<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 11:40 pm by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://hacking.lk/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>hacking.lk</title>
		<link><![CDATA[https://hacking.lk]]></link>
		<description><![CDATA[hacking.lk]]></description>
		<lastBuildDate><![CDATA[Wed, 28 Sep 2022 16:13:52 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://hacking.lk/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://hacking.lk/information-gathering-tools-of-hacking-side/]]></guid>
			<link><![CDATA[https://hacking.lk/information-gathering-tools-of-hacking-side/]]></link>
			<title>Hacking side එකේ use කරන information gathering tools ගැන දැන ගන්න මේ article  එක කියවන්න.</title>
			<pubDate><![CDATA[Wed, 28 Sep 2022 16:13:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/top-10-hacking-reports/]]></guid>
			<link><![CDATA[https://hacking.lk/top-10-hacking-reports/]]></link>
			<title>Hacking ගැන හොඳම වාර්තාමය වැඩසටහන් 10</title>
			<pubDate><![CDATA[Wed, 28 Sep 2022 16:13:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/ransomeware-attacks-on-laptop/]]></guid>
			<link><![CDATA[https://hacking.lk/ransomeware-attacks-on-laptop/]]></link>
			<title>lap එකට pc එකට ransomware attack  එකක් ආවොත්  කරන්න ඕනි මොනාද?</title>
			<pubDate><![CDATA[Wed, 28 Sep 2022 16:12:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/what-is-the-cyberlaw-regulations-and-policies-1/]]></guid>
			<link><![CDATA[https://hacking.lk/what-is-the-cyberlaw-regulations-and-policies-1/]]></link>
			<title>මොනවද Cyberlaw regulations and policies කියන්නේ ?Article 01</title>
			<pubDate><![CDATA[Wed, 28 Sep 2022 16:08:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/what-is-the-phases-of-ethical-hacking/]]></guid>
			<link><![CDATA[https://hacking.lk/what-is-the-phases-of-ethical-hacking/]]></link>
			<title>මොනවද මේ Ethical hacking  වල Phases?</title>
			<pubDate><![CDATA[Wed, 28 Sep 2022 16:08:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/]]></guid>
			<link><![CDATA[https://hacking.lk/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Wed, 26 Jun 2024 09:59:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/godzilla-content/]]></guid>
			<link><![CDATA[https://hacking.lk/godzilla-content/]]></link>
			<title>Godzilla content</title>
			<pubDate><![CDATA[Wed, 15 May 2024 10:35:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/boostrap-project/]]></guid>
			<link><![CDATA[https://hacking.lk/boostrap-project/]]></link>
			<title>Landing Page එක මුල ඉදන් හදමු 💪 &#8211; Complete Boostrap Project</title>
			<pubDate><![CDATA[Tue, 24 Jan 2023 11:25:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/download-section-youtube-video/]]></guid>
			<link><![CDATA[https://hacking.lk/download-section-youtube-video/]]></link>
			<title>Download Section : Youtube Video</title>
			<pubDate><![CDATA[Tue, 24 Jan 2023 10:30:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/bug-bounty-youtube/]]></guid>
			<link><![CDATA[https://hacking.lk/bug-bounty-youtube/]]></link>
			<title>හැකර් කෙනෙක් කරන්නම ඕනේ Bug Bounty !! &#8211; Ethical Hacker Guide</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 11:55:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/5-of-cyber-security-reports-you-must-see/]]></guid>
			<link><![CDATA[https://hacking.lk/5-of-cyber-security-reports-you-must-see/]]></link>
			<title>බැලිය යුතුම cyber Security වාර්තා වැඩසටහන් පහක්</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 06:49:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/how-to-use-passwords/]]></guid>
			<link><![CDATA[https://hacking.lk/how-to-use-passwords/]]></link>
			<title>Password භාවිතය ගැන ඔබ දැනගතම යුතු කරුණු 5ක්</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 06:40:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/how-to-install-zoom-on-kali-linux/]]></guid>
			<link><![CDATA[https://hacking.lk/how-to-install-zoom-on-kali-linux/]]></link>
			<title> Kali Linux වලට කොහොමද අපි කවුරුත් දන්න Zoom කියන මෘදුකාංගය install කරන්නේ?</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 06:35:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/what-is-the-dropbox/]]></guid>
			<link><![CDATA[https://hacking.lk/what-is-the-dropbox/]]></link>
			<title>මොකක්ද මේ Dropbox කියන්නේ?</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 06:27:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/how-to-take-screenshots-on-kali-linux/]]></guid>
			<link><![CDATA[https://hacking.lk/how-to-take-screenshots-on-kali-linux/]]></link>
			<title>කොහොමදKali Linux වලscreenshot ගන්නේ</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 06:18:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/does-apple-airtag-hacked/]]></guid>
			<link><![CDATA[https://hacking.lk/does-apple-airtag-hacked/]]></link>
			<title>Apple Air Tag එක hack වෙලාද?</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 06:06:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/top-nine-phishing-simulators/]]></guid>
			<link><![CDATA[https://hacking.lk/top-nine-phishing-simulators/]]></link>
			<title>Top nine phishing simulators</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 04:35:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/bios-uefi-එක්ක-virtualization-වැඩ-කරන්නේ-කොහොමද/]]></guid>
			<link><![CDATA[https://hacking.lk/bios-uefi-එක්ක-virtualization-වැඩ-කරන්නේ-කොහොමද/]]></link>
			<title>BIOS/UEFI එක්ක Virtualization වැඩ කරන්නේ කොහොමද?</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 04:31:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/corrupt-වෙච්ච-windows-files-repair-කරන්නේ-කොහොමද/]]></guid>
			<link><![CDATA[https://hacking.lk/corrupt-වෙච්ච-windows-files-repair-කරන්නේ-කොහොමද/]]></link>
			<title>Corrupt වෙච්ච Windows Files Repair කරන්නේ කොහොමද?</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 04:18:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/phish-test-your-remote-workforce-ආයතනයක්-attack-වලට-හුරු-කරන/]]></guid>
			<link><![CDATA[https://hacking.lk/phish-test-your-remote-workforce-ආයතනයක්-attack-වලට-හුරු-කරන/]]></link>
			<title>Phish-test your remote workforce : ආයතනයක් Attack වලට හුරු කරන්න ඕනෙද ?</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 04:10:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/phishing-තාක්ෂණික-ක්රම-fake-invoice-bills/]]></guid>
			<link><![CDATA[https://hacking.lk/phishing-තාක්ෂණික-ක්රම-fake-invoice-bills/]]></link>
			<title>Phishing තාක්ෂණික ක්‍රම : Fake invoice/bills</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 04:06:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/ransomeware-attacks-on-laptop-2/]]></guid>
			<link><![CDATA[https://hacking.lk/ransomeware-attacks-on-laptop-2/]]></link>
			<title>Ransomware attack  එකක් ආවොත් මොකක්ද කරන්න ඕන? කතා කරමු ඒ ගැන .</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 03:50:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/මොකක්ද-මේ-captive-portal-කියලා-කියන්නේ/]]></guid>
			<link><![CDATA[https://hacking.lk/මොකක්ද-මේ-captive-portal-කියලා-කියන්නේ/]]></link>
			<title>මොකක්ද මේ Captive Portal කියලා කියන්නේ?</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 03:46:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/thumb-drives-කියන්නේ-මොනවද-මේවා-නිසා-se/]]></guid>
			<link><![CDATA[https://hacking.lk/thumb-drives-කියන්නේ-මොනවද-මේවා-නිසා-se/]]></link>
			<title>Thumb Drives කියන්නේ මොනවද? මේවා නිසා Security side එකට ලොකු බලපෑමක් වෙන්න පුලුවන්ද?</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 03:13:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/advanced-cryptography-ගැන-දැන-ගන්න-මෙන්න-ඔයාට/]]></guid>
			<link><![CDATA[https://hacking.lk/advanced-cryptography-ගැන-දැන-ගන්න-මෙන්න-ඔයාට/]]></link>
			<title>Advanced Cryptography article 01 &#8211; Advanced Cryptography ගැන දැන ගන්න මෙන්න ඔයාට හොද chance එකක්.</title>
			<pubDate><![CDATA[Tue, 04 Apr 2023 03:10:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/podcast/]]></guid>
			<link><![CDATA[https://hacking.lk/podcast/]]></link>
			<title>Podcast</title>
			<pubDate><![CDATA[Sun, 23 Oct 2022 09:21:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/blog-page/]]></guid>
			<link><![CDATA[https://hacking.lk/blog-page/]]></link>
			<title>Blog Page</title>
			<pubDate><![CDATA[Sun, 21 May 2023 07:24:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/godzilla/]]></guid>
			<link><![CDATA[https://hacking.lk/godzilla/]]></link>
			<title>Cyber Security</title>
			<pubDate><![CDATA[Sun, 19 Feb 2023 03:31:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/blog-center/]]></guid>
			<link><![CDATA[https://hacking.lk/blog-center/]]></link>
			<title>Blog Center</title>
			<pubDate><![CDATA[Sun, 09 Oct 2022 07:26:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/who-are-the-hackers-and-what-they-do/]]></guid>
			<link><![CDATA[https://hacking.lk/who-are-the-hackers-and-what-they-do/]]></link>
			<title>Hackers ලා කියන්නේ කව්ද? මොනවද කරන්නේ? කතා කරමු ඒ ගැන.</title>
			<pubDate><![CDATA[Sun, 09 Oct 2022 02:43:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/e_fail-0x80004005-මේ-code-එක-fix-කරන්නේ-මෙහෙමයි/]]></guid>
			<link><![CDATA[https://hacking.lk/e_fail-0x80004005-මේ-code-එක-fix-කරන්නේ-මෙහෙමයි/]]></link>
			<title>E_FAIL (0x80004005) මේ Code එක Fix කරන්නේ මෙහෙමයි.</title>
			<pubDate><![CDATA[Sun, 09 Oct 2022 02:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/blog/]]></guid>
			<link><![CDATA[https://hacking.lk/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Sun, 09 Oct 2022 02:14:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/phishing-attack-එකකින්-android-iphone-passcodes-capture-කරමු/]]></guid>
			<link><![CDATA[https://hacking.lk/phishing-attack-එකකින්-android-iphone-passcodes-capture-කරමු/]]></link>
			<title>Phishing attack එකකින් Android, iPhone passcodes Capture කරමු</title>
			<pubDate><![CDATA[Mon, 03 Oct 2022 05:40:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/advanced-cryptography-article-02-hill-cipher-one-time-pad-ගැන-දැන-ගන්න-නම්-ම/]]></guid>
			<link><![CDATA[https://hacking.lk/advanced-cryptography-article-02-hill-cipher-one-time-pad-ගැන-දැන-ගන්න-නම්-ම/]]></link>
			<title>Advanced Cryptography article 02 &#8211; Hill Cipher &#038; One time pad ගැන දැන ගන්න නම්, මේ article එක ඔයාට වැදගත් වෙනවා.</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 12:12:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/advance-cryptography-article-03-practical-cipher-එකක්-කියන්නේ-මොකක/]]></guid>
			<link><![CDATA[https://hacking.lk/advance-cryptography-article-03-practical-cipher-එකක්-කියන්නේ-මොකක/]]></link>
			<title>Advance Cryptography article 03 – Practical cipher එකක් කියන්නේ මොකක්ද? ඒ ගැන දැන ගන්න නම් මෙන්න ඔයාට chance එකක්.</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 12:06:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/advance-cryptography-article-04-des-2des-3des-aes-කියන්නේ-මොනවද-අද/]]></guid>
			<link><![CDATA[https://hacking.lk/advance-cryptography-article-04-des-2des-3des-aes-කියන්නේ-මොනවද-අද/]]></link>
			<title>Advance Cryptography article 04 – DES, 2DES, 3DES, AES කියන්නේ මොනවද? අද කතා කරමු ඒ ගැන.</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 12:04:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/cyber-terrorism-information-warfare-article-01/]]></guid>
			<link><![CDATA[https://hacking.lk/cyber-terrorism-information-warfare-article-01/]]></link>
			<title>Cyber Terrorism &#038; Information warfare &#8211; Article 01</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 11:59:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/digital-forensic-article-01-digital-forensic-කියන්නේ-මොකක්ද-ඒ-ගැ/]]></guid>
			<link><![CDATA[https://hacking.lk/digital-forensic-article-01-digital-forensic-කියන්නේ-මොකක්ද-ඒ-ගැ/]]></link>
			<title>Digital Forensic Article 01 &#8211; Digital Forensic කියන්නේ මොකක්ද? ඒ ගැන දැන ගන්න නම් මේ article එක කියවන්න.</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 11:52:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/digital-forensic-article-03-digital-evidence-එකක්-කියන්නේ-මොකක්/]]></guid>
			<link><![CDATA[https://hacking.lk/digital-forensic-article-03-digital-evidence-එකක්-කියන්නේ-මොකක්/]]></link>
			<title>Digital Forensic Article 03 &#8211; Digital Evidence එකක් කියන්නේ මොකක්ද? කතා කරමු ඒ ගැන.</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 11:50:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/digital-forensic-article-04-data-acquisition-කියලා-කියන්නේ-මොක/]]></guid>
			<link><![CDATA[https://hacking.lk/digital-forensic-article-04-data-acquisition-කියලා-කියන්නේ-මොක/]]></link>
			<title>Digital Forensic Article 04 – Data Acquisition කියලා කියන්නේ මොකක්ද? අද article එකෙන් ඒක ගැන කතා කරමු.</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 11:47:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/thumbs-db-and-thumb-cache-db-analysis-කියලා-කියන්නේ-මොකක්/]]></guid>
			<link><![CDATA[https://hacking.lk/thumbs-db-and-thumb-cache-db-analysis-කියලා-කියන්නේ-මොකක්/]]></link>
			<title>Thumbs. dB and Thumb cache. dB Analysis කියලා   කියන්නේ මොකක්ද?</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 11:32:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/recycle-bin-analysis-කියන්නේ-මොකක්ද/]]></guid>
			<link><![CDATA[https://hacking.lk/recycle-bin-analysis-කියන්නේ-මොකක්ද/]]></link>
			<title>Recycle Bin Analysis කියන්නේ මොකක්ද?</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 11:29:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/windows-registry-analysis-කියලා-කියන්නේ-මොකක්ද/]]></guid>
			<link><![CDATA[https://hacking.lk/windows-registry-analysis-කියලා-කියන්නේ-මොකක්ද/]]></link>
			<title>Windows Registry Analysis කියලා කියන්නේ මොකක්ද?</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 11:19:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/cyber-terrorism-information-warfare-article-02-cyber-kill-chain-ckc/]]></guid>
			<link><![CDATA[https://hacking.lk/cyber-terrorism-information-warfare-article-02-cyber-kill-chain-ckc/]]></link>
			<title>Cyber Terrorism &#038; Information warfare &#8211; Article 02 (Cyber Kill chain &#8211; CKC)</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 11:14:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/cyber-terrorism-information-warfare-article-03cyber-warriors/]]></guid>
			<link><![CDATA[https://hacking.lk/cyber-terrorism-information-warfare-article-03cyber-warriors/]]></link>
			<title>Cyber Terrorism &#038; Information warfare &#8211; Article 03(Cyber Warriors)</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 11:11:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/cyber-terrorism-information-warfare-article-04-cyber-weapons/]]></guid>
			<link><![CDATA[https://hacking.lk/cyber-terrorism-information-warfare-article-04-cyber-weapons/]]></link>
			<title>Cyber Terrorism &#038; Information warfare &#8211; Article 04 (Cyber Weapons)</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 11:06:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/cyber-terrorism-information-warfare-article-05-cyber-doctrine/]]></guid>
			<link><![CDATA[https://hacking.lk/cyber-terrorism-information-warfare-article-05-cyber-doctrine/]]></link>
			<title>Cyber Terrorism &#038; Information warfare &#8211; Article 05 (Cyber Doctrine)</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 11:03:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/cyber-terrorism-information-warfare-article-06-penetration-testing/]]></guid>
			<link><![CDATA[https://hacking.lk/cyber-terrorism-information-warfare-article-06-penetration-testing/]]></link>
			<title>Cyber Terrorism &#038; Information warfare &#8211; Article 06 (Penetration Testing)</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 10:59:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/cyber-terrorism-information-warfare-article-07-red-team-blue-team-and-purple-team/]]></guid>
			<link><![CDATA[https://hacking.lk/cyber-terrorism-information-warfare-article-07-red-team-blue-team-and-purple-team/]]></link>
			<title>Cyber Terrorism &#038; Information warfare &#8211; Article 07 ((Red team, blue team and purple team))</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 10:44:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hacking.lk/metadata-analysis-and-exif-data-analysis-ගැන-ඔයා-දන්නේ-මොනවද/]]></guid>
			<link><![CDATA[https://hacking.lk/metadata-analysis-and-exif-data-analysis-ගැන-ඔයා-දන්නේ-මොනවද/]]></link>
			<title>Metadata Analysis and Exif Data Analysis ගැන ඔයා දන්නේ මොනවද?</title>
			<pubDate><![CDATA[Mon, 03 Apr 2023 07:25:17 +0000]]></pubDate>
		</item>
				</channel>
</rss>
