<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://tomsitcafe.com/2026/03/27/run-your-own-irc-server/</loc><lastmod>2026-04-03T16:45:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2026/04/03/build-a-modular-irc-server-in-2026-inspircd-anope/</loc><lastmod>2026-04-02T07:21:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2026/03/31/toms-it-cafe-irc-network/</loc><lastmod>2026-03-31T11:22:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2026/03/20/the-operators-wsl-bible/</loc><lastmod>2026-03-17T13:58:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2026/02/27/gitea-ansible-installer-role/</loc><lastmod>2026-03-17T12:35:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2026/03/13/the-operators-luks-bible/</loc><lastmod>2026-03-14T15:10:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2026/03/06/the-operators-kvm-bible/</loc><lastmod>2026-03-05T09:36:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2026/02/20/gitea-your-self-hosted-git-platform/</loc><lastmod>2026-02-19T05:25:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/about/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/04/cyberghost_green_viking01.jpeg</image:loc><image:title>cyberghost_green_viking01</image:title></image:image><lastmod>2026-02-12T11:55:01+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tomsitcafe.com/2026/02/13/the-ci-cd-of-the-small-business-world/</loc><lastmod>2026-02-04T18:33:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2026/02/06/borg-backup-encrypt-and-deduplicate-your-data/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2026/01/cyber-viking-04.jpeg</image:loc><image:title>cyber-viking-04</image:title></image:image><lastmod>2026-01-26T12:47:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2026/01/30/wireguard-secret-path-in-the-shades/</loc><lastmod>2026-01-26T12:22:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/12/04/solo-development-doesnt-need-corporate-git-workflows/</loc><lastmod>2026-01-17T09:54:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/12/09/gpg-basics-simple-safe-encryption-for-everyday-it-work/</loc><lastmod>2026-01-17T09:54:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2026/01/21/ai-agents-the-new-corporate-security-holes/</loc><lastmod>2026-01-15T13:50:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2026/01/07/how-to-avoid-and-detect-phishing-in-2026/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2026/01/post-apocalipse-dc-2.jpeg</image:loc><image:title>post-apocalipse-dc-2</image:title></image:image><lastmod>2026-01-15T13:50:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2026/01/14/suspend-then-hibernate-with-luks-and-lvm-a-practical-setup/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2026/01/cyber-viking-09.jpeg</image:loc><image:title>cyber-viking-09</image:title></image:image><lastmod>2026-01-15T13:14:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/02/13/tor-hidden-services-privacy-on-the-internet-and-dark-things/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2024/02/pexels-realtoughcandycom-11035356.jpg</image:loc><image:title>pexels-realtoughcandycom-11035356</image:title></image:image><lastmod>2026-01-15T13:12:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/02/16/tor-hidden-services-preparing-for-reaching-the-hidden-area/</loc><lastmod>2026-01-15T13:12:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/02/20/tor-hidden-services-reaching-the-first-entry-point/</loc><lastmod>2026-01-15T13:12:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/12/07/how-to-set-up-and-host-a-chat-on-the-dark-web/</loc><lastmod>2026-01-15T13:11:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/19/the-dark-web-myths-realities-and-how-its-shaping-the-future-of-cybersecurity/</loc><lastmod>2026-01-15T13:11:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/05/%e2%9b%88%ef%b8%8f-ditching-the-cloud-running-syncthing-like-a-ghost/</loc><lastmod>2026-01-15T13:11:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/14/syncthing-the-silent-synchronicity-in-the-shadows/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/04/cyber_viking_04.jpeg</image:loc><image:title>cyber_viking_04</image:title></image:image><lastmod>2026-01-15T13:11:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/15/the-android-phone-three-opsec-levels-to-disappear-into-the-shadows/</loc><lastmod>2026-01-15T13:11:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/16/automating-ufw-configuration-with-ansible-locking-down-the-digital-fortress/</loc><lastmod>2026-01-15T13:11:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/19/%f0%9f%a7%ac-ghostwritten-infrastructure-from-org-mode-to-hardened-yaml/</loc><lastmod>2026-01-15T13:11:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/23/%f0%9f%94%90-vault-minimal-when-the-system-whispers-we-harden/</loc><lastmod>2026-01-15T13:11:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/24/%f0%9f%9b%a1%ef%b8%8f-deadswitch-vault-minimal-pack-goes-open-source/</loc><lastmod>2026-01-15T13:11:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/25/%f0%9f%9b%a0-forged-in-fire-why-ansible-speaks-the-deadswitch-language/</loc><lastmod>2026-01-15T13:11:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/28/deadswitch-toolset-structured-shadows-in-emacs/</loc><lastmod>2026-01-15T13:11:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/06/02/emacs-org-mode-as-the-ansible-control-tower/</loc><lastmod>2026-01-15T13:10:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/06/06/org-mode-the-silent-blade-for-writers/</loc><lastmod>2026-01-15T13:10:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/06/11/emacs-the-editor-that-fights-back/</loc><lastmod>2026-01-15T13:10:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/06/16/ansible-automation-for-ghosts-semaphore-ui/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/06/forest_hacking_04.jpeg</image:loc><image:title>forest_hacking_04</image:title></image:image><lastmod>2026-01-15T13:10:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/06/18/password-management-for-ghosts-passbolt/</loc><lastmod>2026-01-15T13:10:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/06/25/coding-like-a-ghost-self-documenting-code-in-one-window/</loc><lastmod>2026-01-15T13:10:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/06/27/lightweight-password-vault-of-the-ghosts-vaultwarden/</loc><lastmod>2026-01-15T13:10:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/06/30/common-lisp-the-silent-weapon-that-still-cuts/</loc><lastmod>2026-01-15T13:10:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/07/07/scanning-like-a-ghost-openvas-in-podman/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/06/security_mindset_post_1.jpeg</image:loc><image:title>security_mindset_post_1</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/06/security_mindset_post_2.jpeg</image:loc><image:title>security_mindset_post_2</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/06/security_mindset_post_3.jpeg</image:loc><image:title>security_mindset_post_3</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/06/security_mindset_post_4.jpeg</image:loc><image:title>security_mindset_post_4</image:title></image:image><lastmod>2026-01-15T13:10:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/07/09/ghost-hands-automating-the-stronghold-with-ansible-and-podman/</loc><lastmod>2026-01-15T13:10:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/07/11/a-ghosts-toolset-kvm-virtualization/</loc><lastmod>2026-01-15T13:10:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/07/14/the-silent-operators-language-common-lisp-basics/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/07/designer-5.jpeg</image:loc><image:title>Designer (5)</image:title></image:image><lastmod>2026-01-15T13:10:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/07/21/protecting-the-wire-semaphore-behind-ssl-proxy/</loc><lastmod>2026-01-15T13:10:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/07/23/the-air-gapped-secrets-fortress-of-the-ghosts-keepassxc/</loc><lastmod>2026-01-15T13:10:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/07/24/whisper-engine-emacs-powered-static-site-generator-for-ghosts/</loc><lastmod>2026-01-15T13:10:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/07/27/a-site-powered-by-the-whisper-engine/</loc><lastmod>2026-01-15T13:10:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/07/31/the-whisper-engine-source-code-is-available/</loc><lastmod>2026-01-15T13:10:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/08/06/new-release-whisper-engine-v0-2-0/</loc><lastmod>2026-01-15T13:10:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/08/08/new-release-whisper-engine-v1-0-0/</loc><lastmod>2026-01-15T13:10:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/08/14/blades-of-the-ghost-isolated-ai/</loc><lastmod>2026-01-15T13:10:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/08/18/small-business-cybersecurity-starter-kit-ghost-curated/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/07/designer-11.jpeg</image:loc><image:title>Designer (11)</image:title></image:image><lastmod>2026-01-15T13:10:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/08/25/learn-to-cut-common-lisp-for-ghosts/</loc><lastmod>2026-01-15T13:10:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/08/26/common-lisp-surgical-cuts-with-the-loop/</loc><lastmod>2026-01-15T13:09:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/12/02/local-llms-for-privacy-first-workflows-a-practical-guide-with-lmstudio/</loc><lastmod>2026-01-15T13:09:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/11/18/password-manager-101/</loc><lastmod>2026-01-15T13:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/04/how-to-backup-and-restore-a-distro-in-wsl/</loc><lastmod>2026-01-15T13:00:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/05/password-manager-upgrade-i-switched-to-keepassxc/</loc><lastmod>2026-01-15T12:59:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/06/the-future-of-devops/</loc><lastmod>2026-01-15T12:59:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/07/how-to-stay-safe-on-the-internet-in-2023/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2022/12/windows_update.png</image:loc><image:title>windows_update</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2022/12/update_and_security.png</image:loc><image:title>update_and_security</image:title></image:image><lastmod>2026-01-15T12:59:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/07/jr-penetration-tester-learning-path-on-thm/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2022/12/thm-j6vg9xzdxm.png</image:loc><image:title>thm-j6vg9xzdxm</image:title></image:image><lastmod>2026-01-15T12:59:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/08/ubuntu-upgrade-fail/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2022/12/ubuntu_upgrade_log.jpg</image:loc><image:title>ubuntu_upgrade_log</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2022/12/ubuntu_upgrade_fail_02.jpg</image:loc><image:title>ubuntu_upgrade_fail_02</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2022/12/ubuntu_upgrade_fail_01.jpg</image:loc><image:title>ubuntu_upgrade_fail_01</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2022/12/ubuntu_upgrade_new_version.jpg</image:loc><image:title>ubuntu_upgrade_new_version</image:title></image:image><lastmod>2026-01-15T12:59:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/09/installing-kali-linux-on-wsl/</loc><lastmod>2026-01-15T12:59:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/12/how-to-install-a-secure-apache2-web-server-on-debian-11/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2022/12/apache.png</image:loc><image:title>apache</image:title></image:image><lastmod>2026-01-15T12:59:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/13/how-to-rename-or-backup-a-python-virtual-environment/</loc><lastmod>2026-01-15T12:59:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/14/how-to-backup-and-restore-a-distro-on-wsl/</loc><lastmod>2026-01-15T12:59:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/15/understanding-the-linux-file-permissions/</loc><lastmod>2026-01-15T12:59:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/16/how-to-upgrade-to-debian-bullseye-from-buster-in-wsl/</loc><lastmod>2026-01-15T12:59:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/19/understanding-cron-and-crontab/</loc><lastmod>2026-01-15T12:59:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/22/what-is-the-logical-volume-manager-lvm-and-how-to-use-it/</loc><lastmod>2026-01-15T12:59:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/12/30/how-to-check-the-accommodation-for-hidden-devices/</loc><lastmod>2026-01-15T12:59:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/05/cyber-security-landscape-2023/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/01/it-security.jpg</image:loc><image:title>it-security</image:title></image:image><lastmod>2026-01-15T12:59:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/07/how-to-install-a-debian-linux-penetration-testing-machine/</loc><lastmod>2026-01-15T12:58:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/08/basic-nmap-commands-survival-guide/</loc><lastmod>2026-01-15T12:58:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/10/what-is-luks-and-how-to-use-it/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/01/luks-logo.png</image:loc><image:title>luks-logo</image:title></image:image><lastmod>2026-01-15T12:58:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/12/fixing-the-error-connecting-issue-in-kali-kex-on-wsl/</loc><lastmod>2026-01-15T12:58:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/13/how-and-why-to-use-software-raid-on-linux/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/01/linux-software-raid.jpg</image:loc><image:title>linux-software-raid</image:title></image:image><lastmod>2026-01-15T12:58:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/18/how-to-crack-ssh-passwords-with-hydra/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/01/xhydra.png</image:loc><image:title>xhydra</image:title></image:image><lastmod>2026-01-15T12:58:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/20/how-to-crack-passwords-with-john-the-ripper-password-hacking-in-real-practice-as-an-ethical-hacker/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/01/john.png</image:loc><image:title>john</image:title></image:image><lastmod>2026-01-15T12:58:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/23/how-to-break-in-web-applications-using-burp-suite-real-web-hacking-in-practice-as-a-penetration-tester/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/01/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/01/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/01/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/01/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-15T12:58:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/24/how-to-run-multiple-instances-of-the-same-distro-in-wsl/</loc><lastmod>2026-01-15T12:58:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/24/how-to-backup-vmware-workstation-player-machines/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/01/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/01/image-6.png</image:loc><image:title>image-6</image:title></image:image><lastmod>2026-01-15T12:58:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/25/how-to-brute-force-ftp-users-and-passwords-with-hydra-ethical-hacking-in-real-life/</loc><lastmod>2026-01-15T12:58:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/27/how-to-brute-force-a-web-application-password-with-burp-suite-basic-dictionary-attack-in-practice/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/01/image-8.png</image:loc><image:title>image-8</image:title></image:image><lastmod>2026-01-15T12:58:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/31/a-closer-look-at-sql-and-sql-injection/</loc><lastmod>2026-01-15T12:58:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/09/basic-bash-for-sysadmins-01-the-shell/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/bash-logo-web.png</image:loc><image:title>bash-logo-web</image:title></image:image><lastmod>2026-01-15T12:58:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/10/windows-as-ansible-control-host-in-wsl2/</loc><lastmod>2026-01-15T12:58:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/13/getting-started-with-ansible-for-managing-our-personal-lab-ad-hoc-commands/</loc><lastmod>2026-01-15T12:58:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/14/getting-started-with-ansible-playbooks-more-steps-towards-devops/</loc><lastmod>2026-01-15T12:58:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/15/creating-an-ansible-role-from-a-playbook-modular-reusable-code/</loc><lastmod>2026-01-15T12:58:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/16/loops-in-the-ansible-code-the-basics-of-iteration/</loc><lastmod>2026-01-15T12:58:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/17/conditional-statements-making-decisions-in-ansible-code/</loc><lastmod>2026-01-15T12:58:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/20/how-to-install-vmware-workstation-pro-on-windows-10/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2026-01-15T12:58:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/21/how-to-install-and-manage-vmware-workstation-pro-virtual-machines/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-14.png</image:loc><image:title>image-14</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-6.png</image:loc><image:title>image-6</image:title></image:image><lastmod>2026-01-15T12:57:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/22/how-to-install-microsoft-core-fonts-on-debian-bullseye/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/debian_hexagonal.png</image:loc><image:title>debian_hexagonal</image:title></image:image><lastmod>2026-01-15T12:57:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/23/podman-lets-containerize-our-test-boxes-without-docker/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-15.png</image:loc><image:title>image-15</image:title></image:image><lastmod>2026-01-15T12:57:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/24/__trashed-2/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/lamp.jpg</image:loc><image:title>lamp</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-17.png</image:loc><image:title>image-17</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-16.png</image:loc><image:title>image-16</image:title></image:image><lastmod>2026-01-15T12:57:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/27/how-to-protect-sensitive-data-with-encrypted-files-or-elements-in-ansible-ansible-vault/</loc><lastmod>2026-01-15T12:55:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/28/how-to-install-zoneminder-an-open-source-cctv-surveillance-tool-and-android-phones-as-ip-cameras/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/02/image-18.png</image:loc><image:title>image-18</image:title></image:image><lastmod>2026-01-15T12:55:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/03/02/using-hyper-v-on-windows-10/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/03/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/03/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/03/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/03/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/03/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/03/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/03/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/03/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/03/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/03/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2026-01-15T12:55:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/03/03/how-to-implement-ansible-blocks-in-our-code-to-group-and-manage-tasks-together/</loc><lastmod>2026-01-15T12:55:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/03/06/how-to-implement-and-use-handlers-in-ansible-code/</loc><lastmod>2026-01-15T12:55:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/03/08/how-to-write-more-advanced-ansible-inventory-files/</loc><lastmod>2026-01-15T12:55:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/03/13/configuration-file-blueprints-jinja2-templates-in-the-ansible-code/</loc><lastmod>2026-01-15T12:55:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/03/16/handling-sensitive-data-with-ansible-vault-encrypting-strings-instead-of-files/</loc><lastmod>2026-01-15T12:55:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/03/20/using-different-ansible-vault-passwords-with-vault-id/</loc><lastmod>2026-01-15T12:55:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/03/23/using-ansible-galaxy-for-managing-ansible-roles-and-collections/</loc><lastmod>2026-01-15T12:55:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/03/27/what-is-two-factor-authentication-2fa/</loc><lastmod>2026-01-15T12:55:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/03/31/what-is-multi-factor-authentication-mfa/</loc><lastmod>2026-01-15T12:55:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/04/03/how-to-use-ansible-with-the-hashicorp-vault-secret-manager/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/03/image-11.png</image:loc><image:title>image-11</image:title></image:image><lastmod>2026-01-15T12:55:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/04/06/how-to-install-hashicorp-vault-on-debian/</loc><lastmod>2026-01-15T12:55:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/04/17/installing-docker-engine-on-debian-bullseye-as-an-ansible-playbook/</loc><lastmod>2026-01-15T12:55:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/04/20/configuring-the-network-on-debian-bullseye-with-an-ansible-playbook/</loc><lastmod>2026-01-15T12:55:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/04/24/installing-virtualbox-guest-additions-on-debian-bullseye-with-an-ansible-playbook/</loc><lastmod>2026-01-15T12:55:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/04/27/how-to-test-ansible-code-with-molecule/</loc><lastmod>2026-01-15T12:55:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/05/01/installing-web-and-database-servers-on-debian-bullseye-with-ansible-playbooks/</loc><lastmod>2026-01-15T12:54:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/05/04/vote-do-you-think-an-online-ansible-basics-webinar-is-good-idea/</loc><lastmod>2026-01-15T12:54:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/05/04/how-to-use-ansible-callback-plugins/</loc><lastmod>2026-01-15T12:54:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/05/08/why-automation-and-infrastructure-as-code-are-important-in-it-operations/</loc><lastmod>2026-01-15T12:54:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/05/11/lets-use-a-more-flexible-directory-structure-for-an-ansible-project/</loc><lastmod>2026-01-15T12:54:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/05/15/ansible-semaphore-a-modern-open-source-gui-for-our-ansible-automation/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/05/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/05/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/05/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/05/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/05/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-15T12:54:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/05/18/fortifying-the-foundations-unveiling-the-crucial-role-of-cyber-security-and-security-testing-in-automation-and-ci-cd-pipelines/</loc><lastmod>2026-01-15T12:54:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/05/22/streamline-your-devops-workflow-leveraging-rundeck-in-docker-with-ansible/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/05/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/05/image-7.png</image:loc><image:title>image-7</image:title></image:image><lastmod>2026-01-15T12:54:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/05/24/automating-postgresql-with-ansible-a-hands-on-guide/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/05/image-5.png</image:loc><image:title>image-5</image:title></image:image><lastmod>2026-01-15T12:54:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/05/26/unleashing-the-power-of-ansible-advantages-that-transform-it-operations/</loc><lastmod>2026-01-15T12:54:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/05/29/enhancing-web-application-security-with-burp-suite-community-a-comprehensive-guide/</loc><lastmod>2026-01-15T12:54:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/05/31/harnessing-the-power-of-bing-ai-empowering-it-and-security-architects/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/05/image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2026-01-15T12:54:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/02/mastering-ansible-navigating-the-most-common-errors-and-mistakes/</loc><lastmod>2026-01-15T12:36:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/05/amplifying-it-and-security-architecture-with-chatgpt-empowering-architects/</loc><lastmod>2026-01-15T12:36:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/07/harnessing-the-power-of-ansible-exploring-the-versatility-of-ansible-doc/</loc><lastmod>2026-01-15T12:36:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/09/automating-apis-with-ansible-a-comprehensive-guide/</loc><lastmod>2026-01-15T12:36:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/12/upgrading-debian-bullseye-11-to-bookworm-12-on-server-and-desktop/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-15T12:36:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/12/penetration-testing-the-owasp-juice-shop-exploring-sql-injection-with-burp-suite/</loc><lastmod>2026-01-15T12:36:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/14/leveraging-ai-technologies-for-enhanced-performance-and-safety-in-it-and-security-architecture/</loc><lastmod>2026-01-15T12:36:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/16/streamlining-docker-automation-with-ansible-a-comprehensive-guide/</loc><lastmod>2026-01-15T12:36:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/19/ubuntu-linux-empowering-users-across-all-levels-with-a-universal-platform/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/06/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2026-01-15T12:36:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/21/automating-web-services-using-ansible/</loc><lastmod>2026-01-15T12:36:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/23/exploring-the-pros-and-cons-of-cloud-computing-and-cloud-technology-harnessing-the-power-of-the-cloud/</loc><lastmod>2026-01-15T12:36:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/26/safeguarding-your-database-defending-against-sql-injections/</loc><lastmod>2026-01-15T12:36:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/28/defending-our-linux-system-against-vulnerabilities-strengthening-system-security/</loc><lastmod>2026-01-15T12:36:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/29/protonvpn-a-friendly-solution-to-enhance-our-digital-safety-and-security/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/06/screenshot-from-2023-06-29-17-23-37.png</image:loc><image:title>screenshot-from-2023-06-29-17-23-37</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/06/screenshot-from-2023-06-29-17-45-45.png</image:loc><image:title>screenshot-from-2023-06-29-17-45-45</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/06/screenshot_20230629_151644_proton-vpn-1.jpg</image:loc><image:title>screenshot_20230629_151644_proton-vpn-1</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/06/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/06/screenshot_20230629_151644_proton-vpn.jpg</image:loc><image:title>screenshot_20230629_151644_proton-vpn</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/06/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/06/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2026-01-15T12:36:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/06/30/safely-managing-ansible-vault-passwords-best-practices-for-secure-automation/</loc><lastmod>2026-01-15T12:36:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/03/keep-our-secrets-in-a-safe-place-protonpass-password-manager-review/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/screenshot-from-2023-07-01-14-22-11.png</image:loc><image:title>screenshot-from-2023-07-01-14-22-11</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/screenshot-from-2023-07-01-14-18-59.png</image:loc><image:title>screenshot-from-2023-07-01-14-18-59</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-15T12:35:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/03/why-penetration-testing-is-not-a-full-security-solution-and-how-the-local-security-team-does-not-follow-the-recommendations/</loc><lastmod>2026-01-15T12:35:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/05/installing-and-setting-up-sudo-on-ubuntu-linux-for-secure-system-administration/</loc><lastmod>2026-01-15T12:35:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/07/a-guide-to-exploring-the-deep-web-and-dark-web-safely/</loc><lastmod>2026-01-15T12:35:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/10/how-does-vpn-technology-work-and-why-is-not-not-entirely-anonymous/</loc><lastmod>2026-01-15T12:35:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/10/how-to-install-ms-ttf-fonts-on-debian-linux/</loc><lastmod>2026-01-15T12:35:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/12/how-to-install-kali-linux-on-an-ubs-stick-for-having-a-mobile-and-robust-system-in-our-pockets/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-6.png</image:loc><image:title>image-6</image:title></image:image><lastmod>2026-01-15T12:35:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/14/debian-linux-the-ultimate-operating-system-for-more-experienced-users/</loc><lastmod>2026-01-15T12:35:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/17/how-to-penetration-test-linux-passwords-with-john-the-ripper/</loc><lastmod>2026-01-15T12:35:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/19/how-to-install-protonvpn-on-debian-ubuntu-linux-for-enhancing-security-and-privacy/</loc><lastmod>2026-01-15T12:35:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/21/how-to-penetration-test-linux-services-with-hydra/</loc><lastmod>2026-01-15T12:35:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/24/fortifying-our-application-preparing-against-the-owasp-top-10/</loc><lastmod>2026-01-15T12:35:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/26/decoding-the-mysteries-how-does-dns-work/</loc><lastmod>2026-01-15T12:35:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/28/hardening-our-debian-desktop-for-more-secure-daily-work-and-enhanced-privacy/</loc><lastmod>2026-01-15T12:35:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/07/31/enhance-your-security-create-temporary-disposable-nessus-instances-in-docker/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-16.png</image:loc><image:title>image-16</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-15.png</image:loc><image:title>image-15</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-14.png</image:loc><image:title>image-14</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2026-01-15T12:35:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/08/04/how-to-install-tenable-nessus-essentials-the-free-vulnerability-scanner-on-debian-bookworm/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-25.png</image:loc><image:title>image-25</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-24.png</image:loc><image:title>image-24</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-23.png</image:loc><image:title>image-23</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-22.png</image:loc><image:title>image-22</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-18.png</image:loc><image:title>image-18</image:title></image:image><lastmod>2026-01-15T12:34:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/08/07/will-open-source-be-extinct-soon-the-future-of-open-source-software/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/07/image-17.png</image:loc><image:title>image-17</image:title></image:image><lastmod>2026-01-15T12:34:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/08/09/ntp-unraveling-the-timekeeping-magic-behind-network-synchronization/</loc><lastmod>2026-01-15T12:34:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/08/11/hardening-kali-linux-for-advanced-penetration-testing-and-cyber-security-work/</loc><lastmod>2026-01-15T12:34:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/08/14/how-to-set-up-two-factor-authentication-with-google-authenticator-on-a-debian-linux-desktop/</loc><lastmod>2026-01-15T12:34:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/08/16/ai-quick-start-take-off-with-your-ai-knowledge-now/</loc><lastmod>2026-01-15T12:34:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/08/18/mastering-docker-volume-management-a-comprehensive-guide-with-a-handful-of-examples/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/08/1200px-docker_small_logo.jpg.png</image:loc><image:title>1200px-docker_small_logo.jpg</image:title></image:image><lastmod>2026-01-15T12:34:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/08/21/docker-compose-vs-docker-swarm-choosing-the-right-orchestration-tool/</loc><lastmod>2026-01-15T12:34:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/08/25/speeding-up-network-configuration-in-the-lab-with-ansible-and-templates/</loc><lastmod>2026-01-15T12:33:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/08/28/unveiling-the-path-to-ethical-hacking-engagements-a-beginners-guide/</loc><lastmod>2026-01-15T12:33:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/08/30/mastering-the-essential-soft-skills-for-it-architects-and-devops-engineers/</loc><lastmod>2026-01-15T12:33:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/09/01/the-role-of-red-teams-and-the-significance-of-periodical-penetration-tests-for-online-businesses/</loc><lastmod>2026-01-15T12:33:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/09/04/a-comprehensive-guide-to-configure-ssh-connections-in-ansible/</loc><lastmod>2026-01-15T12:33:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/09/06/ssh-tunneling-jump-hosts-and-security-in-real-practice/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/09/ssh.png</image:loc><image:title>ssh</image:title></image:image><lastmod>2026-01-15T12:33:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/09/08/installing-terraform-on-linux-using-the-official-apt-repository/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/09/terraform.png</image:loc><image:title>terraform</image:title></image:image><lastmod>2026-01-15T12:33:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/09/11/containerized-confidence-testing-ansible-roles-with-molecule-and-podman-on-debian-linux/</loc><lastmod>2026-01-15T12:33:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/09/13/simplify-container-orchestration-with-podman-compose/</loc><lastmod>2026-01-15T12:33:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/09/15/demystifying-dhcp-unveiling-the-inner-workings-of-dynamic-host-configuration-protocol/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/09/networking-transparent.png</image:loc><image:title>networking-transparent</image:title></image:image><lastmod>2026-01-15T12:33:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/09/18/securing-ansible-automation-with-single-entry-points-ssh-jump-hosts/</loc><lastmod>2026-01-15T12:33:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/09/20/a-guide-for-configuring-and-hosting-an-in-house-docker-registry/</loc><lastmod>2026-01-15T12:33:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/09/22/building-podman-debian-images-with-systemd-inside-the-container/</loc><lastmod>2026-01-15T12:33:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/09/25/rundeck-unleashed-accelerating-devops-workflows-with-self-service-empowerment/</loc><lastmod>2026-01-15T12:33:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/09/27/getting-started-with-emacs-on-linux-a-beginners-guide/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/09/emacs.png</image:loc><image:title>emacs</image:title></image:image><lastmod>2026-01-15T12:33:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/09/29/exploring-org-mode-in-emacs-a-productivity-powerhouse/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-15T12:33:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/10/02/a-deep-dive-into-ansible-vault-safeguarding-your-sensitive-data/</loc><lastmod>2026-01-15T12:33:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/10/04/understanding-kubernetes-and-docker-a-beginners-guide-for-devops/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/09/k8sdocker.jpg</image:loc><image:title>k8sdocker</image:title></image:image><lastmod>2026-01-15T12:33:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/10/06/the-art-of-ethical-hacking-beyond-brute-force-and-password-cracking/</loc><lastmod>2026-01-15T12:33:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/10/09/setting-up-an-sbcl-common-lisp-development-environment-with-emacs-and-slime-on-debian-linux-in-2023/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/10/emacs_slime_lisp.jpg</image:loc><image:title>emacs_slime_lisp</image:title></image:image><lastmod>2026-01-15T12:32:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/10/11/running-rundeck-and-ansible-in-podman-with-a-mysql-backend-and-podman-compose-a-comprehensive-guide/</loc><lastmod>2026-01-15T12:32:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/10/13/the-emergence-of-purple-teams-bridging-the-gap-in-cyber-security-practices/</loc><lastmod>2026-01-15T12:32:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/10/16/configuring-tenable-nessus-essentials-for-daily-security-checks-in-small-companies/</loc><lastmod>2026-01-15T12:31:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/10/18/hashcat-for-ethical-hacking-a-powerful-tool-for-password-cracking/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/09/hashcat.jpeg</image:loc><image:title>hashcat</image:title></image:image><lastmod>2026-01-15T12:31:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/10/20/mastering-docker-networking-exposing-ports-only-to-other-containers/</loc><lastmod>2026-01-15T12:31:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/10/23/a-comprehensive-guide-to-installing-and-utilizing-docker-swarm-and-load-balancing-docker-swarm-services-with-nginx-proxy/</loc><lastmod>2026-01-15T12:31:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/10/25/defending-against-cyber-securitys-giants-understanding-whaling-attacks/</loc><lastmod>2026-01-15T12:31:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/10/27/unveiling-the-role-of-blue-teams-and-the-essential-skills-for-cyber-defense-in-our-online-world/</loc><lastmod>2026-01-15T12:31:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/10/30/a-step-by-step-guide-to-installing-and-setting-up-puppet-community-edition-on-debian-servers-with-a-debian-puppet-master/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/10/screenshot-from-2023-10-27-15-58-37.png</image:loc><image:title>screenshot-from-2023-10-27-15-58-37</image:title></image:image><lastmod>2026-01-15T12:31:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/11/01/the-power-of-privacy-safeguarding-your-data-with-gpg-encryption/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/10/screenshot-from-2023-10-27-16-05-04.png</image:loc><image:title>screenshot-from-2023-10-27-16-05-04</image:title></image:image><lastmod>2026-01-15T12:31:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/11/03/installing-zoneminder-camera-system-on-debian-bookworm/</loc><lastmod>2026-01-15T12:31:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/11/06/detecting-rootkits-with-rkhunter/</loc><lastmod>2026-01-15T12:31:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/11/08/getting-started-with-ansible-execution-environments-a-quick-guide/</loc><lastmod>2026-01-15T12:31:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/11/10/aide-protecting-the-integrity-of-your-linux-system/</loc><lastmod>2026-01-15T12:31:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/11/13/streamlining-it-operations-getting-started-with-ansible-automation-in-2024/</loc><lastmod>2026-01-15T12:31:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/11/15/what-is-devsecops-and-why-is-it-good-for-enterprises-and-small-businesses/</loc><lastmod>2026-01-15T12:31:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/11/17/enhancing-security-with-tripwire-on-debian-bookworm/</loc><lastmod>2026-01-15T12:30:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/11/21/writing-your-own-ansible-role-a-comprehensive-guide-using-industry-standard-tools-and-software/</loc><lastmod>2026-01-15T12:30:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/11/24/the-magic-of-burp-suite-interception-techniques-for-enhanced-web-security/</loc><lastmod>2026-01-15T12:30:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/12/01/container-pod-orchestration-in-podman-with-kubernetes-compatibility/</loc><lastmod>2026-01-15T12:30:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/12/05/how-to-create-a-scalable-jenkins-ci-cd-environment-using-containers/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/11/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/11/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/11/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/11/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/11/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/11/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/11/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-15T12:30:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/12/08/how-to-install-vaultwarden-password-manager-in-podman/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/12/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/12/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/12/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-15T12:30:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/12/12/how-to-set-up-vhosts-in-the-apache2-webserver/</loc><lastmod>2026-01-15T12:30:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/12/15/how-to-configure-an-ssl-reverse-proxy-with-nginx/</loc><lastmod>2026-01-15T12:30:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/12/22/install-passbolt-self-hosted-with-podman/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/12/passbolt.png</image:loc><image:title>Passbolt</image:title></image:image><lastmod>2026-01-15T12:30:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/12/26/installing-and-using-rkhunter-on-debian-linux/</loc><lastmod>2026-01-15T12:30:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/12/29/installing-chkrootkit-on-debian-linux/</loc><lastmod>2026-01-15T12:30:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/01/09/setting-up-a-secure-mail-server-with-iredmail-on-debian-bookworm/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2024/01/email-3249062_640.png</image:loc><image:title>email-3249062_640</image:title></image:image><lastmod>2026-01-15T12:30:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/01/12/import-passwords-from-kdbx-or-csv-files-into-passbolt/</loc><lastmod>2026-01-15T12:30:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/01/16/deploying-mailcow-a-self-hosted-mail-server-in-docker/</loc><lastmod>2026-01-15T12:30:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/01/23/protect-your-linux-server-and-desktop-with-clamav/</loc><lastmod>2026-01-15T12:30:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/01/26/how-to-set-up-2fa-with-totp-for-openssh-servers/</loc><lastmod>2026-01-15T12:30:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/01/30/setting-up-a-root-certificate-authority-with-openssl/</loc><lastmod>2026-01-15T12:29:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/02/02/how-to-become-a-master-hacker-in-2024/</loc><lastmod>2026-01-15T12:29:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/02/06/podman-secrets-for-secure-service-configuration/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2024/01/cyber-security-3374252_640.jpg</image:loc><image:title>cyber-security-3374252_640</image:title></image:image><lastmod>2026-01-15T12:29:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/02/09/securing-your-data-using-luks-to-encrypt-a-partition/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2024/02/security-5199236.jpg</image:loc><image:title>security-5199236</image:title></image:image><lastmod>2026-01-15T12:29:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/02/23/debians-apt-package-management/</loc><lastmod>2026-01-15T12:29:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/03/01/a-beginners-guide-to-ciphers-cryptography-and-encryption/</loc><lastmod>2026-01-15T12:29:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/03/06/the-vigenere-cipher/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2024/03/tabula_recta.jpg</image:loc><image:title>tabula_recta</image:title></image:image><lastmod>2026-01-15T12:29:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/03/12/the-transformative-power-of-blockchain-technology/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2024/03/pexels-karolina-grabowska-5980856.jpg</image:loc><image:title>pexels-karolina-grabowska-5980856</image:title></image:image><lastmod>2026-01-15T12:29:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/03/14/bitcoin-a-decade-of-disruption-and-the-promise-of-a-decentralized-future/</loc><lastmod>2026-01-15T12:29:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/03/21/proton-mails-new-desktop-client-a-secure-and-user-friendly-email-solution/</loc><lastmod>2026-01-15T12:28:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/03/26/ethereum-the-future-of-decentralized-finance/</loc><lastmod>2026-01-15T12:28:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/03/28/cryptocurrencies-and-privacy-coins/</loc><lastmod>2026-01-15T12:28:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/04/18/ansible-basics-06-conditional-statements-and-loops/</loc><lastmod>2026-01-15T12:28:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/04/23/ansible-basics-07-templates-and-jinja2/</loc><lastmod>2026-01-15T12:28:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/04/25/ansible-basics-08-variables-and-ansible-vault/</loc><lastmod>2026-01-15T12:28:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/04/30/ansible-basics-09-ansible-roles/</loc><lastmod>2026-01-15T12:28:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/05/02/ansible-basics-10-ansible-galaxy/</loc><lastmod>2026-01-15T12:28:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/05/09/podman-basics-01-introduction-to-containerization/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2024/04/podman_basics.jpg</image:loc><image:title>podman_basics</image:title></image:image><lastmod>2026-01-15T12:28:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/05/14/podman-basics-02-introduction-to-podman/</loc><lastmod>2026-01-15T12:28:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/05/16/podman-basics-03-installing-podman/</loc><lastmod>2026-01-15T12:28:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/05/21/podman-basics-04-running-your-first-container/</loc><lastmod>2026-01-15T12:28:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/05/23/podman-basics-05-podman-networks/</loc><lastmod>2026-01-15T12:28:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/06/04/podman-basics-06-podman-volumes/</loc><lastmod>2026-01-15T12:28:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/06/11/podman-basics-07-using-multi-container-applications/</loc><lastmod>2026-01-15T12:28:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/06/13/podman-basics-08-building-your-own-images/</loc><lastmod>2026-01-15T12:28:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/06/18/podman-basics-09-kubernetes-compatibility/</loc><lastmod>2026-01-15T12:28:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/06/21/i-migrated-to-kvmqemu-on-debian-12/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2024/06/kvm_basics.jpg</image:loc><image:title>kvm_basics</image:title></image:image><lastmod>2026-01-15T12:28:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/06/24/how-to-migrate-virtualbox-vms-to-kvm/</loc><lastmod>2026-01-15T12:28:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/06/25/free-devops-trainings-on-toms-it-cafe/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2024/06/image-5.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-15T12:28:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/06/26/install-guests-with-virt-install-in-command-line/</loc><lastmod>2026-01-15T12:28:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/06/27/managing-storage-pools-in-kvm/</loc><lastmod>2026-01-15T12:27:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/06/28/join-our-collaborative-technology-community-on-discord-and-irc/</loc><lastmod>2026-01-15T12:27:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/07/01/manage-kvm-volumes-with-virsh-and-qemu-img/</loc><lastmod>2026-01-15T12:27:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/07/02/docker-basics-free-training-by-toms-it-cafe/</loc><lastmod>2026-01-15T12:27:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/07/03/macvlan-vs-bridge-interface-wi-fi-compatibility-and-benefits/</loc><lastmod>2026-01-15T12:27:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/07/04/how-to-manage-kvm-snapshots-with-virsh/</loc><lastmod>2026-01-15T12:27:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/07/05/unattended-linux-installation-on-kvm-with-virsh-and-kickstart/</loc><lastmod>2026-01-15T12:27:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/07/08/serial-console-in-kvm/</loc><lastmod>2026-01-15T12:26:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/07/12/using-lvm-logical-volumes-with-kvm-guests-via-virsh/</loc><lastmod>2026-01-15T12:26:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/07/17/understanding-linux-acls-setting-default-and-user-group-rules/</loc><lastmod>2026-01-15T12:26:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/07/30/encrypting-kvm-qcow2-disk-images-with-luks/</loc><lastmod>2026-01-15T12:26:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/08/01/encrypting-kvm-volumes-as-lvm-logical-volumes/</loc><lastmod>2026-01-15T12:26:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/08/06/using-basic-selinux-on-enterprise-linux/</loc><lastmod>2026-01-15T12:26:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/08/08/securing-the-grub-boot-loader-on-debian-linux/</loc><lastmod>2026-01-15T12:26:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/08/13/securing-your-system-with-apparmor/</loc><lastmod>2026-01-15T12:26:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/08/16/setting-up-luks-to-secure-your-system/</loc><lastmod>2026-01-15T12:26:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/09/05/automating-apis-with-ansible/</loc><lastmod>2026-01-15T12:26:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/09/10/using-dynamic-kvm-inventory-with-ansible-for-vm-lifecycle-and-configuration-management/</loc><lastmod>2026-01-15T12:26:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/09/12/ansible-vault-multiple-vault-ids-for-secure-configuration-management/</loc><lastmod>2026-01-15T12:26:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/09/17/kvm-copilot-a-powerful-tool-for-managing-kvm-vm-lifecycle/</loc><lastmod>2026-01-15T12:26:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/09/19/understanding-blocks-in-ansible-grouping-tasks-and-handling-errors/</loc><lastmod>2026-01-15T12:26:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/09/23/podman-vs-docker-architectural-and-security-differences/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2024/09/pexels-pixabay-163726.jpg</image:loc><image:title>pexels-pixabay-163726</image:title></image:image><lastmod>2026-01-15T12:26:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/09/24/delegating-tasks-to-the-local-host-in-ansible-while-running-remotely-through-ssh/</loc><lastmod>2026-01-15T12:26:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/09/26/common-cyber-threats-and-how-attackers-exploit-them/</loc><lastmod>2026-01-15T12:26:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/09/30/understanding-docker-engine-and-docker-desktop-key-differences-and-benefits/</loc><lastmod>2026-01-15T12:25:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/10/01/using-and-scaling-ansible-in-large-environments/</loc><lastmod>2026-01-15T12:25:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/10/03/securing-your-home-network/</loc><lastmod>2026-01-15T12:25:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/10/07/enhancing-security-with-rootless-containers-in-podman/</loc><lastmod>2026-01-15T12:25:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/10/08/managing-complex-yaml-structures-dynamically-with-ansible/</loc><lastmod>2026-01-15T12:25:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/10/10/understanding-social-engineering-attacks-how-they-work-how-to-spot-them-and-how-to-protect-yourself/</loc><lastmod>2026-01-15T12:25:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/10/14/running-secure-rootless-docker-containers-on-a-docker-host/</loc><lastmod>2026-01-15T12:25:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/10/15/ci-cd-pipeline-automation-using-ansible/</loc><lastmod>2026-01-15T12:25:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/10/17/creating-strong-passwords-best-practices-and-secure-storage/</loc><lastmod>2026-01-15T12:25:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/10/21/creating-managing-and-securing-docker-volumes-best-practices/</loc><lastmod>2026-01-15T12:25:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/10/22/optimizing-ansible-playbooks-for-performance/</loc><lastmod>2026-01-15T12:25:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/10/24/what-is-encryption/</loc><lastmod>2026-01-15T12:25:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/10/29/network-automation-with-ansible/</loc><lastmod>2026-01-15T12:25:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/11/09/why-contract-workers-are-a-winning-choice-for-cyber-security-a-guide-for-big-companies/</loc><lastmod>2026-01-15T12:25:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/11/27/techniques-for-reading-files-with-ansible-standard-modules/</loc><lastmod>2026-01-15T12:25:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/11/30/the-strategic-advantage-of-hiring-external-devops-contractors/</loc><lastmod>2026-01-15T12:25:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/12/04/understanding-opentofu-a-new-era-in-infrastructure-as-code/</loc><lastmod>2026-01-15T12:25:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/12/09/understanding-egress-costs-in-the-cloud/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2024/12/pexels-ivan-cujic-20495-109479.jpg</image:loc><image:title>pexels-ivan-cujic-20495-109479</image:title></image:image><lastmod>2026-01-15T12:25:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/12/18/how-to-install-opentofu/</loc><lastmod>2026-01-15T12:25:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/12/25/setting-up-wireguard-vpn-on-debian/</loc><lastmod>2026-01-15T12:25:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/01/20/why-do-attackers-prefer-social-engineering-over-brute-forcing/</loc><lastmod>2026-01-15T12:25:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/01/27/how-to-manage-podman-containers-with-opentofu/</loc><lastmod>2026-01-15T12:25:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/02/03/how-to-locate-the-dashboard-in-owasp-juice-shop/</loc><lastmod>2026-01-15T12:25:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/03/why-everyone-should-use-a-secure-and-trustworthy-vpn-connection/</loc><lastmod>2026-01-15T12:24:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/10/the-importance-of-using-a-client-side-firewall-on-linux-a-comparison-of-iptables-and-ufw/</loc><lastmod>2026-01-15T12:24:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/12/the-art-of-operational-security-how-to-stay-invisible-in-a-connected-world/</loc><lastmod>2026-01-15T12:24:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/15/privacy-in-the-21st-century-why-it-matters-more-than-ever/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/03/hacker-8033977_1920.jpg</image:loc><image:title>hacker-8033977_1920</image:title></image:image><lastmod>2026-01-15T12:24:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/16/layer-zero-privacy-tactic-01-use-privacy-first-browsers/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/03/ai-generated-8366100_1920.jpg</image:loc><image:title>ai-generated-8366100_1920</image:title></image:image><lastmod>2026-01-15T12:24:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/16/%f0%9f%94%a5-free-speech-in-a-surveillance-age-the-last-firewall/</loc><lastmod>2026-01-15T12:24:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/17/enhancing-linux-desktop-security-with-ufw-uncomplicated-firewall/</loc><lastmod>2026-01-15T12:24:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/18/layer-zero-privacy-tactic-02-secure-your-communication/</loc><lastmod>2026-01-15T12:19:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/18/layer-zero-the-ghost-protocol/</loc><lastmod>2026-01-15T12:19:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/20/certifications-the-shiny-badge-of-the-incompetent/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/03/designer-4.jpeg</image:loc><image:title>Designer (4)</image:title></image:image><lastmod>2026-01-15T12:19:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/20/layer-zero-privacy-tactic-03-use-a-vpn-or-tor/</loc><lastmod>2026-01-15T12:18:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/21/%f0%9f%95%b6%ef%b8%8f-operation-ghost-protocol-the-privacy-paradox/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/03/designer-7.jpeg</image:loc><image:title>Designer (7)</image:title></image:image><lastmod>2026-01-15T12:18:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/22/when-privacy-dies-frances-encryption-backdoor-law-explained/</loc><lastmod>2026-01-15T12:18:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/22/%f0%9f%94%a5-operation-ghost-protocol-purging-the-echoes-with-shred/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/03/designer-3.jpeg</image:loc><image:title>Designer (3)</image:title></image:image><lastmod>2026-01-15T12:18:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/22/%f0%9f%94%92-breaking-down-the-zero-trust-model-why-trust-no-one-is-the-future-of-security/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/03/designer-5.jpeg</image:loc><image:title>Designer (5)</image:title></image:image><lastmod>2026-01-15T12:18:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/23/legacy-it-the-silent-saboteurs-behind-the-firewall/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/03/designer-1.jpeg</image:loc><image:title>Designer (1)</image:title></image:image><lastmod>2026-01-15T12:18:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/24/the-real-cost-of-corporate-security-how-budget-cuts-are-slaughtering-your-defense/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/03/post_image03.jpeg</image:loc><image:title>post_image03</image:title></image:image><lastmod>2026-01-15T12:18:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/24/securing-your-home-linux-desktop-a-practical-guide-to-using-apparmor/</loc><lastmod>2026-01-15T12:18:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/24/the-silent-war-on-your-digital-freedom/</loc><lastmod>2026-01-15T12:18:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/25/the-great-firewall-of-corporate-ego-why-executives-ignore-real-cybersecurity-risks/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/03/bearded_post03.jpeg</image:loc><image:title>bearded_post03</image:title></image:image><lastmod>2026-01-15T12:18:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/25/layer-zero-privacy-tactic-04-break-the-data-trail-use-alternative-search-engines/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/03/post_image04.jpeg</image:loc><image:title>post_image04</image:title></image:image><lastmod>2026-01-15T12:18:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/25/the-cloud-the-big-lie-were-all-buying-into/</loc><lastmod>2026-01-15T12:18:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/26/why-your-penetration-tester-is-probably-wasting-their-time/</loc><lastmod>2026-01-15T12:18:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/26/layer-zero-privacy-tactic-05-mask-your-identity-use-alias-emails-and-burner-accounts/</loc><lastmod>2026-01-15T12:18:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/26/ransomware-the-new-corporate-business-model/</loc><lastmod>2026-01-15T12:18:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/27/cybersecurity-is-not-a-democracy-why-weak-links-should-be-fired-not-trained/</loc><lastmod>2026-01-15T12:18:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/27/the-ciso-is-just-a-scapegoat-how-executives-sacrifice-security-leaders-to-hide-their-own-failures/</loc><lastmod>2026-01-15T12:18:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/28/%f0%9f%91%81%ef%b8%8f-data-privacy-is-not-a-luxury-its-a-right/</loc><lastmod>2026-01-15T12:18:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/28/%f0%9f%9a%a8-7-reasons-you-think-youre-private-but-youre-already-compromised/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/03/banner_deadswitch_02.jpeg</image:loc><image:title>banner_deadswitch_02</image:title></image:image><lastmod>2026-01-15T12:17:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/28/%f0%9f%94%a7-the-tools-you-use-define-your-security-choose-wrong-and-youre-already-compromised/</loc><lastmod>2026-01-15T12:17:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/29/%f0%9f%ab%b5-your-privacy-is-a-joke-and-theyre-laughing-at-you/</loc><lastmod>2026-01-15T12:17:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/03/30/%f0%9f%97%9d%ef%b8%8f-your-passwords-are-trash-and-you-know-it/</loc><lastmod>2026-01-15T12:17:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/01/%f0%9f%91%81%ef%b8%8f%f0%9f%97%a8%ef%b8%8f-the-silent-watchers-in-your-pocket/</loc><lastmod>2026-01-15T12:17:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/01/%f0%9f%95%b1-silence-is-power-stop-handing-them-ammunition/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/04/ghost4.jpeg</image:loc><image:title>ghost4</image:title></image:image><lastmod>2026-01-15T12:17:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/02/%f0%9f%95%b5-they-want-you-talking-dont-give-them-the-satisfaction/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/04/green-anon-glitch-2.jpeg</image:loc><image:title>green-anon-glitch-2</image:title></image:image><lastmod>2026-01-15T12:17:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/02/the-comfort-of-convenience-a-trojan-horse/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/03/ghost1.jpeg</image:loc><image:title>ghost1</image:title></image:image><lastmod>2026-01-15T12:17:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/06/%f0%9f%90%a7-before-you-hack-you-must-understand-why-linux-mastery-comes-first/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/03/green-anon-glitch-1.jpeg</image:loc><image:title>green-anon-glitch-1</image:title></image:image><lastmod>2026-01-15T12:17:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2022/04/12/how-to-use-python-virtual-environments-in-visual-studio-code/</loc><lastmod>2026-01-15T12:10:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/12/19/how-to-configure-an-apache-ssl-reverse-proxy-on-linux/</loc><lastmod>2026-01-15T12:10:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/01/05/how-to-set-up-vhosts-in-the-nginx-webserver/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/12/nginx-logo-rgb-large.png</image:loc><image:title>nginx-logo-rgb-large</image:title></image:image><lastmod>2026-01-15T12:10:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/01/19/enhancing-web-security-a-guide-to-implementing-lets-encrypt-and-certbot-on-debian-linux/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2024/01/https-3344700_640.jpg</image:loc><image:title>https-3344700_640</image:title></image:image><lastmod>2026-01-15T12:10:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/08/11/ai-prompts-as-silent-daggers/</loc><lastmod>2026-01-15T12:10:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/11/03/someones-trying-to-register-your-cn-domain-a-common-domain-scam/</loc><lastmod>2026-01-15T12:10:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/11/06/private-matrix-hosting-a-synapse-server-over-tor/</loc><lastmod>2026-01-15T12:10:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/11/11/how-to-run-wordpress-on-the-dark-net-tor-only/</loc><lastmod>2026-01-15T12:10:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/11/13/how-to-run-a-wordpress-site-on-both-onion-and-a-public-domain-dark-net-clear-net/</loc><lastmod>2026-01-15T12:10:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/11/18/system-administration-grep-cut-head-tail-less-sed/</loc><lastmod>2026-01-15T12:10:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/11/20/firewall-basics-with-ufw-protecting-your-server-in-minutes/</loc><lastmod>2026-01-15T12:09:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/11/27/understanding-linux-permissions-the-chmod-cheat-sheet-youll-never-forget/</loc><lastmod>2026-01-15T12:09:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/11/25/encryption-in-transit-and-in-rest/</loc><lastmod>2026-01-15T11:58:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/06/07/privacy-vs-anonymity/</loc><lastmod>2026-01-15T11:57:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/08/02/using-git-with-ansible-a-hands-on-example-of-enhancing-our-devops-systems/</loc><lastmod>2026-01-15T11:56:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/16/tryhackme-owasp-juice-shop-write-up/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2023/01/tryhackme.png</image:loc><image:title>tryhackme</image:title></image:image><lastmod>2026-01-15T11:53:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/19/tryhackme-vulnversity-write-up/</loc><lastmod>2026-01-15T11:53:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/01/22/tryhackme-kenobi-write-up/</loc><lastmod>2026-01-15T11:53:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/02/02/tryhackme-attacktive-directory-write-up/</loc><lastmod>2026-01-15T11:53:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/03/09/tryhackme-rootme-ctf-write-up/</loc><lastmod>2026-01-15T11:53:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/08/23/tryhackme-simple-ctf-modern-solution-2023-working-exploit-with-docker-io/</loc><lastmod>2026-01-15T11:53:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2023/11/28/tryhackmes-advent-of-cyber-a-gift-for-cyber-security-enthusiasts/</loc><lastmod>2026-01-15T11:52:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/02/27/picoctf-where-are-the-robots-ctf-write-up/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2024/02/hack-3671982.jpg</image:loc><image:title>hack-3671982</image:title></image:image><lastmod>2026-01-15T11:52:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/03/04/picoctf-get-ahead-ctf-write-up/</loc><lastmod>2026-01-15T11:52:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/03/08/picoctf-cookies-ctf-write-up/</loc><lastmod>2026-01-15T11:52:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/03/19/picoctf-the-numbers-ctf-write-up/</loc><lastmod>2026-01-15T11:52:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/04/%f0%9f%a9%b9-you-can-have-the-best-security-if-your-habits-are-trash/</loc><lastmod>2026-01-15T11:50:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/10/stay-sharp-or-fade-the-relentless-need-for-daily-learning-in-cybersecurity/</loc><lastmod>2026-01-15T11:50:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/13/%f0%9f%a4%a1-cybersecurity-isnt-a-fad-its-a-fight/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/04/cyber_viking_03.jpeg</image:loc><image:title>cyber_viking_03</image:title></image:image><lastmod>2026-01-15T11:50:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/18/%e2%9a%99%ef%b8%8f-the-deadswitch-way-emacs-org-mode-and-the-art-of-ansible-rolecraft/</loc><lastmod>2026-01-15T11:50:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/22/%e2%9a%99%ef%b8%8f-how-to-build-a-team-that-doesnt-need-a-coach/</loc><lastmod>2026-01-15T11:49:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/29/how-to-make-meetings-work-again-the-deadswitch-way/</loc><lastmod>2026-01-15T11:49:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/04/recon-is-ritual-mapping-the-digital-terrain-before-the-hunt/</loc><lastmod>2026-01-15T11:49:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/06/living-off-the-land-how-hackers-use-your-tools-against-you/</loc><lastmod>2026-01-15T11:49:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/08/when-borders-burn-a-technologists-field-guide-to-conflict-readiness/</loc><lastmod>2026-01-15T11:49:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/09/why-the-cfo-and-the-ciso-speak-different-languages-and-why-it-can-cost-you-everything/</loc><lastmod>2026-01-15T11:49:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/13/how-to-speak-cyber-in-the-c-suite-a-tactical-guide-for-security-architects/</loc><lastmod>2026-01-15T11:49:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/13/what-is-a-ciso-is-a-virtual-ciso-a-real-solution/</loc><lastmod>2026-01-15T11:49:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/14/deadswitch-hacking-mindset-the-psychology-of-phishing-why-even-smart-people-click/</loc><lastmod>2026-01-15T11:49:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/15/ghostwriting-with-the-machine-a-deep-dive-into-human-ai-cooperation/</loc><lastmod>2026-01-15T11:49:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/06/19/cybersecurity-isnt-just-tech-its-living-the-ghost-life/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/06/forest_hacking_08.jpeg</image:loc><image:title>forest_hacking_08</image:title></image:image><lastmod>2026-01-15T11:49:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/07/16/vulnerabilities-included-vibe-coding-security/</loc><lastmod>2026-01-15T11:49:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/08/01/org-mode-latex-study-physics-like-a-ghost-operator/</loc><lastmod>2026-01-15T11:49:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/08/07/ghost-logs-the-journalctl/</loc><lastmod>2026-01-15T11:49:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/10/20/architects-are-not-promotions-theyre-mindsets/</loc><lastmod>2026-01-15T11:49:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/11/06/understanding-osint-the-first-step-in-cyber-security-reconnaissance/</loc><lastmod>2026-01-15T11:48:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/11/13/the-art-of-osint-locating-where-a-photo-was-taken/</loc><lastmod>2026-01-15T11:48:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/11/16/why-hiring-an-osint-professional-is-a-smart-move-for-online-investigations-and-background-checks/</loc><lastmod>2026-01-15T11:48:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/11/18/enhancing-security-hiring-a-penetration-tester/</loc><lastmod>2026-01-15T11:48:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/11/20/penetration-testing-linux-servers-with-hydra-for-ssh-login/</loc><lastmod>2026-01-15T11:48:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/12/11/osint-for-social-media-investigations-gathering-information-about-individuals/</loc><lastmod>2026-01-15T11:48:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/01/01/using-john-the-ripper-to-find-weak-passwords-in-linux-systems-penetration-testing/</loc><lastmod>2026-01-15T11:47:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/08/inside-the-mind-of-a-hacker/</loc><lastmod>2026-01-15T11:47:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/11/shell-scripts-in-emacs-the-cyber-ghosts-shortcut-to-flow/</loc><lastmod>2026-01-15T11:47:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/20/the-art-of-privilege/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/05/hacker_vibe_01.jpeg</image:loc><image:title>hacker_vibe_01</image:title></image:image><lastmod>2026-01-15T11:47:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/30/deadswitch-ethical-hacking-rules-of-the-game/</loc><lastmod>2026-01-15T11:47:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/06/04/deadswitch-ethical-hacking-signals-in-the-static/</loc><lastmod>2026-01-15T11:47:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/06/09/deadswitch-ethical-hacking-pulse-echoes-active-recon/</loc><lastmod>2026-01-15T11:47:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/06/13/command-and-control-the-whisper-net-of-cyber-intruders/</loc><lastmod>2026-01-15T11:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/10/17/cybersecurity-is-a-battlefield/</loc><lastmod>2026-01-15T11:47:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/08/whispers-in-the-wire-cybersecurity-for-small-businesses-in-a-world-of-big-threats/</loc><lastmod>2026-01-15T11:46:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/09/%f0%9f%8d%b2-daemon-soup-the-cybersecurity-tiers-of-small-businesses/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/04/ghost3.jpeg</image:loc><image:title>ghost3</image:title></image:image><lastmod>2026-01-15T11:46:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/10/%f0%9f%94%90-password-hygiene-rotating-the-wardrobe-of-digital-defense/</loc><lastmod>2026-01-15T11:46:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/11/%f0%9f%95%af%ef%b8%8f-behind-the-code-why-open-source-matters-for-small-business-survival/</loc><lastmod>2026-01-15T11:46:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/21/%f0%9f%95%b8%ef%b8%8f-echoes-beyond-the-grid-private-team-collaboration-tools-for-small-business/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/04/blue_neon_anon_mask_3.jpeg</image:loc><image:title>blue_neon_anon_mask_3</image:title></image:image><lastmod>2026-01-15T11:46:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/26/%f0%9f%95%af%ef%b8%8f-tools-from-the-silence-open-source-weapons-for-small-business-security/</loc><lastmod>2026-01-15T11:46:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/27/opsec-mastery-tools-for-the-silent-revolution/</loc><lastmod>2026-01-15T11:46:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/28/your-totp-is-not-a-second-factor-if-you-store-it-wrong/</loc><lastmod>2026-01-15T11:46:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/01/deadswitch-dispatch-open-source-or-die/</loc><lastmod>2026-01-15T11:46:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/03/%f0%9f%93%a7-the-silent-channel-privacy-focused-email-for-small-businesses/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/04/blue_neon_anon_mask_1.jpeg</image:loc><image:title>blue_neon_anon_mask_1</image:title></image:image><lastmod>2026-01-15T11:46:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/07/deadswitch-dispatch-the-open-source-arsenal/</loc><lastmod>2026-01-15T11:45:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/16/the-ciphered-mind-encrypted-journaling-with-org-mode/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/05/viking_in_storm_01.jpeg</image:loc><image:title>viking_in_storm_01</image:title></image:image><lastmod>2026-01-15T11:45:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/21/deadswitch-security-vpns-wont-save-you/</loc><lastmod>2026-01-15T11:45:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/27/deadswitch-security-persistence-is-futile-unless-you-never-get-detected/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/05/last_of_us_03.jpeg</image:loc><image:title>last_of_us_03</image:title></image:image><lastmod>2026-01-15T11:45:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/06/23/full-anonymity-is-it-reality/</loc><lastmod>2026-01-15T11:45:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/07/02/exit-the-tracing-trap-quit-surveillance/</loc><lastmod>2026-01-15T11:45:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/07/28/breadcrumbs-in-the-wire-why-opsec-is-important/</loc><lastmod>2026-01-15T11:45:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/08/04/privacy-focused-life-you-dont-have-to-disappear/</loc><lastmod>2026-01-15T11:45:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/10/07/private-matrix-synapse-server-for-smes-silence-in-motion/</loc><lastmod>2026-01-15T11:45:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/10/15/privacy-isnt-hiding-its-choosing/</loc><lastmod>2026-01-15T11:45:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/services/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/04/cyberghost_green_viking02.jpeg</image:loc><image:title>cyberghost_green_viking02</image:title></image:image><lastmod>2025-11-25T12:48:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tomsitcafe.com/2025/04/09/%f0%9f%95%b6%ef%b8%8f-inside-the-silence-the-daemon-watches-you/</loc><lastmod>2025-10-29T09:57:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/04/18/%f0%9f%a7%8a-deadswitch-technical-dispatch-fortify-the-flow-proxy-frontlines-the-truth-in-certificates/</loc><lastmod>2025-10-29T09:57:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/02/%f0%9f%9b%a1%ef%b8%8f-building-a-segmented-secure-multi-container-application-with-podman/</loc><lastmod>2025-10-29T09:56:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/05/22/foss-endpoint-protection-for-tiny-teams/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/05/hacker_vibe_02.jpeg</image:loc><image:title>hacker_vibe_02</image:title></image:image><lastmod>2025-10-29T09:56:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/10/01/ansible-with-sops-secret-handling-on-ghost-level/</loc><lastmod>2025-10-29T09:55:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/10/22/backups-the-silent-power-of-resurrection/</loc><lastmod>2025-10-29T09:55:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/11/04/systemd-by-example-what-actually-happens-when-you-type-systemctl-restart-nginx/</loc><lastmod>2025-10-28T10:07:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/10/28/the-forgotten-basics-why-ps-grep-and-awk-still-beat-fancy-tools/</loc><lastmod>2025-10-28T09:42:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/09/24/09-ghost-operations-the-final-blades/</loc><lastmod>2025-09-24T11:55:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/09/17/08-objective-encrypt-the-silence-ansible-vault/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/09/08-ansible.jpeg</image:loc><image:title>08-ansible</image:title></image:image><lastmod>2025-09-17T05:42:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/09/15/07-objective-reusability-and-doctrine-roles/</loc><lastmod>2025-09-15T07:30:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/09/12/06-objective-orchestrated-strikes-playbooks/</loc><lastmod>2025-09-12T06:12:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/09/04/05-objective-code-as-message-jinja2-templates/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/08/05-ansible.jpeg</image:loc><image:title>05-ansible</image:title></image:image><lastmod>2025-09-04T06:05:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/09/01/04-objective-fluid-intelligence-variables/</loc><lastmod>2025-09-01T10:15:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/08/29/03-objective-execution-vectors-modules-tasks/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/08/04-ansible.jpeg</image:loc><image:title>04-ansible</image:title></image:image><lastmod>2025-08-29T08:05:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/privacy-cookie-policy/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/04/cyberghost_green_viking04.jpeg</image:loc><image:title>cyberghost_green_viking04</image:title></image:image><lastmod>2025-08-28T14:08:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tomsitcafe.com/2025/08/28/02-objective-whispers-to-hosts-inventories/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/08/02-ansible.jpeg</image:loc><image:title>02-ansible</image:title></image:image><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/08/03-ansible.jpeg</image:loc><image:title>03-ansible</image:title></image:image><lastmod>2025-08-28T12:08:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/08/27/01-objective-forge-the-blade-deploy-and-configure/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/08/01-ansible.jpeg</image:loc><image:title>01-ansible</image:title></image:image><lastmod>2025-08-27T14:59:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/08/26/00-the-special-forces-of-operations-ansible-tactical-training/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/08/00-ansible.jpeg</image:loc><image:title>00-ansible</image:title></image:image><lastmod>2025-08-26T19:05:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/08/20/the-exploit-of-the-mind-social-engineering/</loc><lastmod>2025-08-19T07:14:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/contact/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2025/04/cyberghost_green_viking03.jpeg</image:loc><image:title>cyberghost_green_viking03</image:title></image:image><lastmod>2025-06-24T14:52:44+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tomsitcafe.com/2025/06/20/the-phantom-sop/</loc><lastmod>2025-06-24T14:25:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2025/07/18/kill-your-browser-how-chromium-based-browsers-are-mapping-your-mind/</loc><lastmod>2025-06-23T14:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/11/23/why-business-owners-need-strong-passwords-and-two-factor-authentication-2fa/</loc><lastmod>2024-11-12T10:21:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/07/09/kvm-storage-support-and-features/</loc><lastmod>2024-07-05T06:42:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/05/07/ansible-basics-11-blocks/</loc><lastmod>2024-05-07T08:21:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/04/16/ansible-basics-05-playbooks/</loc><lastmod>2024-04-16T05:31:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/04/11/ansible-basics-04-the-inventories/</loc><lastmod>2024-04-08T17:58:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/04/04/ansible-basics-02-installing-ansible/</loc><lastmod>2024-04-08T07:14:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/04/02/ansible-basics-01-automation-configuration-management-infrastructure-as-code/</loc><image:image><image:loc>https://tomsitcafe.com/wp-content/uploads/2024/03/ansible_basics-3.jpg</image:loc><image:title>ansible_basics</image:title></image:image><lastmod>2024-04-08T07:07:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/2024/04/09/ansible-basics-03-running-ad-hoc-commands/</loc><lastmod>2024-04-03T08:16:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tomsitcafe.com/blog/</loc><lastmod>2022-01-05T18:44:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tomsitcafe.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-04-03T16:45:01+00:00</lastmod></url></urlset>
