<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Jessica Arnwine</title>
    <description>The latest articles on DEV Community by Jessica Arnwine (@jessica_arnwine_cfg).</description>
    <link>https://dev.to/jessica_arnwine_cfg</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3455362%2Fff553482-8768-449c-872b-7704990797d8.png</url>
      <title>DEV Community: Jessica Arnwine</title>
      <link>https://dev.to/jessica_arnwine_cfg</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/jessica_arnwine_cfg"/>
    <language>en</language>
    <item>
      <title>AI-Enhanced Network Monitoring with Python: Detecting Anomalies Before They Become Threats</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Tue, 02 Sep 2025 01:12:06 +0000</pubDate>
      <link>https://dev.to/jessica_arnwine_cfg/ai-enhanced-network-monitoring-with-python-detecting-anomalies-before-they-become-threats-1686</link>
      <guid>https://dev.to/jessica_arnwine_cfg/ai-enhanced-network-monitoring-with-python-detecting-anomalies-before-they-become-threats-1686</guid>
      <description>&lt;p&gt;Cybersecurity isn’t just about scanning for open ports — it’s about identifying unusual patterns and potential threats before they cause damage. By combining Python with AI, you can build a monitoring system that detects anomalies, scores vulnerabilities, and automatically alerts your team. This project demonstrates advanced technical skill and practical application.&lt;/p&gt;

&lt;p&gt;Step 1: Preparing Your Environment&lt;/p&gt;

&lt;p&gt;You’ll need Python 3.x and a few key libraries for network scanning, data analysis, and machine learning:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;# Create a virtual environment
python3 -m venv ai-netmon
source ai-netmon/bin/activate  # Mac/Linux
ai-netmon\Scripts\activate     # Windows

# Install required packages
pip install python-nmap pandas scikit-learn matplotlib requests
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;python-nmap for scanning&lt;/p&gt;

&lt;p&gt;pandas for organizing scan data&lt;/p&gt;

&lt;p&gt;scikit-learn for anomaly detection&lt;/p&gt;

&lt;p&gt;matplotlib for visualization&lt;/p&gt;

&lt;p&gt;requests for sending alerts&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: Scanning the Network&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We start with the same scanning logic as before, but store the results in a DataFrame for AI processing:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import nmap
import pandas as pd

scanner = nmap.PortScanner()
scanner.scan('192.168.1.0/24', '22,80,443')

data = []
for host in scanner.all_hosts():
    for port in scanner[host]['tcp'].keys():
        data.append({
            'host': host,
            'port': port,
            'state': 1 if scanner[host]['tcp'][port]['state']=='open' else 0
        })

df = pd.DataFrame(data)
print(df.head())

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This creates a structured dataset ready for anomaly detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Detecting Anomalies with Isolation Forest&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The Isolation Forest algorithm is great for spotting unusual behavior, like unexpected open ports or rogue devices:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;from sklearn.ensemble import IsolationForest

# Train Isolation Forest on current network state
model = IsolationForest(contamination=0.1)  # ~10% of data considered anomalous
df['anomaly'] = model.fit_predict(df[['state']])

# Flag anomalies
anomalies = df[df['anomaly'] == -1]
print("Anomalous network activity detected:\n", anomalies)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This identifies ports or hosts behaving differently than usual, giving you early warnings before a security incident occurs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4: Visualization&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Visualizing anomalies helps your team quickly grasp the network’s health:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import matplotlib.pyplot as plt

plt.figure(figsize=(10,6))
plt.scatter(df['host'], df['port'], c=df['anomaly'], cmap='coolwarm', s=100)
plt.xlabel('Host')
plt.ylabel('Port')
plt.title('Network Anomalies Detection')
plt.colorbar(label='Anomaly (-1 = Anomalous)')
plt.show()
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Red dots represent anomalies&lt;/p&gt;

&lt;p&gt;Blue dots are normal activity&lt;/p&gt;

&lt;p&gt;This gives an intuitive, visual overview of your network.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5: Automated Alerts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Combine anomaly detection with Slack or email alerts:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import requests

webhook_url = 'https://hooks.slack.com/services/XXX/YYY/ZZZ'

for _, row in anomalies.iterrows():
    message = {
        'text': f"Alert: Anomaly detected on host {row['host']}, port {row['port']}!"
    }
    requests.post(webhook_url, json=message)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now your team receives instant notifications for unusual activity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 6: Scaling and Next Steps&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Once working, you can:&lt;/p&gt;

&lt;p&gt;Schedule scans with cron or Task Scheduler&lt;/p&gt;

&lt;p&gt;Integrate CVE databases to assign risk scores to anomalous ports&lt;/p&gt;

&lt;p&gt;Add more features like geolocation for external IPs or multi-network monitoring&lt;/p&gt;

&lt;p&gt;Train machine learning models over time to improve anomaly detection accuracy&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Takeaway&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This AI-enhanced network monitoring script demonstrates:&lt;/p&gt;

&lt;p&gt;Automated scanning and data collection&lt;/p&gt;

&lt;p&gt;Machine learning-based anomaly detection&lt;/p&gt;

&lt;p&gt;Visualization of network health&lt;/p&gt;

&lt;p&gt;Real-time alerting for critical issues&lt;/p&gt;

&lt;p&gt;It’s a strong portfolio project because it combines Python, cybersecurity, and AI, showing you can solve complex problems and create actionable solutions.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Pro Tip: Share the full notebook or repository publicly. Employers love seeing working code, visual outputs, and automated systems that solve real-world problems.&lt;/em&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Advanced Network Monitoring with Python: Detection, Scoring, and Visualization</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Tue, 02 Sep 2025 01:08:17 +0000</pubDate>
      <link>https://dev.to/jessica_arnwine_cfg/advanced-network-monitoring-with-python-detection-scoring-and-visualization-h40</link>
      <guid>https://dev.to/jessica_arnwine_cfg/advanced-network-monitoring-with-python-detection-scoring-and-visualization-h40</guid>
      <description>&lt;p&gt;Building on basic network scanning, we can enhance our Python scripts to detect new devices, score vulnerabilities, and even visualize network health. This demonstrates real-world skills in cybersecurity automation and data-driven problem solving.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: Detecting New Devices&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Tracking devices over time helps spot unexpected or rogue devices on your network. We can do this by maintaining a list of known hosts and comparing it with each new scan:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import nmap
import json

scanner = nmap.PortScanner()
scanner.scan('192.168.1.0/24', '22,80,443')

# Load known hosts from file
try:
    with open('known_hosts.json') as f:
        known_hosts = json.load(f)
except FileNotFoundError:
    known_hosts = []

current_hosts = scanner.all_hosts()
new_hosts = [host for host in current_hosts if host not in known_hosts]

if new_hosts:
    print("New devices detected:", new_hosts)

# Update known hosts file
with open('known_hosts.json', 'w') as f:
    json.dump(current_hosts, f)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This simple system flags any new host that wasn’t previously on your network, a first line of defense against unauthorized access.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: Vulnerability Scoring&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Not all open ports are equally dangerous. We can assign a risk score based on known vulnerabilities:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;risk_scores = {'22': 9, '80': 5, '443': 3}  # Example scoring

for host in scanner.all_hosts():
    for port in scanner[host]['tcp'].keys():
        state = scanner[host]['tcp'][port]['state']
        score = risk_scores.get(str(port), 1)  # Default low risk
        print(f'Host: {host}, Port: {port}, State: {state}, Risk Score: {score}')

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This approach gives you a quantitative view of network risks, helping prioritize remediation efforts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Visualization with Matplotlib&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Visualizing the network can make patterns or anomalies easier to spot:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import matplotlib.pyplot as plt

hosts = scanner.all_hosts()
scores = []

for host in hosts:
    total_score = sum(risk_scores.get(str(port), 1) 
                      for port in scanner[host]['tcp'].keys())
    scores.append(total_score)

plt.bar(hosts, scores, color='orange')
plt.xlabel('Host')
plt.ylabel('Vulnerability Score')
plt.title('Network Vulnerability Overview')
plt.show()
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now you can see which devices are most at risk at a glance. Visualization is especially useful for team presentations or reporting to management.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4: Automatic Alerts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Combine new device detection and vulnerability scoring to send alerts if thresholds are exceeded:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import requests

webhook_url = 'https://hooks.slack.com/services/XXX/YYY/ZZZ'

for i, host in enumerate(hosts):
    if scores[i] &amp;gt; 8 or host in new_hosts:
        message = {'text': f'Alert: Host {host} flagged! Risk Score: {scores[i]}'}
        requests.post(webhook_url, json=message)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This ensures your team receives immediate updates when significant events occur.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5: Scaling the Solution&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Once your script is working, you can:&lt;/p&gt;

&lt;p&gt;Schedule scans to run daily or hourly using cron (Linux) or Task Scheduler (Windows).&lt;/p&gt;

&lt;p&gt;Integrate with databases to store historical scan data for trend analysis.&lt;/p&gt;

&lt;p&gt;Add API integrations to cross-reference CVEs for ports/services detected.&lt;/p&gt;

&lt;p&gt;Use dashboards like Grafana or Plotly for interactive visualizations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Takeaway&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This advanced network monitoring project highlights:&lt;/p&gt;

&lt;p&gt;Automated detection of new devices&lt;/p&gt;

&lt;p&gt;Risk-based vulnerability scoring&lt;/p&gt;

&lt;p&gt;Visualization of network health&lt;/p&gt;

&lt;p&gt;Real-time alerting to Slack&lt;/p&gt;

&lt;p&gt;&lt;em&gt;By sharing these kinds of projects, you demonstrate both technical skill and practical problem-solving, which is exactly what employers and collaborators look for in cybersecurity and cloud security roles.&lt;/em&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Automating Network Monitoring with Python: A Hands-On Example</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Tue, 02 Sep 2025 01:05:34 +0000</pubDate>
      <link>https://dev.to/jessica_arnwine_cfg/automating-network-monitoring-with-python-a-hands-on-example-53ba</link>
      <guid>https://dev.to/jessica_arnwine_cfg/automating-network-monitoring-with-python-a-hands-on-example-53ba</guid>
      <description>&lt;p&gt;Network monitoring is a critical part of cybersecurity. Knowing which hosts are up, which ports are open, and when unexpected changes occur can prevent security incidents before they escalate. With Python, you can create scripts that perform scans, log results, and even send notifications — all with minimal tools.&lt;/p&gt;

&lt;p&gt;This post will walk through a practical example, including code snippets, to demonstrate real-world cybersecurity automation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: Setting Up the Environment&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;First, make sure you have Python 3.x installed. Then, set up a virtual environment and install the necessary packages:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;# Create a virtual environment
python3 -m venv netmon-env

# Activate the environment (Mac/Linux)
source netmon-env/bin/activate

# Activate the environment (Windows)
netmon-env\Scripts\activate

# Install required packages
pip install python-nmap requests

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 2: Scanning Hosts and Ports&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We’ll use the python-nmap module to scan hosts on our local network for common open ports:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import nmap

# Initialize scanner
scanner = nmap.PortScanner()

# Scan a target IP range for ports 22, 80, 443
scanner.scan('192.168.1.0/24', '22,80,443')

# Print results
for host in scanner.all_hosts():
    print(f'Host: {host}, State: {scanner[host].state()}')
    for proto in scanner[host].all_protocols():
        print(f'Protocol: {proto}')
        ports = scanner[host][proto].keys()
        for port in ports:
            print(f'Port {port}: {scanner[host][proto][port]["state"]}')


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This simple script allows you to quickly see which hosts are live and which ports are open, giving you insight into potential vulnerabilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Logging Results&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Keeping logs of your scans is essential for tracking changes over time. Here’s how you can write scan results to a CSV file:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import csv

with open('network_log.csv', 'w', newline='') as file:
    writer = csv.writer(file)
    writer.writerow(['Host', 'Protocol', 'Port', 'State'])

    for host in scanner.all_hosts():
        for proto in scanner[host].all_protocols():
            ports = scanner[host][proto].keys()
            for port in ports:
                writer.writerow([host, proto, port, scanner[host][proto][port]['state']])
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now you have a persistent record of your network state that you can review or share with your team.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4: Sending Alerts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Automation becomes powerful when your script can notify you of unusual events. Here’s an example of sending a Slack alert if a critical port (like SSH 22) is unexpectedly open:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import requests

webhook_url = 'https://hooks.slack.com/services/XXX/YYY/ZZZ'

for host in scanner.all_hosts():
    if scanner[host].has_tcp(22) and scanner[host]['tcp'][22]['state'] == 'open':
        message = {'text': f'Alert: SSH port open on host {host}!'}
        requests.post(webhook_url, json=message)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;With this setup, you’ll be instantly notified of potential risks — an essential feature for any security professional.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5: Putting It All Together&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You now have the building blocks for a basic network monitoring tool:&lt;/p&gt;

&lt;p&gt;Scan your network for live hosts and open ports.&lt;/p&gt;

&lt;p&gt;Log results for historical tracking.&lt;/p&gt;

&lt;p&gt;Send alerts for critical issues.&lt;/p&gt;

&lt;p&gt;From here, you can expand the script with:&lt;/p&gt;

&lt;p&gt;Scheduled scans using cron or Windows Task Scheduler&lt;/p&gt;

&lt;p&gt;More detailed vulnerability checks using additional modules&lt;/p&gt;

&lt;p&gt;Email notifications with smtplib&lt;/p&gt;

&lt;p&gt;Integration with dashboards like Grafana for visualization&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Takeaway&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This project demonstrates how Python can turn a repetitive, manual security task into an automated workflow. Even at a beginner-intermediate level, these skills showcase your technical ability, problem-solving mindset, and practical approach to cybersecurity.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Tip: Including multiple working code snippets like this in your portfolio shows prospective employers or collaborators that you can build real-world tools, not just talk about theory.&lt;/em&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>My Journey in Cybersecurity, Cloud, and Data</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Mon, 01 Sep 2025 18:14:53 +0000</pubDate>
      <link>https://dev.to/jessica_arnwine_cfg/my-journey-in-cybersecurity-cloud-and-data-2jod</link>
      <guid>https://dev.to/jessica_arnwine_cfg/my-journey-in-cybersecurity-cloud-and-data-2jod</guid>
      <description>&lt;p&gt;For me, this isn’t just a career path but it is a passion. I’m constantly building projects, learning advanced security practices, and documenting the journey along the way. My mission is simple: to make technology knowledge accessible, practical, and engaging for anyone who wants to grow.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cybersecurity: Protecting What Matters Most&lt;/strong&gt;&lt;br&gt;
Cybersecurity isn’t just about firewalls and antivirus software, it’s about resilience. Threats evolve daily, from phishing emails to ransomware attacks, and the best defense is layered knowledge. I focus on practical security: applying real-world solutions that can protect businesses, families, and communities. Sharing these practices makes technology feel less intimidating and more empowering.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud Technologies: The Future of Innovation&lt;/strong&gt;&lt;br&gt;
The cloud is no longer “new.” It’s the foundation of modern business. From scalability to cost efficiency, cloud computing transforms how we store, share, and secure information. But it also introduces new challenges, misconfigurations, access controls, and compliance concerns. By building projects in the cloud, I’m learning how to optimize security while unlocking the full potential of these platforms.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data-Driven Problem Solving: From Insight to Action&lt;/strong&gt;&lt;br&gt;
At the heart of every major decision is data. But data by itself isn’t powerful, it’s what you do with it that matters. I approach problem solving by using data to guide decisions, uncover patterns, and build smarter systems. Whether it’s identifying unusual network activity or streamlining processes, data is the compass that points the way forward.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why I Share the Journey&lt;/strong&gt;&lt;br&gt;
One thing I’ve noticed is that tech knowledge often feels locked away behind jargon and gatekeeping. I want to break that barrier. By documenting my learning process, project builds, and lessons from the field, I aim to create a roadmap that others can follow, whether they’re just starting out or looking to advance.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Technology should feel like an open door, not a closed one.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Goal Ahead&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;&lt;em&gt;My ultimate goal is to keep growing while helping others grow alongside me. By making complex ideas simple, practical, and engaging, I hope to inspire more people to see technology as something they can master. Cybersecurity, cloud, and data are the future and the more people we empower with this knowledge, the safer and smarter that future will be.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>wecoded</category>
      <category>womenintech</category>
      <category>workplace</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>My Tech Stack</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Mon, 01 Sep 2025 18:12:58 +0000</pubDate>
      <link>https://dev.to/jessica_arnwine_cfg/my-tech-stack-3ne</link>
      <guid>https://dev.to/jessica_arnwine_cfg/my-tech-stack-3ne</guid>
      <description>&lt;p&gt;When it comes to technology, I believe in using tools that are not only powerful but also practical for real-world problem solving. My stack is built around security, efficiency, and flexibility, helping me learn, build, and continuously push boundaries. Here’s what I use and why:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;br&gt;
At the core of my workflow is Linux. It gives me the freedom to customize, automate, and truly understand what’s happening under the hood. From server management to scripting, Linux is the foundation of my security and development environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Python&lt;/strong&gt;&lt;br&gt;
Python is my go-to language. Its versatility makes it ideal for automation, penetration testing, data analysis, and security scripting. Whether I’m building custom tools or analyzing data, Python allows me to turn ideas into reality quickly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud Security&lt;/strong&gt;&lt;br&gt;
With organizations moving workloads to the cloud, security has to evolve. I’m focused on understanding identity management, zero-trust principles, and securing workloads in platforms like AWS and Azure. Cloud security isn’t just about defense, it is about enabling businesses to innovate safely.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Vulnerability Management&lt;/strong&gt;&lt;br&gt;
Staying ahead of threats means constantly identifying, assessing, and remediating risks. I use vulnerability management tools and frameworks to monitor systems and reduce the attack surface. It’s not just about finding issues, it is about fixing them strategically.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Penetration Testing&lt;/strong&gt;&lt;br&gt;
To truly understand security, you have to think like an attacker. Pen testing allows me to explore weaknesses, exploit them in a controlled way, and then apply those lessons to strengthen defenses. It’s a blend of creativity, problem-solving, and technical skill.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My Philosophy&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Each piece of my stack supports the other. Linux provides control, Python builds automation, cloud security protects evolving infrastructures, vulnerability management identifies risks, and pen testing challenges me to think critically. Together, they form a toolkit that’s not just about technology, but about building resilience.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>womenintech</category>
      <category>wecoded</category>
    </item>
    <item>
      <title>What I Am Available For</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Mon, 01 Sep 2025 18:11:21 +0000</pubDate>
      <link>https://dev.to/jessica_arnwine_cfg/what-i-am-available-for-4c04</link>
      <guid>https://dev.to/jessica_arnwine_cfg/what-i-am-available-for-4c04</guid>
      <description>&lt;p&gt;Technology is more than a career path for me, it’s a space where curiosity meets problem-solving. I thrive at the intersection of cybersecurity, cloud technologies, and data-driven decision-making. Here’s what I bring to the table and what I’m available to collaborate on:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Exploring Cloud &amp;amp; AI&lt;/strong&gt;&lt;br&gt;
I’m deeply engaged in exploring the evolving landscape of cloud computing and artificial intelligence. From understanding emerging tools to testing real-world applications, I’m driven to turn complex concepts into clear, practical solutions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Turning Curiosity Into Code&lt;/strong&gt;&lt;br&gt;
For me, coding isn’t just about syntax, it’s about building answers to real problems. I enjoy experimenting with projects that push boundaries, whether that’s automating workflows, creating data-driven insights, or improving system security. Curiosity fuels my learning, and every project is an opportunity to discover something new.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cybersecurity &amp;amp; Cloud Security Analyst&lt;/strong&gt;&lt;br&gt;
Security is at the heart of my work. I specialize in protecting data and infrastructure in cloud environments by applying advanced security practices, monitoring systems, and designing defenses against evolving threats. I aim to make organizations more resilient while keeping security approaches accessible and understandable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Threat Detection &amp;amp; Response&lt;/strong&gt;&lt;br&gt;
Cyber threats evolve daily, and so must our defenses. I focus on detecting vulnerabilities early, analyzing potential threats, and implementing rapid response strategies that minimize risk. My goal is not only to respond to threats but to stay ahead of them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Penetration Testing&lt;/strong&gt;&lt;br&gt;
I take a hands-on approach to security by simulating real-world attacks through penetration testing. This allows me to uncover weaknesses before malicious actors can exploit them and provide clear, actionable steps for strengthening defenses.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Vulnerability Management&lt;/strong&gt;&lt;br&gt;
Security doesn’t stop at finding problems, it’s about solving them. I work on identifying, prioritizing, and addressing vulnerabilities in systems, ensuring organizations maintain strong, ongoing protection against risks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why This Matters&lt;/strong&gt;&lt;br&gt;
The digital world runs on trust, and every system, application, and piece of data needs to be safeguarded. My focus is on making cybersecurity knowledge and practices accessible, practical, and effective—helping individuals and organizations grow with confidence in a secure digital environment.&lt;/p&gt;

&lt;p&gt;Whether it’s collaborating on cloud security initiatives, testing defenses, or exploring AI-driven solutions, I’m available to work on projects that challenge the status quo and build safer, smarter systems.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Above all&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;&lt;strong&gt;I am available for all things God and Jesus Christ, letting my faith guide my work, my learning, and my service to others.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>programming</category>
      <category>webdev</category>
      <category>javascript</category>
      <category>ai</category>
    </item>
    <item>
      <title>Faith in a Decentralized World</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Mon, 25 Aug 2025 17:19:13 +0000</pubDate>
      <link>https://dev.to/jessica_arnwine_cfg/faith-in-a-decentralized-world-4p7m</link>
      <guid>https://dev.to/jessica_arnwine_cfg/faith-in-a-decentralized-world-4p7m</guid>
      <description>&lt;p&gt;Lessons from Atproto, Cybersecurity, and Trust in God. Technology is shifting again. With Atproto, a decentralized protocol behind platforms like Bluesky, the goal is to give people back control, over identity, data, and digital communities. It’s part of a bigger movement toward transparency and freedom online.&lt;/p&gt;

&lt;p&gt;In many ways, it mirrors what wealth and faith already teach us:&lt;/p&gt;

&lt;p&gt;Cybersecurity reminds us to guard what matters most.&lt;/p&gt;

&lt;p&gt;Wealth management teaches stewardship and wise planning.&lt;/p&gt;

&lt;p&gt;Faith calls us to build on a foundation that cannot be shaken.&lt;/p&gt;

&lt;p&gt;Decentralization promises independence, but independence without wisdom can still lead to chaos. That’s why we need discernment — the same way Scripture calls us to test every spirit and every foundation.&lt;/p&gt;

&lt;p&gt;Atproto shows us that control is valuable, but true security isn’t in protocols, passwords, or platforms. It’s in God. He is the ultimate anchor, the one system that never crashes and never corrupts.&lt;/p&gt;

&lt;p&gt;When we align our digital lives, financial plans, and daily choices with His wisdom, we gain not just freedom, but peace.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>javascript</category>
      <category>ai</category>
    </item>
    <item>
      <title>Strength in the Storm</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Mon, 25 Aug 2025 17:11:53 +0000</pubDate>
      <link>https://dev.to/jessica_arnwine_cfg/strength-in-the-storm-2070</link>
      <guid>https://dev.to/jessica_arnwine_cfg/strength-in-the-storm-2070</guid>
      <description>&lt;p&gt;Storms come in many forms — a cyberattack that steals peace of mind, an unexpected bill that strains finances, or a season of doubt that tests faith. But storms also reveal where our foundation lies.&lt;/p&gt;

&lt;p&gt;Cyber teaches us vigilance. Wealth teaches us stewardship. Faith teaches us trust. Together, they form an anchor that holds steady when the winds rise.&lt;/p&gt;

&lt;p&gt;In a digital world, protecting data matters. In a financial world, managing money matters. But in every world, faith matters most, because it gives us strength when everything else feels uncertain.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>productivity</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Faith and Cyber: Protecting Today, Trusting Tomorrow</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Mon, 25 Aug 2025 16:29:24 +0000</pubDate>
      <link>https://dev.to/jessica_arnwine_cfg/faith-and-cyber-protecting-today-trusting-tomorrow-2jbh</link>
      <guid>https://dev.to/jessica_arnwine_cfg/faith-and-cyber-protecting-today-trusting-tomorrow-2jbh</guid>
      <description>&lt;p&gt;In cybersecurity, we protect systems, guard data, and anticipate threats but no firewall or encryption can replace the guidance of God. Just as we secure our digital lives, we must anchor ourselves in faith to navigate uncertainty in life.&lt;/p&gt;

&lt;p&gt;Trusting God gives clarity when decisions feel overwhelming, resilience when challenges arise, and wisdom to see opportunities where others see risk. Faith is the ultimate guide, leading us toward a brighter, more secure future—not just in technology, but in life, relationships, and purpose.&lt;/p&gt;

&lt;p&gt;Just as a well-protected network thrives, a life led by God prospers. Secure your heart, strengthen your faith, and trust Him to light the path ahead.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>python</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Faith, Family, Cyber, and Wealth: Protecting What Matters Most</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Mon, 25 Aug 2025 16:27:11 +0000</pubDate>
      <link>https://dev.to/jessica_arnwine_cfg/faith-family-cyber-and-wealth-protecting-what-matters-most-5g6j</link>
      <guid>https://dev.to/jessica_arnwine_cfg/faith-family-cyber-and-wealth-protecting-what-matters-most-5g6j</guid>
      <description>&lt;p&gt;In a world that moves faster every day, the things we value our faith, our families, our finances, and even our digital lives need intentional care.&lt;/p&gt;

&lt;p&gt;Faith keeps us grounded. Without God at the center, success can feel empty, and security can feel fragile. He guides our decisions, giving clarity in uncertainty.&lt;/p&gt;

&lt;p&gt;Family is our first investment. The time, love, and lessons we pour into our households shape generations. Protecting family isn’t just about shelter it’s about nurturing trust, values, and connection.&lt;/p&gt;

&lt;p&gt;Cybersecurity is more than a job; it’s a necessity. Just as we protect our homes, we must safeguard our digital lives. Passwords, encryption, and awareness guard us from threats that could compromise both personal and financial security.&lt;/p&gt;

&lt;p&gt;Wealth is stewardship. True financial health comes from planning, discipline, and generosity. By managing resources wisely, we can provide for our families, give generously, and create a legacy.&lt;/p&gt;

&lt;p&gt;When faith, family, cyber awareness, and financial wisdom align, we build not just security but a life of purpose, resilience, and blessing.&lt;/p&gt;

&lt;p&gt;Reflection: Are you protecting what matters most in all four areas of your life?&lt;/p&gt;

</description>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Why Cybersecurity is the New Financial Literacy</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Sun, 24 Aug 2025 20:54:06 +0000</pubDate>
      <link>https://dev.to/jessica_arnwine_cfg/why-cybersecurity-is-the-new-financial-literacy-2c74</link>
      <guid>https://dev.to/jessica_arnwine_cfg/why-cybersecurity-is-the-new-financial-literacy-2c74</guid>
      <description>&lt;p&gt;We know the basics of financial literacy; budgeting, saving, and investing. But today, in a world where most of our money and assets are digital, cybersecurity is equally crucial to protecting wealth. Just as we plan our finances carefully, we must also safeguard the systems that store and move our money.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Identity Theft &amp;amp; Fraud: The Modern Financial Risks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Financial fraud has evolved beyond paper checks and stolen wallets. Identity theft can drain accounts, damage credit, and create long-term consequences.&lt;/p&gt;

&lt;p&gt;Phishing emails or scams can trick even careful savers.&lt;/p&gt;

&lt;p&gt;Data breaches at banks or fintech apps can expose personal information.&lt;/p&gt;

&lt;p&gt;Unauthorized transactions can go unnoticed without proactive monitoring.&lt;/p&gt;

&lt;p&gt;Just as we diversify investments to reduce risk, we must implement cybersecurity practices to protect our digital identity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Weak Passwords = Financial Vulnerability&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A weak password is like leaving your front door unlocked. Many people reuse passwords across multiple accounts, making it easier for attackers to gain access.&lt;/p&gt;

&lt;p&gt;Use long, complex, unique passwords for banking and fintech accounts.&lt;/p&gt;

&lt;p&gt;Enable multi-factor authentication (MFA) whenever possible.&lt;/p&gt;

&lt;p&gt;Consider using a password manager to securely store and generate strong passwords.&lt;/p&gt;

&lt;p&gt;In digital finance, your login credentials are as valuable as the money in your account. Protecting them is non-negotiable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud &amp;amp; Fintech Security for Personal Money Management&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Modern financial tools — online banking, investment apps, digital wallets, rely on cloud technology. While convenient, this introduces new vulnerabilities:&lt;/p&gt;

&lt;p&gt;Always verify that apps use end-to-end encryption.&lt;/p&gt;

&lt;p&gt;Keep your devices updated to patch security flaws.&lt;/p&gt;

&lt;p&gt;Review permissions and access regularly, even trusted apps can become risky if compromised.&lt;/p&gt;

&lt;p&gt;Just as you research investments, research the security of the platforms you use to store and manage your money.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cyber Hygiene as Part of Smart Investing&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Cyber hygiene isn’t just about preventing hacks, it’s an essential part of financial planning:&lt;/p&gt;

&lt;p&gt;Regularly check accounts for suspicious activity.&lt;/p&gt;

&lt;p&gt;Back up critical financial documents offline or in secure cloud storage.&lt;/p&gt;

&lt;p&gt;Educate yourself on current scams and threats — awareness is one of the most powerful defenses.&lt;/p&gt;

&lt;p&gt;Investing in cybersecurity practices today protects your wealth tomorrow, just as consistently investing in stocks or savings grows your money.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Takeaway&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Financial health today isn’t just about dollars — it’s about securing the digital systems that hold them.&lt;/p&gt;

&lt;p&gt;Protecting your identity is as important as protecting your cash.&lt;/p&gt;

&lt;p&gt;Strong passwords and MFA are essential tools for financial security.&lt;/p&gt;

&lt;p&gt;Vigilance in digital platforms complements smart investing strategies.&lt;/p&gt;

&lt;p&gt;Cybersecurity and financial literacy together create a resilient wealth management plan.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;In a digital world, your money is only as safe as the systems that hold it. Guard them with the same care you guard your investments, and your financial foundation will remain strong.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>web3</category>
    </item>
    <item>
      <title>Automating Vulnerability Scans with Python: A Beginner-Friendly Guide</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Sun, 24 Aug 2025 20:51:50 +0000</pubDate>
      <link>https://dev.to/jessica_arnwine_cfg/automating-vulnerability-scans-with-python-a-beginner-friendly-guide-40n0</link>
      <guid>https://dev.to/jessica_arnwine_cfg/automating-vulnerability-scans-with-python-a-beginner-friendly-guide-40n0</guid>
      <description>&lt;p&gt;Vulnerability management doesn’t always need expensive tools. With Python, you can start automating basic scans and reports for free.&lt;/p&gt;

&lt;p&gt;I would love to chat about Steps to:&lt;/p&gt;

&lt;p&gt;Setting up Python environment&lt;/p&gt;

&lt;p&gt;Using socket &amp;amp; nmap modules for scanning&lt;/p&gt;

&lt;p&gt;Parsing results &amp;amp; generating reports&lt;/p&gt;

&lt;p&gt;Sending alerts via email/Slack&lt;/p&gt;

&lt;p&gt;Takeaway:&lt;br&gt;
Readers walk away with a working script + an understanding of how automation saves time in real-world security work.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Automating Vulnerability Management with Python: A Beginner-Friendly Guide&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Vulnerability management is a cornerstone of cybersecurity, but it doesn’t always require expensive enterprise tools. Even a simple Python script can help automate basic scans, generate reports, and alert you to issues — all at little to no cost.&lt;/p&gt;

&lt;p&gt;For security professionals, students, or enthusiasts, learning to automate routine tasks not only saves time but also builds a strong foundation for more advanced security practices. Here’s how you can get started.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why Automation Matters&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Manual vulnerability assessments are time-consuming and prone to human error. Automation allows you to:&lt;/p&gt;

&lt;p&gt;Run consistent scans without forgetting critical targets.&lt;/p&gt;

&lt;p&gt;Generate standardized reports for teams or management.&lt;/p&gt;

&lt;p&gt;Receive timely alerts when issues arise, so you can respond faster.&lt;/p&gt;

&lt;p&gt;Learn programming skills that scale as your security responsibilities grow.&lt;/p&gt;

&lt;p&gt;Even basic automation transforms vulnerability management from a repetitive chore into a more efficient and insightful process.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Step 1: Setting Up Your Python Environment&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Before you start writing scripts, you need a working Python environment:&lt;/p&gt;

&lt;p&gt;Install Python 3.x — latest stable release recommended.&lt;/p&gt;

&lt;p&gt;Set up a virtual environment to keep your dependencies organized:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python3 -m venv vuln-env
source vuln-env/bin/activate   # Mac/Linux
vuln-env\Scripts\activate      # Windows
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Install essential packages such as python-nmap, requests, and smtplib (for email alerts).&lt;/p&gt;

&lt;p&gt;This ensures your environment is isolated, manageable, and ready for security automation experiments.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Step 2: Using Socket &amp;amp; Nmap Modules for Scanning&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Python has built-in modules and community packages that simplify scanning tasks:&lt;/p&gt;

&lt;p&gt;Socket Module: Useful for checking if a specific port is open on a host.&lt;/p&gt;

&lt;p&gt;Python-nmap Module: A wrapper around the popular Nmap tool, letting you automate network scans directly from Python.&lt;/p&gt;

&lt;p&gt;A simple script might look like this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;`import nmap

nm = nmap.PortScanner()
nm.scan('192.168.1.1', '22-443')
for host in nm.all_hosts():
    print(f'Host: {host}, State: {nm[host].state()}')
`
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;With just a few lines, you can start gathering information about your network, spotting potential vulnerabilities quickly.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Step 3: Parsing Results &amp;amp; Generating Reports&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Once you’ve scanned your targets, the next step is organizing the data. Python allows you to:&lt;/p&gt;

&lt;p&gt;Parse JSON or XML output from scans&lt;/p&gt;

&lt;p&gt;Filter results based on severity&lt;/p&gt;

&lt;p&gt;Generate CSV or HTML reports for your team&lt;/p&gt;

&lt;p&gt;Example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;`import csv

with open('scan_results.csv', 'w', newline='') as file:
    writer = csv.writer(file)
    writer.writerow(['Host', 'Port', 'State'])
    for host in nm.all_hosts():
        for proto in nm[host].all_protocols():
            ports = nm[host][proto].keys()
            for port in ports:
                writer.writerow([host, port, nm[host][proto][port]['state']])
`
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This step ensures your findings are easy to review and track over time.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Step 4: Sending Alerts via Email or Slack&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Automation isn’t just about scanning; it’s about actionable intelligence. Python can notify you in real time:&lt;/p&gt;

&lt;p&gt;Use smtplib or email to send alerts via email&lt;/p&gt;

&lt;p&gt;Use slack-sdk or requests to push notifications to Slack channels&lt;/p&gt;

&lt;p&gt;Example for Slack:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;`import requests

webhook_url = 'https://hooks.slack.com/services/XXX/YYY/ZZZ'
message = {'text': 'Vulnerability scan completed. Check the report!'}
requests.post(webhook_url, json=message)`
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Alerts like these reduce response time and help security teams act quickly before issues escalate.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Takeaway&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;By the end of this process, readers will:&lt;/p&gt;

&lt;p&gt;Have a working Python script for basic vulnerability scanning&lt;/p&gt;

&lt;p&gt;Understand how automation reduces manual workload in security operations&lt;/p&gt;

&lt;p&gt;Be empowered to expand scripts, integrate more tools, and handle larger networks&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Automation doesn’t replace expertise, it enhances it. Even simple scripts can save hours of repetitive work, allowing security professionals to focus on deeper analysis and mitigation.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>python</category>
      <category>learning</category>
    </item>
  </channel>
</rss>
