<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Notes on Introverted Bytes</title><link>https://introvertedbytes.com/categories/notes/</link><description>Recent content in Notes on Introverted Bytes</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Kasyap Girijan</copyright><lastBuildDate>Sat, 21 Sep 2024 23:00:00 +0530</lastBuildDate><atom:link href="https://introvertedbytes.com/categories/notes/index.xml" rel="self" type="application/rss+xml"/><item><title>Exploring TLS: Securing TCP Communication</title><link>https://introvertedbytes.com/security/notes/exploring-tls-securing-tcp-communication/</link><pubDate>Sat, 21 Sep 2024 23:00:00 +0530</pubDate><guid>https://introvertedbytes.com/security/notes/exploring-tls-securing-tcp-communication/</guid><description>An educational guide explaining how Transport Layer Security (TLS) works to encrypt and secure TCP network communications.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://introvertedbytes.com/security/notes/exploring-tls-securing-tcp-communication/featured.png"/></item><item><title>Demystifying Nmap Scans: A Deep Dive into Network Exploration</title><link>https://introvertedbytes.com/security/notes/demystifying-nmap-scans/</link><pubDate>Sun, 31 Mar 2024 23:00:00 +0530</pubDate><guid>https://introvertedbytes.com/security/notes/demystifying-nmap-scans/</guid><description>An in-depth look at Nmap scanning techniques, helping readers understand how to effectively map and analyze networks.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://introvertedbytes.com/security/notes/demystifying-nmap-scans/featured.png"/></item></channel></rss>