<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://securitysteve.net/links/</loc><lastmod>2023-02-22T15:13:06+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/container-security-links/</loc><lastmod>2022-04-06T18:34:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/linux-links/</loc><lastmod>2022-03-09T20:48:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/consulting-services/</loc><image:image><image:loc>https://securitysteve.net/wp-content/uploads/2017/03/roadmap-with-powersc-gui.png</image:loc><image:title>roadmap with powersc gui</image:title></image:image><image:image><image:loc>https://securitysteve.net/wp-content/uploads/2013/08/email-photo.jpg</image:loc><image:title>email-photo.jpg</image:title></image:image><lastmod>2018-01-22T17:56:42+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/all-aix-security-services/</loc><lastmod>2018-01-22T17:54:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/hacking-techniques/</loc><image:image><image:loc>https://securitysteve.net/wp-content/uploads/2018/01/ni_3446311000.jpg</image:loc><image:title>~ni_3446311000</image:title></image:image><lastmod>2018-01-19T20:00:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/aix-trusted-execution/</loc><lastmod>2017-07-17T15:12:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/aix-centralized-password-user-management-using-msad-via-ldap/</loc><lastmod>2017-05-22T20:05:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/powersc-graphical-user-interface/</loc><image:image><image:loc>https://securitysteve.net/wp-content/uploads/2017/05/picture1.png</image:loc><image:title>Picture1</image:title></image:image><lastmod>2017-05-22T19:33:15+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/steves-aix-top-ten/</loc><lastmod>2017-05-22T19:30:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/multi-factor-authentication-on-aix/</loc><lastmod>2017-05-22T19:00:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/security-assessment-services/</loc><lastmod>2016-10-07T05:28:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/powersc/</loc><lastmod>2016-10-07T04:37:56+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/aix-auditing/</loc><lastmod>2016-07-21T01:17:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/powersc-trusted-logging/</loc><lastmod>2016-07-21T01:15:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/pass-through-authentication/</loc><image:image><image:loc>https://securitysteve.net/wp-content/uploads/2014/01/pta-topology.jpg</image:loc><image:title>pta topology</image:title></image:image><lastmod>2016-07-11T20:03:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/consulting-services/aix-security-assessment/</loc><lastmod>2016-07-11T19:59:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/stack-execution-disable-sed/</loc><lastmod>2016-07-11T19:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/file-permission-manager-fpm/</loc><lastmod>2016-07-11T19:50:02+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/powersc-trusted-network-connect-patch-management/</loc><lastmod>2016-07-11T19:48:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/powersc-security-and-compliance-automation/</loc><lastmod>2016-07-11T19:46:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/aix-enhanced-role-based-access-control/</loc><lastmod>2016-07-11T19:39:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/security-terms/</loc><lastmod>2016-03-22T19:37:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/powersc-real-time-compliance/</loc><lastmod>2016-03-22T17:43:01+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/about-security-steve/</loc><image:image><image:loc>https://securitysteve.net/wp-content/uploads/2013/08/3rd-place-2014.jpg</image:loc><image:title>3rd place 2014</image:title></image:image><image:image><image:loc>https://securitysteve.net/wp-content/uploads/2013/08/ffl.jpg</image:loc><image:title>ffl</image:title></image:image><lastmod>2015-01-05T20:49:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/coming-to-aix-security/</loc><lastmod>2014-12-18T19:03:20+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/all-cloud-security-services/</loc><lastmod>2014-12-01T17:41:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/rbac-workshop/</loc><image:image><image:loc>https://securitysteve.net/wp-content/uploads/2014/01/classic-rbac.jpg</image:loc><image:title>classic RBAC</image:title></image:image><lastmod>2014-01-02T20:19:15+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/powersc-compliance-and-monitoring-workshop/</loc><image:image><image:loc>https://securitysteve.net/wp-content/uploads/2014/01/rtc-in-action.jpg</image:loc><image:title>rtc in action</image:title></image:image><lastmod>2014-01-02T19:57:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/the-security-steve-newsletter/</loc><lastmod>2014-01-02T19:51:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/aix-identity-management-with-itds-level-2/</loc><lastmod>2014-01-02T19:31:39+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/aix-identity-management-with-itds-level-1/</loc><lastmod>2014-01-02T19:15:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/questions/</loc><lastmod>2019-12-02T06:15:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/coming-to-aix-security/performance-feature-for-powersc-tf/</loc><lastmod>2013-10-11T15:48:09+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/coming-to-aix-security/powersc-v2-pci-xml/</loc><lastmod>2013-10-11T14:54:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/coming-to-aix-security/local-logging-for-powersc-rtc/</loc><lastmod>2013-10-11T14:50:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/coming-to-aix-security/i-fix-support-for-powersc-tnc/</loc><lastmod>2013-10-11T14:46:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/coming-to-aix-security/enhanced-powersc-tnc-reporting/</loc><lastmod>2023-02-13T17:14:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/coming-to-aix-security/enhanced-powersc-tnc-reporting-2/</loc><lastmod>2013-10-11T14:16:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/coming-to-aix-security/powersc-database-xml/</loc><lastmod>2013-09-10T18:58:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/coming-to-aix-security/domainless-groups/</loc><lastmod>2013-09-10T18:55:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysteve.net/2013/08/20/home/</loc><lastmod>2013-08-20T17:17:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysteve.net</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-02-22T15:13:06+00:00</lastmod></url></urlset>
