<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.ilsoftware.it/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.ilsoftware.it/fortigate-ssl-vpn-nel-mirino-come-agiscono-gli-hacker-dopo-laccesso/</loc>
		<lastmod>2026-04-23T09:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ilsoftware.it/app/uploads/2024/03/Hacker-che-sfrutta-una-vulnerabilita-e1711560991609.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ilsoftware.it/wsl9x-linux-su-windows-95-98/</loc>
		<lastmod>2026-04-23T08:05:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ilsoftware.it/app/uploads/2026/04/WSL9x-linux-windows-95-98-ME.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ilsoftware.it/app/uploads/2026/04/wsl9x-linux-su-windows-95-98.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ilsoftware.it/firefox-tor-scoperto-identificatore-nascosto-nel-browser/</loc>
		<lastmod>2026-04-23T09:17:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ilsoftware.it/app/uploads/2026/04/fingerprinting-browser-firefox-tor-identificatore-univoco.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ilsoftware.it/app/uploads/2026/04/fingerprinting-browser-tor.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->