<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.threatforward.com/2014/07/07/is-it-art-or-is-it-craft/</loc><lastmod>2014-07-07T11:09:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2014/05/30/a-safe-that-dispenses-cash-on-command/</loc><lastmod>2014-05-30T16:23:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2014/05/21/nuff-said/</loc><image:image><image:loc>https://blog.threatforward.com/wp-content/uploads/2014/05/aitel1.jpg</image:loc><image:title>aitel1</image:title></image:image><lastmod>2014-05-21T20:21:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2014/05/19/regulating-vulnerability-markets-one/</loc><lastmod>2014-05-21T20:17:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2014/04/15/nows-the-time/</loc><lastmod>2014-04-15T12:18:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2013/02/12/no-reader-is-trustworthy/</loc><lastmod>2013-02-12T04:35:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2012/11/22/thanksgiving-advice-to-the-nation/</loc><lastmod>2012-11-22T18:02:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2012/11/20/the-hammer-falls/</loc><lastmod>2012-11-20T22:08:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2012/10/16/i-dont-share-your-greed/</loc><image:image><image:loc>https://blog.threatforward.com/wp-content/uploads/2012/10/aos.jpg</image:loc><image:title>AoS</image:title></image:image><lastmod>2012-10-16T15:20:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2012/08/07/sap-believes-this-case-has-gone-on-long-enough/</loc><lastmod>2012-08-07T11:39:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2011/12/15/the-customer-comes-first-at-oracle/</loc><lastmod>2011-12-15T16:32:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2011/09/01/blast-from-the-past/</loc><lastmod>2011-09-01T21:24:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2011/06/07/so-when-did-rsa-start-shipping-your-replacement-tokens/</loc><lastmod>2011-06-07T13:56:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2011/03/30/rogue-ca-risk/</loc><lastmod>2011-03-30T22:13:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2011/03/20/rsa-3/</loc><lastmod>2011-03-20T18:32:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2011/03/18/rsa-schadenfreude-2/</loc><lastmod>2011-03-18T20:55:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2011/03/18/rsa-schadenfreude-1/</loc><lastmod>2011-03-18T17:58:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2011/01/24/wasnt-lies-it-was-just/</loc><lastmod>2011-01-24T21:47:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2011/01/12/it-will-come-to-an-end/</loc><lastmod>2011-01-12T23:40:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2011/01/06/yes-those-are-four-mistakes-you-will-make-in-2011/</loc><lastmod>2011-01-06T18:52:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/12/31/number-2-the-equivalency-trap/</loc><lastmod>2010-12-31T18:44:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/12/31/number-3-all-or-nothing/</loc><lastmod>2010-12-31T18:33:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/12/30/im-in-the-wrong-country-this-week/</loc><lastmod>2011-01-12T04:49:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/12/08/the-eye-of-the-enemy-is-gazing-upon-static-proximity-cards/</loc><lastmod>2010-12-30T17:11:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/12/29/number-1-the-hubris-of-prediction/</loc><lastmod>2010-12-29T16:23:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/12/29/number-4-settled-for-all-time/</loc><lastmod>2010-12-29T16:01:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/09/02/good-help-is-so-hard-to-find/</loc><lastmod>2010-09-02T01:06:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/08/24/scanners-what-are-they-good-for/</loc><lastmod>2010-08-24T03:18:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/08/22/sad-embloggened-world/</loc><lastmod>2010-08-22T19:02:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/06/14/we-were-just-trying-to-make-logging-in-easier/</loc><lastmod>2010-06-14T13:18:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/06/10/told-ya-so-probably-not/</loc><lastmod>2010-06-10T01:36:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/06/08/no-comment-on-lamo-and-manning/</loc><lastmod>2010-06-08T03:37:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/05/21/pgp-and-verisign-thats-disturbing/</loc><lastmod>2010-05-21T01:32:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/03/23/oracle-is-acting-rationally/</loc><lastmod>2010-03-23T22:38:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/03/12/access-control-in-real-life/</loc><lastmod>2010-03-23T18:09:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/03/10/revisiting-python/</loc><lastmod>2010-03-10T02:50:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/03/06/mifare-1k-cards-in/</loc><image:image><image:loc>https://blog.threatforward.com/wp-content/uploads/2010/03/mifare1k.jpg</image:loc><image:title>Mifare1K</image:title></image:image><image:image><image:loc>https://blog.threatforward.com/wp-content/uploads/2010/03/mifarechip.jpg</image:loc><image:title>MifareChip</image:title></image:image><lastmod>2010-03-06T22:10:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/03/02/cards-side-by-side/</loc><image:image><image:loc>https://blog.threatforward.com/wp-content/uploads/2010/03/cards1.jpg</image:loc><image:title>Proxcards</image:title></image:image><image:image><image:loc>https://blog.threatforward.com/wp-content/uploads/2010/03/cards2.jpg</image:loc><image:title>Proxcard thickness</image:title></image:image><lastmod>2010-03-02T15:29:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/03/02/hid-omnikey-customer-service-proves-me-wrong/</loc><lastmod>2010-03-02T15:03:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/02/28/the-omnikey-5321-usb/</loc><lastmod>2010-03-05T15:06:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/02/26/why-static-proximity-cards-are-dangerous/</loc><lastmod>2010-02-26T21:51:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com/2010/02/26/proximity-card-answers/</loc><lastmod>2010-02-26T19:13:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.threatforward.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2014-07-07T11:09:17+00:00</lastmod></url></urlset>
