<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="http://www.websec.it/wp-content/plugins/udinra-all-image-sitemap/xml-image-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
	<url>
		<loc>http://www.websec.it/email-marketing-funziona.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/02/email-marketing.png</image:loc>
			<image:caption></image:caption>
			<image:title>Email Marketing</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bloccate-cartelle-cliniche-lospedale-paga-riscatto.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/02/criptolocket-il-virus-che-sequestra-il-pc_598413.jpg</image:loc>
			<image:caption>Ransomware all'attacco</image:caption>
			<image:title>Ospedale</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mobile-world-congress-sfida-tra-cina-e-corea.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/02/download-2.jpg</image:loc>
			<image:caption>Xiaomi debutterà al Mobile World Congress</image:caption>
			<image:title>Mobile World Congress</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nuova-campagna-per-la-sicurezza-dei-giornalisti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/02/201848369-475d6db7-9cd3-468f-b09a-197170b37f72.jpg</image:loc>
			<image:caption>Sicurezza per giornalisti e attivisti</image:caption>
			<image:title>Amnesty</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/app-salva-vita-prevenire-i-suicidi-grazie-allo-smartphone.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/02/Suicidio.jpg</image:loc>
			<image:caption>In arrivo l'App salva-vita</image:caption>
			<image:title>App salva-vita</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kinvolved-app-per-insegnanti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/02/kinvolved.jpg</image:loc>
			<image:caption>Kinvolved: l'app ideata per combattere la dispersione scolastica</image:caption>
			<image:title>Kinvolved</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/skype-paulmccartney-moij-98.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/02/SkypeAnnouncement_MainNews.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>SkypeAnnouncement_MainNews</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cyberbullismo-safer-internet-day-celebrata-in-100-nazioni.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/02/download-1.jpg</image:loc>
			<image:caption>Safer Internet Day</image:caption>
			<image:title>Cyberbullismo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/malware-in-crescita-continua.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/02/download.jpg</image:loc>
			<image:caption>Malaware in crescita</image:caption>
			<image:title>malaware</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/twitter-accedere-senza-iscrizione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/02/images.jpg</image:loc>
			<image:caption>Twitter: la nuova funzionalità</image:caption>
			<image:title>Twitter</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cryptolocker-come-funziona-come-proteggersi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/02/cryptolocker.jpg</image:loc>
			<image:caption>Cryptolocker: il virus invincibile</image:caption>
			<image:title>cryptolocker</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/2house-l%e2%80%99app-aiuta-separati-divorziati.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/02/Schermata-del-2016-01-04-172415-680x365_c.png</image:loc>
			<image:caption>2house</image:caption>
			<image:title>2house</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ricetta-medica-digitale-valida-da-marzo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/medico-che-scrive-al-pc.jpg</image:loc>
			<image:caption>In arrivo la ricetta medica digitale</image:caption>
			<image:title>Ricetta medica</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/robot-cubo-rubik-secondo-12.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/cubo.jpg</image:loc>
			<image:caption>Cubo di Rubik</image:caption>
			<image:title>cubo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-ha-guadagnato-22-miliardi-grazie-ad-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/images.jpg</image:loc>
			<image:caption>L'accordo tra Google e Android vale 22 milioni di dollari</image:caption>
			<image:title>Google</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-napoli-scelta-per-il-primo-centro-app-ios-europeo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/napoli-530x286-copia.jpg</image:loc>
			<image:caption>Il Centro App iOS a Napoli</image:caption>
			<image:title>Apple</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/whatsapp-l%e2%80%99abbonamento-non-si-paga-piu.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/whats-thumb.png</image:loc>
			<image:caption>Whatsapp totalmente gratis</image:caption>
			<image:title>whatsapp</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/9461.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/image.jpg</image:loc>
			<image:caption>L'algoritmo che ha salvato gli acquisti online</image:caption>
			<image:title>algoritmo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cube-t8-plus-espandere-la-partizione-a-10-gb.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/cube-t8-plus-estensione-partizione-10-gb.png</image:loc>
			<image:caption></image:caption>
			<image:title>Estensione Partizione Cube T8 Plus</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/autorizzate-le-aziende-a-controllare-mail-messaggi-dei-dipendenti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/sicurezza-cisco.jpg</image:loc>
			<image:caption>Permessi concessi alle aziende per spiare i dipendenti</image:caption>
			<image:title>mail</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cube-t8-plus-espandere-la-partizione-a-10-gb.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/etensione-partizione-script-home.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Estensione Partizione Dati Cube T8 Plus</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/estensione-partizione-zip-file.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>File Zip Ripartizionamento Cube T8 Plus</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/avvio-ripartizionamento-cube-t8-plus.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Avvio Ripartizionamento Cube T8 Plus</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/scelta-partizione-ripartizionamento-cube-t8-plus.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Scelta Grandezza Partizione Cube T8 Plus</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/lapp-che-traduce-il-pianto-del-neonato.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/download.jpg</image:loc>
			<image:caption>L'app che traduce il pianto del neonato</image:caption>
			<image:title>neonato</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-acquista-emotient.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/5thAveHero_5x5_78_300dpi_111105.jpg</image:loc>
			<image:caption>L'intelligenza artificiale acquistata da Apple</image:caption>
			<image:title>Apple</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/addio-passwordil-login-si-effettuera-mail.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/Password.jpg</image:loc>
			<image:caption>Addio Password</image:caption>
			<image:title>Password</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/permessi-di-root-cube-t8-plus.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/guida-root-tablet-cube-t8-plus.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Guida Root Cube T8 Plus</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/root-update-zip-cube-t8-plus-twrp-recovery.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Root Update Zip Cube T8 Plus</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/twrp-recovery-home-menu.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>TWRP Recovery Home Menu</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/root-cube-t8-plus-completato.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Root Cube T8 Plus Completato</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/install-zip-update-twrp-recovery.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Install Zip Update TWRP Recovery</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/sp-flash-tool-recovery-twrp-cube-t8-plus-download.png</image:loc>
			<image:caption></image:caption>
			<image:title>Download Flash Recovery TWRP Cube T8 Plus</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/sp-flash-tool-recovery-twrp-cube-t8-plus.png</image:loc>
			<image:caption></image:caption>
			<image:title>Flash Recovery TWRP Cube T8 Plus</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iphone-7-impermeabile-4-pollici.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2016/01/image.jpeg</image:loc>
			<image:caption>Il nuovo iPhone 7 sarà impermeabile </image:caption>
			<image:title>iPhone 7</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/alice-wpa-calculator-online/</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/11/wpatester-reti-wifi.png</image:loc>
			<image:caption></image:caption>
			<image:title>WpaTester Reti Wifi Crack</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/11/wpatester-mostra-password.png</image:loc>
			<image:caption></image:caption>
			<image:title>WpaTester Mostra Password Wifi</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/11/wpatester-crack-wifi-wpa.png</image:loc>
			<image:caption></image:caption>
			<image:title>WpaTester Menu Crack Wifi</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cube-t8-plus-ripartizionare-lo-spazio-le-app.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/guida-cube-t8-plus-partizionamento.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Ripartizionare Cube T8 Plus</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/sp-flash-tool-cube-t8-plus.png</image:loc>
			<image:caption></image:caption>
			<image:title>Flash ROM Cube T8 Plus</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/sp-flash-tool-1.png</image:loc>
			<image:caption></image:caption>
			<image:title>Flashing Cube T8 Plus</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/sp-flash-tool.png</image:loc>
			<image:caption></image:caption>
			<image:title>SP Flash Tool</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/t8-repartitioned.png</image:loc>
			<image:caption>Dopo il ripartizionamento lo spazio disponibile per le app è di 6 Gb</image:caption>
			<image:title>Cube T8 Plus Ripartizionato</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cube-t8-plus-recensione-caratteristiche.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/cube-t8-plus-dooge-dg310.jpg</image:loc>
			<image:caption>Cube T8 Plus e Doogee Dg310: Tablet 8&quot; + Smartphone 5&quot; ad un prezzo totale di 230 Euro</image:caption>
			<image:title>Cube T8 Plus e Doogee DG310</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/tablet-cube-t8-plus.png</image:loc>
			<image:caption></image:caption>
			<image:title>Tablet Cube T8 Plus</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/windows-10-installare-antivirus-windows-defender.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/prove-antivirus.png</image:loc>
			<image:caption></image:caption>
			<image:title>Prove Antivirus 2015-2016</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/antivirus.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Il Miglior Antivirus</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-software-anti-bugiardi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/14657049-vero-falso-gomma-stampa-timbro-vector-illustration-660x330.jpg</image:loc>
			<image:caption>Software Anti Bugiardo</image:caption>
			<image:title>software</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/social-network-e-email-proibiti-ai-minori-di-16-anni.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/download2.jpg</image:loc>
			<image:caption>Social Network: no ai minori di 16 anni</image:caption>
			<image:title>Sicurezza</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/gadget-personalizzati-idee-regalo-natale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/powerbank-personalizzate.png</image:loc>
			<image:caption>Le PowerBank sono tra i gadget più utili per chiunque al giorno d'oggi!</image:caption>
			<image:title>PowerBank Personalizzate</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/chiavetta-usb-personalizzata.jpg</image:loc>
			<image:caption>Distinguiti dalla massa con una Chiavetta USB personalizzata con i tuoi colori!</image:caption>
			<image:title>Chiavetta USB Personalizzata</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/poncho-antipioggia-personalizzato.png</image:loc>
			<image:caption>Pubblicizza il tuo brand tramite il Poncho Personalizzato anche quando piove!</image:caption>
			<image:title>Poncho Antipioggia Personalizzato</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/penne-ecologiche-personalizzate.png</image:loc>
			<image:caption>Penne ecologiche per promuovere il proprio lato &quot;green&quot;</image:caption>
			<image:title>Penne Ecologiche Personalizzate</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/gadget-personalizzati-caricatore-usb-auto.png</image:loc>
			<image:caption>Personalizza con il tuo logo/brand il Caricatore USB d Auto</image:caption>
			<image:title>Caricatore USB da Auto</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/novita-spotify-brani-solo-per-utenti-a-pagamento.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/guida-spotify-softonic-copy-664x374.jpg</image:loc>
			<image:caption>Novità Spotify</image:caption>
			<image:title>Spotify</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-vs-periscope-la-battaglia-del-live-streaming.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/Facebook-Live-VS-Periscope-300x225.png</image:loc>
			<image:caption>Facebook lancia il Live Streaming</image:caption>
			<image:title>Facebook VS Periscope</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hour-of-code-in-italia-bimbi-programmatori.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/Hour-of-Code.jpg</image:loc>
			<image:caption>Hour Of Code: programmatori si diventa</image:caption>
			<image:title>Hour Of Code</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/prezzo-cicret-bracelet-costera-300.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/cicret-bracelet-prezzo.png</image:loc>
			<image:caption></image:caption>
			<image:title>Cicret Bracelet Prezzo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/cicret-bracelet-orange.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Cicret Bracelet Arancione</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/cicret-bracelet-yellow.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Cicret Bracelet Giallo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/cicret-bracelet-blu.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Cicret Bracelet Blu</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/cicret-bracelet-nero.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Cicret Bracelet Ner</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wikipedia-benvenuta-intelligenza-artificiale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/download1.jpg</image:loc>
			<image:caption>Wikipedia introduce l'intelligenza artificiale</image:caption>
			<image:title>Wikipedia</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/i-big-dellhi-tech-insieme-per-lambiente-nasce-la-breakthrough-energy-coalition.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/download.jpg</image:loc>
			<image:caption>Nasce la Breakthrough Energy Coalition</image:caption>
			<image:title>Breakthrough Energy Coalition</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/video-del-drone-amazon-prime-air.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/amazon-prime-air-droni.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Amazon Prime Air</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/intel-security-le-minacce-informatiche-del-2016.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/12/163927743-33012bbf-4ee9-483d-904c-c0dce6cad17a.jpg</image:loc>
			<image:caption>Nuove Minacce informatiche </image:caption>
			<image:title>Intel Security</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/smartphone-con-modalita-letto.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/smartphone.jpg</image:loc>
			<image:caption>Lo smartphone con la modalità letto</image:caption>
			<image:title>smartphone</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/black-friday-amazon-offerte-last-minute.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/amazon-black-friday.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Amazon Black Friday</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/dagli-usa-arriva-lapp-antiterrorismo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/142636103-ae966877-775f-4420-9308-add1ba5156ab.jpg</image:loc>
			<image:caption>L'app antiterrorismo arriva dagli USA</image:caption>
			<image:title>App antiterrorismo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/amazon-prime-now-come-funziona.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/amazon-prime-now1.png</image:loc>
			<image:caption>Amazon Prime Now: il nuovo servizio di Amazon per le spedizioni in tempi record</image:caption>
			<image:title>Amazon Prime Now</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/microsoft-lancia-il-cyber-defense-operations-center.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/CyberCrime-730x430.jpg</image:loc>
			<image:caption>Cyber Defense Operations Center</image:caption>
			<image:title>CyberCrime</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sicurezza-informatica-protocollo-https-differenza.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/https-security-online-shopping.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Sicurezza Informatica</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-inserire-un-video-su-youtube.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/0315-youtube-logo.jpg</image:loc>
			<image:caption>Inserire video su YouTube</image:caption>
			<image:title>YouTube</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/htc-one-a9-caratteristiche-e-recensione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/gsmarena_001.jpg</image:loc>
			<image:caption>Recensione HTC One A9</image:caption>
			<image:title>Htc One A9</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-debutta-con-il-progetto-mondo-connesso.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/Memoria-500x325-500x325_600x400.jpg</image:loc>
			<image:caption>Mondo Connesso di Facebook</image:caption>
			<image:title>Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/food-porn-come-lo-recepisce-il-cervello-e-perche-fa-ingrassare.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/lead_large.jpg</image:loc>
			<image:caption>Il Food Porn fa ingrassare</image:caption>
			<image:title>Food Porn</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/idee-regalo-natale-2015-cover-per-proteggere-iphone.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/iphone-cover-legno.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>iPhone Cover in Legno - Idee Regalo Natale</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-presenta-music-stories.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/112692671-facebook-music_6.jpg</image:loc>
			<image:caption>Facebook e Music Stories</image:caption>
			<image:title>Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/amazon-lancia-prime-now-in-italia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/101301445-453085783r.530x298.jpg</image:loc>
			<image:caption>Amazon Prime Now: il nuovo servizio</image:caption>
			<image:title>Amazon Prime Now</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-debutta-a-wall-street.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/download_600x400.jpg</image:loc>
			<image:caption>Facebook a Wall Street</image:caption>
			<image:title>Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/twitter-sostituisce-la-stellina-con-il-cuore.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/11/twitter-cuori.jpg</image:loc>
			<image:caption>Il cuore di Twitter</image:caption>
			<image:title>Twitter</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/guardare-film-streaming-e-ancora-possibile.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/guardare-film-tv.png</image:loc>
			<image:caption></image:caption>
			<image:title>Guardare Film Tv</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/netflix-sign.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Netflix</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/cineblog01.png</image:loc>
			<image:caption></image:caption>
			<image:title>cineblog01</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/password-sicure-in-vendita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/come-creare-password-sicure.png</image:loc>
			<image:caption>Unidicenne vende Password sicure</image:caption>
			<image:title>Password Sicure</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-in-arrivo-la-richiesta-di-messaggio.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/images2.jpg</image:loc>
			<image:caption>Novità Facebook</image:caption>
			<image:title>Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ritorno-al-futuro-scarpe.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/ritorno-al-futuro-scarpe-nike-power-lace.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Scarpe Nike Power Lace Ritorno al Futuro</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/scarpe-ritorno-al-futuro-originali.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Scarpe Autoallaccianti - Ritorno al Futuro 2</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/novita-facebook-la-ricerca-universale-dei-post.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/facebook-search-for-posts-e1418119184101.png</image:loc>
			<image:caption>Ricerca Facebook</image:caption>
			<image:title>Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/quali-app-android-consumano-piu-batteria-secondo-avg.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/problema-batteria-android_600x400.jpg</image:loc>
			<image:caption>La batteria Android secondo AVG</image:caption>
			<image:title>Android Batteria</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/yahoo-introduce-account-key.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/Yahoo.png</image:loc>
			<image:caption>Il nuovo servizio di Yahoo</image:caption>
			<image:title>Yahoo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-e-mediaset-nuovo-accordo-sui-diritti-video.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/images.png</image:loc>
			<image:caption>Google-Mediaset: accordo siglato tra i due colossi</image:caption>
			<image:title>Google-Mediaset</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/batteria-sempre-scarica-colpa-di-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/images1.jpg</image:loc>
			<image:caption>Facebook scarica  la batteria del vostro smarphone</image:caption>
			<image:title>Batteria</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/convertire-file-audio-in-mp3-come-fare.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/images.jpg</image:loc>
			<image:caption>Convertitori mp3</image:caption>
			<image:title>Mp3</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/le-nuove-funzionalita-di-whatsapp.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/WhatsApp-logo-15.jpg</image:loc>
			<image:caption>Le nuove funzionalità di WhatsApp</image:caption>
			<image:title>Whats App</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-non-funziona-samsung-note-3.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/facebook-app-android.png</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook App Android</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/facebook-android-commenti.png</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook Android Play Store</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/facebook-aggiornamento-samsung-note.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook Android Play Store</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/facebook-aggiornamento-samsung-note-3.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>App Facebook Android Crash</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/facebook-aggiornamento-samsung-note-1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>App Facebook Android Crash</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/giochi-smartphone-cellulare-costruzione-impero.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/screenshot_04_thumb.jpg</image:loc>
			<image:caption>Costruzione di un impero</image:caption>
			<image:title>Giochi di simulazione</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hackinbo-evento-dedicato-alla-sicurezza-informatica.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/hackinbo.png</image:loc>
			<image:caption></image:caption>
			<image:title>Hackinbo Sicurezza Informatica</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/hakinbo-300x155.png</image:loc>
			<image:caption>HackInBo 2015</image:caption>
			<image:title>HackInBo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/le-tv-samsung-consumano-piu-che-nei-test.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/samsungc6000_large24.jpg</image:loc>
			<image:caption>Samsung TV e i test falsati?</image:caption>
			<image:title>Samsung TV</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google.com-venduto-per-12-dollari.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/google-venduta.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google Venduta</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/google-com-order-cancelled.png</image:loc>
			<image:caption></image:caption>
			<image:title>Conferma Acquisto Google.com</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/google-com-search-console.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google.com on Search Console</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/google-com-12-dollari-2.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google.com Pagamento</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/10/google-com-12-dollari.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google.com venduto su Google Domain</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/dove-guardare-film-senza-limiti-i-migliori-siti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/stream4you_h_partb.png</image:loc>
			<image:caption>Film senza Limiti in streaming</image:caption>
			<image:title>Film senza Limiti</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/spiare-un-cellulare-il-servizio-delle-iene.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/spiare-un-cellulare.png</image:loc>
			<image:caption></image:caption>
			<image:title>Spiare Un Cellulare</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/gli-ultimi-dettagli-di-nexus-6p-ecco-come-sara.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/nexus-6p-1.jpg</image:loc>
			<image:caption>Le caratteristiche di Nexus 6P</image:caption>
			<image:title>Nexus 6P</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/le-caratteristiche-del-nuovo-samsung-galaxy-s7.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/images.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Samsung Galaxy S7</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebookdown-facebook-rotto.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/facebook-broken.png</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook Down</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/facebook-broken-2.png</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook Down</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/facebook-down.png</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook Down</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/i-7-anni-di-android-buon-compleanno.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/download.jpg</image:loc>
			<image:caption>Buon Compleanno Android</image:caption>
			<image:title>Andoird</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/skype-down-impossibile-connettersi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/skype.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>skype</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-introduce-il-nuovo-tasto-non-mi-piace.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/non-mi-piace.png</image:loc>
			<image:caption>Il Nuovo Tasto Facebook</image:caption>
			<image:title>Non Mi Piace</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/le-novita-di-ios-9.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/iOS-9-main.png</image:loc>
			<image:caption>Le nuove funzionalità di iOS 9</image:caption>
			<image:title>iOS 9</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/semrush-che-cos%e2%80%99e.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/mqdefault.jpg</image:loc>
			<image:caption>A cosa serve SEMRush</image:caption>
			<image:title>SEMRush</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/download.png</image:loc>
			<image:caption>Cos'è SemRush</image:caption>
			<image:title>SEMRush</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/carrelli-elevatori-robot-entrano-cantieri.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/carrelli-elevatori-tecnologici.png</image:loc>
			<image:caption></image:caption>
			<image:title>Carrelli Elevatori Robotizzati</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-telefono-equo-e-solidale-fairphone2.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/fairphone-2-clip.jpg</image:loc>
			<image:caption></image:caption>
			<image:title></image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/image.jpg</image:loc>
			<image:caption>Il telefono equo e solidale</image:caption>
			<image:title>FairPhone 2</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/microsoft-prepara-il-debutto-di-office-2016.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/office-2016_story.jpg</image:loc>
			<image:caption>Il debutto di Office 2016</image:caption>
			<image:title>Office 2016</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/microsoft-apple-la-lotta-alla-privacy.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/09/image7281216_t.jpg</image:loc>
			<image:caption>Tutela della Privacy</image:caption>
			<image:title>Tutela della Privacy</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/amazon-prime-day-amazon-festeggia-20-anni-con-il-prime-day.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/07/amazon-prime-day.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Amazon Prime Day</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/citta-robot-m-city.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/05/citta-robot-m-city.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>M City Città dei Robot</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/expo-2015-anonymous-attacca-biglietteria-online.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/05/expo-2015-biglietteria-anonymous.png</image:loc>
			<image:caption></image:caption>
			<image:title>Expo 2015 - Anonymous</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/amazon-futuro-in-mano-ingegneri.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/amazon-picking-challenge.png</image:loc>
			<image:caption></image:caption>
			<image:title>Amazon Picking Challenge</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/picking_challenge.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Amazon Picking Challenge</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/saturday-night-fathers-web-series-ford.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/ford-saturday-night-fathers.png</image:loc>
			<image:caption></image:caption>
			<image:title>Ford Kuga Saturday Night Fathers</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tre-lancia-lofferta-all-in-300-payback.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/h3g.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>h3g</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/grande-cinema-payback.png</image:loc>
			<image:caption></image:caption>
			<image:title>Grande Cinema con Payback</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/h3g-offerta-all-in-payback.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Offerta Telefonica H3G</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-app-conference-call-gmeet.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/gmeet2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Conference Call con GMeet</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/app-conference-call-gmeet.png</image:loc>
			<image:caption></image:caption>
			<image:title>App Conference Call GMeet</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cicret-bracelet-video-primo-prototipo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/cicret-bracelet-prototipo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Cicret Bracelet Prototipo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/app-android-su-pc.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/app-android-pc.png</image:loc>
			<image:caption></image:caption>
			<image:title>App Android us PC</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/spiare-cellulare-atto-prevenzione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/spiare-cellulare-smartphone-mspy.png</image:loc>
			<image:caption></image:caption>
			<image:title>Spiare un Cellulare con mSpy</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/whatsapp-pc-disponibile-per-tutti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/whatsapp-pc-app-mobile.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>WhatsApp PC con WhatsApp Web</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/migliori-siti-streaming-film-italiano-senza-limiti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/streaming-film-senza-limiti.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Streaming Film Senza Limiti</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/elenco-migliori-siti-download-torrent-italiano.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/download-torrent-film-italiano.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Download Torrent Italiani</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sky-go-desktop-e-mobile-i-problemi-frequenti-dello-streaming.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/04/sky-go-sky-streaming-mobile.png</image:loc>
			<image:caption></image:caption>
			<image:title>Sky Go - Streaming Sky</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/perche-il-server-cloud-e-il-prodotto-delle-imprese-di-oggi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/03/seeweb-cloud-server.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Seeweb Cloud Server</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/web-e-couponing-un-binomio-ancora-valido.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/02/social-couponing.png</image:loc>
			<image:caption></image:caption>
			<image:title>Social Couponing</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/whatsapp-chiamate-gratis-arrivo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/01/whatsapp-telefonate-skype.png</image:loc>
			<image:caption></image:caption>
			<image:title>Telefonate Skype WhatsApp</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/seo-tips-velocizzare-il-caricamento-delle-pagine-del-proprio-sito-web.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/logo-scelto.png</image:loc>
			<image:caption></image:caption>
			<image:title>Hosting WordPress WpSEO.it</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/traduttore-skype-arrivo-la-traduzione-tempo-reale-delle-conversazioni.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/01/traduttore-skype.png</image:loc>
			<image:caption></image:caption>
			<image:title>traduttore-skype</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/01/come-funziona-traduttore-skype.jpg</image:loc>
			<image:caption>Come Funziona il Traduttore di Skype</image:caption>
			<image:title>Come Funziona il Traduttore di Skype</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2015/01/skype-traduttore.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Traduttore Skype</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-spiare-un-cellulare.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/spiare-cellulare.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Spiare Cellulare</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/keystrokes-kidlogger.jpg</image:loc>
			<image:caption>Elenco dei tasti digitati sul dispositivo (keylogging)</image:caption>
			<image:title>Spiare Keylogger Cellulare</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/spiare-cronologia-web-cellulare.jpg</image:loc>
			<image:caption>Elenco di tutti gli ultimi siti visitati</image:caption>
			<image:title>Spiare Cronologia Web Cellulare</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/spiare-coordinate-gps-cellulare.png</image:loc>
			<image:caption>Elenco di tutti gli spostamenti monitorati tramite il GPS</image:caption>
			<image:title>Spiare Coordinate GPS Cellulare</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/spiare-chiamate-cellulare.jpg</image:loc>
			<image:caption>Elenco delle chiamate in Entrata e in Uscita con relativi numeri di telefono</image:caption>
			<image:title>Spiare Chiamate Cellulare</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/spiare-applicazioni-cellulare.jpg</image:loc>
			<image:caption>Elenco delle applicazioni più utilizzate sul cellulare</image:caption>
			<image:title>Spiare Applicazioni Cellulare</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/registrare-chiamate-cellulare.jpg</image:loc>
			<image:caption>Possibilità di salvare su file tutte le chiamate ricevute ed effettuate</image:caption>
			<image:title>Registrare Chiamate Cellulare</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/tabella-comparativa-kidlogger.png</image:loc>
			<image:caption></image:caption>
			<image:title>Tabella Comparativa KidLogger</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/come-spiare-un-cellulare-kidlogger-2.png</image:loc>
			<image:caption></image:caption>
			<image:title>come-spiare-un-cellulare-kidlogger-2</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/come-spiare-un-cellulare-kidlogger-1.png</image:loc>
			<image:caption></image:caption>
			<image:title>KidLogger - Aggiunta Dispositivo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/spagna-dopo-la-chiusura-di-google-news-calo-del-15.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/google-news.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google News Spagna</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cicret-bracelet-rendi-touch-la-tua-pelle-altro-che-smartwatch.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/cicret_bracelet-colori.jpg</image:loc>
			<image:caption>Tutti i colori in cui è disponibile il Cicret Bracelet</image:caption>
			<image:title>Colori Cicret Bracelet</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/cicret_bracelet-working.png</image:loc>
			<image:caption>Cicret Bracelet in funzione</image:caption>
			<image:title>Cicret Bracelet</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/cicrect-bracelet-scheda-tecnica.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Scheda Tecnica Cicret Bracelet</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/cicret_bracelet-1.png</image:loc>
			<image:caption></image:caption>
			<image:title>Cicret Bracelet</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/cicret_bracelet.png</image:loc>
			<image:caption></image:caption>
			<image:title>Cicret Bracelet</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-car-presentata-ieri-lauto-che-si-guida-da-sola.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/google-car-prototipo.png</image:loc>
			<image:caption>Il prototipo di Maggio 2014</image:caption>
			<image:title>Prototipo Google Car</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/google-car.jpeg</image:loc>
			<image:caption>Prototipo definitivo Google Car</image:caption>
			<image:title>Google Car</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/google-car-2.jpeg</image:loc>
			<image:caption>Prototipo definitivo Google Car</image:caption>
			<image:title>Google Car</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/samsung-gear-s-lo-smartphone-da-polso.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/samsung-gear-s.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Samsung Gear S</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/parrot-il-regalo-di-natale-geek-per-bambini-di-30-anni.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/parrot-jumping-sumo-wheels.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Configurazione Ruote Parrot Jumping Sumo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/parrot-sumo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Parrot Jumping Sumo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/parrot-droni-jumping-sumo.png</image:loc>
			<image:caption></image:caption>
			<image:title>Parrot Jumping Sumo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/regin-il-virus-spia-dei-servizi-segreti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/regin-virus-spia.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Regin Virus</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-contributor-pagare-per-non-vedere-la-pubblicita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/google-contributor.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Contributor</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/previsioni-meteo-e-oroscopi-le-parole-piu-cercate-su-yahoo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/yahoo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Yahoo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/blablacar-come-funziona.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/BlaBlaCar.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>BlaBlaCar</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sheldon-cooper-entra-nel-lab-intel.guarda-il-video.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/sheldon_cooper.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Sheldon Cooper</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonymous-attacca-siti-della-polizia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/anonymous.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Anonymous</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/amazon-echo-un-maggiordomo-sempre-disponibile.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/12/amazon-echo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Amazon Echo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/servizi-cloud-evoluzione-server-virtuale-vps-cloud-server.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/11/Servizi-Cloud.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Servizi Cloud</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hackinbo-bologna-si-parla-sicurezza-informatica.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/09/hackinbo-winter-edition-2014.png</image:loc>
			<image:caption></image:caption>
			<image:title>HackInBo Winter Edition 2014</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iphone-6-plus-deformato-bufala-verita-video.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/09/iphone-6-plus-bentgate-04.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>iphone-6-plus-bentgate-04</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/09/iphone-6-plus-deformato.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>iphone-6-plus-deformato</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/09/iphone-6-plus-bend.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>iphone-6-plus-bend</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/09/iphone-6-plus-test-deformazione.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>iphone-6-plus-test-deformazione</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/global-gaming-expo-g2e-2014-e-alle-porte.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/09/global-gaming-expo-g2e-22.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>Global Gaming Expo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/quando-eseguire-backup-online-questione-fiducia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/08/configurazione_dns_ok.png</image:loc>
			<image:caption></image:caption>
			<image:title>configurazione_dns_ok</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/08/Cloud-Backup-backup-online-sicuro.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Cloud Backup, backup online sicuro</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/raspberry-pi-arriva-il-nuovo-modello-b.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/07/raspberry-pi-b.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>raspberry-pi-b</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/amazon-kindle-unlimited-9-dollari-per-600mila-libri.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/07/amazon-kindle-unlimited.png</image:loc>
			<image:caption></image:caption>
			<image:title>amazon-kindle-unlimited</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ritot-smartwatch-dispositivo-futuristico.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/07/ritot-smartwatch.png</image:loc>
			<image:caption></image:caption>
			<image:title>ritot-smartwatch</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-chrome-consuma-batteria-dei-portatili.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/07/google-chrome-batteria.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-chrome-batteria</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/migliori-app-meteo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/07/app-meteo-accuweather.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>app-meteo-accuweather</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/display-ultrasottili-flessibili-i-nanopixel.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/07/display-nanopixel-flessibili.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>display-nanopixel-flessibili</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-play-store-report-app-annie.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/07/google-play-store.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-play-store</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-domains-servizio-hosting-bigg.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/07/Google-Domains.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google-Domains</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/opera-broswer-ufficiale-nokia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/06/opera-mobile.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>opera-mobile</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/06/opera-mobile-Nokia-X2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>opera-mobile-Nokia-X2</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/samsung-apps-diventa-galaxy-apps.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/06/samsung-apps.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>samsung-apps</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/reali-vite-sui-social-network.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/06/what_s_on_your_mind.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>what_s_on_your_mind</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hackinbo-2014-si-riconferma-evento-qualita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/05/hackinbo.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>hackinbo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/05/hackinbo-2014.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>hackinbo-2014</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hackinbo-2-evento-sicurezza-informatica-gratuito.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/04/hackinbo-sicurezza-informatica.png</image:loc>
			<image:caption></image:caption>
			<image:title>hackinbo-sicurezza-informatica</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/streaming-film-quando-sequestro-record-diventa-flop.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/03/i-will-not-illegally-download-this-movie.png</image:loc>
			<image:caption></image:caption>
			<image:title>i-will-not-illegally-download-this-movie</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/deftcon-2014-appuntamento-11-aprile.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/03/defta_logo_funebre.png</image:loc>
			<image:caption></image:caption>
			<image:title>defta_logo_funebre</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/03/deft_logo.png</image:loc>
			<image:caption></image:caption>
			<image:title>deft_logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sicurezza-sul-web-38-traffico-rete-generato-dagli-umani.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/03/sicurezza-web.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>sicurezza-web</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/streaming-film-sequestrati-46-siti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/03/streaming-sequestro-guardia-di-finanza.png</image:loc>
			<image:caption></image:caption>
			<image:title>streaming-sequestro-guardia-di-finanza</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/italia-connettivita-mobile-250mb-adsl-resta-4mb.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/03/adsl.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>adsl</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/03/statistiche-banda-larga.png</image:loc>
			<image:caption></image:caption>
			<image:title>statistiche-banda-larga</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/whatsappdown-video-parodia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/03/whatsappdown-video-parody.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>whatsappdown-video-parody</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wordpress-banner-adsense-li-gestisce-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/02/adsense-banner-reattivo-beta.png</image:loc>
			<image:caption></image:caption>
			<image:title>adsense-banner-reattivo-beta</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/02/adsense-google-publisher-plugin-wordpress.png</image:loc>
			<image:caption></image:caption>
			<image:title>adsense-google-publisher-plugin-wordpress</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/02/google-publisher-wordpress-plugin.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-publisher-wordpress-plugin</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/whatsapp-e-di-facebook-e-ora.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/02/facebook-whatsapp.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-whatsapp</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/endlessplay-un-cuore-social-per-la-playstation-4.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/02/endlessplay-ps-4.png</image:loc>
			<image:caption></image:caption>
			<image:title>endlessplay-ps-4</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/yahoo-mail-sotto-attacco-hacker-reset-password-per-tutti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/02/Yahoo_Logo.png</image:loc>
			<image:caption></image:caption>
			<image:title>Yahoo_Logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/angry-birds-nsa-spiava-giocatori.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/01/nsa-angry-birds-2.png</image:loc>
			<image:caption></image:caption>
			<image:title>nsa-angry-birds-2</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/01/nsa-angry-birds.png</image:loc>
			<image:caption></image:caption>
			<image:title>nsa-angry-birds</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/baboom-streaming-musicale-marchiato-kim-dotcom.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/01/baboom-streaming-musica.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>baboom-streaming-musica</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/film-streaming-legali-la-soluzione-e-infinity.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/01/infinity-film-streaming.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>infinity-film-streaming</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/01/infinity-film-streaming-scheda-film.png</image:loc>
			<image:caption></image:caption>
			<image:title>infinity-film-streaming-scheda-film</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/target-rubati-oltre-70-milioni-di-dati-sensibili.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/01/target.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>target</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/lo-sport-sul-cellulare-attraverso-le-app.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/01/sport-smartphone.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>sport-smartphone</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-spia-messaggi-privati-gli-utenti-reagiscono.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/01/facebook-spia-messaggi.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-spia-messaggi</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-vedere-film-streaming-senza-limitazioni.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/01/supported-host-realdebrid-premium.jpg</image:loc>
			<image:caption>Tra i più diffusi vanno citati: NowDownload,NowVideo,PutLocker,ZippyShare,YouPorn, FileFactory</image:caption>
			<image:title>supported-host-realdebrid-premium</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/01/realdebridlogo.png</image:loc>
			<image:caption></image:caption>
			<image:title>realdebridlogo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2014/01/reald-debrid-streaming.jpg</image:loc>
			<image:caption>Una volta inserito il link originale RealDebrid genera un nuovo link che permette di vedere e scaricare il film come utente Premium,alla massima velocità</image:caption>
			<image:title>reald-debrid-streaming</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/jailbreak-ios-7-come-effettuarlo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/12/jailbreak-ios-7-evasi0n.png</image:loc>
			<image:caption></image:caption>
			<image:title>jailbreak-ios-7-evasi0n</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/webtax-cose-la-dobbiamo-pagare.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/12/google-webtax.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-webtax</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-social-search-funzionera.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/12/wordpress-hosting-wpseo.png</image:loc>
			<image:caption>Esempio di Google Social Search: cercando &quot;wordpress hosting&quot; vengono elencati anche post di Google+ sull'argomento</image:caption>
			<image:title>wordpress-hosting-wpseo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/12/google_social_search.png</image:loc>
			<image:caption></image:caption>
			<image:title>google_social_search</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/giochi-e-la-competizione-sul-web.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/12/seo-gambling.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>seo-gambling</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/errori-dei-rich-snippets-nei-gwt.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/12/sdd-page-details.png</image:loc>
			<image:caption></image:caption>
			<image:title>sdd-page-details</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/12/sdd-errors.png</image:loc>
			<image:caption></image:caption>
			<image:title>sdd-errors</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/12/google-webmaster-tools.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-webmaster-tools</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/steve-jobs-raccontato-da-tg2-dossier.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/12/steve-jobs.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>steve-jobs</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/whatsapp-down-e-la-rete-ironizza.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/12/whatsapp.png</image:loc>
			<image:caption></image:caption>
			<image:title>whatsapp</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/pagerank-aggiornato-finalmente.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/12/google-pagerank.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-pagerank</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/un-drone-bussera-alla-tua-porta-con-amazon-prime-air.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/12/amazon-prime-air-drone.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>amazon-prime-air-drone</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tablet-o-notebook-ibridi-di-qualita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/12/sony-vaio-tap.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>sony-vaio-tap</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/dropbox-2.4-tutte-le-novita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/dropbox-logo.png</image:loc>
			<image:caption></image:caption>
			<image:title>dropbox-logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/skype-per-windows-8-1.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/Microsoft-Windows-8.1-Skype.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Microsoft-Windows-8.1-Skype</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/Skype-for-Windows-8-RT-1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Skype-for-Windows-8-RT-1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/penmode-cresce-e-arriva-alla-versione-2.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/penmode2.png</image:loc>
			<image:caption></image:caption>
			<image:title>penmode2</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/penmode2-logo.png</image:loc>
			<image:caption></image:caption>
			<image:title>penmode2-logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/android-kit-kat-4.4-addio-dalvik-benvenuta-art.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/android-kitkat-4.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>android-kitkat-4</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wcap-2013-awards-stay-funky.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/working-capital-2013.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>working-capital-2013</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/internet-bug-bounty-la-caccia-e-aperta.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/internetbigbounty.png</image:loc>
			<image:caption></image:caption>
			<image:title>Internet Big Bounty</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nexus-8-colpo-gobbo-o-bufala.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/google-nexus-8.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-nexus-8</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-introduce-gli-hashtag-nella-ricerca.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/google-hashtag-search.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>google-hashtag-search</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/google-hashtags.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-hashtags</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/la-psicologia-dei-colori-nel-web-marketing.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/color-emotion-guide.png</image:loc>
			<image:caption></image:caption>
			<image:title>color-emotion-guide</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/web-marketing-color.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>web-marketing-color</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/steve-wozniak-ancora-pro-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/steve-wozniak-google.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>steve-wozniak-google</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-debutto-di-nexus-5-firmato-kitkat.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/google-nexus-5.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-nexus-5</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/multa-per-la-donna-che-indossava-google-glass-al-volante.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/google-glass-macro.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-glass-macro</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/11/multa-google-glass.png</image:loc>
			<image:caption></image:caption>
			<image:title>multa-google-glass</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-primo-atm-bitcoin-vancouver.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/bitcoin-atm.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>bitcoin-atm</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/microsoft-glass-la-sfida-ai-google-glass-ha-inizio.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/microsoft-smart-glasses.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>microsoft-smart-glasses</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/fotolibri-funzionano-i-software-realizzazione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/Sitoweb-FotolibroCewe.png</image:loc>
			<image:caption></image:caption>
			<image:title>Sitoweb-FotolibroCewe</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/ScreenShot013.png</image:loc>
			<image:caption></image:caption>
			<image:title>ScreenShot013</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/ScreenShot010.png</image:loc>
			<image:caption></image:caption>
			<image:title>ScreenShot010</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-web-dice-addio-ad-isohunt.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/isoHunt-Is-Down-Accuses-Tech-Problems.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>isoHunt-Is-Down-Accuses-Tech-Problems</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/quale-sicurezza-abbiamo-bisogno.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/nuova-forma-security.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>nuova-forma-security</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cliente-banca-intesa-qualcuno-ha-visto-il-saldo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/problema-tecnico-intesa-sanpaolo-internet-banking.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>problema-tecnico-intesa-sanpaolo-internet-banking</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-hacknight-italia-sera-roma.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/facebook-hacknight.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-hacknight</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/rilevato-malware-php.net.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/bug-php_net-malware.png</image:loc>
			<image:caption></image:caption>
			<image:title>bug-php_net-malware</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/twittter-php-net.png</image:loc>
			<image:caption></image:caption>
			<image:title>twittter-php-net</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/php_net-malware.png</image:loc>
			<image:caption></image:caption>
			<image:title>php_net-malware</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-la-difesa-della-liberta-espressione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/google-uproxy.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-uproxy</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/digital_attack_map.png</image:loc>
			<image:caption></image:caption>
			<image:title>digital_attack_map</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/privacy-ed-intercettazioni-francia-vs-usa.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/snowden.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>snowden</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anche-google-aggiorna-le-norme-sulla-privacy.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/Eric-Schmidt-privacy.png</image:loc>
			<image:caption></image:caption>
			<image:title>Eric-Schmidt-privacy</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/Google-Privacy-Policy.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google-Privacy-Policy</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-limita-la-privacy.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/facebook-privacy-search-graph.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-privacy-search-graph</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-chromecast-piu-disponibile-italia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/Google_Chromecast.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google_Chromecast</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-chromecast-la-chiavetta-hdmi-lo-streaming-mobile.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/chromecast.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>chromecast</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-colibri-nuovo-algoritmo-ricerca.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/Hummingbird-Google.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Hummingbird-Google</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/innovazione-amazon-kindle-fire-hdx.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/amazon-fire-hdx.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>amazon-fire-hdx</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/amazon.png</image:loc>
			<image:caption></image:caption>
			<image:title>amazon</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/gtstudy-bologna-2013-cosa-si-parlato.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/evento-seo-gtstudy-giorgiotave.png</image:loc>
			<image:caption></image:caption>
			<image:title>evento-seo-gtstudy-giorgiotave</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/gtstudy.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>gtstudy</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/eventogt-200x200.png</image:loc>
			<image:caption></image:caption>
			<image:title>eventogt-200x200</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/progressive-responsive.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>progressive-responsive</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iphone5s-o-iphone5c-chi-il-piu-resistente.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/will-it-blend-iphone5s-iphone5c.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>will-it-blend-iphone5s-iphone5c</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iphone-5s-5c-confronto-quale-scegliere.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/10/iphone5c.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>iphone5c</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nexus-5-il-punto-della-situazione-sulle-specifiche-tecniche.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/09/front1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Nexus-5-rumors</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hackinbo-ecco-come-e-andata.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/09/hackinbo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>hackinbo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/09/hackinbo-relatori.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>hackinbo-relatori</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/italia-piu-social-degli-usa.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/09/social-network.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>social-network</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/09/Grafico-2_Ricerca-LiveXtension.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Grafico 2_Ricerca LiveXtension</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/09/Grafico-1_Ricerca-LiveXtension.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Grafico 1_Ricerca LiveXtension</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-copia-twitter-arrivano-i-trend.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/09/trendic-topic-facebook.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>trendic-topic-facebook</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/09/trend-twitter.png</image:loc>
			<image:caption></image:caption>
			<image:title>trend-twitter</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/09/facebook-trend.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-trend</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/25mila-euro-per-la-tua-idea-wpcap2013-scade-il-30-settembre.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/working-capital-2013.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>working-capital-2013</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hackinbo-il-primo-evento-sulla-sicurezza-informatica-a-bologna.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/hackinbo-sicurezza-informatica-bologna.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>hackinbo-sicurezza-informatica-bologna</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/streaming-we-steal-secrets-the-story-of-wikileaks.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/wikileaks.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>wikileaks</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/we-steal-secrets-wikileaks.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>we-steal-secrets-wikileaks</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/pirate-bay-festeggia-i-10-anni-con-un-browser-anti-censura.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/The-Pirate-Bay.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>The-Pirate-Bay</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nuovi-strumenti-seo-da-google-e-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/seo-tools.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>seo-tools</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/facebook-embed-post.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-embed-post</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/facebook-embed-post-code.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-embed-post-code</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/google-webmaster-tool-azioni-manuali.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-webmaster-tool-azioni-manuali</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-aggiorna-i-risultati-di-ricerca-con-in-depth.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/google-logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/google-in-depth-snippets.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-in-depth-snippets</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/google-in-depth-feature.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-in-depth-feature</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cellulare-rubato-android-device-manager.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/android-device-manager.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>android-device-manager</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/invia-notifica-android-device-manager.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>invia-notifica-android-device-manager</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/messaggi-vocali-su-whatsapp.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/messaggi-vocali-whatsapp.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>messaggi-vocali-whatsapp</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/robot-wall-e-esiste-ecco-il-video.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/wall-e-robot.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>wall-e-robot</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tortilla-navighiamo-anonimi-con-tor.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/tortilla-adapter.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>tortilla-adapter</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/tortilla.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>tortilla</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/tor-tortilla.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>tor-tortilla</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-big-bounty-pagati-oltre-1-milione-di-dollari.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/facebook-big-bounty-white-hat.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-big-bounty-white-hat</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wordpress-rilascia-la-versione-3_6-oscar.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/08/wordpress-3_6.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>wordpress-3_6</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iflex-concept-di-smartphone-flessibile.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/iFlex-2.png</image:loc>
			<image:caption></image:caption>
			<image:title>iFlex 2</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-in-arrivo-il-tasto-non-mi-piace.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/facebook-dislike.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-dislike</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/dislike-facebook.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>dislike-facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/chromecast-tv-come-monitor-dello-smartphone.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/google-chromecast.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-chromecast</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/safe-twiit-antivirus-per-twitter.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/safe_twiit-fsecure.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>safe_twiit-fsecure</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/video-della-presentazione-di-android-4.3-e-nexus-7-ii.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/nexus-4-android-4.31.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>nexus-4-android-4.31</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/auto-a-rischio-hacking.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/car-hackers.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>car-hackers</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/traduzione-in-tempo-reale-ci-siamo-quasi-parola-di-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/google-now.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-now</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/arrivano-nexus-7-ii-e-android-4.3.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/new-nexus-7.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>new-nexus-7</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/youtube-geek-week-per-celebrare-la-cultura-geek-e-nerd.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/youtube-geek-week.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>youtube-geek-week</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/viber-hackerata-spiano-e-tracciano-gli-utenti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/viber-logo.png</image:loc>
			<image:caption></image:caption>
			<image:title>viber-logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/sea-viber-hacker-tweet.png</image:loc>
			<image:caption></image:caption>
			<image:title>sea-viber-hacker-tweet</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/syrian-electronic-army-support-viber-hacked.png</image:loc>
			<image:caption></image:caption>
			<image:title>syrian-electronic-army-support-viber-hacked</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sicurezza-sim-750-milioni-di-utenti-a-rischio.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/hacker-sim.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>hacker-sim</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/red-hack-documentario-hacker.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/red-hack-video-ita.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>red-hack-video-ita</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hacker-come-spiare-un-cellulare.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/verizon-hacker-mobile-phone.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>verizon-hacker-mobile-phone</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/verizon-femtocell-gsm-spy-hack.png</image:loc>
			<image:caption></image:caption>
			<image:title>verizon-femtocell-gsm-spy-hack</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-panda-e-in-azione-in-queste-ore.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/google-panda-update.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-panda-update</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/porno-piu-difficili-da-trovare-su-tumblr.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/porno-tumblr-yahoo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>porno-tumblr-yahoo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/tumblr-porn-adult-blog.png</image:loc>
			<image:caption></image:caption>
			<image:title>tumblr-porn-adult-blog</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/lotta-alla-pirateria-google-taglia-i-pagamenti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/piracy-google-stop.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>piracy-google-stop</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-glass-scoperta-vulnerabilita-di-sicurezza.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/sicurezza-google-glass-qr-code-malevolo.png</image:loc>
			<image:caption></image:caption>
			<image:title>sicurezza-google-glass-qr-code-malevolo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/auto-che-si-guida-da-sola-google-car-no-vislab.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/vislab-auto-che-si-guida-da-sola.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>vislab-auto-che-si-guida-da-sola</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/prism-snowden-e-il-datagate-il-punto-della-situazione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/snowden-prism-datagate.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>snowden-prism-datagate</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sicurezza-facebook-trovata-vulnerabilita-critica.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/dan-melamed-facebook-vulnerability.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>dan-melamed-facebook-vulnerability</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/le-banche-sono-social-i-risultati-della-ricerca-di-social-minds.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/social-minds.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>social-minds</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/privacy-e-social-media-arrestato-per-un-commento-su-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/facebook-justin-carter.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-justin-carter</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-sarebbe-il-mondo-senza-smartphone.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/qualcomm-world-without-smartphone.png</image:loc>
			<image:caption></image:caption>
			<image:title>qualcomm-world-without-smartphone</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/prezzi-ebook-alti-apple-condannata.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/apple.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>apple</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/francia-hadopi-fallisce-i-pirati-restano-online.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/hadopi-france.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>hadopi-france</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-plus-gia-secondo-social-network-mondiale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/Google-Plus.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google-Plus</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ricercatori-israeliani-creano-la-prima-pelle-artificiale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/artificial-skin.png</image:loc>
			<image:caption></image:caption>
			<image:title>artificial-skin</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/guida-seo-per-inserire-sito-in-bing-news.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/bing.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>bing</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/google-news-serp.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-news-serp</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/vulnerabile-u.s-emergency-alert-system-eas.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/emergency-alert-system.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>emergency-alert-system</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/priyanka-un-nuovo-virus-per-whatsapp.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/Priyanka-Whatsapp.png</image:loc>
			<image:caption></image:caption>
			<image:title>Priyanka-Whatsapp</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/whatsapp.png</image:loc>
			<image:caption></image:caption>
			<image:title>whatsapp</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/whatsapp-priyanka.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>whatsapp-priyanka</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-graph-search-il-nuovo-motore-di-ricerca-di-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/facebook-graph-search.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-graph-search</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-app-gratis-per-i-5-anni-app-store.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/apple-festeggia-5-anni-app-store-app-gratis.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>apple-festeggia-5-anni-app-store-app-gratis</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/blackberry-q10-uno-smartphone-in-giacca-e-cravatta.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/blackberry-q10.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>blackberry-q10</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/blackberry-hub-example.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>blackberry-hub-example</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/darkleech-exploit-apache-infetta-siti-con-codice-malevolo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/apache-darkleech-code-malware.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>apache-darkleech-code-malware</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-glass-video-domande-e-risposte.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/google-glass-question-answer.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-glass-question-answer</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-glass-faq-mountain-view-risponde-agli-utenti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/google-glass-faq.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-glass-faq</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mega-app-ufficiale-per-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/mega-android-app.png</image:loc>
			<image:caption></image:caption>
			<image:title>mega-android-app</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/klout-integra-bing-come-fattore-di-ranking.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/klout-bing-integration.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>klout-bing-integration</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/quanto-e-resistente-il-nuovo-blackberry-q10.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/BlackBerry-Q10.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>BlackBerry-Q10</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/annunciati-i-primi-smartphone-con-firefox-os.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/07/zte-launches-open.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>zte-launches-open</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/microsoft-security-bounty-programs-100000-dollari-vulnerabilita-sicurezza.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/microsoft.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>microsoft</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-hacker-violare-un-account-con-un-sms.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/facebook-hacker-bug.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-hacker-bug</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/facebook-sms-4.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-sms-4</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/twitter-andes-arrivano-le-mappe-3d-dei-tweet-geolocalizzati.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/twitter-map.png</image:loc>
			<image:caption></image:caption>
			<image:title>twitter-map</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/twitter-geotagged-map.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>twitter-geotagged-map</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hacker-anonymous-attaccano-il-sito-di-casaleggio.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/casaleggio-deface.png</image:loc>
			<image:caption></image:caption>
			<image:title>casaleggio-deface</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/casaleggio-deface.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>casaleggio-deface</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-e-la-sicurezza-dei-siti-in-italia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/google-hacked-website.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-hacked-website</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/top-web-hosting-italy.png</image:loc>
			<image:caption></image:caption>
			<image:title>top-web-hosting-italy</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/google-malware-global-report.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-malware-global-report</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/stampa-3d-nativa-in-windows-8.1.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/Afinia_H-Series_3D_Printer.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Afinia_H-Series_3D_Printer</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bing-for-developers-rivoluzione-targata-microsoft-in-arrivo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/bing_for_developers.png</image:loc>
			<image:caption></image:caption>
			<image:title>bing_for_developers</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ouya-la-console-android-a-soli-100-dollari.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/ouya-android-console.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>ouya-android-console</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/app-terremoto-aggiornamenti-in-tempo-reale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/terremoti-italia-app.png</image:loc>
			<image:caption></image:caption>
			<image:title>terremoti-italia-app</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/malware-android-tiene-in-ostaggio-il-cellulare.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/android-fakeav-malware.png</image:loc>
			<image:caption></image:caption>
			<image:title>android-fakeav-malware</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-seo-in-arrivo-la-dashboard-beta-per-gli-structured-data.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/google-webmaster-tools.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-webmaster-tools</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/new-structured-data-google.png</image:loc>
			<image:caption></image:caption>
			<image:title>new-structured-data-google</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/robotica-fai-da-te-con-rapiro-e-raspberry-pi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/rapiro-raspberry-pi-robot.png</image:loc>
			<image:caption></image:caption>
			<image:title>rapiro-raspberry-pi-robot</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/rapiro-raspberry-pi-robot1.png</image:loc>
			<image:caption></image:caption>
			<image:title>rapiro-raspberry-pi-robot1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-bug-potrebbe-aver-esposto-6-milioni-di-dati-personali.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/facebook-download-your-information-bug.png</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-download-your-information-bug</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-project-loon-copertura-internet-globale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/project_loon.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>project_loon</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/uno-dei-fondatori-di-the-pirate-bay-condannato-a-due-anni.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/Gottfrid_Svartholm_Warg.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Gottfrid_Svartholm_Warg</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/matt-cutts-annuncia-aggiornamenti-seo-e-nuove-penalizzazioni.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/Google-Penguin-Update.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google-Penguin-Update</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/webreevolution-festival-webmarketing-community-gt.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/web_reevolution_giorgiotave.png</image:loc>
			<image:caption></image:caption>
			<image:title>web_reevolution_giorgiotave</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/keylogger-cosa-sono-e-come-difendersi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/key_logger_installed.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>key_logger_installed</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tecnologia-e-connettivita-dentro-e-fuori-italia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/VOIP_banner1.gif</image:loc>
			<image:caption></image:caption>
			<image:title>VOIP_banner1</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/PastNowFuture.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>PastNowFuture</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/la-guerra-di-kim-dotcom.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/kim-dotcom-megaupload-face.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>kim-dotcom-megaupload-face</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/mega-cloud-storage.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>mega-cloud-storage</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/majesticseo-rende-gratuito-site-explorer.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/majestic_seo_logo.png</image:loc>
			<image:caption></image:caption>
			<image:title>majestic_seo_logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/smartphone-quanto-sono-robusti-galaxy-s4-e-iphone-5.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/galaxy_s4-iphone5.png</image:loc>
			<image:caption></image:caption>
			<image:title>galaxy_s4-iphone5</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/arrivano-gli-hashtags-su-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/facebook_hashtags.png</image:loc>
			<image:caption></image:caption>
			<image:title>facebook_hashtags</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/torrent-come-ottimizzare-la-velocita-di-download.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/SeedTest-09.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>SeedTest-09</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/torrent_crittografia.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>torrent_crittografia</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/impostazione_torrent.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>impostazione_torrent</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/bittorrent-sito-torrent.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>bittorrent-sito-torrent</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/strumenti-di-analytics-cambieranno-il-concetto-di-sicurezza-informatica.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/rsaconference.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>rsaconference</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/progetto-prism-lamerica-spia-i-grandi-portali-del-web.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/edward-snowden.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>edward-snowden</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/project-prism.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>project-prism</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/prism-slide-5.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>prism-slide-5</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/prism-slide-4.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>prism-slide-4</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/prism-slide-2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>prism-slide-2</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/prism-slide-1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>prism-slide-1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/dopo-il-tentativo-di-facebook-waze-e-di-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/google_waze.png</image:loc>
			<image:caption></image:caption>
			<image:title>google_waze</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/malwarebytes-chiede-agli-utenti-di-non-usare-software-pirata.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/dontsteal-malwarebytes.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>dontsteal-malwarebytes</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/spagna-trojan-come-strumenti-per-le-intercettazioni.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/big-brother-is-watching-you.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>big-brother-is-watching-you</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ios7-concept-interattivo-da-provare-online.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/ios7.png</image:loc>
			<image:caption></image:caption>
			<image:title>ios7</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-glass-e-i-social-network.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/google-glass-sdk.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-glass-sdk</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-puo-prevedere-i-successi-al-botteghino.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/google.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/dotadv-una-start-up-romana-ripensa-ladvertising-on-line.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/dotadv-startup.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>dotadv-startup</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bag2go-valigia-tecnologica-che-non-perderete-mai.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/back2go_valigia.png</image:loc>
			<image:caption></image:caption>
			<image:title>back2go_valigia</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/fairphone-smartphone-prodotto-grazie-al-crowdfunding.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/fairphone-concept-smartphone-ethic.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>fairphone-concept-smartphone-ethic</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/arriva-il-nuovo-gmail-4.5-per-android-apk-download.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/gmail-android-4-5.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>gmail-android-4-5</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-rilascia-video-highlights-del-google-io-2013.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/google_io_2013.png</image:loc>
			<image:caption></image:caption>
			<image:title>google_io_2013</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/napster-ritorna-streaming-musica-legale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/napster-streaming-music.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>napster-streaming-music</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/alice-wpa-calculator-online/</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/11/SMS_banner1.gif</image:loc>
			<image:caption></image:caption>
			<image:title>SMS_banner1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/aircrack-ng-aggiornata-la-migliore-suite-per-il-cracking-wifi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/airodump-ng_interaction.gif</image:loc>
			<image:caption></image:caption>
			<image:title>airodump-ng_interaction</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/capn3m0-vi-saluta-per-fare-spazio-a-websec-it.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/logo-scelto.png</image:loc>
			<image:caption></image:caption>
			<image:title>WpSeo Hosting WordPress Power</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/Sorry-we-are-closed-sign.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Sorry-we-are-closed-sign</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/samsung-impronte-digitali-per-sbloccare-lo-smartphone.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/samsung-impronte-digitali.png</image:loc>
			<image:caption></image:caption>
			<image:title>samsung-impronte-digitali</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kim-doctom-gli-verranno-restituiti-i-dati-sequestrati.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/kim-dotcom-megaupload.png</image:loc>
			<image:caption></image:caption>
			<image:title>kim-dotcom-megaupload</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/06/kim_dotcom.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>kim_dotcom</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kindle-tv-di-amazon.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/amazon.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>amazon</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/drupal-hackerato-reset-password-utenti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/drupal-logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>drupal-logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-ios-7-concept-video.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/ios-7-concept.png</image:loc>
			<image:caption></image:caption>
			<image:title>ios-7-concept</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/major-cinematografiche-vogliono-usare-malware-contro-chi-scarica.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/malware.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>malware</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nuovo-malware-per-i-dispositivi-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/android-malware-security.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>android-malware-security</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/coworkingfor-il-primo-motore-di-ricerca-dedicato-al-coworking.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/coworkingfor-1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>coworkingfor (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/slitta-il-lancio-dello-smartphone-facebook-in-europa.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/facebook-smartphone-htc-first.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-smartphone-htc-first</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/eye-tracking-per-google-glass.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/google_glass.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google_glass</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/browseo-un-browser-seo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/BrowSEO.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>BrowSEO</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kim-dotcom-suo-il-brevetto-della-doppia-password.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/Kim-Dotcom-on-Mega-Hollyw-015.jpg</image:loc>
			<image:caption>Kim Dotcom: suo il brevetto della doppia password</image:caption>
			<image:title>Kim Dotcom: suo il brevetto della doppia password</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/social-case-history-forum-2013-quarta-edizione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/social-case-history-forum.png</image:loc>
			<image:caption></image:caption>
			<image:title>social-case-history-forum</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/novita-in-casa-pinterest-arrivano-i-rich-pin.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/rich-pins-pinterest.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>rich-pins-pinterest</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-lancia-una-nuova-versione-di-google-maps.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/new-google-map.png</image:loc>
			<image:caption></image:caption>
			<image:title>new-google-map</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mataerial-la-stampante-3d-che-non-soffre-la-gravita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/Mataerial-1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Mataerial stampante 3d</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/possibili-usi-google-glass-sanita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/dr_house-google-glass.png</image:loc>
			<image:caption></image:caption>
			<image:title>dr_house-google-glass</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-cala-il-consenso-tra-gli-adolescenti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/facebook-adolescenza.png</image:loc>
			<image:caption>Facebook: cala il consenso tra gli adolescenti</image:caption>
			<image:title>Facebook: cala il consenso tra gli adolescenti</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/xbox-one-microsoft-presenta-la-sua-nuova-console.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/xbox-one-bundle.jpg</image:loc>
			<image:caption>Xbox One: Microsoft presenta la sua nuova console </image:caption>
			<image:title>Xbox One: Microsoft presenta la sua nuova console </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-glass-app-new-york-times.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/nyt_google_glass.png</image:loc>
			<image:caption></image:caption>
			<image:title>nyt_google_glass</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nuovi-concept-per-la-tv-di-apple.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/appletv.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>appletv</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/un-successo-lungo-otto-anni-youtube.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/youtube-updates-platform-for-social-good-8bb4ae8a43.jpg</image:loc>
			<image:caption>Un successo lungo otto anni: YouTube</image:caption>
			<image:title>Un successo lungo otto anni: YouTube</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/lg-presentera-un-pannello-oled-flessibile.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/LG-OLED-flessibile_72861_1.jpg</image:loc>
			<image:caption>LG presenterà un pannello OLED flessibile </image:caption>
			<image:title>LG presenterà un pannello OLED flessibile </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-nuovo-gioiello-di-shuttle-all-in-one-barebone-x70s.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/shuttle_computer.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>shuttle_computer</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/instantcharge-ricaricare-batterie-smartphone-in-pochi-secondi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/eesha_khare-instantcharge.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>eesha_khare-instantcharge</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/yahoo-acquista-tumblr-per-11-miliardi-di-dollari.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/tumblr-logo.jpg</image:loc>
			<image:caption>Yahoo acquista Tumblr per 1,1 miliardi di dollari</image:caption>
			<image:title>Yahoo acquista Tumblr per 1,1 miliardi di dollari</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-wallet-come-paypal-ora-e-possibile-inviare-soldi-da-gmail.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/send_money-hero.jpg</image:loc>
			<image:caption>Allegare denaro ad un'email in Gmail</image:caption>
			<image:title>send_money-hero</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/yahoo-japan-rubati-22-milioni-di-account.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/yahoo-japan.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>yahoo-japan</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/fraction-calculator-plus-l%e2%80%99app-di-calcolo-dall%e2%80%99adolescente-isabel-hughes.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/fraction-calculator-plus.jpg</image:loc>
			<image:caption>Fraction Calculator Plus: l’app di calcolo dall’adolescente Isabel Hughes</image:caption>
			<image:title>Fraction Calculator Plus: l’app di calcolo dall’adolescente Isabel Hughes</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mcafee-brevetto-per-bloccare-contenuti-pirata.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/1306831781_2142-mcafee20logo.jpg</image:loc>
			<image:caption>McAfee: brevetto per bloccare contenuti pirata</image:caption>
			<image:title>McAfee: brevetto per bloccare contenuti pirata</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/polizia-italiana-arresta-gli-hacker-del-vaticano.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/anonymous_arrestati.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>anonymous_arrestati</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-integrera-waze.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/facebook-waze.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook waze</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-privacy-update-cosa-succederebbe-nella-vita-reale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/facebook-update.png</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-update</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/surface-pro-pronto-per-il-lancio-nel-mercato-italiano.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/surface_pro_hero.jpg</image:loc>
			<image:caption>Surface Pro pronto per il lancio nel mercato italiano </image:caption>
			<image:title>Surface Pro pronto per il lancio nel mercato italiano </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/l%e2%80%99ex-portavoce-di-the-pirate-bay-candidato-al-parlamento-europeo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/Brokep_photo_by_Share_Conference-646x363.jpg</image:loc>
			<image:caption>L’ex-portavoce di The Pirate Bay candidato al Parlamento Europeo</image:caption>
			<image:title>L’ex-portavoce di The Pirate Bay candidato al Parlamento Europeo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/microsoft-facebook-preso-di-mira-da-un-malware.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/facebook-febipos-malware.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook to start new messaging system</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/techcrunch-italy-2013-e-il-re-design.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/techcrunch.png</image:loc>
			<image:caption></image:caption>
			<image:title>techcrunch</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-governo-usa-registra-le-chiamate-dei-suoi-cittadini.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/gm-us-flag1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>gm-us-flag</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/gm-us-flag.jpg</image:loc>
			<image:caption>Il governo USA registra le chiamate dei suoi cittadini?</image:caption>
			<image:title>Il governo USA registra le chiamate dei suoi cittadini?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/no-alle-prostitute-su-linkedin-cambiano-i-termini-d%e2%80%99uso.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/Bergner-prostitute.jpg</image:loc>
			<image:caption>No alle prostitute su LinkedIn: cambiano i termini d’uso</image:caption>
			<image:title>No alle prostitute su LinkedIn: cambiano i termini d’uso</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/musica-in-streaming-google-pronto-a-dare-battaglia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/YouTube-Music.png</image:loc>
			<image:caption></image:caption>
			<image:title>YouTube-Music</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-chiude-l%e2%80%99app-social-roulette.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/Social-Roulette-Facebook.jpg</image:loc>
			<image:caption>Facebook chiude l’app Social Roulette </image:caption>
			<image:title>Facebook chiude l’app Social Roulette </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bitcoin-inserimento-messaggi-segreti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/bitcoin_goldv2.png</image:loc>
			<image:caption>Bitcoin: inserimento messaggi segreti </image:caption>
			<image:title>bitcoin_goldv2</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-babble.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/google-io.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-io</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/GoogleIO13.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>GoogleIO13</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/Google-I-O-13.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google-I-O-13</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/Google-IO-featured-LARGE.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>Google-IO-featured-LARGE</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/baidu-eye-il-clone-dei-google-glass.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/baidu.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>baidu</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/applecare-nuovo-estensione-di-garanzia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/AppleCarePB-xlarge.jpg</image:loc>
			<image:caption>AppleCare: nuovo estensione di garanzia </image:caption>
			<image:title>AppleCare: nuovo estensione di garanzia </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hacker-un-furto-da-45-milioni-di-euro-al-bancomat.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/bancomat-638x425.jpg</image:loc>
			<image:caption>Hacker: un furto da 45 milioni di euro al Bancomat</image:caption>
			<image:title>Hacker: un furto da 45 milioni di euro al Bancomat</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/film-completo-the-pirate-bay-away-from-keyboard.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/the_pirate_bay_away_from_keyboard_documentary.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>the_pirate_bay_away_from_keyboard_documentary</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/smartphone-firefox-os-offerti-agli-sviluppatori.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/019206-470-Geeksphone-Keon-FirefoxOS-gratis-Mozilla.jpg</image:loc>
			<image:caption>Smartphone Firefox OS offerti agli sviluppatori </image:caption>
			<image:title>Smartphone Firefox OS offerti agli sviluppatori </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/rdio-arriva-in-italia-e-batte-spotify.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/rdio.png</image:loc>
			<image:caption></image:caption>
			<image:title>rdio</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/microsoft-offre-1-miliardo-per-acquistare-nook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/192429239-7cc31629-d717-496f-80ea-f133e457c050.jpg</image:loc>
			<image:caption>Microsoft offre 1 miliardo per acquistare Nook  </image:caption>
			<image:title>Microsoft offre 1 miliardo per acquistare Nook  </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/amazon-al-lavoro-su-uno-smartphone-3d.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/Amazon-logo-apre-cagliari.jpg</image:loc>
			<image:caption>Amazon al lavoro su uno smartphone 3D</image:caption>
			<image:title>Amazon al lavoro su uno smartphone 3D</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/youtube-a-pagamento-adesso-e-ufficiale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/youtube-640.jpg</image:loc>
			<image:caption>YouTube a pagamento: adesso è ufficiale </image:caption>
			<image:title>YouTube a pagamento: adesso è ufficiale </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/adobe-e-la-nuova-politica-antipirateria.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/Adobe-Creative-Cloud-Discount.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Adobe-Creative-Cloud-Discount</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/windows-8-un-flop-in-arrivo-modifiche-strutturali-all%e2%80%99os-microsoft.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/microsoft_abbandona_windows_8__ora____tempo_di_blue_4749.jpg</image:loc>
			<image:caption>Windows 8 un flop? In arrivo modifiche strutturali all’OS Microsoft</image:caption>
			<image:title>Windows 8 un flop? In arrivo modifiche strutturali all’OS Microsoft</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/partito-pirata-candidato-alle-comunali-di-roma.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/019173-romapirata.png</image:loc>
			<image:caption>Partito Pirata candidato alle comunali di Roma </image:caption>
			<image:title>Partito Pirata candidato alle comunali di Roma </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/youtube-a-pagamento-potrebbe-arrivare-in-settimana.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/youtube-logo1-620x350.jpg</image:loc>
			<image:caption>YouTube a pagamento: potrebbe arrivare in settimana </image:caption>
			<image:title>YouTube a pagamento: potrebbe arrivare in settimana </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/liberator-la-prima-pistola-3d-printed.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/liberator_2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>liberator pistola stampata in 3D</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/casetop-come-trasformare-lo-smartphone-in-notebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/casetop.jpg</image:loc>
			<image:caption>Casetop: come trasformare lo smartphone in notebook</image:caption>
			<image:title>Casetop: come trasformare lo smartphone in notebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/concorso-app-store-vicina-quota-50-miliardi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/app_store_badge.png</image:loc>
			<image:caption>Concorso App Store: vicina quota 50 miliardi</image:caption>
			<image:title>Concorso App Store: vicina quota 50 miliardi</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tablet-evernote-il-ceo-dell%e2%80%99azienda-rivela-il-progetto.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/evernote.jpg</image:loc>
			<image:caption>Tablet Evernote: il CEO dell’azienda rivela il progetto </image:caption>
			<image:title>Tablet Evernote: il CEO dell’azienda rivela il progetto </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-glass-nuovi-dettagli-ufficiali-sul-funzionamento.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/Schermata_03_05_13_10_17.jpg</image:loc>
			<image:caption>Google Glass: nuovi dettagli ufficiali sul funzionamento </image:caption>
			<image:title>Google Glass: nuovi dettagli ufficiali sul funzionamento </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/lanciata-la-versione-alpha-di-bittorrent-sync.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/BitTorrent-Sync-Is-a-P2P-Dropbox.png</image:loc>
			<image:caption>Lanciata la versione alpha di BitTorrent Sync</image:caption>
			<image:title>Lanciata la versione alpha di BitTorrent Sync</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/chordify-come-trovare-gli-accordi-una-canzone-via-web.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/Chordify.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Chordify</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/lorecchio-bionico-stampato-in-3d.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/56048_web_large_verge_medium_landscape.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>56048_web_large_verge_medium_landscape</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/udoo-quando-arduino-incontra-raspberry-pi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/udoo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>udoo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/in-autunno-novita-dal-mondo-apple.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/tim-cook-apple.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>tim-cook-apple</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/integrazione-completa-tra-outlook.com-e-skype.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/skype_outlook.jpg</image:loc>
			<image:caption>Integrazione completa tra Outlook.com e Skype</image:caption>
			<image:title>Integrazione completa tra Outlook.com e Skype</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/spot-microsoft-anti-apple-e-samsung.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/05/appfan.jpg</image:loc>
			<image:caption>Spot Microsoft Anti-Apple e Samsung </image:caption>
			<image:title>Spot Microsoft Anti-Apple e Samsung </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/arrivano-smartphone-mozilla-firefox-os.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/Firefox-OS.png</image:loc>
			<image:caption></image:caption>
			<image:title>Firefox-OS</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-glass-rilasciato-il-kernel-open-source.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/Google-Glasses.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google-Glasses</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-presentera-i-nuovi-macbook-al-wwdc.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/wwdc2013wallpaper.jpg</image:loc>
			<image:caption>Apple presenterà i nuovi MacBook al WWDC?</image:caption>
			<image:title>Apple presenterà i nuovi MacBook al WWDC?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/lg-google-glass-brevetto-head-mounted-display.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/019162-470-lg_hmd_segue_utente.png.jpeg</image:loc>
			<image:caption>Alternativa LG ai Google Glass: nuovo brevetto Head Mounted Display</image:caption>
			<image:title>Alternativa LG ai Google Glass: nuovo brevetto Head Mounted Display</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/scoperta-nuova-backdoor-per-apache-per-injection-di-codice-malevolo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/apache_injection.png</image:loc>
			<image:caption></image:caption>
			<image:title>apache_injection</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sophos-mobile-security-ora-protegge-anche-dagli-sms.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/sophos-mobile-security.png</image:loc>
			<image:caption></image:caption>
			<image:title>sophos-mobile-security</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-nexus-smartwatch-concept.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/google-nexus-smartwatch.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-nexus-smartwatch</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/twitter-vine-sbarchera-presto-su-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/Vine-logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Vine-logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/notebook-android-in-commercio-a-200-dollari.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/r_Android_notizia.jpg</image:loc>
			<image:caption>Notebook Android: in commercio a 200 dollari </image:caption>
			<image:title>Notebook Android: in commercio a 200 dollari </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sicurezza-google-play-store-rimosse-32-app-malevole.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/malware-badnews-list-app.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Applicazioni Malware rimosse dal Google Play Store</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/badnews-malware-google-play-store.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>Bad News Malware</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hard-disk-ultraslim-alternativa-low-costo-agli-ssd.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/019153-470-wd-blue-5mm.jpg</image:loc>
			<image:caption>Hard disk Ultraslim: alternativa low costo agli SSD</image:caption>
			<image:title>Hard disk Ultraslim: alternativa low costo agli SSD</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/legge-anti-pirateria-norme-per-il-processo-lampo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/shutterstock_96124010.jpg</image:loc>
			<image:caption>Legge Anti-pirateria: norme per il processo lampo</image:caption>
			<image:title>Legge Anti-pirateria: norme per il processo lampo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/rilasciato-ubuntu-13.04-quali-le-novita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/ubuntu-12.10-banshee-media-player.jpg</image:loc>
			<image:caption>Rilasciato Ubuntu 13.04: quali le novità?</image:caption>
			<image:title>Rilasciato Ubuntu 13.04: quali le novità?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/siri-alla-guida-pericoloso-come-invio-sms.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/siri-guida-facebook-twitter-melarumors-sms-.jpg</image:loc>
			<image:caption>SIRI: alla guida pericoloso come invio SMS</image:caption>
			<image:title>SIRI: alla guida pericoloso come invio SMS</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/twitter-prevenire-hacking-account.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/twitter-black.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>twitter-black</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/ap-twitter-announce-hack.png</image:loc>
			<image:caption></image:caption>
			<image:title>ap-twitter-announce-hack</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/twitter-screen-ap.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Twitter AP Account Hacked</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/whatsapp-client-desktop-1.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/whatsapp-desktop-client.png</image:loc>
			<image:caption></image:caption>
			<image:title>whatsapp-desktop-client</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/estensione-gmail-send-from-gmail.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/send-from-gmail-extension.jpg</image:loc>
			<image:caption>Estensione gmail: Send from Gmail</image:caption>
			<image:title>Estensione gmail: Send from Gmail</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sicurezza-informatica-2012-triplicati-gli-attacchi-ddos.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/kind-of-attack-stats-verizon.png</image:loc>
			<image:caption>Forme di attacco 2012 (Credits: Verizon)</image:caption>
			<image:title>kind-of-attack-stats-verizon</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/data-breach-investigations-report-2013-verizon.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>data-breach-investigations-report-2013-verizon</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/cyber-attacchi-cina-2012.png</image:loc>
			<image:caption>Attacchi provenienti dalla Cina (Credits: Akamai)</image:caption>
			<image:title>cyber-attacchi-cina-2012</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/app-anti-pirateria-cinematografica-nuovo-software-dall%e2%80%99india.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/019137-470-indian_movie_cop.png.jpeg</image:loc>
			<image:caption>App anti-pirateria cinematografica: nuovo software dall’India</image:caption>
			<image:title>App anti-pirateria cinematografica: nuovo software dall’India</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-now-homepage-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/google-now-screen.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google Now Home Page</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/bus-station-google-now.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google Now Bus Station</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/google-now-desktop.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google Now per Chrome</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/lte-a-giugno-il-convegno-4g-lte-world-summit.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/nexusae0_LTE-Logo.jpg</image:loc>
			<image:caption>LTE: a giugno il convegno 4G LTE World Summit</image:caption>
			<image:title>LTE: a giugno il convegno 4G LTE World Summit</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-home-500.000-download-un-grande-flop.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/Facebook-Home-dispositivi-abilitati.jpg</image:loc>
			<image:caption>Facebook Home: 500.000 download, un grande flop?</image:caption>
			<image:title>Facebook Home: 500.000 download, un grande flop?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nascondere-icona-edicola-iphone-senza-jailbreak.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/guest-post1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Applicazione Edicola iOS</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/prossimo-lancio-di-servizio-multiplayer-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/multiplayer-android-games-1309964173.jpg</image:loc>
			<image:caption>Prossimo lancio di servizio multiplayer Android?</image:caption>
			<image:title>Prossimo lancio di servizio multiplayer Android?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/aircrackgui-wifi-crack-da-smartphone-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/wifi-crack.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>WiFi Crack</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/aircrack-3.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>AircrackGUI</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/aircrack-1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>AircrackGUI</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/leap-motion-interazione-computer-basata-su-gesti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/leap-motion.png</image:loc>
			<image:caption>Leap Motion: interazione computer basata su gesti</image:caption>
			<image:title>Leap Motion: interazione computer basata su gesti</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-glass-presente-un-sistema-operativo-android-modificato.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/google-glasses-31.jpg</image:loc>
			<image:caption>Google Glass: presente un sistema operativo Android modificato </image:caption>
			<image:title>Google Glass: presente un sistema operativo Android modificato </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/penmode-tool-pentest-ph0s.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/penmode.png</image:loc>
			<image:caption></image:caption>
			<image:title>Penmode Pentest Tool</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hacker-e-smanettoni-alle-prese-con-app-per-la-sicurezza-stradale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/sicurezza-stradale-app.jpg</image:loc>
			<image:caption>Hacker e smanettoni alle prese con app per la sicurezza stradale </image:caption>
			<image:title>Hacker e smanettoni alle prese con app per la sicurezza stradale </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/diffamazione-via-facebook-spazio-pubblico-o-privato.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/Tribunale-e-Facebook.jpg</image:loc>
			<image:caption>Diffamazione via Facebook: spazio pubblico o privato?</image:caption>
			<image:title>Diffamazione via Facebook: spazio pubblico o privato?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-fiber-internet-a-tutta-velocita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/google-fiber.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Fiber</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-analytics-configurare-referring-url-completi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/full-referrer.png</image:loc>
			<image:caption></image:caption>
			<image:title>Configurazione Full Referrer Google Analytics</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/google-analytics.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google Analytics</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/messaggi-facebook-pagamento-vip.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/mark-zuckerberg-facebook-profile.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>mark-zuckerberg-facebook-profile</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/send-message-facebook-zuckerberg.png</image:loc>
			<image:caption></image:caption>
			<image:title>Messaggi Facebook a pagamento</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/twitter-music-in-arrivo-la-musica-in-streaming.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/twitter-music.png</image:loc>
			<image:caption></image:caption>
			<image:title>Twitter Music</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-organizzare-gratis-contest-social-con-wishpond-e-binkd.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/binkd-promotion.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Binkd</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/social-contest.png</image:loc>
			<image:caption></image:caption>
			<image:title>Social Network Contest</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sicurezza-del-gioco-online-in-italia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/sicurezza-poker-online.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Sicurezza Poker Online</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/le-iene-hacking-wifi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/le-iene-wifi-hacker.png</image:loc>
			<image:caption></image:caption>
			<image:title>le-iene-wifi-hacker</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iphone-5s-e-iphone-low-cost-quali-novita-ha-in-serbo-apple.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/iphone-5s-logs.jpg</image:loc>
			<image:caption>iPhone 5S e iPhone low cost: quali novità ha in serbo Apple?</image:caption>
			<image:title>iPhone 5S e iPhone low cost: quali novità ha in serbo Apple?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/microsoft-al-lavoro-su-uno-smart-watch.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/microsoft-smartwatch.jpg</image:loc>
			<image:caption>Microsoft al lavoro su uno Smart Watch</image:caption>
			<image:title>Microsoft al lavoro su uno Smart Watch</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-home-trailer-video-e-download-apk.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/facebook-home-apk.jpg</image:loc>
			<image:caption>Facebook Home</image:caption>
			<image:title>Facebook Home</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bing-introdurra-il-pulsante-pinterest.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/bing_pinterest.jpg</image:loc>
			<image:caption>Bing introdurrà il pulsante Pinterest</image:caption>
			<image:title>Bing introdurrà il pulsante Pinterest</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/joomla-apre-campagna-kickstarter-per-creazione-di-api-mobile.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/joomla_webservice.jpg</image:loc>
			<image:caption>Joomla WebService</image:caption>
			<image:title>Joomla WebService</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/password-piu-sicure-con-la-lettura-del-pensiero.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/neurosky-mindset.jpg</image:loc>
			<image:caption>Password più sicure con la &quot;lettura del pensiero&quot;</image:caption>
			<image:title>Password più sicure con la &quot;lettura del pensiero&quot;</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/testamento-digitale-ci-pensa-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/origin_3685975881.jpg</image:loc>
			<image:caption>Testamento digitale, ci pensa Google </image:caption>
			<image:title>Testamento digitale, ci pensa Google </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/pos-un-sistema-di-pagamento-sicuro.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/pos.jpg</image:loc>
			<image:caption>POS: un sistema di pagamento sicuro?</image:caption>
			<image:title>POS: un sistema di pagamento sicuro?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-store-guida-alle-migliori-app.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/math-4-kids.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>math-4-kids</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/paddy-power.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>paddy-power</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/budget-book.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>budget-book</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/apple-store.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Apple App Store</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-nokia-store-di-shangai-chiude-i-battenti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/Nokia-Lumia-920-hero.jpg</image:loc>
			<image:caption>Il Nokia Store di Shangai chiude</image:caption>
			<image:title>Il Nokia Store di Shangai chiude</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/malware-skype-per-la-creazione-di-bitcoin.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/virus-skype-messaggio-trojan-cosa-fare.jpg</image:loc>
			<image:caption>Malware Skype per la creazione di BitCoin</image:caption>
			<image:title>Malware Skype per la creazione di BitCoin</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mantis-hexapod-il-robot-comandato-da-linux.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/mantis-hexapod-1.png</image:loc>
			<image:caption></image:caption>
			<image:title>Mantis Hexapod</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/mantis-hexapod-1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Mantis Hexapod</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/Mantis.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Mantis Hexapod</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ryan-ackroyd-hacker-si-dichiara-colpevole.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/360630.jpg</image:loc>
			<image:caption>Ryan Ackroyd: l’hacker si dichiara colpevole</image:caption>
			<image:title>Ryan Ackroyd: l’hacker si dichiara colpevole</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/appgratis-rimossa-dall%e2%80%99app-store.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/appgratis1.jpg</image:loc>
			<image:caption>AppGratis rimossa dall’App Store</image:caption>
			<image:title>AppGratis rimossa dall’App Store</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-cerca-nuovi-programmatori-team-siri.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/Siri-logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Siri-logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/media-tradizionali-e-media-digitali-uno-studio-di-globalwebindex.net.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/digital-media.jpg</image:loc>
			<image:caption>Media Tradizionali e Media Digitali</image:caption>
			<image:title>Media Tradizionali e Media Digitali</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/appy-geek-si-aggiorna.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/AppyGeek3.png</image:loc>
			<image:caption>Appy Geek si rinnova</image:caption>
			<image:title>Appy Geek si rinnova</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/appy-geek-screenshot3.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>appy-geek-screenshot3</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/appy-geek-screenshot2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>appy-geek-screenshot2</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/appy-geek-screenshot.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>appy-geek-screenshot</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/6-tipologie-di-social-media-specialist.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/social_media_consultancy.jpg</image:loc>
			<image:caption>6 tipologie di social media specialist</image:caption>
			<image:title>6 tipologie di social media specialist</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sicurezza-windows-patch-per-2-criticita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/Microsoft-regala-Windows-8-ai-pirati_h_partb.jpg</image:loc>
			<image:caption>Sicurezza Windows: patch per 2 criticità </image:caption>
			<image:title>Sicurezza Windows: patch per 2 criticità </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-replies-prossimamente-su-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/Facebook-replies.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>I Replies di Facebook</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/Facebook-Replies.png</image:loc>
			<image:caption></image:caption>
			<image:title>I Replies di Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/blackberry-os-10-si-aggiorna-con-nuove-funzionalita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/BlackBerry-10_1-OS-update-4.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>BlackBerry OS 10 Update</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/BlackBerry-10_1-OS-update-3.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>BlackBerry OS 10 Update</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/BlackBerry-10_1-OS-update-2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>BlackBerry OS 10 Update</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/BlackBerry-10_1-OS-update-1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>BlackBerry-10_1-OS-update-1</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/blackberry-os-10.png</image:loc>
			<image:caption>BlackBerry OS 10 si aggiorna con nuove funzionalità</image:caption>
			<image:title>BlackBerry OS 10 si aggiorna con nuove funzionalità</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/av-test-comparazione-antivirus-windows-8.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/AV-TEST-The-Independent-IT-Security-Institute-Jan-Feb-2013.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>AV-TEST: comparazione antivirus Windows 8 </image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/av-test-1.png</image:loc>
			<image:caption>AV-TEST: comparazione antivirus Windows 8 </image:caption>
			<image:title>AV-TEST: comparazione antivirus Windows 8 </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sicurezza-smartphone-i-rischi-nelle-banking.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/ID-100646431.jpg</image:loc>
			<image:caption>Sicurezza smartphone: i rischi nell'e-banking</image:caption>
			<image:title>Sicurezza smartphone: i rischi nell'e-banking</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-marketing-organizzare-contest-senza-violare-il-regolamento.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/facebook_contest.jpg</image:loc>
			<image:caption>Facebook marketing: organizzare un contest senza violare il regolamento </image:caption>
			<image:title>Facebook marketing: organizzare un contest senza violare il regolamento </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kaspersky-wallpaper-date-storiche-sicurezza-informatica.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/Kaspersky.png</image:loc>
			<image:caption></image:caption>
			<image:title>Kaspersky Logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/calendario-kaspersky-virus.jpg</image:loc>
			<image:caption>Kaspersky Malware Wallpaper</image:caption>
			<image:title>Kaspersky Malware Wallpaper</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/curiosita-sui-social-media.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/social-media-hand.jpg</image:loc>
			<image:caption>Curiosità sui Social Media</image:caption>
			<image:title>Curiosità sui Social Media</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/i-google-glass-made-in-usa-foxconn.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/google-glass.jpg</image:loc>
			<image:caption>Google Glass saranno made in USA</image:caption>
			<image:title>Google Glass saranno made in USA</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/skype-vittima-di-un-nuovo-malware.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/208194209.png</image:loc>
			<image:caption></image:caption>
			<image:title>208194209</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/208194207.png</image:loc>
			<image:caption>Skype vittima di un nuovo malware</image:caption>
			<image:title>Skype vittima di un nuovo malware</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/gli-italiani-amano-le-commerce.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/ecommerce-shoppin.jpg</image:loc>
			<image:caption>Gli Italiani amano l'e-commerce?</image:caption>
			<image:title>Gli Italiani amano l'e-commerce?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/linkedin-implementa-nuove-funzionalita-social.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/graphic-social-linkedin.png</image:loc>
			<image:caption></image:caption>
			<image:title>graphic-social-linkedin</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/linkedin.jpg</image:loc>
			<image:caption>LinkedIn implementa nuove funzionalità Social</image:caption>
			<image:title>LinkedIn implementa nuove funzionalità Social</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-home-un-launcher-android-per-integrare-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/facebook-home-launcher.png</image:loc>
			<image:caption>Facebook Home, un launcher Android per integrare Facebook</image:caption>
			<image:title>Facebook Home, un launcher Android per integrare Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kim-dotcom-tra-le-persone-piu-influenti-del-2013.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/kim_dotcom_times_twitter.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>kim_dotcom_times_twitter</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-home-un-launcher-android-per-integrare-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/displaymedia-3.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>displaymedia-3</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/displaymedia-4.jpeg</image:loc>
			<image:caption>Facebook presenta l’home screen “Home”</image:caption>
			<image:title>Facebook presenta l’home screen “Home”</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kim-dotcom-tra-le-persone-piu-influenti-del-2013.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/kim_dotcom.jpg</image:loc>
			<image:caption>Kim Dotcom tra le persone più influenti del 2013?</image:caption>
			<image:title>Kim Dotcom tra le persone più influenti del 2013?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/smart-card-anti-hacker-ecco-il-software-tookan.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/tookan-small-logo.png</image:loc>
			<image:caption>Smart card anti hacker: ecco il software Tookan</image:caption>
			<image:title>Smart card anti hacker: ecco il software Tookan</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/smart-city-la-tecnologia-cambia-il-modo-di-parcheggiare.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/wordcloud_smartcityjam.png</image:loc>
			<image:caption>Smart City</image:caption>
			<image:title>Smart City</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-now-nuova-funzionalita-per-dispositivi-mobili.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/android-caotic-Google-Now-2.jpg</image:loc>
			<image:caption>Google Now: nuova funzionalità per dispositivi mobili</image:caption>
			<image:title>Google Now: nuova funzionalità per dispositivi mobili</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/assange-scende-in-politica-candidato-in-australia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/Julian-Assange-007.jpg</image:loc>
			<image:caption>Assange scende in politica: candidato in Australia</image:caption>
			<image:title>Assange scende in politica: candidato in Australia</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ecco-il-tablet-kindle-fire-89-di-amazon.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/kindle-fire-hd-89.jpg</image:loc>
			<image:caption>Ecco il tablet Kindle Fire 8.9 di Amazon</image:caption>
			<image:title>Ecco il tablet Kindle Fire 8.9 di Amazon</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/eye-tracking-smartphone-la-rivoluzione-di-samsung-galaxy.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/04/Samsung-Galaxy-S4-eye-tracking.jpg</image:loc>
			<image:caption>Eye Tracking, la tecnologia presente nei nuovi Galaxy S4</image:caption>
			<image:title>Eye Tracking, la tecnologia presente nei nuovi Galaxy S4</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-play-tutte-le-offerte-di-pasqua.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/google_play_logo.jpg</image:loc>
			<image:caption>Google Play: tutte le offerte di Pasqua </image:caption>
			<image:title>Google Play: tutte le offerte di Pasqua </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/telefonino-facebook-presentazione-il-4-aprile.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/Buffy-Facebook-Telefonino.jpg</image:loc>
			<image:caption>Telefonino Facebook: presentazione il 4 aprile?</image:caption>
			<image:title>Telefonino Facebook: presentazione il 4 aprile?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/windows-phone-8-un-destino-segnato.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/windowsphone8_1.jpg</image:loc>
			<image:caption>Windows Phone 8: un destino segnato</image:caption>
			<image:title>Windows Phone 8: un destino segnato</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/pinterest-web-analytics-tool-come-calcolare-il-traffico-generato-dai-pin.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/pinterest_web_analytics_tool.png</image:loc>
			<image:caption>Pinterest Web Analytics Tool</image:caption>
			<image:title>Pinterest Web Analytics Tool</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hacker-dei-cartelloni-pubblicitari-per-pirate-bay.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/hacked-billboard.jpg</image:loc>
			<image:caption>L'hacking in Piazza della Repubblica a Belgrado</image:caption>
			<image:title>L'hacking in Piazza della Repubblica a Belgrado</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/twitter-tools-per-advertising.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/twitter-adv-advertising.jpg</image:loc>
			<image:caption>Twitter tools per l'advertising</image:caption>
			<image:title>Twitter tools per l'advertising</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-keep-il-post-it-virtuale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/Google-keep-logo.jpg</image:loc>
			<image:caption>Google Keep</image:caption>
			<image:title>Google Keep</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/resoconto-advanced-seo-tool-2013.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/apache-mod_PageSpeed.gif</image:loc>
			<image:caption>Apache Mod Pagespeed</image:caption>
			<image:title>apache-mod_PageSpeed</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/forumgt-staff.png</image:loc>
			<image:caption>Relatori: Taverniti,Quarella e Pernici</image:caption>
			<image:title>Relatori: Taverniti,Quarella e Pernici</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/gtmasterclub-300x297.png</image:loc>
			<image:caption></image:caption>
			<image:title>gtmasterclub-300x297</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/chrome-web-store-piu-rapidi-i-tempi-di-upload.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/chrome_webstore.jpg</image:loc>
			<image:caption>Chrome Web Store: più rapidi i tempi di upload</image:caption>
			<image:title>Chrome Web Store: più rapidi i tempi di upload</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-gif-animante-come-immagini-del-profilo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/google_plus.png</image:loc>
			<image:caption>Google+: gif animante come immagini del profilo</image:caption>
			<image:title>Google+: gif animante come immagini del profilo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-come-aumentare-la-condivisione-dei-propri-contenuti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/facebook-condividi.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook: aumentare le condivisioni</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/like-button.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook: aumentare la condivisione dei contenuti</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-gif-animante-come-immagini-del-profilo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/Google+_fotografia.png</image:loc>
			<image:caption>Google+: gif animante come immagini del profilo</image:caption>
			<image:title>Google+: gif animante come immagini del profilo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sony-lancia-progetto-alternativo-ai-google-glass.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/019034-470-sony-occhiali.jpg</image:loc>
			<image:caption>Sony lancia progetto alternativo ai Google Glass</image:caption>
			<image:title>Sony lancia progetto alternativo ai Google Glass</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/trasforma-il-tuo-progetto-editoriale-in-un-app-con-pdf2ipad.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/pdf2ipad.png</image:loc>
			<image:caption></image:caption>
			<image:title>Trasforma il tuo sito in un'app - Pdf2iPad</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/remarketing-su-facebook-con-facebook-exchange.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/facebook_exchange.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Remarketing su Facebook con Facebook Exchange</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/world-wide-maze-la-potenza-di-chrome-e-html5.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/google-chrome-world-wide-maze-game.jpg</image:loc>
			<image:caption>World Wide Maze: la potenza di Chrome e HTML5</image:caption>
			<image:title>World Wide Maze: la potenza di Chrome e HTML5</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/whatsapp-a-pagamentoarrivano-gli-abbonamenti-pluriennali.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/whatsapp.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Whatsapp</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/stampa-3d-e-vibratori-un-binomio-virtuoso.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/vibratore_sensuale_elegante_sensuality.jpg</image:loc>
			<image:caption>Stampa 3D e vibratori: un binomio virtuoso</image:caption>
			<image:title>Stampa 3D e vibratori: un binomio virtuoso</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ruzzle-vulnerabilita-rivelata-e-fixat-con-calma.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/ruzzle.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Vulnerabilità sicurezza Ruzzle</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iphone-low-cost-realizzato-in-plastica-e-alluminio.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/apple_iphone5.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>iPhone Low Cost all'orizzonte?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/smart-shoes-ultima-novita-hi-tech-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/smart-shoes-google1-500x300.jpg</image:loc>
			<image:caption>Smart shoes, l’ultima novità hi-tech di Google </image:caption>
			<image:title>Smart shoes, l’ultima novità hi-tech di Google </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/galaxy-s4-quali-sono-le-principali-novita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/Samsung-Galaxy-S-4.jpg</image:loc>
			<image:caption>Galaxy S4: quali sono le principali novità? </image:caption>
			<image:title>Galaxy S4: quali sono le principali novità? </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kevin-allocca-spiega-il-successo-dei-video-virali.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/gangham1-600.jpg</image:loc>
			<image:caption>Kevin Allocca spiega il successo dei video virali</image:caption>
			<image:title>Kevin Allocca spiega il successo dei video virali</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/siti-web-in-versione-mobile-o-meglio-unapp.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/smartphone-and-tablet.png</image:loc>
			<image:caption>Sito web per Mobile: ottimizzato per tablet/smartphone o un'app dedicata?</image:caption>
			<image:title>smartphone-and-tablet</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nuovo-trojan-attacca-i-mac-trojan.yontoo.1.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/mac-virus-trojan1.jpg</image:loc>
			<image:caption>Nuovo trojan attacca i Mac: Trojan.Yontoo.1</image:caption>
			<image:title>Nuovo trojan attacca i Mac: Trojan.Yontoo.1</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/mac-virus-trojan.jpg</image:loc>
			<image:caption>Nuovo trojan attacca i Mac: Trojan.Yontoo.1</image:caption>
			<image:title>Nuovo trojan attacca i Mac: Trojan.Yontoo.1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/antitrust-europeo-si-concentra-sul-caso-apple.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/shutterstock_107851007.jpg</image:loc>
			<image:caption>Antitrust europeo si concentra sul caso Apple</image:caption>
			<image:title>Antitrust europeo si concentra sul caso Apple</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/rss_com-in-vendita-dopo-la-chiusura-di-google-reader.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/rss_com-logo.png</image:loc>
			<image:caption></image:caption>
			<image:title>rss_com-logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/google-reader.jpeg</image:loc>
			<image:caption>Google Reader</image:caption>
			<image:title>Google Reader</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-e-i-link-in-vendita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/Google_link_building.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google_link_building</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/honda-testa-un-sistema-di-guida-controllato-da-uno-smartphone.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/honda-drive-smartphone.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>honda-drive-smartphone</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/test-honda-drive-smartphone.jpg</image:loc>
			<image:caption>Test effettuati dalla Honda</image:caption>
			<image:title>Test effettuati dalla Honda</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/poker-online-guadagni-reali-o-solo-un-sogno.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/poker.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>poker</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wired-magazine-approda-sui-dispositivi-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/wired_magazine__ora_anche_per_android.jpg</image:loc>
			<image:caption>Wired Magazine per tablet e smartphone Android</image:caption>
			<image:title>Wired Magazine per tablet e smartphone Android</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/wired-app-android.png</image:loc>
			<image:caption>Wired Magazine ora su Smartphone e Tablet</image:caption>
			<image:title>Wired Magazine ora su Smartphone e Tablet</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/corso-seo-strategie-seo-avanzate.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/webinar-seo-Strategie-SEO-avanzate.png</image:loc>
			<image:caption></image:caption>
			<image:title>webinar-seo-Strategie-SEO-avanzate</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/youtube-supera-la-soglia-del-miliardo-di-utenti-mensili.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/url-1.jpeg</image:loc>
			<image:caption>Youtube supera la soglia del miliardo di utenti mensili</image:caption>
			<image:title>Youtube supera la soglia del miliardo di utenti mensili</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/istella-la-ricerca-che-punta-alla-qualita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/istella.jpg</image:loc>
			<image:caption>Istella: la ricerca che punta alla qualità</image:caption>
			<image:title>Istella: la ricerca che punta alla qualità</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kim-dotcom-lepopea-continua.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/kim-dotcom.jpg</image:loc>
			<image:caption>Kim Dotcom: l'epopea continua</image:caption>
			<image:title>Kim Dotcom: l'epopea continua</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-indicizzare-il-tuo-sito-nei-motori-di-ricerca.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/google-logo.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/posizione-keyword-tecniche-indicizzazione-sito-web.gif</image:loc>
			<image:caption>Come indicizzare il tuo sito nei motori di ricerca</image:caption>
			<image:title>Come indicizzare il tuo sito nei motori di ricerca</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/smartwatch-samsung-evoluzione-digitale-polso.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/samsung-watch.jpg</image:loc>
			<image:caption>Samsung Watch</image:caption>
			<image:title>Samsung Watch</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/weibo-come-viene-censurato-il-twitter-cinese.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/weibo.png</image:loc>
			<image:caption>Weibo: come viene censurato il twitter cinese?</image:caption>
			<image:title>Weibo: come viene censurato il twitter cinese?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-la-probabile-introduzione-degli-hashtag.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/facebook-hashtag.jpg</image:loc>
			<image:caption>Facebook introduce gli hashtag</image:caption>
			<image:title>Facebook introduce gli hashtag</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/streaming-film-condanna-vedogratis.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/vedogratis.jpg</image:loc>
			<image:caption>Il caso Vedogratis: condannato il webmaster</image:caption>
			<image:title>Il caso Vedogratis: condannato il webmaster</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/social-media-marketing-quanto-spendono-le-aziende-e-in-quali-strategie.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/social-media.jpg</image:loc>
			<image:caption>Social media marketing: quanto spendono le aziende e in quali strategie?</image:caption>
			<image:title>Social media marketing: quanto spendono le aziende e in quali strategie?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/epad-femme-polemiche-per-il-tablet-tutto-al-femminile.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/epad-femme.jpeg</image:loc>
			<image:caption>ePad Femme: polemiche per il tablet tutto al femminile</image:caption>
			<image:title>ePad Femme: polemiche per il tablet tutto al femminile</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/politicsttt-social-lab-ttt-ci-accompagna-nella-scoperta-della-politica-2.0.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/locandina_politicsttt.jpg</image:loc>
			<image:caption>Social Lab TTT ci accompagna nella scoperta della Politica 2.0</image:caption>
			<image:title>Social Lab TTT ci accompagna nella scoperta della Politica 2.0</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sharp-e-la-storia-infinita-delle-acquisizioni.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/sharp.jpg</image:loc>
			<image:caption>Sharp e la storia infinita delle acquisizioni</image:caption>
			<image:title>Sharp e la storia infinita delle acquisizioni</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/portolan-allo-studio-il-futuro-di-internet.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/Portolan.jpg</image:loc>
			<image:caption>Portolan: allo studio il futuro di Internet</image:caption>
			<image:title>Portolan: allo studio il futuro di Internet</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/klout-misurare-la-propria-influenza-sui-social-media.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/klout.png</image:loc>
			<image:caption>Klout: misurare la propria influenza sui social media</image:caption>
			<image:title>Klout: misurare la propria influenza sui social media</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mega-sdk-il-cloud-storage-alla-portata-di-tutti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/mega.jpg</image:loc>
			<image:caption>Mega SDK per tablet e smartphone</image:caption>
			<image:title>Mega SDK per tablet e smartphone</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/mega-sdk-kim-dotcom-tweet.jpg</image:loc>
			<image:caption>Mega SDK per Tablet e Smartphone</image:caption>
			<image:title>Mega SDK per Tablet e Smartphone</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/15-gopro-camera-per-filmare-la-vita-in-stop-motion.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/gopro-stop-motion.jpg</image:loc>
			<image:caption>15 GoPro per filmare la vita in stop motion</image:caption>
			<image:title>15 GoPro per filmare la vita in stop motion</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-cellulare-da-un-euro-il-futuro-della-telefonia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/021-500x332.jpg</image:loc>
			<image:caption>Il cellulare da un euro: il futuro della telefonia</image:caption>
			<image:title>Il cellulare da un euro: il futuro della telefonia</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/seo-tips-la-checklist.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/seo-checklist.jpg</image:loc>
			<image:caption>Seo Tips:la Checklist</image:caption>
			<image:title>Seo Tips:la Checklist</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nuove-faccine-per-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/facebook-pixar-emoticons.jpeg</image:loc>
			<image:caption>Nuove faccine per Facebook</image:caption>
			<image:title>Nuove faccine per Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/assicurazione-smartphone-cosa-ne-pensate.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/12.jpg</image:loc>
			<image:caption>Assicurazione smartphone: cosa ne pensate?</image:caption>
			<image:title>Assicurazione smartphone: cosa ne pensate?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/accordo-samsung-sharp.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/sharp-samsung.png</image:loc>
			<image:caption>Accordo Sharp-Samsung</image:caption>
			<image:title>Accordo Sharp-Samsung</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/novita-social-2013-speakerfy-hyperactivate-leadrocket.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/leadrocket.png</image:loc>
			<image:caption>Novità social 2013: LeadRocket</image:caption>
			<image:title>Novità social 2013: LeadRocket</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/hyperactivate.png</image:loc>
			<image:caption>Novità social 2013: Hyperactivate</image:caption>
			<image:title>Novità social 2013: Hyperactivate</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/speakerfy.png</image:loc>
			<image:caption>Novità social 2013: Speakerfy, Hyperactivate, LeadRocket</image:caption>
			<image:title>Novità social 2013: Speakerfy, Hyperactivate, LeadRocket</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/joomla-pizza-bugs-and-fun.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/pizza-bugs-fun.png</image:loc>
			<image:caption>Joomla: Pizza, Bugs &amp; Fun</image:caption>
			<image:title>Joomla: Pizza, Bugs &amp; Fun</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sfida-tra-qwant-e-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/qwant-google.jpg</image:loc>
			<image:caption>Sfida tra Qwant e Google</image:caption>
			<image:title>Sfida tra Qwant e Google</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-hotel-finder-e-il-posizionamento.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/google-hotel-finder.jpg</image:loc>
			<image:caption>Google Hotel Finder e il posizionamento</image:caption>
			<image:title>Google Hotel Finder e il posizionamento</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/truffa-via-email-clienti-enel.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/enel_phishing_110313_02.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Truffa via email clienti Enel </image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/disdire-contratto-enel.png</image:loc>
			<image:caption>Truffa via email clienti Enel </image:caption>
			<image:title>Truffa via email clienti Enel </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-attaccata-da-hacker-dell%e2%80%99europa-dell%e2%80%99est.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/0_600_800_http-__i.haymarket.net_.au_News_hackintosh-apple.jpg</image:loc>
			<image:caption>Apple attaccata da hacker dell’Europa dell’est</image:caption>
			<image:title>Apple attaccata da hacker dell’Europa dell’est</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nokia-lumia-i-due-modelli-low-cost.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/nokia-lumia-low-cost.jpg</image:loc>
			<image:caption>Nokia Lumia : i due modelli low cost</image:caption>
			<image:title>nokia-lumia-low-cost</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-aiuta-gli-utenti-ai-quali-e-stato-hackerato-il-sito.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/google-webmaster-hrlp-hacked-sites.png</image:loc>
			<image:caption>Google aiuta gli utenti ai quali è stato hackerato il sito</image:caption>
			<image:title>google-webmaster-hrlp-hacked-sites</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonymous-oscura-il-sito-di-casapound.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/logo-casa-pound.jpg</image:loc>
			<image:caption>Anonymous oscura il sito di Casapound</image:caption>
			<image:title>Anonymous oscura il sito di Casapound</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/studenti-italiani-divisi-tra-sesso-e-poker-online.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/poker-online.jpg</image:loc>
			<image:caption>Studenti italiani divisi tra sesso e poker online</image:caption>
			<image:title>poker-online</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bittorrent-live-futuro-della-tv-passa-dal-web.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/bittorent-live-beta.png</image:loc>
			<image:caption>BitTorrent Live: il futuro della TV passa dal Web</image:caption>
			<image:title>bittorent-live-beta</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tor-project-boston-hack-day.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/Tor_project_logo_hq.png</image:loc>
			<image:caption></image:caption>
			<image:title>Tor_project_logo_hq</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/samsung-galaxy-s3-fix-vulnerabilita-screen-lock.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/samsung-galaxy-s3-logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>samsung-galaxy-s3-logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-l-uragano-non-si-ferma-mai.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/Mark-Zuckerberg-CEO-Of-Facebook.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Mark-Zuckerberg-CEO-Of-Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/vietare-il-porno-sulla-rete-europa-e-islanda-a-confronto.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/porno-sicuro.jpeg</image:loc>
			<image:caption>Vietare il porno sulla Rete: Europa e Islanda a confronto</image:caption>
			<image:title>Vietare il porno sulla Rete: Europa e Islanda a confronto</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/arriva-callapp-addio-privacy.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/callapp.png</image:loc>
			<image:caption></image:caption>
			<image:title>callapp</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/security-summit-dal-12-al-14-marzo-a-milano.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/secsumm.jpeg</image:loc>
			<image:caption>Security Summit: dal 12 al 14 marzo a Milano </image:caption>
			<image:title>Security Summit: dal 12 al 14 marzo a Milano </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/pwnium-3-svelate-le-sue-caratteristiche.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/pwnium_exploit.jpg</image:loc>
			<image:caption>Pwnium 3: svelate le sue caratteristiche</image:caption>
			<image:title>Pwnium 3: svelate le sue caratteristiche</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-e-la-funzione-sign-in.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/google-sign-in.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-sign-in</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/athcon-conferenza-dedicata-alle-problematiche-itsec.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/preview.jpeg</image:loc>
			<image:caption>AthCon: conferenza dedicata alle problematiche ITSec</image:caption>
			<image:title>AthCon: conferenza dedicata alle problematiche ITSec</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/flop-windows-rt-in-germania-samsung-ritira-i-tablet.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/windows-rt.jpg</image:loc>
			<image:caption>Flop Windows RT in Germania: Samsung ritira i tablet</image:caption>
			<image:title>Flop Windows RT in Germania: Samsung ritira i tablet</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/corso-seo-strategie-di-posizionamento-su-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/strategie-posizionamento-indicizzazione-google.png</image:loc>
			<image:caption></image:caption>
			<image:title>strategie-posizionamento-indicizzazione-google</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/doodle-festa-della-donna-2013.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/018979-470-doodle_festa_donna.png.jpeg</image:loc>
			<image:caption>Doodle festa della donna 2013</image:caption>
			<image:title>Doodle festa della donna 2013</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cyber-crime-conference-27-28-marzo-a-roma.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/cybercrime.jpg</image:loc>
			<image:caption>Cyber Crime Conference: 27, 28 marzo a Roma q</image:caption>
			<image:title>Cyber Crime Conference: 27, 28 marzo a Roma </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/matt-cutts-e-le-notifiche-di-google-webmaster-tools.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/matt-cutts.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>matt-cutts</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iphone-5s-e-ipad-5-l%e2%80%99uscita-prevista-entro-il-2013.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/iphone-5s-concept.jpg</image:loc>
			<image:caption>iPhone 5S e iPad 5: l’uscita prevista entro il 2013</image:caption>
			<image:title>iPhone 5S e iPad 5: l’uscita prevista entro il 2013</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ubuntu-su-computer-hp-una-nuova-proposta.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/018962-470-hp_ubuntu.jpg</image:loc>
			<image:caption>Ubuntu su computer HP: una nuova proposta</image:caption>
			<image:title>Ubuntu su computer HP: una nuova proposta</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/samsung-galaxy-s3-vulnerabilita-per-lo-screen-lock.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/samsung-Galaxy-S3.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>samsung-Galaxy-S3</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/fastweb-telecom-e-la-vdsl2.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/fastweb-telecom-adsl.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>fastweb-telecom-adsl</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/the-pirate-bay-non-si-trasferisce-in-nord-corea.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/the-pirate-bay-with-north-korea-flag.png.jpeg</image:loc>
			<image:caption>The Pirate Bay non si trasferisce in Nord Corea</image:caption>
			<image:title>The Pirate Bay non si trasferisce in Nord Corea</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/siamo-vicini-al-lancio-dei-google-glass.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/ggss.jpg</image:loc>
			<image:caption>Siamo vicini al lancio dei Google Glass?</image:caption>
			<image:title>Siamo vicini al lancio dei Google Glass?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/quanto-sono-social-le-aziende-italiane.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/social-network.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>social-network</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/we-are-legion-the-story-of-the-hacktivists.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/we-are-legion-story-hacktivists-anonymous.png</image:loc>
			<image:caption></image:caption>
			<image:title>we-are-legion-story-hacktivists-anonymous</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/musica-streaming-il-nuovo-business-di-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/AppleGoogleMusicWar_610x426.jpg</image:loc>
			<image:caption>Musica streaming: il nuovo business di Google </image:caption>
			<image:title>Musica streaming: il nuovo business di Google </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/vigili-del-fuoco-cnr-e-corriere-nel-bottino-di-gr33nrage.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/vigili_del_fuoco.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>vigili_del_fuoco</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/sql-injection-corriere-it.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>sql-injection-corriere-it</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/smartphone-personale-o-telefono-aziendale-samsung-knox.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/samsung-knox.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>samsung-knox</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-zebra-update.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/google-zebra.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-zebra</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bersani-2013-sito-vulnerabile-a-sql-injection.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/bersani-2013-sql-injection.png</image:loc>
			<image:caption></image:caption>
			<image:title>bersani-2013-sql-injection</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/corso-advanced-seo-tool-con-giorgio-taverniti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/advanced-seo-tool-taverniti-bologna.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>advanced-seo-tool-taverniti-bologna</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/groupon-in-crisi-la-fine-di-un-modello.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/groupon-office1.jpg</image:loc>
			<image:caption>Groupon in crisi: la fine di un modello?</image:caption>
			<image:title>Groupon in crisi: la fine di un modello?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/pinterest-e-twitter-social-piu-utilizzati-usa-2012.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/twitter-pinterest-social-network.png</image:loc>
			<image:caption>Pinterest e Twitter tra i social più utilizzati in U.S.A. nel 2012</image:caption>
			<image:title>twitter-pinterest-social-network</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nuovo-brevetto-google-per-interfaccia-tablet.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/google-patent-adaptable-ui-1-600x706-600x380.jpg</image:loc>
			<image:caption>Nuovo brevetto Google per interfaccia tablet</image:caption>
			<image:title>Nuovo brevetto Google per interfaccia tablet</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/google-patent-adaptable-ui.jpg</image:loc>
			<image:caption>Nuovo brevetto Google per interfaccia tablet</image:caption>
			<image:title>Nuovo brevetto Google per interfaccia tablet</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/the-pirate-bay-scaricabile-la-versione-compressa.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/pirate-bay3-580-75.jpg</image:loc>
			<image:caption>The Pirate Bay: scaricabile la versione compressa</image:caption>
			<image:title>The Pirate Bay: scaricabile la versione compressa</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/influenza-social-media-nuove-strategie-web-marketing.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/social-network-web-marketing.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>social-network-web-marketing</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/corso-seo-gratuito-da-register.it-e-madri-internet-marketing.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/03/seo-corso-gratuito-webinar-register-madri.png</image:loc>
			<image:caption></image:caption>
			<image:title>seo-corso-gratuito-webinar-register-madri</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/whatsapp-sotto-il-controllo-del-garante-per-la-privacy.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/whatsapp.jpeg</image:loc>
			<image:caption>WhatsApp sotto il controllo del Garante per la Privacy</image:caption>
			<image:title>WhatsApp sotto il controllo del Garante per la Privacy</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-terza-impresa-al-mondo-secondo-bloomberg.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/azioni_google__un_nuovo_pacchetto_per_concetrare_il_controllo_della_societ___8179.jpg</image:loc>
			<image:caption>Google terza impresa al mondo secondo Bloomberg </image:caption>
			<image:title>Google terza impresa al mondo secondo Bloomberg </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/webinar-architecta-una-primavera-di-formazione-gratuita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/architecta-societa-italiana-architettura-informazione.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>architecta-societa-italiana-architettura-informazione</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/elezioni-2013-la-vittoria-della-rete.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/grillo-movimento-5-stelle-elezioni-2013.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>grillo-movimento-5-stelle-elezioni-2013</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/l43-movimento-5stelle-scheda-130224201652_medium.jpg</image:loc>
			<image:caption>Elezioni 2013: la vittoria della Rete</image:caption>
			<image:title>Elezioni 2013: la vittoria della Rete</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/elezioni-2013-google-epic-fail-giannino-meglio-di-grillo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google-result-monti-grillo.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-result- monti-grillo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google-result-giannino-grillo.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-result-giannino-grillo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/elezioni-2013-come-seguire-i-sondaggi-risultati-online.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/politiche-2013-app.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>politiche-2013-app</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/politiche-2013-app-logo.png</image:loc>
			<image:caption></image:caption>
			<image:title>politiche-2013-app-logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/polis-meter-elezioni-2013.png</image:loc>
			<image:caption></image:caption>
			<image:title>polis-meter-elezioni-2013</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google-la-stampa-elezioni-2013.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-la-stampa-elezioni-2013</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/netsentiment-tiscali-elezioni-2013.png</image:loc>
			<image:caption></image:caption>
			<image:title>netsentiment-tiscali-elezioni-2013</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/buzzlogger-osservatorio-elezioni-2013.png</image:loc>
			<image:caption></image:caption>
			<image:title>buzzlogger-osservatorio-elezioni-2013</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/truffa-web-legata-la-mondo-del-lavoro.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/truffatori_pc.jpg</image:loc>
			<image:caption>Truffa web legata la mondo del lavoro </image:caption>
			<image:title>Truffa web legata la mondo del lavoro </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/elezioni-2013-come-seguire-i-sondaggi-risultati-online.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/risultati-elezioni-2013-online.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>risultati-elezioni-2013-online</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/in-arrivo-smartphone-trasparente-e-tablet-futuristici.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/transparent-smartphone-polytron.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>transparent-smartphone-polytron</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-self-driving-car-nel-2018-l-automobile-autonoma.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/Google-Self-Driving-car.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google-Self-Driving-car</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-play-music-un-brano-gratuito-a-settimana.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google_play_music.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google_play_music</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-io-dal-13-marzo-la-vendita-dei-biglietti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google-io.png</image:loc>
			<image:caption>Google I/O: dal 13 marzo la vendita dei biglietti</image:caption>
			<image:title>Google I/O: dal 13 marzo la vendita dei biglietti</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cina-vs-usa-i-cyber-attacchi-sanciscono-una-nuova-guerra-fredda.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/La-cyber-guerra-della-Cina-contro-gli-Usa_h_partb.jpg</image:loc>
			<image:caption>Cina vs USA: i cyber-attacchi sanciscono una nuova guerra fredda </image:caption>
			<image:title>Cina vs USA: i cyber-attacchi sanciscono una nuova guerra fredda </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/seo-tips-come-verificare-il-proprio-sito-con-google-webmaster-tools.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/Google-Webmaster-Tools.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google-Webmaster-Tools</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google-webmaster-tools-step-1.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-webmaster-tools-step-1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mobile-hacking-facile-con-un-nexus-7-pwn-pad.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/pwd-pad-screenshot-2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>pwd-pad-screenshot-2</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/pwd-pad-screenshot-metasploit.png</image:loc>
			<image:caption></image:caption>
			<image:title>pwd-pad-screenshot-metasploit</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/pwd-pad-screenshot.png</image:loc>
			<image:caption></image:caption>
			<image:title>pwd-pad-screenshot</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-drive-web-hosting.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/Users-can-now-host-webpages-on-Google-Drive.jpg</image:loc>
			<image:caption>Google Drive Host webpage</image:caption>
			<image:title>Google Drive Host webpage</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mobile-hacking-facile-con-un-nexus-7-pwn-pad.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/nexus-7-pwn-pad.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>nexus-7-pwn-pad</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/adobe-corregge-due-vulnerabilita-critiche.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/adobe-zero-day-vulnerability-patch.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>adobe-zero-day-vulnerability-patch</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-glass-experience-ecco-cosa-si-prova.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google-glass-experience.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-glass-experience</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mega-valutazioni-ad-un-mese-dalla-rinascita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/megaupload-mega-kim-dotcom-news.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>megaupload-mega-kim-dotcom-news</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/alexa_mega_compare.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>alexa_mega_compare</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/mega_news.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>mega_news</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/multa-da-64-milioni-per-italianshare.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/pirate_italianshare.jpg</image:loc>
			<image:caption>Multa da 6,4 milioni per Italianshare</image:caption>
			<image:title>Multa da 6,4 milioni per Italianshare</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/seo-tips-invio-della-sitemap-a-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/sitemap.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>sitemap</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google-webmaster-tools-insert-sitemap-step-2.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-webmaster-tools-insert-sitemap-step-2</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google-webmaster-tools-insert-sitemap-step-1.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-webmaster-tools-insert-sitemap-step-1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-store-il-lancio-previsto-entro-la-fine-dell%e2%80%99anno.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/images.jpeg</image:loc>
			<image:caption>Google Store: il lancio previsto entro la fine dell’anno</image:caption>
			<image:title>Google Store: il lancio previsto entro la fine dell’anno</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/singapore-google-indoor-maps-per-i-centri-commerciali.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/orchard-google-map-indoor.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>orchard-google-map-indoor</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iwatch-la-tecnologia-da-15-pollici.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/iwatch-apple.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>iwatch-apple</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-10-minuti-di-consigli-seo-per-le-startup.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google-webmaster-central-seo-suggestion.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-webmaster-central-seo-suggestion</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/la-questione-della-privacy-da-google-a-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/87_google-is-watching1.png</image:loc>
			<image:caption>La questione della privacy: da Google a Facebook</image:caption>
			<image:title>La questione della privacy: da Google a Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-conferma-l-attacco-hacker.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/facebook-hacker-2013.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-hacker-2013</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/displair-il-display-ad-aria-presentato-al-ces-2013.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/displair-air-display-ces-2013.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>displair-air-display-ces-2013</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/riot-la-tua-privacy-non-e-piu-al-sicuro.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/nemico-pubblico-will-smith.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>nemico-pubblico-will-smith</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/the-bees-awards-2013.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/bees-awards-2013.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>bees-awards-2013</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/aggiornamento-di-adwords-le-campagne-potenziate.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google-adwords-enanched-campaign.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>google-adwords-enanched-campaign</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wi-fi-pubblico-non-ce-l-obbligo-di-registrazione-dati.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/wifi_t.jpg</image:loc>
			<image:caption>Wi-fi pubblico: non c’è l’obbligo di registrazione dati</image:caption>
			<image:title>Wi-fi pubblico: non c’è l’obbligo di registrazione dati</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/la-polemica-whatsapp-a-pagamento.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/whatsapp-android-iphone.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Telefonate WhatsApp</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sicurezza-informatica-il-nuovo-progetto-usa.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/images-1.jpeg</image:loc>
			<image:caption>Sicurezza informatica: il nuovo progetto USA</image:caption>
			<image:title>Sicurezza informatica: il nuovo progetto USA</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ad-world-experience-2013.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/adworld-experience-20131.png</image:loc>
			<image:caption></image:caption>
			<image:title>adworld-experience-2013</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-capire-se-siete-stati-penalizzati-da-google-penguin.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google_penguin_update.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google_penguin_update</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ad-world-experience-2013.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/adworld-experience-2013.png</image:loc>
			<image:caption></image:caption>
			<image:title>adworld-experience-2013</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/estensione-firefox-mega-la-soluzione-dedicata-alla-creatura-dotcom.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/mega1.jpg</image:loc>
			<image:caption>Estensione Firefox MEGA: la soluzione dedicata alla creatura Dotcom </image:caption>
			<image:title>Estensione Firefox MEGA: la soluzione dedicata alla creatura Dotcom </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/fix-immagini-nella-sitemap-google-news.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google-news-sitemap-images-tag.png</image:loc>
			<image:caption></image:caption>
			<image:title>google-news-sitemap-images-tag</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/download-icon.png</image:loc>
			<image:caption></image:caption>
			<image:title>download-icon</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/error-indexing-sitemap-image-google-news.png</image:loc>
			<image:caption></image:caption>
			<image:title>error-indexing-sitemap-image-google-news</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google-news-sitemap.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-news-sitemap</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/spotify-nasce-la-versione-italiana.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/Spotify-Italia-630x393-622x388.png</image:loc>
			<image:caption>Spotify: nasce la versione italiana</image:caption>
			<image:title>Spotify: nasce la versione italiana</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/b-com-un-punto-di-incontro-tra-web-marketing-e-aziende.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/bcom-logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>logo_ita</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-guest-blogging-come-strumento-di-link-building.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/guest-blogging.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>guest-blogging</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/le-aziende-italiane-snobbano-linkedin-perche-e-come-utilizzarlo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/linkedin-logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>linkedin-logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/accordo-tra-google-e-yahoo-sulla-pubblicita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/yahoo-google-advertising.png</image:loc>
			<image:caption></image:caption>
			<image:title>yahoo-google-advertising</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/social-media-week-milano-18-22-febbraio-2013.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/social-media-week-2013-milan.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>social-media-week-2013-milan</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cybercrime-nasce-il-primo-centro-europeo-per-combattere-crimini-web.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/cybercrime.jpg</image:loc>
			<image:caption>Cybercrime: nasce il primo centro europeo per combattere crimini web</image:caption>
			<image:title>Cybercrime: nasce il primo centro europeo per combattere crimini web</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/vine-troppi-porno-lapp-diventa-vietata-ai-minori.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/vine-twitter.gif</image:loc>
			<image:caption>Vine: troppi porno, l'app diventa vietata ai minori</image:caption>
			<image:title>Vine: troppi porno, l'app diventa vietata ai minori</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/symantec-cyber-readiness-challenge-2013-metti-alla-prova-l-hacker-che-e-in-te.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/symantec-cyber-readiness-challenge.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>symantec-cyber-readiness-challenge</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/jailbreak-ios-6-1-con-tool-evasi0n.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/evasi0n-jailbreak-boot.png</image:loc>
			<image:caption></image:caption>
			<image:title>evasi0n-jailbreak-boot</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/evasi0n-jailbreak.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>evasi0n-jailbreak</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-ottimizzare-download-torrent.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/uTorrent.png</image:loc>
			<image:caption>Come ottimizzare il download torrent?</image:caption>
			<image:title>Come ottimizzare il download torrent?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/dipendenza-da-facebook-in-usa-e-non-solo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/facebook_page_profilo1.jpg</image:loc>
			<image:caption>Dipendenza da Facebook in USA (e non solo)</image:caption>
			<image:title>Dipendenza da Facebook in USA (e non solo)</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/facebook_page_profilo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook_page_profilo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/microsoft-vs-google-accusato-bigg-di-violare-la-privacy.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/microsoftvsGoogle.jpg</image:loc>
			<image:caption>Microsoft vs Google: accusato BigG di violare la privacy</image:caption>
			<image:title>Microsoft vs Google: accusato BigG di violare la privacy</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/scaricare-torrent-da-iphone-e-ipad-ecco-la-guida-basata-su-itransmission.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/itransmission.jpg</image:loc>
			<image:caption>Scaricare torrent da iPhone e iPad: ecco la guida basata su iTransmission</image:caption>
			<image:title>Scaricare torrent da iPhone e iPad: ecco la guida basata su iTransmission</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/seo-tips-velocizzare-il-caricamento-delle-pagine-del-proprio-sito-web.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/page-speed-optimization.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>page-speed-optimization</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-eseguire-il-jailbreak-ios-6-0-1.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/jail-3.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>jail-3</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/jail-2-456x600.png</image:loc>
			<image:caption></image:caption>
			<image:title>jail-2-456x600</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/jailbreak-ios-6-0-1.jpg</image:loc>
			<image:caption>Come eseguire il jailbreak iOS 6.0.1</image:caption>
			<image:title>Come eseguire il jailbreak iOS 6.0.1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/fancy-e-le-aziende.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/fancy-social-network.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>fancy-social-network</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/chromebook-l-offerta-si-arricchisce-dellhp-pavilion-14.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/hp-chromebook-v1-620x465.jpg</image:loc>
			<image:caption>Chromebook, l'offerta si arricchisce dell'HP Pavilion 14</image:caption>
			<image:title>Chromebook, l'offerta si arricchisce dell'HP Pavilion 14</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/search-mega-eliminazione-voluta-da-mega.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/screenshot-mega-search.me_.png</image:loc>
			<image:caption>Search-Mega: eliminazione voluta da Mega </image:caption>
			<image:title>Search-Mega: eliminazione voluta da Mega </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-plus-e-le-aziende.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/google-plus-seo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-plus-seo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cina-vs-usa-e-guerra-tra-cyber-army.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/usa-china-switch-1024x426.jpg</image:loc>
			<image:caption>Cina Vs USA: è guerra tra cyber army</image:caption>
			<image:title>Cina Vs USA: è guerra tra cyber army</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/seo-tips-il-contenuto-perfetto.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/ottimizzazione-contenuti-seo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>ottimizzazione-contenuti-seo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/twitter-subisce-un-attacco-a-rischio-250mila-user.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/twitter-marketing.jpg</image:loc>
			<image:caption>Twitter subisce un attacco, a rischio 250mila user</image:caption>
			<image:title>Twitter subisce un attacco, a rischio 250mila user</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/new-york-times-sotto-lattacco-di-hacker-cinesi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/images-2.jpg</image:loc>
			<image:caption>New York Times sotto l'attacco di hacker cinesi </image:caption>
			<image:title>New York Times sotto l'attacco di hacker cinesi </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mega-nasce-un-motore-di-ricerca-dei-contenuti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/mega-search.png</image:loc>
			<image:caption></image:caption>
			<image:title>mega-search</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/02/images-1.jpg</image:loc>
			<image:caption>Mega: nasce un motore di ricerca dei contenuti</image:caption>
			<image:title>Mega: nasce un motore di ricerca dei contenuti</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-e-youtube-contenuti-in-hd-ma-solo-in-abbonamento.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/google-youtube.jpg</image:loc>
			<image:caption>Google e Youtube: contenuti in HD ma solo in abbonamento?</image:caption>
			<image:title>Google e Youtube: contenuti in HD ma solo in abbonamento?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bittorrent-sync-un-nuovo-servizio-di-storage-online.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/BitTorrent-Sync.jpg</image:loc>
			<image:caption>BitTorrent Sync, un nuovo servizio di storage online</image:caption>
			<image:title>BitTorrent Sync, un nuovo servizio di storage online</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cupertino-lanciato-il-nuovo-aggiornamento-ios-6.1.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/ios61.jpeg</image:loc>
			<image:caption>Cupertino lanciato il nuovo aggiornamento iOS 6.1</image:caption>
			<image:title>Cupertino lanciato il nuovo aggiornamento iOS 6.1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/internet-e-un-diritto-almeno-in-germania.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/images1.jpg</image:loc>
			<image:caption>Internet è un diritto, almeno in Germania</image:caption>
			<image:title>Internet è un diritto, almeno in Germania</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/seo-on-page-la-struttura-del-proprio-sito.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/seo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>seo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/riciclaggio-dei-like-facebook-pubblica-in-nome-degli-utenti-ignari.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/facebook-like.jpg</image:loc>
			<image:caption>Riciclaggio dei like: Facebook pubblica in nome degli utenti ignari</image:caption>
			<image:title>Riciclaggio dei like: Facebook pubblica in nome degli utenti ignari</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-glass-page-avvistato-in-metro-con-gli-occhiali-a-realta-aumentata.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/brin-glass-subway.jpg</image:loc>
			<image:caption>Google Glass: Page in metro</image:caption>
			<image:title>Google Glass: Page in metro</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/twitter-business-e-le-aziende.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/twitter-business.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>twitter-business</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/schema.org-l-importanza-del-mark-up-per-i-seo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/microdata-feature.png</image:loc>
			<image:caption></image:caption>
			<image:title>microdata-feature</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/scoop-it-il-social-network-dedicato-alle-idee-che-contano.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/logo-scoop-it.png</image:loc>
			<image:caption></image:caption>
			<image:title>logo-scoop-it</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/twitter-lancia-vine-un-applicazione-per-condividere-brevi-video.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/twitter-vine.png</image:loc>
			<image:caption></image:caption>
			<image:title>twitter-vine</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ebay-sotto-la-lente-della-guarda-di-finanza.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/vendere-su-ebay.jpg</image:loc>
			<image:caption>eBay sotto la lente della Guarda di Finanza </image:caption>
			<image:title>eBay sotto la lente della Guarda di Finanza </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/spirosmart-liphone-si-trasforma-in-spirometro.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/images.jpg</image:loc>
			<image:caption>SpiroSmart: l'iPhone si trasforma in spirometro</image:caption>
			<image:title>SpiroSmart: l'iPhone si trasforma in spirometro</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-graph-search-il-nuovo-ruolo-dei-like-e-i-problemi-con-la-privacy.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/facebook-graph-search.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-graph-search</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-earth-finalmente-ottimizzato-per-honeycomb.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/google-apps-278x300.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-apps-278x300</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/knowledge-graph-una-rivoluzione-della-ricerca-solo-a-meta.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/static-graph.png</image:loc>
			<image:caption>Knowledge Graph</image:caption>
			<image:title>Knowledge Graph</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kaspersky-lancera-un-sistema-operativo-per-computer-industriali.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/kaspersky-logo1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>kaspersky-logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/seo-tips-la-scelta-del-nome-di-dominio.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/domain-name.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>domain-name</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/quali-sono-i-siti-torrent-piu-popolari.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/bittorrent-sito-torrent1.jpg</image:loc>
			<image:caption>Quali sono i siti torrent più popolari?</image:caption>
			<image:title>Quali sono i siti torrent più popolari?</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/bittorrent-sito-torrent.jpg</image:loc>
			<image:caption>Quali sono i siti torrent più popolari?</image:caption>
			<image:title>Quali sono i siti torrent più popolari?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/windows-upgrade-offer-offerta-speciale-per-passare-a-windows-8.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/7177011622_6d1c56e379_z.jpg</image:loc>
			<image:caption>Windows Upgrade Offer: l'offerta speciale per passare a Windows 8</image:caption>
			<image:title>Windows Upgrade Offer: l'offerta speciale per passare a Windows 8</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-e-le-aziende-i-tool-per-l-e-commerce.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/facebook-ecommerce1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-ecommerce</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/facebook-ecommerce.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-ecommerce</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/project-glass-cambiera-la-nostra-percezione-della-realta.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/google-project-glass.jpg</image:loc>
			<image:caption>Project Glass cambierà la nostra percezione della realtà?</image:caption>
			<image:title>Project Glass cambierà la nostra percezione della realtà?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-progetta-unalternativa-alle-password.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/google.jpg</image:loc>
			<image:caption>Google progetta un'alternativa alle password</image:caption>
			<image:title>Google progetta un'alternativa alle password</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/clud-file-sharing-mega-il-video-della-presentazione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/mega-press-conference-kim-dotcom.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>mega-press-conference-kim-dotcom</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/alternativa-a-installous-come-installare-app-vv.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/APPVV-Beiphone.png</image:loc>
			<image:caption>Alternativa a Installous: come installare APP VV?</image:caption>
			<image:title>Alternativa a Installous: come installare APP VV?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/rinasce-megaupload-e-nato-mega.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/chi-siamo-mega.png</image:loc>
			<image:caption></image:caption>
			<image:title>chi-siamo-mega</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/mega-account-pro1.png</image:loc>
			<image:caption></image:caption>
			<image:title>mega-account-pro</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/mega-file-manager.png</image:loc>
			<image:caption></image:caption>
			<image:title>mega-file-manager</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/mega-account-pro.png</image:loc>
			<image:caption></image:caption>
			<image:title>mega-account-pro</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/a-poche-ore-dal-lancio-mega-e-gia-down.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/mega-24-minutes-left.png</image:loc>
			<image:caption></image:caption>
			<image:title>mega-24-minutes-left</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/mega-down-dns.png</image:loc>
			<image:caption></image:caption>
			<image:title>mega-down-dns</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ottimizzazione-delle-immagini-l-importanza-dei-file-immagine-per-una-buona-seo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/seo-optimization-images.png</image:loc>
			<image:caption></image:caption>
			<image:title>seo-optimization-images</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/pdftribute-la-rete-celebra-la-scomparsa-di-aaron-swartz.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/pdftribute.jpg</image:loc>
			<image:caption>#Pdftribute: la Rete celebra la scomparsa di Aeron Swartz</image:caption>
			<image:title>#Pdftribute: la Rete celebra la scomparsa di Aeron Swartz</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/messaggi-nascosti-di-skype-nelle-chiamate.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/018758-470-skypehide.jpg</image:loc>
			<image:caption>Messaggi nascosti di Skype nelle chiamate</image:caption>
			<image:title>Messaggi nascosti di Skype nelle chiamate</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/seo-tips-cos%e2%80%99e-il-seo-e-quali-sono-le-sue-basi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/SEO.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>SEO</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-hacker-cup-2013-10mila-dollari-in-palio.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/facebook-hacker-cup-2013.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-hacker-cup-2013</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/pinterest-e-il-web-marketing.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/pinterest-social-media-logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>pinterest-social-media-logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/operation-red-october-malware-che-ha-colpito-lintelligence-internazionale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/red-october-640x451.png</image:loc>
			<image:caption>Operation Red October: malware che ha colpito l'intelligence internazionale</image:caption>
			<image:title>Operation Red October: malware che ha colpito l'intelligence internazionale</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-lancia-graph-search-funzionera.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/original.jpg</image:loc>
			<image:caption>Facebook lancia Graph Search, funzionerà?</image:caption>
			<image:title>Facebook lancia Graph Search, funzionerà?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mega-nuovo-screenshot-da-kim-dotcom.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/mega-alternative-megaupload.png</image:loc>
			<image:caption></image:caption>
			<image:title>mega-alternative-megaupload</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/mega-dotcom-19-gennaio.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>mega-dotcom-19-gennaio</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/kim-dotcom.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>kim-dotcom</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-perde-il-4-in-borsa-per-liphone-5.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/18157846_apple-17-miliardi-di-dollari-se-entrasse-nel-mondo-delle-hdtv-0.jpg</image:loc>
			<image:caption>Apple perde il 4% in borsa per l'iPhone 5</image:caption>
			<image:title>Apple perde il 4% in borsa per l'iPhone 5</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-news-errore-nel-nome-pubblicazione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/google-news.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-news</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/nome-pubblicazione-google-news.png</image:loc>
			<image:caption></image:caption>
			<image:title>Nome Pubblicazione errato in Google News</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ebay-progetta-centri-di-assistenza-fisici.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/800px-EBay_Logo_svg.60171113_std.png</image:loc>
			<image:caption>eBay progetta centri di assistenza fisici</image:caption>
			<image:title>eBay progetta centri di assistenza fisici</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-os-domani-il-lancio.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/FacebookintegrationwithiPhoneOS.jpg</image:loc>
			<image:caption>Facebook OS, domani il lancio?</image:caption>
			<image:title>Facebook OS, domani il lancio?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-search-plus-your-world-e-gli-effetti-sulla-seo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/google-plus-search.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-plus-search</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/aaron-swartz-lhacker-legato-a-wikileaks-si-suicida.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/018749-470-aaron-swartz.jpg</image:loc>
			<image:caption>Aaron Swartz: l'hacker legato a Wikileaks si suicida</image:caption>
			<image:title>Aaron Swartz: l'hacker legato a Wikileaks si suicida</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-scaricare-video-audio-da-youtube.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/youtube-download.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>youtube-download</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/youtube-downloader.png</image:loc>
			<image:caption></image:caption>
			<image:title>Best Video Downloader</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/megaupload.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/megaupload11-800x435.jpg</image:loc>
			<image:caption>Megaupload: dalla nascita al lancio di ME-GA</image:caption>
			<image:title>Megaupload: dalla nascita al lancio di ME-GA</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/microsoft-furto-degli-ipad-negli-uffici.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/ipad-hero.jpg</image:loc>
			<image:caption>Microsoft: furto degli iPad negli uffici</image:caption>
			<image:title>Microsoft: furto degli iPad negli uffici</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-ruolo-delle-directories-per-un-buon-posizionamento-seo-su-motori-di-ricerca.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/SEO-directories.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>SEO Directory</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/gestore-delle-pagine-facebook-per-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/facebook-pages-manager-android.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook Pages Manager per Android</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/messenger-va-in-pensione-il-15-marzo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/windows-aero-messenger.jpg</image:loc>
			<image:caption>Messenger va in pensione il 15 marzo</image:caption>
			<image:title>Messenger va in pensione il 15 marzo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/gestore-delle-pagine-facebook-per-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/gestione-pagine-facebook-012.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Gestione Pagine Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-offre-wi-fi-free-a-newyork.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/GoogleWiFi.jpeg</image:loc>
			<image:caption>Google offre Wi-fi free a NewYork</image:caption>
			<image:title>Google offre Wi-fi free a NewYork</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/estensioni-silenti-per-google-chrome.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/Sideload-wipeout-final-3.png</image:loc>
			<image:caption>Estensioni silenti per Google Chrome</image:caption>
			<image:title>Estensioni silenti per Google Chrome</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/quale-alternativa-installous-come-installare-vshare.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/vShare.png</image:loc>
			<image:caption>Quale alternativa Installous? Come installare vShare</image:caption>
			<image:title>Quale alternativa Installous? Come installare vShare</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/in-corso-fino-all11-gennaio-il-ces-di-las-vegas.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/Ces-2013-le-cinque-grandi-tendenze-della-fiera_h_partb.jpg</image:loc>
			<image:caption>In corso fino all'11 gennaio il CES di Las Vegas 	</image:caption>
			<image:title>In corso fino all'11 gennaio il CES di Las Vegas 	</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tyler-progetto-di-leaking-anonimo-e-decentralizzato.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/tumblr_m8foxfRku11r2zn66o1_1280.jpg</image:loc>
			<image:caption>Tyler, progetto di leaking anonimo e decentralizzato</image:caption>
			<image:title>Tyler, progetto di leaking anonimo e decentralizzato</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-sta-testando-lapp-per-chiamate-gratuite.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/facebook-come-skype-telefonate-gratis-con-facebook-messenger.jpg</image:loc>
			<image:caption>Facebook sta testando l'app per chiamate gratuite</image:caption>
			<image:title>Facebook sta testando l'app per chiamate gratuite</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mymovies.it-lofferta-streaming-dedicata-ai-cinefili.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/mymovies-logo-734729.png</image:loc>
			<image:caption>MyMovies.it: l'offerta streaming dedicata ai cinefili</image:caption>
			<image:title>MyMovies.it: l'offerta streaming dedicata ai cinefili</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/android-console-primi-video-ouya-in-azione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/0.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Ouya mentre si gioca a Roasty Rooster</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tizen-sara-il-nuovo-os-usato-da-samsung.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/tizen_thelinuxfoundation.jpg</image:loc>
			<image:caption>Tizen sarà il nuovo OS usato da Samsung</image:caption>
			<image:title>Tizen sarà il nuovo OS usato da Samsung</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ubuntu-phone-os-gestures-ecco-il-video.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/ubuntu.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Ubuntu Phone Os</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/smartphone-con-ubuntu-phone-os-per-il-2014.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/youtube-video-ubuntu-os.png</image:loc>
			<image:caption></image:caption>
			<image:title>Video dell'Ubuntu Phone Os</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonymous-promette-battaglia-per-il-nuovo-anno-%e2%80%9cexpect-us-2013%e2%80%9d.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/anonymous_dipartimento_usa_internet.jpg</image:loc>
			<image:caption>Anonymous promette battaglia per il nuovo anno: “Expect us 2013”</image:caption>
			<image:title>Anonymous promette battaglia per il nuovo anno: “Expect us 2013”</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/smartphone-con-ubuntu-phone-os-per-il-2014.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/ubuntu-phone-requirement.png</image:loc>
			<image:caption></image:caption>
			<image:title>Ubuntu Phone Os: Requisiti</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/convergenza-desktop-ubuntu-phone.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Ubuntu Phone Os: Convergenza Desktop</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/ubuntu-smartphone.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Ubuntu Os per smartphone</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/risparmia-sulle-telefonate-passa-al-voip.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/VOIP_banner1.gif</image:loc>
			<image:caption></image:caption>
			<image:title>EhiWeb Voip</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mappa-dei-social-network-piu-diffusi-nel-2012.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/i_social_network_nel_2012_4146.jpg</image:loc>
			<image:caption>Mappa dei social network più diffusi nel 2012 - Vincenzo Cosenza</image:caption>
			<image:title>Mappa dei social network più diffusi nel 2012 - Vincenzo Cosenza</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-chiudono-i-servizi-installous-ed-appsync.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/new-icone-installous-112.jpg</image:loc>
			<image:caption>Apple: chiudono i servizi Installous ed AppSync</image:caption>
			<image:title>Apple: chiudono i servizi Installous ed AppSync</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-accedere-al-windows-store-usa.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/Windows-Store-USA.jpg</image:loc>
			<image:caption>Come accedere al Windows Store USA?</image:caption>
			<image:title>Come accedere al Windows Store USA?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonymous-dos-verso-mastercard-poi-verra-il-turno-di-visa.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/visa-mastercard.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Visa Mastercard</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/torrent-i-film-piu-scaricati-del-2012.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2013/01/Torrent-i-film-più-scaricati-del-2012.png</image:loc>
			<image:caption>Torrent: i film più scaricati del 2012</image:caption>
			<image:title>Torrent: i film più scaricati del 2012</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bluestacks-da-via-linvasione-di-android-nel-feudo-apple.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/BlueStacks.jpg</image:loc>
			<image:caption>BlueStacks da via l'invasione di Android nel feudo Apple</image:caption>
			<image:title>BlueStacks da via l'invasione di Android nel feudo Apple</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/youtube-e-major-discografiche-miliardi-di-visualizzazioni-false.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/youtube.png</image:loc>
			<image:caption>Youtube e Major discografiche: miliardi di visualizzazioni fase</image:caption>
			<image:title>Youtube e Major discografiche: miliardi di visualizzazioni fase</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-malware-che-infetta-i-pos-la-scoperta-di-trend-micro.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/trendmicro.jpg</image:loc>
			<image:caption>Il Malware che infetta i POS, la scoperta di Trend Micro </image:caption>
			<image:title>Il Malware che infetta i POS, la scoperta di Trend Micro </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/unboxing-di-ouya-la-prima-console-basata-su-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/ouya01.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Ouya Console</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/spamsoldier-scoperta-la-prima-botnet-di-dispositivi-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/android-botnet.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>SpamSoldier: botnet per Android!</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bug-nel-login-di-twitter-la-rivelazione-thenextweb.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/twitter-unsecure-625x1000.png</image:loc>
			<image:caption>Bug nel login di Twitter, la rivelazione TheNextWeb</image:caption>
			<image:title>Bug nel login di Twitter, la rivelazione TheNextWeb</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/quali-sono-le-migliori-app-google-play-store.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/migliori-app-Google-Play-Store.jpeg</image:loc>
			<image:caption>Quali sono le migliori app Google Play Store?</image:caption>
			<image:title>migliori app Google Play Store</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/spam-e-privacy-su-facebook-gli-auguri-di-fine-anno.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/facebookgrandefratello.jpg</image:loc>
			<image:caption>Spam e privacy su Facebook: gli auguri di fine anno</image:caption>
			<image:title>Spam e privacy su Facebook: gli auguri di fine anno</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/niente-piu-profili-falsi-twitter.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/@TheFakeProject.jpg</image:loc>
			<image:caption>Niente più profili falsi su Twitter</image:caption>
			<image:title>@TheFakeProject</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonymous-contro-la-pedofilia-su-twitter.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/20121225_20121225_anonymous.jpg</image:loc>
			<image:caption>Anonymous contro la pedofilia su Twitter</image:caption>
			<image:title>Anonymous contro la pedofilia su Twitter</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/root-nexus-7-con-un-click-cf-auto-root.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/nexus7-root.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Root del Nexus 7</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/nexus-7-bootloader3.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Nexus 7 FastBoot Mode</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/schermi-flessibili-samsung-al-ces-2013.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/Amoled-blog.jpg</image:loc>
			<image:caption>Schermi flessibili Samsung al CES 2013</image:caption>
			<image:title>Schermi flessibili Samsung al CES 2013</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/code-injection-un-nuovo-exploit-per-i-server-apache.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/Apache_HTTP_SERVER.png</image:loc>
			<image:caption></image:caption>
			<image:title>Apache Malware - Linux/Chapro.A</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/niente-app-google-per-windows-8-e-windows-phone-8.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/TuneUp_Windows8.png</image:loc>
			<image:caption>Niente app Google per Windows 8 e Windows Phone 8</image:caption>
			<image:title>TuneUp_Windows8</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-rapinare-le-banche-nel-xxi-secolo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/How_to_rob_a_bank_in_the_21st_century-1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>How_to_rob_a_bank_in_the_21st_century (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-inaugura-messaggi-a-pagamento-verso-sconosciuti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/logo_facebook.png</image:loc>
			<image:caption>Facebook inaugura messaggi a pagamento verso sconosciuti</image:caption>
			<image:title>Facebook inaugura messaggi a pagamento verso sconosciuti</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/youranonnews-sospeso-laccount-twitter-di-anonymous.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/anonymous.png</image:loc>
			<image:caption>YourAnonNews </image:caption>
			<image:title>YourAnonNews </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/quali-sono-i-migliori-torrent-finder.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/torrent-finder-toolbar-pr4.jpg</image:loc>
			<image:caption>Quali sono i migliori torrent finder?</image:caption>
			<image:title>torrent-finder-toolbar-pr4</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/skype-protegge-davvero-la-nostra-privacy.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/Skype-protegge-davvero-la-nostra-privacy.jpg</image:loc>
			<image:caption>Skype protegge davvero la nostra privacy?</image:caption>
			<image:title>Skype protegge davvero la nostra privacy</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-sotto-assedio-chi-vincera.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/google.jpg</image:loc>
			<image:caption>Google sotto assedio: chi vincerà?</image:caption>
			<image:title>Google sotto assedio: chi vincerà?</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/siri-e-raspberrypi-aprire-il-garage-con-i-comandi-vocali.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/siri-raspberrypi.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>siri-raspberrypi</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/yuilop-lapp-per-chiamare-e-inviare-sms-gratis.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/Yuilop.png</image:loc>
			<image:caption>Yuilop</image:caption>
			<image:title>Yuilop</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wordpress-pingback-feature-falla-permette-attacchi-ddos.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/valid_host_wordpress_pingback_vulnerability.png</image:loc>
			<image:caption></image:caption>
			<image:title>Wordpress Pingback Vulnerability - Valid Request</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/WordPress-Pingback-Vulnerability.png</image:loc>
			<image:caption></image:caption>
			<image:title>WordPress Pingback Vulnerability</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bitcoin-accettato-dai-pagamenti-su-wordpress.com.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/Bitcoin.png</image:loc>
			<image:caption>Bitcoin</image:caption>
			<image:title>Bitcoin</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/airbag-per-tablet-e-smartphone-il-progetto-amazon.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/Airbag-per-tablet-e-smartphone.jpg</image:loc>
			<image:caption>Airbag per tablet e smartphone: il progetto Amazon</image:caption>
			<image:title>Airbag per tablet e smartphone</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/eric-schmidt-google-disoccupazione-e-automatizzazione-delle-imprese.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/eric-schmidt.jpg</image:loc>
			<image:caption>Eric Schmidt automatizzazione impresa</image:caption>
			<image:title>eric schmidt</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/xam-2.0-i-ragazzi-del-politecnico-di-torino-vincono-future-car-challenge.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/XAM-2.0.jpg</image:loc>
			<image:caption>XAM 2.0</image:caption>
			<image:title>XAM 2.0</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wordpress-e-joomla-iframe-malevoli-in-aumento.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/joomla.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Joomla WordPress</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/firefox-os-simulator-lanteprima-del-nuovo-sistema-operativo-mozilla.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/Firefox-OS.jpg</image:loc>
			<image:caption>Firefox OS</image:caption>
			<image:title>Firefox OS</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-maps-tornano-sui-dispositivi-apple.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/Google-Maps.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Maps</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-currents-giunge-alla-versione-2.0.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/capn3m0_currents.png</image:loc>
			<image:caption>Google Currents capn3m0</image:caption>
			<image:title>Google Currents capn3m0</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/5911c3f930ad658df2dbb7ffa08fc8b0_XL.jpeg</image:loc>
			<image:caption>Google Currrents 2.0</image:caption>
			<image:title>Google Currrents 2.0</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/grave-vulnerabilita-mouse-tracking-in-microsoft-internet-explorer-6-10.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/internet-explorer.png</image:loc>
			<image:caption></image:caption>
			<image:title>Internet Explorer</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-accedere-a-torrentreactor-ecco-il-proxy-per-aggirare-il-blocco.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/torrentreactor2.png</image:loc>
			<image:caption></image:caption>
			<image:title>torrentreactor2</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/archos-gamepad-il-nuovo-tablet-android-dedicato-al-gaming.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/Archos-GamePad-1_32314_01.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Archos-GamePad-1_32314_01</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ufficio-licenze-usa-invalida-un-brevetto-apple.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/imac_touch-595x365.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>imac_touch-595x365</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/un-assaggio-di-mega-il-nuovo-megaupload.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/kimdotcom.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>kimdotcom</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/mega-subscription.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Form di registrazione Mega</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/mega-rsa-key.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Mega RSA Key generation</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/mega-filemanager.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Filemanager Account Mega</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/eurograbber-trojan-ruba-oltre-36-milioni-dai-conti-online.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/eurograbber.png</image:loc>
			<image:caption></image:caption>
			<image:title>eurograbber</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nuovo-bug-per-android-jelly-bean-4-2.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/Android-4.2-Jelly-Bean1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Android Jelly Bean 4.2</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/privacy-nellera-dei-social-network.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/facebookprivacy.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Privacy nei Social Network</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/divorzio-tra-twitter-e-instagram-ne-approfitta-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/instagram-facebook-twitter-638x425.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>instagram-facebook-twitter-638x425</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-e-microsoft-un-accordo-per-vincere-il-mercato-dellad-online.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/Facebook-Microsoft-deal.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook-Microsoft-deal</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/capn3m0-websecurity-anche-su-appy-geek.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/appygeek.png</image:loc>
			<image:caption></image:caption>
			<image:title>Appy Geek</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/john-mcafee-viene-arrestato-in-guatemala.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/mcafee_2400587b.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>mcafee_2400587b</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/plannify-nasce-il-motore-di-ricerca-per-lintrattenimento.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/Plannify.png</image:loc>
			<image:caption></image:caption>
			<image:title>Plannify</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/a-dubai-decidono-il-futuro-del-web.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/wcit-12.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>wcit-12</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/intervista-esclusiva-a-alex-atul-il-padre-del-jack-spia-the-pied-piper.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/alex_atul.png</image:loc>
			<image:caption></image:caption>
			<image:title>Alex Atul</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-annuncia-larrivo-di-photo-sync.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/facebook_photo_sync_large_verge_medium_landscape.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook_photo_sync_large_verge_medium_landscape</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-potrebbe-acquisire-whatsapp.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/whatsapp_messenger.png</image:loc>
			<image:caption></image:caption>
			<image:title>whatsapp_messenger</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hack-in-the-box-2012-ios-os-x-security.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/0.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>0</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-e-twitter-speak2tweet-contro-la-censura-in-siria.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/speak2tweet.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>speak2tweet</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/arriva-ouya-la-console-basata-su-android-per-videogiochi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/12/Ouya.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Ouya</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/app-android-scontate-questo-il-natale-secondo-androidpit.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/top_androidpit.png</image:loc>
			<image:caption></image:caption>
			<image:title>Classifica Applicazioni AndroidPIT</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/androidpit.png</image:loc>
			<image:caption></image:caption>
			<image:title>AndroidPIT</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/furto-delle-credenziali-daccesso-al-conto-corrente-online.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/carte-di-credito-revolving-1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>carte-di-credito-revolving-1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-evade-il-fisco-italiano.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/google.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>google</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/attacchi-ai-domini-romeni-google-microsoft-yahoo-paypal.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/bandiera_romania.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>bandiera_romania</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/fckeditor-asp-version-2.6.8-file-upload-protection-bypass.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/FCKeditor.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>FCKeditor</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/malcon-2012-i-futuri-malware-sanno-dei-semplici-jack.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/jack-malware.png</image:loc>
			<image:caption></image:caption>
			<image:title>Malware Jack</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/malcon.png</image:loc>
			<image:caption></image:caption>
			<image:title>MalCon 2012</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/gmail-consente-linvio-di-allegati-da-10gb.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/drive1-1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>drive1 (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/samsung-galaxy-s-iii-quanto-e-robusto.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/01.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>0</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/crack-windows-store-app-di-prova-diventano-complete.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/windows-store-giochi_t.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>windows-store-giochi_t</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/surface-rt-sara-supportato-da-microsoft-per-4-anni.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/microsoftsurfacewindowsrtlead01.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>microsoftsurfacewindowsrtlead01</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-vs-samsung-stop-fornitura-batterie-ipad.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/042511_sg_comics_apple_samsung_rue_liu-2-580x408.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>042511_sg_comics_apple_samsung_rue_liu-2-580x408</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/line-la-nuova-app-ibrida-a-meta-tra-whatsapp-e-fb.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/Line-apps.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Line-apps</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-ingress-realta-aumentata-in-un-gioco-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/ingress.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google Ingress</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/microsoft-a-lavoro-su-occhiali-hi-tech.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/Microsoft-Glass.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Microsoft-Glass</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sailfish-nuovo-sistema-operativo-mobile-del-team-jolla.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/sailfish_os_demo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>sailfish_os_demo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/lo-staff-di-websec-cerca-collaboratori.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/CERCASI-COLLABORATORI.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>CERCASI COLLABORATORI</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/controllo-remoto-delle-lampadine-con-siri.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/iphone-4s-siri.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>iphone-4s-siri</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-puo-divulgare-alle-aziende-il-vostro-cellulare.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/guida-facebook2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>guida facebook</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/guida-facebook1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>guida facebook</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/guida-facebook.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>guida facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/falso-sito-agip-truffa-4000-utenti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/agip.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>agip</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/firefox-integrazione-completa-con-i-social-network.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/Social-API_soccer_game_conversation-copy-1.png</image:loc>
			<image:caption></image:caption>
			<image:title>Social-API_soccer_game_conversation-copy (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-e-yahoo-insieme-contro-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/facebook-e-yahoo-insieme-per-la-ricerca-sociale-638x425.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-e-yahoo-insieme-per-la-ricerca-sociale-638x425</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/paypal-su-facebook-per-mandare-soldi-agli-amici.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/paypal.png</image:loc>
			<image:caption></image:caption>
			<image:title>Paypal Send Money</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/fbpaypal.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Paypal Facebook App</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/misura-internet-programma-per-velocita-adsl-dellagcom.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/speed_240165.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>speed_240165</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/scarsa-trasparenza-nella-promozione-per-aziende-su-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/MarkZuckerberg_Facebook.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>MarkZuckerberg_Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/android-conquista-il-90-del-mercato-cinese.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/google_cina_censura.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google_cina_censura</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kaspersky-lancera-un-sistema-operativo-per-computer-industriali.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/kaspersky-logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>kaspersky-logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bittorrent-multa-da-15mil-di-dollari-per-aver-condiviso-porno.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/4588.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>4588</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-diventera-un-operatore-telefonico.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/google_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google_logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/aggiornamento-android-4.1.2-per-galaxy-s-ii.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/samsung_galaxy_s2_front-600x338.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>samsung_galaxy_s2_front-600x338</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nexus-manager-root-del-nexus-e-altre-funzioni-in-5-minuti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/nexus_manager.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>nexus_manager</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/nexus-manager.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Nexus Manager</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/falla-nel-processo-di-reset-skype.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/Skype.png</image:loc>
			<image:caption></image:caption>
			<image:title>Skype</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/rilasciata-la-versione-preview-di-internet-explorer-10.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/internet-explorer-10-release-preview.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>internet-explorer-10-release-preview</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/fuso-nexus-7-riparazione-piu-google-glasses-explorer-edition.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/32222559.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>32222559</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/2435124675.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>2435124675</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/Nexus-7-in-fumo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Nexus-7-in-fumo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mega.co.nz-il-nuovo-dominio-lanciato-da-kim-dotcom.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/kim-dotcom_219592.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>kim-dotcom_219592</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-e-asus-rimborsano-i-possessori-del-nexus-7-16g-pagato-249.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/Nexus-7-tablet.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Nexus 7</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/traffico-bittorrent-in-aumento-del-40.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/bittorrent-isp-data.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>bittorrent-isp-data</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/blackberry-10-lo-smartphone-piu-sicuro.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/Blackberry-10.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Blackberry-10</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/aggiungi-capn3m0-websecurity-su-google-currents.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/currents.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google Currents</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/capn3m0_currents.png</image:loc>
			<image:caption></image:caption>
			<image:title>capn3m0 WebSecurity on Google Currents</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/SNP_2684183_en_v0.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google Currents</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hackathon-mondiale-firmato-microsoft.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/tag-cloud-hackathon.png</image:loc>
			<image:caption></image:caption>
			<image:title>tag-cloud-hackathon</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/jam-with-chrome-suonare-in-una-band-virtuale-dal-browser.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/jamwithchrome.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>JAM with Chrome</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/servizi-google-ripristinati-dopo-la-censura-cinese.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/google_bloccato_cina_censura-586x312.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google bloccato dalla Cina</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/google_censored_9_nov.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google censurata il 9 novembre</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tablet-linux-e-android-dual-boot-tablet-pengpod.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/pengpad1000-500x350.png</image:loc>
			<image:caption></image:caption>
			<image:title>pengpad1000-500x350</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-arrivano-nuovi-nexus-e-servizi-dedicati.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/google_tv.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google_tv</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/vulnerabilita-0-day-per-adobe-acrobat-reader.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/adobexploit.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>adobexploit</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/groupib.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Group-iB</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/will-it-blend-frullato-di-nexus7ipad-mini-e-kindle-fire-hd.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/nexus_ipadmini_kindle_fire.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>nexus_ipadmini_kindle_fire</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/android-jelly-bean-4.2-scansione-anti-malware-integrata.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/android_4_2_security.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>android_4_2_security</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/android_security.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>android_security</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-subisce-una-multa-da-368-milioni-di-dollari.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/apple-logo1.gif</image:loc>
			<image:caption></image:caption>
			<image:title>apple-logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/apple-logo.gif</image:loc>
			<image:caption></image:caption>
			<image:title>apple-logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/microsoft-manda-in-pensione-messenger.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/Windows_Live_Messenger_Logo.png</image:loc>
			<image:caption></image:caption>
			<image:title>Windows_Live_Messenger_Logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/chiuso-il-dominio-me.ga-sfuma-il-sogno-di-megaupload.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/9452-kim-schimtz-fondatore-di-megaupload.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>9452-kim-schimtz-fondatore-di-megaupload</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/operazione-vendetta-di-anonymous-illeso-paypal.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/50981cd8.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>50981cd8</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ghostshell-rivela-2.5-milioni-di-account-del-governo-russo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/ml4y5q5k56eq0wsvxwdereasonablysmall.png</image:loc>
			<image:caption></image:caption>
			<image:title>ml4y5q5k56eq0wsvxwdereasonablysmall</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/finlandia-internet-a-banda-larga-diritto-costituzionale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/bandalarga_10_05_11.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>bandalarga_10_05_11</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-car-la-macchina-che-si-guida-da-sola-recensita-alla-abc.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/0.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>0</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nuova-falla-nella-sicurezza-di-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/Facebook.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/jailbreak-ios-6.0.1-ecco-la-procedura-da-seguire.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/20004-ios-6.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>20004-ios-6</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/utenti-facebook-in-vendita-a-costo-zero.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/facebook-like.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-like</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-wallet-diventa-mobile.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/Google-Wallet-icon.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google-Wallet-icon</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kim-dotcom-rettifica-la-data-mega-verra-alla-luce-il-19-gennaio-2013.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/mega_19.png</image:loc>
			<image:caption></image:caption>
			<image:title>Me.ga</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-censura-siri-utilizzato-in-attivita-illecite.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/siri-beam.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>siri-beam</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mega-megaupload-tornera-il-20-gennaio-parola-di-kim-dotcom.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/mega_2013.jpg</image:loc>
			<image:caption>Mega arriverà il 20 gennaio 2013</image:caption>
			<image:title>Mega</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/kim1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Kim DotCom</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/11/mega.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Mega</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-festeggia-halloween-con-doodle-interattivo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/happy-halloween-google-doodle-301012.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>happy-halloween-google-doodle-301012</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/arton42554-91af1.png</image:loc>
			<image:caption></image:caption>
			<image:title>arton42554-91af1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/badabing-favorisce-la-pornografia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/tumblr_m17a1i9jCA1qeo314o1_1280.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>tumblr_m17a1i9jCA1qeo314o1_1280</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonymous-attacca-il-ministero-delle-finanze-greco.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/Anonymous-.png</image:loc>
			<image:caption></image:caption>
			<image:title>Anonymous-</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kindle-fire-hd-vs-ipad-mini-confronto-mini-tablet.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/ipad-kindle-fire-side-by-side-2-e1346959030936.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>ipad-kindle-fire-side-by-side-2-e1346959030936</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nuovi-spot-anti-apple-firmati-samsung.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/spot-samsung.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>spot-samsung</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/le-peggiori-password-del-2012.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/password.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>password</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/linux-day-2012-renzo-davoli-gioca-con-il-raspberry-pi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/renzo2.jpg</image:loc>
			<image:caption>Renzo Davoli</image:caption>
			<image:title>Renzo Davoli</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/ld12_erlug.png</image:loc>
			<image:caption></image:caption>
			<image:title>ld12_erlug</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/rifiutato-il-brevetto-overscroll-bounce-di-apple.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/us-patent-no-7469381-on-list-scrolling-and-document-translation-scaling-and-rotation-on-a-touch-screen-display.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>us-patent-no-7469381-on-list-scrolling-and-document-translation-scaling-and-rotation-on-a-touch-screen-display</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/da-oggi-in-vendita-windows-8.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/300px-Win8mtr.png</image:loc>
			<image:caption></image:caption>
			<image:title>300px-Win8mtr</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hack-di-una-rete-usando-dsploit-per-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/0-2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>0 (2)</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonymous-lancia-lalternativa-a-wikileaks-tyler.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/anonymous1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>anonymous1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/istella-lalternativa-made-in-italy-a-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/renato-soru-istella.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>renato-soru-istella</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonymous-colpisce-il-sito-della-polizia-italiana.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/flyer.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>flyer</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ubuntu-13.04-le-dichiarazioni-del-ceo-di-canonical.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/ubuntu-logo-1348699470.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>ubuntu-logo-1348699470</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/la-francia-tassa-i-motori-di-ricerca.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/Google-vs-Francia.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google vs Francia</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/app-che-ruba-i-soldi-dallo-smartphone.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/bigstockphoto_hacking_for_password_1213099-770x513.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>bigstockphoto_hacking_for_password_1213099-770x513</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/megaupload-sta-tornando-kim-dotcom-presenta-megabox.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/megabox-musica-sharing.png</image:loc>
			<image:caption></image:caption>
			<image:title>MegaBox, il nuovo Megaupload</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/megabox.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>megabox</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/fake-lookout-app-ruba-sms-e-mms-dallo-smartphone-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/LOOKOUT.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Lookout</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/android_malware.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Android Malware</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/censura-su-twitter.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/censura-su-twitter-ecco-come-bypassarla-L-GIYAJs.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>censura-su-twitter-ecco-come-bypassarla-L-GIYAJs</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/arriva-le-rete-4g-lte-in-italia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/internet-4G.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>internet-4G</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonymous-e-wikileaks-pace-fatta.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/anonymous_wikileaks__davvero_sono_in_guerra__3730.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Manifestazione degli anonimi a Parigi</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/xbox-music-servizio-dedicato-alla-musica-di-microsoft.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/xbox-music.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>xbox-music</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/will-it-blend-frullato-di-iphone5-e-galaxy-s3.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/willitblend.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>willitblend</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/fix-errori-404-nei-google-webmaster-tools-usg-parameter.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/404google.jpg</image:loc>
			<image:caption>Esempi di url con i parametri lang e usg</image:caption>
			<image:title>Google usg parameter</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/googlewebmaster.jpg</image:loc>
			<image:caption>Errori 404 nei Google Webmaster Tools</image:caption>
			<image:title>Errori 404</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/googlewebmastertoolsseo.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google Webmaster Tools</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/reuters-institute-quale-sara-il-futuro-dei-media.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/O_25b2362dd3.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>O_25b2362dd3</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/pwnium-2012-60mila-dollari-a-pinkie-pie.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/pwnie_pie_chrome.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Pwnie Pie Chrome</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/social-messaging-produce-18-miliardi-di-perdite-alle-telco.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/Police-thwarted-planned-r-007.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Police-thwarted-planned-r-007</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/root-google-nexus-7-dopo-update-ota-a-4-1-2.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/nexus_t.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Nexus</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/step3.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>step3</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/step2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>step2</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/step1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>step1</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/cmd.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Prompt dei Comandi</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/rootnexus.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>JB-SuperSU.zip</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/quanto-vali-per-google-e-facebook-privacyfix.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/privacyfix.1.png</image:loc>
			<image:caption></image:caption>
			<image:title>privacyfix.1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/dsploit-pentest-hack-tablet-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/dsploit3.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>dsploit3</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/dsploit2.png</image:loc>
			<image:caption></image:caption>
			<image:title>dSploit Attacchi disponibili</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/dsploit1.png</image:loc>
			<image:caption>dSploit Scan della Rete</image:caption>
			<image:title>dSploit Scan della Rete</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/attacco-a-google-ie-e-yahoo-ie.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/google-ie-test.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-ie-test</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/commesso-fa-cadere-gli-iphone5-e-uno-scherzo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/iphone5.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>iphone5</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/linuxday-2012-il-27-ottobre-in-tutta-italia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/LinuxDay_2012_Italia_logo_big.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>LinuxDay_2012_Italia_logo_big</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/banca-google-realta-sperimentale-in-gran-bretagna.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/google-come-una-banca-in-arrivo-la-carta-di-credito-per-le-imprese-638x425.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-come-una-banca-in-arrivo-la-carta-di-credito-per-le-imprese-638x425</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/lintervallo-piu-geek-di-tutti-i-tempi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/ohio_university.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>ohio_university</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-maps-la-satira-di-mad-magazine.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/newyorker-1.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>newyorker-1</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/newyorker-2.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>newyorker-2</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/project-glass-il-futuro-secondo-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/0-1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>0 (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/appzone-500mila-applicazioni-android-su-windows.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/amdapp_t.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>amdapp_t</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nexus-da-10-pollici-partnership-tra-google-e-samsung.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/nexus-7_google_2-287x331.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>nexus-7_google_2-287x331</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/huawei-e-zte-una-minaccia-per-gli-usa.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/140058848-6a84f68a-03fb-4d25-8a7a-474d56b7aa93.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>140058848-6a84f68a-03fb-4d25-8a7a-474d56b7aa93</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-library-project-accordo-con-association-of-american-publisher.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/google-book-search.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-book-search</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/condanna-per-diffamazione-via-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/Tribunale-e-Facebook.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Tribunale-e-Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-eliminare-la-pubblicita-da-youtube.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/youtube-mug.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>YouTube</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/adblock.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>AdBlock per capn3m0.org</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/youtube.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>stop-youtube-ads</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/falla-nella-sicurezza-di-twitter.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/twitter-bug_t.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>twitter-bug_t</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/privacy-sui-social-network-sappiamo-dove-abiti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/imm-starcom.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>imm-starcom</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-dice-addio-agli-adsense-per-i-feed.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/adsense_feed.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google Adsense per i Feed</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-conosce-quello-che-compri.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/guida-facebook.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>guida facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/root-del-nexus-7-con-google-nexus-toolkit.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/debug.png</image:loc>
			<image:caption></image:caption>
			<image:title>Debug USB</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/nexus_fastmode.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Nexus 7 Fastmode</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/nexus-7.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Nexus 7</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/googlenexustoolkit.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Nexus 7 Toolkit</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/condivisione-p2p-legale-se-senza-fine-di-lucro.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/the_pirate_bay_pay.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>the_pirate_bay_pay</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sicurezza-android-sito-cancella-memoria-cellulari-fai-il-test.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/Sicurezza-su-Android.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Sicurezza-su-Android</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/vpntunnel-se-le-vpn-anonime-down-da-4-ore.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/vpntunnel_no_server.jpg</image:loc>
			<image:caption>Da 4 ore non ci sono Server disponibili</image:caption>
			<image:title>Lista Server VpnTunnel</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/vpntunnel.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>vpntunnel.se</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hp-mostra-il-sistema-operativo-open-webos.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/10/hp-open-webos-touchsmart.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>hp-open-webos-touchsmart</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/capn3m0-org-ora-disponibile-su-google-currents.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/capn3m0oncurrents.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Capn3m0.org su Google Currents</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/google_currents.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Currents</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/amd-appzone-usare-app-android-su-windows.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/amdapp_t.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>amdapp_t</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/xiaomi-mi-two-vince-il-confronto-smartphone.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/focus_03.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>focus_03</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/xiaomi-mi2-11.png</image:loc>
			<image:caption></image:caption>
			<image:title>xiaomi-mi2-1</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/xiaomi-mi2-2.png</image:loc>
			<image:caption></image:caption>
			<image:title>xiaomi-mi2-2</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/xiaomi-mi2-1.png</image:loc>
			<image:caption></image:caption>
			<image:title>xiaomi-mi2-1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/internet-explorer-9-il-browser-piu-sicuro.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/013032-Internet-Explorer-9.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>013032-Internet-Explorer-9</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/quando-partira-il-servizio-lte-in-italia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/LTE_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>LTE_logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-si-scusa-consiglia-di-usare-google-maps.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/apple-ios-6-preview-maps1.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>apple-ios-6-preview-maps</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/apple-ios-6-preview-maps.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>apple-ios-6-preview-maps</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/vulnerabilita-java-a-rischio-un-miliardo-di-mac-e-pc.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/java-logo-600x368.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>java-logo-600x368</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/whatsapp-a-rischio-sicurezza.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/whatsapp-messenger-windows-phone-71.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>whatsapp-messenger-windows-phone-7</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/whatsapp-messenger-windows-phone-7.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>whatsapp-messenger-windows-phone-7</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tastiera-virtuale-per-smartphone-e-tablet.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/796246p_alt2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>796246p_alt2</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tp-link-tl-wr702n-il-ruoter-wireless-piu-piccolo-al-mondo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/tp-link-tl-wr702n-il-nano-router-2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>tp-link-tl-wr702n-il-nano-router-2</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/TP-LINK_TL-WR702N-021.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>TP-LINK_TL-WR702N-02</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/TP-LINK_TL-WR702N-02.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>TP-LINK_TL-WR702N-02</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iphone-5-se-lo-allungassimo-ancora-un-po.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/iphone5.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>iPhone 5</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-maps-lesordio-e-un-flop.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/tumblr_maour6OZvy1rhptwbo1_1280.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>tumblr_maour6OZvy1rhptwbo1_1280</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/microsoft-vince-causa-contro-motorola-in-germania.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/microsoft-vs-motorola.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>microsoft-vs-motorola</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ios-6-quali-sono-le-novita-introdotte.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/ios-6beta-4-rallentamenti1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>ios-6beta-4-rallentamenti</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/ios-6beta-4-rallentamenti.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>ios-6beta-4-rallentamenti</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-censura-la-vignetta-su-maometto.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/018291-vignette_maometto.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>018291-vignette_maometto</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/litalia-il-paese-piu-colpito-dal-furto-di-dati-sensibili.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/web-security.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Web Security</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/italia-terza-al-mondo-per-download-torrent.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/BitTorrent_Icon_by_Augermage.png</image:loc>
			<image:caption></image:caption>
			<image:title>BitTorrent_Icon_by_Augermage</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/litalia-il-paese-piu-colpito-dal-furto-di-dati-sensibili.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/yahoo-attacco-informatico.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>yahoo-attacco-informatico</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/record-in-borsa-e-2milioni-di-pezzi-venduti-i-numeri-di-iphone-5.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/iphone-5.png</image:loc>
			<image:caption></image:caption>
			<image:title>iphone-5</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/costi-di-produzione-delliphone-5-meno-di-170-dollari.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/iphone-5-apple.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>iphone-5-apple</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/foxconn-condizione-disumane-nella-produzione-delliphone-5.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/foxconn.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>foxconn</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/colpito-da-un-attacco-hacker-il-blog-di-beppe-grillo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/beppe-grillo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>beppe-grillo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-wallet-ritira-la-sua-carta-prepagata.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/018245-470-google_wallet_carta_prepagata_addio.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>018245-470-google_wallet_carta_prepagata_addio</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-contro-sito-polacco-per-violazione-di-copyright.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/a.pl_-265x150.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>a.pl_-265x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonymous-colpisce-godaddy.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/300px-Anonymous_emblem.svg_.png</image:loc>
			<image:caption></image:caption>
			<image:title>300px-Anonymous_emblem.svg</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/lalgoritmo-che-verifica-chi-ha-bevuto-troppo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/018221-470-ubriachi-infrarossi.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>018221-470-ubriachi-infrarossi</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/prossima-versione-dellethernet-lo-standard-100-giga.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/ethernet-cable-utp-mold-type-kb-aa06.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>ethernet-cable-utp-mold-type-kb-aa06</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/fondatore-di-the-pirate-bay-arrestato-per-hacking.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/the_pirate_bay_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>the_pirate_bay_logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sicurezza-trafugati-dallfbi-12-milioni-di-udid-apple.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/antisec-codici-udid-apple-fbi.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>antisec-codici-udid-apple-fbi</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-ufficializza-lacquisizione-di-instagram.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/facebook-buys-instagram.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>facebook-buys-instagram</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/spiati-gli-utenti-in-download-su-bittorrent.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/Bittorrent.png</image:loc>
			<image:caption></image:caption>
			<image:title>Bittorrent</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-brevetta-il-riconoscimento-degli-oggetti-nei-video.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/google-objects-video.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-objects-video</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bistecca-da-stampante-3d.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/Schermata-2010-04-27-a-19.32.37.png</image:loc>
			<image:caption></image:caption>
			<image:title>Schermata-2010-04-27-a-19.32.37</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bitcoin-sulla-carta-di-credito-entro-fine-anno.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/bitcoin-225.png</image:loc>
			<image:caption></image:caption>
			<image:title>bitcoin-225</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-parlamento-tedesco-tassa-google-news.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/09/google-news-1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-news (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-vs-samsung-la-casa-coreana-vince-in-giappone.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/Samsung-vs-Apple.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Samsung-vs-Apple</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/maxxo-servizio-di-cloud-hosting-con-download-torrent.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/018155-470-Maxxo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>018155-470-Maxxo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/svelato-il-ritorno-di-megaupload-dai-tweet-di-dotcom.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/megavideo-alternativemegaupload-ziogeek.png</image:loc>
			<image:caption></image:caption>
			<image:title>megavideo-alternativemegaupload-ziogeek</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/gia-disponibile-firefox-15.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/firefox11.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>firefox1</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/firefox1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>firefox1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ubisoft-95-dei-giocatori-pirati.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/ubisoftlogo.gif</image:loc>
			<image:caption></image:caption>
			<image:title>ubisoftlogo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/samsung-perde-la-sua-battaglia-legale-con-apple.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/8-24-12-Apple-vs.-Samsung_full_600.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>8-24-12-Apple-vs.-Samsung_full_600</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/trafugate-le-mappe-del-palazzo-delleliseo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/eee8ade57db837bd93586a0bd7164f24_immagine_ts673_400.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>eee8ade57db837bd93586a0bd7164f24_immagine_ts673_400</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-sfida-gli-hacker-con-il-suo-pwnium-2.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/chrome-hacked-story.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>chrome-hacked-story</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/utorrent-avra-la-pubblicita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/uTorrent.png</image:loc>
			<image:caption></image:caption>
			<image:title>uTorrent</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/xiaomi-fa-il-tutto-esaurito-di-mi-one-s-in-30-minuti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/mi_one_s_xiaomi.png</image:loc>
			<image:caption></image:caption>
			<image:title>mi_one_s_xiaomi</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sms-zombie-il-malware-contagia-500mila-smartphone-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/virus-android.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>virus-android</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-e-samsung-si-incontrano-per-risoluzione-amichevole.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/apple-contro-samsung-processo-per-brevetti-design-e-icone-iphone-ipad-e-galaxy.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>apple-contro-samsung-processo-per-brevetti-design-e-icone-iphone-ipad-e-galaxy</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/la-rete-2g-va-in-pensione-dal-2017.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/att_2g_2017.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>att_2g_2017</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/dopo-windows-8-arrivera-windows-blue.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/Windows-blue.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Windows-blue</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/the-pirate-bay-e-isohunt-denunciano-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/the_pirate_bay_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>the_pirate_bay_logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/safari-e-chrome-supporto-display-alta-risoluzione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/240px-CSS.svg_.png</image:loc>
			<image:caption></image:caption>
			<image:title>240px-CSS.svg</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/flash-player-rimosso-da-google-play-store.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/flashIcon.png</image:loc>
			<image:caption></image:caption>
			<image:title>flashIcon</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tastiera-senza-fili-per-smartphone.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/018096-470-nfc_keyboard.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>018096-470-nfc_keyboard</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iphone-5-disponibile-in-italia-dal-5-ottobre.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/iPhone-200x170.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>iPhone-200x170</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/fondamentale-aggiornamento-per-app-ios.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/WP_logo.png</image:loc>
			<image:caption></image:caption>
			<image:title>WP_logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/indoona-il-telefono-social-di-tiscali.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/mzl.tliyriet.320x480-75.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>mzl.tliyriet.320x480-75</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ebay-now-consegna-a-casa-i-prodotti-entro-24-ore.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/download.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>download</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iphone-5-le-prime-immagini-delle-componenti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/iPhone_5_Componenti.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>iPhone_5_Componenti</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/telecom-italia-chiude-lo-stabilimento-olivetti-i-jet.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/20120424155962435400.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>20120424155962435400</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wi-fi-per-guardare-attraverso-le-parti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/wi-fi-zone.gif</image:loc>
			<image:caption></image:caption>
			<image:title>wi-fi-zone</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/amazon-in-uk-gli-ebook-superano-i-libri-cartacei.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/images.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>images</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/dropbox-conferma-violazioni-account.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/Dropbox.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>Dropbox</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-oltre-83-milioni-di-account-fasulli-sul-social-network.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/Facebook-Buttons-1-10-1.png</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook-Buttons-1-10-1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hack-a-server-la-palestra-ideale-per-ogni-hacker.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/Server-Hacking.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Server-Hacking</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/windows-8-conclusi-i-lavori-ufficialmente.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/Windows-8.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Windows-8</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bip-mobile-il-primo-operatore-low-cost-italiano-dallautunno.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/bip-mobile-arrivo-nuovo-operatore-telefonico-low-cost-italiano_250.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>bip-mobile-arrivo-nuovo-operatore-telefonico-low-cost-italiano_250</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/olimpiadi-londra-2012-lapproccio-social-ha-fallito.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/Twitter-Olimpiadi-di-Londra-2012.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Twitter-Olimpiadi-di-Londra-2012</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iphone-5-presentato-il-12-settembre-con-ipad-mini.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/08/apple-logo1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>apple-logo1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/banda-ultra-larga-la-regione-lombardia-investe-11-milioni.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/RegLomb.gif</image:loc>
			<image:caption></image:caption>
			<image:title>RegLomb</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-registra-brevetto-per-la-tecnologia-5d.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/apple-logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>apple-logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/apple-acquisisce-authentec-punta-sulla-sicurezza-di-os-x-e-ios.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/authentec.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>AuthenTec</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-perde-157-milioni-di-dollari-in-borsa.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/Facebook-Buttons-1-10-1.png</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook-Buttons-1-10-</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/minacciato-esperto-informatico-dei-falsi-follower.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/camisanicalzolari.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Marco Camisani Calzolari </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/blackout-twitter-a-causa-di-due-data-center.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/social_twitter_box_blue_512.png</image:loc>
			<image:caption></image:caption>
			<image:title>social_twitter_box_blue_512</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/spot-anti-pirateria-colonna-sonora-illegale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/pirateria-spot-musica-piratata.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>pirateria-spot-musica-piratata</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/vietata-la-vendita-di-galaxy-tab-7-7-in-europa.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/Galaxy-Tab-7.7-Vs-Galaxy-Tab.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Galaxy-Tab-7.7-Vs-Galaxy-Tab</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/Samsung-Galaxy-Tab-7-7-_57581_1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Samsung-Galaxy-Tab-7-7-_57581_1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/dotcom-apre-il-portale-kim-com.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/kim1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>kim</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/kim.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>kim</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/huawei-e-zte-spie-la-cina-controlla-le-comunicazioni-delloccidente.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/Huawei-258x258.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Huawei-258x258</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-censura-megaupload-torrent-in-francia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/google-italia-web.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>google-italia-web</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iscrizione-liste-elettorali-via-facebook-negli-usa.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/Facebook-Buttons-1-10-.png</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook-Buttons-1-10-</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hackitaly-camping-100-italian-hackaton.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/hackitaly.png</image:loc>
			<image:caption></image:caption>
			<image:title>Hackitaly</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-street-view-immagini-nuove-sullantartide.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/antartide_google.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>antartide_google</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/joomla-day-2012-a-torino-la-5a-edizione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/badge.png</image:loc>
			<image:caption></image:caption>
			<image:title>Joomla Day 2012</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-nexus-7-unboxing.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/0.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>0</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/aggiornamento-skype-il-bug-messaggi-a-destinatari-sbagliati.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/skype-bug.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>skype-bug</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/marissa-mayer-da-google-a-ceo-di-yahoo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/Marissa-Mayer-Yahoo2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Marissa Mayer CEO di Yahoo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bloccare-the-pirate-bay-non-riduce-il-traffico-p2p.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/the_pirate_bay_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>the_pirate_bay_logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/regus-rivela-che-il-78-degli-italiani-lavorera-sotto-lombrellone.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/tablet_wifi_3g_spiaggia_relax1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Regus rivela che il 78% degli italiani lavorerà sotto l'ombrellone</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/tablet_wifi_3g_spiaggia_relax.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>tablet_wifi_3g_spiaggia_relax</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/al-via-su-kickstarter-la-raccolta-fondi-per-ringbow-il-mouse-da-dito.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/ringbow_mouse_dito.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>RingBow</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/da-amazon-in-arrivo-uno-smartphone-entro-fine-anno.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/amazon-smartphone-tmc.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Amazon Smartphone</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/con-identitag-lantifurto-diventa-un-chip.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/identitag-8.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>IdentiTag</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/dns-changer-cosa-ce-da-sapere-che-e-una-bufala.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/dnschanger.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>DnsChanger</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-io-chrome-il-browser-piu-diffuso-al-mondo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/Chrome1.png</image:loc>
			<image:caption></image:caption>
			<image:title>Chrome</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/Chrome.png</image:loc>
			<image:caption></image:caption>
			<image:title>Chrome</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/stupid-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/virustotal.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Virustotal</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/mcafee.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>McAfee</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/strumentigoogle.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>strumentigoogle</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/Geekation_GoogleStupid.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Stupid Google</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/11-settembre-2012-rsa-security-vs-ethical-hacker.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/RSA1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>RSA Security</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/rsa.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>rsa</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/attacco-malware-su-capn3m0-org.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/cyarunner.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>cyarunner.ru</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/07/malwarecapn3m0.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Malware capn3m0.org</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-io-chrome-ios-drive-e-le-altre-novita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/google-io-12.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google I/O 2012</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/yahoo-e-smv-con-brave-new-moms-le-mamme-di-oggi-sempre-piu-tecnologiche.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/mom.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Brave New Mom</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/occhiali-a-realta-aumentata-di-google-il-primo-video.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/brinprojectglass.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>brinprojectglass</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/da-google-arriva-il-nuovo-nexus-7.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/google-nexus-7-tablet.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Nexus 7</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kim-dotcom-torna-sulla-scena-con-il-progetto-megabox.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/017870-470-kim_dotcom_steve_wozniak_ira_rothken.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Kim Dotcom Steve Wozniak Ira Rothken</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mindreader-il-software-che-legge-il-volto-umano.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/Tricks-of-the-mind1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Tricks of the mind</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/occidente-rischio-censura-internet.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/censor-this-cunt.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>censor-this-cunt</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ecco-lapp-center-di-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/facebook-app-center_224719.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>FaceBook App Center</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mindreader-il-software-che-legge-il-volto-umano.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/Tricks-of-the-mind.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>MindReader: il software che legge il volto umano</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/a-breve-ecco-il-nuovo-facebookfonino.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/facebookfonino.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Facebookfonino</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/attacco-linkedin-ma-nessun-account-violato.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/Logo_linkedin.png</image:loc>
			<image:caption></image:caption>
			<image:title>LinkedIn</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonimato-nel-web-cinese-messo-al-bando.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/cina_web.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Cina </image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/volunia-orfana-di-padre-laddio-di-massimo-marchiori.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/volunia_motore_di_ricerca_marchiori.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Press Release Volunia.com</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/goalshouter-app-per-commentare-tempo-reale-gli-europei.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/goalshouter.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>GoalShouter</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-guardare-gli-europei-su-smartphone-e-tablet.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/europei2012_01.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Europei 2012</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/da-apple-arriva-il-mini-ipad-e-forse-una-linea-mini.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/ipad-mini-mockup-iphone_t.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>iPad mini</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-autonomous-car-sfreccia-con-licenza-sulle-strade-del-nevada.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/google_car.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Car</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/motorola-razr-maxx-lultimo-successore-razr.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/motorola-razr-maxx-angles.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Motorola Razr Maxx</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/hollande-cancellare-la-legge-hadopi-e-tassare-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/hollande.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Hollande</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ecco-la-lista-fake-di-anonymous.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/Anonymous.png</image:loc>
			<image:caption></image:caption>
			<image:title>Anonymous</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ladri-di-identita-frodano-il-fisco-statunitense.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/06/hacker.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>hacker</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/le-olimpiadi-dei-giovani-scienziati-2012-allintel-isef-di-pittsburg.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/eucys-winners-8758-1024x682.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>eucys-winners-8758-1024x682</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/progetto-knowledge-graph-di-google-tutto-oro-quello-che-luccica.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/knowledge-graph-large.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Knowledge Graph</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/icar-opera-incompiuta-di-steve-jobs.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/imove.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>iMove</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/yahoo-non-ha-la-laurea-in-informatica-fuori-scott-thompson.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/yahoo-ceo-scott-thompson.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Ceo Yahoo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/emi-sony-universal-e-warner-scommettono-su-feezy-nuovo-servizio-italiano-di-musica-digitale.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/feezy.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Ffeezy</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/woodstock-la-nuova-piattaforma-di-musica-streaming-che-manda-zune-pensione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/woodstock.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Woodstock Zune</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/touch-fast-cool-in-una-parola-unico-iii.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/UNICOIII1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>BB_Mini_L_stand_ID</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/UNICOIII.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>BB_Mini_L_stand_ID</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ecco-il-samsung-galaxy-s-iii-lo-smartphone-che-sente-vede-e-riconosce-lutente.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/SIII-profilo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Samsung Galaxy S III</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sara-quintarelli-il-nuovo-presidente-dellagcom.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/quintarelli-stefano-258x258.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Stefano Quintarelli</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/carta-da-parati-anti-wifi-nuova-soluzione-per-la-sicurezza.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/wifi_block.png</image:loc>
			<image:caption></image:caption>
			<image:title>wifi_block</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/oracle-vs-google-violato-il-copyright-ma-solo-per-9-righe.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/Google-vs-Oracle.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>Google vs Oracle</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/rim-ecco-il-blackberry-os-10-dev-alpha-for-business.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/bb-back_1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>BlackBerry 10 Dev Alpha</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-tasto-ascolta-su-facebook-delusione-o-successo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/ascolta-la-tua-musica-preferita-direttamente-su-facebook-con-deezer1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>FaceBook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/micro-computer-con-micro-prezzo-mega-esperienza.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/raspi_blue_white.png</image:loc>
			<image:caption></image:caption>
			<image:title>raspi_blue_white</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/raspberrypi.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Raspberry PI</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/bitcoin-moneta-invisibile-usata-nelle-transazioni-illegali-della-rete.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/bitcoin_large1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Bitcoin</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/bitcoin_large.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>bitcoin_large</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/05/Bitcoin.png</image:loc>
			<image:caption></image:caption>
			<image:title>Bitcoin</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mediaset-vince-il-ricorso-e-si-riprende-dominio-mediaset-com.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/mediaset.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Mediaset</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-autonomous-car-guidata-da-un-cieco-ed-affiancata-dalla-nuova-lexus-rx450h.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/original.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Autonomous</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-co-fondatore-google-sergey-brin-%e2%80%9ca-rischio-la-liberta-della-rete%e2%80%9d.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/sergei-brin-google.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>sergei brin google</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/security-guardian-la-penna-usb-con-autodistruzione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/security-guardian4.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Security Guardian</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/iphone-5-tutte-le-novita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/verizon-iphone-5-no-lte_t.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Iphone 5</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-acquista-instagram-un-nuovo-attacco-alla-privacy.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/istagram.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Instagram</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/pastebin.com-sfratta-anonymous-per-tutelare-i-propri-utenti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/pastebin.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Pastebin sfratta Anonymous</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-compra-instagram-per-ben-un-miliardo-di-dollari.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/facebook-instagram.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook Instagram</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/guerra-del-libro-antitrust-usa-contro-cartello-tra-editori-e-apple.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/apple1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Apple</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-presto-un-motore-di-ricerca.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/facebook-motore-ricerca.png</image:loc>
			<image:caption></image:caption>
			<image:title>FaceBook Motore di Ricerca</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/la-nsa-al-lavoro-sul-super-grande-fratello-che-spia-il-web.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/big-brother-is-watching-you.png</image:loc>
			<image:caption></image:caption>
			<image:title>Big Brother Is Watching You</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/1-aprile-ecco-tutti-i-pesci-della-rete.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/fede.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>fede</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/carabinieri-e-interno-tango-down.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/difesa11.png</image:loc>
			<image:caption></image:caption>
			<image:title>Ministero della Difesa TANGO DOWN</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/difesa2.png</image:loc>
			<image:caption></image:caption>
			<image:title>difesa</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/difesa1.png</image:loc>
			<image:caption></image:caption>
			<image:title>difesa</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/difesa.png</image:loc>
			<image:caption></image:caption>
			<image:title>difesa</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/netsec.png</image:loc>
			<image:caption></image:caption>
			<image:title>netsec</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/deep-web-e-the-hidden-wiki-the-darkside-of-the-web.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/darkside.gif</image:loc>
			<image:caption></image:caption>
			<image:title>The Darkside of the Web</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/glock.png</image:loc>
			<image:caption></image:caption>
			<image:title>Glock con silenziatore</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/hitman.png</image:loc>
			<image:caption></image:caption>
			<image:title>Hitman</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/hackserv.png</image:loc>
			<image:caption></image:caption>
			<image:title>Hack Service</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/silkroad.png</image:loc>
			<image:caption></image:caption>
			<image:title>SilkRoad Hashish</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/silkroad1.png</image:loc>
			<image:caption></image:caption>
			<image:title>SilkRoad Heroin</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/hiddenwiki.png</image:loc>
			<image:caption></image:caption>
			<image:title>The Hidden Wiki Home Page</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/icebergdeepweb.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Iceberg Deep Web</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/gran-bretagna-censurata-come-cina-e-iran.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/queenspeech.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>queenspeech</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-va-in-borsa-ma-teme-yahoo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/yahoo-facebook-login.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook teme Yahoo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/compromessi-migliaia-di-accoun-visa-mastercard.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/04/visamastercard.png</image:loc>
			<image:caption></image:caption>
			<image:title>Visa Mastercard</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/su-quali-dispositivi-installare-cyanogenmod-9.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/cyano.png</image:loc>
			<image:caption></image:caption>
			<image:title>Compatbilità CyanoGenMod 9</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/cyanogen.png</image:loc>
			<image:caption></image:caption>
			<image:title>CyanoGen</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-samsung-galaxy-s-iii-arriva-il-prossimo-22-maggio-a-londra.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/sgiii.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>Samsung Galavy S III</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/entro-estate-lancio-kindle-fire-2-di-amazon.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/amazon2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Amazon</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/forfone-il-nuovo-modo-di-chiamare-in-liberta.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/forfone.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Forfone</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/contro-apple-una-class-action-per-pubblicita-ingannevole-su-siri.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/sirifaq_hero.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Apple Siri</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/megaupload-kim-dotcom-libero-su-cauzione-ma-a-rischio-estradizione.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/kim-dotcom-56567.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Kim DotCom</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/triangle-by-paypal-il-nuovo-concorrente-di-square.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/paypal.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Paypal</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/le-iene-intervista-a-un-membro-di-anonymous.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/anonymous_leiene.png</image:loc>
			<image:caption></image:caption>
			<image:title>Le Iene - Intervista Anonymous</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/microsoft-la-rivoluzione-di-windows-8-un-nuovo-modo-di-comunicare.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/windows-8-consumer-preview-03-700x437.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Windows 8 Consumer Preview</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/da-apple-ecco-il-nuovo-ipad.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/ipad3.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>ipad3</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/dopo-il-vaticano-e-trenitalia-anonymous-colpisce-equitalia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/anonymous.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Anonymous</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/cosa-si-nasconde-dietro-la-maschera-di-anonymous.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/guy.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Anonymous</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/attacco-hacker-per-la-sony-rubata-tutta-la-discografia-di-jacko.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/jacko.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Jacko Hacked</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/vivienne-reding-e-la-commissione-europea-contro-la-privacy-di-big-g.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/viviane_reding.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Vivienne Reding</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nuovo-ipad-un-tablet-avanguardia-niente-di-piu.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/nuovo-ipad-3-hd-2012.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Nuovo iPad</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-down.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/ping-facebook.png</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook ping</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/facebook-down.png</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook down</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-aumentare-guadagni-adsense-con-le-keywords.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/keywords.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>keywords</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/samsung-galaxy-note-10.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/03/samsung_galaxy_note_10_1_2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Samsung Galaxy Note 10.1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/vodafone-e-visa-insieme-per-mpayment.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/mpay.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>mpay</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/interpol-arresta-25-membri-del-gruppo-anonymous.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/interpol.png</image:loc>
			<image:caption></image:caption>
			<image:title>Interpol</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tutte-novita-mobile-world-congress-2012.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/mwc.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Mobile World Congress 2012</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/annunciato-lg-optimus-lte-tag.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/lgoptimusletag.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Lg Optimus LTE Tag</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/telecom-lab-chiavetta-lte-web-superveloce-futuro.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/lte.png</image:loc>
			<image:caption></image:caption>
			<image:title>Lte</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonymous-deface-sito-deputato-paniz.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/guy.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Anonymous</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/deface.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Deface sito Paniz</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ipad-3-display-retina-analisi-al-microscopio.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/ipad_3_display.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Retina Display iPad 3</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonyupload-alternativa-megaupload-disponibili-20000-account-gratuiti.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/anonyupload.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Anonyupload - Free, Legal &amp; Nice!</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/anonyuploadlogo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Anonyupload Logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kaspersky-internet-suite-2012.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/ks2012.png</image:loc>
			<image:caption></image:caption>
			<image:title>Kaspersky Internet Suite 2012</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-ue-approva-acquisizione-motorola.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/googlerola.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Googlerola</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/samsung-tablet-low-cost-galaxy-tab-2.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/galaxytab.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Samsung Galaxy Tab 2</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/guadagnare-con-pnet-di-aruba.it.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/pnetadv.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>PnetAdv</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-home-entertainment-dispositivo-musica-streaming.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/googlemedia.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/modovideo-alternativa-megaupload-megavideo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/tablemodovideo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Tabella Comparativa Account Modovideo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/modovideo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Modovideo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/offensiva-anonymous-cia-tango-down.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/anonycia.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Cia Tango Down</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/lulzsec.png</image:loc>
			<image:caption></image:caption>
			<image:title>LulzSec</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/btjunkie-offline-aspettando-legal-streaming.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/btjunkie_380.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Btjunkie</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/darpa-progetto-militare-lenti-realta-aumentata.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/darpalens.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>Darpa Contact Lens</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-x-presenta-come-solve-for-x.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/solve_for_x.png</image:loc>
			<image:caption></image:caption>
			<image:title>Solve for X</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/video-vita-sociale-facebook-movie-maker.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/timelinemoviemaker.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Timeline Movie Maker</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ipo-di-facebook-tra-consensi-e-incertezze.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/facebook-ipo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>IPO FaceBook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/volunia-tra-google-facebook-novita-italiana.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/volunia-seek.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>volunia-seek</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonymous-rilascia-codice-sorgente-symantec.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/hackersymantec.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Ultimatum Anonymous - Symantec</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/symantec2.png</image:loc>
			<image:caption></image:caption>
			<image:title>Symantec</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/pcanywhere-symantec-consiglia-disinstallarlo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/symantec.gif</image:loc>
			<image:caption></image:caption>
			<image:title>Symantec</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/come-eliminare-account-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/cancellareaccountfacebook.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Cancellazione Account FaceBook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/guadagnare-youtube-diventare-partner.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/youtube.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>YouTube</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/samsung-galaxy-note-smartphone.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/samsunggalaxynote.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Samsung Galaxy Note</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/guadagnare-vbanner-pay-to-impressions.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/virgilio.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Virgilio Banner</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/rilasciato-php-5.3.10.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/php.png</image:loc>
			<image:caption></image:caption>
			<image:title>Php 5.3.10</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/guadagnare-adsense-primi-passi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/googleadsense.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google AdSense</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-attiva-geo-censura-blogger.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/google_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/blogger.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Blogger</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sql-conference-2012-200-posti-disponibili.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/02/sqlserver2012conference.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Sql Server Conference 2012</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/megaupload-dati-cancellati.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/kimdotcom1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Kim Dotcom Life</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/megauploaderased.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Megaupload Erased</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/twitter-prime-forme-di-censura.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/twitter-censored.png</image:loc>
			<image:caption></image:caption>
			<image:title>Censura Twitter</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/amazon-kindle-fire-tablet-low-cost-minaccia-apple.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/kfire.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Kindle Fire</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/kindle-fire-vs-ipad2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Kindle Fire vs iPad 2</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/jailbreak-iphone-4s-ipad2-absinthe.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/absinthe.png</image:loc>
			<image:caption></image:caption>
			<image:title>GreenPois0n Absinthe Jailbreak iPhone4S&amp;Ipad2</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/Absinthe-0.3.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Absinthe 0.3</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/greenpoison.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>GreenPoison Absinthe</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-image-fix-thumbs-youtube.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/Youtube_logo.png</image:loc>
			<image:caption></image:caption>
			<image:title>YouTube</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/vulnerabilita-xss-open-redirection-google.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/xss-in-google.png</image:loc>
			<image:caption></image:caption>
			<image:title>Google XSS</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/fb.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>FaceBook Logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/googlebadrequest.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Bad Request</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/Google-21.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/sopa-pipa-cosa-sono-perche-fanno-paura.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/sopa-pipa.png</image:loc>
			<image:caption></image:caption>
			<image:title>sopa-pipa</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/sopa1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Sopa 1 di 6</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/sopa6.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Sopa 6 di 6</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/sopa5.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Sopa 5 di 6</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/sopa4.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Sopa 4 di 6</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/sopa3.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Sopa 3 di 6</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/sopa2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Sopa 2 di 6</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/we-are-legion-the-story-of-hacktivists.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/wearelegionfilm.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>We Are Legion - The Story Of The Hacktivists</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-image-fix/</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/facebook-image-fix.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>FaceBook Image Fix WordPress Plugin</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/filesharing-post-megaupload-chiusi-filesonic-uploaded.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/anonymous.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Anonymous</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/filesonic.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>filesonic</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/dreamhost-cambio-password-tutti-client.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/simonanderson.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>simonanderson</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/dreamhost.gif</image:loc>
			<image:caption></image:caption>
			<image:title>dreamhost</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wp-plugin-aggiornato-facebook-image-fix-alla-versione-0.4.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/fbwp.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>fbwp</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/megaupload-chiuso-fbi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/kim.jpg</image:loc>
			<image:caption>Kim Schmitz, aka Kim Dotcom</image:caption>
			<image:title>Kim Schmitz aka Kim Dotcom</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/megaupload.png</image:loc>
			<image:caption></image:caption>
			<image:title>megaupload</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-image-fix-mai-piu-immagini-errate-in-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/facebook.png</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-image-fix/</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/fbimagefix.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>fbimagefix</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/my-lands-guadagnare-giocando-sogno-o-realta.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/lago_salato.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>lago_salato</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/myland.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>myland</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-image-fix/</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/fbshare.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>fbshare</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/capn3m0-websecurity-anti-sopa.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/stop-sopa-pipa.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>stop-sopa-pipa</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wikipedia-mercoledi-blackout-di-protesta.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/wikipedia.png</image:loc>
			<image:caption></image:caption>
			<image:title>Wikipedia</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/alpha-team-sql-inject-banca-sistema.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/bancasistemalogo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Banca Sistemi</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/anonymous-lancia-operation-italy.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/anonymous.png</image:loc>
			<image:caption></image:caption>
			<image:title>Anonymous Operation Italy</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/magisto-app-editing-video-automatico.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/magisto.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Magisto</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/intervista-10-domande-al-pr0_alpha_team.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/hackersfillm.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Hackers</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/siti-istituzionali-violati-pr0_alpha_team.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/alpha.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>pr0_alpha_team</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-hacker-cup-2012.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/fbhc.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook Hacker Cup 2012</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ramnit-il-virus-che-ha-rubato-45mila-account-facebook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/ramnit-distribution.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Ramnit distribution</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/virus.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Ramnit Virus</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/upgrade-phpbb-3.0.10-anno-nuovo-forum-nuovo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/phpbb.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>phpbb</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wordpress-3.3-0-day-reflected-xss-vulnerability.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/wordpress_3.3_xss.png</image:loc>
			<image:caption></image:caption>
			<image:title>WordPress 3.3 XSS</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tablet-amoled-pieghevoli-nel-futuro-di-samsung.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/amoledflex.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Samsung AMOLED Flessibile</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2012/01/samsunglogo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Samsung</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/auguri-di-buon-anno.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/happy-new-year.jpeg</image:loc>
			<image:caption></image:caption>
			<image:title>Happy New Year</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/granola-risparmio-energetico-aiutando-la-natura.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/granolagui.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Granola GUI</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/granola.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Granola</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/soluzione-errori-500-e-504-in-phocapdf.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/phocapdf.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>PhocaPDF</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/ottimizzare-le-performance-di-wordpress.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/wordpress-speed.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>wordpress-speed</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-memories-for-the-future-il-disastro-giapponese-prima-e-dopo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/oganawa.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Oganawa - Google Stree View</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/googlememories.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Memories For The Future</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/e-natale-in-casa-google-nevica.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/letitsnow.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google Let It Snow</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/google.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Google</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/timeline-di-facebook-ecco-come-attivarla.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/capn3m0timeline.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>FaceBook Timeline</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/facebook.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Facebook Timeline</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/risparmia-sulle-telefonate-passa-al-voip.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/voip1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Voip</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/pap2t.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Linksys PAP2T</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/voip.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>voip</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/kinect-sui-pc-cambiarci-vita.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/kiniect1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Kinect</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/kiniect.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>kiniect</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/teletu-wpa-finder-1.3-by-wifishark.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/tele2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Teletu WPA Finder 1.3</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/can-you-crack-it-gchq-cerca-hacker.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/canyoucrackit2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Can You Crack It? - Solution</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/canyoucrackit.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>canyoucrackit</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/gchq.gif</image:loc>
			<image:caption></image:caption>
			<image:title>GCHQ</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/tool-alice-wpa-calculator-online.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/11/wifi-hacking.png</image:loc>
			<image:caption></image:caption>
			<image:title>wifi hacking</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/fastweb-wpa-calculator-online/</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/11/fastweb.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>fastweb</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/video-le-iene-hacker-eric-corley-aka-emmanuel-goldstein.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/11/eric_corley.jpg</image:loc>
			<image:caption>Intervista a Eric Corley</image:caption>
			<image:title>Erico Corley - La voce degli hacker</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wpa-tester-1.7-ora-anche-teletu-oltre-ad-alice-e-fastweb.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/11/wifi-courtesy_cvas.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>wifi-courtesy_cvas</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/il-proprio-sito-a-basso-costo-cosa-ci-serve-prima-parte.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/vbulletin_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>vbulletin_logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/coppermine_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>coppermine_logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/phplist_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>phplist_logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/prestashop_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>prestashop_logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/zenphoto_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>zenphoto_logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/zencart_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>zencart_logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/drupal_logo1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>drupal_logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/pivotx_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>pivotx_logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/moodle_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>moodle_logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/magento_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>magento_logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/wordpress_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>wordpress_logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/drupal_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>drupal_logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/joomla_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>joomla_logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/e107_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>e107_logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/mdiawiki_logo.jg_.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>mdiawiki_logo.jg</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/12/phpbb_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>phpbb_logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/alice-fastweb-wpa-tester-1.6-sett-2011.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/11/wpatester.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>wpatester</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/non-ti-servo-ma-mi-comprerai-lo-stesso.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/11/mclips.png</image:loc>
			<image:caption></image:caption>
			<image:title>mclips</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/asus-transformer-prime-ora-molto-piu-potente.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/11/93a9asus_transformer_004_5692.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Image asus_transformer_004_5692.jpg</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/facebook-nuovamente-attivo-il-cookie-guardone.html</loc>
		<image:image>
			<image:loc>/home/www/vhosts/websec.it/httpdocs/wp-content/uploads/2011/10/3264build2011-150x120.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Thumbnail</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-e-telecom-italia-amici-per-la7.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/06/timediagoogle-300x273.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>timediagoogle-300x273</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/la-rivoluzione-in-casa-microsoft-si-chiama-windows-8.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/06/win8.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>win8</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/06/Windows-8-Logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Windows-8-Logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/upgrade-alice-wpa-calculator-2011.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/06/wifi.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>wifi</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/5-inviti-al-nuovo-social-network-quora.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/quora.png</image:loc>
			<image:caption></image:caption>
			<image:title>quora</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/backbox-linux-alternativa-italiana-backtrack.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/backbox-menu.preview.png</image:loc>
			<image:caption></image:caption>
			<image:title>backbox-menu.preview</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/logobackbox.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>logobackbox</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/backbox.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>backbox</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/nexus-3-da-lg-con-schermo-1280x720.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/nvidia-kal-el-01_t.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>nvidia-kal-el-01_t</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/exploit-oscommerce-v3.0a5-multiple-vulnerabilities.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/osCommerceLogo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>osCommerceLogo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/exploit-zencart-1.3.9h-multiple-vulnerabilities.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/zencart_logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>zencart_logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/motorola-xoom-disponibile-in-italia.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/motorola-xoom-00.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>motorola-xoom-00</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wpa-tester-su-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/wpa-finder.png</image:loc>
			<image:caption></image:caption>
			<image:title>wpa finder</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/backtrack-5-revolution-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/offensive-security.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>offensive security</image:title>
		</image:image>
		<image:image>
			<image:loc>/home/www/vhosts/websec.it/httpdocs/wp-content/uploads/2011/05/8d6ause_opendns_155x52-150x52.gif</image:loc>
			<image:caption></image:caption>
			<image:title>Thumbnail</image:title>
		</image:image>
		<image:image>
			<image:loc>/home/www/vhosts/websec.it/httpdocs/wp-content/uploads/2011/05/7774rss-150x81.png</image:loc>
			<image:caption></image:caption>
			<image:title>Thumbnail</image:title>
		</image:image>
		<image:image>
			<image:loc>/home/www/vhosts/websec.it/httpdocs/wp-content/uploads/2011/05/3305facebook-150x80.png</image:loc>
			<image:caption></image:caption>
			<image:title>Thumbnail</image:title>
		</image:image>
		<image:image>
			<image:loc>/home/www/vhosts/websec.it/httpdocs/wp-content/uploads/2011/05/0830twitter-150x80.png</image:loc>
			<image:caption></image:caption>
			<image:title>Thumbnail</image:title>
		</image:image>
		<image:image>
			<image:loc>/home/www/vhosts/websec.it/httpdocs/wp-content/uploads/2011/05/620cback_track_5-150x150.png</image:loc>
			<image:caption></image:caption>
			<image:title>Thumbnail</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/620cback_track_5.png</image:loc>
			<image:caption></image:caption>
			<image:title>Image back_track_5.png</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/le-iene-hacking-wifi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/007b88x31.png</image:loc>
			<image:caption></image:caption>
			<image:title>Image 88x31.png</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/8d6ause_opendns_155x52.gif</image:loc>
			<image:caption></image:caption>
			<image:title>Image use_opendns_155x52.gif</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/0375linuxfeed.png</image:loc>
			<image:caption></image:caption>
			<image:title>Image linuxfeed.png</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/d4a1antipixel-Mondo-GEEK.gif</image:loc>
			<image:caption></image:caption>
			<image:title>Image antipixel-Mondo-GEEK.gif</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/2a8dliquida80.gif</image:loc>
			<image:caption></image:caption>
			<image:title>Image liquida80.gif</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/8b59jb436d.gif</image:loc>
			<image:caption></image:caption>
			<image:title>Image jb436d.gif</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/af84bottone.gif</image:loc>
			<image:caption></image:caption>
			<image:title>Image bottone.gif</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/e320antipixel.png</image:loc>
			<image:caption></image:caption>
			<image:title>Image antipixel.png</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/7774rss.png</image:loc>
			<image:caption></image:caption>
			<image:title>Image rss.png</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/3305facebook.png</image:loc>
			<image:caption></image:caption>
			<image:title>Image facebook.png</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/0830twitter.png</image:loc>
			<image:caption></image:caption>
			<image:title>Image twitter.png</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/d447postauthoricon.png</image:loc>
			<image:caption></image:caption>
			<image:title>Image postauthoricon.png</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/d682postdateicon.png</image:loc>
			<image:caption></image:caption>
			<image:title>Image postdateicon.png</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/5449Schermata-2011-05-18-a-22.20.18.png</image:loc>
			<image:caption></image:caption>
			<image:title>Image Schermata-2011-05-18-a-22.20.18.png</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/exploit-oscommerce-2.3.1-remote-file-upload-vulnerability.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/oscommerce_logo.gif</image:loc>
			<image:caption></image:caption>
			<image:title>oscommerce_logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-risolve-grave-problema-di-sicurezza-su-android.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/20110518-111359.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>android</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/htc-puccini-il-flyer-diventa-grande.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/htcpuccini2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>htcpuccini</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/htcpuccini1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>htcpuccini1</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/htcpuccini.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>htcpuccini</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/google-keynote-io-2011.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/SFGOOGLE2011stacked1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>SFGOOGLE2011stacked</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/android-31.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>android-31</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/ice_cream_logo_100511-595x446.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>ice_cream_logo_100511-595x446</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/android-hardware-top-1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>android-hardware-top-1</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/SFGOOGLE2011stacked.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>SFGOOGLE2011stacked</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/mipony-free-premium-download-account.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/mipony.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Mipony</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/mipony1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>mipony</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wp-plugin-wp-users-page-creare-una-staff-page-wordpress.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/wordpress-logo.png</image:loc>
			<image:caption></image:caption>
			<image:title>wordpress-logo</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/blackberry-playbook-2-blackberry-playbook-10.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/BlackBerry-PlayBook-2-OS-7110504205808.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>BlackBerry-PlayBook-2-OS-7110504205808</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/blackberry-playbook-scoperto-il-primo-hack-per-aggirare-il-kit-di-sviluppo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/qnx_desktop_playbook-580x362.png</image:loc>
			<image:caption></image:caption>
			<image:title>QNX Desktop Playbook</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/091001-BlackBerry-PlayBook.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Blackberry Playbook OS</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/flytouch3-tablet-economici-dalla-cina.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/flytouhc32.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>flytouhc32</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/flytouhc3.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>flytouhc3</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/android-logo1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>android-logo1</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/disponibile-la-release-candidate-di-microsoft-windows-thin-pc.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/Windows-Thin-PC-CTP.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Windows Thin PC CTP</image:title>
		</image:image>
		<image:image>
			<image:loc></image:loc>
			<image:caption></image:caption>
			<image:title>Image mf.gif</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/rubati-11-milioni-di-dollari-on-line-da-hacker-cinesi.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/05/china-hacker.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>china-hacker</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/down-aruba-web-italiano-fermo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/04/aruba1.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>aruba</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/04/aruba.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>aruba</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/upgrade-joomla-wordpress.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/04/wordpress-vs-joomla.png</image:loc>
			<image:caption></image:caption>
			<image:title>wordpress-joomla</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/joomladay-2011.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/04/joomladay2011_locandina.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>joomladay2011_locandina</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wpa-infostrada-crack-verso-il-reverse-dellalgoritmo.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/04/wind-infostrada.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>wind-infostrada</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wireless-crack-aircrack-suite.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/04/wifi20logo.gif</image:loc>
			<image:caption></image:caption>
			<image:title>wifi20logo</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/04/aircrack-ng-new-logo.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>aircrack-ng</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/report-punta-il-dito-sul-web-2.0.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/04/report.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>report</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wpa-tester-by-fr3nsis-1.5.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/03/wpa_tester15.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Wpa Tester 1.5</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/blackberry-playbook.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2011/03/blackberry-playbook_211.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>BlackBerry PlayBook</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/xcode-sql-injection-scanner.html</loc>
		<image:image>
			<image:loc></image:loc>
			<image:caption></image:caption>
			<image:title>Image default.jpg</image:title>
		</image:image>
		<image:image>
			<image:loc></image:loc>
			<image:caption></image:caption>
			<image:title>Image hqdefault.jpg</image:title>
		</image:image>
		<image:image>
			<image:loc></image:loc>
			<image:caption></image:caption>
			<image:title>Thumbnail</image:title>
		</image:image>
		<image:image>
			<image:loc></image:loc>
			<image:caption></image:caption>
			<image:title>Image 1.jpg</image:title>
		</image:image>
		<image:image>
			<image:loc></image:loc>
			<image:caption></image:caption>
			<image:title>Image 2.jpg</image:title>
		</image:image>
		<image:image>
			<image:loc></image:loc>
			<image:caption></image:caption>
			<image:title>Image 3.jpg</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/wifi-crack-alice-fastweb-wpa.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2010/11/wpatester.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>wpatester</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2010/11/fastwebwpa.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>fastwebwpa</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2010/11/alicewpa.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>alicewpa</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2010/11/wificrack.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>wificrack</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/reset-password-admin-joomla-versioni-1.5.x.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2010/10/joomla_change2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>joomla_change2</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2010/10/joomla_change1.png</image:loc>
			<image:caption></image:caption>
			<image:title>joomla_change1</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2010/10/joomla-300x205.png</image:loc>
			<image:caption></image:caption>
			<image:title>Joomla</image:title>
		</image:image>
	</url>
	<url>
		<loc>http://www.websec.it/reset-password-wordpress.html</loc>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2010/10/change_pwd2.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>WordPress Password cambiata</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2010/10/change_pwd.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>Cambio Password WordPress</image:title>
		</image:image>
		<image:image>
			<image:loc>http://www.websec.it/wp-content/uploads/2010/10/wordpress.jpg</image:loc>
			<image:caption></image:caption>
			<image:title>WordPress</image:title>
		</image:image>
	</url>
</urlset>