<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">
  
  <url>
    <loc>https://securityblog.org/2018/07/17/algorithmic-passwords/</loc>
    <lastmod>2018-07-17T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2009/10/24/selinux-and-rpm/</loc>
    <lastmod>2009-10-24T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2009/10/24/the-selinux-documentation-project/</loc>
    <lastmod>2009-10-24T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2008/10/09/red-hat-and-tresys-partner/</loc>
    <lastmod>2008-10-09T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2008/10/08/stackoverflowcom-and-the-selinux-poll/</loc>
    <lastmod>2008-10-08T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2008/09/14/selinux-on-ubuntu-part-1/</loc>
    <lastmod>2008-09-14T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2008/09/02/web-browsers-security-and-google-chrome/</loc>
    <lastmod>2008-09-02T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2008/05/18/security-anti-pattern-mls-for-guards/</loc>
    <lastmod>2008-05-18T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2008/04/11/is-the-bsd-license-more-liberal-or-conservative-than-the-gpl/</loc>
    <lastmod>2008-04-11T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2008/03/30/secure-doesnt-mean-anything/</loc>
    <lastmod>2008-03-30T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2008/01/24/why-blu-ray-scares-me/</loc>
    <lastmod>2008-01-24T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2007/07/15/misunderstanding-unix-security/</loc>
    <lastmod>2007-07-15T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2007/05/28/secure-networking-with-selinux/</loc>
    <lastmod>2007-05-28T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2007/05/05/dont-disable-selinux/</loc>
    <lastmod>2007-05-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2007/04/19/selinux-training/</loc>
    <lastmod>2007-04-19T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2006/08/24/the-future-of-selinux-or-how-we-are-going-to-take-over-the-world/</loc>
    <lastmod>2006-08-24T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2006/08/20/on-apparmor/</loc>
    <lastmod>2006-08-20T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2006/07/05/selinux-policy-module-primer/</loc>
    <lastmod>2006-07-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2006/05/23/trusted-what/</loc>
    <lastmod>2006-05-23T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2006/05/21/software-not-working-disable-selinux/</loc>
    <lastmod>2006-05-21T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2006/04/19/security-anti-pattern-path-based-access-control/</loc>
    <lastmod>2006-04-19T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2006/04/02/top-down-vs-bottom-up-policy-development/</loc>
    <lastmod>2006-04-02T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2006/03/25/security-anti-pattern-status-quo-encapsulation/</loc>
    <lastmod>2006-03-25T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2006/03/23/the-myth-of-least-privilege-or-why-we-love-equivalence-classes/</loc>
    <lastmod>2006-03-23T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/2006/03/23/welcome-to-brindle-on-security/</loc>
    <lastmod>2006-03-23T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/apache/</loc>
    <lastmod>2008-03-30T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/apparmor/</loc>
    <lastmod>2007-07-15T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/authentication/</loc>
    <lastmod>2018-07-17T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/categories/authentication/</loc>
    <lastmod>2018-07-17T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/bd&#43;/</loc>
    <lastmod>2008-01-24T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/biba/</loc>
    <lastmod>2008-03-30T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/blp/</loc>
    <lastmod>2008-05-18T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/bluray/</loc>
    <lastmod>2008-01-24T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/bsd/</loc>
    <lastmod>2008-04-11T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/categories/</loc>
    <lastmod>2018-07-17T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/cds/</loc>
    <lastmod>2008-05-18T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/conservative/</loc>
    <lastmod>2008-04-11T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/database/</loc>
    <lastmod>2008-03-30T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/drm/</loc>
    <lastmod>2008-01-24T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/gentoo/</loc>
    <lastmod>2006-03-23T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/google-chrome/</loc>
    <lastmod>2008-09-02T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/gpl/</loc>
    <lastmod>2008-04-11T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/grsecurity/</loc>
    <lastmod>2006-04-02T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/guard/</loc>
    <lastmod>2008-05-18T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/integrity/</loc>
    <lastmod>2008-03-30T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/</loc>
    <lastmod>2018-07-17T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/liberal/</loc>
    <lastmod>2008-04-11T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/license/</loc>
    <lastmod>2008-04-11T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/mandatory-access-control/</loc>
    <lastmod>2008-03-30T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/categories/meta/</loc>
    <lastmod>2006-03-23T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/mls/</loc>
    <lastmod>2008-05-18T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/networking/</loc>
    <lastmod>2007-05-28T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/categories/none/</loc>
    <lastmod>2008-10-09T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/openbsd/</loc>
    <lastmod>2008-03-30T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/opensource/</loc>
    <lastmod>2007-05-28T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/path-based-access-control/</loc>
    <lastmod>2007-07-15T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/poll/</loc>
    <lastmod>2008-10-08T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/post/</loc>
    <lastmod>2018-07-17T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/razor/</loc>
    <lastmod>2007-05-05T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/sap/</loc>
    <lastmod>2007-05-05T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/security/</loc>
    <lastmod>2018-07-17T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/categories/security/</loc>
    <lastmod>2018-07-17T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/selinux/</loc>
    <lastmod>2008-10-08T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/selinux-symposium/</loc>
    <lastmod>2007-07-15T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/solaris/</loc>
    <lastmod>2006-05-23T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/stackoverflow/</loc>
    <lastmod>2008-10-08T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/</loc>
    <lastmod>2008-03-30T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/training/</loc>
    <lastmod>2007-04-19T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/trusted-solaris/</loc>
    <lastmod>2006-05-23T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/ubuntu/</loc>
    <lastmod>2008-09-14T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/unix-security/</loc>
    <lastmod>2007-07-15T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://securityblog.org/tags/virtual-machine/</loc>
    <lastmod>2008-01-24T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
</urlset>