<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[George Tsirigotis]]></title><description><![CDATA[Offering over 25 years experience in IT Infrastructure. Comprehensive understanding & knowledge of system/ network administration under multi-platform]]></description><link>https://wildrosemail.wixsite.com/george-tsirigotis/blog</link><generator>RSS for Node</generator><lastBuildDate>Wed, 13 May 2026 13:14:53 GMT</lastBuildDate><atom:link href="https://wildrosemail.wixsite.com/george-tsirigotis/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Hacking definition: What is hacking?]]></title><description><![CDATA[Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks....]]></description><link>https://wildrosemail.wixsite.com/george-tsirigotis/post/hacking-definition-what-is-hacking</link><guid isPermaLink="false">6305c890046c7ef836f45c5e</guid><pubDate>Wed, 24 Aug 2022 06:45:02 GMT</pubDate><dc:creator>George Tsirigotis</dc:creator></item></channel></rss>