<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Cybersecurity Notes: Cybersecurity Projects]]></title><description><![CDATA[This sections covers Cybersecurity Projects from real-life projects including project files.]]></description><link>https://notes.techimpossible.com/s/cybersecurity-projects</link><image><url>https://substackcdn.com/image/fetch/$s_!Vt0i!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F764ddc30-2787-4432-9853-4962e1b70c16_1280x1280.png</url><title>Cybersecurity Notes: Cybersecurity Projects</title><link>https://notes.techimpossible.com/s/cybersecurity-projects</link></image><generator>Substack</generator><lastBuildDate>Tue, 05 May 2026 11:48:32 GMT</lastBuildDate><atom:link href="https://notes.techimpossible.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Peter Skaronis]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cybersecuritynotes@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cybersecuritynotes@substack.com]]></itunes:email><itunes:name><![CDATA[Peter Skaronis]]></itunes:name></itunes:owner><itunes:author><![CDATA[Peter Skaronis]]></itunes:author><googleplay:owner><![CDATA[cybersecuritynotes@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cybersecuritynotes@substack.com]]></googleplay:email><googleplay:author><![CDATA[Peter Skaronis]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block></channel></rss>