<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 1:25 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.dbdr.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Database Doctor</title>
		<link><![CDATA[https://www.dbdr.com]]></link>
		<description><![CDATA[Database Doctor]]></description>
		<lastBuildDate><![CDATA[Wed, 29 Jan 2020 21:17:19 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.dbdr.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.dbdr.com/comprehensive-doable-effective-computer-security-wow/]]></guid>
			<link><![CDATA[https://www.dbdr.com/comprehensive-doable-effective-computer-security-wow/]]></link>
			<title>Comprehensive, doable, effective computer security!  Wow!</title>
			<pubDate><![CDATA[Wed, 29 Jan 2020 21:17:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/nwoug-2015-lunch-n-learn-presentation-database-security-running-oracle-databases-on-linux-with-minimum-rpms/]]></guid>
			<link><![CDATA[https://www.dbdr.com/nwoug-2015-lunch-n-learn-presentation-database-security-running-oracle-databases-on-linux-with-minimum-rpms/]]></link>
			<title>NWOUG 2015 Lunch-n-Learn Presentation: Database Security: Running Oracle databases on Linux with minimum RPMs</title>
			<pubDate><![CDATA[Wed, 28 Jan 2015 13:03:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/nwoug-fall-2014-presentation-oracle-enterprise-manager-12c/]]></guid>
			<link><![CDATA[https://www.dbdr.com/nwoug-fall-2014-presentation-oracle-enterprise-manager-12c/]]></link>
			<title>NWOUG Fall 2014 Presentation: Oracle Enterprise Manager 12c: The Oracle Monitoring tool of choice</title>
			<pubDate><![CDATA[Wed, 28 Jan 2015 12:57:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/resources/]]></guid>
			<link><![CDATA[https://www.dbdr.com/resources/]]></link>
			<title>Resources</title>
			<pubDate><![CDATA[Wed, 28 Jan 2015 12:53:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/resume/]]></guid>
			<link><![CDATA[https://www.dbdr.com/resume/]]></link>
			<title>Resume</title>
			<pubDate><![CDATA[Wed, 12 Nov 2025 19:20:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/build-a-linux-vm-for-working-with-go/]]></guid>
			<link><![CDATA[https://www.dbdr.com/build-a-linux-vm-for-working-with-go/]]></link>
			<title>Build a Linux VM for working with Go</title>
			<pubDate><![CDATA[Tue, 28 Jan 2020 14:30:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/go-programming-language-nwoug-presentation/]]></guid>
			<link><![CDATA[https://www.dbdr.com/go-programming-language-nwoug-presentation/]]></link>
			<title>Go Programming language (NWOUG Presentation)</title>
			<pubDate><![CDATA[Tue, 24 Dec 2019 21:49:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/heartbleed-a-tail-of-woe-and-a-possible-conspiracy-and-conflict-of-interest-hhmmmmm/]]></guid>
			<link><![CDATA[https://www.dbdr.com/heartbleed-a-tail-of-woe-and-a-possible-conspiracy-and-conflict-of-interest-hhmmmmm/]]></link>
			<title>UPDATE: Heartbleed: A tail of woe, and a possible conspiracy and conflict of interest. Hhmmmmm&#8230;.</title>
			<pubDate><![CDATA[Sun, 20 Apr 2014 00:25:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/windows-domain-accounts-insecure-by-default/]]></guid>
			<link><![CDATA[https://www.dbdr.com/windows-domain-accounts-insecure-by-default/]]></link>
			<title>Windows domain accounts &#8212; insecure by default?</title>
			<pubDate><![CDATA[Mon, 11 Nov 2013 19:28:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/facebook-vulnerability-discloses-friends-lists-defined-as-private/]]></guid>
			<link><![CDATA[https://www.dbdr.com/facebook-vulnerability-discloses-friends-lists-defined-as-private/]]></link>
			<title>Facebook Vulnerability Discloses Friends Lists Defined as Private</title>
			<pubDate><![CDATA[Fri, 22 Nov 2013 14:52:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/us-cert-alert-ta13-309a-cryptolocker-ransomware-infections-really-nasty-malware/]]></guid>
			<link><![CDATA[https://www.dbdr.com/us-cert-alert-ta13-309a-cryptolocker-ransomware-infections-really-nasty-malware/]]></link>
			<title>US-Cert Alert (TA13-309A) CryptoLocker Ransomware Infections &#8212; really nasty malware</title>
			<pubDate><![CDATA[Sat, 09 Nov 2013 06:47:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-prevent-arp-spoofing/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-prevent-arp-spoofing/]]></link>
			<title>How To Prevent ARP Spoofing</title>
			<pubDate><![CDATA[Thu, 10 Oct 2013 00:57:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/all-your-programs-can-access-your-quicken-data/]]></guid>
			<link><![CDATA[https://www.dbdr.com/all-your-programs-can-access-your-quicken-data/]]></link>
			<title>All Your Programs Can Access Your Quicken Data</title>
			<pubDate><![CDATA[Sat, 09 Nov 2013 05:25:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/what-is-a-security-sandbox/]]></guid>
			<link><![CDATA[https://www.dbdr.com/what-is-a-security-sandbox/]]></link>
			<title>What is a Security Sandbox?</title>
			<pubDate><![CDATA[Sat, 09 Nov 2013 04:17:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/start-here/]]></guid>
			<link><![CDATA[https://www.dbdr.com/start-here/]]></link>
			<title>Start Here</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:40:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/virtual-machines-arent-perfect-sandboxes/]]></guid>
			<link><![CDATA[https://www.dbdr.com/virtual-machines-arent-perfect-sandboxes/]]></link>
			<title>Virtual Machines Aren&#8217;t Perfect Sandboxes</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:33:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/targeted-advertising/]]></guid>
			<link><![CDATA[https://www.dbdr.com/targeted-advertising/]]></link>
			<title>Targeted Advertising</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:30:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/hacking-attack-rates/]]></guid>
			<link><![CDATA[https://www.dbdr.com/hacking-attack-rates/]]></link>
			<title>Hacking Attack Rates</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:26:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-keep-top-secret-documents-off-the-internet/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-keep-top-secret-documents-off-the-internet/]]></link>
			<title>How to Keep Top-Secret Documents Off the Internet</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:25:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/hardware-firewalls/]]></guid>
			<link><![CDATA[https://www.dbdr.com/hardware-firewalls/]]></link>
			<title>Hardware Firewalls</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:25:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-configure-a-hardware-firewall/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-configure-a-hardware-firewall/]]></link>
			<title>How to Configure a Hardware Firewall</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:24:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/contact/]]></guid>
			<link><![CDATA[https://www.dbdr.com/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Sun, 06 Oct 2013 22:10:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-protect-your-oracle-database-from-hackers/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-protect-your-oracle-database-from-hackers/]]></link>
			<title>How to Protect your Oracle Database from Hackers</title>
			<pubDate><![CDATA[Sat, 09 Nov 2013 06:17:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-protect-your-wireless-network/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-protect-your-wireless-network/]]></link>
			<title>How To Protect Your Wireless Network</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:24:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/security-sandboxes-a-great-reason-to-upgrade/]]></guid>
			<link><![CDATA[https://www.dbdr.com/security-sandboxes-a-great-reason-to-upgrade/]]></link>
			<title>Security Sandboxes: A Great Reason to Upgrade</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:19:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/uninstall-software-you-dont-use/]]></guid>
			<link><![CDATA[https://www.dbdr.com/uninstall-software-you-dont-use/]]></link>
			<title>Uninstall Software You Don&#8217;t Use</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:15:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-automatically-update-your-software/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-automatically-update-your-software/]]></link>
			<title>How to Automatically Update Your Software</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:11:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-install-an-internet-security-suite/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-install-an-internet-security-suite/]]></link>
			<title>How to Install an Internet Security Suite</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:08:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/be-suspicious-of-online-software-delivery/]]></guid>
			<link><![CDATA[https://www.dbdr.com/be-suspicious-of-online-software-delivery/]]></link>
			<title>Be Suspicious of Online Software Delivery</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:05:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/security-concerns-with-quicken/]]></guid>
			<link><![CDATA[https://www.dbdr.com/security-concerns-with-quicken/]]></link>
			<title>Security Concerns with Quicken</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:01:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-download-software-safely/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-download-software-safely/]]></link>
			<title>How to Download Software Safely</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 19:53:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-opt-out-of-junk-mail/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-opt-out-of-junk-mail/]]></link>
			<title>How to Opt Out of Junk Mail</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 19:45:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-strengthen-your-passwords/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-strengthen-your-passwords/]]></link>
			<title>How to Strengthen Your Passwords</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 19:42:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/a-great-book-on-security/]]></guid>
			<link><![CDATA[https://www.dbdr.com/a-great-book-on-security/]]></link>
			<title>A GREAT Book on Security</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 19:42:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-make-your-browser-more-secure/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-make-your-browser-more-secure/]]></link>
			<title>How to Make Your Browser More Secure</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 19:39:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/disable-proxy-identification/]]></guid>
			<link><![CDATA[https://www.dbdr.com/disable-proxy-identification/]]></link>
			<title>Disable Proxy Autodetection</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 19:34:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-use-facebook-securely/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-use-facebook-securely/]]></link>
			<title>How to Use Facebook Securely</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 18:39:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/security-sandboxes-and-virtualization/]]></guid>
			<link><![CDATA[https://www.dbdr.com/security-sandboxes-and-virtualization/]]></link>
			<title>Security Sandboxes and Virtualization</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 18:34:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-implement-security-sandboxes/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-implement-security-sandboxes/]]></link>
			<title>How to Implement Security Sandboxes</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 18:19:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-protect-yourself-from-hacking-attacks/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-protect-yourself-from-hacking-attacks/]]></link>
			<title>How to Protect Yourself from Hacking Attacks</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 18:14:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/your-mac-is-not-immune-to-hacking/]]></guid>
			<link><![CDATA[https://www.dbdr.com/your-mac-is-not-immune-to-hacking/]]></link>
			<title>Your Mac is Not Immune to Hacking</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 18:07:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/how-to-protect-your-quicken-data-from-all-your-programs/]]></guid>
			<link><![CDATA[https://www.dbdr.com/how-to-protect-your-quicken-data-from-all-your-programs/]]></link>
			<title>How To Protect Your Quicken Data from All Your Programs</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 18:02:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/keep-this-in-mind-when-downloading-software/]]></guid>
			<link><![CDATA[https://www.dbdr.com/keep-this-in-mind-when-downloading-software/]]></link>
			<title>Keep This in Mind When Downloading Software</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 17:56:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/potential-logging-of-e-business-suite-passwords/]]></guid>
			<link><![CDATA[https://www.dbdr.com/potential-logging-of-e-business-suite-passwords/]]></link>
			<title>Potential Logging of E-Business Suite Passwords</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 05:28:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/about/]]></guid>
			<link><![CDATA[https://www.dbdr.com/about/]]></link>
			<title>About</title>
			<pubDate><![CDATA[Sun, 06 Oct 2013 22:10:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.dbdr.com/why-upgrading-is-a-security-strategy/]]></guid>
			<link><![CDATA[https://www.dbdr.com/why-upgrading-is-a-security-strategy/]]></link>
			<title>Why Upgrading is a Security Strategy</title>
			<pubDate><![CDATA[Mon, 07 Oct 2013 20:24:02 +0000]]></pubDate>
		</item>
				</channel>
</rss>
