<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://networklogician.com/2026/03/02/beware-the-wifi-mule-a-new-apt-tactic/</loc><image:image><image:loc>https://networklogician.com/wp-content/uploads/2026/03/mule.png</image:loc><image:title>mule</image:title></image:image><lastmod>2026-03-02T18:22:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2025/08/21/nirig99-north-koreas-iot-ot-hackers/</loc><image:image><image:loc>https://networklogician.com/wp-content/uploads/2025/08/dragon99.png</image:loc><image:title>dragon99</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2025/08/black-and-white-chinese-dragon.png</image:loc><image:title>black-and-white-chinese-dragon</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2025/08/dragon.png</image:loc><image:title>dragon</image:title></image:image><lastmod>2025-08-21T22:11:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2024/01/27/firepower-access-control-policy-not-blocking-vpn-connections/</loc><image:image><image:loc>https://networklogician.com/wp-content/uploads/2024/01/ftd6.png</image:loc><image:title>ftd6</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2024/01/ftd5.png</image:loc><image:title>ftd5</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2024/01/ftd4.png</image:loc><image:title>ftd4</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2024/01/ftd3.png</image:loc><image:title>ftd3</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2024/01/ftd2.png</image:loc><image:title>ftd2</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2024/01/ftd1.png</image:loc><image:title>ftd1</image:title></image:image><lastmod>2024-01-27T23:41:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2024/01/12/sy0-701-objectives-reference-guide/</loc><lastmod>2024-01-13T03:12:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2023/12/24/understanding-right-to-left-override-attack/</loc><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/12/r9.png</image:loc><image:title>r9</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/12/r8.png</image:loc><image:title>r8</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/12/r7.png</image:loc><image:title>r7</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/12/r6.png</image:loc><image:title>r6</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/12/r5.png</image:loc><image:title>r5</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/12/r4.png</image:loc><image:title>r4</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/12/r3.png</image:loc><image:title>r3</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/12/r2.png</image:loc><image:title>r2</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/12/r1.png</image:loc><image:title>r1</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/12/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivchg2nde0ndmtaw1hz2uta3d2egx6ogwuanbn.jpg</image:loc><image:title>Free masquerade mask image</image:title></image:image><lastmod>2023-12-25T02:33:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2023/09/07/security-sy0-701-acronym-list/</loc><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/09/seccomp.png</image:loc><image:title>seccomp</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/09/list.png</image:loc><image:title>list</image:title></image:image><lastmod>2023-09-07T20:25:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2023/08/22/configuracion-de-un-directorio-sftp-en-chroot/</loc><lastmod>2023-08-23T01:01:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2023/08/21/setting-up-a-chrooted-sftp-directory/</loc><lastmod>2023-08-23T00:47:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2022/09/07/top-10-indicators-of-corporate-fraud/</loc><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/03/auditreport.png</image:loc><image:title>auditreport</image:title></image:image><lastmod>2023-03-26T19:53:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2023/01/24/certificate-transparency-logs/</loc><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/02/logging.png</image:loc><image:title>logging</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2023/02/324238_255ad51b.jpg</image:loc><image:title>Logging and road</image:title><image:caption>&lt;a href="https://www.geograph.org.uk/photo/324238" rel="nofollow"&gt;Logging and road&lt;/a&gt; by &lt;a href="https://geograph.org.uk/profile/196" rel="nofollow"&gt;Richard Webb&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/licenses/by-sa/2.0/" rel="nofollow"&gt;CC-BY-SA 2.0&lt;/a&gt;</image:caption></image:image><lastmod>2023-03-01T02:53:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/04/17/sniffing-ssh-passwords/</loc><lastmod>2023-02-26T20:27:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2022/01/05/best-practices-for-etc-sudoers/</loc><lastmod>2022-12-17T14:56:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/06/14/fiber-factoids-part-1-a-primer-on-common-fiber-optic-cable-types/</loc><lastmod>2021-06-15T02:43:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/05/26/what-is-a-null-route-and-why-do-i-need-one/</loc><lastmod>2021-05-27T04:10:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/05/09/firepower-dns-sinkhole/</loc><lastmod>2021-05-16T19:51:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/05/01/basic-dhcp-setup/</loc><lastmod>2021-05-09T16:16:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/04/24/unboxing-and-initial-setup-of-meraki-mx-security-appliance/</loc><lastmod>2021-04-25T13:19:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/04/24/aide-file-integrity-monitoring/</loc><lastmod>2021-04-25T13:18:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/03/28/linux-lab-access-control-lists/</loc><lastmod>2021-04-17T19:43:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/04/11/disable-null-passwords/</loc><lastmod>2021-04-12T13:33:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/04/04/configuring-snmpv3-in-linux/</loc><lastmod>2021-04-04T20:57:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/03/06/log-powershell-commands/</loc><lastmod>2021-03-26T19:21:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/03/20/rhel-8-and-chrony-part-2/</loc><lastmod>2021-03-23T14:16:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/03/21/rhel-8-and-chrony-part-3/</loc><lastmod>2021-03-22T04:29:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/03/19/rhel-8-and-chrony-part-1/</loc><lastmod>2021-03-21T01:25:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/03/14/add-a-swap-file-to-rhel-8/</loc><lastmod>2021-03-20T15:47:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2013/09/19/gpg-lab/</loc><image:image><image:loc>https://networklogician.com/wp-content/uploads/2021/02/f5bbd-e2.png</image:loc><image:title>e2</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2021/02/73605-e1.png</image:loc><image:title>e1</image:title></image:image><lastmod>2021-03-08T00:47:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2021/03/07/blacklist-an-ip-in-firepower/</loc><image:image><image:loc>https://networklogician.com/wp-content/uploads/2021/03/firepower.png</image:loc><image:title>firepower</image:title></image:image><lastmod>2021-03-08T00:41:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/quick-tips/</loc><lastmod>2021-03-07T23:43:17+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://networklogician.com/about-2/</loc><lastmod>2021-03-06T23:33:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://networklogician.com/2014/01/15/amazon-web-services-rhel-6-4-setup/</loc><image:image><image:loc>https://networklogician.com/wp-content/uploads/2021/02/09d9e-aws61.png</image:loc><image:title>aws6</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2021/02/bf3c9-aws-8.png</image:loc><image:title>aws-8</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2021/02/0c42d-aws-7.png</image:loc><image:title>aws-7</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2021/02/eb658-aws-6.png</image:loc><image:title>aws-6</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2021/02/88814-aws-5.png</image:loc><image:title>aws-5</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2021/02/39ca5-aws-4.png</image:loc><image:title>aws-4</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2021/02/37f2c-aws-3.png</image:loc><image:title>aws-3</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2021/02/11b1f-aws17.png</image:loc><image:title>aws17</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2021/02/1a2d7-aws-2.png</image:loc><image:title>aws-2</image:title></image:image><image:image><image:loc>https://networklogician.com/wp-content/uploads/2021/02/67128-aws15.png</image:loc><image:title>aws15</image:title></image:image><lastmod>2021-03-04T20:40:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/virtualization/</loc><lastmod>2021-03-04T20:37:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://networklogician.com/security/</loc><lastmod>2021-03-04T20:00:31+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://networklogician.com/contact/</loc><lastmod>2021-03-04T19:50:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://networklogician.com/2014/03/16/cfengine-part-1/</loc><lastmod>2021-03-02T22:54:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2014/05/12/logging-into-a-linux-shell-from-a-cisco-asr1000-series-router/</loc><image:image><image:loc>https://networklogician.com/wp-content/uploads/2014/05/asr.png</image:loc><image:title>asr</image:title></image:image><lastmod>2021-03-02T22:46:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/home/</loc><lastmod>2021-02-28T21:02:34+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://networklogician.com/2014/02/03/setting-up-a-site-to-site-vpn-between-cisco-asas-using-the-cli/</loc><image:image><image:loc>https://networklogician.com/wp-content/uploads/2021/02/35053-site-to-site1.jpeg</image:loc><image:title>site to site</image:title></image:image><lastmod>2014-02-03T06:14:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2014/01/31/a-brief-overview-of-nat-network-address-translation/</loc><lastmod>2014-01-31T06:07:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2014/01/30/how-to-mount-and-iso-image-in-solaris-and-linux/</loc><lastmod>2014-01-30T05:03:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2014/01/06/how-to-sub-delegate-reverse-dns-records-part-2/</loc><lastmod>2014-01-06T15:30:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2013/12/31/a-brief-introduction-to-sql-using-mysql-lab/</loc><lastmod>2014-01-03T18:42:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2013/12/08/an-introduction-to-bgp-border-gateway-protoco/</loc><lastmod>2013-12-08T22:45:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2013/11/27/how-to-sub-delegate-reverse-dns-records-part-1/</loc><lastmod>2013-11-27T02:07:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2013/11/21/cracking-cisco-type-7-passwords-by-hand/</loc><lastmod>2013-11-21T20:58:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2013/11/01/basic-cisco-asa-firewall-setup/</loc><lastmod>2013-11-01T05:36:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2013/10/31/how-to-setup-a-tftp-server-under-centosrhel-6/</loc><lastmod>2015-04-27T21:14:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2013/09/24/ipfilter-and-ipv6/</loc><lastmod>2013-09-24T18:35:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2013/09/20/cisco-archive-command/</loc><lastmod>2013-09-20T20:53:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/2013/09/17/books-september-list/</loc><lastmod>2013-09-17T15:13:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://networklogician.com/labs/</loc><lastmod>2013-09-17T02:35:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://networklogician.com/networks/</loc><lastmod>2013-09-17T02:34:50+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://networklogician.com/systems/</loc><lastmod>2013-09-17T02:33:34+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://networklogician.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-02T18:22:11+00:00</lastmod></url></urlset>
