<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//yght.devbyfuture.co.uk/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/infosec-europe-2012-review/</loc>
		<lastmod>2012-04-30T14:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-pillars-of-security/</loc>
		<lastmod>2012-05-04T21:08:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/computer-screen-privacy-filter/</loc>
		<lastmod>2012-05-11T19:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/pirate-bay-ddos-attack-and-freedom-of-speech/</loc>
		<lastmod>2012-05-18T16:07:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/firefoxsso/</loc>
		<lastmod>2012-05-25T11:26:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/dont-forget-the-smallest-single-points-of-failure-fuse-melted/</loc>
		<lastmod>2012-05-25T14:03:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/mozilla-firefox-single-sign-on/</loc>
		<lastmod>2012-05-28T11:06:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/uk-document-security-classifications/</loc>
		<lastmod>2012-05-30T11:09:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/encryption-as-a-munition/</loc>
		<lastmod>2012-06-01T13:38:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/general-principals-of-access-control/</loc>
		<lastmod>2012-06-02T15:32:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/information-classification-characteristics/</loc>
		<lastmod>2012-06-04T18:17:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/access-control-requirements/</loc>
		<lastmod>2012-06-06T12:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/linkedin-password-breach/</loc>
		<lastmod>2012-06-07T09:08:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/access-control-categories/</loc>
		<lastmod>2012-06-08T16:49:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/access-control-types-administrative-control/</loc>
		<lastmod>2012-06-09T17:52:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/access-control-types-technical-and-physical-controls/</loc>
		<lastmod>2012-06-10T19:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/security-vulnerability-in-mysql-mariadb-sql-password-c/</loc>
		<lastmod>2012-06-11T10:35:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/identification-authentication-and-authorisation/</loc>
		<lastmod>2012-06-11T16:31:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/overview-of-biometrics/</loc>
		<lastmod>2012-06-12T16:32:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/importance-of-accountability-and-logging/</loc>
		<lastmod>2012-06-13T16:32:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/what-is-vulnerability-assessment-a-step-by-step-guide/</loc>
		<lastmod>2012-06-16T09:56:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/what-is-penetration-testing-and-the-different-characteristics/</loc>
		<lastmod>2012-06-17T22:33:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-characteristics-of-identity-management/</loc>
		<lastmod>2012-06-18T22:10:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/password-account-and-profile-management/</loc>
		<lastmod>2012-06-19T10:26:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/company-directories-and-identity-management/</loc>
		<lastmod>2012-06-20T20:11:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/what-does-single-sign-on-mean-technologies-of-single-sign-on/</loc>
		<lastmod>2012-06-21T10:19:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/what-are-the-different-types-of-data-access-controls/</loc>
		<lastmod>2012-06-22T22:53:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/intrusion-detection-and-intrusion-prevention-systems/</loc>
		<lastmod>2012-06-23T20:54:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/unauthorised-access-what-are-access-control-threats/</loc>
		<lastmod>2012-06-24T17:54:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/programming-concepts-and-protection/</loc>
		<lastmod>2012-09-01T14:15:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/sophos-kills-itself-shh-updater-b/</loc>
		<lastmod>2012-09-20T13:37:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/discovering-security-vulnerabilities-and-what-to-do/</loc>
		<lastmod>2012-09-20T22:10:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/busy-couple-of-months/</loc>
		<lastmod>2012-11-27T15:16:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/openvz-farm-management-database/</loc>
		<lastmod>2013-02-11T23:07:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/vzmanagement-tools-v1-tar/</loc>
		<lastmod>2013-02-11T23:07:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/how-qrcodes-can-be-used-for-a-cyber-attack-social-experiment/</loc>
		<lastmod>2013-03-10T23:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/did-you-log-into-facebook-from-somewhere-new/</loc>
		<lastmod>2013-03-28T18:21:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/mail-server-mis-behaving-because-of-deprecated-rbl/</loc>
		<lastmod>2013-05-20T16:17:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/spam-email-in-french/</loc>
		<lastmod>2013-06-15T16:48:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/security-friction-point-a-definition/</loc>
		<lastmod>2013-06-21T13:52:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/is-an-apt-attack-what-an-apt-attack-was/</loc>
		<lastmod>2013-07-22T19:30:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/how-do-i-test-for-bad-cookie-attributes/</loc>
		<lastmod>2013-07-25T15:17:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/how-do-i-test-for-bad-ssl-and-tls-implementations/</loc>
		<lastmod>2013-07-26T09:20:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/what-is-aad3b435b51404eeaad3b435b51404ee/</loc>
		<lastmod>2013-07-26T15:10:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/how-do-i-test-for-weak-passwords-hashes/</loc>
		<lastmod>2013-07-26T21:36:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/losing-a-bag-in-a-train-station-security-failure/</loc>
		<lastmod>2013-09-03T08:19:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/a-tool-to-continually-ping-tcp-ports-nmap-ping/</loc>
		<lastmod>2013-09-25T15:21:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/getting-sqlmap-to-detect-sql-injection-points-through-json/</loc>
		<lastmod>2014-02-02T13:12:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/nhs-summary-care-records-and-secondary-uses/</loc>
		<lastmod>2014-05-05T17:30:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/airmon-ng-alfa-usb-wireless-card-virtual-box-unstable/</loc>
		<lastmod>2015-07-22T09:37:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/assorted-pen-test-scripts-ikevpnmodes-sh/</loc>
		<lastmod>2015-08-06T22:22:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/smbexec-2-0-and-cracking-domain-cached-credentials-on-oclhashcat/</loc>
		<lastmod>2015-10-02T09:22:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/characteristics-of-http-public-key-pinning-hpkp/</loc>
		<lastmod>2015-12-31T19:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/95-rules-of-cyber-warfare-tallinn-manual-1-0-a-complete-list/</loc>
		<lastmod>2016-02-10T14:35:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/creating-a-new-child-domain-microsoft-windows-2016-server/</loc>
		<lastmod>2017-07-14T22:36:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/howtoactuallyattackcomputersatcafes/</loc>
		<lastmod>2018-07-02T22:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/conference-talk-london-2018-how-to-attack-computers-at-cafes/</loc>
		<lastmod>2018-07-02T23:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/custom-adhesive-backed-laser-cut-privacy-screens-for-laptops/</loc>
		<lastmod>2018-09-10T17:18:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/virtualbox-guest-additions-with-screen-resizing/</loc>
		<lastmod>2018-10-11T15:48:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/javascript-event-handlers-a-complete-list/</loc>
		<lastmod>2019-06-10T16:23:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/athom-homey-security-review-transmits-unencrypted-wifi-credentials-cve-2020-9462/</loc>
		<lastmod>2020-05-24T00:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/info-graphic_databreach/</loc>
		<lastmod>2020-08-06T15:33:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/info-graphic_databreach-1/</loc>
		<lastmod>2020-08-06T15:33:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/info-graphic_databreach-2/</loc>
		<lastmod>2020-08-06T16:54:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/how-we-got-our-name/</loc>
		<lastmod>2020-08-13T18:03:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/7-facts-about-data-breaches-infographic/</loc>
		<lastmod>2020-08-13T18:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/screenshot-virtualbox/</loc>
		<lastmod>2020-09-17T17:42:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/s/</loc>
		<lastmod>2020-09-17T17:42:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/search-engine-result-page-of-virtualbox-guest-additions-with-screen-resize/</loc>
		<lastmod>2020-09-17T17:42:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/virtualbox-guest-additions-does-not-screen-resize/</loc>
		<lastmod>2020-09-17T17:52:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/virtualbox-guest-additions-does-not-screen-resize-1/</loc>
		<lastmod>2020-09-17T17:54:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/image/</loc>
		<lastmod>2020-09-18T11:10:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/screenshot_from_protectionfilms24-com/</loc>
		<lastmod>2020-09-18T12:38:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/screenshot_from_protectionfilms24-com-1/</loc>
		<lastmod>2020-09-18T12:38:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/screenshot_from_protectionfilms24-com_select_privacy_screen_for_device/</loc>
		<lastmod>2020-09-18T12:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/screenshot_from_protectionfilms24-com_select_privacy_screen_for_a_brand/</loc>
		<lastmod>2020-09-18T12:47:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/screenshot_from_-protectionfilms24-com_choosing_the_right_dimensions/</loc>
		<lastmod>2020-09-18T13:06:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/proxycannon-revival-a-tool-for-ips-evasion/</loc>
		<lastmod>2021-02-22T11:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/zigbee-killerbee/</loc>
		<lastmod>2021-03-09T16:41:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/zigbeesniffarray/</loc>
		<lastmod>2021-03-09T16:47:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/zigbee-globalkeyinstallation/</loc>
		<lastmod>2021-03-09T16:48:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/zigbee-encryptedkeyexchange-part2/</loc>
		<lastmod>2021-03-09T16:48:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/zigbee-decryptedkeyexchange-part2/</loc>
		<lastmod>2021-03-09T16:49:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/athom-homey-security-static-and-well-known-keys-cve-2020-28952/</loc>
		<lastmod>2021-03-09T17:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/beaglebone-nu-map-and-preparing-for-usb-fuzzing/</loc>
		<lastmod>2021-07-29T15:38:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/web-application-penetration-testing-with-source-maps/</loc>
		<lastmod>2022-01-19T12:38:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/source-mapper-burp-plugin/</loc>
		<lastmod>2022-02-21T10:52:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/postmark-and-encrypted-emails/</loc>
		<lastmod>2022-09-21T16:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-smart-meters/</loc>
		<lastmod>2023-01-26T02:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-domestic-solar-power-systems/</loc>
		<lastmod>2023-02-01T02:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/delayed-attacks-against-realtek-chips-youll-find-everywhere/</loc>
		<lastmod>2023-02-08T02:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-smart-plugs/</loc>
		<lastmod>2023-02-15T02:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/source-mapper-v1-2-released/</loc>
		<lastmod>2023-02-20T21:26:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-building-management-systems-bmss/</loc>
		<lastmod>2023-02-22T02:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-rfid-door-locks/</loc>
		<lastmod>2023-03-01T02:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-lifts-and-elevators/</loc>
		<lastmod>2023-03-08T02:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-fire-detection-and-response-systems/</loc>
		<lastmod>2023-03-15T02:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/new-burp-extension-look-over-there/</loc>
		<lastmod>2023-03-31T09:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/list-of-all-http-content-type-mime-types/</loc>
		<lastmod>2023-08-16T11:08:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/source-mapper-v1-3-released/</loc>
		<lastmod>2024-02-27T11:33:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-trains-and-railways/</loc>
		<lastmod>2024-08-29T10:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-cars/</loc>
		<lastmod>2024-08-29T10:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/solax-inverters-pocket-wifi-using-poor-authentication/</loc>
		<lastmod>2024-08-29T10:29:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-prosthetics/</loc>
		<lastmod>2024-08-29T10:30:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-medical-imaging-devices/</loc>
		<lastmod>2024-08-29T10:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-wearable-tech/</loc>
		<lastmod>2024-08-29T10:30:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-continuous-glucose-monitors-gcms/</loc>
		<lastmod>2024-08-29T10:31:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-insulin-pumps/</loc>
		<lastmod>2024-08-29T10:31:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-pacemakers/</loc>
		<lastmod>2024-08-29T10:32:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-iot-and-embedded-systems-penetration-testing-process/</loc>
		<lastmod>2024-08-29T10:32:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-cctv-systems/</loc>
		<lastmod>2024-08-29T10:33:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://yght.devbyfuture.co.uk/blog/the-security-behind-occupancy-sensors/</loc>
		<lastmod>2024-08-29T10:34:16+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->