/04/pexels-photo-1174775.jpeg</image:loc><image:title>person typing on laptop</image:title><image:caption>Photo by EVG Kowalievska on &lt;a href="https://www.pexels.com/photo/person-typing-on-laptop-1174775/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/04/office-freelancer-computer-business-38547.jpeg</image:loc><image:title>person using macbook air</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/person-using-macbook-air-38547/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-04-15T16:04:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/03/31/an-unexpected-surprise-the-first-easter-egg/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/03/easter-eggs-01.png</image:loc><image:title>easter-eggs-01</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/03/pexels-photo-4108576.jpeg</image:loc><image:title>person holding a woven basket with easter eggs</image:title><image:caption>Photo by Polina Zimmerman on &lt;a href="https://www.pexels.com/photo/person-holding-a-woven-basket-with-easter-eggs-4108576/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-03-31T14:24:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/03/26/creating-a-strong-password/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/03/pexels-photo-2882630.jpeg</image:loc><image:title>close up shot of keyboard buttons</image:title><image:caption>Photo by Miguel u00c1. Padriu00f1u00e1n on &lt;a href="https://www.pexels.com/photo/close-up-shot-of-keyboard-buttons-2882630/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-04-04T23:46:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/03/24/memory-saver-energy-saver-and-preloading-features-in-google-chrome/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/03/pexels-photo-7350921.jpeg</image:loc><image:title>a person using google website on a laptop</image:title><image:caption>Photo by cottonbro studio on &lt;a href="https://www.pexels.com/photo/a-person-using-google-website-on-a-laptop-7350921/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/03/chrome-resources-06.png</image:loc><image:title>chrome-resources-06</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/03/chrome-resources-05.png</image:loc><image:title>chrome-resources-05</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/03/chrome-resources-04.png</image:loc><image:title>chrome-resources-04</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/03/chrome-resources-03.png</image:loc><image:title>chrome-resources-03</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/03/chrome-resources-02.png</image:loc><image:title>chrome-resources-02</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/03/chrome-resources-01.png</image:loc><image:title>Chrome Resources 01</image:title></image:image><lastmod>2024-03-21T21:40:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/03/17/xais-grok-to-become-open-source/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/03/grokarticleimage-1.png</image:loc><image:title>GrokArticleImage</image:title></image:image><lastmod>2024-03-12T16:08:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/03/10/the-history-of-3d-printing/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/03/pexels-photo-19746343.jpeg</image:loc><image:title>pexels-photo-19746343.jpeg</image:title><image:caption>Photo by Jakub Zerdzicki on &lt;a href="https://www.pexels.com/photo/3d-printer-home-lab-19746343/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-03-06T16:16:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/03/03/be-cautious-with-qr-codes/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/03/scan.png</image:loc><image:title>Scan</image:title></image:image><lastmod>2024-03-05T17:34:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/01/31/remove-yourself-from-searches-with-googles-results-about-you-tool/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/01/pexels-photo-16629436.jpeg</image:loc><image:title>pexels-photo-16629436.jpeg</image:title><image:caption>Photo by Sanket  Mishra on &lt;a href="https://www.pexels.com/photo/men-typing-in-the-google-search-engine-from-realme-6-pro-google-is-the-number-one-search-web-16629436/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/01/bing-crosby-search-menu.png</image:loc><image:title>bing-crosby-search-menu</image:title></image:image><lastmod>2024-03-05T17:34:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/01/09/think-before-you-post/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/01/pexels-photo-936082.jpeg</image:loc><image:title>grayscale photo of woman wearing v neck t shirt sitting in front of hp laptop on desk</image:title><image:caption>Photo by nappy on &lt;a href="https://www.pexels.com/photo/grayscale-photo-of-woman-wearing-v-neck-t-shirt-sitting-in-front-of-hp-laptop-on-desk-936082/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-03-05T17:34:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/11/14/how-to-enable-focus-mode-on-microsoft-word/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/11/screen-shot-2023-11-14-at-4.49.10-pm.png</image:loc><image:title>screen-shot-2023-11-14-at-4.49.10-pm</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/11/screen-shot-2023-11-14-at-4.48.22-pm.png</image:loc><image:title>screen-shot-2023-11-14-at-4.48.22-pm</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/11/screen-shot-2023-11-14-at-4.47.48-pm.png</image:loc><image:title>screen-shot-2023-11-14-at-4.47.48-pm</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/11/screen-shot-2023-11-14-at-4.47.15-pm.png</image:loc><image:title>screen-shot-2023-11-14-at-4.47.15-pm</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/11/screen-shot-2023-11-14-at-4.46.40-pm.png</image:loc><image:title>screen-shot-2023-11-14-at-4.46.40-pm</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/11/screen-shot-2023-11-14-at-4.46.16-pm.png</image:loc><image:title>screen-shot-2023-11-14-at-4.46.16-pm</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/11/screen-shot-2023-11-14-at-4.45.24-pm.png</image:loc><image:title>screen-shot-2023-11-14-at-4.45.24-pm</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/11/screen-shot-2023-11-14-at-4.44.32-pm-1.png</image:loc><image:title>screen-shot-2023-11-14-at-4.44.32-pm-1</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/11/screen-shot-2023-11-14-at-4.44.32-pm.png</image:loc><image:title>screen-shot-2023-11-14-at-4.44.32-pm</image:title></image:image><lastmod>2024-03-05T17:34:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/07/09/why-you-shouldnt-let-your-browser-save-your-passwords/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/07/password-in-browser-image.png</image:loc><image:title>Password In Browser Image</image:title></image:image><lastmod>2024-03-05T17:34:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/02/09/mental-health-in-the-tech-field/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/05/pexels-photo-2821823.jpeg</image:loc><image:title>pexels-photo-2821823</image:title></image:image><lastmod>2024-03-05T17:33:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2022/11/26/right-clicking-on-a-macbook-trackpad/</loc><lastmod>2024-03-05T17:33:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2022/09/09/how-to-spot-a-phishing-email-part-2/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-028.png</image:loc><image:title>phishingemail-image-028</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-027.png</image:loc><image:title>phishingemail-image-027</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-026.png</image:loc><image:title>phishingemail-image-026</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-025.png</image:loc><image:title>phishingemail-image-025</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-024.png</image:loc><image:title>phishingemail-image-024</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-023.png</image:loc><image:title>phishingemail-image-023</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-022.png</image:loc><image:title>phishingemail-image-022</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-021.png</image:loc><image:title>phishingemail-image-021</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-020.png</image:loc><image:title>phishingemail-image-020</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/phishingemail-image-019.png</image:loc><image:title>phishingemail-image-019</image:title></image:image><lastmod>2024-03-05T17:33:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/02/25/will-books-ever-be-replaced-by-technology/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/02/books-book-pages-read-literature-159866.jpeg</image:loc><image:title>pile of books</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/pile-of-books-159866/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-03-05T17:32:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/11/08/when-should-an-ai-be-considered-for-human-rights/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/11/pexels-photo-8438979.jpeg</image:loc><image:title>a robot holding a flower</image:title><image:caption>Photo by Pavel Danilyuk on &lt;a href="https://www.pexels.com/photo/a-robot-holding-a-flower-8438979/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-03-05T17:32:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/04/13/will-ai-take-over-the-world/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/05/pexels-photo-6153354.jpeg</image:loc><image:title>bionic hand and human hand finger pointing</image:title><image:caption>Photo by cottonbro studio on &lt;a href="https://www.pexels.com/photo/bionic-hand-and-human-hand-finger-pointing-6153354/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-03-05T17:32:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/02/11/apple-release-apple-vision-pro/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/02/apple-vision-pro.png</image:loc><image:title>apple-vision-pro</image:title></image:image><lastmod>2024-03-05T17:32:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/11/28/google-to-begin-deleting-inactive-accounts-starting-december-1st/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/11/pexels-photo-67112.jpeg</image:loc><image:title>macbook air on grey wooden table</image:title><image:caption>Photo by Caio on &lt;a href="https://www.pexels.com/photo/macbook-air-on-grey-wooden-table-67112/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-03-05T17:32:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/10/21/glaze-a-new-software-to-protect-digital-art-from-ai/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/10/glaze-thumbnail.png</image:loc><image:title>Glaze Thumbnail</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/10/dali.jpg</image:loc><image:title>dali</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/10/picasso.jpg</image:loc><image:title>picasso</image:title></image:image><lastmod>2024-03-05T17:32:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/10/04/fema-to-test-national-alert-systems-today/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/10/pexels-photo-4350099.jpeg</image:loc><image:title>black woman messaging on modern cellphone</image:title><image:caption>Photo by Ketut Subiyanto on &lt;a href="https://www.pexels.com/photo/black-woman-messaging-on-modern-cellphone-4350099/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-03-05T17:31:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/05/18/google-begins-selling-zip-domains/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/05/screen-shot-2023-05-18-at-11.48.04-am.png</image:loc><image:title>Screen Shot 2023-05-18 at 11.48.04 AM</image:title></image:image><lastmod>2024-03-05T17:31:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/02/15/microsoft-disables-internet-explorer/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/05/ieshutdownimage.png</image:loc><image:title>IEShutdownImage</image:title></image:image><lastmod>2024-03-05T17:31:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2022/12/18/tiktok-banned-on-u-s-government-devices/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/05/tiktok-ban-splash-image.jpeg</image:loc><image:title>TikTok Ban Splash Image</image:title></image:image><lastmod>2024-03-05T17:31:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2022/10/31/jpmorgan-chase-allegedly-hacked-by-killnet/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/05/jpmorgan-chase-splash.jpg</image:loc><image:title>JPMorgan Chase Splash</image:title></image:image><lastmod>2024-03-05T17:31:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2022/03/02/anonymous-stands-with-ukraine-with-operation-russia/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/tweet-3-taken-2022-03-02-at-3.25.01-pm.png</image:loc><image:title>tweet-3-taken-2022-03-02-at-3.25.01-pm</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/tweet-2-taken-2022-03-02-at-3.27.16-pm.png</image:loc><image:title>tweet-2-taken-2022-03-02-at-3.27.16-pm</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/tweet-1-taken-2022-03-02-at-3.23.52-pm.png</image:loc><image:title>tweet-1-taken-2022-03-02-at-3.23.52-pm</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/anonrussia001-splash-copy.png</image:loc><image:title>AnonRussia001 Splash copy</image:title></image:image><lastmod>2024-03-05T17:31:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2022/09/12/pig-butchering-what-is-it/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/05/splash-image.jpeg</image:loc><image:title>Splash Image</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/05/message-example-image.png</image:loc><image:title>message-example-image</image:title></image:image><lastmod>2024-03-05T16:17:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2022/10/03/multi-factor-authentication/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/05/mfa-picture.jpeg</image:loc><image:title>MFA Picture</image:title></image:image><lastmod>2024-03-05T16:17:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2022/10/11/what-is-the-metaverse/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/05/decentraland-01.png</image:loc><image:title>decentraland-01</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/05/decentraland-02.png</image:loc><image:title>decentraland-02</image:title></image:image><lastmod>2024-03-05T16:17:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2022/11/11/nfts-explained/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/05/nft-splash.png</image:loc><image:title>NFT Splash</image:title></image:image><lastmod>2024-03-05T16:17:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/01/28/yet-another-article-yo/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/artificial-intelligence-generated-artwork.png</image:loc><image:title>artificial intelligence generated artwork</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/george-washington.png</image:loc><image:title>george-washington</image:title></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/04/a-bowl-of-tomato-soup-sitting-on-a-countertop.png</image:loc><image:title>a-bowl-of-tomato-soup-sitting-on-a-countertop</image:title></image:image><lastmod>2024-03-05T16:16:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/08/29/passwords-does-length-or-complexity-matter-more/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/08/censorship-limitations-freedom-of-expression-restricted-39584.jpeg</image:loc><image:title>black android smartphone on top of white book</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/black-android-smartphone-on-top-of-white-book-39584/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-03-05T16:15:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/10/30/operating-systems-the-basics/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/10/chjpdmf0zs9sci9pbwfnzxmvd2vic2l0zs8ymdiylta0l2zsnduxnzkxnzg4mtitaw1hz2uta3a0dnljegcuanbn.jpg</image:loc><image:title>Motherboard. Original public domain image</image:title><image:caption>&lt;a href="https://www.rawpixel.com/image/3322320/free-photo-image-motherboard-cc0-chip" rel="nofollow"&gt;Motherboard. Original public domain image&lt;/a&gt; by &lt;a href="" rel="nofollow"&gt;U.S. Department of Energy&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/publicdomain/zero/1.0/" rel="nofollow"&gt;CC-CC0 1.0&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/10/pexels-photo-6446709.jpeg</image:loc><image:title>laptop with blank screen placed on table</image:title><image:caption>Photo by karina zhukovskaya on &lt;a href="https://www.pexels.com/photo/laptop-with-blank-screen-placed-on-table-6446709/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-03-05T16:14:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2023/12/13/the-binary-number-system/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2023/12/pexels-photo-5474031.jpeg</image:loc><image:title>man with binary code projected on his face</image:title><image:caption>Photo by cottonbro studio on &lt;a href="https://www.pexels.com/photo/man-with-binary-code-projected-on-his-face-5474031/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-03-05T16:13:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/2024/01/27/how-does-3d-printing-work/</loc><image:image><image:loc>https://thehackerproject.org/wp-content/uploads/2024/01/pexels-photo-19124461.jpeg</image:loc><image:title>pexels-photo-19124461.jpeg</image:title><image:caption>Photo by Jakub Zerdzicki on &lt;a href="https://www.pexels.com/photo/3d-printing-tools-19124461/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-03-05T16:12:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thehackerproject.org/student-resources/</loc><lastmod>2023-12-11T16:45:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thehackerproject.org</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-14T15:33:37+00:00</lastmod></url></urlset>
