<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 22/05/2026 at 17:25 by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://academy.audax.gr/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Audax Academy</title>
		<link><![CDATA[https://academy.audax.gr]]></link>
		<description><![CDATA[Audax Academy]]></description>
		<lastBuildDate><![CDATA[Fri, 22 May 2026 17:10:15 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://academy.audax.gr/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://academy.audax.gr/executive-reporting-cyber-risk-quantification-strategy/]]></guid>
			<link><![CDATA[https://academy.audax.gr/executive-reporting-cyber-risk-quantification-strategy/]]></link>
			<title>Executive Cyber Reporting: Risk Quantification (FAIR), Board Dashboards &amp; Strategic Storytelling</title>
			<pubDate><![CDATA[Fri, 22 May 2026 17:10:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/security-report-writing-methodology-quality/]]></guid>
			<link><![CDATA[https://academy.audax.gr/security-report-writing-methodology-quality/]]></link>
			<title>Security Report Writing Methodology: Repeatable Quality, CVSS/EPSS/SSVC &amp; Evidence Handling</title>
			<pubDate><![CDATA[Fri, 22 May 2026 17:09:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/pentest-reporting-eisagogi-gia-arxarious/]]></guid>
			<link><![CDATA[https://academy.audax.gr/pentest-reporting-eisagogi-gia-arxarious/]]></link>
			<title>Pentest Reporting για Αρχάριους: Γιατί το Report Είναι Πιο Σημαντικό από το Exploit</title>
			<pubDate><![CDATA[Fri, 22 May 2026 17:09:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/dimiourgia-report-me-to-dradis/]]></guid>
			<link><![CDATA[https://academy.audax.gr/dimiourgia-report-me-to-dradis/]]></link>
			<title>Δημιουργία Pentest Report με Dradis CE: Project, Templates, Methodology &amp; Export</title>
			<pubDate><![CDATA[Fri, 22 May 2026 17:09:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/forencics-analysis-me-to-autopsy-part-1/]]></guid>
			<link><![CDATA[https://academy.audax.gr/forencics-analysis-me-to-autopsy-part-1/]]></link>
			<title>Autopsy Part 1: Εισαγωγή στο Open-Source Digital Forensics Toolkit</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:43:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/ανάλυση-πηγών-δεδομένων-με-το-autopsy-part-2/]]></guid>
			<link><![CDATA[https://academy.audax.gr/ανάλυση-πηγών-δεδομένων-με-το-autopsy-part-2/]]></link>
			<title>Autopsy Part 2: Βαθιά Ανάλυση Πηγών Δεδομένων, Keyword Search &#038; Artifact Carving</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:43:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/digital-forensics-eisagogi-gia-arxarious/]]></guid>
			<link><![CDATA[https://academy.audax.gr/digital-forensics-eisagogi-gia-arxarious/]]></link>
			<title>Digital Forensics για Αρχάριους: Συλλογή, Διατήρηση &#038; Ανάλυση Ψηφιακών Στοιχείων</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:43:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/incident-response-forensic-triage-methodology/]]></guid>
			<link><![CDATA[https://academy.audax.gr/incident-response-forensic-triage-methodology/]]></link>
			<title>Incident Response Forensic Triage: Live &#038; Post-Mortem Μεθοδολογία (Intermediate)</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:43:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/enterprise-forensic-readiness-program-strategy/]]></guid>
			<link><![CDATA[https://academy.audax.gr/enterprise-forensic-readiness-program-strategy/]]></link>
			<title>Enterprise Forensic Readiness Program: Governance, Legal Coordination &#038; Cross-Cloud Investigations</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:42:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/mimikatz-pass-to-hash-attack-part-1/]]></guid>
			<link><![CDATA[https://academy.audax.gr/mimikatz-pass-to-hash-attack-part-1/]]></link>
			<title>Mimikatz &#038; Pass-the-Hash (Part 1): Πώς Λειτουργεί, Πώς Ανιχνεύεται, Πώς Αμύνεται</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:16:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/windows-post-exploitation-part-1/]]></guid>
			<link><![CDATA[https://academy.audax.gr/windows-post-exploitation-part-1/]]></link>
			<title>Windows Post-Exploitation Methodology (Part 1): Από Initial Foothold σε Domain Compromise (Lab)</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:16:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/post-exploitation-eisagogi-gia-arxarious/]]></guid>
			<link><![CDATA[https://academy.audax.gr/post-exploitation-eisagogi-gia-arxarious/]]></link>
			<title>Post Exploitation για Αρχάριους: Τι Είναι, Πώς Σκέφτεται ο Επιτιθέμενος, Πώς Αμύνεται ο Defender</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:15:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/post-exploitation-detection-engineering-methodology/]]></guid>
			<link><![CDATA[https://academy.audax.gr/post-exploitation-detection-engineering-methodology/]]></link>
			<title>Post-Exploitation Detection Engineering: Από ATT&#038;CK TTPs σε Hunts, Sigma Rules και High-Fidelity Alerts</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:15:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/enterprise-blast-radius-containment-purple-team-strategy/]]></guid>
			<link><![CDATA[https://academy.audax.gr/enterprise-blast-radius-containment-purple-team-strategy/]]></link>
			<title>Enterprise Blast-Radius Containment &#038; Purple-Team Strategy μετά από Post-Compromise</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:15:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/active-directory-ethical-hacking-lab-bloodhound-nmap-siem/]]></guid>
			<link><![CDATA[https://academy.audax.gr/active-directory-ethical-hacking-lab-bloodhound-nmap-siem/]]></link>
			<title>Active Directory Ethical Hacking Lab: Recon, BloodHound, Kerberos Abuse &#038; SIEM Detection</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:15:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/linux-ethical-hacking-lab-nmap-metasploit-validation/]]></guid>
			<link><![CDATA[https://academy.audax.gr/linux-ethical-hacking-lab-nmap-metasploit-validation/]]></link>
			<title>Linux Ethical Hacking Lab: Recon, Service Enumeration, Privilege Escalation &#038; Detection</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:15:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/taktikes-epithesis-man-in-the-middle-attack/]]></guid>
			<link><![CDATA[https://academy.audax.gr/taktikes-epithesis-man-in-the-middle-attack/]]></link>
			<title>Man-in-the-Middle Attack: Πλήρης Ανατομία, Lab Demo &amp; Defender Controls</title>
			<pubDate><![CDATA[Fri, 22 May 2026 15:34:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/wireshark-part-1/]]></guid>
			<link><![CDATA[https://academy.audax.gr/wireshark-part-1/]]></link>
			<title>Wireshark — Part 1: Capture, Display Filters &amp; Πρώτη Ανάλυση Pcap</title>
			<pubDate><![CDATA[Fri, 22 May 2026 15:34:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/bettercap-part-1/]]></guid>
			<link><![CDATA[https://academy.audax.gr/bettercap-part-1/]]></link>
			<title>BetterCAP — Part 1: Αρχιτεκτονική, Modules &amp; Authorized ARP Spoof Lab</title>
			<pubDate><![CDATA[Fri, 22 May 2026 15:34:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/dhcp-starvation-attack/]]></guid>
			<link><![CDATA[https://academy.audax.gr/dhcp-starvation-attack/]]></link>
			<title>DHCP Starvation Attack: Μηχανισμός, Lab Demo &amp; DHCP Snooping Defense</title>
			<pubDate><![CDATA[Fri, 22 May 2026 15:34:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/network-sniffing-spoofing-eisagogi-gia-arxarious/]]></guid>
			<link><![CDATA[https://academy.audax.gr/network-sniffing-spoofing-eisagogi-gia-arxarious/]]></link>
			<title>Network Sniffing &amp; Spoofing για Αρχάριους: Πώς Ταξιδεύουν τα Πακέτα και Πώς Προστατευόμαστε</title>
			<pubDate><![CDATA[Fri, 22 May 2026 15:32:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/mitm-detection-network-traffic-analysis-methodology/]]></guid>
			<link><![CDATA[https://academy.audax.gr/mitm-detection-network-traffic-analysis-methodology/]]></link>
			<title>MITM Detection &amp; Network Traffic Analysis: Methodology σε Intermediate Επίπεδο</title>
			<pubDate><![CDATA[Fri, 22 May 2026 15:31:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/enterprise-network-trust-segmentation-detection-engineering/]]></guid>
			<link><![CDATA[https://academy.audax.gr/enterprise-network-trust-segmentation-detection-engineering/]]></link>
			<title>Enterprise Network Trust: Segmentation, Encrypted Traffic Analysis &amp; Detection Engineering</title>
			<pubDate><![CDATA[Fri, 22 May 2026 15:09:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/internal-network-assessment-lab-nmap-wireshark-wazuh/]]></guid>
			<link><![CDATA[https://academy.audax.gr/internal-network-assessment-lab-nmap-wireshark-wazuh/]]></link>
			<title>Internal Network Assessment Lab: Nmap, Wireshark &amp; Wazuh σε Εξουσιοδοτημένο Περιβάλλον</title>
			<pubDate><![CDATA[Fri, 22 May 2026 15:09:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/wireshark-network-forensics-lab-pcap-analysis-detection/]]></guid>
			<link><![CDATA[https://academy.audax.gr/wireshark-network-forensics-lab-pcap-analysis-detection/]]></link>
			<title>Wireshark Network Forensics Lab: PCAP Analysis, Anomaly Detection &amp; SIEM Correlation</title>
			<pubDate><![CDATA[Fri, 22 May 2026 15:09:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/beef-xss-part-1/]]></guid>
			<link><![CDATA[https://academy.audax.gr/beef-xss-part-1/]]></link>
			<title>BeEF-XSS (Part 1): Browser Exploitation σε δικό μας lab</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:43:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/netcat-and-shells-part-1/]]></guid>
			<link><![CDATA[https://academy.audax.gr/netcat-and-shells-part-1/]]></link>
			<title>Netcat και Shells (Part 1): Reverse / Bind shells σε lab</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:43:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/eisafogogi-sta-keyloggers-part-1/]]></guid>
			<link><![CDATA[https://academy.audax.gr/eisafogogi-sta-keyloggers-part-1/]]></link>
			<title>Εισαγωγή στα Keyloggers (Part 1): Ταξινόμηση, Threat Model, Άμυνα</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:43:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/isagogogi-sta-trojan/]]></guid>
			<link><![CDATA[https://academy.audax.gr/isagogogi-sta-trojan/]]></link>
			<title>Trojans, Droppers, Loaders, RATs: Kill-Chain και Defense in Depth</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:43:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/dimiourgia-c2c-server-part-1/]]></guid>
			<link><![CDATA[https://academy.audax.gr/dimiourgia-c2c-server-part-1/]]></link>
			<title>Command and Control (Part 1): C2 Frameworks και Havoc σε Lab</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:42:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/dimiourgia-ransomware-part-1/]]></guid>
			<link><![CDATA[https://academy.audax.gr/dimiourgia-ransomware-part-1/]]></link>
			<title>Ransomware (Part 1): Kill-Chain, ATT&#038;CK και Defense in Depth</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:42:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/texnikes-apofigis-anti-virus-part-1/]]></guid>
			<link><![CDATA[https://academy.audax.gr/texnikes-apofigis-anti-virus-part-1/]]></link>
			<title>AV / EDR Evasion (Part 1): Τεχνικές και η Άμυνα που τις Αποκαλύπτει</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:42:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/exploitation-eisagogi-gia-arxarious/]]></guid>
			<link><![CDATA[https://academy.audax.gr/exploitation-eisagogi-gia-arxarious/]]></link>
			<title>Εισαγωγή στο Exploitation για Αρχάριους: Από την Ευπάθεια στον Έλεγχο</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:42:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/exploit-validation-purple-team-methodology/]]></guid>
			<link><![CDATA[https://academy.audax.gr/exploit-validation-purple-team-methodology/]]></link>
			<title>Exploit Validation (Intermediate): Purple-Team Methodology και KPIs</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:42:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/adversary-emulation-threat-informed-exploitation-program/]]></guid>
			<link><![CDATA[https://academy.audax.gr/adversary-emulation-threat-informed-exploitation-program/]]></link>
			<title>Advanced Adversary Emulation: Threat-Informed Program για Enterprise</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:41:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/exploitation-me-metasploit-part-1/]]></guid>
			<link><![CDATA[https://academy.audax.gr/exploitation-me-metasploit-part-1/]]></link>
			<title>Exploitation με Metasploit (Part 1): Framework, Meterpreter, lab flow</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:41:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/multi-tool-ethical-hacking-workflow-lab-recon-to-report/]]></guid>
			<link><![CDATA[https://academy.audax.gr/multi-tool-ethical-hacking-workflow-lab-recon-to-report/]]></link>
			<title>Multi-Tool Ethical Hacking Workflow: Από Recon έως Reporting σε Ελεγχόμενο Lab</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:37:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/social-engineering-awareness-simulation-lab-defensive/]]></guid>
			<link><![CDATA[https://academy.audax.gr/social-engineering-awareness-simulation-lab-defensive/]]></link>
			<title>Social Engineering Awareness Simulation: Σχεδιασμός Εκπαιδευτικής Άσκησης σε Lab Περιβάλλον</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:36:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/web-application-ethical-hacking-lab-burp-zap-owasp-wstg/]]></guid>
			<link><![CDATA[https://academy.audax.gr/web-application-ethical-hacking-lab-burp-zap-owasp-wstg/]]></link>
			<title>Ethical Hacking Lab σε Web Application: Burp Suite, OWASP ZAP &#038; WSTG Methodology</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:34:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/reverse-engineering-lab/]]></guid>
			<link><![CDATA[https://academy.audax.gr/reverse-engineering-lab/]]></link>
			<title>Εργαστήριο Reverse Engineering: REMnux + FlareVM + INetSim</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:03:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/radare2-basics-part1/]]></guid>
			<link><![CDATA[https://academy.audax.gr/radare2-basics-part1/]]></link>
			<title>radare2 Basics (Part 1): Static analysis σε lab binaries</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:03:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/i-prwti-epafi-me-to-ghidra/]]></guid>
			<link><![CDATA[https://academy.audax.gr/i-prwti-epafi-me-to-ghidra/]]></link>
			<title>Ghidra: Πρώτη επαφή με τον NSA decompiler</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:03:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/continuous-threat-exposure-management-ctem-strategy/]]></guid>
			<link><![CDATA[https://academy.audax.gr/continuous-threat-exposure-management-ctem-strategy/]]></link>
			<title>Advanced Continuous Threat Exposure Management (CTEM): Στρατηγική Enterprise Exposure &#038; Validation</title>
			<pubDate><![CDATA[Fri, 22 May 2026 13:56:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/external-attack-surface-management-easm-methodology/]]></guid>
			<link><![CDATA[https://academy.audax.gr/external-attack-surface-management-easm-methodology/]]></link>
			<title>External Attack Surface Management (EASM) σε Intermediate Επίπεδο: Methodology, Discovery &#038; Validation</title>
			<pubDate><![CDATA[Fri, 22 May 2026 13:56:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/attack-surface-eisagogi-gia-arxarious/]]></guid>
			<link><![CDATA[https://academy.audax.gr/attack-surface-eisagogi-gia-arxarious/]]></link>
			<title>Attack Surface για Αρχάριους: Τι Βλέπει ο Επιτιθέμενος Όταν Σας Κοιτάει από το Internet</title>
			<pubDate><![CDATA[Fri, 22 May 2026 13:56:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/enterprise-human-risk-management-strategy-culture/]]></guid>
			<link><![CDATA[https://academy.audax.gr/enterprise-human-risk-management-strategy-culture/]]></link>
			<title>Advanced Enterprise Human Risk Management: Behavioral Analytics, Culture &#038; Adversary-Informed Defense</title>
			<pubDate><![CDATA[Fri, 22 May 2026 13:56:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/phishing-simulation-program-methodology-defensive/]]></guid>
			<link><![CDATA[https://academy.audax.gr/phishing-simulation-program-methodology-defensive/]]></link>
			<title>Phishing Simulation Program σε Intermediate Επίπεδο: Methodology, Ethics &#038; Defensive Outcomes</title>
			<pubDate><![CDATA[Fri, 22 May 2026 13:56:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/social-engineering-eisagogi-gia-arxarious/]]></guid>
			<link><![CDATA[https://academy.audax.gr/social-engineering-eisagogi-gia-arxarious/]]></link>
			<title>Social Engineering για Αρχάριους: Γιατί ο Άνθρωπος Είναι ο Πιο Ευάλωτος Κρίκος</title>
			<pubDate><![CDATA[Fri, 22 May 2026 13:56:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/enterprise-wireless-security-architecture-zero-trust/]]></guid>
			<link><![CDATA[https://academy.audax.gr/enterprise-wireless-security-architecture-zero-trust/]]></link>
			<title>Advanced Enterprise Wireless Security: Zero-Trust, WIDS/WIPS &#038; RF Threat Intelligence</title>
			<pubDate><![CDATA[Fri, 22 May 2026 13:55:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://academy.audax.gr/]]></guid>
			<link><![CDATA[https://academy.audax.gr/]]></link>
			<title>Καλώς ήρθατε στην Elite Hacking Academy</title>
			<pubDate><![CDATA[Fri, 22 May 2026 10:16:51 +0000]]></pubDate>
		</item>
				</channel>
</rss>
