<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cyberleech.blog/2020/02/12/cyberleech-returns-so-now-what/</loc><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2020/02/hamster-pic.jpg</image:loc><image:title>Hamster Pic</image:title></image:image><lastmod>2020-02-12T04:21:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2019/10/11/how-to-replace-your-nintendo-switch-left-joy-con-analog-stick/</loc><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2019/10/yljoyconnafinished.jpg</image:loc><image:title>YLJoyConNAFinished</image:title><image:caption>Now your left Joy-Con is fixed and ready to play!</image:caption></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2019/10/yjoyconnaback.jpg</image:loc><image:title>YJoyConNABack</image:title></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2019/10/inkedyjoyconnaback_drawn.jpg</image:loc><image:title>InkedYJoyConNABack_drawn</image:title><image:caption>Screw back in the four tri-wing screws to attach the back shell of the controller.</image:caption></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2019/10/yljoyconnabattery.jpg</image:loc><image:title>YLJoyConNABattery</image:title><image:caption>Put the battery back in the controller. Make sure its wire is back in properly too.</image:caption></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2019/10/yljoyconnabatremovedsin.jpg</image:loc><image:title>YLJoyConNABatRemovedSIn</image:title></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2019/10/inkedyljoyconnabatremoved_drawn.jpg</image:loc><image:title>InkedYLJoyConNABatRemoved_drawn</image:title><image:caption>Put the plastic piece back on and screw it back in with the three screws.</image:caption></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2019/10/yljoyconnanalogstick.jpg</image:loc><image:title>YLJoyConNanalogStick</image:title><image:caption>Make sure these cables are attached properly and locked in place.</image:caption></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2019/10/inkedyljoyconnanalogsin_li2.jpg</image:loc><image:title>InkedYLJoyConNAnalogSIn_LI2</image:title><image:caption>These two detached cables have to go back into their ports.</image:caption></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2019/10/inkedyljoyconnanalogsin_drawn.jpg</image:loc><image:title>InkedYLJoyConNAnalogSIn_drawn</image:title><image:caption>Now screw it in properly.</image:caption></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2019/10/yljoyconnanalog.jpg</image:loc><image:title>YLJoyConNAnalog</image:title><image:caption>Put the new analog stick in.</image:caption></image:image><lastmod>2019-10-19T00:45:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/contact-2/</loc><lastmod>2019-10-19T00:22:54+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberleech.blog/contact/</loc><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/09/person-smartphone-office-table.jpeg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2019-10-18T10:12:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberleech.blog/2018/11/14/french-president-emmanuel-macron-calls-for-a-secure-cyberspace-to-big-tech-companies/</loc><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/11/793a7bbb-b7dc-4cea-80e2-ace88921408e2755429075995810469.jpg</image:loc><image:title>793a7bbb-b7dc-4cea-80e2-ace88921408e2755429075995810469.jpg</image:title></image:image><lastmod>2018-11-14T03:14:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/11/12/china-has-allegedly-violated-u-s-anti-hacking-deal/</loc><lastmod>2018-11-12T04:08:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/11/09/new-botnet-found-that-has-infected-over-100000-machines/</loc><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/11/ddos-botnet-star-network-topology8253163183499159778.png</image:loc><image:title>ddos-botnet-star-network-topology8253163183499159778.png</image:title></image:image><lastmod>2018-11-09T15:14:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/11/09/more-russian-accounts-banned-on-facebook-due-to-inauthentic-behavior/</loc><lastmod>2018-11-09T05:39:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/11/02/security-flaw-in-chips-leave-hospitals-factories-and-storesvulnerable-to-cyber-attack/</loc><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/11/better-free-wifi.jpg</image:loc><image:title>Better Free wifi</image:title></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/11/free-wifi-sign.jpg</image:loc><image:title>Free wifi sign</image:title></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/11/armis-logo.jpg</image:loc><image:title>Armis logo</image:title></image:image><lastmod>2018-11-02T20:11:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/11/02/facebook-still-has-needs-a-way-of-verifying-political-ads-on-its-website/</loc><lastmod>2018-11-02T15:40:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/10/27/chinas-been-listening-to-trumps-phone-calls-through-his-personal-iphone/</loc><lastmod>2018-10-27T13:39:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/10/24/apps-are-able-to-track-you-even-after-you-uninstall-them/</loc><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/10/appsflyer-1513027312-logo2554259372908949914.png</image:loc><image:title>appsflyer-1513027312-logo2554259372908949914.png</image:title></image:image><lastmod>2018-10-24T01:43:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/10/19/spammers-are-reportedly-behind-the-facebook-hack/</loc><lastmod>2018-10-19T03:06:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/10/16/if-you-like-privacy-then-the-duckduckgo-browser-is-perfect-for-you/</loc><lastmod>2018-10-17T00:46:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/10/13/fake-flash-updates-infects-computers-with-crypto-mining-malware/</loc><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/10/cryptocurrency-bezop6218512079266526543.jpeg</image:loc><image:title>cryptocurrency-bezop6218512079266526543.jpeg</image:title></image:image><lastmod>2018-10-13T18:02:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/10/12/google-shuts-down-and-reveals-a-major-security-flaw-that-revealed-over-500000-users-data/</loc><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/10/google-hq.jpg</image:loc><image:title>Google+ HQ</image:title><image:caption>Google+ launched back in 2011 as a social media platform in hopes to be the next big social media platform. Sadly, it never really took off with Internet users.</image:caption></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/10/google-delete.png</image:loc><image:title>Google+ Delete</image:title></image:image><lastmod>2018-10-13T17:14:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/10/05/china-has-a-surge-in-hacking-activity/</loc><lastmod>2018-10-05T19:16:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/10/05/phishers-can-use-your-phone-number-to-try-and-scam-you/</loc><lastmod>2018-10-05T02:09:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/09/27/local-government-website-govpaynow-com-leaks-over-14-million-customer-records/</loc><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/09/govpaynet1105947570.png</image:loc><image:title>govpaynet1105947570.png</image:title></image:image><lastmod>2018-09-27T10:04:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/09/23/according-to-google-apps-can-scan-and-share-your-data-with-consent/</loc><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/09/google-lady-vp1.jpg</image:loc><image:title>Susan Molinari</image:title><image:caption>Google's vice president for public policy.</image:caption></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/09/google-lady-vp.jpg</image:loc><image:title>Google Lady VP</image:title></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/09/google-rarw.jpg</image:loc><image:title>Google.rarw</image:title></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/09/google-logo-pic.png</image:loc><image:title>Google Logo Pic</image:title></image:image><lastmod>2018-09-24T01:32:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/09/20/us-military-initiates-a-new-strategy-against-cyber-attacks/</loc><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/09/cyber-usa_645x400.jpg</image:loc><image:title>cyber-usa_645x400</image:title></image:image><lastmod>2018-09-20T23:45:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/09/16/mark-zuckerberg-says-facebook-is-better-prepared-for-the-next-political-election/</loc><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/09/the-zucc.jpg</image:loc><image:title>The Zucc</image:title></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/09/facebook-wallpaper-hd.jpg</image:loc><image:title>Facebook-Wallpaper-HD</image:title></image:image><lastmod>2018-09-17T09:26:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/09/14/atlantas-government-cyber-attacked-with-ransomware/</loc><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/09/cyber-security-photo.jpg</image:loc><image:title>Cyber-Security photo</image:title></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/09/futon-county-government-center-atlanta.jpg</image:loc><image:title>Futon-County-Government-Center-Atlanta</image:title></image:image><image:image><image:loc>https://cyberleech.blog/wp-content/uploads/2018/09/atlanta-city-picture.jpg</image:loc><image:title>Atlanta City Picture</image:title></image:image><lastmod>2018-09-14T00:41:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog/2018/09/09/over-250-million-pcs-affected-by-malicious-adware-called-fireball/</loc><lastmod>2018-09-14T00:26:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberleech.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2020-02-12T04:21:36+00:00</lastmod></url></urlset>
