<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://glamisonsecurity.com/chi-sono/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2011/03/sp.jpg</image:loc><image:title>Federico</image:title></image:image><lastmod>2022-02-10T14:25:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://glamisonsecurity.com/2016/02/22/apre-il-museo-del-malware/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2016/02/00_coverscreenshot.jpg</image:loc><image:title>00_coverscreenshot</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2016/02/malware_centiped-com.gif</image:loc><image:title>malware_centiped-com</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2016/02/malware_flame-com_screenshot.gif</image:loc><image:title>malware_flame-com_screenshot</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2016/02/mmuseum.jpg</image:loc><image:title>mmuseum</image:title></image:image><lastmod>2016-02-26T10:51:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2014/09/16/lintelligence-italiana-usa-finfisher/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/09/finspy-customer-86.png</image:loc><image:title>finspy customer 86</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/09/finspy-italy-license.png</image:loc><image:title>finspy italy license</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/09/finspy-italian-error.png</image:loc><image:title>finspy italian error</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/09/italy-finfisher.png</image:loc><image:title>italy finfisher</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/09/finfisher-egitto1.png</image:loc><image:title>finfisher egitto</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/09/finfisher-egitto.png</image:loc><image:title>finfisher egitto</image:title></image:image><lastmod>2015-07-02T08:46:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2015/06/22/security-by-design-una-dolorosa-lesson-learned/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2015/06/lastpass-errors.jpg</image:loc><image:title>lastpass errors</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2015/06/sophos-salt.jpg</image:loc><image:title>sophos salt</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2015/06/lastpass-security.jpg</image:loc><image:title>lastpass security</image:title></image:image><lastmod>2015-06-25T12:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2015/06/03/la-falsa-sensazione-di-sicurezza/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2015/06/tsafail.jpg</image:loc><image:title>tsafail</image:title></image:image><lastmod>2015-06-20T09:13:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2015/05/08/il-valore-del-cybercrime/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2015/05/blackmarketprice.png</image:loc><image:title>blackmarketprice</image:title></image:image><lastmod>2015-06-03T13:05:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2015/04/01/la-sicurezza-e-un-trade-off-anche-in-volo/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2015/04/scatola-nera.jpg</image:loc><image:title>scatola nera</image:title></image:image><lastmod>2015-06-03T13:04:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/02/29/quando-lintelligence-si-rivolta-contro/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/02/screenshot-31.jpg</image:loc><image:title>osint email</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/02/screenshot-3.jpg</image:loc><image:title>osint email</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/02/screenshot-2.jpg</image:loc><image:title>151.13.11 on Robtex</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/02/screenshot-1.jpg</image:loc><image:title>stratfor dazzlepod</image:title></image:image><lastmod>2015-07-13T12:20:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2014/08/19/i-pericoli-della-localizzazione/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/08/foxit-english.png</image:loc><image:title>foxit english</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/08/foxit-french.png</image:loc><image:title>foxit french</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/08/foxit-italian.png</image:loc><image:title>foxit italian</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/08/foxit-reader.png</image:loc><image:title>foxit reader</image:title></image:image><lastmod>2014-08-19T15:36:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2014/07/07/per-la-nato-la-cyberwar-e-come-un-atto-di-guerra-reale/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/07/pianociber.png</image:loc><image:title>pianociber</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/07/ccdcoe.png</image:loc><image:title>ccdcoe</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/07/pla-cyber.jpg</image:loc><image:title>pla-cyber</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/07/zdnetnato.png</image:loc><image:title>zdnetnato</image:title></image:image><lastmod>2014-07-07T07:22:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2014/05/12/obamacare-e-il-cybercrime/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/05/screenshot-1.png</image:loc><image:title>obamacare</image:title></image:image><lastmod>2014-05-12T07:56:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2014/02/25/per-apple-la-vulnerabilita-stavolta-e-vera-e-grave/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/02/screenshot-2.jpg</image:loc><image:title>SSL ERROR</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2014/02/screenshot-1.jpg</image:loc><image:title>Apple sslKeyExchange.c   </image:title></image:image><lastmod>2014-02-25T11:31:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2014/02/17/vulnerabilita-vere-e-presunte-un-esempio/</loc><lastmod>2014-02-17T17:23:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2013/11/29/scambi-la-tua-sicurezza-per-un-po-di-cioccolata/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/11/screenshot-2.jpg</image:loc><image:title>Ikea carta di credito</image:title></image:image><lastmod>2013-11-29T13:12:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2013/11/13/policy-di-sicurezza/</loc><lastmod>2013-11-13T15:03:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2013/10/04/paperino-e-i-perfidi-hacker-di-unknown/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/10/cyber-soldier.jpg</image:loc><image:title>Cyber-Soldier</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/10/tipihackertopo.jpg</image:loc><image:title>Tipi hacker</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/10/hackertopo.jpg</image:loc><image:title>Hacker Topolino</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/10/unknown.jpg</image:loc><image:title>Gli hacktivst di Unknown</image:title><image:caption>Cliccate per ingrandire.</image:caption></image:image><lastmod>2013-10-04T21:11:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2013/09/11/difendere-la-privacy-e-possibile/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/09/streetview.jpg</image:loc><image:title>Google Streetview</image:title><image:caption>L'Europa su Google Streetview  - Cliccate per ingrandire</image:caption></image:image><lastmod>2013-09-11T13:04:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2013/08/28/gli-hacktivist-e-la-guerra-in-siria/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/08/lulztor.jpg</image:loc><image:title>lulztor</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/08/lulz.jpg</image:loc><image:title>lulz</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/08/lulzjihad.jpg</image:loc><image:title>lulzjihad</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/08/clueleysyria.jpg</image:loc><image:title>clueleysyria</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/08/nytsea.jpg</image:loc><image:title>nytsea</image:title></image:image><lastmod>2013-09-03T12:50:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2013/03/26/autenticazione-a-due-fattori-perche-e-importante-e-come-usarla/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/03/screenshot-13.png</image:loc><image:title>screenshot.13</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/03/screenshot-12.jpg</image:loc><image:title>screenshot.12</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/03/screenshot-11.jpg</image:loc><image:title>screenshot.11</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/03/screenshot-10.jpg</image:loc><image:title>screenshot.10</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/03/screenshot-9.jpg</image:loc><image:title>screenshot.9</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/03/screenshot-8.jpg</image:loc><image:title>screenshot.8</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/03/screenshot-5.jpg</image:loc><image:title>screenshot.5</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/03/screenshot-4.jpg</image:loc><image:title>screenshot.4</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/03/screenshot-3.jpg</image:loc><image:title>screenshot.3</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/03/screenshot-2.jpg</image:loc><image:title>screenshot.2</image:title></image:image><lastmod>2013-07-18T14:10:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2013/06/13/come-attivare-lautenticazione-a-due-fattori-su-linkedin-e-twitter/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/06/smscodes.jpg</image:loc><image:title>codici sms</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/06/linkedin-security-settings.jpg</image:loc><image:title>linkedin-security-settings</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/06/linkedin2fa.jpg</image:loc><image:title>Linkedin registra cellulare</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/06/twittercell.jpg</image:loc><image:title>Twitter registra cellulare</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/06/twittercodice.jpg</image:loc><image:title>Twitter richiedi codice di accesso</image:title></image:image><lastmod>2013-06-13T10:26:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2013/05/29/la-roba-microsoft-e-la-piu-bucata-ehm-quasi/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/05/screenshot-21.jpg</image:loc><image:title>Top 10 vendors </image:title><image:caption>Top	10	vendors	for	which	ZDI	&amp;	VCP	purchased	vulnerabilities	since	2001 - Fonte NSS Labs</image:caption></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/05/screenshot-2.jpg</image:loc><image:title>Top Vulnerabilities</image:title><image:caption>Top	10	vendors	with	highly	critical,	easy	to	exploit	vulnerabilities - Fonte NSS Labs</image:caption></image:image><lastmod>2013-06-03T12:30:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/pubblicazioni/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/03/coverpage_2.jpg</image:loc><image:title>ClubHack Magazione June 2012</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/03/hack9custom2.jpg</image:loc><image:title>Hakin9 Extra 4/12</image:title><image:caption>Hakin9 Extra 4/12</image:caption></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/03/hack9custom1.jpg</image:loc><image:title>hack9(Custom)</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/03/clubhack26-custom-custom1.jpg</image:loc><image:title>ClubHack Magazine 26</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/03/clubhack26-custom-custom.jpg</image:loc><image:title>clubhack26 (Custom) (Custom)</image:title></image:image><lastmod>2013-03-26T10:43:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://glamisonsecurity.com/2013/03/21/autenticazione-a-due-fattori-arti/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/03/chmag_cover-custom.jpg</image:loc><image:title>chmag_cover </image:title></image:image><lastmod>2013-03-21T10:15:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2013/02/22/altri-esempi-di-social-risk/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/02/fake-mcdonalds-poster1.jpg</image:loc><image:title>fake-mcdonalds-poster[1]</image:title><image:caption>Fonte Sophos Naked Security</image:caption></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/02/ht_burger_king_twitter_hack_1.jpg</image:loc><image:title>ht_burger_king_twitter_hack_[1]</image:title><image:caption>Fonte abc News</image:caption></image:image><lastmod>2013-02-22T10:10:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2013/02/05/qualche-nota-sullattacco-a-twitter/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2013/02/screenshot-5.jpg</image:loc><image:title>Twitter Keeping our users secure</image:title></image:image><lastmod>2013-02-05T09:09:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/12/24/ancora-su-signorotti-vassalli-e-cloud/</loc><lastmod>2012-12-24T12:56:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/12/13/se-la-sicurezza-la-garantisce-il-signorotto/</loc><lastmod>2012-12-24T12:07:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/11/12/seven-days-seven-candles/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/11/screenshot-11.png</image:loc><image:title>Prova gratis kindle</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/11/screenshot-1.png</image:loc><image:title>screenshot.1</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/11/seven-days-seven-candles-federico-filacchione.jpg</image:loc><image:title>seven-days-seven-candles-federico-filacchione</image:title></image:image><lastmod>2012-11-12T11:16:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/10/02/cosa-come-gestisce-social-risk/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/10/petland-google.png</image:loc><image:title>Ricerca Petland su Google Immagini</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/10/akron-petland-timeline.png</image:loc><image:title>Akron Petland Incident Timeline</image:title><image:caption>Fonte: Gartner</image:caption></image:image><lastmod>2012-10-11T16:45:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/04/12/ma-non-era-meglio-pensarci-prima/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/04/wolf.jpg</image:loc><image:title>Sono Wolf. Risolvo problemi.</image:title><image:caption>Sono Wolf. Risolvo problemi.</image:caption></image:image><lastmod>2012-10-02T13:28:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/spiegare-la-sicurezza/</loc><lastmod>2012-10-02T11:42:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://glamisonsecurity.com/2012/03/19/captcha-cosa-sono-e-come-usarli/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/03/image-3-e28093-yahoo-capctha-distorted-to-avoid-automatic-reading.jpg</image:loc><image:title>Figura 3 – CAPTCHA di Yahoo! distorto per evitare una lettura automatica.</image:title><image:caption>Figura 3 – CAPTCHA di Yahoo! distorto per evitare una lettura automatica.</image:caption></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/03/image-2-e28093-gmail-graphic-and-audio-captcha.jpg</image:loc><image:title>Figura 2 – CAPTCHA grafico e sonoro di Gmail</image:title><image:caption>Figura 2 – CAPTCHA grafico e sonoro utilizzato da Google per la registrazione a Gmail.</image:caption></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/03/image-1-e28093-yahoo-graphic-captcha.jpg</image:loc><image:title>Figura 1 –  Yahoo graphic CAPTCHA from Wikipedia</image:title></image:image><lastmod>2012-07-09T12:48:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/04/06/proteggi-la-tua-privacy-online-con-tor/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/04/screenshot-4.png</image:loc><image:title>Firefox Tor Portable</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/04/screenshot-3.png</image:loc><image:title>Vidalia Control Panel</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/04/screenshot-1.png</image:loc><image:title>Tor Browser Bundle</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/04/tor-onion-network.png</image:loc><image:title>TOR The Onion Network</image:title><image:caption>Electronic Frontier Foundation “How Tor Works” – licensed CC Attribution 3.0</image:caption></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/04/tor.png</image:loc><image:title>Tor</image:title></image:image><lastmod>2012-07-09T12:48:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/04/24/una-panoramica-sulla-cloud-forensics/</loc><lastmod>2012-07-09T12:47:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/06/27/giocare-sporco-anatomia-di-un-attacco-ddos-tramite-game-server/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/06/screenshot-1.jpg</image:loc><image:title>Quake 3 response</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/06/udp.jpg</image:loc><image:title>Fusso UDP di risposta</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/06/quake3.jpg</image:loc><image:title>Quake3 game server resposne</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/06/statusresponse3.jpg</image:loc><image:title>Quake 3 statusResponse</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/06/statusresponse2.jpg</image:loc><image:title>CoD statusResponse 2</image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/06/statusresponse.jpg</image:loc><image:title>CoD statusResponse </image:title></image:image><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/06/flood-scheme.jpg</image:loc><image:title>Game server DDoS Attack Flood Scheme</image:title><image:caption>Game server DDoS Attack Flood Scheme</image:caption></image:image><lastmod>2012-07-09T12:47:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/06/20/anatomia-di-un-attacco-via-game-server-articolo-su-clubhack-magazine/</loc><lastmod>2012-06-27T09:44:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/05/14/glamis-on-security-e-su-facebook/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/05/screenshot-2.jpg</image:loc><image:title>Glamis on Security è su Facebook!</image:title></image:image><lastmod>2012-05-14T14:05:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/02/07/mio-articolo-sui-captcha-su-hakin9/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/02/hackin9-201202.jpg</image:loc><image:title>Hackin9 issue 50 Cover</image:title><image:caption>CAPTCHAs, What They Are and How To Use Them su Hackin9 50.</image:caption></image:image><lastmod>2012-04-24T08:32:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/03/16/iniziare-ad-usare-tor-articolo-su-clubhack-magazine/</loc><lastmod>2012-04-24T08:32:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/04/17/una-panoramica-sulla-cloud-forensics-articolo-su-hakin9-extra/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/04/okladka-hakin9_extra-en.jpg</image:loc><image:title>Hakin9 Extra Cloud Forensics</image:title></image:image><lastmod>2012-04-24T08:32:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/05/30/la-compliance-forza-inarrestabile/</loc><lastmod>2012-04-12T08:53:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/03/10/spiegare-la-sicurezza-al-top-mangement/</loc><lastmod>2012-04-12T08:53:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/08/09/piccoli-hacker-crescono/</loc><lastmod>2012-04-10T20:01:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2012/03/14/non-e-andata-come-solito/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2012/03/screenshot-1.png</image:loc><image:title>Pwn2Own su Twitter</image:title></image:image><lastmod>2012-03-14T11:50:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/12/27/piccolo-post-di-fine-anno/</loc><lastmod>2011-12-27T14:08:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/07/20/volete-suicidarvi-online/</loc><lastmod>2011-07-20T10:59:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/04/29/siete-pronti/</loc><lastmod>2011-04-29T15:05:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/04/26/in-fondo-e-solo-un-rfc/</loc><lastmod>2011-04-26T09:49:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/04/18/e-tornato-il-ransomware/</loc><lastmod>2011-04-18T09:00:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/04/13/le-password-sono-una-cosa-seria/</loc><lastmod>2012-07-24T07:28:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/04/01/il-meglio-del-security-summit-2011/</loc><lastmod>2011-04-06T13:09:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/03/24/security-summit-2011-i-keynote/</loc><lastmod>2011-04-06T13:06:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/03/28/security-is-all-about-trust/</loc><lastmod>2011-03-28T11:25:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/03/22/e-alla-fine-caddero-entrambi/</loc><lastmod>2011-03-22T10:59:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/03/12/al-via-il-security-summit-2011/</loc><image:image><image:loc>https://glamisonsecurity.com/wp-content/uploads/2011/03/logo.jpg</image:loc><image:title>Logo Security Summit</image:title></image:image><lastmod>2011-03-12T08:18:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/03/08/gli-amici-non-lasciano-altri-amici-usare-ie6-e-qualche-considerazione-sui-problemi-di-sicurezza/</loc><lastmod>2011-03-08T13:44:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com/2011/03/07/il-pwn2own-non-spaventa-microsoft-forse/</loc><lastmod>2011-03-07T16:12:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://glamisonsecurity.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2022-02-10T14:25:14+00:00</lastmod></url></urlset>
