<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://justinpineda.com/lessons/ethical-hacking/module-4-privacy-and-ethics/</loc><lastmod>2025-03-14T23:15:34+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/</loc><lastmod>2025-02-15T03:05:20+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/2024/01/04/cybersecurity-education-platforms/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2024/01/pexels-photo-301920.jpeg</image:loc><image:title>gray study dice on table</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/gray-study-dice-on-table-301920/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-07-08T14:36:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/lessons/web-application-security/</loc><lastmod>2024-03-31T17:09:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/2024/02/27/security-features-that-should-be-present-in-your-ph-financial-service-mobile-app/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2024/02/pexels-photo-887751.jpeg</image:loc><image:title>pexels-photo-887751.jpeg</image:title><image:caption>Photo by PhotoMIX Company on &lt;a href="https://www.pexels.com/photo/person-holding-silver-iphone-7-887751/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-02-27T02:37:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2024/01/01/can-screenshots-from-messaging-apps-be-used-as-evidence-in-court/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2024/01/pexels-photo-4426521.jpeg</image:loc><image:title>concentrated young asian woman using smartphone in park</image:title><image:caption>Photo by Ketut Subiyanto on &lt;a href="https://www.pexels.com/photo/concentrated-young-asian-woman-using-smartphone-in-park-4426521/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-01-01T13:20:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2023/12/29/can-a-rider-taking-a-photo-of-a-person-as-proof-of-delivery-be-considered-a-violation-of-the-dpa/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2023/12/pexels-photo-4604599.jpeg</image:loc><image:title>woman in white long sleeve shirt and blue denim jeans riding on black city bike during</image:title><image:caption>Photo by cottonbro studio on &lt;a href="https://www.pexels.com/photo/woman-in-white-long-sleeve-shirt-and-blue-denim-jeans-riding-on-black-city-bike-during-4604599/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-12-28T22:44:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2020/04/05/lesson-10-what-are-security-services-and-mechanisms/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2020/04/silhouette-photo-of-person-holding-door-knob-792032.jpg</image:loc><image:title>silhouette-photo-of-person-holding-door-knob-792032</image:title><image:caption>Photo Credit: George Beckerf from https://www.pexels.com/</image:caption></image:image><lastmod>2022-08-26T19:03:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2020/02/08/reasons-and-answers-to-common-questions-when-planning-for-a-cybersecurity-career/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2020/02/orman.png</image:loc><image:title>orman</image:title></image:image><lastmod>2022-08-26T19:03:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2020/04/02/lesson-7-why-hr-policies-complement-information-security/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2020/04/hr.png</image:loc><image:title>hr</image:title><image:caption>Photo Credit:  "21 Times Michael Scott's Hatred For Toby Flenderson Was Out Of Control" https://www.buzzfeed.com/chelseabrown/jerkyjerkface</image:caption></image:image><lastmod>2022-08-26T19:03:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2017/01/07/7-reasons-why-you-should-take-up-a-masters-degree/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/mis6.jpg</image:loc><image:title>mis6</image:title><image:caption>The class organized a KTV Christmas Party</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/savant2.jpg</image:loc><image:title>savant2</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/mis5.jpg</image:loc><image:title>mis5</image:title><image:caption>My consistent group mates hehe</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/msict.jpg</image:loc><image:title>msict</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/mis.jpg</image:loc><image:title>mis</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/mis2.jpg</image:loc><image:title>mis2</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/mis3.jpg</image:loc><image:title>mis3</image:title><image:caption>Our Managerial Accounting class.</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/mis4.jpg</image:loc><image:title>mis4</image:title></image:image><lastmod>2022-08-26T19:03:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/lessons/information-security/module-3-legal-issues/</loc><lastmod>2022-08-26T19:03:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/information-security/module-2-general-security-concepts/</loc><lastmod>2022-08-26T19:03:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/information-security/module-1-general-security-concepts/</loc><lastmod>2022-08-26T19:03:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/2010/10/29/creating-a-device-normalizer/</loc><lastmod>2022-08-26T19:03:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/lessons/ethical-hacking/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2021/08/pexels-photo-3184359.jpeg</image:loc><image:title>people inside a room</image:title><image:caption>Photo by fauxels on &lt;a href="https://www.pexels.com/photo/people-inside-a-room-3184359/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2021/08/pexels-photo-2258339.jpeg</image:loc><image:title>entry signage</image:title><image:caption>Photo by Tim Mossholder on &lt;a href="https://www.pexels.com/photo/entry-signage-2258339/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2021/08/pexels-photo-6851341.jpeg</image:loc><image:title>no entry sign near snowy forest</image:title><image:caption>Photo by Stanislav Kondratiev on &lt;a href="https://www.pexels.com/photo/no-entry-sign-near-snowy-forest-6851341/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2021/08/pexels-photo-5765827.jpeg</image:loc><image:title>unrecognizable ophthalmologist checking eyesight of woman on vision screener</image:title><image:caption>Photo by Ksenia Chernaya on &lt;a href="https://www.pexels.com/photo/unrecognizable-ophthalmologist-checking-eyesight-of-woman-on-vision-screener-5765827/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2021/08/pexels-photo-5935791.jpeg</image:loc><image:title>unrecognizable hacker with smartphone typing on laptop at desk</image:title><image:caption>Photo by Sora Shimazaki on &lt;a href="https://www.pexels.com/photo/unrecognizable-hacker-with-smartphone-typing-on-laptop-at-desk-5935791/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2021/08/pexels-photo-2058128.jpeg</image:loc><image:title>person typing on computer keyboard</image:title><image:caption>Photo by Oleg Magni on &lt;a href="https://www.pexels.com/photo/person-typing-on-computer-keyboard-2058128/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2021/08/pexels-photo-4342496-1.jpeg</image:loc><image:title>man people woman laptop</image:title><image:caption>Photo by Edmond Dantu00e8s on &lt;a href="https://www.pexels.com/photo/man-people-woman-laptop-4342496/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2021/08/pexels-photo-4342496.jpeg</image:loc><image:title>man people woman laptop</image:title><image:caption>Photo by Edmond Dantu00e8s on &lt;a href="https://www.pexels.com/photo/man-people-woman-laptop-4342496/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-08-26T19:03:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/information-security/</loc><lastmod>2022-08-26T19:03:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/cybersecurity-defense/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2021/08/pexels-photo-7682343.jpeg</image:loc><image:title>call center agent working in an office</image:title><image:caption>Photo by Mikhail Nilov on &lt;a href="https://www.pexels.com/photo/call-center-agent-working-in-an-office-7682343/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2021/08/pexels-photo-923681.jpeg</image:loc><image:title>crime scene do not cross signage</image:title><image:caption>Photo by kat wilcox on &lt;a href="https://www.pexels.com/photo/crime-scene-do-not-cross-signage-923681/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2021/08/pexels-photo-5669619.jpeg</image:loc><image:title>judges desk with gavel and scales</image:title><image:caption>Photo by Sora Shimazaki on &lt;a href="https://www.pexels.com/photo/judges-desk-with-gavel-and-scales-5669619/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2021/08/train-wreck-steam-locomotive-locomotive-railway-73821.jpeg</image:loc><image:title>accident disaster steam locomotive train wreck</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/accident-disaster-steam-locomotive-train-wreck-73821/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2021/08/pexels-photo-1422673.jpeg</image:loc><image:title>hotrod die cast model on board</image:title><image:caption>Photo by Suzy Hazelwood on &lt;a href="https://www.pexels.com/photo/hotrod-die-cast-model-on-board-1422673/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-08-26T19:03:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/2022/06/26/2022-philippine-cybersecurity-snapshot/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2022/08/43ef6-industries-participated-1.png</image:loc><image:title>Industries Participated</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2022/08/54c7a-industries-participated.png</image:loc><image:title>Industries Participated</image:title></image:image><lastmod>2022-06-26T06:34:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2022/04/04/do-not-trust-verify-every-time-how-to-start-zero-trust/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2022/08/b6b8d-zta-core-areas-1.png</image:loc><image:title>ZTA Core Areas</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2022/08/d4081-zta-core-areas.png</image:loc><image:title>ZTA Core Areas</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2022/08/92c43-waiver-email.jpg</image:loc><image:title>Waiver email</image:title></image:image><lastmod>2022-04-03T18:27:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/about/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2022/08/79ca6-jpineda2022.png</image:loc><image:title>jpineda2022</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2020/04/pineda-justin-2.jpg</image:loc><image:title>Pineda, Justin (2)</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2009/06/15532_1326158194544_1248589472_985030_2663151_n.jpg</image:loc><image:title>15532_1326158194544_1248589472_985030_2663151_n</image:title><image:caption>At Cafe Noriter, Estrada, Manila</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2009/06/16331_212512573094_675183094_3052573_586737_n.jpg</image:loc><image:title>16331_212512573094_675183094_3052573_586737_n</image:title><image:caption>After the Walls of Hope volunteer work</image:caption></image:image><lastmod>2022-03-29T13:37:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/2022/03/26/a-pragmatic-approach-to-ransomware/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2022/08/7cdf3-pexels-andri-218413.jpg</image:loc><image:title>pexels-andri-218413</image:title></image:image><lastmod>2022-03-26T05:47:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2020/04/29/securing-the-organizations-it-assets-amidst-covid-19/</loc><lastmod>2021-12-11T04:43:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2020/06/05/effectively-conducting-networking-cybersecurity-distance-learning-courses/</loc><lastmod>2021-12-11T04:42:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2020/11/27/bypassing-ssl-pinning-and-traffic-redirection-to-burp-suite-using-mobsf-and-genymotion/</loc><lastmod>2021-12-11T04:40:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2020/12/02/how-nmap-scan-types-complement-your-vulnerability-scanner/</loc><lastmod>2021-12-11T04:38:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2021/12/11/how-to-keep-it-private-people-process-and-technology/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2022/08/c11e9-surgery.png</image:loc><image:title>surgery</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2022/08/9ace3-leaked.png</image:loc><image:title>leaked</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2022/08/376d0-lending.png</image:loc><image:title>lending</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2022/08/dfe30-resto.png</image:loc><image:title>resto</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2022/08/e9368-infosec-privacy-venn.png</image:loc><image:title>infosec-privacy-venn</image:title></image:image><lastmod>2021-12-11T04:35:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/lessons/cybersecurity-defense/module-4-computer-forensics/</loc><lastmod>2021-08-16T08:02:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/cybersecurity-defense/module-5-security-operations-center/</loc><lastmod>2021-08-16T07:56:42+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/cybersecurity-defense/module-3-legal-investigation/</loc><lastmod>2021-08-16T07:27:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/cybersecurity-defense/module-2-business-continuity/</loc><lastmod>2021-08-16T07:08:31+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/cybersecurity-defense/module-1-risk-management/</loc><lastmod>2021-08-16T06:49:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/ethical-hacking/module-8-reporting/</loc><lastmod>2021-08-15T03:20:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/ethical-hacking/module-7-maintaining-access-and-covering-tracks/</loc><lastmod>2021-08-15T03:18:30+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/ethical-hacking/module-6-gaining-access/</loc><lastmod>2021-08-15T03:16:15+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/ethical-hacking/module-5-scanning/</loc><lastmod>2021-08-15T03:10:31+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/ethical-hacking/module-4-reconnaissance/</loc><lastmod>2021-08-15T02:59:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/ethical-hacking/module-3-popular-attacks-and-vulnerabilities/</loc><lastmod>2021-08-15T02:57:30+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/ethical-hacking/module-2-system-fundamentals/</loc><lastmod>2021-08-15T02:34:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/ethical-hacking/module-1-introduction-to-ethical-hacking/</loc><lastmod>2021-08-15T01:51:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/information-security/module-10-security-operations-and-baselining/</loc><lastmod>2021-08-15T00:34:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/information-security/module-9-types-of-attacks-and-malware/</loc><lastmod>2021-08-15T00:23:44+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/information-security/module-8-physical-security/</loc><lastmod>2021-08-15T00:10:41+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/information-security/module-7-public-key-infrastructure/</loc><lastmod>2021-08-14T23:12:54+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/information-security/module-6-cryptography/</loc><lastmod>2021-08-14T22:56:39+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/lessons/information-security/module-5-infrastructure-security/</loc><lastmod>2021-08-14T22:39:31+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/2021/06/07/how-weak-session-management-lessens-security-even-with-strong-authentication-mechanisms/</loc><lastmod>2021-08-14T13:52:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2020/12/10/the-practicality-and-danger-of-cross-site-request-forgery-csrf-attacks/</loc><lastmod>2020-12-10T05:06:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2011/04/27/networking-101/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2011/04/trace.png</image:loc><image:title>trace</image:title></image:image><lastmod>2020-04-11T22:51:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2014/11/23/lesson-1-introduction-to-information-security/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/11/l1f2.png</image:loc></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/11/infosec_l1f1.png</image:loc></image:image><lastmod>2020-04-11T22:49:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2015/01/27/lesson-2-cia-triad-formula-for-protection-least-privilege/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/01/protection_new.png</image:loc><image:title>PROTECTION_NEW</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/01/sod.png</image:loc><image:title>SOD</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/01/protection_old.png</image:loc><image:title>PROTECTION_OLD</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/01/job-rotation.png</image:loc><image:title>Job Rotation</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/01/example.png</image:loc><image:title>Example</image:title><image:caption>Example scenarios that can be accidental or incidental</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/01/cia-dad.png</image:loc><image:title>CIA-DAD</image:title><image:caption>The CIA Triad and its opposite, the DAD</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/01/access-list.png</image:loc><image:title>access-list</image:title></image:image><lastmod>2020-04-11T22:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2015/01/27/lesson-3-defense-in-depth-and-related-concepts/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/01/defense-in-depth.png</image:loc><image:title>Defense-in-Depth</image:title></image:image><lastmod>2020-04-11T22:47:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2015/02/04/lesson-4-types-of-authentication-and-access-control/</loc><lastmod>2020-04-11T22:47:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2015/02/05/lesson-5-social-engineering/</loc><lastmod>2020-04-11T22:47:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2015/09/19/comsec2-culminating-project/</loc><lastmod>2020-04-11T22:41:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2015/10/02/the-value-of-an-it-certification/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/10/ccna-logo.jpg</image:loc><image:title>CCNA-Logo</image:title><image:caption>CCNA Certification fro Cisco</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/10/mcsa.jpg</image:loc><image:title>mcsa</image:title><image:caption>MCSA Certification from Microsoft</image:caption></image:image><lastmod>2020-04-11T22:40:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2015/11/22/process-scheduling-course-notes-in-operating-systems-1-opesys1/</loc><lastmod>2020-04-11T22:39:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2016/02/20/case-study-on-emerging-technologies/</loc><lastmod>2020-04-11T22:38:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2016/02/20/machine-project-in-infosec/</loc><lastmod>2020-04-11T22:38:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2020/04/01/lesson-6-organizational-security/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2020/04/ciso-cmu-e1585751806208.png</image:loc><image:title>CISO CMU</image:title><image:caption>Photo Credit: Structuring the Chief Information Security Officer Organization by Allen, J. et al, Software Engineering Institute (SEI), Carnegie Mellon University</image:caption></image:image><lastmod>2020-04-11T22:35:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2020/04/03/lesson-8-what-are-the-challenges-in-responding-to-cybercrimes/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2020/04/woman-sitting-on-chair-2157191.jpg</image:loc><image:title>woman-sitting-on-chair-2157191</image:title><image:caption>Photo by Martin Lopez from Pexels</image:caption></image:image><lastmod>2020-04-11T22:34:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2020/04/04/lesson-9-how-a-court-decision-katz-v-us-1967-changed-privacy-laws-in-the-world/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2020/04/architecture-booth-buildings-bus-374815.jpg</image:loc><image:title>architecture-booth-buildings-bus-374815</image:title><image:caption>Photo Credit: Stock Photo from Pexels.com</image:caption></image:image><lastmod>2020-04-11T22:34:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2016/02/20/vulnerability-poc-analysis/</loc><lastmod>2020-04-11T22:29:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/welcome/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/11/harajuku.jpg</image:loc><image:title>harajuku</image:title><image:caption>In the middle of the road at Harajuku, Japan</image:caption></image:image><lastmod>2020-04-08T03:48:01+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://justinpineda.com/2019/12/26/4-reasons-why-all-in-one-automated-penetration-testing-is-a-fallacy/</loc><lastmod>2020-03-20T08:23:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2020/03/09/exploring-the-security-issues-behind-facebooks-user-tracking-from-its-big-data-for-competitive-intelligence/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2020/03/facebook-spy-tool.jpg</image:loc><image:title>Facebook-Spy-Tool</image:title></image:image><lastmod>2020-03-20T08:12:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2017/03/01/proud-for-my-students-achievements-uap-event/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/03/img_20170224_175416.jpg</image:loc><image:title>img_20170224_175416</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/03/img_20170224_143541.jpg</image:loc><image:title>img_20170224_143541</image:title></image:image><lastmod>2017-06-28T20:39:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2017/02/19/8-helpful-things-you-can-do-to-prepare-and-pass-a-giac-exam/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/02/gwapt-gold.png</image:loc><image:title>gwapt-gold</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/02/gmob-gold.png</image:loc><image:title>gmob-gold</image:title></image:image><lastmod>2017-02-19T00:31:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2017/01/02/presented-at-the-14th-ncite-and-toured-dipolog-city-2016/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/img_20161019_165245.jpg</image:loc><image:title>img_20161019_165245</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/img_20161019_113940.jpg</image:loc><image:title>img_20161019_113940</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/img_20161019_1139251.jpg</image:loc><image:title>img_20161019_113925</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/img_20161022_105635.jpg</image:loc><image:title>img_20161022_105635</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/img_20161020_165318.jpg</image:loc><image:title>img_20161020_165318</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/img_20161020_163427.jpg</image:loc><image:title>img_20161020_163427</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/img_20161020_160730.jpg</image:loc><image:title>img_20161020_160730</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/img_20161020_154428.jpg</image:loc><image:title>img_20161020_154428</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/img_20161020_141747.jpg</image:loc><image:title>img_20161020_141747</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2017/01/img_20161020_141721.jpg</image:loc><image:title>img_20161020_141721</image:title></image:image><lastmod>2017-01-03T05:32:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2016/03/21/a-primer-on-ethical-hacking-information-security-for-senior-high/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2016/03/img_2976.jpg</image:loc><image:title>IMG_2976</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2016/03/img_2974.jpg</image:loc><image:title>IMG_2974</image:title></image:image><lastmod>2016-03-20T23:42:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2016/03/21/ethical-hacking-information-security-for-patts-faculty/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2016/03/img_7365.jpg</image:loc><image:title>IMG_7365</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2016/03/img_7355.jpg</image:loc><image:title>IMG_7355</image:title></image:image><lastmod>2016-03-20T23:36:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2015/08/11/information-security-ethical-hacking-101-patts/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/08/11822705_1030960820256079_7745031637066193848_n.jpg</image:loc><image:title>11822705_1030960820256079_7745031637066193848_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/08/11813264_1030960723589422_614397325621181618_n.jpg</image:loc><image:title>11813264_1030960723589422_614397325621181618_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/08/11693961_1030960750256086_6222822229063846860_n.jpg</image:loc><image:title>11693961_1030960750256086_6222822229063846860_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/08/11145182_1030960843589410_5172429549901189908_n.jpg</image:loc><image:title>11145182_1030960843589410_5172429549901189908_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/08/10984111_1030960710256090_2495478400270029599_n.jpg</image:loc><image:title>10984111_1030960710256090_2495478400270029599_n</image:title></image:image><lastmod>2015-08-11T05:15:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2015/08/11/pci-dss-and-vulnerability-management/</loc><lastmod>2015-08-11T04:40:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2015/07/01/detecting-command-and-control-traffic-using-botnet-correlator-module/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/07/11427220_1002485729770255_498091567338954458_n.jpg</image:loc><image:title>11427220_1002485729770255_498091567338954458_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/07/11424462_1003056656379829_7294716475484282272_n.jpg</image:loc><image:title>11424462_1003056656379829_7294716475484282272_n</image:title><image:caption>Infosec books at Kinokuniya</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/07/11401406_1308232859206402_8793173845518801960_n.jpg</image:loc><image:title>11401406_1308232859206402_8793173845518801960_n</image:title><image:caption>With Terry from UP-Diliman (leftmost ) and Ederlyn from MUST (2nd from the right) after the presentation.</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/07/11400979_1002590966426398_6977224417622689267_n.jpg</image:loc><image:title>11400979_1002590966426398_6977224417622689267_n</image:title><image:caption>Uber ride to Ritz Carlton</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/07/11251047_1002485706436924_4995811343764475449_n.jpg</image:loc><image:title>11251047_1002485706436924_4995811343764475449_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/07/10622713_1002485633103598_4000319264568441150_n.jpg</image:loc><image:title>10622713_1002485633103598_4000319264568441150_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/07/1381942_1001804846505010_5715889195211344600_n.jpg</image:loc><image:title>1381942_1001804846505010_5715889195211344600_n</image:title></image:image><lastmod>2015-06-30T22:53:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2015/03/01/protecting-through-network-security/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/03/11018980_10204873561470154_642106652935180709_o.jpg</image:loc><image:title>11018980_10204873561470154_642106652935180709_o</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/03/11002699_10204873495268499_1573140387248946129_o.jpg</image:loc><image:title>11002699_10204873495268499_1573140387248946129_o</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/03/10998899_10204873494308475_7926566154978347662_o.jpg</image:loc><image:title>10998899_10204873494308475_7926566154978347662_o</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/03/10991549_10204873537869564_2844852222877505467_o.jpg</image:loc><image:title>10991549_10204873537869564_2844852222877505467_o</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/03/10982595_10204873579990617_5053876611928926870_o.jpg</image:loc><image:title>10982595_10204873579990617_5053876611928926870_o</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/03/10922289_10204873559630108_1579937846206966572_o.jpg</image:loc><image:title>10922289_10204873559630108_1579937846206966572_o</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/03/10861019_10204873579430603_817000487512266403_o.jpg</image:loc><image:title>10861019_10204873579430603_817000487512266403_o</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/03/10708700_10204873582350676_2446237824854056741_o.jpg</image:loc><image:title>10708700_10204873582350676_2446237824854056741_o</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/03/10371184_10204873577590557_2425693782663756280_o.jpg</image:loc><image:title>10371184_10204873577590557_2425693782663756280_o</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/03/1655474_10204873564030218_4356033935283196982_o.jpg</image:loc><image:title>1655474_10204873564030218_4356033935283196982_o</image:title></image:image><lastmod>2015-06-30T21:47:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2015/02/05/infosec-discipline-and-opportunities-at-lpu-batangas/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/02/10961925_10205887667649719_1207230235_n.jpg</image:loc><image:title>10961925_10205887667649719_1207230235_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/02/10966514_10205887667329711_802150987_n.jpg</image:loc><image:title>10966514_10205887667329711_802150987_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/02/10961795_10205887666849699_629160532_n.jpg</image:loc><image:title>10961795_10205887666849699_629160532_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/02/10965467_10205887666449689_936184996_n.jpg</image:loc><image:title>10965467_10205887666449689_936184996_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/02/10966857_10205887683810123_199112349_n.jpg</image:loc><image:title>10966857_10205887683810123_199112349_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/02/10965875_10205887683850124_2030415691_n1.jpg</image:loc><image:title>10965875_10205887683850124_2030415691_n(1)</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/02/10979311_10205887674729896_81024097_n.jpg</image:loc><image:title>10979311_10205887674729896_81024097_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/02/10979311_10205887674729896_81024097_n1.jpg</image:loc><image:title>10979311_10205887674729896_81024097_n(1)</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/02/10967040_10205887668209733_984702237_n.jpg</image:loc><image:title>10967040_10205887668209733_984702237_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2015/02/10965927_10205887668009728_1338855883_n.jpg</image:loc><image:title>10965927_10205887668009728_1338855883_n</image:title></image:image><lastmod>2015-02-05T04:50:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2014/12/21/ethical-hacking-workshop-with-sss/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/1920397_899287926756703_1185428698758128563_n.jpg</image:loc><image:title>1920397_899287926756703_1185428698758128563_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/1395923_900822596603236_4758897925518457254_n.jpg</image:loc><image:title>1395923_900822596603236_4758897925518457254_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/10665368_900822736603222_5103678021730335164_n.jpg</image:loc><image:title>10665368_900822736603222_5103678021730335164_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/10402587_900822679936561_332706450880114876_n.jpg</image:loc><image:title>10402587_900822679936561_332706450880114876_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/10300789_900822573269905_2495592550596721669_n.jpg</image:loc><image:title>10300789_900822573269905_2495592550596721669_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/10151769_900822626603233_479811379083320292_n.jpg</image:loc><image:title>10151769_900822626603233_479811379083320292_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/10003894_900822529936576_8764707224670948776_n.jpg</image:loc><image:title>10003894_900822529936576_8764707224670948776_n</image:title></image:image><lastmod>2014-12-21T09:23:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2014/12/02/secure-web-application-coding/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/945758_513571555345425_257896355_n.jpg</image:loc><image:title>945758_513571555345425_257896355_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/945268_513571268678787_2139207961_n.jpg</image:loc><image:title>945268_513571268678787_2139207961_n</image:title><image:caption>Demonstrating a source code analyzer from OWASP</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/942278_513569702012277_95381743_n.jpg</image:loc><image:title>942278_513569702012277_95381743_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/935212_513571542012093_1462015745_n.jpg</image:loc><image:title>935212_513571542012093_1462015745_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/935184_513569948678919_226485340_n.jpg</image:loc><image:title>935184_513569948678919_226485340_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/422160_513568738679040_1658998236_n.jpg</image:loc><image:title>422160_513568738679040_1658998236_n</image:title><image:caption>In-house training in their office</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/381519_513571468678767_1921722547_n.jpg</image:loc><image:title>381519_513571468678767_1921722547_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/381483_513570825345498_1301883168_n.jpg</image:loc><image:title>381483_513570825345498_1301883168_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/374693_513570998678814_1155381997_n.jpg</image:loc><image:title>374693_513570998678814_1155381997_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/164286_513568962012351_1901119809_n.jpg</image:loc><image:title>164286_513568962012351_1901119809_n</image:title><image:caption>Getting to know the participants</image:caption></image:image><lastmod>2014-12-02T06:42:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2014/12/01/4th-bicol-youth-congress-in-it/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/pb157197.jpg</image:loc><image:title>OLYMPUS DIGITAL CAMERA</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/pb157194.jpg</image:loc><image:caption>A talk on Ethical Hacking</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/12/photo.jpg</image:loc><image:title>Speaker's profile</image:title></image:image><lastmod>2014-12-01T07:24:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2014/11/21/career-talk-for-incoming-college-students/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/11/career_formula.png</image:loc><image:title>career_formula</image:title></image:image><lastmod>2014-11-21T01:06:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2014/11/18/hot-issues-in-information-security/</loc><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/11/10610606_10201966610927486_3720350872208582186_n.jpg</image:loc><image:title>10610606_10201966610927486_3720350872208582186_n</image:title><image:caption>MPH, Asia Pacific College
Photo by Kareen Gancio</image:caption></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/11/10382653_10201966610487475_5554486194324266819_n.jpg</image:loc><image:title>10382653_10201966610487475_5554486194324266819_n</image:title></image:image><image:image><image:loc>https://justinpineda.com/wp-content/uploads/2014/11/10378925_10201966611647504_5531871005140781391_n.jpg</image:loc><image:title>10378925_10201966611647504_5531871005140781391_n</image:title><image:caption>MPH, Asia Pacific College
Photo by Kareen Gancio</image:caption></image:image><lastmod>2014-11-20T03:32:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2011/01/15/attack-of-the-day-the-ftp-bounce-attack/</loc><lastmod>2014-11-16T07:47:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com/2011/04/30/understanding-ecatel/</loc><lastmod>2014-11-16T05:33:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://justinpineda.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-03-14T23:15:34+00:00</lastmod></url></urlset>
