<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>PostIndex &amp;mdash; Paul Sutton</title>
    <link>https://personaljournal.ca/paulsutton/tag:PostIndex</link>
    <description>Personal Blog</description>
    <pubDate>Tue, 05 May 2026 16:30:35 +0000</pubDate>
    <item>
      <title>CyberSecurity part 26 Supplemental</title>
      <link>https://personaljournal.ca/paulsutton/cybersecurity-part-26-supplemental</link>
      <description>&lt;![CDATA[CyberSecurity part 26 Supplemental&#xA;&#xA;Just a quick post to update the article index to include latest article(s).&#xA;&#xA;CyberSecurity part 3 - BASH Basics 1&#xA;CyberSecurity part 4 - BASH Basics 2&#xA;CyberSecurity part 5 - BASH Basics 3&#xA;CyberSecurity part 6 - BASH Basics 4&#xA;CyberSecurity part 7 - BASH Basics 5&#xA;CyberSecurity part 8 - BASH Basics 6&#xA;CyberSecurity part 9 - BASH Basics 7&#xA;CyberSecurity part 10 - BASH Basics 8&#xA;CyberSecurity part 10-1&#xA;CyberSecurity part 11 - Nano Editor&#xA;CyberSecurity part 12 - Shell Scripting&#xA;CyberSecurity part 13 - Sed,Grep &amp; Cron&#xA;CyberSecurity part 14 - System D Bsics&#xA;CyberSecurity part 15 - Networking Basics&#xA;CyberSecurity part 16- Day off- A few useful links&#xA;CyberSecurity part 17 - OpenSSh&#xA;CyberSecurity part 18 - Git &amp; Github&#xA;CyberSecurity part 19 - Virtual Machines&#xA;CyberSecurity part 20 - Computer Misuse Act&#xA;CyberSecurity part 21 - Python Intro&#xA;CyberSecurity part 22 - Pen testing tools&#xA;CyberSecurity part 23 - CyberSecurity Courses&#xA;CyberSecurity part 24 - Functional Programming in Coq&#xA;CyberSecurity-part-25 - Open Source vs Free Software&#xA;CyberSecurity-part-26 - Self hosting&#xA;CyberSecurity-part-27 - Build your own Linux&#xA;&#xA;Tags&#xA;&#xA;#CyberSecurity,#PostIndex&#xA;&#xA;hr&#xD;&#xA;&#xD;&#xA;table&#xD;&#xA;thead&#xD;&#xA;trtda rel=&#34;me&#34; href=&#34;https://qoto.org/@zleap&#34;Mastodon/a/td&#xD;&#xA;tda href=&#34;https://wiki.ircnow.org/?n=Shelllabs.Intro&#34;ShellLabs/td&#xD;&#xA;tda href=&#34;https://joinmastodon.org/&#34;Join Mastodon/a/td/tr/thead/table&#xD;&#xA;center&#xD;&#xA;AI statement : b Consent is NOT granted to use the content of this blog for the purposes of AI training or similar activity.  Consent CANNOT be assumed, it has to be granted. /b&#xD;&#xA;/center&#xD;&#xA;&#xD;&#xA;a href=&#34;https://liberapay.com/PaulSutton/donate&#34;img alt=&#34;Donate using Liberapay&#34; src=&#34;https://liberapay.com/assets/widgets/donate.svg&#34;/a&#xD;&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p>CyberSecurity part 26 Supplemental</p>

<p>Just a quick post to update the article index to include latest article(s).</p>

<p><a href="https://personaljournal.ca/paulsutton/cybersecurity-part-3" rel="nofollow">CyberSecurity part 3</a> – BASH Basics 1
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-4" rel="nofollow">CyberSecurity part 4</a> – BASH Basics 2
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-5" rel="nofollow">CyberSecurity part 5</a> – BASH Basics 3
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-6" rel="nofollow">CyberSecurity part 6</a> – BASH Basics 4
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-7" rel="nofollow">CyberSecurity part 7</a> – BASH Basics 5
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-8" rel="nofollow">CyberSecurity part 8</a> – BASH Basics 6
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-9" rel="nofollow">CyberSecurity part 9</a> – BASH Basics 7
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-10" rel="nofollow">CyberSecurity part 10</a> – BASH Basics 8
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-10-1" rel="nofollow">CyberSecurity part 10-1</a>
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-11" rel="nofollow">CyberSecurity part 11</a> – Nano Editor
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-12" rel="nofollow">CyberSecurity part 12</a> – Shell Scripting
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-13" rel="nofollow">CyberSecurity part 13</a> – Sed,Grep &amp; Cron
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-14" rel="nofollow">CyberSecurity part 14</a> – System D Bsics
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-15" rel="nofollow">CyberSecurity part 15</a> – Networking Basics
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-16" rel="nofollow">CyberSecurity part 16</a>– Day off- A few useful links
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-17" rel="nofollow">CyberSecurity part 17</a> – OpenSSh
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-18" rel="nofollow">CyberSecurity part 18</a> – Git &amp; Github
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-19" rel="nofollow">CyberSecurity part 19</a> – Virtual Machines
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-20" rel="nofollow">CyberSecurity part 20</a> – Computer Misuse Act
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-21" rel="nofollow">CyberSecurity part 21</a> – Python Intro
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-22" rel="nofollow">CyberSecurity part 22</a> – Pen testing tools
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-23" rel="nofollow">CyberSecurity part 23</a> – CyberSecurity Courses
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-24" rel="nofollow">CyberSecurity part 24</a> – Functional Programming in Coq
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-25" rel="nofollow">CyberSecurity-part-25</a> – Open Source vs Free Software
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-26" rel="nofollow">CyberSecurity-part-26</a> – Self hosting
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-27" rel="nofollow">CyberSecurity-part-27</a> – Build your own Linux</p>

<p><strong>Tags</strong></p>

<p><a href="/paulsutton/tag:CyberSecurity" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">CyberSecurity</span></a>,<a href="/paulsutton/tag:PostIndex" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">PostIndex</span></a></p>

<hr>

<p><table>
<thead>
<tr><td><a href="https://qoto.org/@zleap" rel="nofollow">Mastodon</a></td>
<td><a href="https://wiki.ircnow.org/?n=Shelllabs.Intro" rel="nofollow">ShellLabs</td>
<td><a href="https://joinmastodon.org/" rel="nofollow">Join Mastodon</a></td></tr></thead></table>

AI statement : <b> Consent is NOT granted to use the content of this blog for the purposes of AI training or similar activity.  Consent CANNOT be assumed, it has to be granted. </b>
</p>

<p><a href="https://liberapay.com/PaulSutton/donate" rel="nofollow"><img alt="Donate using Liberapay" src="https://liberapay.com/assets/widgets/donate.svg"></a></p>
]]></content:encoded>
      <guid>https://personaljournal.ca/paulsutton/cybersecurity-part-26-supplemental</guid>
      <pubDate>Wed, 01 Jun 2022 17:48:37 +0000</pubDate>
    </item>
    <item>
      <title>CyberSecurity part 2 Supplemental</title>
      <link>https://personaljournal.ca/paulsutton/cybersecurity-part-2-supplemental</link>
      <description>&lt;![CDATA[CyberSecurity part 2 Supplemental&#xA;&#xA;As this series is designed to run over the next few weeks, with a post each day. The following provides a list as to all the posts that are coming up. &#xA;&#xA;CyberSecurity part 3 - BASH Basics 1&#xA;CyberSecurity part 4 - BASH Basics 2&#xA;CyberSecurity part 5 - BASH Basics 3&#xA;CyberSecurity part 6 - BASH Basics 4&#xA;CyberSecurity part 7 - BASH Basics 5&#xA;CyberSecurity part 8 - BASH Basics 6&#xA;CyberSecurity part 9 - BASH Basics 7&#xA;CyberSecurity part 10 - BASH Basics 8&#xA;CyberSecurity part 10-1&#xA;CyberSecurity part 11 - Nano Editor&#xA;CyberSecurity part 12 - Shell Scripting&#xA;CyberSecurity part 13 - Sed,Grep &amp; Cron&#xA;CyberSecurity part 14 - System D Bsics&#xA;CyberSecurity part 15 - Networking Basics&#xA;CyberSecurity part 16- Day off- A few useful links&#xA;CyberSecurity part 17 - OpenSSh&#xA;CyberSecurity part 18 - Git &amp; Github&#xA;CyberSecurity part 19 - Virtual Machines&#xA;CyberSecurity part 20 - Computer Misuse Act&#xA;CyberSecurity part 21 - Python Intro&#xA;CyberSecurity part 22 - Pen testing tools&#xA;CyberSecurity part 23 - CyberSecurity Courses&#xA;CyberSecurity part 24 - Functional Programming in Coq&#xA;CyberSecurity-part-25 - Open Source vs Free Software&#xA;CyberSecurity-part-26 - Self hosting&#xA;&#xA;Tags&#xA;&#xA;#CyberSecurity,#PostIndex&#xA;&#xA;hr&#xD;&#xA;&#xD;&#xA;table&#xD;&#xA;thead&#xD;&#xA;trtda rel=&#34;me&#34; href=&#34;https://qoto.org/@zleap&#34;Mastodon/a/td&#xD;&#xA;tda href=&#34;https://wiki.ircnow.org/?n=Shelllabs.Intro&#34;ShellLabs/td&#xD;&#xA;tda href=&#34;https://joinmastodon.org/&#34;Join Mastodon/a/td/tr/thead/table&#xD;&#xA;center&#xD;&#xA;AI statement : b Consent is NOT granted to use the content of this blog for the purposes of AI training or similar activity.  Consent CANNOT be assumed, it has to be granted. /b&#xD;&#xA;/center&#xD;&#xA;&#xD;&#xA;a href=&#34;https://liberapay.com/PaulSutton/donate&#34;img alt=&#34;Donate using Liberapay&#34; src=&#34;https://liberapay.com/assets/widgets/donate.svg&#34;/a&#xD;&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p>CyberSecurity part 2 Supplemental</p>

<p>As this series is designed to run over the next few weeks, with a post each day. The following provides a list as to all the posts that are coming up.</p>

<p><a href="https://personaljournal.ca/paulsutton/cybersecurity-part-3" rel="nofollow">CyberSecurity part 3</a> – BASH Basics 1
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-4" rel="nofollow">CyberSecurity part 4</a> – BASH Basics 2
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-5" rel="nofollow">CyberSecurity part 5</a> – BASH Basics 3
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-6" rel="nofollow">CyberSecurity part 6</a> – BASH Basics 4
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-7" rel="nofollow">CyberSecurity part 7</a> – BASH Basics 5
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-8" rel="nofollow">CyberSecurity part 8</a> – BASH Basics 6
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-9" rel="nofollow">CyberSecurity part 9</a> – BASH Basics 7
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-10" rel="nofollow">CyberSecurity part 10</a> – BASH Basics 8
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-10-1" rel="nofollow">CyberSecurity part 10-1</a>
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-11" rel="nofollow">CyberSecurity part 11</a> – Nano Editor
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-12" rel="nofollow">CyberSecurity part 12</a> – Shell Scripting
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-13" rel="nofollow">CyberSecurity part 13</a> – Sed,Grep &amp; Cron
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-14" rel="nofollow">CyberSecurity part 14</a> – System D Bsics
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-15" rel="nofollow">CyberSecurity part 15</a> – Networking Basics
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-16" rel="nofollow">CyberSecurity part 16</a>– Day off- A few useful links
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-17" rel="nofollow">CyberSecurity part 17</a> – OpenSSh
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-18" rel="nofollow">CyberSecurity part 18</a> – Git &amp; Github
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-19" rel="nofollow">CyberSecurity part 19</a> – Virtual Machines
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-20" rel="nofollow">CyberSecurity part 20</a> – Computer Misuse Act
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-21" rel="nofollow">CyberSecurity part 21</a> – Python Intro
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-22" rel="nofollow">CyberSecurity part 22</a> – Pen testing tools
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-23" rel="nofollow">CyberSecurity part 23</a> – CyberSecurity Courses
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-24" rel="nofollow">CyberSecurity part 24</a> – Functional Programming in Coq
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-25" rel="nofollow">CyberSecurity-part-25</a> – Open Source vs Free Software
<a href="https://personaljournal.ca/paulsutton/cybersecurity-part-26" rel="nofollow">CyberSecurity-part-26</a> – Self hosting</p>

<p><strong>Tags</strong></p>

<p><a href="/paulsutton/tag:CyberSecurity" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">CyberSecurity</span></a>,<a href="/paulsutton/tag:PostIndex" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">PostIndex</span></a></p>

<hr>

<p><table>
<thead>
<tr><td><a href="https://qoto.org/@zleap" rel="nofollow">Mastodon</a></td>
<td><a href="https://wiki.ircnow.org/?n=Shelllabs.Intro" rel="nofollow">ShellLabs</td>
<td><a href="https://joinmastodon.org/" rel="nofollow">Join Mastodon</a></td></tr></thead></table>

AI statement : <b> Consent is NOT granted to use the content of this blog for the purposes of AI training or similar activity.  Consent CANNOT be assumed, it has to be granted. </b>
</p>

<p><a href="https://liberapay.com/PaulSutton/donate" rel="nofollow"><img alt="Donate using Liberapay" src="https://liberapay.com/assets/widgets/donate.svg"></a></p>
]]></content:encoded>
      <guid>https://personaljournal.ca/paulsutton/cybersecurity-part-2-supplemental</guid>
      <pubDate>Tue, 03 May 2022 20:02:21 +0000</pubDate>
    </item>
  </channel>
</rss>