<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
    <url>
        <loc>https://www.hackinfo.nl/</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=android</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=backtrack</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=google</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=gratis</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=hack</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=hacker</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=hackers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=hackertool</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=hacking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=iphone</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=jailbreak</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=kinect</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=metasploit</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=scanner</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=security</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=software</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=tool</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=tools</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=wachtwoord</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/?option=com_search&amp;amp;searchword=windows</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/111-security</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/130-security/patching/1911-ernstig-lek-in-wordpress-plug-in-wp-statistics-gedicht</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/130-security/patching/1913-microsoft-en-adobe-dicht-meerdere-beveiligingslekken</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/132-security/ransomware/1910-petya-ransomware-aanval-treft-organisaties-meerdere-landen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/39-security/security6</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/39-security/security6/1402-ernstig-lek-in-alle-linux-kernels</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/39-security/security6/1471-top-30-populairste-linkedin-wachtwoorden</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/39-security/security6/1500-nieuw-lek-in-oude-internet-explorer-versies-wordt-actief-misbruikt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/39-security/security6/1828-zero-day-lek-in-firefox-die-tor-gebruikers-mogelijk-kan-ontmaskeren</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/39-security/security6/1831-ernstig-lek-in-netgear-routers-kan-code-op-root-niveau-uitvoeren</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/39-security/security6/1912-onderzoekers-vinden-ernstig-lek-in-gnupg</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/about</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background/1347-penetration-testing-secrets</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background/1417-nieuw-meldpunt-voor-hackers-geopend</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background/1419-computers-met-dnschanger-malware-offline</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background/1439-europees-parlement-wil-hacking-tools-verbieden</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background/1446-hackermagazine-phrack-68-is-uit</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background/1459-sogeti-traint-hackers-in-social-engineering</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background/1526-presentaties-hackerconferentie-defcon-21-online</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background/1576-cybercrimineel-maakt-steeds-meer-gebruik-van-legitieme-websites</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background/1587-scanning-the-internet-in-45-minutes-with-zmap</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background/321-omvang-botnet-boeit-niet</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background/350-kilometerheffing-lijkt-fraudegevoelig</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background/39-security/security6/1471-top-30-populairste-linkedin-wachtwoorden</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background/39-security/security6/1500-nieuw-lek-in-oude-internet-explorer-versies-wordt-actief-misbruikt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/background/44-wachtwoord-sterkte-check</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=0af49b0f5ec86860661037a0b97f3373368c241f</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=127525aef285432bcdc2bb693bd01e41895a403f</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=153edb077d14011f0491592052fd25e62220ed2d</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=1a10eaf642b5e01e1a84f333a4f94e5e8dc405e0</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=2f6ac39cd9d8489e12d47f5130c3a7cb95958dca</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=57da86c90664973fc4e636d316f37e0a608049d4</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=688dfe9aeec1c9571befc83e241456e60fd91484</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=721ad0bc14d14ee3c975f9cd4780dee0c541c75a</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=7d9ec8d771346ae7378e6527b61471617f1df472</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=7f12b845a17bebf0d402e7efb6e20d10c7846a46</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=932ae9c1d52da05c47505fd3c1638bbdae86bb34</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=a18c4eec7e46ad9891c7520edc21ad9cc66ee268</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=a3ec1e674cc95a962abda597223387f26e9ba1c4</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=b289289d46cd49a557ee7d201ee0744f56a36699</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=d09672abe985f59f42d0c955ff846b58abeb9db2</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=ded7ba24c9c2507e7a17be374839d8b073b7ce33</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=e9c99f4a0cbc7b6bd92745de39565e99765344a8</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=ebc07151f09b89a87d3ab1912924ab9aa296f081</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/mailto/?tmpl=component&amp;template=hackinfov10_j32&amp;link=f450aef8b65be12327071c14094127aecbb79963</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/users/?view=login&amp;Itemid=156</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/users/?view=remind&amp;Itemid=156</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/component/users/?view=reset&amp;Itemid=156</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/contact</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/faq</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/gaming</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/gaming/crytek-sdk</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/gaming/doom-3-engine</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/gaming/game-engines</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/gaming/lumberyard-game-engine</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/gaming/unreal-development-engine</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/100-apple-ios/1357-apple-verbant-hacker-wegens-beveiligingslek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/100-apple-ios/1592-ontwikkelaars-brengen-jailbreak-voor-ios-7-1-1-uit</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/100-apple-ios/1620-nintendo-games-op-ios-8-spelen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/100-apple-ios/1629-jailbreak-voor-ios-8-1-beschikbaar</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/103-virus-trojan-worm-etc</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/103-virus-trojan-worm-etc/1424-trojaans-paard-kan-137-banken-beroven</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/103-virus-trojan-worm-etc/1430-handleiding-zeus-en-spyeye-trojans-online</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/103-virus-trojan-worm-etc/1625-postnl-waarschuwt-voor-nep-mail</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/103-virus-trojan-worm-etc/1902-android-malware-schakelt-beveiligingsfunctie-uit-en-injecteert-code-2</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/103-virus-trojan-worm-etc/1907-malware-verandert-computers-via-upnp-in-proxy-servers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1202-hackers-maken-miljoenen-mailadressen-buit-na-hack-mailbedrijf-vs</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1205-gratis-telegraaf-door-gat-in-betaalmuur</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1210-hacker-publiceert-gegevens-uit-database-barracuda-networks</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1245-hackers-vallen-website-codemasters-aan</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1247-servers-televisiezender-pbs-gehackt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1258-duinrell-hacker-jat-80-duizend-mailadressen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1260-how-to-hack-a-website-using-dotnetnuke</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1262-via-wifi-gestolen-paypal-wachtwoorden-online</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1343-accounts-ov-chipkaartnl-volledig-te-kapen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1364-publieke-omroep-lekt-23-miljoen-persoonsgegevens</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1406-windows-computers-gehackt-via-midi-bestand</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1464-ernstig-php-lek-actief-misbruikt-door-hackers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/148-hackers-breken-in-op-amerikaans-stroomnet</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1513-skype-en-dropbox-dichten-lek-dat-toegang-tot-facebook-accounts-gaf</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1527-joomla-sites-gehackt-via-destijds-onbekend-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1535-aanvallen-op-jboss-servers-na-verschijnen-exploit</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1573-hack-op-database-boxee-tv</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1574-top-10-hacking-technieken-van-2013</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1575-beveiligingslek-in-werelds-grootste-website-verandert-miljoenen-bezoekers-in-ddos-zombies</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1581-leuke-web-easter-eggs</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1582-tcp-poort-32764-backdoor-stiekem-weer-gereactiveerd</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/162-meaningful-ip-addresses</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1626-ddos-attacks-met-behulp-van-upnp-apparaten</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1641-cryptophp-malware-raakt-tenminste-23-000-sites</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1711-ip-adressen-minbuza-gekaapt-via-bgp-hijacking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1769-meer-dan-2-000-gehackte-jboss-servers-met-backdoor-ontdekt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1775-linkedin-gebruikers-kunnen-controleren-of-gegevens-zijn-buitgemaakt-bij-hack</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1819-hackers-maken-mogelijk-adresgegevens-erasmus-studenten-buit</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/182-linksys-router-via-website-te-hacken</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/187-hacker-ontdekt-ernstig-lek-in-microsoft-iis-60</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/1914-onderzoeker-trekt-geldig-symantec-ssl-certificaat-via-nepsleutel-in</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/196-link-verkorter-cligs-gehackt-miljoenen-doorgestuurd</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/198-dns-spoofen-en-met-behulp-van-metasploit-hacken</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/200-hackertool-voor-platleggen-apache-webservers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/202-lekke-phpmyadmin-installaties-doelwit-van-hackers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/205-website-brein-grondig-vernield</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/206-hackers-stelen-wachtwoorden-via-directx-aanval</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/210-twitter-aanval-treft-mac-en-windows-gebruikers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/211-website-meesterhacker-kevin-mitnick-gehackt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/212-malware-steelt-ftp-logins-van-ibm-cisco-en-symantec</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/313-eenvoudige-hack-omzeilt-hdcp-beveiliging</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/319-trojaan-sloopt-kerk-pc-na-plunderen-bankrekening</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/320-hackers-stelen-informatie-over-gevaarlijke-chemicalien</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/340-hackers-verstoppen-exploitsites-met-twitter-api</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/45-via-de-achterdeur</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/47-goolag-scanner-automatiseert-google-hacking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/25-webhacking8/48-youtube-in-720p-hd-viewing-and-embedding</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/39-security/security6/1471-top-30-populairste-linkedin-wachtwoorden</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/39-security/security6/1500-nieuw-lek-in-oude-internet-explorer-versies-wordt-actief-misbruikt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/45-windows-hacking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/45-windows-hacking/171-windows-7-in-virtuele-machine-gehackt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/45-windows-hacking/1792-ie-en-edge-kunnen-inloggegevens-windows-lekken</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/45-windows-hacking/1821-reverse-shells-met-een-usb-rubber-ducky</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/45-windows-hacking/183-windows-xp-geldautomaten-besmet-met-malware</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/50-android-hacking/316-motorola-blur-ported-to-g1</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/58-mobile-hacking/1579-vingerafdrukscanner-galaxy-s5-eenvoudig-te-omzeilen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/58-mobile-hacking/1584-pwn-phone-2014-smartphone-voor-hackers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/72-hardware-hacking/1238-hacker-kan-hardware-permanent-saboteren</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/72-hardware-hacking/1637-smart-tv-hacking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/72-hardware-hacking/1811-hacker-krijgt-freesync-werkend-op-monitoren-die-het-niet-ondersteunen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/72-hardware-hacking/1816-hackers-demonstreren-warflying-aanval-via-zigbee-en-hue-lamp</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/72-hardware-hacking/1826-afluisteren-via-koptelefoon-door-wijzigen-geluidspoorten-pc</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/72-hardware-hacking/1876-lek-in-wifi-drone-geeft-toegang-tot-videobeelden</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/72-hardware-hacking/324-helft-nederlandse-linksys-routers-onbeveiligd</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/72-hardware-hacking/351-skimapparatuur-eenvoudig-verkrijgbaar-via-internet</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/77-defacement/1355-belgische-websites-beklad-door-hacker</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/99-android/1589-geohot-brengt-universele-root-methode-uit-voor-android-apparaten</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/algemene-hacker-info</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/backtrack-info-portal</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/black-hat-conference</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/black-hat-conference/1916-onderzoeker-toont-wifi-worm-via-lek-in-broadcom-chips</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/blackhat-seo-technieken</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/hacking-magazines</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/iphone-hacking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/test-your-hack-skills</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/virus-creation-kit</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/webcam-hacking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/wii-hack</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/wii-hack/217-wii-soft-hack</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/wii-hack/305-wiibrew-update-usb-loader-gx-r736</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/hacking/wii-hack/422-configurable-usb-loader-v52-stable</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/htpc-49520</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/link-exchange</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/links</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/nsa-dosssier</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/peter-draait-door</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/peter-draait-door/1257-hulde-en-bloemen-aan-de-hackers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/peter-draait-door/1441-dodos</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/peter-draait-door/1483-ik-ga-op-reis-en-neem-meemijn-getweakte-120-euro-tablet-keyboard-in-etui</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/peter-draait-door/1505-sambal-bij-velox-smartphone-review</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/peter-draait-door/1823-kali-2016-2-rr-de-security-tool-beter-beveiligd</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/security</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/security/anoniem-surfen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/security/de-beste-security-ahacking-tools</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/security/encryptie</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/security/firewall-software</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/security/virusscanner-software</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/security/web-application-security-scanner-tools</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/126-hardware-hacking-tool/1590-rubber-ducky-usb-in-vermomming</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/126-hardware-hacking-tool/1794-usb-aanval-met-behulp-van-teensy-board</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/126-hardware-hacking-tool/1800-malware-kan-data-offline-computer-via-usbee-stelen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/126-hardware-hacking-tool/1822-poison-tap-usb-hacktool-die-cookies-van-vergrendelde-computer-kan-stelen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/app-hacking-tools</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/firewall-tools</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/iphone-hacking-tools</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/iphone-hacking-tools/1389-untethered-jailbreak-voor-oudere-apple-hardware-komt-uit</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/iphone-hacking-tools/1493-metasploit-of-iphone-en-ipad</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/iphone-hacking-tools/1690-forensische-tool-voor-iphones-en-icloud-nu-ook-voor-mac-os-x</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/iphone-hacking-tools/39-security/security6/1471-top-30-populairste-linkedin-wachtwoorden</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/iphone-hacking-tools/39-security/security6/1500-nieuw-lek-in-oude-internet-explorer-versies-wordt-actief-misbruikt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/online-tooling</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/security-tools</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/security-tools/1255-thc-hydra-v64-fast-network-logon-cracker</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/security-tools/1307-microsoft-verbetert-software-security-tools</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/security-tools/1315-beef-the-browser-exploitation-framework</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/security-tools/1338-gratis-hackertool-metasploit-nog-gebruikersvriendelijker</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/security-tools/1444-joomscan-442012-security-scanner-623-vulnerabilities-added</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/security-tools/1692-usbkill-code-die-laptop-uitschakelt-bij-diefstal</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/security-tools/1797-decryptietool-voor-cerber-ransomware-beschikbaar</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/security-tools/1798-gratis-mozilla-webtool-scant-ssl-gebruik-websites</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/security-tools/1903-tool-verwijdert-verborgen-watermerk-in-pdf-bestanden</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/security-tools/1915-gratis-decryptietool-voor-petya-ransomware</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/virus-scan-tools</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/web-hack-tools</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/web-hack-tools/1117-the-best-tools-4-firefox-add-on-hacking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/web-hack-tools/1173-insect-pro-v21-released-download-with-video-tutorial</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/web-hack-tools/1213-sql-poizon-v11-sqli-exploit-scanner-search-hunter-injection-builder-tool</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/web-hack-tools/1384-large-password-list-free-download-dictionary-file-for-password-cracking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/web-hack-tools/1600-wat-is-rat-of-remote-access-trojan</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/web-hack-tools/380-bouw-je-eigen-botnet-met-zeus-toolkit</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/webhack-tools</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/webhack-tools/107-hackertool-metasploit-ook-geschikt-voor-windows-xp</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/webhack-tools/1520-wifi-hacking-software-aircrack-ng-released-12-beta-1</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/webhack-tools/269-how-to-find-the-best-free-wi-fi</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/webhack-tools/54-essential-wireless-hacking-tools</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools/1223-darkcomet-rat-v33-released</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools/1231-google-dorks-to-find-targets-for-sql-injection</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools/129-metasploit-meterpreter</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools/1371-cain-a-abel-v4943-released</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools/1433-hoic-een-nieuw-anonymous-ddos-tool</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools/1435-hackertool-misbruikt-windows-rdp-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools/1438-rdp-tool-laat-windows-computers-crashen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools/1719-hacktool-keefarce-steelt-wachtwoorden-uit-keepass</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools/1853-password-cracking-software-2017</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools/39-security/security6/1471-top-30-populairste-linkedin-wachtwoorden</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools/39-security/security6/1500-nieuw-lek-in-oude-internet-explorer-versies-wordt-actief-misbruikt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools/443-metasploit-351-is-live-gegaan</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools/62-de-beste-p2p-programmas-op-een-rijtje</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/toolling/windows-hacking-tools/86-beta-ultieme-hackertoolkit-backtrack-4-online</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/43-hardware-tweak/145-hacking-the-asus-router-for-the-tweet-a-watt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/43-hardware-tweak/157-commodore-64-reincarnated-in-laptop-form</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/43-hardware-tweak/167-bmw-virtual-3d-test-drive-using-glyph-tracking-technology</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/43-hardware-tweak/170-twee-inactieve-cores-op-dualcore-athlon-7750-kunnen-ingeschakeld-worden</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/43-hardware-tweak/209-nintendo-nes-emulation-on-palm-webos</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/59-web/341-vr-bike-ride-through-google-street-view</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/apple-tv</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/diy</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/diy/620-hack-your-door-to-lock-and-unlock-via-text-message-video</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/iphone-jailbreaking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/iphone-jailbreaking/134-external-keyboard-for-iphone-from-our-own-iphone-hacks-no-jailbreaking-needed</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/iphone-jailbreaking/197-onderzoekers-iphonebeveiliging-is-te-omzeilen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/iphone-jailbreaking/347-nieuwe-worm-bouwt-eerste-iphone-botnet</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/iphone-jailbreaking/52-verborgen-ontwikkelfunctie-verandert-iphone-in-tv-gamingapparaat</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/iphone-jailbreaking/68-iphone-3g-software-unlock</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/iphone-jailbreaking/70-iphone-unlocktool-blijkt-niet-voor-iedereen-te-werken</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/kinect-tweaking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/kinect-tweaking/1112-microsoft-komt-deze-lente-met-software-voor-kinect-op-de-pc</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/kinect-tweaking/1140-programmeur-krijgt-kinect-werkend-op-playstation-3</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/kinect-tweaking/1143-diy-home-automation-using-the-kinect</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/kinect-tweaking/1211-gmail-besturen-met-kinect</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/kinect-tweaking/1327-kinect-downloads-and-tutorials</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/kinect-tweaking/1348-ultimate-battlefield-3-simulator</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/kinect-tweaking/1351-follow-this</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/kinect-tweaking/1367-from-kinect-to-makerbot</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/kinect-tweaking/39-security/security6/1471-top-30-populairste-linkedin-wachtwoorden</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/kinect-tweaking/39-security/security6/1500-nieuw-lek-in-oude-internet-explorer-versies-wordt-actief-misbruikt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/kinect-tweaking/437-minority-report-style-web-browsing-with-the-kinect</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/kinect-tweaking/975-3d-sensing-software-voor-kinect</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/ps3-tweak</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/ps3-tweak/381-ps3-backups-draaien-op-motor-storm-exploit</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/104-security/nieuws/1608-honeydrive-3-uitgebracht</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/104-security/nieuws/1618-concurrent-kraakt-beveiliging-op-koffiecups</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/104-security/nieuws/1638-meeste-tor-gebruikers-zijn-te-achterhalen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/106-news/homepage-news/1810-versleuteling-cryptoware-polyglot-gekraakt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1203-adobe-en-google-software-bevat-meeste-lekken</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1204-comodo-hacker-zet-globaltrust-database-online</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1206-duizenden-gevaarlijke-ssl-certificaten-in-omloop</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1209-eerste-betaversie-superveilig-os-qubes</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1218-server-van-duitse-softwareontwikkelaar-ashampoo-is-gehacked</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1219-iphone-stuurt-apple-2-keer-per-dag-locatiegegevens</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1221-the-hackinfo-weekly-is-out</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1226-google-vergiftigd-met-dood-osama-bin-laden</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1230-hackers-publiceren-gehackte-database-met-deelnemers-x-factor-vs</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1249-how-to-hide-secret-messages-and-codes-in-audio-files</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1252-sony-hackers-lulzsec-zelf-gehackt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1261-hackerscollectief-lulzsec-stopt-ermee</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1339-iphone-enige-malware-vrije-smartphone-in-2011</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1340-sophos-ontdekt-geraffineerde-deface-methode-met-php-scripts</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/1341-holodesk-virtuele-holografische-interface-van-microsoft</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/144-200-toename-kwaadaardige-websites</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/154-smartphone-is-rendabel-doel-voor-hackers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/184-google-onthult-10-gevaarlijkste-websites</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/213-brein-eist-verbod-op-usenet-platform-ftd</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/327-ministerie-van-defensie-vs-verdedigt-open-source</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/333-gratis-security-magazine-security-acts</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/335-goedkoop-sleutels-kraken-in-de-cloud</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/337-firefox-meest-lekke-browser-op-internet</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/348-download-google-chrome-os-virtuele-machine</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/119-uncategorised/349-driekwart-top-100-websites-kwetsbaar-voor-ssl-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/130-security/patching/1872-lastpass-dicht-kritiek-lek-in-wachtwoordmanager</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/130-security/patching/1895-wannacry-decryptietool-nu-ook-voor-windows-7-beschikbaar</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/130-security/patching/1908-drupal-dicht-ernstig-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/130-security/patching/1909-microsoft-dicht-opnieuw-door-google-ontdekt-defender-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2016?view=archive&amp;month=10</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2016?view=archive&amp;month=11</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2016?view=archive&amp;month=12</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2016?view=archive&amp;month=4</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2016?view=archive&amp;month=5</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2016?view=archive&amp;month=6</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2016?view=archive&amp;month=7</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2016?view=archive&amp;month=8</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2016?view=archive&amp;month=9</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2017?view=archive&amp;month=1</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2017?view=archive&amp;month=2</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2017?view=archive&amp;month=3</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2017?view=archive&amp;month=4</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2017?view=archive&amp;month=5</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/2017?view=archive&amp;month=6</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1224-bescherm-je-site-met-een-web-application-firewall</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1225-microsoft-anti-cross-site-scripting-library-v40-antixss-v40-released</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1235-microsoft-onthult-httpi-tegen-wifi-hackers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1239-fout-in-verificatiecheck-whatsapp-maakt-meelezen-berichten-mogelijk</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1243-russen-kraken-iphone-encryptie</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1246-captcha-cracked-it-experts-developed-a-software-that-beats-captcha-2</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1253-attacking-and-defending-apple-ios-devices-presentation</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1254-grootschalig-misbruik-van-flash-player-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1263-de-cwesans-top-25-gevaarlijkste-softwarefouten</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1332-deze-gemeentewebsites-zijn-allemaal-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1333-scammers-misbruiken-dood-steve-jobs-op-facebook</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1336-zero-day-exploit-voor-opera-gepubliceerd</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1337-oracle-dicht-76-lekken-waarvan-20-in-java</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1342-nasdaq-hack-blijkt-omvangrijker-dan-gedacht</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1344-webcam-lek-laat-websites-bezoekers-bespioneren</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1352-email-account-gekraakt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1358-microsoft-windows-udp-lek-lastig-voor-hackers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1359-the-basics-on-buffer-overflow</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1366-apache-configuratiefout-opent-interne-netwerk</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/142-businesses-are-next-after-dalai-lama-hack</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1442-mac-gebruikers-doelwit-java-zero-day-aanval</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1445-samba-beveiligingslek-patch</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1449-aangepaste-http-header-voorkomt-computerinfectie</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1451-microsoft-dicht-beveiligingslek-in-hotmail</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1454-skype-lekt-ip-adressen-gebruikers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1455-php-installaties-met-cgi-wrapper-zijn-kwetsbaar-voor-ernstige-bug</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/146-opensource-netwerkscanner-detecteert-conficker</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/147-duizend-gestolen-hotmail-accounts-slechts-7-euro-waard</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1471-top-30-populairste-linkedin-wachtwoorden</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1472-mysql-allows-root-access-for-every-1-in-256-login-attempts-without-a-password</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1500-nieuw-lek-in-oude-internet-explorer-versies-wordt-actief-misbruikt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1502-windows-8-bewaart-wachtwoorden-in-platte-tekst</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1503-hacker-kan-massamoord-plegen-via-pacemaker-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1506-tienduizenden-nederlandse-instellingen-kwetsbaar-door-snmp-probleem</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/151-nieuwe-adobe-reader-exploit-in-hacker-toolkit</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1512-malware-infecteert-grote-hoeveelheid-websites-op-apache-servers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1514-hackers-schieten-gaten-in-linux-en-linksys-routers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1516-top-10-aangevallen-poorten-op-internet</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1517-digitale-pleister-voor-webcam-massaal-vergeten</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/152-ondetecteerbare-rootkit-geeft-virusscanners-het-nakijken</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/153-openofficeorg-zeer-kwetsbaar-voor-malware</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1533-veel-android-lekken-door-aanpassingen-fabrikant</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/156-twitter-getroffen-door-wormaanval</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1577-ernstig-lek-in-openssl-miljoenen-websites-in-gevraar</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1578-wordpress-dicht-ernstig-beveiligingslek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/158-iphonevirus-is-top-van-ijsberg</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1580-phishingsites-gehost-op-computers-breedbandgebruikers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1583-ie-weer-veilig-door-update-microsoft</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1585-de-gevaarlijkste-apps</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/159-vijf-jaar-oud-ie-lek-populairst-bij-hackers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1594-zero-day-lek-in-timthub</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/160-hackers-kraken-versleutelde-pincodes</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1604-bug-in-samba-maakt-uitvoeren-root-code-op-afstand-mogelijk</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1605-ransomware-richt-zich-op-synology-opslagsystemen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1606-chrome-safari-en-ie-browser-updates</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1609-vnc-standaard-wagenwijd-open</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/161-hacker-voert-shellcode-uit-op-apple-iphone</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1619-tien-jaar-oude-bug-ontdekt-in-openbsd</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1621-snapsave-app-hack-honderdduizenden-snapchat-foto-s-liggen-op-straat</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1622-zero-days-veiligheidslekken-te-koop</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1623-drupal-dicht-zeer-ernstig-beveiligingslek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1627-verkeerd-geconfigureerde-oracle-servers-lekken-massaal-data</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1628-belgische-scholen-slecht-beveiligd</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/163-eerste-mac-os-x-botnet-ontdekt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1630-tientallen-gemeenten-gebruikten-standaardwachtwoord-cms</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1632-lek-os-x-yosemite-geeft-lokale-aanvaller-rootrechten</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1634-malware-verspreid-via-wifi-netwerken-van-hotels</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1635-bug-in-ssl-implementatie-windows-laat-aanvaller-code-uitvoeren</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/164-afluisterpraktijken-nsa-overstijgen-gestelde-limieten</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1640-kritieke-wordpress-update-verhelpt-meerdere-lekken</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/165-fbi-spyware-al-jaren-plaag-voor-hackers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/166-snort-snuift-aan-nieuwe-website</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1682-miljoen-wordpress-installaties-vatbaar-voor-xss-kwetsbaarheid-plugin</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1685-actief-misbruik-van-http-sys-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1686-veel-ios-apps-bevatten-https-kwetsbaarheid-2</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1687-wordpress-dicht-kritiek-xss-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1688-weer-kritiek-xss-lek-in-wordpress-gepatcht-2</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/169-marokko-grootste-afnemer-gratis-phishingkits</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1694-miljoenen-routers-kwetsbaar-door-ernstig-netusb-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1695-sms-laat-elke-iphone-crashen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1707-nieuw-android-lek-laat-malafide-apps-toestel-volledig-overnemen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1708-android-patch-beschermt-niet-tegen-stagefright-bu</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1710-volledige-systeemtoegang-in-windows-10-mobile-blootgelegd</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1717-network-time-protocol-is-te-misbruiken-voor-aanvallen-op-https-en-dnssec</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1718-oomla-dicht-zeer-gevaarlijk-sqlinjectie-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/172-website-kan-wachtwoord-ip-camera-stelen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1720-exploit-voor-ernstig-vbulletin-lek-openbaar-gemaakt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1722-linux-ransomware-door-ontwerpfout-gekraakt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1723-chrome-zero-day-lek-maakt-miljoenen-android-apparaten-kwetsbaar-voor-remote-hacking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1724-barcode-geeft-hackers-toegang-tot-hoofdsysteem</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/174-douane-doorzoekt-900-mobiele-telefoons-op-schiphol</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/175-id-thieves-advertising-on-youtube</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/176-pdf-over-varkensgriep-bevat-trojaans-paard</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/177-website-krantencom-host-malware</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1772-aanvallen-op-websites-via-beveiligingslek-in-imagemagick</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1774-onbekend-lek-in-flash-player-aangevallen-via-word-document-2</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1776-netflix-reset-wachtwoorden-gebruikers-uit-voorzorg</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1777-d-link-wificamera-bevat-lek-dat-overname-mogelijk-maakt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1779-apparaatje-makt-het-mogelijk-om-contactloze-bankpassen-te-klonen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/178-sterren-wederom-niet-veilig-op-twitter</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1780-android-ransomware-kan-slimme-televisies-vergrendelen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/179-microsoft-scant-zes-miljoen-nederlandse-computers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1793-https-lek-kan-gegevens-met-javascript-onderscheppen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1795-onderzoekers-kraken-sleutel-van-100-miljoen-volkswagens</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1796-samsung-ip-camera-vol-beveiligingsproblemen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1799-malware-infecteert-1-miljoen-iot-apparaten</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/180-kill-commando-vernietigt-botnet-van-100000-computers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1808-backdoors-en-andere-lekken-in-d-link-router-ontdekt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1809-broncode-gigantische-ddos-aanval-online-gezet</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1812-ernstig-lek-kon-aanvaller-rootrechten-op-chromeos-geven</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1813-wordpress-sites-gehackt-via-zero-day-lek-in-marketplace-plug-in</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1815-overheid-waarschuwt-voor-ernstige-joomla-lekken</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1817-belangrijke-beveiligingsupdate-openssl-aangekondigd</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1818-lek-in-d-link-routers-kan-aanvaller-rootrechten-geven</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1824-netis-routers-via-backdoor-benaderbaar</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1828-zero-day-lek-in-firefox-die-tor-gebruikers-mogelijk-kan-ontmaskeren</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/185-hacker-vernietigt-100000-websites</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/186-gumblar-virus-op-tienduizenden-websites-actief</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1877-200-000-webwinkels-kwetsbaar-door-ongepatcht-magento-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1879-meer-dan-100-000-drupal-sites-kwetsbaar-door-ernstig-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1880-ernstige-beveiligingslekken-in-gastnetwerk-linksys-routers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1884-enstig-squirrelmail-lek-geeft-aanvaller-toegang-tot-server</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1888-open-poorten-maken-smartphones-kwetsbaar-voor-data-diefstal</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1889-intel-server-processor-bevat-een-ernstig-remote-access-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/189-ernstig-privacy-lek-in-alle-browsers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1890-aanvaller-kan-via-wordpress-lek-het-wachtwoord-resetten</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1891-uitgeschakelde-computer-via-intel-lek-volledig-over-te-nemen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/1896-dos-lek-in-windows-7-en-8-1-gevonden</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/190-msn-website-besmet-met-drive-by-download</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/191-nat-maakt-netwerken-kwetsbaar-voor-hackers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/192-backdoor-in-windows-media-opent-intranet-voor-hackers</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/204-waarschuwing-voor-michael-jackson-malware</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/207-govcert-geen-gmail-voor-ambtenaren</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/208-new-malware-threat-targets-twitter-users</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/314-na-hotmail-ook-gmail-en-yahoo-accounts-op-straat</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/315-ssl-nog-steeds-zo-lek-als-een-vergiet</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/322-google-voicemails-door-iedereen-af-te-luisteren</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/325-truecrypt-keylogger-prooi-voor-scriptkiddies</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/326-hackertool-luistert-blackberry-gebruikers-af</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/330-hackers-verstoppen-iframes-op-nieuwe-manier</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/338-hackers-loeren-op-windows-kernel-lek</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/339-beveiliger-sloopt-botnet-binnen-24-uur</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/344-groot-gat-in-open-source-e-learning-cms-moodle</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/39-security/security6/46-veilig-applicaties-draaien</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/51-development/game-development/1820-ontwikkelaar-maakt-vr-mod-voor-red-alert-2-met-unreal-engine-4</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/53-gaming/opinion/1452-valve-geeft-op-8-mei-map-editor-voor-portal-2-vrij</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/53-gaming/opinion/328-wii2-in-3e-kwartaal-2010-op-de-markt</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/54-gaming/review4/1885-tomb-raider-1-is-in-webbrowser-te-spelen</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/54-gaming/review4/194-qnatal-krijgt-een-launch-als-die-van-de-360q</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/54-gaming/review4/195-nieuwe-xbox-met-natal-verschijnt-in-2010</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/56-hardware/security/1617-code-voor-manipuleren-van-usb-controllers-beschikbaar</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/56-hardware/security/193-hackers-luisteren-draadloze-toetsenborden-af</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/67-gaming/game-engines/1593-gratis-cryengine-game-starter-kit</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/raspberry-pi/67-gaming/game-engines/334-epic-stelt-ontwikkeltools-unreal-engine-3-gratis-beschikbaar</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/wii-hack-42196</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/xbox-360</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/xbox-360/374-lots-of-xbox-360-hack-info</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/tweaking/xbox-360/441-usb-loader-gx-20-is-out-ciosx-rev21-a</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/wep-hacking</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/wep-hacking/1360-setup-a-fake-accesspoint-with-backtrack-5</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/wep-hacking/1403-nieuwe-reaver-kraakt-wifi-routers-nog-sneller</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/wep-hacking/1427-wireless-man-in-the-middle-mitm</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/wep-hacking/168-hackers-maken-gehakt-van-draadloze-ip-camera</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/wep-hacking/1778-alarm-mitsubishi-outlander-phev-is-uit-te-schakelen-via-wifi-hack</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/wep-hacking/1874-miljoenen-smartphones-te-hacken-door-lek-in-broadcom-wifi-chip</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/wep-hacking/331-nieuwe-wifi-aanval-ondermijnt-wpatkip</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/wep-hacking/346-mobieltjes-via-wifi-te-hacken</loc>
    </url>
    <url>
        <loc>https://www.hackinfo.nl/index.php/wep-hacking/78-cracking-a-wep-using-openwrt-on-your-wrt54g-router</loc>
    </url>
</urlset>