<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="http://www.infocrime.com.br/wp-content/plugins/google-sitemap-generator/sitemap.xsl"?><!-- generator="wordpress/3.5.1" -->
<!-- sitemap-generator-url="http://www.arnebrachhold.de" sitemap-generator-version="3.2.9" -->
<!-- generated-on="01/02/2013 02:48" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">	<url>
		<loc>http://www.infocrime.com.br/</loc>
		<lastmod>2013-02-01T02:47:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/06/rastreamento-de-e-mails-final/</loc>
		<lastmod>2013-02-01T02:47:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2013/01/analise-de-malware-parte-ii-identificacao/</loc>
		<lastmod>2013-01-27T23:00:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/10/analise-de-malware-parte-i/</loc>
		<lastmod>2013-01-27T20:30:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/pericia-de-malwares/</loc>
		<lastmod>2013-01-27T20:29:35+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/blog/</loc>
		<lastmod>2013-01-17T03:12:20+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/02/rastreamento-de-e-mails-parte-i-origem-e-autoria/</loc>
		<lastmod>2012-12-02T16:01:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/glossario/</loc>
		<lastmod>2012-11-30T21:15:51+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/11/mac-nao-pega-virus/</loc>
		<lastmod>2012-11-28T20:45:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/01/duplicacao-pericial-parte-iii-ferramentas-de-imagem/</loc>
		<lastmod>2012-11-20T00:09:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/03/rastreamento-de-e-mails-parte-ii-componentes-da-mensagem/</loc>
		<lastmod>2012-11-20T00:06:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/03/rastreamento-de-e-mails-parte-iii-composicao-e-envio/</loc>
		<lastmod>2012-11-20T00:04:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/03/rastreamento-de-e-mails-parte-iv-campos-de-cabecalho/</loc>
		<lastmod>2012-11-20T00:04:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/04/rastreamento-de-e-mails-parte-v-campos-de-rastreio/</loc>
		<lastmod>2012-11-20T00:03:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/08/utilizando-o-liveview/</loc>
		<lastmod>2012-11-13T23:51:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/04/extraindo-cabecalhos-de-e-mail-2/</loc>
		<lastmod>2012-11-13T23:48:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/04/a-timeline-e-metadados-de-data-e-hora/</loc>
		<lastmod>2012-11-13T23:47:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/11/lei-carolina-dieckmann/</loc>
		<lastmod>2012-11-09T01:45:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/03/registro-do-windows-parte-iii-arquivos-do-registro/</loc>
		<lastmod>2012-11-09T00:18:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/06/marco-civil-da-internet/</loc>
		<lastmod>2012-11-03T21:20:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/07/o-que-e-computacao-forense/</loc>
		<lastmod>2012-11-02T23:57:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/09/duplicacao-pericial-parte-ii-bloqueio-de-escrita-atraves-do-linux-e-do-windows/</loc>
		<lastmod>2012-11-02T23:40:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/06/cuidados-com-valores-de-data-e-hora/</loc>
		<lastmod>2012-11-02T20:14:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/09/analise-de-registro-do-windows-introducao-parte-i/</loc>
		<lastmod>2012-11-02T20:12:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/08/duplicacao-pericial-final-dicas/</loc>
		<lastmod>2012-11-02T19:22:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/time-zones/</loc>
		<lastmod>2012-10-29T18:46:20+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/107-2/</loc>
		<lastmod>2012-10-21T13:13:05+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/07/terminologia-pericial/</loc>
		<lastmod>2012-10-21T04:43:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/09/nova-interface/</loc>
		<lastmod>2012-10-21T04:43:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/07/cadeia-de-custodia/</loc>
		<lastmod>2012-10-21T04:42:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/12/registro-do-windows-parte-ii-caracterizando-a-evidencia/</loc>
		<lastmod>2012-10-21T04:39:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/07/duplicacao-pericial-parte-i-bloqueio-de-escrita/</loc>
		<lastmod>2012-10-21T04:32:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/02/duplicacao-pericial-parte-iv-teste-de-desempenho/</loc>
		<lastmod>2012-10-21T04:30:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/03/procedimentos-para-a-computacao-forense-parte-iv/</loc>
		<lastmod>2012-10-21T04:27:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/01/o-que-e-denist/</loc>
		<lastmod>2012-10-21T04:11:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/10/cibercrime-produz-16-milhoes-em-prejuizos/</loc>
		<lastmod>2012-10-08T16:22:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/09/sua-vida-esta-na-internet/</loc>
		<lastmod>2012-09-30T14:13:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/05/computacao-forense-policia-tecnica-da-bahia/</loc>
		<lastmod>2012-09-30T14:06:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/06/computacao-forense-3%c2%aa-edicao/</loc>
		<lastmod>2012-09-29T14:47:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/12/retornando/</loc>
		<lastmod>2012-09-29T14:47:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/08/analise-forense-de-gps/</loc>
		<lastmod>2012-09-21T10:34:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/06/procedimentos-para-a-computacao-forense-final/</loc>
		<lastmod>2012-09-21T02:22:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/12/procedimentos-para-a-computacao-forense-parte-iii/</loc>
		<lastmod>2012-09-21T02:21:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/08/procedimentos-para-a-computacao-forense-parte-ii/</loc>
		<lastmod>2012-09-21T02:20:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/02/procedimentos-para-a-computacao-forense-parte-i/</loc>
		<lastmod>2012-09-21T02:20:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/01/procedimentos-para-busca-e-apreensao/</loc>
		<lastmod>2012-09-21T02:19:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2011/08/se-o-computador-estiver-desligado-nao-ligue/</loc>
		<lastmod>2012-09-21T00:25:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/rastreamento-de-mensagens-de-correio-eletronico/</loc>
		<lastmod>2012-09-08T23:18:37+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/procedimentos-para-a-computacao-forense/</loc>
		<lastmod>2012-09-07T21:43:18+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/2012/03/cabecalhos-de-mensagens-do-webmail-da-oi/</loc>
		<lastmod>2012-04-01T20:05:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>http://www.infocrime.com.br/registro-do-windows/</loc>
		<lastmod>2012-03-02T19:57:40+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.6</priority>
	</url>
</urlset>