<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://linhadefensiva.org/sobre/</loc><lastmod>2025-07-20T20:01:34+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/sobre/equipe/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/ciro-mota2.jpg</image:loc><image:title>Ciro Mota</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/ronaldo-cinti2.jpg</image:loc><image:title>Ronaldo Cinti</image:title><image:caption>Ronaldo Cinti</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/elias-pereira2.jpg</image:loc><image:title>Elias Pereira</image:title><image:caption>Elias Pereira</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/maria-cristina2.jpg</image:loc><image:title>Maria Cristina</image:title><image:caption>Maria Cristina</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/luciana-leme2.jpg</image:loc><image:title>Luciana Leme</image:title><image:caption>Luciana Leme</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/carlos-turco2.jpg</image:loc><image:title>Carlos Turco</image:title><image:caption>Carlos Turco</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/altieres-rohr2.jpg</image:loc><image:title>Altieres Rohr</image:title><image:caption>Altieres Rohr</image:caption></image:image><lastmod>2025-07-20T19:56:21+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/2015/11/24/por-que-o-voto-impresso-nao-e-voto-de-cabresto-nem-retrocesso/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/11/urnabrasil2.jpeg</image:loc><image:title>Urna eletrônica brasileira (José Cruz / ABr)</image:title><image:caption>Urna eletrônica brasileira (José Cruz / ABr)</image:caption></image:image><lastmod>2022-08-26T14:08:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2016/07/25/oi-wifi-fon-e-o-milagre-dos-hotspots/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2016/07/cabo_internet-mike_gieson1.jpg</image:loc><image:title>Modem</image:title><image:caption>Empresas utilizam modens residenciais como hotspots. (Foto: Mike Gieson/FreeImages)</image:caption></image:image><lastmod>2019-11-17T18:01:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/01/as-mudancas-na-distribuicao-de-software-e-a-seguranca/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/altimit2.png</image:loc><image:title>Altimit OS</image:title><image:caption>O supersseguro ALTIMIT OS do universo .hack</image:caption></image:image><lastmod>2017-12-08T21:48:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/bankerfix/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/superdownloads2.jpg</image:loc><image:title>superdownloads</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/09/coralcdn.jpg</image:loc><image:title>coralcdn</image:title></image:image><lastmod>2017-12-08T20:58:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/2011/10/09/como-iniciar-o-windows-no-modo-de-seguranca-ou-modo-seguro/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/021.png</image:loc><image:title>02</image:title><image:caption>Se o F8 não funcionar, clique em Iniciar &gt; Executar, digite msconfig e clique em OK. Marque a opção "Inicialização segura", certifique-se da escolha "Mínima" e clique em OK.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/011.png</image:loc><image:title>01</image:title><image:caption>Inicie o computador pressionando repetidamente a tecla F8. Use as setas do teclado para selecionar "Modo de Segurança" e aperte Enter.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/04.png</image:loc><image:title>04</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/03.png</image:loc><image:title>03</image:title><image:caption>Se o F8 não funcionar, clique em Iniciar &gt; Executar, digite msconfig e clique em OK. Marque a opção "/SAFEBOOT" e clique em OK.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/01.png</image:loc><image:title>01</image:title><image:caption>Inicie o computador pressionando repetidamente a tecla F8. Use as setas do teclado para selecionar "Modo Seguro" e aperte Enter.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/02.png</image:loc><image:title>02</image:title><image:caption>Confirme a execução em Modo de Segurança</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/modoseguranca2.png</image:loc><image:title>Modo Segurança (Reprodução)</image:title><image:caption>Menu do Modo de Segurança no Windows 7. (Foto: Reprodução)</image:caption></image:image><lastmod>2017-12-05T20:11:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/forum/</loc><lastmod>2017-12-05T19:25:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/campanha-selo-site-seguro/internautas/</loc><lastmod>2017-12-05T18:40:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/campanha-selo-site-seguro/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/11/siteseguro-nd3.png</image:loc><image:title>siteseguro-nd</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/11/siteseguro1.png</image:loc><image:title>siteseguro</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/11/siteseguro1.jpg</image:loc><image:title>siteseguro</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/11/saitiosegurio12.jpg</image:loc><image:title>saitiosegurio1</image:title></image:image><lastmod>2017-12-05T18:40:15+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/sobre/discord/</loc><lastmod>2017-12-05T17:33:06+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/2015/11/09/computador-ou-notebook-lento-saiba-as-causas-e-o-que-fazer/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/11/speed-o-meter_rodrigo-galindo2.jpg</image:loc><image:title>Velocímetro (Rodrigo Galindo / Freeimages)</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/11/init2.png</image:loc><image:title>Inicializar no Gerenciador de Tarefas (Reprodução)</image:title><image:caption>Windows determina quais programas podem ter maior impacto no desempenho. Cuidado ao desativar componentes de atualização automática.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/11/tempocpu2.png</image:loc><image:title>Tempo de CPU (Reprodução)</image:title><image:caption>Tempo de CPU ajudar a determinar padrões de constante consumo de CPU.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/11/energiawin2.png</image:loc><image:title>Energia no Windows (Reprodução)</image:title><image:caption>Notebooks são voltados para baixo consumo de energia. "i5" em notebook não é um "i5" em desktop. Configurações de energia também podem reduzir desempenho.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/11/hardwaremonitor1.png</image:loc><image:title>Hardware Monitor (Reprodução)</image:title><image:caption>Hardware Monitor, com temperatura do soquete ("CPU") e núcleo ("Package") de AMD FX-8350.</image:caption></image:image><lastmod>2020-04-08T16:23:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/15/como-remover-extensoes-dos-navegadores/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/opera-3.png</image:loc><image:title>opera-3</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/opera-2.png</image:loc><image:title>opera-2</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/opera-1.png</image:loc><image:title>opera-1</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/firefox-2.png</image:loc><image:title>firefox-2</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/firefox-1.png</image:loc><image:title>firefox-1</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/chrome-3.png</image:loc><image:title>chrome-3</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/chrome-2.png</image:loc><image:title>chrome-2</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/chrome-1.png</image:loc><image:title>chrome-1</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/4-chrome2.png</image:loc><image:title>Google Chrome Web Store (Foto: Reprodução)</image:title><image:caption>Google Chrome Web Store (Foto: Reprodução)</image:caption></image:image><lastmod>2017-12-05T14:43:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/sobre/privacidade/</loc><lastmod>2017-12-05T14:29:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/sobre/termos/</loc><lastmod>2017-12-05T14:28:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/sobre/contato/</loc><lastmod>2017-12-05T14:27:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/2016/07/25/justica-determina-bloqueio-do-whatsapp-mais-do-mesmo/</loc><lastmod>2018-12-26T22:20:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2017/02/03/sites-mediam-venda-de-informacoes-e-suborno-no-submundo-da-web/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2017/02/money-under-the-mouse2.jpg</image:loc><image:title>Dinheiro no mouse (Foto: Pierre Amerlynck / Freeimages.com)</image:title><image:caption>(Foto: Pierre Amerlynck / Freeimages.com)</image:caption></image:image><lastmod>2018-12-26T21:48:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2016/04/10/web-com-franquia-vs-blu-ray-por-sedex-um-comparativo-de-custo/</loc><lastmod>2018-12-30T04:38:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/12/27/reciclando-hackers-a-historia-dos-irmaos-nao-fiz-teste-10/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/12/mitm022.png</image:loc><image:title>Man in the Middle 02: Ataque Man-in-the-middle em andamento (Diego Gonçalves)</image:title><image:caption>Man in the Middle 02: Ataque Man-in-the-middle em andamento (Diego Gonçalves)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/12/mitm012.png</image:loc><image:title>Man in the Middle 01: Figura 1: Acessando um site qualquer na Internet (Diego Gonçalves)</image:title><image:caption>Man in the Middle 01: Figura 1: Acessando um site qualquer na Internet (Diego Gonçalves)</image:caption></image:image><lastmod>2017-07-05T11:53:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/11/12/correios-devolucao-e-rastreamento-sao-temas-de-golpe/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/11/correios-rastreio31.jpg</image:loc><image:title>Fraude - Correios (ARIS/LD)</image:title><image:caption>Fraude usando o nome dos Correios. (ARIS/LD)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/11/correios-rastreio4.jpg</image:loc><image:title>Fraude - Correios (ARIS/LD)</image:title><image:caption>Fraude usando o nome dos Correios. (ARIS/LD)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/11/correios-rastreio21.jpg</image:loc><image:title>Fraude - Correios (ARIS/LD)</image:title><image:caption>Fraude usando o nome dos Correios. (ARIS/LD)</image:caption></image:image><lastmod>2018-02-03T00:53:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/11/05/rastreador-com-46-milhoes-de-torrents-deve-sair-do-ar/</loc><lastmod>2015-11-05T16:28:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/10/21/reciclando-hackers-a-historia-dos-irmaos-nao-fiz-teste-9/</loc><lastmod>2017-07-05T12:18:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/10/03/reciclando-hackers-a-historia-dos-irmaos-nao-fiz-teste-8/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/10/sqli32.png</image:loc><image:title>SQL injection -- #3</image:title><image:caption>SQL injection -- #3</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/10/sqli22.png</image:loc><image:title>SQL Injection -- 2</image:title><image:caption>SQL Injection -- 2</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/10/sqli11.png</image:loc><image:title>SQL Injection -- 1</image:title><image:caption>SQL Injection -- 1</image:caption></image:image><lastmod>2017-07-05T12:17:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/09/15/microsoft-brasil-abre-vagas-de-estagio-em-area-tecnica/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/09/microsoft2.png</image:loc><image:title>Microsoft</image:title><image:caption>Microsoft</image:caption></image:image><lastmod>2015-09-15T13:29:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/09/08/kaspersky-corrige-falha-grave-em-seu-programa-antivirus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/09/taviskav1.png</image:loc><image:title>Tavis Ormandy Kaspersky</image:title><image:caption>Especialista publicou imagem mostrando controle sobre o antivírus. (Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/09/kasperskylab1.png</image:loc><image:title>Kaspersky Lab (Divulgação)</image:title><image:caption>Kaspersky Lab</image:caption></image:image><lastmod>2015-10-11T01:11:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/09/08/agility-networks-promove-webinars-gratuitos-sobre-seguranca/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/09/agilitynet2.png</image:loc><image:title>Agility Networks</image:title><image:caption>Agility Networks</image:caption></image:image><lastmod>2015-09-08T21:46:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/08/26/reciclando-hackers-a-historia-dos-irmaos-nao-fiz-teste-6-2/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/08/dotrob2.png</image:loc><image:title>O Robô</image:title></image:image><lastmod>2017-07-05T12:16:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/08/25/seria-o-whatsapp-o-novo-uber/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/08/whatsapp-messages-640x3413.jpg</image:loc><image:title>WhatsApp</image:title><image:caption>WhatsApp entra na onda Uber após ser chamado de 'pirataria' (Foto: Sam Azgor/CC-BY)</image:caption></image:image><lastmod>2015-11-22T17:40:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/08/10/comecam-os-problemas-com-o-ipv6-erro-na-instalacao-do-office/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/08/ipv4-ipv62.png</image:loc><image:title>IPv4 vs IPv6</image:title><image:caption>Conexão via IPv6 e IPv4</image:caption></image:image><lastmod>2015-09-12T20:50:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/08/08/system-volume-information-no-pen-drive-e-no-pc-e-virus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/08/sysvolumeinformation2.png</image:loc><image:title>System Volume Information</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/08/propriedades-mc2.png</image:loc><image:title>Propriedades Meu Computador</image:title><image:caption>Clique direito em Meu computador, Propriedades</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/08/protecao-sistema2.png</image:loc><image:title>Janela Proteção do Sistema</image:title><image:caption>Janela das configurações de restauração do sistema (proteção do sistema) no Windows 8.1.</image:caption></image:image><lastmod>2020-08-03T19:44:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/07/22/pf-estava-para-fechar-contrato-milionario-de-espionagem/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/htrely2.png</image:loc><image:title>Hacking Team</image:title><image:caption>Imagem de comercial da Hacking Team. (Divulgação)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/htcomm2.png</image:loc><image:title>Hacking Team</image:title><image:caption>Imagem de comercial da Hacking Team. (Divulgação)</image:caption></image:image><lastmod>2015-09-19T14:46:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/07/16/reciclando-hackers-a-historia-dos-irmaos-nao-fiz-teste-6/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/rech6-sqli2.png</image:loc><image:title>Reciclando Hackers 06 - Injeção SQL (Diego Gonçalves)</image:title><image:caption>Entenda como funciona a injeção de SQL ou SQL injection. (Diego Gonçalves/LD)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/rech6-032.png</image:loc><image:title>Reciclando Hackers 06 - Formulário SQLI (Diego Gonçalves)</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/rech6-042.png</image:loc><image:title>rech6-04</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/rech6-022.png</image:loc><image:title>Reciclando Hackers 06 - Formulário Preenchido (Diego Gonçalves)</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/rech6-012.png</image:loc><image:title>Reciclando Hackers 06 - Formulário (Diego Gonçalves)</image:title></image:image><lastmod>2017-07-05T12:14:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/07/10/linha-defensiva-e-bloqueada-pelo-google-por-link/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/relatoriovirusld2.png</image:loc><image:title>Google não identificou malware</image:title><image:caption>Google bloqueou mas 'não conseguiu isolar' o malware.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/ldbloqueada2.png</image:loc><image:title>LD Bloqueada (Reprodução)</image:title><image:caption>Segundo Chrome, havia 'invasores' na página da Linha Defensiva.</image:caption></image:image><lastmod>2015-10-27T03:40:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/07/08/corrigir-android-infectado-redirecionamento-no-arris-da-net/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/androidinfectadoredir2.png</image:loc><image:title>Android Infectado (Reprodução)</image:title><image:caption>Redirecionamentos mostram mensagens falsas. (Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/arris-052.png</image:loc><image:title>ARRIS DNS Google (Reprodução)</image:title><image:caption>ARRIS configurado com o DNS Google, uma das opções para corrigir o problema.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/arris-042.png</image:loc><image:title>ARRIS DNS Override (Reprodução)</image:title><image:caption>Opção DNS Override</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/arris-031.png</image:loc><image:title>ARRIS Lan Setup (Reprodução)</image:title><image:caption>Acesso à aba LAN Setup</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/arris-022.png</image:loc><image:title>ARRIS Login OK (Reprodução)</image:title><image:caption>Tela inicial após o login. Navegação é feita pelas abas superiores.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/07/arris-012.png</image:loc><image:title>ARRIS 01 Login (Reprodução)</image:title><image:caption>Login no modem ARRIS TG862. Usuário: admin / Senha: password</image:caption></image:image><lastmod>2018-02-23T18:32:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/07/08/adobe-corrige-falha-no-flash-usada-por-empresa-de-seguranca/</loc><lastmod>2015-07-08T17:30:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/06/26/fora-pt-e-volta-desciclopedia-bug-deixa-protesto-no-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/forapt2.png</image:loc><image:title>'Fora PT Volta Desciclopedia' (Reprodução)</image:title><image:caption>'Fora PT Volta Desciclopedia' (Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/forapc2.png</image:loc><image:title>Facebook - Fora Politicamente Correto (Reprodução)</image:title><image:caption>'Fora politicamente correto, volta Desciclopédia' (Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/fburss2.png</image:loc><image:title>URSS Derruba Facebook (Reprodução)</image:title><image:caption>'Na União Soviética, a Desciclopédia derruba o Facebook.' (Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/fbintervencaomilitar1.png</image:loc><image:title>'Desciclopédia + Intervenção Militar Já!' (Reprodução)</image:title><image:caption>'Desciclopédia + Intervenção Militar Já!' (Reprodução)</image:caption></image:image><lastmod>2015-06-26T17:15:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/06/26/facebook-podera-reconhecer-voce-ate-com-o-rosto-coberto/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/sad-516702_12802.jpg</image:loc><image:title>Rosto (tgageqd / Pixabay)</image:title><image:caption>Não adianta tentar se esconder? (tgageqd / Pixabay</image:caption></image:image><lastmod>2015-06-26T14:44:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/06/25/reciclando-hackers-a-historia-dos-irmaos-nao-fiz-teste-5/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/cadeado-mihai-andoni2.jpg</image:loc><image:title>Cadeado Segurança (Mihai Andoni / Freeimages)</image:title><image:caption>Cadeado Segurança (Mihai Andoni / Freeimages)</image:caption></image:image><lastmod>2017-07-05T12:13:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/06/24/microsoft-paga-us-125-mil-para-hp-mas-nao-corrige-falha/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/ie-10-logo12.png</image:loc><image:title>IE11 Logo</image:title><image:caption>Internet Explorer (Divulgação)</image:caption></image:image><lastmod>2015-06-25T02:23:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/06/24/video-de-acidente-de-cristiano-araujo-vira-tema-de-fraude-por-e-mail/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/crisara2.png</image:loc><image:title>Fraude Cristiano Araújo (Reprodução)</image:title><image:caption>Golpe se aproveita da morte do cantor Cristiano Araújo e oferece suposto vídeo, mas entrega vírus. (Reprodução)</image:caption></image:image><lastmod>2015-06-25T01:35:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/06/24/gmail-anuncia-recurso-para-cancelar-envio-de-e-mail/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/gmail2.jpg</image:loc><image:title>gmail</image:title><image:caption>Créditos: Gmail/Divulgação</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/desfazer2.jpg</image:loc><image:title>desfazer</image:title><image:caption>Como um "botão do pânico" novo recurso permite mudar ação em caso de envio acidental.</image:caption></image:image><lastmod>2015-06-25T00:38:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/06/21/paises-no-sudeste-da-asia-sofrem-ataque-ciberneticos-ha-tres-anos/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/lotusinfo2.jpg</image:loc><image:title>Infográfico da Palo Alto Networks (Divulgação)</image:title><image:caption>Infográfico da Palo Alto Networks (Divulgação)</image:caption></image:image><lastmod>2015-06-21T18:01:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/06/12/cisco-libera-correcao-para-vulnerabilidade-de-roteador/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/20130912180116_660_4202.jpg</image:loc><image:title>20130912180116_660_420</image:title><image:caption>Vulnerabilidade permitiria um ataque de negação de serviço. (Divulgação)</image:caption></image:image><lastmod>2015-06-12T16:23:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/06/10/falha-em-aparelhos-hospitalares-pode-colocar-vidas-em-risco/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/rigged-iv-1024x7683.jpg</image:loc><image:title>Bomba de Infusão</image:title><image:caption>Bomba de infusão PLUM A+3 da Hospira
(Billy Rios / Divulgação)</image:caption></image:image><lastmod>2015-06-10T19:15:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/06/05/mensagem-pode-forcar-travamento-do-skype/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/untitled-12.jpg</image:loc><image:title>Mensagem Skype</image:title><image:caption>Redação / Captura</image:caption></image:image><lastmod>2015-06-05T12:37:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/06/03/reciclando-hackers-a-historia-dos-irmaos-nao-fiz-teste-4/</loc><lastmod>2017-07-05T12:12:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/06/02/projeto-jacquard-da-google-coloca-tecnologia-em-um-fio/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/fabric-93186_12802.jpg</image:loc><image:title>fabric-93186_1280</image:title><image:caption>weinstock / Pixabay / Domínio Público</image:caption></image:image><lastmod>2015-06-02T11:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/06/01/impasse-no-senado-dos-eua-suspende-espionagem-da-nsa/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/06/access-data-694539_12801.jpg</image:loc><image:title>access-data-694539_1280</image:title><image:caption>geralt/Pixabay/Domínio Público</image:caption></image:image><lastmod>2015-06-01T16:13:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/28/tecnologia-usa-assinatura-manuscrita-como-senha-em-celular/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/rccarvalhogomes0-escrita-pixabay2.jpg</image:loc><image:title>Escrevendo. (rccarvalhogomes0 / Pixabay / Domínio Público)</image:title><image:caption>Sistema considera as '4 dimensões' da escrita. (rccarvalhogomes0 / Pixabay / Domínio Público)</image:caption></image:image><lastmod>2015-05-28T17:09:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/27/extensao-permite-mapear-localizacao-de-amigos-do-facebook/</loc><lastmod>2015-05-27T17:57:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/25/google-trabalha-em-novo-sistema-para-internet-das-coisas/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/internet-das-coisas012.png</image:loc><image:title>Internet das Coisas (Divulgação)</image:title><image:caption>A convergência digital é o futuro da computação (Divulgação)</image:caption></image:image><lastmod>2015-05-27T12:28:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/23/corrija-erro-do-sistema-core-exe-msvcp120-dll-faltando/</loc><lastmod>2018-11-28T21:26:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/22/reset-de-fabrica-nao-apaga-todos-os-dados-no-sistema-android/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/android2.jpg</image:loc><image:title>Android (Divulgação)</image:title><image:caption>Android (Divulgação)</image:caption></image:image><lastmod>2015-05-24T22:48:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/21/pf-deflagra-operacao-araceli-contra-a-pornografia-infantil/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/algema-chickadee2.jpg</image:loc><image:title>Algemado (chickadee / Freeimages)</image:title><image:caption>Algemado (chickadee / Freeimages)</image:caption></image:image><lastmod>2015-05-21T16:07:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/20/vulnerabilidade-coloca-milhoes-de-roteadores-em-risco/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/tpac17502.jpg</image:loc><image:title>TP-LINK Archer C7</image:title><image:caption>TP-LINK Archer C7 ou AC1750, modelo confirmado como vulnerável. (Divulgação)</image:caption></image:image><lastmod>2015-05-20T20:23:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/20/reciclando-hackers-a-historia-dos-irmaos-nao-fiz-teste-3/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/parrot2.png</image:loc><image:title>Menu do Parrot Security (Reprodução)</image:title><image:caption>Menu do Parrot Security (Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/kali-menu2.png</image:loc><image:title>Menu do Kali Linux (Reprodução/Blog Kali Tutorials)</image:title><image:caption>Menu do Kali Linux (Reprodução/Blog Kali Tutorials)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/cyborg2.png</image:loc><image:title>Terminal do Cyborg (Reprodução/Cyborg)</image:title><image:caption>Terminal do Cyborg (Reprodução/Cyborg)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/backbox2.png</image:loc><image:title>XFCE no BackBox (Reprodução/BackBox)</image:title><image:caption>XFCE no BackBox (Reprodução/BackBox)</image:caption></image:image><lastmod>2017-07-05T12:11:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/19/recuperar-arquivos-de-ransomware-com-te94decrypt-e-possivel/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/discorigido2.jpg</image:loc><image:title>Disco Rígido (fDhooghe / Freeimages)</image:title><image:caption>Disco Rígido (fDhooghe / Freeimages)</image:caption></image:image><lastmod>2017-02-09T14:48:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/19/novo-recurso-promete-gameficar-o-facebook-messenger/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/messengerfb2.jpg</image:loc><image:title>Facebook Messenger (Divulgação)</image:title><image:caption>Facebook Messenger (Divulgação)</image:caption></image:image><lastmod>2015-05-19T16:42:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/15/google-muda-politica-e-restringe-mais-extensoes-do-chrome/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/google_chrome_extensions2.jpg</image:loc><image:title>Chrome Extensões (Divulgação)</image:title><image:caption>Canal 'beta' também ficará restrito. (Divulgação)</image:caption></image:image><lastmod>2015-05-15T21:44:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/13/terceira-edicao-da-bhack-conference-ja-tem-data-marcada/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/bhack2013-960x3303.png</image:loc><image:title>BHack (Divulgação)</image:title><image:caption>BHack (Divulgação)</image:caption></image:image><lastmod>2015-05-14T00:44:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/12/google-mastercard-e-microsoft-se-juntam-em-coalizao-antipirataria/</loc><lastmod>2015-05-12T20:34:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/09/programa-de-espionagem-da-nsa-e-julgado-ilegal-nos-eua/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/nsa-fort-meade2.jpg</image:loc><image:title>Sede da NSA em Fort Meade (Divulgação)</image:title><image:caption>Sede da NSA em Fort Meade (Divulgação)</image:caption></image:image><lastmod>2015-05-09T20:58:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/07/falha-no-tema-padrao-do-wordpress-pode-ser-explorada-com-um-clique/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/wp_preview2.jpg</image:loc><image:title>WordPress</image:title><image:caption>Tema TwentyFifteen não precisa estar ativado para que a falha seja explorada.</image:caption></image:image><lastmod>2015-05-07T23:41:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/06/funcionalidade-em-equipamentos-da-cisco-permite-espionagem/</loc><lastmod>2015-05-06T19:51:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/06/mesmo-apos-atualizacoes-falha-em-extensao-do-google-permanece/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/chrome2.png</image:loc><image:title>Chrome</image:title><image:caption>Chrome</image:caption></image:image><lastmod>2015-05-06T16:49:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/06/reciclando-hackers-a-historia-dos-irmaos-nao-fiz-teste-2/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/cadeado-baries2.jpg</image:loc><image:title>Cadeado (Baries/Freeimages)</image:title><image:caption>Cadeado (Baries/Freeimages)</image:caption></image:image><lastmod>2017-07-05T12:11:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/04/pai-de-ferramenta-usada-por-snowden-vira-ao-brasil/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/phil2.jpg</image:loc><image:title>Philip R. Zimmermann (Divulgação)</image:title><image:caption>Philip R. Zimmermann (Divulgação)</image:caption></image:image><lastmod>2015-05-04T16:45:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/01/juiz-anula-pedido-de-dados-da-policia-federal-por-dados-do-twitter/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/twitterwide1.png</image:loc><image:title>Twitter</image:title><image:caption>Twitter</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/twitter_logo_blue2.png</image:loc><image:title>Twitter</image:title><image:caption>Twitter</image:caption></image:image><lastmod>2015-05-01T14:33:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/05/01/falso-dubsmash-2-colocado-no-google-play-infecta-100-mil-pessoas/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/05/dubsmash22.png</image:loc><image:title>Dubsmash 2 (Avast)</image:title><image:caption>O 'Dubsmash 2' cadastrado no Google Play. (Avast)</image:caption></image:image><lastmod>2015-05-01T13:49:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/04/29/reciclando-hackers-a-historia-dos-irmaos-nao-fiz-teste/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/owned_022.png</image:loc><image:title>Owned</image:title></image:image><lastmod>2018-05-30T20:22:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/04/28/com-discurso-de-mudanca-baidu-continua-empurrando-antivirus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/baidu2.jpg</image:loc><image:title>Baidu (Divulgação)</image:title><image:caption>Baidu </image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/ffs-baidu2.jpg</image:loc><image:title>FreeFileSync/Baidu (Reprodução)</image:title><image:caption>Instalação patrocinada do Baidu precisa de dois cliques para ser cancelada.</image:caption></image:image><lastmod>2016-06-07T18:48:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/04/27/protecao-de-antivirus-aumenta-vulnerabilidade-a-interceptacao/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/cadeado-afonso-lima2.jpg</image:loc><image:title>Cadeado (Afonso Lima/Freeimages)</image:title><image:caption>Cadeado</image:caption></image:image><lastmod>2015-04-28T00:33:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/04/27/sao-paulo-tem-24-horas-de-liberdade-e-seguranca-na-cryptorave-2015/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/cdcfuftwaae1qci2.jpg</image:loc><image:title>CDcfUFTWAAE1QCI</image:title><image:caption>Peter Sunde com o público na manhã de sábado (Foto: Divulgação/CMI São Paulo) </image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/cdzrd43wiaacafx2.jpg</image:loc><image:title>CDZRD43WIAACAfx</image:title><image:caption>Katitza Rodriguez da EFF e Andre Meister do Netzpolitik (Foto: Divulgação/CMI São Paulo) </image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/2015-04-24-18-56-34-12.jpg</image:loc><image:title>2015-04-24 18.56.34-1</image:title></image:image><lastmod>2015-04-27T18:44:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/04/24/anuncio-que-explorou-falha-no-flash-ficou-dois-meses-no-ar/</loc><lastmod>2015-04-24T14:27:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/04/22/golpistas-passam-a-usar-links-ipv6-falsos-em-fraude-no-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/fbipv62.jpg</image:loc><image:title>Golpe 'IPv6' no Facebook (Reprodução)</image:title><image:caption>Publicação no Facebook com endereço IPv6 'fajuto'.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/pingipv6-pg_2.jpg</image:loc><image:title>Ping IPv6 (Reprodução)</image:title><image:caption>Endereço verdadeiro</image:caption></image:image><lastmod>2015-04-23T01:22:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/04/21/on-error-resume-next-licoes-de-vida-de-uma-linha-de-codigo/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/on-error-resume-next2.jpg</image:loc><image:title>On Error Resume Next</image:title><image:caption>On Error Resume Next em código do BankerFix</image:caption></image:image><lastmod>2015-04-22T02:33:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/04/20/precisamos-falar-sobre-a-pirataria-parte-2-audiovisual/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/2015-04-12-22-32-472.jpg</image:loc><image:title>2015-04-12 22.32.47</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/2015-04-17-10-41-231.jpg</image:loc><image:title>2015-04-17 10.41.23</image:title></image:image><lastmod>2015-04-20T15:27:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/04/11/precisamos-falar-sobre-a-pirataria-parte-1-musica/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/pirate-311819_6401.png</image:loc><image:title>Pirata (pixabay.com / CC0 Public Domain)</image:title><image:caption>(Foto: pixabay.com / CC0 Public Domain)</image:caption></image:image><lastmod>2015-04-21T03:20:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/04/11/games-infectados-sao-colocados-em-paginas-do-steam/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/steam-logo2.jpg</image:loc><image:title>Steam</image:title><image:caption>Steam</image:caption></image:image><lastmod>2015-04-11T21:24:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/04/09/pegue-de-volta-o-que-e-seu-seja-dono-da-sua-web-com-o-feedly/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/facebook-alcance2.png</image:loc><image:title>Facebook - Alcance (Reprodução)</image:title><image:caption>Publicações não aparecem nem mesmo para quem curte uma página.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/fa-feedly2.png</image:loc><image:title>Feedly</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/ngr2.jpg</image:loc><image:title>Nextgen Reader</image:title><image:caption>Lendo um artigo diretamente pelo Nextgen Reader.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/ngr2.png</image:loc><image:title>Nextgen Reader</image:title><image:caption>Lendo um artigo diretamente pelo Nextgen Reader.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/feedlyadd2.png</image:loc><image:title>feedlyadd</image:title><image:caption>Barra do Feeddly no Chrome.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/feedly2.png</image:loc><image:title>Feedly Categoria</image:title><image:caption>Visualização de categoria no Feedly.</image:caption></image:image><lastmod>2015-09-26T04:21:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/04/08/nq-vault-como-um-app-nao-protege-os-dados-em-seu-telefone/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/nqvault2.png</image:loc><image:title>NQVault (Reprodução)</image:title><image:caption>Muito fica escondido, inclusive a tecnologia usada para 'esconder'. (Reprodução)</image:caption></image:image><lastmod>2015-06-06T01:06:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/04/08/brecha-e-identificada-em-recurso-de-seguranca-do-firefox/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/04/firefox_logo-only_rgb2.png</image:loc><image:title>Mozilla Firefox/Mozilla</image:title><image:caption>Mozilla Firefox</image:caption></image:image><lastmod>2015-04-08T16:04:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/03/30/seguranca-se-aprende-na-escola-tambem/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/03/colegio-bandeirantes2.jpg</image:loc><image:title>Mirabile/Wikimedia Commons</image:title><image:caption>Colégio Bandeirantes (Mirabile/Wikimedia Commons)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/03/fichas21.png</image:loc><image:title>fichas2</image:title></image:image><lastmod>2015-04-01T13:58:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2015/03/25/os-astrologos-de-seguranca-da-informacao/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/03/astrologia-leocinezi1.jpg</image:loc><image:title>Astrologia - Leo Cinezi / Freeimages.com</image:title><image:caption>(Leo Cinezi / Freeimages.com)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2015/03/561103_525580882.jpg</image:loc><image:title>561103_52558088</image:title></image:image><lastmod>2015-03-25T16:20:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2014/12/10/prometeu-tem-que-cumprir-nao-e-regra-absoluta-na-legislacao/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2014/12/courthouse1.jpg</image:loc><image:title>Tribunal (Robert Linder / Freeimages.com)</image:title><image:caption>Para tribunais, nem sempre a oferta vincula o fornecimento do produto (Foto: Robert Linder / Freeimages.com)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2014/12/img-courthouse-linder6580-freeimages-e14181473538462.jpg</image:loc><image:title>Courthouse</image:title><image:caption>"Prometeu, tem que cumprir" não é uma regra absoluta, segundo tribunais (Foto: Robert Linder / Freeimages.com)</image:caption></image:image><lastmod>2014-12-11T00:21:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2014/11/14/site-expoe-mais-de-70-mil-cameras-de-usuarios-pelo-menos-900-brasileiras/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2014/11/insecam1.png</image:loc><image:title>Insecam</image:title><image:caption>Site permite exibir câmeras por país de acordo com o endereço IP. (Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2014/11/computer-components-emc-christoph-burgdorfer-freeimages-com2.jpg</image:loc><image:title>Computer Components / Camera</image:title><image:caption>Você pode não ser o único a acessar as imagens da sua câmera. (Christoph Burgdorfer /FreeImages.com)</image:caption></image:image><lastmod>2015-01-26T14:23:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2014/09/27/adeus-orkut/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2014/09/takeout-42.jpg</image:loc><image:title>takeout 4</image:title><image:caption>Baixando dados para o seu computador</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2014/09/takeout-21.jpg</image:loc><image:title>takeout 2</image:title><image:caption>Salvando no Google Drive</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2014/09/google-takeout2.jpg</image:loc><image:title>google takeout</image:title><image:caption>Google Takeout</image:caption></image:image><lastmod>2014-09-27T03:24:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2014/08/10/o-caso-do-planalto-identificacao-na-internet-e-o-marco-civil/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2014/08/altera-mac1.png</image:loc><image:title>Alterando MAC (Reprodução)</image:title><image:caption>Janela para configurar endereço MAC no Windows.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2014/08/wikipedia2.jpg</image:loc><image:title>Wikipedia (Divulgação)</image:title><image:caption>Wikipédia</image:caption></image:image><lastmod>2016-12-19T11:04:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2014/06/11/anuncio-veiculado-em-site-brasileiro-tentou-infectar-estrangeiros/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2014/06/adobe_flash_player_v10_icon2.png</image:loc><image:title>Adobe Flash Player (Divulgação)</image:title><image:caption>Adobe Flash Player Plugin</image:caption></image:image><lastmod>2015-03-10T17:34:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2014/06/05/compra-de-passagem-aerea-pode-ser-cancelada-sem-custo-em-ate-7-dias/</loc><lastmod>2016-06-22T04:43:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2014/03/29/alem-do-marco-civil-de-quantas-leis-a-internet-realmente-precisa/</loc><lastmod>2014-03-29T22:35:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2014/03/28/entenda-por-que-nao-e-possivel-usar-o-windows-xp-sem-atualizacoes/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2014/03/xpabandonar1.jpg</image:loc><image:title>xpabandonar</image:title></image:image><lastmod>2015-02-26T20:06:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2014/01/21/extensoes-do-chrome-sao-compradas-para-injetar-propagandas/</loc><lastmod>2014-04-13T17:06:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2014/01/17/fraude-por-e-mail-oferece-falso-whatsapp-para-pc/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2014/01/whatsapp22.png</image:loc><image:title>WhatsApp Para PC (Reprodução)</image:title><image:caption>Imagem do e-mail contendo a fraude. (Reprodução)</image:caption></image:image><lastmod>2014-03-05T04:33:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/12/05/uma-breve-analise-sobre-lulu-tubby-e-liberdade-de-expressao/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/12/lulufake2.jpg</image:loc><image:title>LuluFake (Reprodução)</image:title><image:caption>Serviço promete análises falsas para melhorar nota no Lulu. (Reprodução)</image:caption></image:image><lastmod>2013-12-07T19:19:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/08/24/associacao-de-sites-de-seguranca-chega-ao-fim-apos-nove-anos/</loc><lastmod>2014-02-10T00:07:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/08/24/a-terceirizacao-do-spam-divulgacao-de-empresas-e-arma-do-crime/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/08/spamserver1.jpg</image:loc><image:title>spamserver</image:title><image:caption>Servidor de spam bloqueado usando nomes diferentes. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/08/google22.jpg</image:loc><image:title>Google Spam</image:title><image:caption>Obtendo serviços de spam no Google. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/08/google1.jpg</image:loc><image:title>Pesquisa Spam</image:title><image:caption>Obtendo serviços de spam no Google. (Foto: Reprodução)</image:caption></image:image><lastmod>2014-07-05T10:17:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/08/20/tribunais-divergem-sobre-legalidade-da-multa-ao-cancelar-banda-larga/</loc><lastmod>2014-02-22T16:10:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/08/20/virus-brasileiro-muda-a-pagina-inicial-para-brasil-pesquisa-pw/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/08/brasil-pesquisa2.png</image:loc><image:title>brasil-pesquisa</image:title><image:caption>Página Brasil-pesquisa.pw, normalmente encontrada junto da infecção. (Foto: Reprodução)</image:caption></image:image><lastmod>2019-05-23T19:08:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/07/13/site-falso-do-skype-distribui-programa-com-praga-brasileira/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/07/source22.png</image:loc><image:title>source2</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/07/source12.png</image:loc><image:title>source1</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/07/skype2.png</image:loc><image:title>skype</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/07/numero2.png</image:loc><image:title>numero</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/07/instalador2.jpg</image:loc><image:title>instalador</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/07/imagem3_1896x10501.jpg</image:loc><image:title>imagem3_1896x1050</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/07/google1.png</image:loc><image:title>google</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/07/files1.png</image:loc><image:title>files</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/07/dominio1.png</image:loc><image:title>dominio</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/07/campanha12.png</image:loc><image:title>campanha1</image:title></image:image><lastmod>2013-11-07T11:51:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/07/01/sem-permissao-facebook-para-android-coleta-numero-do-telefone/</loc><lastmod>2013-07-01T21:31:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/06/07/programa-secreto-dos-eua-monitora-facebook-google-e-microsoft/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/06/handonkey2.jpg</image:loc><image:title>Teclado (Simon Stratford/SXU)</image:title><image:caption>(Simon Stratford/SXU)</image:caption></image:image><lastmod>2014-03-19T03:32:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/06/06/senado-dos-eua-sabia-desde-2007-que-nsa-monitora-telefonemas/</loc><lastmod>2013-06-06T19:48:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/06/06/fraude-diz-que-conta-do-facebook-foi-acessada-da-china/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/06/facebook-spam-china2.jpg</image:loc><image:title>facebook-spam-china</image:title><image:caption>Imagem da fraude (ARIS/LD)</image:caption></image:image><lastmod>2013-06-06T11:30:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/06/06/qual-a-diferenca-entre-um-antivirus-pago-e-um-gratuito-e-firewalls/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/06/fire2.jpg</image:loc><image:title>Fogo (ogcorndog/SXC)</image:title><image:caption>Uma parede de fogo? (ogcorndog/SXC)</image:caption></image:image><lastmod>2015-03-23T16:56:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/06/06/governo-dos-eua-tem-acesso-ilimitado-a-registros-telefonicos-diz-jornal/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/06/nsaseal_original2.jpg</image:loc><image:title>NSA (Divulgação)</image:title><image:caption>Agência de Segurança Nacional (NSA)</image:caption></image:image><lastmod>2013-06-06T03:20:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/06/05/juiz-reverte-decisao-que-obrigava-homem-a-descriptografar-hd/</loc><lastmod>2014-07-01T18:15:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/06/05/pirate-bay-auxilia-caso-contra-advogados-e-revela-que-guarda-ips/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/06/the-pirate-bay2.jpg</image:loc><image:title>The Pirate Bay (Divulgação)</image:title><image:caption>The Pirate Bay</image:caption></image:image><lastmod>2013-06-05T04:14:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/06/04/cgi-br-contesta-delegacao-de-dominio-amazon-na-internet/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/06/amazon2.jpg</image:loc><image:title>Amazon</image:title><image:caption>Gigante do comércio on-line quer domínios '.amazon' e '.books'. (Divulgação)</image:caption></image:image><lastmod>2013-06-04T22:37:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/06/03/a-covardia-dos-insultos-online-como-lidar-com-a-critica-anonima/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/06/mosaico1.jpg</image:loc><image:title>mosaico</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/06/todos-depoimentos1.jpg</image:loc><image:title>Artistas (Divulgação)</image:title><image:caption>Artistas falaram com colunista Luciana Leme sobre insultos protegidos pelo anonimato da rede. (Divulgação/Arte LD)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/06/mauro-ferreira-pb-e13703070247241.jpg</image:loc><image:title>Mauro Ferreira pb</image:title><image:caption>Mauro Ferreira (Divulgação)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/06/margareth-boury-pb-e13703071102262.jpg</image:loc><image:title>Margareth Boury  pb</image:title><image:caption>Margareth Boury (Divulgação)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/06/lucia-verissimo-pb-e13703071616881.jpg</image:loc><image:title>Lucia Verissimo pb</image:title><image:caption>Lúcia Veríssimo (Divulgação)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/06/leo-jaime-pb2-e13703071915531.jpg</image:loc><image:title>Leo Jaime pb2</image:title><image:caption>Léo Jaime (Divulgação)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/06/eda-fagundes-pb-e13703072232781.jpg</image:loc><image:title>eda fagundes pb</image:title><image:caption>Eda Fagundes (Divulgação)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/06/carlinhos-de-jesus-pb-e13703072526712.jpg</image:loc><image:title>carlinhos de jesus pb</image:title><image:caption>Carlinhos de Jesus (Divulgação)</image:caption></image:image><lastmod>2015-04-06T16:04:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/05/31/virus-brasileiro-instala-servidor-ssh-e-cria-conta-de-usuario-oculta/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/05/fraudedetran2.png</image:loc><image:title>Fraude Detran Adm</image:title><image:caption>Suposta pendência com o Detran serve de isca para contaminar o computador. (ARIS/LD)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/05/adm1232.png</image:loc><image:title>Usuário ADM123</image:title><image:caption>Usuário ADM123 criado no sistema. (ARIS/LD)</image:caption></image:image><lastmod>2016-11-27T00:28:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/05/13/site-de-compra-coletiva-divulga-oferta-falsa-por-e-mail/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/05/cinemark1e2.jpg</image:loc><image:title>Promoção Cinemark</image:title><image:caption>Site trazia diversas promoções. (Foto: Reprodução)</image:caption></image:image><lastmod>2013-08-07T12:20:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/05/09/em-nome-da-seguranca-bancos-deixam-usuarios-inseguros/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/05/driverperm1.png</image:loc><image:title>Aviso Driver</image:title><image:caption>Impressora usa componente sem assinatura digital. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/05/appletpermissao2.jpg</image:loc><image:title>Applet Permissão 2 (Reprodução)</image:title><image:caption>Aviso de problema de código do Java em outro banco. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/05/appletperm21.jpg</image:loc><image:title>Applet - Permissão (Reprodução)</image:title><image:caption>Aviso de problema de permissão do Java em um um banco. (Foto: Reprodução)</image:caption></image:image><lastmod>2013-07-19T14:11:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/04/30/o-primeiro-site-do-mundo-de-volta-ao-seu-endereco-web-original/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/www2.jpg</image:loc><image:title>www</image:title><image:caption>A web em 1995. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/primeirowww12.jpg</image:loc><image:title>primeirowww</image:title><image:caption>Primeiro site da 'WWW'. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/primeirowww3.jpg</image:loc><image:title>primeirowww</image:title></image:image><lastmod>2014-07-13T21:24:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/04/18/na-era-da-informacao-a-desinformacao-tambem-e-veloz/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/twit-gal2.jpg</image:loc><image:title>twit gal</image:title><image:caption>Gal Costa se pronuncia sobre o ocorrido.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/paulo22.jpg</image:loc><image:title>paulo2</image:title><image:caption>Mensagens do Paulo Coelho no Twitter</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/paulo3.jpg</image:loc><image:title>Paulo Coelho - Gal Costa</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/nota-ancelmo-gois-o-globo2.jpg</image:loc><image:title>nota ancelmo gois o globo</image:title><image:caption>Nota do jornal O Globo. (Reprodução)</image:caption></image:image><lastmod>2013-04-19T08:42:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/04/15/virus-altera-boletos-na-web-e-pagamento-cai-em-conta-indevida/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/autorunsmalwareboleto2.jpg</image:loc><image:title>Boleto - Autoruns</image:title><image:caption>Detalhe do malware na inicialização do Windows com nome aleatório.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/sourcecode2.jpg</image:loc><image:title>Boleto - Spam</image:title><image:caption>Tag spam e espaços interferindo com código de barras.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/listasitesboleto2.jpg</image:loc><image:title>Boleto - Lista</image:title><image:caption>Detalhe de nomes que ativam ações do vírus: Facebook, Live, boletos e 'segundavia'.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/itauverdadeiro2.jpg</image:loc><image:title>Boleto - Itaú Verdadeiro</image:title><image:caption>Boleto de testes original com código e logo Itaú.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/itaufalso2.jpg</image:loc><image:title>Boleto - Itaú Falso</image:title><image:caption>Boleto modificado.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/caixaverdadeiro2.jpg</image:loc><image:title>Boleto - Verdadeiro Caixa</image:title><image:caption>Boleto de testes gerados com código da Caixa. </image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/caixafalsoed2.jpg</image:loc><image:title>Boleto - Caixa Falso</image:title><image:caption>Boleto alterado, com detalhe para diferenças na linha digitável e código de barras.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/bradescoverdadeiro2.jpg</image:loc><image:title>Boleto - Bradesco Verdadeiro</image:title><image:caption>Boleto de testes gerado com código Bradesco</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/bradescofalso2.jpg</image:loc><image:title>Boleto - Bradesco Falso</image:title><image:caption>Boleto modificado.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/bbfalso2.jpg</image:loc><image:title>Boleto - BB Falso</image:title><image:caption>Boleto modificado do BB. Código de quebra do código de barras falhou.</image:caption></image:image><lastmod>2019-11-18T02:21:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/04/14/gerenciador-de-contas-inativas-o-nome-google-para-testamento/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/contato-confic3a1vel2.jpg</image:loc><image:title>contato confiável</image:title><image:caption>Definindo 'guardiões' da conta.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/aviso-amigo2.jpg</image:loc><image:title>aviso amigo</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/config-conta-inativa2.jpg</image:loc><image:title>config conta inativa</image:title><image:caption>Configurando contas inativas (Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/dados-compartilhados2.jpg</image:loc><image:title>dados compartilhados</image:title><image:caption>Você também pode definir o que será compartilhado.</image:caption></image:image><lastmod>2013-04-15T02:30:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/04/13/instaladores-usam-botoes-desativados-para-empurrar-extras-ao-pc/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/daemon42.jpg</image:loc><image:title>Daemon Tools - Instalação 4</image:title><image:caption>MountSpace coleta informações sobre os CDs e DVDs que você usar com o Daemon Tools.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/daemon32.jpg</image:loc><image:title>Daemon Tools - instalação 3</image:title><image:caption>Antivírus brasileiro PSafe também é extra já marcado por padrão no instalador.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/daemon22.jpg</image:loc><image:title>Daemon Tools - Instalação 2</image:title><image:caption>Opção desativada está disponível e oculta adicionais.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/daemon12.jpg</image:loc><image:title>Daemon Tools - Instalação 1</image:title><image:caption>Opção de instalação personalizada está 'indisponível'.</image:caption></image:image><lastmod>2013-10-29T17:00:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/04/12/praga-brasileira-garimpa-bitcoins-com-maquina-infectada/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/bitcoin_goldv22.png</image:loc><image:title>Bitcoin - Gold (skull88)</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/bc72.png</image:loc><image:title>Bitcoin - Cubin</image:title><image:caption>Arquivo .cubin contém os processamentos que serão realizados na mineração das Bitcoins.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/bc62.png</image:loc><image:title>Bitcoin - Mais Arquivos</image:title><image:caption>Componentes do minerador de Bitcoins</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/bc52.png</image:loc><image:title>Bitcoin Arquivos</image:title><image:caption>Minerador Bitcoin entre os arquivos instalados.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/bc42.png</image:loc><image:title>Bitcoin - URLs</image:title><image:caption>Endereços dos arquivos baixados pelo vírus.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/bc32.png</image:loc><image:title>bc3</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/bc22.png</image:loc><image:title>Bitcoin Instalador</image:title><image:caption>Praga segue a farsa do Flash com instalador falso.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/bc12.png</image:loc><image:title>Bitcoin - Flash</image:title><image:caption>Ícone do Flash no vírus.</image:caption></image:image><lastmod>2013-10-23T16:52:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/04/11/teste-mostra-incompatibilidade-de-atualizacao-com-plugin-bancario/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/rev2kb2.png</image:loc><image:title>rev2kb</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/updateerror2.jpg</image:loc><image:title>Erro Atualização</image:title><image:caption>Erro em sistema após aplicação da atualização. (Foto: Luciana Leme/LD)</image:caption></image:image><lastmod>2013-05-16T18:10:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/04/10/pesquisador-revela-falhas-em-roteadores-domesticos-da-cisco/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/ea2700-cisco2.jpg</image:loc><image:title>Cisco EA2700</image:title><image:caption>Roteador wireless Cisco Linksys EA2700. (Divulgação)</image:caption></image:image><lastmod>2013-04-20T14:51:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/04/04/loja-black-store-vende-virus-e-hospedagem-para-fraudes/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/recibo2.png</image:loc><image:title>Black Store</image:title><image:caption>Recibo da Black Store. (Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/cc22.png</image:loc><image:title>Carder Test 2</image:title><image:caption>Software para teste de cartão de crédito. (Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/cc12.jpg</image:loc><image:title>Carder Test 2</image:title><image:caption>Software para teste de cartão de crédito. (Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/blackstore112.png</image:loc><image:title>Viral Facebook</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/blackstore102.png</image:loc><image:title>Black Store - Spam VPS</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/blackstore92.png</image:loc><image:title>Black Store - Testador de Cartão</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/blackstore82.png</image:loc><image:title>Black Store - Programação</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/blackstore72.png</image:loc><image:title>Black Store - Spam PHP</image:title><image:caption>Plano mais simples de spam por R$ 30. Garantia de 30 dias se refere às chances de o servidor ser descoberto e impedir o envio de novas mensagens.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/blackstore62.png</image:loc><image:title>Black Store - KL 3</image:title><image:caption>Solução pronta para o roubo de senhas bancárias, com painel de controle para estatísticas.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/04/blackstore52.png</image:loc><image:title>Black Store - Java Applet</image:title></image:image><lastmod>2013-07-25T00:21:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/03/27/o-maior-ataque-cibernetico-e-outro-grande-exagero-da-imprensa/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/drdos32.png</image:loc><image:title>DRDoS (Arte/LD)</image:title><image:caption>Hackers amplificam o volume de dados usando servidores mal configurados. (Arte/LD)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/spamhaus_logo2.jpg</image:loc><image:title>Spamhaus (Divulgação)</image:title><image:caption>Serviço antispam Spamhaus. (Divulgação)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/drdos11.png</image:loc><image:title>DRDoS (Arte/LD)</image:title><image:caption>Hackers amplificam o volume de dados usando servidores mal configurados. (Arte/LD)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/drdos2.png</image:loc><image:title>DRDoS (Arte/LD)</image:title><image:caption>No ataque DRDoS, os computadores amplificam o volume de dados usando servidores mal configurados. (Arte/LD)</image:caption></image:image><lastmod>2013-12-18T22:06:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/03/25/alerta-da-linha-instalador-baixaki-e-outros-sites-de-download/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/photoscape1.jpg</image:loc><image:title>Photoscape - Baixaki</image:title><image:caption>Imagem fornecida pelo Baixaki para destacar link direto. (NZN)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/dealply1.jpg</image:loc><image:title>dealply</image:title><image:caption>Instalador Baixaki oferecendo DealPly.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/linkskypeinstalador2.jpg</image:loc><image:title>Link Skype Instalador (Reprodução)</image:title><image:caption>Download do Skype no Baixaki. Botão em destaque leva para instalador. (Reprodução)</image:caption></image:image><lastmod>2018-08-29T16:03:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/03/22/falha-corrigida-no-facebook-da-falsa-sensacao-de-privacidade/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/eventoface2.jpg</image:loc><image:title>Evento Facebook</image:title><image:caption>Facebook lista também quem não confirmou presença.</image:caption></image:image><lastmod>2015-03-17T20:33:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/03/20/o-ataque-anos-90-mais-impactante-que-a-espionagem-de-cada-dia/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/certsubstantial2.jpg</image:loc><image:title>CERT KR Substantial (Reprodução)</image:title><image:caption>Entidades de segurança sul-coreanas elevaram risco para 'substancial'. (Reprodução)</image:caption></image:image><lastmod>2013-04-26T10:32:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/03/15/fraude-por-e-mail-oferece-ingressos-para-o-rock-in-rio-2013/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/aris_001_15032013_0906153.png</image:loc><image:title>Rock in Rio Fraude Cadastro (Reprodução)</image:title><image:caption>Página contém formulário que solicita dados do cartão de crédito. (Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/aris_001_15032013_09061522.png</image:loc><image:title>Rock in Rio Fraude (Reprodução)</image:title><image:caption>E-mail falso convidando internauta para cadastro. (Reprodução)</image:caption></image:image><lastmod>2013-03-15T17:36:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/03/13/golpe-traz-aviso-da-receita-federal-sobre-regularizacao-do-cpf/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/regularisao-cpf-c2.png</image:loc><image:title>Fraude - Regularização CPF (Reprodução)</image:title><image:caption>Fraude traz erros de português e formatação simples. (Reprodução)</image:caption></image:image><lastmod>2014-02-12T12:38:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/03/11/fraude-envolvendo-o-nome-do-cantor-chorao-leva-a-virus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/email_chorao22.png</image:loc><image:title>email_chorao</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/email_chorao11.png</image:loc><image:title>email_chorao</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/email_chorao3.png</image:loc><image:title>email_chorao</image:title></image:image><lastmod>2013-12-18T21:38:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/03/11/google-divulga-numeros-vagos-sobre-cartas-secretas-do-fbi/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/03/nsl-us2.jpg</image:loc><image:title>Cartas de Segurança - NSL (Reprodução)</image:title><image:caption>Empresas não podem revelar quando recebem cartas de segurança. (Reprodução)</image:caption></image:image><lastmod>2013-03-11T18:42:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/03/03/justica-afasta-a-condenacao-de-sites-por-comentarios-de-usuarios/</loc><lastmod>2013-03-03T23:32:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/02/24/as-diferentes-maneiras-que-o-virtual-lida-com-a-fim-do-real/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/02/memorial2.jpg</image:loc><image:title>Memorial Facebook (Reprodução)</image:title><image:caption>Página de solicitação de memorial no Facebook. (Reprodução)</image:caption></image:image><lastmod>2013-02-25T20:39:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/02/06/fraude-intitulada-webmail-do-administrador-rouba-logins-de-emails/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/02/aris_007_04022013_0228151.png</image:loc><image:title>ARIS_007_04022013_022815</image:title></image:image><lastmod>2013-02-06T18:40:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/02/01/fraude-envolvendo-a-petrobras-oferece-vagas-para-emprego/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/02/screenpetro1.png</image:loc><image:title>Fraude Petrobrás (Reprodução)</image:title><image:caption>Em estilo diferente de fraude, e-mail solicita diretamente dados da vítima. (Foto: Reprodução)</image:caption></image:image><lastmod>2013-02-07T20:03:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/01/31/falha-em-notebooks-samsung-faz-linux-danificar-chip-uefi/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/01/samsung-530u3c2.jpg</image:loc><image:title>Samsung 530U3C (Divulgação)</image:title><image:caption>Samsung 530U3C é um dos modelos vulneráveis. (Foto: Divulgação)</image:caption></image:image><lastmod>2013-01-31T21:07:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2013/01/29/quando-o-antivirus-esta-infectado-o-caso-do-combofix/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2013/01/combofix1.gif</image:loc><image:title>ComboFix</image:title><image:caption>Ícone do ComboFix</image:caption></image:image><lastmod>2015-04-28T16:45:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/12/26/criador-do-megaupload-quer-financiar-artistas-e-bandas-com-spyware/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/12/megabox-soon2.png</image:loc><image:title>Megabox (Divulgação)</image:title><image:caption>Megabox</image:caption></image:image><lastmod>2012-12-26T09:04:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/12/12/dotz-e-o-mais-novo-servico-brasileiro-na-mira-dos-cibercriminosos/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/12/dotz12.png</image:loc><image:title>Site Falso Dotz (Reprodução)</image:title><image:caption>Site falso criado para roubar dados do Dotz. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/12/ssl2.png</image:loc><image:title>ssl</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/12/senha2.png</image:loc><image:title>senha</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/12/phish_dotz2.png</image:loc><image:title>Phishing Dotz (Reprodução)</image:title><image:caption>E-mail que leva internauta para phishing do Dotz. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/12/dotz3.png</image:loc><image:title>dotz</image:title></image:image><lastmod>2013-06-10T18:32:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/12/10/comodo-volta-a-dar-aval-para-assinatura-digital-de-pragas-brasileiras/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/12/site2.png</image:loc><image:title>GPSistemas Site (Reprodução)</image:title><image:caption>Site da suposta empresa que registrou o vírus. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/12/domain22.png</image:loc><image:title>Registro G-Buster.org (Reprodução)</image:title><image:caption>Informações de registro do G-Buster.org</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/12/domain12.png</image:loc><image:title>Registro GPSistemas (Reprodução)</image:title><image:caption>Informação de registro do GPSistemas.net</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/12/certgp2.jpg</image:loc><image:title>Certificado Banker (Reprodução)</image:title><image:caption>Certificados emitidos para o trojan brasileiro. (Foto: Reprodução)</image:caption></image:image><lastmod>2014-01-22T10:55:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/11/23/o-problema-do-spam-e-a-ausencia-de-coibicao-da-pratica/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/emailarroba2.jpg</image:loc><image:title>Email Arroba (Steven Goodwin / SXC)</image:title><image:caption>Email Arroba (Foto: Steven Goodwin / SXC)</image:caption></image:image><lastmod>2012-11-23T16:59:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/11/19/banco-de-dados-aumenta-deteccao-de-pragas-brasileiras-no-clamav/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/clamav2.jpg</image:loc><image:title>ClamAV (Divulgação)</image:title><image:caption>ClamAV</image:caption></image:image><lastmod>2012-11-19T02:39:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/11/19/conheca-servicos-que-medem-sua-influencia-na-internet/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/pidestaque2.jpg</image:loc><image:title>Peerindex (Destaque)</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/value2.jpg</image:loc><image:title>value</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/peerindexlogo2.jpg</image:loc><image:title>peerindexlogo</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/peerindex2.jpg</image:loc><image:title>Peerindex</image:title><image:caption>Peerindex atribui um número que mede sua 'relevância' na rede. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-11-19T02:10:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/11/14/botoes-falsos-de-download-confundem-internauta/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/downloaddestaque2.jpg</image:loc><image:title>downloaddestaque</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/downloadtoolbar2.jpg</image:loc><image:title>Download - Babylon</image:title><image:caption>Software exige instalação da Babylon Toolbar para prosseguir e coloca ícones na área de trabalho.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/downloadprotecaofalsa2.jpg</image:loc><image:title>Download - Selo de segurança</image:title><image:caption>Site com botão falso de download tem símbolo de segurança que leva à verificação de um site diferente do link de download.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/downloadfalso2.jpg</image:loc><image:title>Download - Baixar</image:title><image:caption>Site tem diversos links de download em menos destaque do que o botão que leva a um conteúdo diferente do prometido - um arquivo executável.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/downloadealplay2.jpg</image:loc><image:title>Download - Deal Play</image:title><image:caption>Usuário é obrigado a instalar aplicativo extra para prosseguir com a instalação.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/downloadcelular2.jpg</image:loc><image:title>Download - Cadastro de celular</image:title><image:caption>Finalmente, instalador diz que internauta precisa realizar o cadastramento em um serviço de celular de horóscopo para desbloquear o software.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/downloadbotaogrande2.jpg</image:loc><image:title>Download - Botão Grande</image:title><image:caption>Botão de download aparece duas vezes na página, mas só um leva ao conteúdo desejado.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/buscababylon2.png</image:loc><image:title>Babylon Busca</image:title><image:caption>Internet Explorer fazendo pesquisa com a Babylon</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/botaofalso22.png</image:loc><image:title>Anúncio com botão download 2</image:title><image:caption>Anúncio com botão de download é exibido em páginas que já trazem links de download e podem confundir o internauta.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/botaofalso12.png</image:loc><image:title>Anúncio com botão download</image:title><image:caption>Anúncio tem botão para download que confunde internauta.</image:caption></image:image><lastmod>2014-12-30T13:56:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/11/09/ataques-a-modems-adsl-como-identificar-e-resolver-o-problema/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/ataqueadsl042.jpg</image:loc><image:title>Ataques ADSL 4 (Reprodução)</image:title><image:caption>Detalhe da configuração de um modem comprometido. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/ataqueadsl032.jpg</image:loc><image:title>Ataques ADSL 3 (Reprodução)</image:title><image:caption>Resposta do comando ping dá pistas de redirecionamento. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/ataqueadsl022.jpg</image:loc><image:title>Ataques ADSL 2 (Reprodução)</image:title><image:caption>Site verdadeiro da Caixa, com SSL. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/ataqueadsl012.jpg</image:loc><image:title>Ataques ADSL (Reprodução)</image:title><image:caption>Site falso da Caixa em endereço legítimo. (Foto: Reprodução)</image:caption></image:image><lastmod>2014-11-04T15:40:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/11/09/fraude-por-email-distribui-vale-presente-falso-do-submarino/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/fraudesubmarino12.jpg</image:loc><image:title>Fraude Submarino</image:title><image:caption>Imagem do e-mail fraudulento. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/submarinodes2.jpg</image:loc><image:title>Submarino (Divulgação)</image:title></image:image><lastmod>2012-11-09T02:44:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/11/07/camara-aprova-dois-projetos-de-cibercrime-que-vao-a-sancao/</loc><lastmod>2012-11-08T11:25:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/11/07/praga-brasileira-sequestra-navegador-e-vende-windows-original/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/ransom-destaque2.png</image:loc><image:title>Ransomware brasileiro - Destaque (Reprodução)</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/ransom-tela2.png</image:loc><image:title>Ransomware brasileiro tem tela para entrada de dados (Reprodução)</image:title><image:caption>Usuário deve preencher dados do cartão de crédito em tela da praga digital brasileira. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/ransom-registrado2.png</image:loc><image:title>Ransomware brasileiro aceita dados (Reprodução)</image:title><image:caption>Depois de receber os dados, acesso é novamente liberado.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/ransom-get2.png</image:loc><image:title>Ransomware log (Reprodução)</image:title><image:caption>Detalhe do envio de dados do ransomware. (Foto: ARIS-LD)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/ransom-genuine2.png</image:loc><image:title>Ransomware brasileiro notifica sobre pirataria (Reprodução)</image:title><image:caption>Aviso da praga digital diz que usuário está usando uma cópia pirata do Windows.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/ransom-firefox2.png</image:loc><image:title>Ransomware brasileiro travando o Firefox (Reprodução)</image:title><image:caption>... e do Firefox.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/ransom-chrome2.png</image:loc><image:title>Ransomware brasileiro travando o Chrome (Reprodução)</image:title><image:caption>Praga impede uso do Chrome.</image:caption></image:image><lastmod>2012-11-23T16:49:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/11/06/posto-logo-existo-ou-como-o-que-esta-na-rede-imita-a-realidade/</loc><lastmod>2012-11-07T01:10:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/11/05/rootkit-brasileiro-tenta-se-esconder-de-antivirus-e-redireciona-bancos/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/rootkitbr052.png</image:loc><image:title>Gbpy.sys Hosts (Reprodução)</image:title><image:caption>Alterações feitas no arquivo Hosts pelo driver. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/rootkitbr042.png</image:loc><image:title>rootkitbr04</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/rootkitbr032.png</image:loc><image:title>Gbpy.sys Cripto (Reprodução)</image:title><image:caption>Detalhe da criptografia na .rdata. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/rootkitbr021.jpg</image:loc><image:title>Gbpy.sys Comparativo (Reprodução)</image:title><image:caption>Comparativo de informações do arquivo dos drivers. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/rootkitbr011.png</image:loc><image:title>Avenger (Reprodução)</image:title><image:caption>Programa antimalware Avenger foi usado por criminosos no Brasil. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-11-06T01:56:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/11/05/motoristas-fazem-ddos-da-vida-real-em-postos-de-combustivel-em-curitiba/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/gazetamotoristasddos2.jpg</image:loc><image:title>Reportagem da Gazeta (Reprodução)</image:title><image:caption>Reportagem da Gazeta do Povo mostra filas em Curitiba. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-11-09T19:52:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/11/04/falha-do-yahoo-foi-usada-em-ataques-de-phishing-brasileiros/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/masterfraude12.jpg</image:loc><image:title>Fraude Open Redirect (Reprodução)</image:title><image:caption>Fraude tinha link do Yahoo, mas levava internauta a site falso. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/phishstats1.jpg</image:loc><image:title>PhishTank Estatísticas (Divulgação)</image:title><image:caption>Estatísticas de phishing do PhishTank. (Foto: Divulgação)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/masterfraude3.jpg</image:loc><image:title>masterfraude</image:title></image:image><lastmod>2012-11-05T00:57:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/11/04/app-promete-o-impossivel-mas-e-instalado-por-200-mil-no-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/busca-lagsoft-200-82.png</image:loc><image:title>busca-lagsoft-200-8</image:title><image:caption>Mensagens publicadas na timeline do usuário (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/busca-lagsoft-200-72.png</image:loc><image:title>busca-lagsoft-200-7</image:title><image:caption>Página com informações de supostas visitas (Foto: Reprodução</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/busca-lagsoft-200-62.png</image:loc><image:title>busca-lagsoft-200-6</image:title><image:caption>Dados para acesso à pagina no site solicita email e senha (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/busca-lagsoft-2002.png</image:loc><image:title>busca-lagsoft-200</image:title><image:caption>Em buscas na rede social, aplicativo surge com mais de 200 mil utilizadores (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/busca-lagsoft-200-52.png</image:loc><image:title>busca-lagsoft-200-5</image:title><image:caption>Diversas informações e ações são realizadas pelo app (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/busca-lagsoft-200-42.png</image:loc><image:title>busca-lagsoft-200-4</image:title><image:caption>Solicitações do app que será instalado no perfil do usuário (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/busca-lagsoft-200-32.png</image:loc><image:title>busca-lagsoft-200-3</image:title><image:caption>Site contendo informações e links para os apps (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/busca-lagsoft-200-22.png</image:loc><image:title>busca-lagsoft-200-2</image:title><image:caption>Aplicativo leva usuários à página do desenvolvedor (Foto: Reprodução)</image:caption></image:image><lastmod>2014-02-26T03:10:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/11/04/e-dando-que-se-recebe-mudancas-na-industria-de-musica/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/11/itunes2.png</image:loc><image:title>iTunes (Divulgação)</image:title><image:caption>Vendas digitais já são metade do mercado. (Foto: Divulgação)</image:caption></image:image><lastmod>2013-03-19T01:13:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/10/29/protocolo-wep-uma-falsa-sensacao-de-seguranca-nas-redes-wi-fi/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/10/mitm2.jpg</image:loc><image:title>Man in The Mittle (Arte / LD)</image:title><image:caption>Alice quer se comunicar com Bob, mas ambos se comunicam com Mallory. (Foto: Arte / LD)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/10/wifi2.jpg</image:loc><image:title>Wi-Fi (Altieres Rohr)</image:title><image:caption>(Foto: Altieres Rohr)</image:caption></image:image><lastmod>2015-04-18T23:33:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/10/27/site-de-selo-de-seguranca-site-blindado-e-invadido-por-hackers/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/10/siteblindadohacked2.jpg</image:loc><image:title>Site Blindado Hackeado (Reprodução)</image:title><image:caption>Página principal do serviço e selos foram alterados. Hackers deixaram protesto e acusaram empresa de 'enganação'. </image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/10/siteblind2.jpg</image:loc><image:title>Site Blindado Hackeado (Reprodução)</image:title><image:caption>Página informativa sobre o serviço, exibida quando o usuário clica no selo, exibe selo hackeado. (Foto: Reprodução)</image:caption></image:image><lastmod>2015-01-26T18:38:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/10/24/podcast-conheca-os-golpes-em-que-criminosos-falam-com-as-vitimas/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/10/podcastld2.jpg</image:loc><image:title>Podcast Linha Defensiva</image:title><image:caption>Podcast Linha Defensiva - Primeira Edição (Foto: Linha Defensiva)</image:caption></image:image><lastmod>2014-04-13T17:16:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/10/19/falha-em-protocolo-usado-pelo-steam-pode-viabilizar-ataques-na-web/</loc><lastmod>2012-10-19T16:12:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/10/19/site-de-meteorologia-de-governo-americano-e-invadido-por-grupo-hacker/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/10/weathergov2.jpg</image:loc><image:title>Weather.gov (Reprodução)</image:title><image:caption>Site não foi alterado, mas informações da infraestrutura foram publicadas na web.</image:caption></image:image><lastmod>2012-10-19T15:58:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/10/17/confusao-no-facebook-revela-numero-de-celular-cadastrado-na-rede-social/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/10/fbsearch2.jpg</image:loc><image:title>Configuração Busca Facebook</image:title><image:caption>Facebook não permite limitar quem pode encontrar internauta por celular ou e-mail. (Foto: Reprodução)</image:caption></image:image><lastmod>2015-03-24T22:44:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/10/14/mozilla-relanca-firefox-16-para-corrigir-falhas-de-seguranca/</loc><lastmod>2012-10-18T02:43:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/10/02/como-o-babylon-toolbar-entra-no-seu-pc-e-por-que-e-dificil-remove-lo/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/10/aris_001_20092012_0051541.png</image:loc><image:title>Babylon Toolbar (Reprodução)</image:title><image:caption>Detalhe da Babylon Toolbar no Internet Explorer: barra de ferramentas aparenta não mudar nada no navegador. (Foto: Reprodução)</image:caption></image:image><lastmod>2013-08-29T04:05:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/10/02/saiba-como-remover-o-babylonsearch-babylon-toolbar/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/10/babylon-logo1.jpg</image:loc><image:title>babylon-logo</image:title><image:caption>Babylon Toolbar. </image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/10/aris_003_02102012_1444132.png</image:loc><image:title>Organizar pesquisas no Firefox</image:title></image:image><lastmod>2014-09-03T23:46:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/09/26/lojas-de-comercio-eletronico-do-brasil-mandam-senha-por-e-mail/</loc><lastmod>2017-10-19T13:59:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/08/15/fraude-por-email-pede-para-atualizar-cadastro-do-mercado-livre/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/08/ml1.png</image:loc><image:title>ML</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/08/aris_001_08082012_2350162.png</image:loc><image:title>ARIS_001_08082012_235016</image:title></image:image><lastmod>2015-08-12T15:28:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/07/19/fraude-no-facebook-promove-video-falso-e-engana-70-mil-usuarios/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/07/fraude-cobra-engole-homem1.jpg</image:loc><image:title>Fraude cobra engole homem</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/07/ie-outros_navegadores12.png</image:loc><image:title>IE-OUTROS_NAVEGADORES</image:title><image:caption>Página solicitando o clique em propagandas (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/07/icone-extensao-firefox12.png</image:loc><image:title>icone-extensao-firefox</image:title><image:caption>Extensão possui imagem e nome do Antivírus da Microsoft (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/07/icone-extensao-firefox3.png</image:loc><image:title>icone-extensao-firefox</image:title><image:caption>Extensão possui imagem e nome do Antivírus da Microsoft (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/07/ie-outros_navegadores3.png</image:loc><image:title>IE-OUTROS_NAVEGADORES</image:title><image:caption>Página solicitando o clique em propagandas (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/07/pagina-download-extensoes2.png</image:loc><image:title>pagina-download-extensoes</image:title><image:caption>Player falso usa aparência do YouTube. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/07/codigo-script-comandos12.png</image:loc><image:title>codigo-script-comandos</image:title><image:caption>Script utilizado para realizar comandos no perfil da vítima (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/07/codigo-script-comandos3.png</image:loc><image:title>codigo-script-comandos</image:title><image:caption>Scripts utilizados para realizar comandos no perfil da vítima (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/07/post-automatico2.png</image:loc><image:title>post-automatico</image:title><image:caption>Usuário afetado chama amigos para verificarem o suposto vídeo (Foto: Reprodução)</image:caption></image:image><lastmod>2013-02-21T00:09:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/07/17/novo-chrome-barra-instalacoes-de-extensoes-fora-de-sua-web-store/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/07/chrome-logo2.jpg</image:loc><image:title>Chrome-Logo</image:title></image:image><lastmod>2013-12-11T19:57:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/07/09/anuncios-brasileiros-no-facebook-levam-para-golpes-que-roubam-dados/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/07/anuncio_face2.png</image:loc><image:title>Anuncie no Facebook</image:title><image:caption>A partir de R$ 50, criminoso coloca anúncio no Facebook. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/07/rodrigofaropromo2.jpg</image:loc><image:title>Promoção Rodrigo Faro</image:title><image:caption>Anúncio do Facebook leva para promoção falsa. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/07/groupon_32.png</image:loc><image:title>Confirmação iPhone Facebook</image:title><image:caption>Na confirmação da compra, usuário precisa informar dados pessoais, que são roubados pelos criminosos. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/07/groupon_12.png</image:loc><image:title>Groupon Facebook iPhone</image:title><image:caption>Anúncio de iPhone por R$ 440 no Facebook. (Foto: Reprodução)</image:caption></image:image><lastmod>2013-05-06T03:57:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/06/26/anteprojeto-do-novo-codigo-penal-criminaliza-cyberbullying-e-stalking/</loc><lastmod>2013-10-29T01:32:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/06/21/pagina-sorteios-online-contaminou-30-mil-usuarios-no-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/post-mural-face-app-fake2.png</image:loc><image:title>post-mural-face-app-fake</image:title><image:caption>Usuários publicam sem perceber propagando em relação a página falsa (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/post-perfil-user-face2.png</image:loc><image:title>post-perfil-user-face</image:title><image:caption>Script utilizado pelas extensões maliciosas (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/extensao-fake-user-page-face2.png</image:loc><image:title>extensao-fake-user-page-face</image:title><image:caption>Extensão solicitando instalação no navegador (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/chamada-fake-page-user-facebook2.png</image:loc><image:title>chamada-fake-page-user-facebook</image:title><image:caption>Texto tenta convencer usuários a cairem no golpe (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/pagina-fake-user-face12.png</image:loc><image:title>pagina-fake-user-face1</image:title><image:caption>Fan page que distribui extensões maliciosas no golpe. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-10-08T23:05:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/06/15/falha-no-internet-explorer-pode-ter-sido-usada-por-ataques-de-governos/</loc><lastmod>2012-06-17T14:20:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/06/15/criminosos-portam-phishing-bancario-para-sites-em-dispositivos-moveis/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/kulo-t-sxc-hu2.png</image:loc><image:title>Kulo-T-sxc-hu</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/phish-mobile-pagina2.png</image:loc><image:title>phish-mobile-pagina</image:title><image:caption>Página falsa imitando acesso ao banco e página solicitando dados do usuário (Foto: Kaspersky)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/kaspersky-noticia-phish2.png</image:loc><image:title>kaspersky-noticia-phish-</image:title><image:caption>Email chama usuários para ativar versão mobile da página (Foto: Kaspersky)</image:caption></image:image><lastmod>2012-06-21T03:39:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/06/14/golpe-no-twitter-usa-nome-do-g1-no-roubo-de-senhas-e-lucra-com-cliques/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/chamada-twitter-falso2.png</image:loc><image:title>chamada-twitter-falso</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/cliques-monetizar-farsa-twitter2.png</image:loc><image:title>cliques-monetizar-farsa-twitter</image:title><image:caption>Falsas noticias levam usuários a gerar lucro para criador da fraude (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/login-fake-twitter2.png</image:loc><image:title>login-fake-twitter</image:title><image:caption>Página para suposta autenticação no site (Foto: Reprodução) </image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/seguidores-twitter2.png</image:loc><image:title>seguidores-twitter</image:title><image:caption>Página oferecendo o suposto serviço para ganho de seguidores (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/fake-celebridades-twitter2.png</image:loc><image:title>fake-celebridades-twitter</image:title><image:caption>Falsos perfis no Twitter distribuem link para página de roubo de senhas (Foto: Reprodução)</image:caption></image:image><lastmod>2012-06-14T18:58:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/06/13/fraude-por-e-mail-tenta-se-passar-por-alerta-do-avg-e-do-avast/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/avgavast_phishing2.png</image:loc><image:title>AVG Avast Página Falsa</image:title><image:caption>Após clicar no link presente no e-mail, internauta vê página falsa que informa 'união' entre avast e AVG. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/avgavast2.png</image:loc><image:title>Golpe AVG Avast (Reprodução)</image:title><image:caption>Reprodução do golpe (Foto: Reprodução)</image:caption></image:image><lastmod>2012-06-21T03:02:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/06/13/criminosos-brasileiros-criam-pagina-para-roubar-vale-alimentacao/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/sodexo-vitimas2.jpg</image:loc><image:title>Sodexo Vítimas (Reprodução)</image:title><image:caption>Pasta encontrada pela Linha Defensiva contendo lista de vítimas do golpe da Sodexo. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/sodexo-320x2023.jpg</image:loc><image:title>Sodexo Golpe (Reprodução)</image:title><image:caption>E-mail falso usando o nome da Sodexo. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/sodexo_phishing2.jpg</image:loc><image:title>Sodexo Phishing (Reprodução)</image:title><image:caption>Site clonado solicita dados do cartão da vítima. (Foto: Reprodução)</image:caption></image:image><lastmod>2013-11-17T21:51:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/06/13/golpe-no-facebook-atinge-22-mil-usuarios-com-botao-nao-gosto/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/nc3a3o-curti-botao-teste2.png</image:loc><image:title>não-curti-botao-teste</image:title><image:caption>Botão é adiconado em seu perfil, porém só você pode ver (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/notificac3a7c3a3o-fake-faceee2.png</image:loc><image:title>notificação-fake-faceee</image:title><image:caption>Notificação de amigos "infectados" solicitando o uso do app (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/solicitacao-opcoes-fake-face2.png</image:loc><image:title>solicitacao-opcoes-fake-face</image:title><image:caption>Solicitação para livberação do aplicativo no Facebook (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/extensc3a3o-falsa-dislike2.png</image:loc><image:title>extensão-falsa-dislike</image:title><image:caption>Falsa extensão distribuida no golpe (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/botao-nao-facebook2.png</image:loc><image:title>botao-nao-facebook</image:title><image:caption>Página incial do aplicativo usado para promover o golpe na rede social Facebook (Foto: Reprodução)</image:caption></image:image><lastmod>2012-06-25T01:20:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/06/12/site-de-musica-last-fm-sugere-a-troca-de-senhas-para-seus-usuarios/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/lastfm2.png</image:loc><image:title>lastfm</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/last2.png</image:loc><image:title>last</image:title><image:caption>Comunidado sobre a troca de senhas (Foto: Reprodução)</image:caption></image:image><lastmod>2012-06-13T02:30:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/06/06/senhas-de-65-milhoes-de-usuarios-do-linkedin-vazam-em-site-russo/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/linked2.png</image:loc><image:title>LinkedIn (Arte: Felipe Figueiró / LD)</image:title><image:caption>Rede tem 150 milhões de usuários. (Arte: Felipe Figueiró / LD)</image:caption></image:image><lastmod>2012-06-06T18:45:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/06/05/vitimas-do-dnschanger-receberao-alerta-no-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/face-aviso2.jpg</image:loc><image:title>Aviso DNSChanger Facebook (Reprodução)</image:title><image:caption>Aviso do Facebook aos usuários infectados. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-07-28T17:22:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/06/04/em-nota-anonymous-diz-nao-estar-por-tras-da-queda-do-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/06/anon-facebook-ld1.png</image:loc><image:title>anon-facebook-ld</image:title><image:caption>Anonymous nega envolvimento à rede social. (Foto: Felipe Figueiró / LD)</image:caption></image:image><lastmod>2012-06-04T20:57:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/06/01/facebook-sai-do-ar-e-simpatizantes-do-anonymous-reivindicam-ataque/</loc><lastmod>2012-06-02T15:28:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/06/01/fraude-seu-cpf-foi-incluido-na-malha-fina-da-receita-federal/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/05/malhafina2.png</image:loc><image:title>Receita Federal - Malha Fina (Reprodução)</image:title><image:caption>Golpe circula principalmente em época de imposto de renda. (Foto: Reprodução)</image:caption></image:image><lastmod>2014-02-22T15:08:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/05/31/site-falso-que-rouba-usuario-e-senha-traz-selo-de-privacidade-valido/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/05/comcast_phishing_site_truste_seal2.png</image:loc><image:title>Phishing Comcast (Sophos)</image:title><image:caption>Página clonada da Comcast com selo válido de privacidade. (Foto: Reprodução / Sophos)</image:caption></image:image><lastmod>2012-07-31T16:48:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/05/29/despercebido-por-dois-anos-flame-roubou-dados-no-oriente-medio/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/05/flame-code2.jpg</image:loc><image:title>Flame (Reprodução)</image:title><image:caption>Flame é um dos vários módulos da praga de ciberespionagem. (Foto: Reprodução / Kaspersky)</image:caption></image:image><lastmod>2012-06-07T00:14:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/05/18/o-novo-e-o-velho-projeto-de-crimes-digitais-agora-sao-a-mesma-coisa/</loc><lastmod>2012-11-10T00:15:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/05/17/ladrao-de-senhas-usa-truque-para-tentar-burlar-guardiao-do-itau/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/safari2.jpg</image:loc><image:title>Safari (Marcelo Terraza/SXC)</image:title><image:caption>Vírus muda identificador do Internet Explorer para ficar igual ao do Safari no OS X. (Foto: Marcelo Terraza/SXC)</image:caption></image:image><lastmod>2015-06-02T00:58:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/05/16/ataque-misterioso-envolve-arquivo-falso-em-enderecos-legitimos/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/05/listaip2.jpg</image:loc><image:title>Lista IP (Reprodução/Trend Micro)</image:title><image:caption>Lista de IPs infectados obtida pela Trend Micro. (Foto: Trend Micro)</image:caption></image:image><lastmod>2012-05-16T23:07:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/05/16/e-mail-com-notificacao-do-facebook-distribui-ladrao-de-senhas/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/05/fb-fotos-banker-ld2.png</image:loc><image:title>FB-fotos-banker-ld</image:title><image:caption>Mensagem recebida por email (Foto: Reprodução)</image:caption></image:image><lastmod>2012-05-16T18:59:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/05/15/golpe-prometendo-fotos-de-carolina-dieckmann-ja-afetou-3000-usuarios/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/05/carol212.png</image:loc><image:title>Golpe Carolina (Reprodução)</image:title><image:caption>Há diversas versões do tema em e-mails maliciosos. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/05/carol23.png</image:loc><image:title>carol2</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/05/carol12.jpg</image:loc><image:title>Golpe Carolina (Reprodução)</image:title><image:caption>E-mail malicioso envolvendo a atriz Carolina Dieckmann (Foto: Reprodução)</image:caption></image:image><lastmod>2012-05-15T16:02:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/05/04/parceiro-chines-vazou-dados-de-falha-de-seguranca-diz-microsoft/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/05/microsoft-logo1.jpg</image:loc><image:title>Microsoft Logo (Divulgação)</image:title></image:image><lastmod>2012-05-04T20:11:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/05/04/criminosos-transformam-milhas-aereas-roubadas-em-gasolina/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/05/tutorialipirangag2.jpg</image:loc><image:title>tutorialipirangag</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/tam-markwin2.jpg</image:loc><image:title>Voo da Tam (Mark Winterbourne/CC-BY)</image:title><image:caption>Guia para hackers é exclusivo para milhas roubadas a TAM e postos Ipiranga. (Foto: Mark Winterbourne/CC-BY)</image:caption></image:image><lastmod>2012-05-07T17:44:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/05/01/fraude-por-e-mail-voce-teve-uma-foto-marcada-no-messenger/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/aris_003_29042012_00160932.png</image:loc><image:title>Fraude Windows Live (Reprodução)</image:title><image:caption>E-mail leva vítima para ladrão de senhas. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-06-22T22:52:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/05/01/fraude-por-e-mail-delegacia-eletronica-registro-de-ocorrencia/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/aris_001_08022312_2054442.png</image:loc><image:title>Fraude Polícia Civil (Reprodução)</image:title><image:caption>Tela da mensagem de e-mail que leva vítima a ladrão de senhas. (Foto: Reprodução)</image:caption></image:image><lastmod>2019-07-25T17:55:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/28/concurso-convida-hackers-para-melhorar-transparencia-publica-em-sp/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/hackathon2.jpg</image:loc><image:title>Hackathon (Reprodução)</image:title><image:caption>Concurdo convida programadores a melhorarem sistema de transparência. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-04-28T22:27:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/27/provedores-devem-descontar-horas-perdidas-por-rompimento-de-fibra/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/anatel_logo2.gif</image:loc><image:title>anatel_logo</image:title></image:image><lastmod>2012-04-30T00:42:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/27/banker-leitor-de-captcha-wbwi3189-dll/</loc><lastmod>2012-04-27T19:18:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/27/email-falso-sobre-cancelamento-do-facebook-distribui-trojan-banker/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/facebook-banker2.png</image:loc><image:title>facebook-banker</image:title><image:caption>Imagem recebida por email distribuindo o malware (Foto: Reprodução)</image:caption></image:image><lastmod>2012-05-08T18:32:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/25/sophos-acha-malware-de-windows-em-computadores-com-mac-os-x/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/stats-sophos2.jpg</image:loc><image:title>Estatísticas Malware Windows em Mac (Divulgação)</image:title><image:caption>Principais pragas de Windows encontradas em Macs pela Sophos. (Foto: Divulgação)</image:caption></image:image><lastmod>2012-10-30T00:22:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/25/banker-emprestimo-mplayer2-exe/</loc><lastmod>2012-04-25T03:43:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/24/mozilla-cria-atualizacao-100-automatica-para-o-firefox/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/mozillamaint2.jpg</image:loc><image:title>Mozilla Maintenance Service (Reprodução)</image:title><image:caption>Mozilla Maintenance Service na lista de Serviços do Windows. (Foto: Reprodução)</image:caption></image:image><lastmod>2014-11-26T19:58:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/24/oposicao-ao-cispa-cresce-no-congresso-dos-eua-e-on-line/</loc><lastmod>2012-04-25T00:58:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/21/provedor-e-atacado-por-hospedar-site-que-relata-escandalo-politico-chines/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/boxun2.jpg</image:loc><image:title>Boxun (Reprodução)</image:title><image:caption>Site em chinês é mantido nos Estados Unidos e acessível na China apenas com o uso de proxy. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-04-21T23:39:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/21/banker/</loc><lastmod>2012-04-21T03:51:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/19/praga-ransomcrypt-criptografa-arquivos-e-cobra-por-resgate/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/ransoware2.png</image:loc><image:title>ransoware</image:title><image:caption>Informações contidas no arquivo texto criado pelo vírus (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/tomasz-a-poszwa-sxc2.png</image:loc><image:title>Tomasz-A-Poszwa-sxc</image:title></image:image><lastmod>2015-11-30T14:58:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/18/contas-comprometidas-no-twitter-distribuem-spam-com-antivirus-falso/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/twitter-virus2.png</image:loc><image:title>twitter-virus</image:title><image:caption>Mensagens enviadas por contas comprometidas (Foto: Reprodução)</image:caption></image:image><lastmod>2012-04-18T18:55:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/18/direito-autoral-e-seguranca-como-a-lei-cispa-nao-e-outro-sopa/</loc><lastmod>2012-04-28T00:07:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/10/pagina-ganhe-dinheiro-com-seu-face-traz-golpe-para-spam-no-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/site-pagina-envolvido2.png</image:loc><image:title>site-pagina-envolvido</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/dinheiro-fraude-facebook2.png</image:loc><image:title>dinheiro-fraude-facebook</image:title><image:caption>Fan page que distribui extensões maliciosas no golpe (Foto: Reprodução)</image:caption></image:image><lastmod>2012-08-10T20:16:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/09/virus-de-mac-ja-infectou-23-mil-no-brasil-e-13-mil-na-america-latina/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/screen-shot-2012-04-07-at-4-32-41-pm2.png</image:loc><image:title>Screen Shot 2012-04-07 at 4.32.41 PM</image:title></image:image><lastmod>2012-07-14T14:35:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/07/fraude-veja-quem-te-visitou-no-face-distribui-extensoes-falsas/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/visita2.png</image:loc><image:title>visita</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/golpe-completo2.png</image:loc><image:title>golpe-completo</image:title><image:caption>Detalhe data e numero de curtidas e logo abaixo a distribuição das extensões falsas (Foto: Reprodução)</image:caption></image:image><lastmod>2013-01-16T03:04:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/06/praga-para-roubo-de-senhas-do-facebook-e-distribuida-via-msn/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/estatistica-malware-facebook2.png</image:loc><image:title>estatistica-malware-facebook</image:title><image:caption>Dados mostra que maioria dos usuários vem de mensageiros e são brasileiros (Foto: Reprodução)</image:caption></image:image><lastmod>2012-05-12T13:55:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/06/veja-lista-de-extensoes-maliciosas-instaladas-por-fraudes-no-facebook/</loc><lastmod>2012-07-15T04:46:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/06/fraude-utiliza-pascoa-e-ferrero-rocher-para-enganar-usuarios-do-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/page12.png</image:loc><image:title>page1</image:title><image:caption>Ferrero Rocher e Facebook são citados como supostos parceiros do golpe (Foto: reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/page22.png</image:loc><image:title>page2</image:title><image:caption>Fan page que distribui extensões maliciosas no golpe (Foto: Reprodução)</image:caption></image:image><lastmod>2012-04-06T15:26:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/06/devido-a-falhas-mozilla-bloqueia-versoes-antigas-do-java-no-firefox/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/firefox2.png</image:loc><image:title>Firefox (Divulgação)</image:title><image:caption>Mozilla teve de retirar o Firefox 16 do ar. (Foto: Divulgação)</image:caption></image:image><lastmod>2012-04-09T14:21:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/05/em-teste-software-do-itau-discrimina-linux-e-privilegia-mac-os-x/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/itau-ua2.jpg</image:loc><image:title>Itaú troca de UA (Reprodução)</image:title><image:caption>No Linux, usar Itaú como o Firefox do Mac burla instalação do 'Guardião'. (Foto: Reprodução)</image:caption></image:image><lastmod>2015-10-03T15:59:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/02/resultados-da-pegadinha-de-primeiro-de-abril-da-linha-defensiva/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/acessos1abril2.jpg</image:loc><image:title>Acessos no primeiro de abril de 2012 (Reprodução)</image:title><image:caption>Botão 'Executar' foi clicado pelo menos mil vezes. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/ldinfectado2.jpg</image:loc><image:title>Janela do Java no LD. (Foto: Reprodução)</image:title><image:caption>Janela de execução de applet não-assinado do Java: comum sinal de site hackeado. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-04-14T17:59:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/02/aplicativo-para-iphone-girls-around-me-e-removido-de-loja-da-apple/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/screen-shot-2012-04-01-at-11-32-29-am11.jpg</image:loc><image:title>iOS-App-Girls</image:title><image:caption>Aplicativo localizava garotas proximas ao utilizador (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/screen-shot-2012-04-01-at-11-32-29-am2.jpg</image:loc><image:title>Girls-Around-Me</image:title><image:caption>Aplicativo localizava garotas proximas ao utilizador (Foto: Reprodução)</image:caption></image:image><lastmod>2012-04-02T21:09:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/04/02/promessa-de-creditos-gratis-no-facebook-distribui-extensoes-de-spam/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/fraude212.png</image:loc><image:title>fraude2</image:title><image:caption>Mensagem distribuida por usuário infectado (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/fraude22.png</image:loc><image:title>fraude2</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/app1.png</image:loc><image:title>app</image:title><image:caption>Aplicativo tenta enganar usuários (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/04/fraude3.png</image:loc><image:title>fraude</image:title><image:caption>Fan page que distribui extensões maliciosas no golpe (Foto: Reprodução)</image:caption></image:image><lastmod>2012-05-04T00:06:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/primeiro-abril-2012/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/01/nytimes21.jpg</image:loc><image:title>nytimes2</image:title></image:image><lastmod>2012-03-31T21:55:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/2012/03/30/golpe-jogo-do-add-distribui-virus-para-usuarios-do-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/add12.png</image:loc><image:title>add</image:title><image:caption>Fan page que distribui extensões maliciosas no golpe (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/face-fake2.png</image:loc><image:title>face-fake</image:title><image:caption>Falsa extensão para o browser Chrome (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/add3.png</image:loc><image:title>imagem-facebook</image:title><image:caption>Fan page que distribui extensões maliciosas no golpe (Foto: Reprodução)</image:caption></image:image><lastmod>2013-02-24T19:59:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/28/lulzsec-renasce-roubando-perfis-de-militares-em-site-de-relacionamento/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/lulzsec-figueiro2.png</image:loc><image:title>lulzsec-figueiro</image:title></image:image><lastmod>2012-03-28T17:20:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/27/promessa-de-sms-gratis-no-facebook-e-golpe-que-instala-virus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/chamada-sms-gratis-virus2.jpg</image:loc><image:title>chamada-sms-gratis-virus</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/22.png</image:loc><image:title>2</image:title><image:caption>Links maliciosos distribuidos na descrição das fotos (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/alerta-sms2.png</image:loc><image:title>alerta-sms</image:title><image:caption>Fan page que distribui extensões maliciosas no golpe (Foto: Reprodução)</image:caption></image:image><lastmod>2012-04-06T02:18:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/25/saiba-como-ver-controlar-ou-remover-aplicativos-do-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/apps2.png</image:loc><image:title>apps</image:title></image:image><lastmod>2012-08-27T23:55:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/23/spam-e-virus-no-facebook-viabilizam-venda-de-curtir-na-rede-social/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/reg2.jpg</image:loc><image:title>Registro Publicidades</image:title><image:caption>Publicidades Online .com e .net tem registro idêntico. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/publion2.jpg</image:loc><image:title>Publicidades Online.net (Reprodução)</image:title><image:caption>Site nega que tenha relação com página homônima que fica no mesmo servidor e está registrada para a mesma pessoa. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-03-23T21:33:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/23/pagina-que-promete-tirar-virus-do-face-e-falsa-e-traz-virus-para-o-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/falso-app2.png</image:loc><image:title>falso app</image:title><image:caption>Extensão falsa distribuida na Chrome Web Store (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/removal-virus-face-fake-ld-site-chamada2.png</image:loc><image:title>removal-virus-face-fake-ld-site-chamada</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/removal-virus-face-fake-ld-site2.png</image:loc><image:title>removal-virus-face-fake-ld-site</image:title><image:caption>Fan page que distribui extensões maliciosas no golpe (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/comentarios-virus2.png</image:loc><image:title>comentarios-virus</image:title></image:image><lastmod>2012-04-25T20:19:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/20/virus-russo-explora-falha-no-java-e-nao-cria-arquivos-no-disco/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/memory-marin-myftiu-sxc2.jpg</image:loc><image:title>Memória RAM (Marin Myftiu / SXC)</image:title><image:caption>Praga não se aloja no disco, apenas na memória RAM. (Foto: Marin Myftiu / SXC)</image:caption></image:image><lastmod>2012-03-20T18:33:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/20/criminosos-alteram-dns-de-modems-usando-falha-para-realizar-fraudes/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/globoredir2.jpg</image:loc><image:title>Redirecionamento Globo.com (Foto: Reprodução)</image:title><image:caption>Páginas de grandes portais e serviços de e-mail também eram redirecionadas. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/googleredir2.png</image:loc><image:title>Redirecionamento Google (Reprodução)</image:title><image:caption>Redirecionamento do Google oferecia praga digital. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/paineldns2.png</image:loc><image:title>Painel DNS (Reprodução)</image:title><image:caption>Usando falha ou uma senha fraca configurada no roteador, os servidores de DNS são alterados. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/modem-4shaws-sxc2.jpg</image:loc><image:title>Modem ADSL (4shaws / sxc)</image:title><image:caption>Falha está em modems ADSL de diferentes fabricantes. (Foto: 4shaws / SXC)</image:caption></image:image><lastmod>2017-02-17T18:11:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/19/blog-do-iphone-tem-dominio-roubado-para-distribuir-virus-bancario/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/chamada-virus-iphone2.jpg</image:loc><image:title>chamada-virus-iphone</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/iphone-infected2.png</image:loc><image:title>iphone-infected</image:title><image:caption>Falso plugin sendo distribuido no Blog do Iphone (Foto: Reprodução)</image:caption></image:image><lastmod>2012-03-20T18:01:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/19/promessa-de-status-para-facebook-leva-internautas-a-praga-digital/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/ld-fraude-chat2.jpg</image:loc><image:title>ld-fraude-chat</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/chat2.png</image:loc><image:title>Página falsa no Facebook para disseminar vírus. (Foto: Reprodução)</image:title><image:caption>Criminosos tentam enganar usuários com a promessa de adicionar "visualização de status no chat do Facebook". A página em questão distribui uma falsa extensão que rouba a senha do usuário. Caso tenha se infectado, siga essas dicas da &lt;strong&gt;Linha Defensiva&lt;/strong&gt; para remover a extensão: http://bit.ly/y1Q6mW</image:caption></image:image><lastmod>2012-03-19T16:40:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/19/cameras-ao-vivo-do-bbb-12-leva-internautas-para-virus-no-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/bbb12.png</image:loc><image:title>Link Patrocinado BBB (Reprodução)</image:title><image:caption>Link patrocinado disseminando a página maliciosa. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/page-bbb-12.jpg</image:loc><image:title>Página BBB (Reprodução)</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/page-bbb2.png</image:loc><image:title>Fraude BBB (Reprodução)</image:title><image:caption>Página falsa no Facebook usando BBB para disseminar vírus. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-03-21T16:33:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/16/informacoes-sobre-falha-grave-no-rdp-podem-ter-vazado-da-microsoft/</loc><lastmod>2012-03-16T19:36:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/16/e-a-pergunta-e-qual-pergunta-de-seguranca-e-segura/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/questions2.jpg</image:loc><image:title>questions</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/steam2.jpg</image:loc><image:title>Steam (Divulgação)</image:title><image:caption>Integração da internet com o sistema pode ser via para ataques.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/steam-questions2.png</image:loc><image:title>steam-questions</image:title><image:caption>Perguntas 'de segurança' para o Steam. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-03-19T23:09:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/16/anonymous-os-gera-polemica-e-tirado-do-ar-e-divide-anonymous/</loc><lastmod>2015-12-28T19:20:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/14/aplicativo-para-saber-quem-viu-suas-fotos-no-facebook-e-falso/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/fraude-fotos2.png</image:loc><image:title>Página oferencendo o suposto app (Foto: Reprodução)</image:title><image:caption>Página oferencendo o suposto app (Foto: Reprodução)</image:caption></image:image><lastmod>2012-03-16T12:51:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/14/fraude-oferece-musica-no-perfil-do-facebook-e-entrega-virus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/alertas2.png</image:loc><image:title>Página oferencendo o suposto app (Foto: Reprodução)</image:title><image:caption>Página oferencendo o suposto app (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/pagina-golpe2.jpg</image:loc><image:title>Golpe - Destaque (Reprodução)</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/comentc3a1rios-chamada2.jpg</image:loc><image:title>comentários-chamada</image:title></image:image><lastmod>2012-03-14T18:52:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/14/microsoft-corrige-falha-grave-na-area-de-trabalho-remota/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/rdp-w72.png</image:loc><image:title>RDP - Windows 7 (Foto: Reprodução)</image:title><image:caption>Configuração do RDP no Windows 7. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-03-15T19:33:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/regras-comunidade/</loc><lastmod>2012-03-13T02:19:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/2012/03/11/depois-de-eike-avisar-que-seria-dificil-site-da-ebx-sai-do-ar/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/tweets-eike2.jpg</image:loc><image:title>Tweets Eike Batista (Reprodução)</image:title><image:caption>Em troca de mensagens, hackers aceitam 'desafio' de Eike Batista. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/ebx-off2.jpg</image:loc><image:title>EBX (Reprodução / @roteirodecinema)</image:title><image:caption>Página da EBX durante o ataque. (Foto: Reprodução / @roteirodecinema)</image:caption></image:image><lastmod>2012-03-22T14:25:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/10/golpes-no-facebook-distribuem-plug-ins-que-roubam-senhas/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/golpe-executc3a1veis2.jpg</image:loc><image:title>Golpe Executáveis Facebook (Reprodução)</image:title><image:caption>Aplicativos também estão sendo distribuídos pelas fan pages maliciosas, normalmente via links encurtados. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/golpe-extensc3b5es2.jpg</image:loc><image:title>Golpe Extensões Facebook (Reprodução)</image:title><image:caption>Extensões 'curtem' perfis divulgados. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/facebook-felipe-figueiro2.jpg</image:loc><image:title>Facebook (Felipe Figueiró/LD)</image:title><image:caption>Rede social está sendo atacada por criminosos brasileiros. (Foto: Felipe Figueiró/LD)</image:caption></image:image><lastmod>2012-03-19T17:07:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/10/em-ataque-de-40-horas-anonymous-tira-site-da-policia-do-rs-do-ar/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/twitter-anonymous2.jpg</image:loc><image:title>Twitter de Havittaja (Reprodução)</image:title><image:caption>Hacker assumiu ataques no Twitter. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/anon-anon-editor-wikic-ccby2.jpg</image:loc><image:title>Anonymous (Anonymous Editor / Wikimedia Commons / CC-BY)</image:title><image:caption>Hacker que realizou o ataque é simpatizante do movimento Anonymous. (Foto: Anonymous Editor / CC-BY)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/anonymous-paul-williams-ccby2.jpg</image:loc><image:title>Anonymous (Paul Williams / CC-BY)</image:title><image:caption>Protestos do Anonymous em 2008. (Foto: Paul Williams / CC-BY)</image:caption></image:image><lastmod>2012-03-21T15:09:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/07/hackers-interferem-com-votacao-pela-internet-e-fazem-personagem-ganhar/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/bender_rodriguez2.png</image:loc><image:title>Bender Rodriguez (Divulgação)</image:title><image:caption>Bender Rodriguez, personagem do Futurama (Foto: Divulgação / Viacom)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/bender2.jpg</image:loc><image:title>bender</image:title></image:image><lastmod>2012-03-07T17:43:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/06/sabu-lider-do-lulzsec-coopera-com-governo-ha-seis-meses-revela-fbi/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/sabu-tweet2.jpg</image:loc><image:title>Twitter de Sabu (Reprodução)</image:title><image:caption>Em mensagem no Twitter publicada um dia antes de Sabu ser revelada como informante, hacker afirma que o governo 'é controlado por um bando de covardes'. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/lulzsec-materia2.jpg</image:loc><image:title>LulzSec (Reprodução)</image:title><image:caption>Símbolo do LulzSec, grupo hacker que invadiu fabricantes de games e derrubou sites de autoridades. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/lulzsec2.jpg</image:loc><image:title>LulzSec (Reprodução)</image:title></image:image><lastmod>2012-03-10T13:19:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/04/guias-falsos-do-anonymous-levam-simpatizantes-a-praga-virtual/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/anon2.jpg</image:loc><image:title>Anonymous (Reprodução)</image:title><image:caption>Golpe quer enganar voluntários que participam em protestos do Anonymous. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-03-04T23:23:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/03/facebook-nega-cumprimento-de-ordens-judiciais-brasileiras/</loc><lastmod>2012-03-03T18:21:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/02/o-que-muda-com-a-nova-politica-de-privacidade-do-google/</loc><lastmod>2012-03-02T04:42:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/01/o-que-e-e-o-que-faz-um-arquivo-de-dll-dynamic-link-library/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/03/dll2.jpg</image:loc><image:title>Arquivo DLL (Foto: Reprodução)</image:title><image:caption>Ícone de arquivos DLL - Bibliotecas de Vínculo Dinâmico - no Windows 7. (Foto: Reprodução)</image:caption></image:image><lastmod>2014-02-05T23:14:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/03/01/penetra-em-evento-de-seguranca-entra-sem-cracha-e-usa-nome-falso/</loc><lastmod>2012-03-01T05:48:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/02/28/virus-brasileiro-altera-boot-loader-no-windows-7-de-64-bits/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/02/reiniciar-windows2.png</image:loc><image:title>Reiniciar Windows (Reprodução)</image:title><image:caption>Praga é instável e faz Windows pedir para ser reiniciado constantemente. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-03-13T04:17:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/02/28/tres-anos-depois-conficker-ainda-e-responsavel-por-15-dos-ataques/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/02/computer-channah-sxc2.jpg</image:loc><image:title>Computador (Channah / SXC)</image:title><image:caption>Vírus causou dor de cabeça para milhões de usuários em 2008 e 2009. (Foto: Channah / SXC)</image:caption></image:image><lastmod>2012-03-07T05:15:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/02/28/nova-praga-flashback-ataca-mac-os-x-com-java-desatualizado/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/02/mac-os-x-apple2.jpg</image:loc><image:title>Mac OS X (Reprodução)</image:title><image:caption>Sistema da Apple, que ficou livre de vírus durante anos, começa sofre ataque semelhante aos de Windows. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-02-28T22:35:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/02/23/protocolo-ipv6-ja-sofre-com-ataques-de-negacao-de-servico/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/02/cabo-rede_anders-engelbol-sxc2.jpg</image:loc><image:title>Cabo de Rede (Anders Engelbøl)</image:title><image:caption>IPv6 inclui novos recursos de segurança para detecção e bloqueio de ataques. (Foto: Anders Engelbøl / SXC)</image:caption></image:image><lastmod>2012-02-24T02:51:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/ldlogger/</loc><lastmod>2012-02-23T19:04:41+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/2012/02/23/governo-dos-eua-propoe-regras-para-proteger-privacidade-on-line/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/02/casabranca-tomlohdan2.jpg</image:loc><image:title>Casa Branca (Tom Lohdan)</image:title><image:caption>Governo dos EUA quer transparência no armazenamento de dados pessoais. (Foto: Tom Lohdan / CC-BY)</image:caption></image:image><lastmod>2012-02-23T18:11:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/02/19/estudante-e-condenado-a-oito-meses-de-prisao-por-invadir-servidores-do-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/02/keyboard-simon-stratford-sxu2.jpg</image:loc><image:title>Teclado (Simon Stratford/SXU)</image:title><image:caption>Promotor classificou o caso como o "o mais grave envolvendo uma rede social" na Inglaterra. (Foto: Simon Stratford/SXU)</image:caption></image:image><lastmod>2014-12-01T16:45:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/02/17/a-censura-do-twitter-da-lei-seca-e-os-velhos-conselhos-da-internet/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/02/leisecatwitter2.jpg</image:loc><image:title>Lei Seca (Reprodução)</image:title><image:caption>Perfis 'Lei Seca' no Twitter podem sofrer bloqueio. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-03-13T23:19:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/02/01/symantec-e-criticada-por-classificar-apps-do-android-market-como-virus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/02/android-market-12.jpg</image:loc><image:title>android-market-1</image:title><image:caption>Companhias antivírus discordam sobre apps que capturam dados dos usuários. (Foto: Divulgação)</image:caption></image:image><lastmod>2012-02-01T03:21:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/01/28/praga-no-android-market-teria-sido-instalada-por-5-milhoes-de-usuarios/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/01/android_3802.jpg</image:loc><image:title>Android (Divulgação)</image:title><image:caption>Sistema operacional desenvolvido pelo Google é alvo de pragas digitais. (Foto: Divulgação)</image:caption></image:image><lastmod>2012-01-28T20:37:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/01/27/exercio-brasileiro-investe-r-6-milhoes-em-seguranca-e-guerra-digital/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/01/avware2.jpg</image:loc><image:title>AVware (Reprodução)</image:title><image:caption>Exército instalará antivírus brasileiro AVware em 60 mil computadores. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-06-06T20:42:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/01/22/o-anonymous-protestos-on-line-e-uma-alternativa-ao-direito-autoral/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/01/anonymous-protesto-cientologia2.jpg</image:loc><image:title>Protestos dos Anonymous em Londres, 2008 (Paul Williams/CC-BY)</image:title><image:caption>Protestos físicos do Anonymous contra a Igreja da Cientologia em Londres, 2008. (Foto: Paul Williams / CC-BY)</image:caption></image:image><lastmod>2012-02-14T14:46:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/01/20/ativistas-atacam-sites-do-governo-dos-eua-e-associacoes-de-pro-copyright/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/01/op-mega-figueiro2.jpg</image:loc><image:title>opMegaupload</image:title><image:caption>#opMegaupload derrubou sites do governo dos EUA, das gravadoras e do lobby pró-copyright.</image:caption></image:image><lastmod>2012-01-22T15:55:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/01/20/acao-autoridades-eua-megaupload-fbi/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2012/01/rip-mega2.jpg</image:loc><image:title>Megaupload RIP</image:title><image:caption>Arquivos hospedados no Megaupload podem estar perdidos para sempre. (Foto: Reprodução/Arte)</image:caption></image:image><lastmod>2012-01-20T20:05:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2012/01/12/como-saber-quem-visitou-seu-perfil-no-facebook/</loc><lastmod>2013-07-14T15:28:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/12/25/o-ano-do-facebook-de-invasoes-hackers-e-ciberprotestos/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/12/justica2.jpg</image:loc><image:title>Justiça (SXC)</image:title><image:caption>'Ciberprotestos' marcaram 2011. (Foto: linusb4/SXC)</image:caption></image:image><lastmod>2011-12-29T18:05:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/12/21/tag-html-pode-ser-usada-para-travar-o-windows-7/</loc><lastmod>2011-12-22T12:00:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/12/13/falha-no-windows-phone-trava-aplicativo-de-recebimento-de-sms/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/12/wp7-htctitan2.jpg</image:loc><image:title>HTC Titan (Divulgação)</image:title><image:caption>HTC Titan - um dos aparelhos testados e confirmados como vulneráveis. (Foto: Divulgação)</image:caption></image:image><lastmod>2011-12-13T21:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/12/12/chrome-e-o-navegador-mais-seguro-diz-estudo-financiado-pelo-google/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/12/blacklist-chart2.jpeg</image:loc><image:title>Gráfico sobre blacklists (Accuvant)</image:title><image:caption>Teste da Accuvant mostra que filtros da Microsoft e o do Google têm desempenho semelhante. (Foto: Accuvant Labs)</image:caption></image:image><lastmod>2012-03-26T05:09:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/12/12/pontuacao-arredondada-faz-internet-explorer-gabaritar-teste/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/12/browsermatters2.jpg</image:loc><image:title>Browser Matters (Foto: Reprodução)</image:title><image:caption>Site arredonda pontuações para fazer Firefox e Chrome terem nota baixa e IE com nota máxima. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-12-12T18:51:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/12/12/perfil-fake-aplica-pegadinha-do-malandro-com-xenofobia/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/12/sophia-hacked1.jpg</image:loc><image:title>Perfil hackeado (Reprodução)</image:title><image:caption>Perfil @SophiaofDreams depois da "invasão". (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/12/twitter2.jpg</image:loc><image:title>Twitter de Sophia Fernandes (Reprodução)</image:title><image:caption>Perfil falso de Sophia Fernandes com mensagens xenofóbicas. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-01-02T13:31:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/11/08/silver-bullet-reune-especialistas-em-seguranca-em-sao-paulo/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/11/sbconf1.jpg</image:loc><image:title>Silver Bullet (Reprodução)</image:title><image:caption>Conferência Silver Bullet é tem os mesmos organizadores da You Shot the Sheriff. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-11-08T05:49:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/10/30/anuncio-falso-de-tiririca-no-facebook-leva-a-pagina-com-virus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/tiri-anuncio2.png</image:loc><image:title>Anúncio (Foto: Reprodução)</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/tiri-pagina2.png</image:loc><image:title>Página do Tiririca infectada (Reprodução)</image:title><image:caption>Página no Facebook tinha código que levava para vírus. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-11-27T15:48:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/10/13/pesquisadores-encontram-versao-do-spyeye-para-smartphones/</loc><lastmod>2011-10-13T07:53:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/10/12/morre-dennis-ritchie-criador-da-linguagem-c-e-do-unix/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/dritchie2.png</image:loc><image:title>Dennis Ritchie (Domínio Público)</image:title><image:caption>O programador Dennis Ritchie criou a linguagem C e auxiliou o desenvolvimento do sistema Unix.</image:caption></image:image><lastmod>2011-10-14T16:35:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/10/12/verisign-quer-mais-liberdade-para-retirar-dominios-do-ar/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/dotcom2.jpg</image:loc><image:title>.com (Jim Manning)</image:title><image:caption>Domínios.com são gerenciados pela Verisign. (Foto: Jim Manning / SXC)</image:caption></image:image><lastmod>2011-10-14T19:48:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/10/12/so-um-governo-pode-ter-realizado-ataque-hacker-diz-rsa/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/rsasecurid2.jpg</image:loc><image:title>SecurID (Bruno Cordioli)</image:title><image:caption>RSA atua em diversos setores de segurança; entre eles, a fabricação de tokens de senhas. (Foto: Bruno Cordioli/ Flickr / CC-BY)</image:caption></image:image><lastmod>2011-11-21T18:41:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/10/10/golpe-na-internet-promete-codigos-gratis-do-xbox-live/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/xbox-chamada2.jpg</image:loc><image:title>Gerador Xbox Live (Reprodução)</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/gerador2.jpg</image:loc><image:title>Gerador Xbox Live (Reprodução / GFI)</image:title><image:caption>Gerador de códigos para Xbox Live tem link que leva internauta para página falsa. (Foto: Reprodução / GFI)</image:caption></image:image><lastmod>2015-11-12T18:19:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/10/10/noticia-sobre-conferencia-virus-bulletin-vira-isca-para-virus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/tweet-bulletin2.jpg</image:loc><image:title>Vírus Virus Bulletin (Reprodução)</image:title><image:caption>Tuíte disseminando praga com tema da Virus Bulletin. (Foto: Reprodução/BitDefender)</image:caption></image:image><lastmod>2011-10-10T19:55:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/10/06/morte-de-steve-jobs-e-usada-para-aplicar-golpes-na-internet/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/steve-morto2.jpg</image:loc><image:title>Homenagem da Apple (Reprodução)</image:title><image:caption>Homenagem da Apple a Steve Jobs, que morreu na quarta-feira. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-10-07T01:39:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/10/05/quando-todos-querem-se-expor-ninguem-precisa-do-big-brother/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/facebook-pwn2.jpg</image:loc><image:title>Facebook Pwn (Reprodução)</image:title><image:caption>A ferramenta Facebook Pwn cria um círculo social falso para que a vítima adiciona um amigo e tenha seus dados capturados. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/observando2.jpg</image:loc><image:title>Observando (Mattox/SXC)</image:title><image:caption>Não é preciso que alguém esteja observando que nós mesmos queremos nos expor. (Foto: Mattox/SXC)</image:caption></image:image><lastmod>2011-10-05T11:00:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/area-tecnica/</loc><lastmod>2011-10-04T17:21:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/servicos/</loc><lastmod>2011-10-04T17:20:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/2011/10/04/responsavel-por-kernel-do-linux-alerta-desenvolvedores-para-ataque/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/greg-cut2.jpg</image:loc><image:title>Greg Kroah-Hartman (Sebastian Oliva/CC/BY-SA)</image:title><image:caption>Greg Kroah-Hartman (Foto: Sebastian Oliva/CC/BY-SA)</image:caption></image:image><lastmod>2011-10-04T11:00:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/10/03/pagina-de-erro-404-e-usada-por-criminosos-para-roubo-de-dados/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/phish-hsbc-br2.png</image:loc><image:title>Phish HSBC (Reprodução)</image:title><image:caption>Página de phishing brasileira para o banco HSBC usa técnica antes desconhecida para escapar de filtros. (Foto: Reprodução)</image:caption></image:image><lastmod>2016-04-09T12:14:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/10/02/virus-brasileiro-realiza-emprestimo-bancario-e-rouba-a-vitima/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/bb_emprestimo12.png</image:loc><image:title>Empréstimo (Reprodução)</image:title><image:caption>Trecho do código que realiza empréstimo em nome da vítima. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-10-10T19:20:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/10/02/um-mes-depois-de-ataque-site-do-linux-continua-fora-do-ar/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/kernelorg2.png</image:loc><image:title>Kernel.org (Foto: Reprodução)</image:title><image:caption>Página princippal do Kernel.org, fora do ar para manutenção. (Foto: Reprodução)</image:caption></image:image><lastmod>2013-01-14T17:30:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/10/02/rivalidade-marca-jogo-em-evento-de-seguranca-na-argentina/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/chamada-ekoparty2.jpg</image:loc><image:title>Premiação Eko Party (Foto: Anchises de Paula)</image:title><image:caption>Brasileiros na premiação, ao final da brincadeira. Fernando Amatte é o primeiro à esquerda. (Foto Premiação Eko Party (Foto: Anchises de Paula)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/10/ctf-defcon2.jpg</image:loc><image:title>CTF na DEF CON 17 (Nate Grigg/CC-BY)</image:title><image:caption>Hackers se preparam para jogo de Capture the Flag na DEF CON, em Las Vegas. Competição na argentina foi semelhante. (Foto: Nate Grigg/CC-BY)</image:caption></image:image><lastmod>2011-10-03T15:08:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/09/29/panda-security-preve-troca-administrativa-e-demissao-de-128-funcionarios/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/09/panda-security2.jpg</image:loc><image:title>Panda Security (Divulgação)</image:title><image:caption>Panda Security está com dificuldades que a forçaram a demitir funcionários. (Foto: Divulgação)</image:caption></image:image><lastmod>2011-09-29T03:14:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/09/26/virus-bloqueia-e-da-fim-da-linha-para-a-linha-defensiva/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/09/ldhacked-chamada2.jpg</image:loc><image:title>LD 'hackeado' (Foto: Reprodução)</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/09/ldhacked2.jpg</image:loc><image:title>Tela da Linha Defensiva (Foto: Reprodução)</image:title><image:caption>Página falsa apresentada pelo vírus quando vítima tenta acessar a Linha Defensiva. (Foto: Reprodução)]</image:caption></image:image><lastmod>2011-09-26T11:30:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/09/22/e-mail-de-suposta-empresa-de-marketing-leva-usuario-a-ladrao-de-senhas/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/09/fraudelwebpng2.png</image:loc><image:title>Fraude Locaweb (Foto: Reprodução)</image:title><image:caption>Reprodução da fraude. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-09-22T23:12:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/09/21/anuncios-maliciosos-aparecem-no-buscador-da-microsoft/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/09/bing2.jpg</image:loc><image:title>Bing (Foto: Reprodução)</image:title><image:caption>Anúncios em buscador da Microsoft estão levando usuários para páginas infectadas. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-09-22T02:23:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/09/21/posso-usar-um-anti-spyware-com-o-antivirus-e-dois-antivirus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/09/exame-hd2.jpg</image:loc><image:title>Exame no HD (Foto: Guillermo Alvarez/SXC)</image:title><image:caption>Softwares antivírus entram em conflito com eles mesmos. Apenas um deve ser utilizado. (Foto: Guillermo Alvarez/SXC)</image:caption></image:image><lastmod>2011-09-22T01:19:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/09/20/como-identificar-o-autor-de-um-blog-para-iniciar-um-processo-judicial/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/09/direito2.jpg</image:loc><image:title>Direito (Foto: Divulgação)]</image:title><image:caption>Processo na Justiça precisa ser iniciado para obrigar provedor a fornecer dados do autor do site. (Foto: Divulgação)</image:caption></image:image><lastmod>2011-11-17T00:01:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/09/01/apresentacao-do-editor-da-linha-defensiva-no-disi-2011/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/09/selo-disi20112.jpg</image:loc><image:title>DISI 2011</image:title><image:caption>Altieres Rohr, editor da Linha Defensiva, foi palestrante no DISI 2011.</image:caption></image:image><lastmod>2011-09-03T00:34:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/30/praga-para-windows-explora-senhas-fracas-para-infectar-usuarios/</loc><lastmod>2011-08-30T15:39:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/26/editor-da-linha-defensiva-sera-palestrante-em-evento-da-rnp/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/08/disi20112.jpg</image:loc><image:title>DISI 2011 (Foto: Divulgação)</image:title><image:caption>Evento ocorre no dia 31 de agosto, em Curitiba. (PR). (Foto: Divulgação)</image:caption></image:image><lastmod>2011-08-26T16:06:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/22/empresa-americana-oferece-bolsas-para-mulheres-estudantes-de-ti/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/08/mulher-trabalho2.jpg</image:loc><image:title>Mulher trabalhando (Foto: Mario Alberto Magallanes Trejo/SXC)</image:title><image:caption>Apenas 22% dos trabalhadores do ramo de TI são mulheres. (Foto: Mario Alberto Magallanes Trejo/SXC)</image:caption></image:image><lastmod>2011-10-08T15:54:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/17/codigo-do-virus-spyeye-e-revelado-na-internet/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/08/spyeye2.png</image:loc><image:title>SpyEye (Foto: Reprodução)</image:title><image:caption>SpyEye é um kit pago para geração de vírus. Código agora está disponível na internet. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-08-17T13:52:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/10/adobe-corrige-23-vulnerabilidades-criticas-em-seus-softwares/</loc><lastmod>2011-08-11T01:42:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/08/fraude-natura-ekos-2011-leva-internauta-para-virus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/08/natur-ekos-20112.jpg</image:loc><image:title>Natura Ekos 2011 (Foto: Reprodução)</image:title><image:caption>Fraude usa isca de promoção para levar internauta a um ladrão de senhas bancárias. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-08-29T05:54:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/07/praga-recebe-comando-para-transferir-dinheiro-de-conta-bancaria/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/08/vm_0654202.png</image:loc><image:title>Complemento no Internet Explorer (Foto: Reprodução)</image:title><image:caption>Completo com extensão .txt no Internet Explorer. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-08-07T07:15:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/06/novo-banker-brasileiro-ataca-usuarios-do-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/08/qt2.jpg</image:loc><image:title>Mensagem via e-mail/MSN. (Foto: Reprodução)</image:title><image:caption>Praga também envia mensagem via e-mail e MSN. (Foto: Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/08/mensagem-facebook2.jpg</image:loc><image:title>Mensagem no Facebook. (Foto: Reprodução)</image:title><image:caption>Mensagem do vírus disparada pelo Facebook fala sobre dispositivos móveis. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-08-06T17:42:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/06/aviao-espiao-e-demonstrado-na-conferencia-black-hat/</loc><lastmod>2011-08-06T15:52:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/05/acusado-de-invadir-500-mil-perfis-do-facebook-se-entrega-ao-fbi/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/08/facebook2.jpg</image:loc><image:title>Facebook (Foto: Divulgação)</image:title><image:caption>Recursos que não existem no Facebook viram isca para golpes. (Foto: Divulgação)</image:caption></image:image><lastmod>2011-08-06T01:38:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/04/apple-corrige-14-vulnerabilidades-no-quicktime/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/08/quicktime2.jpg</image:loc><image:title>QuickTime (Foto: Divulgação)</image:title><image:caption>QuickTime, da Apple: brechas foram eliminadas em atualização. (Foto: Divulgação)</image:caption></image:image><lastmod>2011-08-04T23:16:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/03/pf-prende-hackers-que-roubaram-r-2-milhoes-pela-web/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/08/teclado32.jpg</image:loc><image:title>Teclado (Foto: Jakub Krechowicz/SXC)</image:title><image:caption>Hackers roubavam contas bancárias pela internet. (Foto: Jakub Krechowicz/SXC)</image:caption></image:image><lastmod>2013-05-09T23:35:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/03/virus-brasileiro-realiza-transferencia-bancaria-sozinho-e-rouba-5-mil/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/08/chamada-ted2.jpg</image:loc><image:title>Transferência TED (Foto: Reprodução)</image:title><image:caption>Detalhe do código que realiza a TED. (Foto: Reprodução)</image:caption></image:image><lastmod>2018-11-28T04:22:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/02/ataque-contamina-5-milhoes-de-paginas-de-internet/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/08/willysy-injection2.png</image:loc><image:title>Infecção de sites (Foto: Reprodução)</image:title><image:caption>Páginas são alteradas para incluir código que aponta para site capaz de infectar internautas. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-08-03T02:38:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/08/01/falsa-atualizacao-do-flash-player-e-utilizada-para-atacar-usuarios-do-mac-os-x/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/08/trojan-flash-osx2.jpg</image:loc><image:title>Página falsa do Google (Foto: Reprodução)</image:title><image:caption>Página falsa do Google (Foto: Reprodução)</image:caption></image:image><lastmod>2011-08-02T00:38:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/30/brecha-no-skype-permite-roubo-de-contas-via-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/skype2.jpg</image:loc><image:title>Skype (Foto: Divulgação)</image:title><image:caption>Software introduziu falha junto com a integração ao Facebook. (Foto: Divulgação)</image:caption></image:image><lastmod>2011-07-30T18:20:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/29/ataque-pode-ter-roubado-dados-de-35-milhoes-de-sul-coreanos/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/internet-seul2.jpg</image:loc><image:title>Cibercafé em Seul (Foto: Rob Fahey/CC-BY-SA)</image:title><image:caption>País é um dos mais conectados do mundo. (Foto: Rob Fahey/CC-BY-SA)</image:caption></image:image><lastmod>2011-12-13T21:22:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/28/hackers-incentivam-usuarios-a-cancelar-contas-do-paypal/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/oppaypal2.jpg</image:loc><image:title>OpPayPal</image:title><image:caption>Mensagens no Twitter pedem o cancelamento do PayPal. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-07-31T01:14:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/28/pesquisa-aponta-que-windows-xp-e-o-mais-atacado-por-rootkits/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/windows_xp_logo2.jpg</image:loc><image:title>Logo do Windows XP</image:title><image:caption>Com apenas 51% do mercado, XP estava com 74% das infecções.</image:caption></image:image><lastmod>2011-07-28T16:33:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/27/hacker-e-preso-acusado-de-ser-topiary-porta-voz-do-lulzsec/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/twitter-anon2.jpg</image:loc><image:title>Twitter do Topiary (Foto: Reprodução)</image:title><image:caption>'Você não pode prender uma ideia', diz única mensagem deixada no Twitter de Topiary. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-07-28T02:35:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/27/oscar-da-inseguranca-ja-tem-sony-como-vencedora/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/pwnie-awards2.jpg</image:loc><image:title>Pwnie Awards (Foto: Reprodução)</image:title><image:caption>Prêmio revela grandes pesquisas e fatos da segurança com humor. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-07-28T02:21:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/26/apple-lanca-ios-4-3-5-para-corrigir-nova-falha-de-seguranca/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/iphone2.jpg</image:loc><image:title>iPhone (Foto: Divulgação)</image:title><image:caption>Atualização só corrige falhas de segurança, mas tem 666 MB. (Foto: Divulgação)</image:caption></image:image><lastmod>2011-07-26T20:41:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/25/anonymous-divulga-documentos-secretos-de-unidade-de-cibercrime-italiana/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/colecao-arquivos2.jpg</image:loc><image:title>Arquivos capturados pelo Anonymous. (Foto: Reprodução)</image:title><image:caption>Alguns dos arquivos capturados pelos Anonymous. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-07-25T17:34:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/23/criador-de-virus-que-trocava-arquivos-por-desenhos-e-condenado-no-japao/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/ika-tako2.jpg</image:loc><image:title>ika-tako</image:title><image:caption>Imagem plantada pelo vírus no lugar dos arquivos legítimos. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-07-23T20:45:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/23/senha-fraca-permite-infectar-e-controlar-baterias-de-macbooks-da-apple/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/macbook-pro2.jpg</image:loc><image:title>Macbook Pro (Foto: Divulgação)</image:title><image:caption>Baterias de Macbooks, Macbooks Pro e Macbooks Air têm vulnerabilidade, diz pesquisar. (Foto: Divulgação)</image:caption></image:image><lastmod>2011-07-23T04:15:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/22/anonymous-divulga-documentos-secretos-da-otan/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/anonymous-zg-chamada2.jpg</image:loc><image:title>Anonymous em Zaragoza (Foto: Dani/Flickr/CC-BY)</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/anonymous-zg2.jpg</image:loc><image:title>Anonymous em manifestação pelo Wikileaks</image:title><image:caption>Anonymous em manifestação pelo Wikileaks em Zaragoza, na Espanha. (Foto: Dani/Flickr/CC-BY)</image:caption></image:image><lastmod>2011-07-22T21:14:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/22/nova-versao-do-software-foxit-reader-corrige-duas-vulnerabilidades/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/foxit-reader-logo2.jpg</image:loc><image:title>Leitor de PDF Foxit</image:title><image:caption>Software alternativo ao Adobe Reader teve falhas corrigidas. (Foto: Divulgação)</image:caption></image:image><lastmod>2011-07-22T20:05:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/22/pagina-falsa-da-folha-online-carrega-arquivo-malicioso/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/folha-fake2.jpg</image:loc><image:title>Site falso da Folha Online usado em golpe.</image:title><image:caption>Site falso da Folha Online usado em golpe. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-07-27T13:56:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/21/qual-a-diferenca-entre-windows-32-e-64-bits-como-trocar/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/windows-72.jpg</image:loc><image:title>Windows 7</image:title><image:caption>O Windows XP 64 bits não têm os mesmos recursos que os Windows Vista e 7 64 bits. (Foto: Divulgação)</image:caption></image:image><lastmod>2015-03-23T23:33:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/21/pesquisadores-criam-novo-sistema-de-combate-a-censura-na-internet/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/halderman2.jpg</image:loc><image:title>J. Alex Halderman</image:title><image:caption>J. Alex Halderman, um dos pesquisadores envolvidos no projeto (Foto: Divulgação)</image:caption></image:image><lastmod>2011-07-21T19:25:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/21/falha-no-google-permitia-remover-sites-dos-resultados-de-pesquisa/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/google-flaw-remove-any-site2.jpg</image:loc><image:title>Falha no Google Webmaster Tools</image:title><image:caption>Site removido (canto superior direito) é diferente do site de que está sendo gerenciado (lado esquerdo) (Foto: Reprodução/James Breckenridge)</image:caption></image:image><lastmod>2011-07-21T04:45:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/21/cinco-golpistas-sao-presos-por-fraudes-on-line-no-para/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/operacao-professor-pardal-pa2.jpg</image:loc><image:title>Quadrilha presa no Pará</image:title><image:caption>Quadrilha de criminosos virtuais presa no Pará tinha também armas reais. (Foto: Divulgação/Polícia Civil-PA)</image:caption></image:image><lastmod>2011-07-21T03:38:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/20/google-passa-a-exibir-alerta-para-sistemas-infectados/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/alertagoogle2.jpg</image:loc><image:title>Alerta do Google</image:title></image:image><lastmod>2011-09-11T19:06:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/20/fraude-diz-que-lulzsec-obteve-e-mails-de-namorada-de-dilma/</loc><lastmod>2011-07-20T04:05:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/19/fbi-anuncia-prisao-de-14-hackers-acusados-de-ciberataques/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/chained-keyboard2.jpg</image:loc><image:title>Teclado acorrentado</image:title><image:caption>Prisões estão ligada às ações de simpatizantes do Anonymous. (Foto: Armin Hanisch/SXC)</image:caption></image:image><lastmod>2011-07-20T02:38:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/19/microsoft-vai-barrar-senhas-ruins-do-hotmail/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/hotmail-seguranca2.jpg</image:loc><image:title>Segurança no Hotmail</image:title><image:caption>123456 não será mais permitido como senha nos serviços online do Windows Live. (Foto: Felipe Figueiró/Arte LD)</image:caption></image:image><lastmod>2011-07-20T02:14:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/19/hackers-roubam-milhas-aereas-de-internautas-com-golpes-na-web/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/19-milhaspromocao-3002.jpg</image:loc><image:title>Milhas Promoção</image:title><image:caption>Ofertas de promoção em milhas atraem vítimas para os sites falsos. (Foto: Reprodução)</image:caption></image:image><lastmod>2012-07-18T03:04:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/19/internet-explorer-tem-o-melhor-filtro-contra-pragas-digitais-diz-pesquisa/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/ie-icone2.jpg</image:loc><image:title>Internet Explorer</image:title><image:caption>Teste não considerou vulnerabilidades e sites legítimos contaminados, apenas páginas maliciosas. (Foto: Divulgação)</image:caption></image:image><lastmod>2011-07-19T18:29:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/19/norton-antivir-e-bitdefender-sao-removidos-de-lista-de-downloads/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/norton-websearch1.jpg</image:loc><image:title>Norton Safe Search</image:title><image:caption>Tanta propaganda quanto resultados verdadeiros: um clássico da Ask.com, também com o nome Norton. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-10-24T02:19:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/18/banidos-do-google-membros-do-anonymous-criam-a-anon/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/anonplus2.jpg</image:loc><image:title>AnonPlus</image:title><image:caption>Imagem da página principal do site da AnonPlus. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-07-22T00:20:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/18/falha-que-permitia-execucao-de-programas-no-iphone-e-corrigida-pela-apple/</loc><lastmod>2011-07-18T17:05:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/18/veja-dicas-para-se-proteger-de-virus-e-roubo-de-dados-em-redes-sociais/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/redes-sociais2.jpg</image:loc><image:title>As redes sociais</image:title><image:caption>Redes sociais são hoje os serviços que mais contribuem para a utilidade da internet como meio de comunicação. (Foto: Divulgação)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/redes-sociais-chamada2.jpg</image:loc><image:title>Redes Sociais</image:title><image:caption>Redes Sociais</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/pessoas-juntas2.jpg</image:loc><image:title>Pessoas trabalhando juntas</image:title><image:caption>São as ligações entre as pessoas que tornam uma rede social interessante - a mesma ligação que pode ser aproveitada pelos criminosos. (Foto: Svilen Milev/SXC)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/07/people-computers2.jpg</image:loc><image:title>Pessoas usando computadores</image:title><image:caption>É preciso aprender a usar as redes sociais. (Foto: Gabriella Fabbri/SXC)</image:caption></image:image><lastmod>2013-12-18T17:51:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/18/mozilla-propoe-novo-modelo-de-senha-universal-com-dois-cliques/</loc><lastmod>2011-07-18T15:55:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/07/15/virus-cria-conta-de-usuario-remo-para-dar-acesso-remoto-a-criminosos/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/06/areadetrabalho2.jpg</image:loc><image:title>Área de Trabalho Remota</image:title><image:caption>Falha na Área de Trabalho Remota é grave e pode permitir invasão.. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-07-20T00:54:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/06/09/pagina-da-fabricante-de-antivirus-trend-micro-sofre-ataque/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/06/trendhackmanchete2.jpg</image:loc><image:title>trendhackmanchete</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/06/trendmicrohacked2.gif</image:loc><image:title>trendmicrohacked</image:title><image:caption>Página desfigurada da Trend Micro. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-06-09T13:24:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/06/09/acer-libera-dados-de-40-mil-consumidores-inadvertidamente/</loc><lastmod>2011-06-09T04:29:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/05/20/primeiro-virus-brasileiro-em-64-bits-rouba-senhas-bancarias/</loc><lastmod>2011-05-20T18:28:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/05/18/pesquisador-do-google-critica-grupo-que-teria-descoberto-falha-no-chrome/</loc><lastmod>2011-05-18T06:24:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/05/16/convite-para-festa-depois-de-conferencia-de-seguranca-ou-como-convencer-geeks-a-dancar/</loc><lastmod>2011-05-16T16:02:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/05/09/hackers-chineses-dizem-ter-invadido-rede-eletrica-da-letonia/</loc><lastmod>2011-05-09T20:29:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/05/05/registro-br-responde-a-linha-defensiva-sobre-registro-de-dominios/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/05/nicbr2.png</image:loc><image:title>Registro.br responde à Linha Defensiva sobre registro de domínios</image:title></image:image><lastmod>2011-05-19T16:10:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/05/04/relatorio-aponta-dificuldades-do-fbi-em-investigar-crimes-virtuais/</loc><lastmod>2013-12-18T21:26:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/05/03/jovem-e-preso-por-criar-site-de-comercio-eletronico-fraudulento/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/05/teclado011.jpg</image:loc><image:title>Digitação</image:title><image:caption>(Foto: Divulgação)</image:caption></image:image><lastmod>2011-05-03T20:39:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/05/03/sony-confirma-que-ataque-a-psn-tambem-afetou-outros-servidores/</loc><lastmod>2011-05-03T20:22:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/05/03/antivirus-fraudulento-para-macos-x-diz-que-computador-esta-infectado/</loc><lastmod>2011-05-03T20:18:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/04/27/em-30-minutos-e-sem-pagar-criminoso-pode-registrar-site-no-brasil/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/04/regbr2.jpg</image:loc><image:title>regbr</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/04/detalhebancos2.jpg</image:loc><image:title>detalhebancos</image:title><image:caption>Variações nos nomes de grandes bancos são registradas no Registro.br. No detalhe, alguns dos domínios maliciosos envolvendo o Bradesco. Note que praticamente todos os bancos são alvo de prática semelhante.</image:caption></image:image><lastmod>2011-05-03T18:17:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/04/15/virus-aproveita-tragedia-no-realengo-para-roubar-senhas-bancarias/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/04/bankerrealengo2.png</image:loc><image:title>bankerrealengo</image:title><image:caption>Caixa de download do suposto vídeo.</image:caption></image:image><lastmod>2011-04-27T06:04:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/04/10/veja-como-funcionam-fraudes-pela-internet-e-como-se-proteger/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/04/mousemoney2.jpg</image:loc><image:title>mousemoney</image:title><image:caption>Dinheiro roubado é usado para compras ou sacado por laranjas. (Foto: Divulgação)]</image:caption></image:image><lastmod>2011-04-10T06:10:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/04/10/aplicativo-malicioso-who-views-your-profile-faz-spam-no-facebook/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/04/whoviews2.jpg</image:loc><image:title>whoviews</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/04/virusfb2.jpg</image:loc><image:title>Who views your profile</image:title><image:caption>Aplicativo que instala vírus no Facebook (Foto: LL/LD)</image:caption></image:image><lastmod>2011-04-20T13:55:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/04/09/falha-no-redirecionamento-do-google-pode-levar-a-site-malicioso/</loc><lastmod>2011-04-10T00:17:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/03/30/virus-bloqueia-computador-e-diz-que-usuario-cometeu-crime-na-rede/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/03/ransombrasildesc11.jpg</image:loc><image:title>ransombrasildesc</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/03/ransombrasil1.jpg</image:loc><image:title>ransombrasil</image:title><image:caption>Imagem trava o computador até que o usuário faça uma ligação Premium.</image:caption></image:image><lastmod>2015-01-05T03:01:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/03/29/usuarios-de-rede-social-criam-dia-mundial-do-backup-em-31-de-marco/</loc><lastmod>2011-04-06T04:39:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/03/22/rustock-uma-das-maiores-redes-zumbi-sai-do-ar/</loc><lastmod>2011-03-22T16:34:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/03/01/golpe-copia-pagina-do-teleton-para-roubar-informacoes/</loc><lastmod>2011-03-01T20:09:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/02/28/virus-e-feito-com-programa-sem-licenca-e-nao-roda/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/02/compiler2.jpg</image:loc><image:title>compiler</image:title></image:image><lastmod>2011-03-17T04:37:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/02/26/paginas-clonadas-do-youtube-burlam-seguranca-com-falha-do-stuxnet/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/02/youtube2.jpg</image:loc><image:title>youtube</image:title><image:caption>Foto: Reprodução</image:caption></image:image><lastmod>2011-03-03T01:13:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/02/24/hackers-invadem-twitter-da-bovespa/</loc><lastmod>2011-02-24T20:55:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/02/22/teste-antivirus-falho-e-realizado-por-o-globo-e-clavis/</loc><lastmod>2011-03-09T12:03:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/02/19/linha-defensiva-prioriza-combate-a-proxies-maliciosos-e-phishing/</loc><lastmod>2011-03-02T19:46:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/02/16/general-aposentado-exalta-sucesso-do-stuxnet-diz-jornal-israelense/</loc><lastmod>2011-02-16T15:48:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/02/10/hackers-atacaram-sistemas-de-companhias-de-petroleo-diz-mcafee/</loc><lastmod>2011-02-10T16:59:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/02/10/acao-de-grupo-de-seguranca-da-hp-divulga-brechas-dela-mesma/</loc><lastmod>2011-02-10T04:01:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/02/08/anonymous-invade-empresa-que-conheceria-lideres-do-movimento/</loc><lastmod>2011-02-08T17:38:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/02/07/tjrs-determina-indenizacao-de-r10-mil-por-envio-de-e-mails-constrangedores/</loc><lastmod>2011-02-07T19:55:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/02/03/pegue-um-e-leve-dois-voce-sabe-o-que-esta-instalando-no-pc/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/02/foxit-reader-instalacao2.jpg</image:loc><image:title>foxit-reader-instalacao</image:title><image:caption>Opções de instalação da Ask no Foxit Reader são confusas.</image:caption></image:image><lastmod>2014-12-25T23:19:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/02/01/microsoft-alerta-para-falha-de-xss-dentro-do-internet-explorer/</loc><lastmod>2011-02-01T20:10:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/02/01/microsoft-altera-texto-que-garantia-100-de-eficiencia-do-antivirus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/02/01-msse100-6202.jpg</image:loc><image:title>01-msse100-620</image:title><image:caption>Cabeçalho da página do Security Essentials no Brasil.</image:caption></image:image><lastmod>2011-02-01T20:07:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/01/31/ministerio-do-trabalho-tem-nova-falha-que-exibe-dados-a-partir-do-cpf/</loc><lastmod>2011-01-31T04:42:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/01/29/seis-anos-de-linha-defensiva/</loc><lastmod>2011-08-13T19:27:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/01/26/lg-vaza-nome-telefone-e-endereco-de-71-mil-clientes-em-site/</loc><lastmod>2011-01-26T18:25:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/01/25/responsavel-por-desenvolvimento-de-linux-popular-tem-conta-invadida/</loc><lastmod>2011-01-25T22:09:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/01/25/ministerio-publico-investiga-lojas-online-que-nao-entregavam-produtos/</loc><lastmod>2017-08-04T23:30:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/01/24/mozilla-propoe-novo-metodo-para-barrar-rastreamento-do-internauta/</loc><lastmod>2011-01-25T02:10:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/01/24/virus-multiplataforma-infecta-mais-macs-que-windows-vista-e-7/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/01/virusosx1.jpg</image:loc><image:title>virusosx</image:title><image:caption>Macs são 16% das vítimas do Vírus, enquanto Vista e 7 somam apenas 9%. (Foto: Symantec)</image:caption></image:image><lastmod>2011-01-25T01:55:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/01/24/microsoft-oferece-smartphone-a-hacker-do-playstation-3/</loc><lastmod>2011-01-25T01:49:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/01/18/problemas-com-apps-maliciosos-no-orkut-continuam/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/01/orkut2recado1.gif</image:loc><image:title>orkut2recado</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/01/orkut1atualiza2.gif</image:loc><image:title>orkut1atualiza</image:title></image:image><lastmod>2012-04-19T17:22:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/01/11/nao-existe-neutralidade-da-rede/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2011/01/map-world-coral2.png</image:loc><image:title>map-world-coral</image:title><image:caption>Localização geográfica dos servidores da Coral</image:caption></image:image><lastmod>2011-01-11T13:59:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2011/01/08/retrospectiva-2010-direito-e-tecnologia/</loc><lastmod>2011-01-08T22:52:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/12/21/equipe-do-orkut-nao-ve-malicia-em-comunidades-de-phishing/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/12/orkutresposta2.jpg</image:loc><image:title>Resposta do Orkut</image:title><image:caption>Orkut diz comunidade de phishing não apresenta conteúdo malicioso. (Foto: Reprodução)</image:caption></image:image><lastmod>2011-08-27T17:02:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/12/15/microsoft-elimina-40-brechas-na-ultima-atualizacao-de-2010/</loc><lastmod>2010-12-16T01:40:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/12/13/falta-anonimato-nos-ataques-do-anonymous/</loc><lastmod>2012-03-11T21:20:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/12/12/site-mundo-canibal-do-uol-e-comprometido-por-codigo-malicioso/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/12/cert_override2.png</image:loc><image:title>Arquivo de certificados do Firefox</image:title><image:caption>Certificados falsificados para sites de bancos no Firefox.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/12/alerta2.png</image:loc><image:title>Execução Java</image:title><image:caption>A mensagem de alerta do Java, solicitando permissão para executar o vírus.</image:caption></image:image><lastmod>2010-12-12T12:23:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/12/10/assistentes-da-linha-defensiva-ja-cuidaram-de-22-mil-computadores/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/12/gleobas12.jpg</image:loc><image:title>Guilherme Leobas</image:title><image:caption>O treinamento de Guilherme Leobas durou dois anos. Ele é agora o mais novo membro da equipe.</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/12/gleobas2.jpg</image:loc><image:title>Guilherme Leobas</image:title><image:caption>O assistente recém-"formado" Guilherme Leobas.</image:caption></image:image><lastmod>2010-12-11T00:46:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/12/02/fraude-usa-falsa-prisao-de-hacker-que-atacou-wikileaks-para-pedir-doacoes/</loc><lastmod>2010-12-02T20:03:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/25/zeus-pcs-lentos-antianalise/</loc><lastmod>2010-11-25T22:15:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/25/safernet-divulga-contestacao-a-parecer-do-mpf-sp/</loc><lastmod>2010-11-25T16:23:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/22/virus-e-antivirus-comecam-a-aparecer-para-macos-x/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/11/gmailclone2.jpg</image:loc><image:title>Página falsa do Gmail</image:title><image:caption>A página falsa realiza a checagem das informações fornecidas.</image:caption></image:image><lastmod>2010-12-05T21:32:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/22/phishing-de-gmail-ameaca-usuario-com-cancelamento-da-conta/</loc><lastmod>2010-11-22T18:28:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/20/projeto-de-lei-americano-pode-derrubar-sites-sem-comprovacao/</loc><lastmod>2010-11-20T20:48:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/19/ser-ou-nao-ser-um-koobface-eis-a-questao/</loc><lastmod>2010-11-19T23:28:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/19/fora-de-moda-virus-brasileiro-oferece-desinstalacao-propria/</loc><lastmod>2010-11-19T19:57:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/18/caso-de-estupro-envolvendo-fundador-do-wikileaks-e-reaberto-na-suecia/</loc><lastmod>2010-11-18T20:29:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/18/comissao-dos-eua-aponta-que-china-teria-redirecionado-trafego-na-internet/</loc><lastmod>2013-12-18T21:28:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/18/paginas-alteradas-e-redirecionadas-com-alteracao-de-dns/</loc><lastmod>2010-11-18T14:47:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/17/em-acordo-da-safernet-com-mpf-am-cooperacao-de-denuncias-e-descartada/</loc><lastmod>2010-11-17T16:52:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/17/redes-sociais-precisam-criar-meios-seguros-de-comunicacao/</loc><lastmod>2010-11-17T05:12:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/14/ex-diretor-da-safernet-atesta-parecer-de-inoperancia-da-ong/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/11/thiagotavares2.jpg</image:loc><image:title>thiagotavares</image:title><image:caption>abcd</image:caption></image:image><lastmod>2010-11-15T11:53:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/14/comunidades-no-orkut-roubam-dados-prometendo-versao-3d-do-site/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/11/orkutcomu2.jpg</image:loc><image:title>orkutcomu</image:title></image:image><lastmod>2010-11-15T16:33:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/11/virus-de-fraude-bancaria-e-distribuido-por-sms/</loc><lastmod>2010-11-11T21:34:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/09/tecnicos-cobram-us-160-mil-por-mes-de-musico-por-causa-de-virus/</loc><lastmod>2010-11-09T19:32:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/09/divisao-cibernetica-do-exercito-dos-eua-entra-em-operacao-plena/</loc><lastmod>2010-11-09T05:53:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/08/hacker-diz-ter-roubado-150-mil-senhas-do-orkut-via-app-malicioso/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/11/orkutcadastro2.png</image:loc><image:title>orkutcadastro</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/11/img22.png</image:loc><image:title>img2</image:title></image:image><lastmod>2010-12-21T22:33:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/05/flash-recebe-correcao-para-eliminar-brecha-gravissima/</loc><lastmod>2010-11-05T20:53:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/05/golpista-usa-virus-para-vigiar-vitimas-e-obter-fotos-explicitas/</loc><lastmod>2010-11-05T18:01:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/04/sophos-cria-antivirus-gratuito-para-mac/</loc><lastmod>2010-11-04T14:48:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/03/identificadores-unicos-de-usuarios-do-facebook-foram-vendidos/</loc><lastmod>2010-11-03T20:31:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/03/sistemas-de-controles-industriais-estao-abertos-na-internet-diz-eua/</loc><lastmod>2010-11-03T19:06:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/03/google-expande-programa-de-recompensas-por-falhas/</loc><lastmod>2010-11-03T19:03:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/03/mulher-deve-ser-processada-por-post-preconceituoso-no-twitter-diz-oabpe/</loc><lastmod>2010-11-03T18:46:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/03/brecha-dia-zero-atinge-internet-explorer-6-7-e-8/</loc><lastmod>2010-11-03T18:03:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/11/01/firesheep-roubando-contas-de-facebook-e-twitter-em-redes-abertas/</loc><lastmod>2010-11-01T16:50:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/10/29/duvida-como-descobrir-o-dono-nome-da-pessoa-e-cidade-de-um-ip/</loc><lastmod>2014-01-20T23:11:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/10/29/mozilla-firefox-recebe-atualizacao-de-seguranca/</loc><lastmod>2010-10-29T19:22:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/10/28/reader-e-flash-tem-brecha-explorada-na-web-alerta-adobe/</loc><lastmod>2010-10-28T23:34:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/10/28/segunda-edicao-do-appsec-brasil-ocorre-em-novembro/</loc><lastmod>2010-10-28T18:28:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/10/28/encontrado-virus-que-usa-java-para-atacar-mac-linux-e-windows/</loc><lastmod>2010-10-28T16:54:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/10/15/golpe-usa-mineiros-chilenos-como-isca-para-disseminar-virus/</loc><lastmod>2010-10-15T16:19:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/10/06/criminosos-envolvidos-no-roubo-de-mais-de-us-10-milhoes-pela-web-sao-presos/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/10/smb2_01.jpg</image:loc><image:title>smb2_0</image:title></image:image><lastmod>2010-10-06T23:42:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/10/01/ataques-forcam-microsoft-a-corrigir-falha-no-aspnet/</loc><lastmod>2010-10-01T07:40:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/09/26/linha-defensiva-abre-excecao-em-politica-editorial-de-seguranca-para-o-google/</loc><lastmod>2013-06-24T17:32:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/09/26/falha-no-youtube-permite-alteracao-de-titulos-de-videos/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/09/youtubetitulo1.jpg</image:loc><image:title>youtubetitulo</image:title></image:image><lastmod>2010-09-27T03:28:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/09/26/adobe-atualiza-flash-player-para-corrigir-vulnerabilidade/</loc><lastmod>2010-09-26T22:49:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/09/26/wtf-worm-se-espalha-pelo-twitter/</loc><lastmod>2010-09-26T19:17:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/09/25/virus-de-orkut-infecta-180-mil-perfis-em-11-horas/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/09/orkutcomu12.jpg</image:loc><image:title>orkutcomu1</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/09/orkutcomu3.jpg</image:loc><image:title>orkutcomu</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/09/bandeirascrap2.jpg</image:loc><image:title>bandeirascrap</image:title></image:image><lastmod>2010-11-08T03:07:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/09/21/atualizacoes-da-microsoft-corrigem-11-falhas-de-seguranca/</loc><lastmod>2010-09-21T15:44:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/09/21/virus-usa-erro-em-links-do-twitter-para-se-espalhar-automaticamente/</loc><lastmod>2010-09-21T15:11:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/09/15/o-antivirus-a-camisinha-e-o-atrito/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/09/15-vacina-3002.jpg</image:loc><image:title>15-vacina-300</image:title></image:image><lastmod>2010-10-13T17:02:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/09/15/aplicativos-contem-falha-tambem-ao-carregar-arquivos-exe/</loc><lastmod>2010-09-15T14:58:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/09/15/adobe-alerta-sobre-vulnerabilidade-na-versao-mais-recente-do-reader/</loc><lastmod>2010-09-15T18:13:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/09/09/o-continuo-fracasso-na-protecao-de-dados-parte-2/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/09/img12.png</image:loc><image:title>Informações bancárias</image:title><image:caption>Informação bancária obtida através do mecanismo de busca</image:caption></image:image><lastmod>2010-09-09T19:41:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/09/07/virus-se-espalham-pelo-twitter/</loc><lastmod>2010-09-13T18:08:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/09/06/criminoso-conversa-com-analista-da-linha-defensiva-durante-analise-de-virus/</loc><lastmod>2012-10-29T19:33:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/09/03/rootkit-ataca-windows-de-64-bits-pela-primeira-vez/</loc><lastmod>2010-09-03T13:14:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/08/27/mais-aplicativos-contendo-falha-no-carregamento-dll-sao-identificados/</loc><lastmod>2010-08-31T22:02:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/08/26/comportamento-do-windows-cria-falha-em-mais-de-40-aplicativos/</loc><lastmod>2010-08-26T15:30:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/08/23/trojan-pode-ter-contribuido-comqueda-de-um-aviao-na-espanha/</loc><lastmod>2012-07-14T14:53:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/08/18/criminosos-criam-site-falso-do-the-pirate-bay-para-disseminar-spyware/</loc><lastmod>2010-08-18T17:19:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/08/16/virus-causa-prejuizo-de-u15-milhao-a-instituicao-financeira-inglesa/</loc><lastmod>2010-08-16T13:33:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/08/14/russo-acusado-de-roubar-cartoes-de-credito-e-preso-na-franca/</loc><lastmod>2010-08-14T17:10:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/08/12/o-continuo-fracasso-na-protecao-de-dados/</loc><lastmod>2010-08-17T15:33:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/08/12/vitima-de-fraude-online-saiba-o-que-fazer/</loc><lastmod>2018-03-14T13:41:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/08/10/suposto-crack-para-o-firefox-4-instala-cavalo-de-troia/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/08/firefox4_scam1.png</image:loc><image:title>firefox4_scam</image:title></image:image><lastmod>2010-08-15T00:05:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/08/08/pesquisa-mostra-que-antivirus-demoram-a-combater-pragas-novas/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/08/timer2.jpg</image:loc><image:title>timer</image:title></image:image><lastmod>2010-08-19T03:09:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/08/05/editor-do-linha-defensiva-colabora-com-reportagem-do-fantastico/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2010/08/altieres-fantastico2.jpg</image:loc><image:title>altieres-fantastico</image:title></image:image><lastmod>2010-08-08T02:34:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/04/10/funcionario-do-bank-of-america-instala-virus-em-caixas-eletronicos/</loc><lastmod>2010-04-22T17:35:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/02/17/google-buzz-falhas-de-seguranca-e-privacidade/</loc><lastmod>2010-02-17T17:15:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/01/16/ja-ha-scareware-relacionado-ao-terremoto-no-haiti/</loc><lastmod>2010-01-16T22:47:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/01/12/brian-krebs-competencia-nem-sempre-salva/</loc><lastmod>2010-01-13T20:52:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2010/01/09/pendrives-com-criptografia-por-hardware-sao-crackeados/</loc><lastmod>2010-03-18T13:47:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/12/11/site-da-nasa-e-invadido/</loc><lastmod>2010-05-02T21:20:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/12/02/brecha-no-freebsd-permite-a-terceiros-privilegios-de-administrador/</loc><lastmod>2009-12-03T02:20:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/12/02/falha-no-internet-explorer-8-torna-vulneraveis-paginas-antes-seguras/</loc><lastmod>2009-12-03T02:18:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/11/24/microsoft-alerta-para-falha-no-chrome-frame/</loc><lastmod>2009-11-25T02:39:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/11/24/firefox-36-bloqueia-instalacao-direta-de-plugins/</loc><lastmod>2009-11-25T02:38:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/11/18/falso-video-da-estudante-geisy-traz-cavalo-de-troia/</loc><lastmod>2009-11-19T02:25:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/11/12/encontrado-primeiro-virus-para-iphone/</loc><lastmod>2009-11-14T03:50:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/11/06/windows-vista-sofre-62-menos-infeccoes-que-o-xp/</loc><lastmod>2009-11-13T13:41:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/11/06/garoto-de-17-anos-cria-ransomware-para-iphone/</loc><lastmod>2009-11-06T10:53:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/10/30/malware-criptografa-arquivos-e-cobra-resgate-de-100-dolares/</loc><lastmod>2013-07-25T00:47:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/10/24/antivirus-gratuito-da-microsoft-pode-ficar-ate-uma-semana-sem-atualizar-assinaturas/</loc><lastmod>2009-10-30T22:46:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/10/23/parana-e-o-terceiro-estado-a-monitorar-cibercafes/</loc><lastmod>2009-10-23T23:53:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/10/21/conversas-pelo-google-voice-ficam-acessiveis-pela-pesquisa-do-google/</loc><lastmod>2009-10-21T19:03:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/10/20/lancado-avg-free-9/</loc><lastmod>2009-10-23T01:23:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/10/14/discador-do-ig-e-substituido-por-arquivo-com-ladrao-de-senhas/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/10/igtrojan2.png</image:loc><image:title>igtrojan</image:title></image:image><lastmod>2009-10-14T06:03:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/10/10/vazadas-30-mil-contas-de-usuario-do-msn-hotmail-yahoo-e-aol/</loc><lastmod>2009-10-28T14:42:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/10/05/software-de-seguranca-da-microsoft-detecta-98-dos-malwares/</loc><lastmod>2009-10-21T14:41:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/10/02/o-preco-do-inexistente-virus-de-mac/</loc><lastmod>2009-12-10T00:58:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/09/30/como-funcionam-as-infeccoes-por-applets-java/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/09/javaprpt2.jpg</image:loc><image:title>Java Prompt</image:title><image:caption>Tela de prompt do Java para execução de aplicativo malicioso.</image:caption></image:image><lastmod>2009-09-30T06:07:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/09/30/criminosos-pagam-comissao-por-macs-infectados/</loc><lastmod>2009-10-16T01:08:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/09/27/a-era-dos-grandes-worms-acabou/</loc><lastmod>2009-10-20T12:35:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/09/25/agencias-de-propaganda-online-sao-inflitrados-por-virus/</loc><lastmod>2009-09-25T22:41:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/09/18/decisao-paranaense-sobre-p2p-e-inocua-e-incoerente/</loc><lastmod>2013-06-19T20:25:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/09/17/lancado-google-chrome-30/</loc><lastmod>2009-09-17T03:22:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/09/15/justica-paranaense-considera-programas-p2p-ilegais/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/09/google2.jpg</image:loc><image:title>google</image:title><image:caption>Google (Reprodução)</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/09/cadari-iplay2.jpg</image:loc><image:title>cadari-iplay</image:title></image:image><lastmod>2009-10-30T22:52:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/09/15/rede-zumbi-linux-distribui-malware-para-computadores-com-windows/</loc><lastmod>2009-09-23T15:45:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/09/11/atualizacao-do-mac-osx-corrige-33-falhas-de-seguranca/</loc><lastmod>2009-09-11T03:20:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/09/11/encontrada-vulnerabilidade-no-protocolo-de-compartilhamento-do-windows-vista/</loc><lastmod>2009-09-14T15:22:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/09/06/induc-quando-programadores-de-virus-sao-infectados/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/09/black_ice2.jpg</image:loc><image:title>black_ice</image:title></image:image><lastmod>2009-09-06T20:54:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/09/04/falha-no-iis-do-windows-usado-em-ataques/</loc><lastmod>2009-09-04T22:18:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/09/04/malware-para-firefox-se-disfarca-como-update-do-flash-player/</loc><lastmod>2009-09-16T23:47:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/09/04/microsoft-ira-exigir-atualizacao-do-live-messenger/</loc><lastmod>2009-11-26T15:45:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/08/30/conheca-o-trabalho-dos-voluntarios-do-aris-ld/</loc><lastmod>2009-09-01T17:23:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/08/28/equipamentos-de-rede-sem-fio-da-cisco-em-risco-de-skyjacking/</loc><lastmod>2009-08-29T00:51:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/08/28/criminosos-brasileiros-usam-twitter-para-comandar-roubo-de-informacoes-bancarias/</loc><lastmod>2009-08-29T00:46:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/08/28/relatorio-da-ibm-mostra-aumento-de-sites-confiaveis-hospedando-malware/</loc><lastmod>2009-08-29T00:44:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/08/28/nova-versao-do-mac-os-x-inclui-antivirus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/08/snowav2.jpg</image:loc><image:title>snowav</image:title></image:image><lastmod>2009-08-29T00:36:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/08/28/atualizacao-corrige-vulnerabilidades-graves-no-google-chrome/</loc><lastmod>2009-08-29T00:59:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/07/24/bankerfix-31-e-lancado-para-eliminar-proxies-maliciosos/</loc><lastmod>2009-08-24T12:35:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/07/24/criminosos-brasileiros-criam-proxies-maliciosos/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/07/pacff2.png</image:loc><image:title>pacff</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/07/pac32.png</image:loc><image:title>pac3</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/07/pacie12.png</image:loc><image:title>pacie1</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/10/bradesco2.jpg</image:loc><image:title>bradesco</image:title></image:image><lastmod>2012-06-11T23:26:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/07/17/descoberta-primeira-vulnerabilidade-no-firefox-35/</loc><lastmod>2009-07-22T13:04:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/07/12/imageshack-e-invadido-por-grupo-antisseguranca/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/07/imageshackhack2.gif</image:loc><image:title>imageshackhack</image:title></image:image><lastmod>2009-07-13T01:31:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/07/12/computadores-usados-em-ataques-dos-podem-ter-perdas-de-dados/</loc><lastmod>2009-07-13T01:05:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/07/10/virus-brasileiros-brigam-pela-exclusividade-da-vitima/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/07/briga2.png</image:loc><image:title>briga</image:title></image:image><lastmod>2009-08-29T22:31:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/07/07/virus-especializado-em-redes-sociais-ataca-twitter/</loc><lastmod>2009-07-08T02:23:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/07/07/ataques-no-twitter-roubam-credenciais-de-acesso/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/07/phishing2.png</image:loc><image:title>phishing</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/emoticoncards22.jpg</image:loc><image:title>emoticoncards2</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/emoticoncards3.jpg</image:loc><image:title>emoticoncards</image:title></image:image><lastmod>2009-07-13T21:11:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/07/03/mozilla-lanca-firefox-35/</loc><lastmod>2009-07-04T00:18:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/06/14/beta-de-antivirus-gratis-da-microsoft-deve-chegar-em-breve/</loc><lastmod>2009-06-22T21:58:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/06/09/apple-corrige-mais-de-50-falhas-no-navegador-safari/</loc><lastmod>2009-06-22T22:18:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/06/05/governo-dos-eua-derruba-provedor-que-colaborava-com-criminosos/</loc><lastmod>2009-06-05T07:16:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/06/03/criminosos-criam-golpe-usando-voo-af-447/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/06/fraudeaf4472.jpg</image:loc><image:title>Mensagem fraudulenta sobre o voo AF 447</image:title><image:caption>Mensagem fraudulenta sobre o voo AF 447</image:caption></image:image><lastmod>2009-06-10T12:07:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/29/90-dos-emails-enviados-sao-spam-diz-symantec/</loc><lastmod>2009-05-29T08:09:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/26/criminosos-usam-nova-tecnica-para-camuflar-enderecos/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/05/phishing12.jpeg</image:loc><image:title>phishing1</image:title></image:image><lastmod>2009-07-22T20:50:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/26/fbi-e-atingido-por-virus-e-desconecta-sua-rede/</loc><lastmod>2009-06-27T15:04:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/19/pagina-de-torpedos-web-da-oi-e-invadida-para-distribuir-virus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/05/hosts11.jpeg</image:loc><image:title>hosts1</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/05/oi2.jpeg</image:loc><image:title>oi</image:title></image:image><lastmod>2009-06-04T16:23:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/18/iphone-tera-softwares-de-seguranca/</loc><lastmod>2009-05-21T17:38:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/17/praga-brasileira-rouba-senhas-de-bancos-espanhois/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/05/hosts2.jpeg</image:loc><image:title>hosts</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/05/phishing2.jpeg</image:loc><image:title>phishing</image:title></image:image><lastmod>2009-09-22T04:41:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/16/o-retrocesso-na-validacao-dos-usuarios-no-orkut-e-no-twitter/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/05/orkutbot2.jpg</image:loc><image:title>orkutbot</image:title></image:image><lastmod>2009-06-10T14:07:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/13/antivirus-fraudulentos-ficam-mais-agressivos/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/05/fakealert2.jpg</image:loc><image:title>fakealert</image:title></image:image><lastmod>2009-05-14T00:31:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/13/sites-falsos-usam-nome-da-vivo-para-disseminar-trojan/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/05/vivo2.jpeg</image:loc><image:title>vivo</image:title></image:image><lastmod>2009-06-29T00:34:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/08/virus-para-macos-x-tenta-se-espalhar-por-e-mail/</loc><lastmod>2009-05-09T23:21:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/07/site-da-mcafee-teve-falhas-criticas-de-seguranca/</loc><lastmod>2009-05-07T21:59:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/07/indiano-disponibiliza-ferramenta-para-invadir-facebook/</loc><lastmod>2013-02-12T23:29:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/04/spam-brasileiro-sobre-gripe-suina-dissemina-codigo-malicioso/</loc><lastmod>2009-05-04T03:30:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/02/antivirus-fraudulento-brasileiro-sequestra-sistema/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/05/img12.jpg</image:loc><image:title>img1</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/05/site2.jpg</image:loc><image:title>site</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/05/erro2.jpg</image:loc><image:title>erro</image:title></image:image><lastmod>2009-08-14T01:19:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/05/01/twitter-e-invadido-por-hacker-frances/</loc><lastmod>2009-05-06T16:26:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/04/29/firefox-35-beta-4-traz-modo-privado-de-navegacao/</loc><lastmod>2009-04-29T21:06:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/04/29/gripe-suina-e-explorada-por-spammers/</loc><lastmod>2009-04-29T20:57:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/04/24/zango-vai-a-falencia-e-e-comprada-por-site-de-videos/</loc><lastmod>2009-05-05T13:54:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/04/22/atualizacao-do-firefox-corrige-doze-falhas/</loc><lastmod>2009-04-23T02:06:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/04/21/entrevista-com-julio-canto-do-virustotalcom/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/04/juliocanto2.jpg</image:loc><image:title>juliocanto</image:title></image:image><lastmod>2012-03-05T21:17:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/03/16/microsoft-elimina-oito-brechas-no-windows/</loc><lastmod>2009-04-16T17:55:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/02/12/microsoft-corrige-8-brechas-de-seguranca-em-pacote-de-fevereiro/</loc><lastmod>2013-12-18T21:32:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/02/03/site-de-associacao-antipirataria-e-redirecionado-ao-mininova/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/02/apcm-vivadownloads2.jpg</image:loc><image:title>apcm-vivadownloads</image:title></image:image><lastmod>2009-03-04T15:13:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/faq/linux/</loc><lastmod>2009-02-03T03:09:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/2009/01/30/praga-remove-bankerfix-e-outros-softwares-de-seguranca/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/01/pragaremovebankerfix2.jpeg</image:loc><image:title>pragaremovebankerfix</image:title></image:image><lastmod>2009-04-09T02:18:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/01/23/sim-existem-virus-para-mac/</loc><lastmod>2009-04-30T02:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/01/22/copias-piratas-do-iwork-trazem-cavalo-de-troia-para-mac-os-x/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/01/iwork-infectado2.png</image:loc><image:title>iwork-infectado</image:title></image:image><lastmod>2009-02-05T13:02:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/01/22/trojan-rouba-senhas-de-empresas-de-hospedagem-e-infoseg/</loc><lastmod>2009-02-15T22:13:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/01/14/microsoft-corrige-brechas-no-compartilhamento-de-arquivos/</loc><lastmod>2009-01-14T09:03:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/01/08/ssl-quao-ruim-uma-ac-pode-ser/</loc><lastmod>2009-01-11T09:24:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2009/01/02/o-dia-em-que-o-zune-morreu/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2009/01/zune2.jpg</image:loc><image:title>zune</image:title></image:image><lastmod>2016-10-17T17:03:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/12/26/praga-digital-bloqueia-acesso-a-linha-defensiva/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/12/tdss2.jpg</image:loc><image:title>TDSS Rootkit</image:title><image:caption>Clique para ampliar</image:caption></image:image><lastmod>2008-12-26T19:35:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/12/24/maior-site-de-combate-a-malwares-castlecops-fecha-as-portas/</loc><lastmod>2008-12-27T21:39:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/12/14/e-mail-da-net-tenta-educar-usuarios-mas-da-mau-exemplo/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/12/netvirus2.jpg</image:loc><image:title>netvirus</image:title></image:image><lastmod>2013-11-22T21:43:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/12/11/divulgadas-brechas-dia-zero-no-wordpad-e-no-sql-server/</loc><lastmod>2008-12-11T22:40:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/12/11/criminosos-utilizam-brecha-dia-zero-no-internet-explorer/</loc><lastmod>2008-12-11T22:25:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/12/11/microsoft-corrige-28-brechas-de-seguranca/</loc><lastmod>2008-12-11T19:33:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/12/07/linha-defensiva-participou-do-disi-2008/</loc><lastmod>2008-12-07T07:04:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/11/13/microsoft-corrige-duas-falhas-publicamente-conhecidas/</loc><lastmod>2008-11-13T05:23:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/10/31/jovem-pan-fm-deixa-vazar-lista-com-21694-enderecos-de-e-mail/</loc><lastmod>2008-11-10T21:06:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/10/28/criado-codigo-clique-e-invada-para-brecha-critica-ms08-067/</loc><lastmod>2009-01-12T17:22:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/10/27/editor-da-linha-defensiva-ganha-coluna-no-g1/</loc><lastmod>2008-11-12T21:41:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/10/24/microsoft-lanca-patch-critico-em-regime-de-urgencia/</loc><lastmod>2008-10-24T05:50:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/10/21/suicos-capturam-digitacao-a-20-metros-de-distancia/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/10/captura-teclado2.jpg</image:loc><image:title>captura-teclado</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/10/tempest1.jpg</image:loc><image:title>tempest</image:title></image:image><lastmod>2008-10-23T19:20:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/10/20/google-imagens-ofusca-links-trojans/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/10/googleimagens1.jpg</image:loc><image:title>googleimagens</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/10/googleimagens2.png</image:loc><image:title>googleimagens</image:title></image:image><lastmod>2008-11-12T14:22:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/10/17/msp-out-08/</loc><lastmod>2008-10-17T09:49:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/10/16/falso-alerta-usa-nome-da-linha-defensiva-para-enganar-usuarios/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/10/falsold1.jpg</image:loc><image:title>falsold</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/08/bb2.jpg</image:loc><image:title>bb</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/08/bradesco2.jpg</image:loc><image:title>bradesco</image:title></image:image><lastmod>2008-10-17T07:16:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/09/21/palin-perguntas-secretas/</loc><lastmod>2008-09-26T04:28:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/09/15/desenvolvedor-do-zone-alarm-desaconselha-uso-da-versao-80/</loc><lastmod>2008-09-16T01:18:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/09/15/onu-discute-proposta-para-acabar-com-o-anonimato-na-rede-diz-site/</loc><lastmod>2008-09-15T22:40:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/09/13/criminosos-virtuais-atacam-lhc/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/09/gst-completo2.jpg</image:loc><image:title>gst-completo</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/09/gst-cabecalho1.jpg</image:loc><image:title>gst-cabecalho</image:title></image:image><lastmod>2008-09-13T09:47:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/09/11/sob-pressao-provedores-de-criminosos-comecam-a-desativar-sites-infectados/</loc><lastmod>2008-09-11T11:22:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/09/11/msp-set-08/</loc><lastmod>2008-09-11T06:19:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/09/09/ritual-protege-eletronicos-contra-virus-no-japao/</loc><lastmod>2008-09-09T08:39:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/09/09/trend-micro-admite-que-atualizacao-apagou-arquivos-do-windows/</loc><lastmod>2008-09-09T22:39:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/09/06/twitter-linhadefensiva/</loc><lastmod>2008-09-06T06:05:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/09/05/linha-defensiva-lanca-bankerfix-30/</loc><lastmod>2008-12-11T22:35:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/08/13/msp-ago-08/</loc><lastmod>2008-08-13T07:50:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/07/30/linha-defensiva-para-coleta-de-estatisticas/</loc><lastmod>2008-08-09T04:17:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/07/30/o-projeto-do-senador-azeredo-e-a-matematica-da-abranet/</loc><lastmod>2008-10-17T15:17:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/07/30/ed-foster-eff/</loc><lastmod>2008-07-30T19:19:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/07/30/att-dns-google-redirecionando-moore/</loc><lastmod>2008-07-30T19:07:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/07/29/bradesco-pesquisa-inst-xss/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/07/xssbradesco2.png</image:loc><image:title>xssbradesco</image:title></image:image><lastmod>2013-11-08T22:11:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/07/28/dicas-para-melhorar-a-seguranca-do-wordpress/</loc><lastmod>2008-07-28T19:06:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/07/26/wordpress-e-quicktime-sao-nomeados-para-a-pwnie-awards/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/07/pwnie2.jpg</image:loc><image:title>pwnie</image:title></image:image><lastmod>2008-07-26T05:22:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/07/26/malware-brasileiro-remove-com-sucesso-plugins-de-internet-banking/</loc><lastmod>2008-07-28T23:22:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/07/25/falso-site-engana-clientes-de-cartao-de-credito/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/07/visa2.png</image:loc><image:title>visa</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/07/visa2.jpg</image:loc><image:title>visa</image:title></image:image><lastmod>2008-07-25T23:51:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/07/24/disponibilizado-codigo-que-aproveita-problema-no-dns/</loc><lastmod>2008-07-24T08:17:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/07/22/texto-publicado-por-engano-revela-detalhes-da-misteriosa-brecha-no-dns/</loc><lastmod>2008-07-22T17:43:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/aris-ld/</loc><lastmod>2008-07-09T08:24:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/2008/07/09/msp-jul-08/</loc><lastmod>2008-07-09T06:41:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/07/07/msp-jun-08/</loc><lastmod>2008-07-07T08:26:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/07/06/japoneses-terao-limite-diario-de-30gb-de-upload/</loc><lastmod>2008-07-23T13:26:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/06/30/vale-compras-do-o-boticario/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/06/boticario2.jpg</image:loc><image:title>boticario</image:title></image:image><lastmod>2015-10-16T14:16:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/06/30/intimacao-para-procedimento-investigatorio/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/06/captura_da_tela2.jpg</image:loc><image:title>captura_da_tela</image:title></image:image><lastmod>2017-06-28T14:18:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/06/30/microsoft-lanca-kit-para-corrigir-ataques-de-sql-injection/</loc><lastmod>2015-11-17T12:38:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/06/30/falso-concurso-da-petrobras/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/06/petrobras2.jpg</image:loc><image:title>petrobras</image:title></image:image><lastmod>2008-06-30T23:50:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/06/06/impressora-foi-acusada-de-baixar-filme-do-indiana-jones/</loc><lastmod>2008-07-06T02:40:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/05/29/flash-symantec-nao/</loc><lastmod>2008-05-29T20:22:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/05/28/flash-dia-zero-symantec/</loc><lastmod>2008-05-28T19:05:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/05/23/linha-defensiva-ganha-novos-recursos/</loc><lastmod>2008-07-07T23:30:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/05/23/ataques-de-sql-injection-atingem-sites-brasileiros/</loc><lastmod>2008-07-23T14:30:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/05/23/falso-email-policia-federal/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/captura_da_tela-12.png</image:loc><image:title>CrimePF</image:title><image:caption>Screenshot do falso e-mail</image:caption></image:image><lastmod>2015-02-25T21:04:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/05/20/top-abr-08/</loc><lastmod>2008-05-20T10:26:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/05/19/links-maliciosos-no-twitter/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/twitter-recado2.png</image:loc><image:title>twitter-recado</image:title><image:caption>Twitter malicioso</image:caption></image:image><lastmod>2008-05-19T23:06:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/05/15/mcafee-secure/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/siteblindado-21.jpg</image:loc><image:title>siteblindado-2</image:title><image:caption>Parece que não</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/siteblindado-12.jpg</image:loc><image:title>siteblindado-1</image:title><image:caption>Site blindado?</image:caption></image:image><lastmod>2008-05-22T21:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/05/14/msp-mai-08/</loc><lastmod>2008-05-14T23:39:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/anuncie/</loc><lastmod>2008-05-06T06:19:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/encaminhe-suspeito/</loc><lastmod>2008-05-06T06:19:21+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/boletim/</loc><lastmod>2008-05-06T06:18:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/homepage-reset/</loc><lastmod>2008-05-06T06:12:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/remocao-de-virus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/cadastroforum2.jpg</image:loc><image:title>Cadastro Fórum</image:title><image:caption>Cadastro no fórum da Linha Defensiva</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/run_as_adm12.png</image:loc><image:title>run_as_adm1</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/anexold2.jpg</image:loc><image:title>Anexos LD</image:title><image:caption>Área para anexo de arquivos</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/responder2.png</image:loc><image:title>responder</image:title><image:caption>Responder</image:caption></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/novotopico2.png</image:loc><image:title>novotopico</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2008/05/cadastre-se2.png</image:loc><image:title>cadastre-se</image:title></image:image><lastmod>2008-05-06T06:12:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/asap/</loc><lastmod>2008-05-06T06:08:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/faq/internet-invasao/</loc><lastmod>2008-05-06T06:07:12+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/faq/virus/</loc><lastmod>2008-05-06T06:05:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/faq/antivirus-antispyware/</loc><lastmod>2008-05-06T06:05:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/faq/estatisticas/</loc><lastmod>2008-05-06T06:04:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/faq/</loc><lastmod>2008-05-06T06:03:34+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/downloads/outros/</loc><lastmod>2008-05-06T06:01:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/downloads/firewalls/</loc><lastmod>2008-05-06T06:00:16+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/downloads/antispywares/</loc><lastmod>2008-05-06T05:59:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/downloads/antivirus/</loc><lastmod>2008-05-06T05:59:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/downloads/</loc><lastmod>2008-05-06T05:59:02+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/noticias/</loc><lastmod>2008-05-06T05:52:12+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/dicionario/</loc><lastmod>2008-05-06T05:50:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/ajuda/</loc><lastmod>2008-05-06T05:49:12+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/feeds/</loc><lastmod>2008-05-06T05:34:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/remocao/</loc><lastmod>2008-05-04T08:20:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/classificacao-de-danos/</loc><lastmod>2008-05-04T08:18:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://linhadefensiva.org/2008/04/28/apeg/</loc><lastmod>2008-04-28T19:19:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/04/24/e-o-autopatcher/</loc><lastmod>2008-04-24T06:16:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/04/13/msp-abr-08/</loc><lastmod>2008-04-13T07:42:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/03/30/pwn-to-own-2008/</loc><lastmod>2008-04-27T23:51:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/03/27/top-mar-08/</loc><lastmod>2008-03-27T08:30:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/03/23/bdplus-primeiro-crack/</loc><lastmod>2008-03-23T07:43:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/03/14/msp-mar-08/</loc><lastmod>2008-03-14T08:28:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/03/08/virus-br-unhackme-plugins-bancos/</loc><lastmod>2008-03-19T01:15:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/03/03/top-fev-08/</loc><lastmod>2008-03-03T20:00:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/02/26/ad-aware-se-nao-atualiza/</loc><lastmod>2008-04-13T20:00:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/02/24/msp-fev-08/</loc><lastmod>2008-02-24T22:27:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/02/23/criptografia-hd-analise-ram/</loc><lastmod>2008-04-12T14:53:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/02/21/ssl-falsificado/</loc><lastmod>2008-02-21T18:51:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/02/01/top-jan-08/</loc><lastmod>2008-02-01T21:12:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/01/25/drive-by-pharming-e-utilizado-por-criminosos-para-atacar-roteadores/</loc><lastmod>2008-01-25T19:48:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2008/01/09/msp-jan-08/</loc><lastmod>2008-01-10T01:35:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/12/28/top-dez-07/</loc><lastmod>2007-12-29T00:32:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/12/21/javascript-worm-xss-orkut/</loc><lastmod>2007-12-29T19:18:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/12/14/quicktime-731/</loc><lastmod>2007-12-15T17:15:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/12/12/msp-dez-07/</loc><lastmod>2007-12-12T04:00:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/12/02/rtsp-zeroday-quicktime/</loc><lastmod>2007-12-04T16:03:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/12/01/bankerfix-milhao/</loc><lastmod>2007-12-17T15:34:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/11/30/top-nov-07/</loc><lastmod>2007-11-30T19:23:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/11/27/br-p2p/</loc><lastmod>2008-03-05T16:08:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/11/15/risco-jogos/</loc><lastmod>2015-08-25T19:52:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/11/14/msp-nov-07/</loc><lastmod>2007-11-14T13:54:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/11/10/msp-nov07-adv/</loc><lastmod>2007-11-10T05:12:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/11/08/expl-dnschanger/</loc><lastmod>2007-11-08T19:52:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/11/04/trojan-block-ld/</loc><lastmod>2007-11-09T15:27:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/11/03/rsplug/</loc><lastmod>2008-02-15T04:49:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/10/31/top-out-07/</loc><lastmod>2007-10-31T22:21:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/10/27/pdf-exploit-spam/</loc><lastmod>2007-10-27T05:49:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/10/24/directrevenue-cessa/</loc><lastmod>2007-10-24T19:20:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/10/22/realplayer-activex-zeroday/</loc><lastmod>2007-10-22T19:49:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/10/10/msp-out-07/</loc><lastmod>2007-10-10T09:06:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/10/08/youtube-xss-activex/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/10/youtube-xss-small1.jpg</image:loc><image:title>youtube-xss-small.jpg</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/10/youtube-xss-window1.png</image:loc><image:title>youtube-xss-window.png</image:title></image:image><lastmod>2007-10-30T04:36:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/10/05/msp-out07-adv/</loc><lastmod>2007-10-05T09:40:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/10/05/quicktime-72-update/</loc><lastmod>2007-10-05T07:42:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/09/29/top-set-07/</loc><lastmod>2007-09-29T07:37:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/09/25/fia-erra-censura/</loc><lastmod>2007-09-25T19:33:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/09/22/oi-exploit-banker/</loc><lastmod>2008-01-04T12:51:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/09/19/mediadefender-vazamento-email/</loc><lastmod>2007-09-19T06:03:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/09/15/alemanha-stoned/</loc><lastmod>2007-09-15T08:07:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/09/12/msp-set-07/</loc><lastmod>2007-09-12T07:46:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/09/10/tor-expoe-senhas/</loc><lastmod>2007-09-16T03:44:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/09/10/anuncio-malicioso-photobucket/</loc><lastmod>2007-09-11T19:52:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/09/08/ddos-antispam-castlecops/</loc><lastmod>2007-09-09T02:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/09/08/msp-adv-set/</loc><lastmod>2007-09-08T03:37:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/08/31/banco-india-comprometido/</loc><lastmod>2007-08-31T19:09:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/08/30/microsoft-forca-autopatcher-a-retirar-pagina-de-downloads/</loc><lastmod>2007-10-02T17:41:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/08/30/top-ago-07/</loc><lastmod>2007-08-30T23:18:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/08/25/iphone-desbloqueado-tres/</loc><lastmod>2007-08-25T07:41:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/08/23/br-dominios-malware/</loc><lastmod>2007-08-23T05:28:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/08/17/ncsa-escolar-eua/</loc><lastmod>2007-08-28T20:48:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/08/15/msp-ago-07/</loc><lastmod>2007-08-15T19:26:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/08/14/denuncia-orkut-pedofilia-virus/</loc><lastmod>2007-08-14T16:54:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/08/14/spam-novos-formatos/</loc><lastmod>2007-08-14T05:08:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/08/09/msp-ago07-adv/</loc><lastmod>2007-08-09T21:18:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/08/09/irs-password-call/</loc><lastmod>2007-08-09T06:45:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/08/03/blue-pill-open-source/</loc><lastmod>2011-12-21T19:03:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/08/01/firefox-2006-safari-303/</loc><lastmod>2007-08-01T07:34:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/08/01/iphone-101/</loc><lastmod>2007-08-01T04:26:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/31/sophos-engana-teste-ameacas/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/07/sophos-threat-test-sm1.jpg</image:loc><image:title>sophos-threat-test-sm.jpg</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/07/sophos-threat-test1.png</image:loc><image:title>sophos-threat-test.png</image:title></image:image><lastmod>2007-07-31T03:40:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/30/top-jul-07/</loc><lastmod>2007-07-31T17:02:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/27/spim-bloqueio-msn/</loc><lastmod>2007-08-01T03:14:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/27/psi-secunia-software-inseguro/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/07/sni-sm1.png</image:loc><image:title>sni-sm.png</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/07/sni1.png</image:loc><image:title>sni.png</image:title></image:image><lastmod>2007-07-27T05:51:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/26/iphone-apache-vim-python/</loc><lastmod>2007-07-26T06:17:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/25/protocol-handler-de-quem-e-a-culpa/</loc><lastmod>2007-07-26T02:56:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/23/iphone-primeira-falha-grave/</loc><lastmod>2007-07-23T18:41:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/21/firefox-2005/</loc><lastmod>2007-08-05T00:27:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/17/google-cookie-dois-anos/</loc><lastmod>2007-07-18T02:52:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/17/camera-fotografica-risco-eua/</loc><lastmod>2007-07-18T13:53:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/16/zune-drm-quebrado/</loc><lastmod>2007-07-16T07:53:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/13/malware-removal-starter/</loc><lastmod>2007-07-13T05:00:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/11/zerofill-apagar-dados-hd/</loc><lastmod>2012-07-15T01:10:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/11/msp-jul-07/</loc><lastmod>2007-07-11T03:26:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/09/google-adquire-postini/</loc><lastmod>2007-07-09T19:11:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/02/info-bloqueou-msn/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/07/msnblock-sm1.jpg</image:loc><image:title>msnblock-sm.jpg</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/07/msnblock1.png</image:loc><image:title>msnblock.png</image:title></image:image><lastmod>2007-08-30T20:02:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/07/02/dnssec-bbr-ao-futuro/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/07/ssl1.png</image:loc><image:title>ssl.png</image:title></image:image><lastmod>2007-07-02T13:34:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/29/bluepill-desafio/</loc><lastmod>2007-06-29T10:58:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/28/kaspersky-symantec-powerpoint/</loc><lastmod>2007-07-28T06:18:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/28/crossover-office-inexistente-genuino/</loc><lastmod>2007-06-28T06:36:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/28/top-jun-07/</loc><lastmod>2007-06-28T05:09:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/26/como-mudar-ip-computador/</loc><lastmod>2014-08-16T14:05:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/26/preso-jcp-cabir/</loc><lastmod>2007-06-26T06:54:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/22/crack-pentagono-email/</loc><lastmod>2007-06-22T11:10:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/22/stock-spam-pdf/</loc><lastmod>2007-06-22T09:37:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/20/hacker-perigoso-orkut/</loc><lastmod>2007-06-20T08:09:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/19/trillian-3160/</loc><lastmod>2007-06-19T07:49:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/18/xubuntu-genuino/</loc><lastmod>2012-03-08T19:01:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/14/safari-301/</loc><lastmod>2007-06-15T02:15:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/13/safari-winbeta-falhas/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/06/safari-security1.png</image:loc><image:title>safari-security.png</image:title></image:image><lastmod>2007-06-14T13:12:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/13/msp-jun-07/</loc><lastmod>2007-06-13T07:25:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/08/dia-zero-yahoo-fix/</loc><lastmod>2007-06-08T20:48:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/08/dia-zero-yahoo-activex/</loc><lastmod>2007-06-08T06:00:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/07/spammers-ddos-spamhaus/</loc><lastmod>2007-06-08T01:30:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/07/msp-jun07-adv/</loc><lastmod>2007-06-07T20:08:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/07/zango-pctools-processo/</loc><lastmod>2007-06-07T09:27:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/06/amero-novo-julgamento/</loc><lastmod>2007-07-11T14:46:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/04/dnssec-br/</loc><lastmod>2007-06-14T00:32:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/06/02/a-vida-imita-arte/</loc><lastmod>2007-06-18T10:23:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/31/itunes-plus-info/</loc><lastmod>2007-06-01T00:38:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/31/mozilla-corrige-cinco-falhas-de-seguranca-no-firefox/</loc><lastmod>2007-05-31T22:27:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/31/aacs-segunda-chave-processamento-vaza/</loc><lastmod>2007-05-31T11:53:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/31/falso-youtube/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/05/youstube1.png</image:loc><image:title>youstube.png</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/05/youstube-small1.png</image:loc><image:title>youstube-small.png</image:title></image:image><lastmod>2007-05-31T06:40:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/29/google-greenborder/</loc><lastmod>2007-05-29T19:10:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/29/top-mai-07/</loc><lastmod>2007-05-29T05:56:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/28/equipe-google-comunicado-urgente/</loc><lastmod>2007-05-28T09:10:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/28/trojan-de-pouco-mais-de-1kb-instala-rootkit/</loc><lastmod>2007-05-28T08:42:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/25/badbunny-openoffice/</loc><lastmod>2007-05-25T21:03:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/18/mes-dos-bugs-sites-de-busca/</loc><lastmod>2007-05-18T10:25:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/10/pense-nas-criancas-redes-sociais/</loc><lastmod>2007-05-10T09:13:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/09/wp-plugins-themes/</loc><lastmod>2007-05-09T08:43:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/09/msp-mai-07/</loc><lastmod>2007-05-09T08:08:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/08/mcafee-critica-pwn-to-own/</loc><lastmod>2007-05-08T09:00:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/08/adwords-clique-para-infectar/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/05/drivebydownload1.png</image:loc><image:title>drivebydownload.png</image:title></image:image><lastmod>2012-01-14T12:25:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/02/quicktime-716/</loc><lastmod>2007-05-03T02:25:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/05/02/wideline/</loc><lastmod>2007-05-06T08:41:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/04/30/top-abr-07/</loc><lastmod>2007-05-02T05:44:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/04/26/ipod-virus-teoria/</loc><lastmod>2007-04-26T20:42:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/04/23/zovi-qt-zeroday/</loc><lastmod>2007-04-24T02:45:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/04/21/macbook-zdi-safari-zeroday/</loc><lastmod>2007-04-21T09:15:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/04/11/msp-abr-07/</loc><lastmod>2007-04-11T15:29:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/04/06/ani-zero-day-asus/</loc><lastmod>2007-04-07T22:55:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/04/03/ani-zero-day-patch/</loc><lastmod>2007-04-03T19:33:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/04/02/ani-zero-day-emergencial/</loc><lastmod>2007-04-03T19:44:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/30/ani-zero-day-dezembro/</loc><lastmod>2007-03-30T21:49:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/30/amero-adiada-novamente/</loc><lastmod>2007-03-30T19:21:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/29/ani-zero-day/</loc><lastmod>2007-03-30T15:38:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/28/top-mar-07/</loc><lastmod>2007-03-28T09:23:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/27/mdac-novo-bug/</loc><lastmod>2007-03-28T13:08:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/26/primeira-falha-windows-mail/</loc><lastmod>2007-03-27T14:11:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/19/kaspersky-crescimento-malware/</loc><lastmod>2007-03-20T18:27:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/17/onecare-falho/</loc><lastmod>2007-03-17T18:27:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/14/windows-server-2003-sp2/</loc><lastmod>2007-03-14T15:29:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/09/stock-spamalot/</loc><lastmod>2007-03-09T19:16:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/08/microsoft-sem-correcao/</loc><lastmod>2007-03-09T01:07:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/05/vista-oem/</loc><lastmod>2007-03-28T11:46:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/03/wordpress-211/</loc><lastmod>2007-03-03T23:39:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/02/rinbot-tbs/</loc><lastmod>2007-03-02T06:48:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/03/01/amero-adiada/</loc><lastmod>2007-03-29T20:06:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/02/28/top-fev-07/</loc><lastmod>2007-06-28T20:17:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/02/27/virus-windows-linux-wine/</loc><lastmod>2007-03-13T18:47:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/02/21/banhosts/</loc><lastmod>2007-02-22T01:23:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/02/19/drive-by-pharming/</loc><lastmod>2007-02-21T17:37:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/02/14/msp-fev-07/</loc><lastmod>2007-02-14T12:54:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/02/14/utorrent-brecha-heap/</loc><lastmod>2007-02-14T15:23:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/02/12/life-is-beautiful-pps/</loc><lastmod>2007-02-12T23:10:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/02/10/cavalo-troia-alemao/</loc><lastmod>2007-02-12T11:04:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/02/09/castlecops-cinco/</loc><lastmod>2007-02-09T20:50:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/02/05/quinta-falha-microsoft-office/</loc><lastmod>2007-02-06T11:41:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/02/02/word-video/</loc><lastmod>2007-02-02T22:47:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/02/01/o-futuro-chegou/</loc><lastmod>2007-02-03T02:07:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/02/01/fraude-declaracao-amor/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/02/fraude-namorando1.png</image:loc><image:title>fraude-namorando.png</image:title></image:image><lastmod>2007-02-06T19:34:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/30/drm-do-vista-ja-era/</loc><lastmod>2007-02-05T16:50:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/29/top-jan-07/</loc><lastmod>2007-02-06T19:04:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/24/nao-e-nada-pessoal/</loc><lastmod>2007-01-24T06:35:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/23/bluray-burlado/</loc><lastmod>2007-01-23T23:20:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/22/brasil-segundo-2006/</loc><lastmod>2007-01-23T09:44:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/19/panda-banker-20-2006/</loc><lastmod>2007-01-19T18:39:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/19/banker-2006/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/01/grafico-bankers1.png</image:loc><image:title>grafico-bankers.png</image:title></image:image><lastmod>2007-01-20T00:29:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/17/vml-publico-20/</loc><lastmod>2007-01-18T00:23:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/16/acer-fix/</loc><lastmod>2007-01-22T23:28:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/15/iphone-controlado/</loc><lastmod>2007-01-16T19:18:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/15/amero-adware/</loc><lastmod>2007-01-24T02:29:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/14/quebra-aacs-confirmada/</loc><lastmod>2007-01-14T10:06:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/13/scam-ameaca-morte/</loc><lastmod>2007-01-13T23:57:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/12/vml-immunity/</loc><lastmod>2007-01-12T09:02:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/12/universal-mitm-kit/</loc><lastmod>2007-01-12T18:07:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/11/vcp-q1-2007/</loc><lastmod>2007-01-11T06:26:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/10/exploit-mdac/</loc><lastmod>2007-01-10T20:33:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/10/msp-jan-07/</loc><lastmod>2007-01-10T20:30:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/09/acer-applunch/</loc><lastmod>2007-01-09T18:47:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/08/saddam-enforcado/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/01/youtube-saddam-sm1.png</image:loc><image:title>youtube-saddam-sm.png</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2007/01/youtube-saddam1.png</image:loc><image:title>youtube-saddam.png</image:title></image:image><lastmod>2007-01-09T00:52:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/08/perigos-redes-sociais/</loc><lastmod>2007-01-08T02:25:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/05/dicas-computador-novo/</loc><lastmod>2007-01-24T22:50:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2007/01/05/pdf-xss/</loc><lastmod>2007-01-05T03:08:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/31/top-dez-06/</loc><lastmod>2007-01-07T23:51:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/30/antispyware-ponto-com/</loc><lastmod>2006-12-30T19:35:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/28/aacs-quebrado/</loc><lastmod>2007-01-16T17:26:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/26/inet-drweb/</loc><lastmod>2007-01-05T14:10:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/20/youtube-spam/</loc><lastmod>2006-12-21T09:27:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/13/msp-dez-06/</loc><lastmod>2006-12-13T06:11:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/11/quicktime-qtl/</loc><lastmod>2006-12-11T18:32:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/11/software-inspector/</loc><lastmod>2006-12-12T11:32:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/11/word-diazero-ii/</loc><lastmod>2006-12-15T18:38:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/08/cais-dicas/</loc><lastmod>2006-12-08T08:16:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/08/spyware-cleaner-fim/</loc><lastmod>2006-12-23T20:57:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/08/intel-escalacao-privilegio/</loc><lastmod>2006-12-08T04:29:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/07/zango-pornografia-infantil/</loc><lastmod>2006-12-07T20:24:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/06/doc-zeroday/</loc><lastmod>2006-12-06T18:17:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/06/worm-myspace/</loc><lastmod>2006-12-06T07:15:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/12/01/seguranca-feeds/</loc><lastmod>2006-12-02T19:13:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/29/disi-2006/</loc><lastmod>2006-11-29T19:26:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/28/orkut-xss-scrap/</loc><lastmod>2006-12-17T17:45:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/28/top-nov-06/</loc><lastmod>2006-11-29T17:06:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/24/ftc-wipe/</loc><lastmod>2006-11-24T18:50:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/23/iadware/</loc><lastmod>2006-11-27T01:30:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/22/pci-rootkit/</loc><lastmod>2006-11-25T01:32:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/21/worm-ld/</loc><lastmod>2006-11-21T04:10:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/20/spam-img/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/11/spam-tora1.png</image:loc><image:title>spam-tora.png</image:title></image:image><lastmod>2006-11-22T15:19:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/17/ftc-para-mediamotor/</loc><lastmod>2006-11-17T19:42:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/16/falsos-codecs/</loc><lastmod>2006-12-05T19:30:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/15/apsb06-18/</loc><lastmod>2006-11-23T15:53:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/15/msp-nov-06/</loc><lastmod>2006-11-15T04:50:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/13/links-redirecionados/</loc><lastmod>2006-11-19T12:05:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/07/ftc-zango/</loc><lastmod>2006-11-07T19:06:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/06/wikiblast/</loc><lastmod>2006-11-07T02:16:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/06/msxml-nov/</loc><lastmod>2006-11-06T20:03:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/11/06/macarena/</loc><lastmod>2006-11-06T19:36:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/10/27/top-out-06/</loc><lastmod>2006-10-27T20:01:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/10/23/senha-xp/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/10/xp-random1.png</image:loc><image:title>xp-random.png</image:title></image:image><lastmod>2006-10-31T13:03:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/10/21/spamthru/</loc><lastmod>2006-11-13T03:30:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/10/18/video-ipod-virus/</loc><lastmod>2006-10-18T19:14:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/10/11/msp-out-06/</loc><lastmod>2006-10-11T20:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/10/07/lop-mvp/</loc><lastmod>2006-10-08T11:34:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/10/02/setslice/</loc><lastmod>2006-10-02T21:15:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/09/28/top-set-06/</loc><lastmod>2006-09-28T04:48:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/09/26/patch-vml/</loc><lastmod>2006-09-28T19:09:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/09/25/daxctle-ocx/</loc><lastmod>2006-10-12T12:16:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/09/22/vml-zert-risco/</loc><lastmod>2006-09-27T01:51:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/09/19/ofuxico-video-de-daniella-cicarelli/</loc><lastmod>2006-09-19T23:29:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/09/19/iexplore-vml/</loc><lastmod>2006-09-22T01:51:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/09/18/novo-faq/</loc><lastmod>2006-09-18T03:31:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/09/13/msp-set-06/</loc><lastmod>2006-09-28T13:23:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/09/13/ero-carrera/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/09/ero-c1.jpg</image:loc><image:title>ero-c.jpg</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/09/back-b1.gif</image:loc><image:title>back-b.gif</image:title></image:image><lastmod>2006-09-13T19:18:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/09/04/dois-antivirus-nao/</loc><lastmod>2014-06-28T23:04:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/08/31/siteadvisor-seguranca-ruim/</loc><lastmod>2006-09-01T09:25:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/08/29/top-ago-06/</loc><lastmod>2006-08-29T19:23:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/08/25/atencao-seu-e-mail-pode-ser-cancelado/</loc><lastmod>2006-08-25T05:09:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/08/25/que-vexame-e-esse/</loc><lastmod>2006-08-25T04:48:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/08/24/leandro-orkut/</loc><lastmod>2006-08-28T00:02:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/08/24/licenca-active-aol/</loc><lastmod>2006-08-25T03:24:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/08/20/internaut-explorer/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/08/true-iexplore1.png</image:loc><image:title>true-iexplore.png</image:title></image:image><lastmod>2006-08-22T10:27:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/08/14/orkut-xss/</loc><lastmod>2006-08-14T19:25:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/08/14/wgareg/</loc><lastmod>2006-08-14T18:12:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/08/10/possivel-worm-06040/</loc><lastmod>2006-08-11T20:23:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/08/09/msp-ago-06/</loc><lastmod>2006-08-09T05:08:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/08/08/aol-vaza-busca/</loc><lastmod>2006-08-09T16:59:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/08/02/antivirus-popular-nao-funciona/</loc><lastmod>2006-08-06T13:24:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/28/ie7-autoupdate/</loc><lastmod>2006-08-07T20:52:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/27/warner-brothers-zango/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/07/wb-kids1.png</image:loc><image:title>wb-kids.png</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/07/wb-zango1.jpg</image:loc><image:title>wb-zango.jpg</image:title></image:image><lastmod>2006-07-27T19:20:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/27/ff-1505/</loc><lastmod>2006-07-27T19:14:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/27/top-jul-06/</loc><lastmod>2006-07-27T18:21:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/26/virus-registro/</loc><lastmod>2006-08-01T02:34:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/22/newdotnet-antivirus/</loc><lastmod>2006-07-22T19:17:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/18/myspace-zango/</loc><lastmod>2006-07-18T19:18:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/17/ip-computador-conexao/</loc><lastmod>2013-03-01T22:31:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/12/microsoft-private-folder/</loc><lastmod>2006-07-13T17:51:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/12/msp-jul-06/</loc><lastmod>2006-08-03T14:09:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/11/carteiro-virtual-mensagemparavc/</loc><lastmod>2006-07-31T16:56:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/10/direct-revenue-sequestro/</loc><lastmod>2006-07-10T20:06:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/03/o-fim-dos-virus-e-spam/</loc><lastmod>2006-07-03T19:05:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/03/pediu-foto/</loc><lastmod>2006-07-03T18:47:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/03/antivirus-nix/</loc><lastmod>2006-07-03T18:33:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/07/01/eon8/</loc><lastmod>2006-07-04T01:30:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/29/top-jun-06/</loc><lastmod>2006-07-12T13:33:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/27/winamp-524/</loc><lastmod>2006-06-27T18:53:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/25/fraude-usa-linhadefensiva/</loc><lastmod>2006-07-13T17:02:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/23/policia-federal-urgente/</loc><lastmod>2006-06-23T04:29:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/23/ultima-gravacao-do-casseta/</loc><lastmod>2006-06-23T04:11:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/18/so-penso-em-voce/</loc><lastmod>2006-06-18T09:11:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/15/yamanner/</loc><lastmod>2006-06-16T17:14:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/14/msp-jun-06/</loc><lastmod>2006-06-16T11:08:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/14/explorer-exe-trojan-gen/</loc><lastmod>2012-07-12T23:53:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/11/winsoftware-backtera-virus/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/06/backtera-alerta1.png</image:loc><image:title>backtera-alerta.png</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/06/backtera-scam-t1.png</image:loc><image:title>backtera-scam-t.png</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/06/backtera-scam1.png</image:loc><image:title>backtera-scam.png</image:title></image:image><lastmod>2006-07-01T18:08:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/10/98-sem-patch/</loc><lastmod>2006-06-13T15:42:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/09/engenharia-social-usb/</loc><lastmod>2006-06-09T03:42:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/08/orkut-msn-risco/</loc><lastmod>2006-06-23T18:01:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/07/castlecops-ddos/</loc><lastmod>2006-06-07T20:38:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/07/hotbar-180solutions/</loc><lastmod>2006-06-08T17:07:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/07/spam-com-numeros/</loc><lastmod>2006-06-14T18:33:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/06/novidades-da-linha/</loc><lastmod>2006-06-07T17:23:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/06/valor-da-informacao/</loc><lastmod>2006-06-07T19:02:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/06/03/ff-1504/</loc><lastmod>2006-06-07T13:51:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/05/31/top-mai-06/</loc><lastmod>2006-06-17T20:16:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/05/22/orkut-festa/</loc><lastmod>2006-05-24T02:24:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/05/20/word-ginwui/</loc><lastmod>2006-05-29T11:15:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/05/18/blue-security-analise/</loc><lastmod>2006-05-18T06:27:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/05/17/fim-blue-security/</loc><lastmod>2006-05-29T21:32:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/05/17/nworms-msn/</loc><lastmod>2006-06-01T14:25:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/05/11/alex-eckelberry/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/05/alex-e1.jpg</image:loc><image:title>alex-e.jpg</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/05/back-b1.gif</image:loc><image:title>back-b.gif</image:title></image:image><lastmod>2006-05-11T20:02:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/05/10/msp-mai-06/</loc><lastmod>2006-05-10T20:47:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/05/06/bluesecurity-ddos/</loc><lastmod>2006-05-18T16:15:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/05/06/voce-tem-debitos-com-provedor-uol/</loc><lastmod>2006-05-06T05:28:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/05/02/top-abr-06/</loc><lastmod>2006-05-02T17:30:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/04/19/msn-fofocas/</loc><lastmod>2006-04-25T19:21:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/04/15/firefox-1502/</loc><lastmod>2006-04-15T20:28:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/04/12/msn-sapo/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/04/msn-sapo1.jpg</image:loc><image:title>msn-sapo.jpg</image:title></image:image><lastmod>2006-04-15T20:41:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/04/12/msp-abr-06/</loc><lastmod>2006-04-19T10:07:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/04/10/processada-directrevenue/</loc><lastmod>2006-04-11T20:06:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/04/09/embaixador-da-coca-cola-na-copa-de-2006/</loc><lastmod>2006-04-09T20:16:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/04/09/recebemos-seu-pedido-americanascom/</loc><lastmod>2006-04-09T20:02:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/04/06/siteadvisor/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/04/siteadvisor-settings1.png</image:loc><image:title>siteadvisor-settings.png</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/04/siteadvisor-google1.png</image:loc><image:title>siteadvisor-google.png</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/04/siteadvisor-google-t1.png</image:loc><image:title>siteadvisor-google-t.png</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/04/siteadvisor-safe1.png</image:loc><image:title>siteadvisor-safe.png</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/04/siteadvisor-cws1.png</image:loc><image:title>siteadvisor-cws.png</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/04/siteadvisor-unsafe1.png</image:loc><image:title>siteadvisor-unsafe.png</image:title></image:image><lastmod>2006-04-06T20:32:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/04/05/banker-via-orkut/</loc><lastmod>2006-04-19T04:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/04/03/morre-giordani-rodrigues/</loc><lastmod>2006-04-03T18:38:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/04/02/distribuicao-adware/</loc><lastmod>2006-04-02T06:16:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/31/cancelamento-bradesco-net-empresa/</loc><lastmod>2006-03-31T14:48:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/31/fraude-falcao/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/03/falcao-trafico1.png</image:loc><image:title>falcao-trafico.png</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/03/falcao-trafico-m1.png</image:loc><image:title>falcao-trafico-m.png</image:title></image:image><lastmod>2006-04-06T14:05:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/31/falcao-meninos-do-trafico/</loc><lastmod>2006-03-31T05:16:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/30/spyware-quake/</loc><lastmod>2006-04-05T10:21:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/29/flexispy-a/</loc><lastmod>2006-03-29T17:41:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/28/top-mar-06/</loc><lastmod>2006-03-28T06:58:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/27/createtxt-200-sites/</loc><lastmod>2006-03-27T17:15:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/25/createtxt-cem-sites/</loc><lastmod>2006-03-25T17:04:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/23/ie-falha-createtxt/</loc><lastmod>2006-03-24T09:30:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/22/ie-duas-falhas/</loc><lastmod>2006-03-22T19:54:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/21/claria-sai-adware/</loc><lastmod>2006-03-21T19:29:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/17/norton-derruba-aol/</loc><lastmod>2006-03-17T17:25:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/16/fotos-exclusivas-do-assassinato-de-roberto-jefferson/</loc><lastmod>2006-03-16T15:36:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/15/flash-critico/</loc><lastmod>2006-03-15T18:44:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/15/msp-mar-06/</loc><lastmod>2006-03-15T03:15:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/13/passe-livre-globo-media-center/</loc><lastmod>2006-03-13T16:53:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/13/mcafee-ctx/</loc><lastmod>2006-03-14T14:25:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/06/setor-zero-virus-incuravel/</loc><lastmod>2006-03-06T16:54:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/04/winsoftware-winfixer/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/03/winfixer1.png</image:loc><image:title>winfixer.png</image:title></image:image><lastmod>2006-03-16T22:40:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/03/sua-conta-sera-excluida-orkutcom/</loc><lastmod>2006-03-03T19:25:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/03/hacdef-ad-cancelado/</loc><lastmod>2006-03-03T16:31:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/03/01/top-fev-06/</loc><lastmod>2006-03-02T14:58:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/28/botnets-redes-zumbi/</loc><lastmod>2006-03-01T01:24:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/28/redbrowser-a/</loc><lastmod>2006-02-28T20:43:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/27/winamp-52/</loc><lastmod>2006-03-01T04:15:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/26/funk-da-katilce/</loc><lastmod>2006-02-26T20:15:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/25/novo-messenger-plus-370125/</loc><lastmod>2006-02-25T15:20:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/20/macvirus-alerta/</loc><lastmod>2006-02-20T22:38:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/20/processo-por-danos-morais-stj/</loc><lastmod>2006-02-20T18:04:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/17/inqtana/</loc><lastmod>2006-02-21T20:28:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/16/osx-leap-a/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/02/osx-leap_-a1.gif</image:loc><image:title>osx.leap.a.gif</image:title></image:image><lastmod>2006-02-17T19:22:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/16/e-fastnews-spyware/</loc><lastmod>2006-02-16T19:47:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/15/msp-fev-06/</loc><lastmod>2006-02-15T02:15:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/13/msas-norton/</loc><lastmod>2006-02-19T18:46:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/12/botnet-hospital/</loc><lastmod>2006-02-12T15:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/10/msn-sua-foto/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/02/msn-suafoto1.png</image:loc><image:title>msn-suafoto.png</image:title></image:image><lastmod>2006-02-17T16:55:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/08/ff-query-ie-wmf/</loc><lastmod>2006-02-08T19:20:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/02/ff-1501/</loc><lastmod>2006-02-02T20:30:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/02/nyxem-e-payload/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/02/nyxem-e-mapa.png</image:loc><image:title>nyxem.e-mapa.png</image:title></image:image><lastmod>2006-02-03T22:47:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/02/01/antivirus-antispywares/</loc><lastmod>2006-02-01T17:44:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/31/promocao-mastercard-copa-do-mundo-2006/</loc><lastmod>2006-01-31T21:44:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/31/winamp-pls-m3u/</loc><lastmod>2006-01-31T17:44:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/31/padronizar-antispyware/</loc><lastmod>2006-02-09T02:08:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/30/forum-amd-wmf/</loc><lastmod>2006-01-30T23:10:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/28/um-ano-na-linha/</loc><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/01/helplib-t1.gif</image:loc><image:title>helplib-t.gif</image:title></image:image><image:image><image:loc>https://linhadefensiva.org/wp-content/uploads/2006/01/helplib1.gif</image:loc><image:title>helplib.gif</image:title></image:image><lastmod>2006-01-30T19:54:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/27/top-jan-06/</loc><lastmod>2006-01-31T11:06:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/26/spyware-cleaner-processado/</loc><lastmod>2006-01-26T20:04:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/21/nyxem-e/</loc><lastmod>2006-01-24T15:54:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/20/fsav-zip-rar/</loc><lastmod>2006-01-20T02:40:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/19/vmware-browser-appliance/</loc><lastmod>2006-01-20T20:27:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/18/questao-simplicidade/</loc><lastmod>2006-01-20T16:33:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/16/w32jeefo_bankmm/</loc><lastmod>2006-01-16T17:22:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/16/passaporte-para-a-copa-do-mundo-na-alemanha/</loc><lastmod>2006-01-16T05:01:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/16/se-amar-e-ter-carinho-por-alguem/</loc><lastmod>2006-01-16T04:54:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/15/spywarestrike/</loc><lastmod>2006-01-15T18:55:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/13/rootkit-software-sec/</loc><lastmod>2006-01-16T11:45:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/12/antispyware-falso/</loc><lastmod>2006-01-12T23:59:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/12/wmf-nova-duas/</loc><lastmod>2006-01-12T18:28:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/11/msp-jan-06/</loc><lastmod>2006-01-11T05:14:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/06/promocao-31-faz-de-voce-um-bbb/</loc><lastmod>2006-01-06T19:10:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/06/golpe-telemarscr/</loc><lastmod>2006-01-10T11:04:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/05/wmf-patch-ooc/</loc><lastmod>2006-01-06T19:48:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/02/faq-wmf/</loc><lastmod>2006-01-06T09:34:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2006/01/02/ola-sabe-quem-e/</loc><lastmod>2006-01-02T19:25:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/31/worm-wmf/</loc><lastmod>2006-01-10T14:28:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/29/info-wmf-n/</loc><lastmod>2005-12-31T23:30:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/28/falha-wmf-pfv/</loc><lastmod>2006-01-01T21:07:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/27/top-dez-05/</loc><lastmod>2005-12-27T15:55:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/26/voce-esta-sendo-traido/</loc><lastmod>2005-12-26T18:25:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/21/banco-central-emprestimo-renovavel/</loc><lastmod>2005-12-21T17:43:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/20/macscan-osx/</loc><lastmod>2006-01-10T10:50:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/17/dasher/</loc><lastmod>2005-12-21T12:51:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/16/falso-spyaxe/</loc><lastmod>2006-01-02T12:25:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/14/msp-dez-05/</loc><lastmod>2005-12-14T19:51:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/11/msn-olha-foto/</loc><lastmod>2005-12-13T16:54:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/08/rootkit-prevencao-solucao/</loc><lastmod>2005-12-16T00:20:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/07/sunncomm-pe-eff/</loc><lastmod>2005-12-07T23:30:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/07/worm-im-conversa/</loc><lastmod>2005-12-10T22:29:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/05/uol-cartoes/</loc><lastmod>2005-12-05T03:13:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/12/01/kerio-esta-de-volta/</loc><lastmod>2005-12-02T01:17:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/11/30/ie-prompt-nofix/</loc><lastmod>2005-12-02T02:48:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/11/27/top-nov-05/</loc><lastmod>2005-12-15T13:17:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/11/26/kerio-sygate-rip/</loc><lastmod>2005-12-14T14:54:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/11/26/repsamo-cimuz/</loc><lastmod>2005-11-26T14:35:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/11/25/cartoes-musicalcards/</loc><lastmod>2005-11-25T03:16:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/11/23/novo-sober-y/</loc><lastmod>2005-11-23T20:09:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/11/16/desinstalador-do-drm-da-sony-tem-falha/</loc><lastmod>2005-11-16T16:28:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/11/14/spam/</loc><lastmod>2005-11-14T22:37:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/11/14/fiasco-xcp-aurora/</loc><lastmod>2005-11-14T06:03:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/11/13/falso-truque-worms/</loc><lastmod>2005-11-13T23:02:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/11/11/tibia-premium-account-gratis/</loc><lastmod>2005-11-12T02:18:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/11/10/cartoes-namorandocombr/</loc><lastmod>2005-11-10T19:30:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org/2005/11/10/confirmacao-americascom/</loc><lastmod>2005-11-10T19:24:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://linhadefensiva.org</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-07-20T20:01:34+00:00</lastmod></url></urlset>
