<?xml version='1.0' encoding='UTF-8'?>
<!--  generator="Inspyder Sitemap Creator 5.1.4"  -->
<!-- Last Updated 26/02/2026 21:52:57 -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xhtml="http://www.w3.org/1999/xhtml" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd http://www.google.com/schemas/sitemap-mobile/1.0/sitemap-mobile.xsd http://www.google.com/schemas/sitemap-video/1.1/sitemap-video.xsd" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url>
	<loc>https://blog.securiteinfo.com/</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/themes/quark/images/logo/logo-securiteinfo.png</image:loc>
		<image:caption>Blog pour hackers</image:caption>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/debian-11-bullseye-compatibilite-rsync-noatime</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/43.le-grand-remplacement-de-vos-logiciels/microsoftetadobe.avif</image:loc>
		<image:title>Blog</image:title>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/debian-linux-desactiver-ipv6-sur-tout-le-serveur</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/debian-sauvegarder-les-mails-dun-compte-imap</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/preserver-la-duree-de-vie-dun-disque-ssd-sous-linux</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/connaitre-les-linux-headers-a-installer-pour-le-kernel-courant</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/enregistrer-les-donnees-post-dans-les-logs-apache</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/optimisation-windows</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/cloudflare-et-lets-encrypt-comment-renouveler-son-certificat-sans-arreter-le-serveur-web</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/cloudflare-trouver-sa-cle-api-et-son-id-zone</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/08.cloudflare-trouver-sa-cle-api-et-son-id-zone/mon-profil-cloudflare.jpg</image:loc>
		<image:caption>mon-profil-cloudflare</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/08.cloudflare-trouver-sa-cle-api-et-son-id-zone/cloudflare-obtenir-cle-api.jpg</image:loc>
		<image:caption>cloudflare-obtenir-cle-api</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/images/6/1/5/9/c/6159c0b4db2ed28437b99b07ff9ce4999bd4aca7-cloudflare-apercu.jpg</image:loc>
		<image:caption>cloudflare-apercu</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/08.cloudflare-trouver-sa-cle-api-et-son-id-zone/cloudflare-id-zone.jpg</image:loc>
		<image:caption>cloudflare-id-zone</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/08.cloudflare-trouver-sa-cle-api-et-son-id-zone/cloudflare-apercu.jpg</image:loc>
		<image:title>Cloudflare : Trouver sa clé API et son ID zone</image:title>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/rsync-deflate-on-token-returned-0</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/le-numero-de-telephone-des-livreurs-amazon</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/host-or-domain-name-not-found-name-service-error-for-name-mx0-mail-ovh-net-type-aaaa-host-found-but-no-data-record-of-requested-type</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/comment-rebooter-un-linux-quand-tout-est-parti-en-cacahouete</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/debian-nice-boinc</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/chrome-ignorer-les-erreurs-de-certificat</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/utiliser-wget-avec-un-proxy-http</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/installer-stable-diffusion-pour-gpu-amd-sous-windows</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/suppression-dune-partition-de-recuperation-en-ligne-de-commande</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/impossible-de-se-connecter-en-ssh-no-matching-host-key-type-found-their-offer-ssh-rsa</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/recompiler-une-vieille-version-de-clamav-sous-debian</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/desactiver-les-touches-de-raccourci-amd-software-adrenalin-edition</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/21.desactiver-les-touches-de-raccourci-amd-software-adrenalin-edition/touches-raccourci-amd-software-adrenalin-edition.webp</image:loc>
		<image:caption>touches-raccourci-amd-software-adrenalin-edition</image:caption>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/windows-11-supprimer-afficher-plus-options</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/images/f/a/f/7/1/faf711a378618f27280e4b61b22e06d400615521-cmd.webp</image:loc>
		<image:caption>cmd</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/22.windows-11-supprimer-afficher-plus-options/cmd.webp</image:loc>
		<image:title>Windows 11 : Supprimer &amp;quot;Afficher plus d&amp;#039;options&amp;quot;</image:title>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/optimisation-de-windows-11-et-desactivation-de-la-telemetrie</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/23.optimisation-de-windows-11-et-desactivation-de-la-telemetrie/ThisIsWin11exe.png</image:loc>
		<image:caption>ThisIsWin11exe</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/23.optimisation-de-windows-11-et-desactivation-de-la-telemetrie/pinceau.png</image:loc>
		<image:caption>pinceau</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/23.optimisation-de-windows-11-et-desactivation-de-la-telemetrie/menutiw11.webp</image:loc>
		<image:caption>menutiw11</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/23.optimisation-de-windows-11-et-desactivation-de-la-telemetrie/fixissuestiw11.png</image:loc>
		<image:caption>fixissuestiw11</image:caption>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/windows-11-virer-les-bords-ronds-des-fenetres</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/sfc-verifier-les-fichiers-systemes-et-depanner-windows-10-et-windows-11</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/25.sfc-verifier-les-fichiers-systemes-et-depanner-windows-10-et-windows-11/cmd-mode-admin.webp</image:loc>
		<image:caption>cmd-mode-admin</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/25.sfc-verifier-les-fichiers-systemes-et-depanner-windows-10-et-windows-11/sfc-scannow.png</image:loc>
		<image:caption>sfc-scannow</image:caption>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/dans-quel-fichier-sont-stockees-les-macros-de-vim</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/desactiver-les-touches-remanentes-windows-10-et-11</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/27.desactiver-les-touches-remanentes-windows-10-et-11/touches-remanentes.webp</image:loc>
		<image:caption>touches-remanentes</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/27.desactiver-les-touches-remanentes-windows-10-et-11/desactiver-touches-remanentes.webp</image:loc>
		<image:caption>desactiver-touches-remanentes</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/27.desactiver-les-touches-remanentes-windows-10-et-11/tout-desactiver-touches-remanentes.webp</image:loc>
		<image:caption>tout-desactiver-touches-remanentes</image:caption>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/mode-god-pour-windows-11</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/28.mode-god-pour-windows-11/creation-mode-god.webp</image:loc>
		<image:caption>creation-mode-god</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/28.mode-god-pour-windows-11/mode-god-fait.webp</image:loc>
		<image:caption>mode-god-fait</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/28.mode-god-pour-windows-11/detail-mode-god.webp</image:loc>
		<image:caption>detail-mode-god</image:caption>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/copier-tout-un-site-web-avec-wget</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/faire-fonctionner-le-pave-numerique-sous-vi-et-vim</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/faire-un-miroir-dun-site-web-avec-wget-plus-rapidement</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/debian-12-bookworm-recompiler-clamav-1-3-0</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/installer-une-ia-de-ton-choix-en-local-sur-ton-ordinateur-serveur-windows-linux-ou-mac</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/youtube-dl-est-mort-vive-yt-dlp-pour-telecharger-des-videos-ou-de-la-musique</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/rustdesk-mac-impossible-de-voir-lecran-malgre-une-authentification-reussie</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/35.rustdesk-mac-impossible-de-voir-lecran-malgre-une-authentification-reussie/rustdesk-mac-en-attente-image.webp</image:loc>
		<image:caption>rustdesk-mac-en-attente-image</image:caption>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/chrome-ne-prend-pas-en-compte-le-fichier-c-windows-system32-drivers-etc-hosts</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/zip-a-la-vitesse-de-la-lumiere</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/vim-a-la-place-de-joe-pour-systemctl-edit</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/savoir-si-ipv6-est-desactive-sur-un-serveur-linux</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/installer-les-drivers-gpu-amd-sans-adrenalin</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/40.installer-les-drivers-gpu-amd-sans-adrenalin/rechercher-pilotes.avif</image:loc>
		<image:caption>rechercher-pilotes</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/40.installer-les-drivers-gpu-amd-sans-adrenalin/driver-complet-amd-software.avif</image:loc>
		<image:caption>driver-complet-amd-software</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/40.installer-les-drivers-gpu-amd-sans-adrenalin/amd-software-adrenalin-edition.avif</image:loc>
		<image:caption>amd-software-adrenalin-edition</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/40.installer-les-drivers-gpu-amd-sans-adrenalin/gestionnaire-de-peripherique.avif</image:loc>
		<image:caption>gestionnaire-de-peripherique</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/40.installer-les-drivers-gpu-amd-sans-adrenalin/rechercher-les-pilotes.avif</image:loc>
		<image:caption>rechercher-les-pilotes</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/40.installer-les-drivers-gpu-amd-sans-adrenalin/path-rechercher-pilotes.avif</image:loc>
		<image:caption>path-rechercher-pilotes</image:caption>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/rustdesk-en-panne-decembre-2025-quelle-alternative</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/41.rustdesk-en-panne-decembre-2025-quelle-alternative/rustdek-bloque-par-windows.avif</image:loc>
		<image:caption>rustdek-bloque-par-windows</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/41.rustdesk-en-panne-decembre-2025-quelle-alternative/reaction-rustdesk-x.avif</image:loc>
		<image:caption>reaction-rustdesk-x</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/images/e/f/a/c/3/efac3e1cad7c3bba6bcdc2ed9f90c36e1a3896bb-hoptodesk.avif</image:loc>
		<image:caption>hoptodesk</image:caption>
	</image:image>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/41.rustdesk-en-panne-decembre-2025-quelle-alternative/hoptodesk.avif</image:loc>
		<image:title>RustDesk en panne (décembre 2025) Quelle alternative ?</image:title>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/les-majuscules-avec-accents-sous-windows</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/le-grand-remplacement-de-vos-logiciels</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/iptv-la-television-gratuite-illimitee-et-sans-abonnement</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/44.iptv-la-television-gratuite-illimitee-et-sans-abonnement/iptvnator.png</image:loc>
		<image:caption>iptvnator</image:caption>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/about</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/installation-dun-mineur-cpu-de-cryptomonnaie-sur-debian</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/monter-une-partition-raid-sous-linux</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/effacer-un-mail-dans-la-queue-de-postfix</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/linux-debian-les-outils-smart-des-disque-durs</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/debian-amavis-envoie-un-mail-a-postmaster-a-chaque-fois-quun-virus-est-detecte</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/debian-activer-la-souris-dans-vi-pour-faire-du-copier-coller</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/loguer-les-requetes-lentes-sous-apache</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/linux-forcer-la-verification-du-disque-dur-au-prochain-demarrage</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/creer-un-certificat-letsencrypt-avec-certbot</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/afficher-le-pourcentage-de-la-ligne-en-cours-dans-less</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/vider-la-file-dattente-de-postfix</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/page-des-incidents-reseaux-orange</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/les-alternatives-a-google</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/grep-pour-windows</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/grep-pour-windows/dnGrep.jpg</image:loc>
		<image:caption>dnGrep</image:caption>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/connaitre-la-liste-des-disques-durs-dun-systeme-linux</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/linux-debian-mesurer-la-performance-des-fonctions-des-processus</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/lister-les-connexions-tcp-sous-windows</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/resolution-x11-plus-grande-que-mon-ecran</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/eteindre-un-ecran-terminal-au-bout-dune-minute-sous-linux-en-ligne-de-commande</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/afficher-les-informations-dun-certificat-crt-avec-openssl</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/ralentir-le-lien-sata-de-votre-disque-dur</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/serveurs-dns-gratuits-rapides-et-respectueux-de-la-vie-privee</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/aide-memoire-seo-les-outils-google-indispensables</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/faire-un-proxy-socks-avec-une-connexion-ssh</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/lancer-ssh-au-demarrage-sur-raspberry-pi-toutes-versions</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/se-loguer-en-root-sur-un-raspberry-pi</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/configurer-le-lan-sur-une-box-fibre-sfr</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/mei_me-reset-reached-maximal-consecutive-resets-disabling-the-device</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/dmar-drhd-handling-fault-status-reg-3</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/linux-verifier-le-spf-dun-domaine-en-ligne-de-commande</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/afficher-la-route-par-defaut-sous-linux</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/steam-et-vie-privee</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<image:image>
		<image:loc>https://blog.securiteinfo.com/user/pages/02.blog/steam-et-vie-privee/bouton-steam-modifier-profil.png</image:loc>
		<image:title>Steam et vie privée</image:title>
	</image:image>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/debian-effacer-les-vieux-packages-deb-obsoletes</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/linux-verifier-etat-raid-materiel-ou-logiciel</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/prendre-la-temperature-de-son-serveur-linux-debian</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/bip-sous-linux</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/debian-comment-supprimer-le-buffer-de-sortie-de-vos-commandes-en-ligne</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/debian-firmware-failed-to-load-regulatory-db</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/a-quel-paquet-deb-correspond-ce-fichier</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/monter-un-fichier-ova-sous-debian</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/desactiver-ipv6-pour-apt</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/linux-auditer-les-acces-disques-de-son-serveur</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/watch-et-pipe</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/accelerer-les-acces-disques-sous-linux</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/bash-trier-par-les-lignes-les-plus-grandes</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/debian-bash-avoir-la-date-et-heure-dans-le-prompt</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/debian-monter-un-systeme-de-fichiers-over-ssh</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/desactivation-de-updatedb-mlocate</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/dns-bind-et-etc-hosts</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/installation-raspbian-sur-raspberry-pi</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/la-souris-en-mode-texte-sous-debian</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/linux-connaitre-le-chemin-path-dun-processus</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/linux-mettre-de-la-couleur-dans-grep</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/linux-retour-chariot-windows-sous-vi</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/telecharger-les-mises-a-jour-debian-sans-les-installer</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/trouver-uuid-une-partition</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
<url>
	<loc>https://blog.securiteinfo.com/blog/vider-le-cache-dns-de-bind</loc>
	<lastmod>2026-02-26</lastmod>
	<changefreq>monthly</changefreq>
	<priority>0.5</priority>
	<mobile:mobile/>
</url>
</urlset>
