<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://thecipherjournal.org/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
<url>
<loc>https://thecipherjournal.org/</loc>
</url>
<url>
<loc>https://thecipherjournal.org/80211k-80211v-and-80211r-the-holy-trinity-of-roaming-standards/</loc>
<lastmod>2026-02-11T12:49:43+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/31/technology-6801334_1280.jpg</image:loc>
<image:title><![CDATA[A phone. a tablet and a laptop.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/31/infographic1.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/31/infographic2.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/a-practical-guide-to-ipv6/</loc>
<lastmod>2026-02-19T19:39:38+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/39/thedigitalartist-banner-5250178_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/39/ipv6_infographic.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/39/ipv6_infographic_types.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/about/</loc>
<lastmod>2026-02-16T16:19:44+00:00</lastmod>
</url>
<url>
<loc>https://thecipherjournal.org/analysing-entra-id-sign-in-logs-with-grafana/</loc>
<lastmod>2026-02-15T09:13:03+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/18/locations-2.png</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/18/test-success.png</image:loc>
<image:title><![CDATA[A successful test of the Azure Monitor data source]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/18/success-failure.png</image:loc>
<image:title><![CDATA[A graph of login activity over time.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/18/locations.png</image:loc>
<image:title><![CDATA[A map of login location data.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/18/legacy-authentication.png</image:loc>
<image:title><![CDATA[A visual of legacy authentication attempts.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/18/account-lockouts.png</image:loc>
<image:title><![CDATA[A visual showing account lockouts.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/18/mfa-methods.png</image:loc>
<image:title><![CDATA[A graph showing MFA methods.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/18/new-auth-method.png</image:loc>
<image:title><![CDATA[A visual showing new authentication method registrations.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/18/session-binding.png</image:loc>
<image:title><![CDATA[A visual showing a device session binding score.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/18/applications.png</image:loc>
<image:title><![CDATA[A visual showing application usage.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/18/app-consent.png</image:loc>
<image:title><![CDATA[A visual showing new account consents.]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/artificial-intelligence/</loc>
<lastmod>2026-01-20T14:32:22+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/26/artificial-intelligence-3706562_1280.jpg</image:loc>
<image:title><![CDATA[An AI generated image.]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/binary-converter/</loc>
<lastmod>2026-02-19T19:59:47+00:00</lastmod>
</url>
<url>
<loc>https://thecipherjournal.org/configuring-account-lockouts-in-entra-id-and-active-directory/</loc>
<lastmod>2026-02-15T09:12:34+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/30/door-1587863_1280.jpg</image:loc>
<image:title><![CDATA[A padlock.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/30/lockout_gpo.png</image:loc>
<image:title><![CDATA[The lockout settings in Group Policy editor.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/30/lockout_entra.png</image:loc>
<image:title><![CDATA[The lockout settings in Entra ID.]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/cracking-wpa2-wireless-with-kali-linux/</loc>
<lastmod>2026-01-14T08:38:25+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/1/4-3.png</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/1/2.png</image:loc>
<image:title><![CDATA[Output of airodump-ng command]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/1/3.png</image:loc>
<image:title><![CDATA[Handshake Capture Output]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/1/4-4.png</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/data-unit-converter/</loc>
<lastmod>2026-02-19T19:51:55+00:00</lastmod>
</url>
<url>
<loc>https://thecipherjournal.org/dhcp-fundamentals/</loc>
<lastmod>2026-02-19T09:14:55+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/45/computergottyt-switch-6955359_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/45/infographic_dhcp.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic.]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/disclaimer-and-licence/</loc>
<lastmod>2026-01-20T08:01:02+00:00</lastmod>
</url>
<url>
<loc>https://thecipherjournal.org/email-security-basics-spf-dkim-and-dmarc/</loc>
<lastmod>2026-01-09T13:39:11+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/7/email-3249062_640-2.png</image:loc>
<image:title><![CDATA[Email graphic]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/enable-entra-id-password-protection-for-active-directory/</loc>
<lastmod>2026-02-15T09:12:40+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/28/1-2.png</image:loc>
<image:title><![CDATA[Entra Password Protection Settings]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/28/1.png</image:loc>
<image:title><![CDATA[Entra Password Protection Settings]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/evaluatiing-multi-factor-authentication-methods/</loc>
<lastmod>2026-01-29T15:45:20+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/9/computer-1591018_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/9/mfa-infographic.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic.]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/fibre-optic-cables/</loc>
<lastmod>2026-02-10T07:54:07+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/6/1-2.png</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/generating-custom-wordlists-with-kali-linux/</loc>
<lastmod>2026-01-14T08:40:28+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/3/2.png</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/3/6-2.png</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/3/5.png</image:loc>
<image:title><![CDATA[Crunch Output with Charset]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/3/7-3.png</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/home/</loc>
<lastmod>2026-01-18T13:15:18+00:00</lastmod>
</url>
<url>
<loc>https://thecipherjournal.org/identifying-devices-by-their-mac-address/</loc>
<lastmod>2026-02-15T16:07:30+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/4/devices1.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/4/infographic_mac.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/4/1-2.png</image:loc>
<image:title><![CDATA[A MAC Vendor ID Website]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/4/2-2.png</image:loc>
<image:title><![CDATA[Command line identification of a MAC address.]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/ipv4-subnet-calculator/</loc>
<lastmod>2026-02-22T14:25:38+00:00</lastmod>
</url>
<url>
<loc>https://thecipherjournal.org/ipv6-quiz-test-your-knowledge/</loc>
<lastmod>2026-02-16T15:05:09+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/40/472301-quiz-2137664_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/40/thedigitalartist-banner-5250178_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/ipv6-subnet-calculator/</loc>
<lastmod>2026-02-19T19:20:27+00:00</lastmod>
</url>
<url>
<loc>https://thecipherjournal.org/lldp-friend-or-foe/</loc>
<lastmod>2026-01-29T15:35:33+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/21/call-2946023_1280.jpg</image:loc>
<image:title><![CDATA[Noisy Neighbours: Are your switches talking too much?]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/21/lldp_1.png</image:loc>
<image:title><![CDATA[A Wireshark capture of LLDP frames.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/21/lldp2.png</image:loc>
<image:title><![CDATA[A look at an LLDP ethernet frame with Wireshark.]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/mitigating-common-identity-attacks/</loc>
<lastmod>2026-01-20T10:11:43+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/24/ai-generated-8950518_1280.jpg</image:loc>
<image:title><![CDATA[A bog standard hacker, complete with hoodie and sunglasses.]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/page/2/</loc>
</url>
<url>
<loc>https://thecipherjournal.org/page/3/</loc>
</url>
<url>
<loc>https://thecipherjournal.org/page/4/</loc>
</url>
<url>
<loc>https://thecipherjournal.org/page/5/</loc>
</url>
<url>
<loc>https://thecipherjournal.org/page/6/</loc>
</url>
<url>
<loc>https://thecipherjournal.org/page/7/</loc>
</url>
<url>
<loc>https://thecipherjournal.org/powershell-auditing-mfa-methods-in-microsoft-365/</loc>
<lastmod>2026-02-15T09:13:22+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/11/powershell.png</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/privacy-policy/</loc>
<lastmod>2026-01-03T10:40:06+00:00</lastmod>
</url>
<url>
<loc>https://thecipherjournal.org/public-key-infrastructure-pki-fundamentals/</loc>
<lastmod>2026-03-09T16:27:23+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/56/mastertux-key-3348307_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/56/infographic_pki2.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/56/infographic_pki1.jpg</image:loc>
<image:title><![CDATA[A NotebookLM Generated Infographic]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/qos-quiz-test-your-knowledge/</loc>
<lastmod>2026-02-16T15:05:15+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/42/472301-quiz-2137664_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/42/thedigitalartist-banner-5250178_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/quality-of-service-qos/</loc>
<lastmod>2026-02-15T21:20:45+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/34/qos_grapic_1-2.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/34/qos_grapic_1.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/34/qos_graphic_2.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/rotating-tcpdump-captures-time-limited-packet-captures/</loc>
<lastmod>2026-01-17T16:31:11+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/13/highway-7213206_640.jpg</image:loc>
<image:title><![CDATA[Highway traffic]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/routing-protocols/</loc>
<lastmod>2026-02-10T10:22:59+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/37/von_italz-letter-box-1682944_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/37/routing_infographic.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/secure-firewall-rules-5-principles-to-increase-security/</loc>
<lastmod>2026-02-03T09:14:47+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/25/ai-generated-7958874_1280.jpg</image:loc>
<image:title><![CDATA[AI Generated Data Centre]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/25/unnamed.png</image:loc>
<image:title><![CDATA[AI Generated Infographic Based on Post Content]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/securing-company-data-on-personal-phones/</loc>
<lastmod>2026-02-19T17:51:03+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/46/pexels-hands-1851218_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/46/data_protection.png</image:loc>
<image:title><![CDATA[A screenshot of the data protection settings.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/46/access_requirements.png</image:loc>
<image:title><![CDATA[A screenshot of the access requirement settings.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/46/conditional_launch.png</image:loc>
<image:title><![CDATA[A screenshot of the conditional launch settings.]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/session-hijacking-methods-and-mitigations/</loc>
<lastmod>2026-01-08T17:14:48+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/10/computer-1591018_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/10//image1.png</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/10/image2.png</image:loc>
<image:title><![CDATA[An example of a bound session]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/10/image3.png</image:loc>
<image:title><![CDATA[An example of an unbound session]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/10//image.png</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/spanning-tree-protocol-stp/</loc>
<lastmod>2026-02-15T20:44:39+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/36/samirsmier-aerial-view-roundabout-7485069_1280.jpg</image:loc>
<image:title><![CDATA[Aerial view roundabout, Roundabout, Street image.]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/36/stp_infographic1.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/36/stp_infographic2.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/stp-quiz-test-your-knowledge/</loc>
<lastmod>2026-02-16T15:05:04+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/41/472301-quiz-2137664_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/41/thedigitalartist-banner-5250178_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/the-evolution-of-identity-theft-understanding-clickfix-and-consentfix/</loc>
<lastmod>2026-01-14T17:02:09+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/19/laptop-3087585_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/the-osi-model/</loc>
<lastmod>2026-02-17T19:10:29+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/33/earth-3537401_1280.jpg</image:loc>
<image:title><![CDATA[Earth, Network]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/33/infographic_osi.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic.]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/transport-protocols-tcp-vs-udp/</loc>
<lastmod>2026-02-27T11:49:58+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/55/pexels-architecture-1837176_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/55/infographic_tcp.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/55/infographic_udp.jpg</image:loc>
<image:title><![CDATA[A NotebookLM generated infographic]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/trusted-computer-system-evaluation-criteria-the-orange-book/</loc>
<lastmod>2026-01-20T09:06:39+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/17/Orange-book-small.PNG</image:loc>
<image:title><![CDATA[The Orange Book]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/vpn-prevention-on-an-enterprise-network/</loc>
<lastmod>2026-03-09T15:52:50+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/44/stefancoders-vpn-4255476_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/44/infographic_vpn1.jpg</image:loc>
<image:title><![CDATA[A NotebookLN generated infographic]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/weekly-post-1-02012026/</loc>
<lastmod>2026-01-09T09:13:18+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/5/security-7070879_1280-2.png</image:loc>
<image:title><![CDATA[security]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/weekly-post-2-09012026/</loc>
<lastmod>2026-01-09T08:59:46+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/14/thunderstorm-3441687_640.jpg</image:loc>
<image:title><![CDATA[thunderstorm]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/weekly-post-3-16012026/</loc>
<lastmod>2026-01-16T17:12:58+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/22/whataweek.jpeg</image:loc>
<image:title><![CDATA[What a week meme.]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/weekly-update-4-25012026/</loc>
<lastmod>2026-01-29T14:42:39+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/29/ai-generated-8048723_1280.jpg</image:loc>
<image:title><![CDATA[An AI Generated Cityscape]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/whitelisting-chrome-extensions-in-intune/</loc>
<lastmod>2026-02-15T09:13:13+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/15/chrome-3729545_640.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/15/extension.png</image:loc>
<image:title><![CDATA[A screenshot of the configured settings]]></image:title>
</image:image>
</url>
<url>
<loc>https://thecipherjournal.org/wireshark-display-filters-2/</loc>
<lastmod>2026-02-10T14:29:03+00:00</lastmod>
<image:image>
<image:loc>https://thecipherjournal.org/media/posts/38/stocksnap-coffee-924948_1280.jpg</image:loc>
<image:title><![CDATA[]]></image:title>
</image:image>
</url>
</urlset>