<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Website Style</title>
	<atom:link href="https://blog.websitestyle.com/index.php/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.websitestyle.com</link>
	<description>Technology talk from behind the scenes</description>
	<lastBuildDate>Sun, 19 Feb 2017 19:46:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.6</generator>
<site xmlns="com-wordpress:feed-additions:1">1773087</site>	<item>
		<title>What is EXIF Data and How to Remove it from Your Photos?</title>
		<link>https://blog.websitestyle.com/index.php/2015/02/07/what-is-exif-data-and-how-to-remove-it-from-your-photos/</link>
					<comments>https://blog.websitestyle.com/index.php/2015/02/07/what-is-exif-data-and-how-to-remove-it-from-your-photos/#respond</comments>
		
		<dc:creator><![CDATA[Nicole Hernandez]]></dc:creator>
		<pubDate>Sun, 08 Feb 2015 05:58:25 +0000</pubDate>
				<category><![CDATA[Random Stuff]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[Exif Data]]></category>
		<category><![CDATA[Exif Metadata]]></category>
		<category><![CDATA[Image File]]></category>
		<category><![CDATA[Metadata From]]></category>
		<category><![CDATA[Windows Explorer]]></category>
		<guid isPermaLink="false">http://blog.websitestyle.com/?p=1208</guid>

					<description><![CDATA[EXIF stands for Exchangeable Image File, and the data provided can be stored in JPEG, RAW and TIFF image file formats. EXIF contains a ton&#8230;]]></description>
		
					<wfw:commentRss>https://blog.websitestyle.com/index.php/2015/02/07/what-is-exif-data-and-how-to-remove-it-from-your-photos/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1208</post-id>	</item>
		<item>
		<title>How to Secure Your Wireless Home Network</title>
		<link>https://blog.websitestyle.com/index.php/2015/02/04/how-to-secure-your-wireless-home-network/</link>
					<comments>https://blog.websitestyle.com/index.php/2015/02/04/how-to-secure-your-wireless-home-network/#respond</comments>
		
		<dc:creator><![CDATA[Nicole Hernandez]]></dc:creator>
		<pubDate>Thu, 05 Feb 2015 05:46:51 +0000</pubDate>
				<category><![CDATA[Networks]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[configure]]></category>
		<category><![CDATA[home]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[wireless]]></category>
		<guid isPermaLink="false">http://blog.websitestyle.com/?p=1204</guid>

					<description><![CDATA[It is very important to take the proper security measures for the safety of your wireless network. Doing this is the only way to avoid&#8230;]]></description>
		
					<wfw:commentRss>https://blog.websitestyle.com/index.php/2015/02/04/how-to-secure-your-wireless-home-network/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1204</post-id>	</item>
		<item>
		<title>What Role do Proxy Tools Play?</title>
		<link>https://blog.websitestyle.com/index.php/2015/02/01/what-role-do-proxy-tools-play/</link>
					<comments>https://blog.websitestyle.com/index.php/2015/02/01/what-role-do-proxy-tools-play/#respond</comments>
		
		<dc:creator><![CDATA[Nicole Hernandez]]></dc:creator>
		<pubDate>Mon, 02 Feb 2015 05:41:28 +0000</pubDate>
				<category><![CDATA[Apps]]></category>
		<category><![CDATA[Networks]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ip address]]></category>
		<category><![CDATA[masking]]></category>
		<category><![CDATA[proxy server]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://blog.websitestyle.com/?p=1202</guid>

					<description><![CDATA[Proxy tools are the means to enhance your device security as well as usability without letting others know your device&#8217;s IP address. They are the&#8230;]]></description>
		
					<wfw:commentRss>https://blog.websitestyle.com/index.php/2015/02/01/what-role-do-proxy-tools-play/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1202</post-id>	</item>
		<item>
		<title>The Advent of RFID Technology in Aviation Sector</title>
		<link>https://blog.websitestyle.com/index.php/2015/01/26/the-advent-of-rfid-technology-in-aviation-sector/</link>
					<comments>https://blog.websitestyle.com/index.php/2015/01/26/the-advent-of-rfid-technology-in-aviation-sector/#respond</comments>
		
		<dc:creator><![CDATA[Nicole Hernandez]]></dc:creator>
		<pubDate>Tue, 27 Jan 2015 05:53:33 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Random Stuff]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[airplanes]]></category>
		<category><![CDATA[information systems]]></category>
		<category><![CDATA[rfid]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">http://blog.websitestyle.com/?p=1206</guid>

					<description><![CDATA[Modern aviation is the complete realization of RFID. As a passenger, when you board a flight from Frankfurt to New York, your thoughts may roam&#8230;]]></description>
		
					<wfw:commentRss>https://blog.websitestyle.com/index.php/2015/01/26/the-advent-of-rfid-technology-in-aviation-sector/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1206</post-id>	</item>
		<item>
		<title>XML DTDs Vs XML Schema</title>
		<link>https://blog.websitestyle.com/index.php/2015/01/23/xml-dtds-vs-xml-schema/</link>
					<comments>https://blog.websitestyle.com/index.php/2015/01/23/xml-dtds-vs-xml-schema/#respond</comments>
		
		<dc:creator><![CDATA[Nicole Hernandez]]></dc:creator>
		<pubDate>Sat, 24 Jan 2015 05:07:01 +0000</pubDate>
				<category><![CDATA[(X)HTML]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Languages]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[dtd]]></category>
		<category><![CDATA[xml]]></category>
		<guid isPermaLink="false">http://blog.websitestyle.com/?p=1195</guid>

					<description><![CDATA[XML is incredibly versatile and great for storing data and transporting it across systems. You can create XML easily enough using a plain text editor.&#8230;]]></description>
		
					<wfw:commentRss>https://blog.websitestyle.com/index.php/2015/01/23/xml-dtds-vs-xml-schema/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1195</post-id>	</item>
		<item>
		<title>All about Internet Security Software</title>
		<link>https://blog.websitestyle.com/index.php/2015/01/20/all-about-internet-security-software/</link>
					<comments>https://blog.websitestyle.com/index.php/2015/01/20/all-about-internet-security-software/#respond</comments>
		
		<dc:creator><![CDATA[Nicole Hernandez]]></dc:creator>
		<pubDate>Wed, 21 Jan 2015 05:27:32 +0000</pubDate>
				<category><![CDATA[Apps]]></category>
		<category><![CDATA[Networks]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">http://blog.websitestyle.com/?p=1199</guid>

					<description><![CDATA[It is true that the internet has brought ease to our lives, but it has brought danger for us as well. The cyberspace is now&#8230;]]></description>
		
					<wfw:commentRss>https://blog.websitestyle.com/index.php/2015/01/20/all-about-internet-security-software/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1199</post-id>	</item>
		<item>
		<title>Difference Between Finisar 1000BASE-T FCxx-8520 and 8521-3 SFPs</title>
		<link>https://blog.websitestyle.com/index.php/2015/01/17/difference-between-finisar-1000base-t-fcxx-8520-and-8521-3-sfps/</link>
					<comments>https://blog.websitestyle.com/index.php/2015/01/17/difference-between-finisar-1000base-t-fcxx-8520-and-8521-3-sfps/#comments</comments>
		
		<dc:creator><![CDATA[Nicole Hernandez]]></dc:creator>
		<pubDate>Sun, 18 Jan 2015 04:52:37 +0000</pubDate>
				<category><![CDATA[Networks]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[ethernet]]></category>
		<category><![CDATA[finisar]]></category>
		<category><![CDATA[sfp]]></category>
		<category><![CDATA[transceivers]]></category>
		<guid isPermaLink="false">http://blog.websitestyle.com/?p=1191</guid>

					<description><![CDATA[This article will discuss the difference between Finisar 1000BASE-T FCxx-8520/8521-3 SFPs. In addition, with the increasing demands on compatible SFPs, we highly recommend an excellent&#8230;]]></description>
		
					<wfw:commentRss>https://blog.websitestyle.com/index.php/2015/01/17/difference-between-finisar-1000base-t-fcxx-8520-and-8521-3-sfps/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1191</post-id>	</item>
		<item>
		<title>The Prominence of Campus Management Systems</title>
		<link>https://blog.websitestyle.com/index.php/2015/01/14/the-prominence-of-campus-management-systems/</link>
					<comments>https://blog.websitestyle.com/index.php/2015/01/14/the-prominence-of-campus-management-systems/#respond</comments>
		
		<dc:creator><![CDATA[Nicole Hernandez]]></dc:creator>
		<pubDate>Thu, 15 Jan 2015 04:20:19 +0000</pubDate>
				<category><![CDATA[Apps]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Templates]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[administration]]></category>
		<category><![CDATA[campus management system]]></category>
		<category><![CDATA[cms]]></category>
		<category><![CDATA[erp]]></category>
		<category><![CDATA[school]]></category>
		<category><![CDATA[software]]></category>
		<guid isPermaLink="false">http://blog.websitestyle.com/?p=1186</guid>

					<description><![CDATA[The development of technology affects the education system. It provides the best facilities, interactive platform for the student and a practical approach to teaching. Campus&#8230;]]></description>
		
					<wfw:commentRss>https://blog.websitestyle.com/index.php/2015/01/14/the-prominence-of-campus-management-systems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1186</post-id>	</item>
		<item>
		<title>Overview of Extreme Networks SFP Modules Interface Types</title>
		<link>https://blog.websitestyle.com/index.php/2015/01/11/overview-of-extreme-networks-sfp-modules-interface-types/</link>
					<comments>https://blog.websitestyle.com/index.php/2015/01/11/overview-of-extreme-networks-sfp-modules-interface-types/#respond</comments>
		
		<dc:creator><![CDATA[Nicole Hernandez]]></dc:creator>
		<pubDate>Sun, 11 Jan 2015 16:42:00 +0000</pubDate>
				<category><![CDATA[Networks]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[bi-directional]]></category>
		<category><![CDATA[extreme networks]]></category>
		<category><![CDATA[lc connectors]]></category>
		<category><![CDATA[network switches]]></category>
		<category><![CDATA[sfp interfaces]]></category>
		<guid isPermaLink="false">http://blog.websitestyle.com/?p=1139</guid>

					<description><![CDATA[The following paper covers the SFP modules of Extreme Networks. It introduces the interface types of Extreme Networks SFP modules. In addition, an alternative solution&#8230;]]></description>
		
					<wfw:commentRss>https://blog.websitestyle.com/index.php/2015/01/11/overview-of-extreme-networks-sfp-modules-interface-types/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1139</post-id>	</item>
		<item>
		<title>How to use Remote Desktop Software</title>
		<link>https://blog.websitestyle.com/index.php/2015/01/08/how-to-use-remote-desktop-software/</link>
					<comments>https://blog.websitestyle.com/index.php/2015/01/08/how-to-use-remote-desktop-software/#comments</comments>
		
		<dc:creator><![CDATA[Nicole Hernandez]]></dc:creator>
		<pubDate>Thu, 08 Jan 2015 21:42:29 +0000</pubDate>
				<category><![CDATA[Apps]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[Connect Remotely]]></category>
		<category><![CDATA[Desktop Software]]></category>
		<category><![CDATA[Other Computer]]></category>
		<category><![CDATA[remote access]]></category>
		<category><![CDATA[Remote Desktop]]></category>
		<guid isPermaLink="false">http://blog.websitestyle.com/?p=1132</guid>

					<description><![CDATA[Remote access to another computer is very important to large and small businesses in today&#8217;s busy world where it is not always possible to be&#8230;]]></description>
		
					<wfw:commentRss>https://blog.websitestyle.com/index.php/2015/01/08/how-to-use-remote-desktop-software/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1132</post-id>	</item>
	</channel>
</rss>
