Translations

Difference between revisions of "Complete manual/25/en"

From Gender and Tech Resources

(Created page with "Por último, ya que estamos todas en diferentes momentos en nuestros proceso de aprendizaje y uso de herramientas de privacidad y seguridad digital, todas contamos con áreas...")
 
(Importing a new version from external source)
 
Line 1: Line 1:
Por último, ya que estamos todas en diferentes momentos en nuestros proceso de aprendizaje y uso de herramientas de privacidad y seguridad digital, todas contamos con áreas que podríamos mejorar o profundizar. En la ultima sección de esta guía intitulada [[Complete_manual#Establishing_a_baseline_of_privacy_and_security_knowledge|'Estableciendo una base en relación a privacidad y seguridad digital']], presentamos descripciones y enlaces hacia una lista de temas básicos e intermedios que te permitirán ampliar tus tácticas y estrategias de privacidad y seguridad digitales. Algunos de los temas incluidos abarcan: Cómo funciona internet, diferentes tipos de cifrado y cómo usarlos, cómo evaluar sus niveles de riesgo, cómo configurar y utilizar diferentes tipos de canales de comunicación seguros. A medida que esta guía evolucione y se expanda en los próximos años, esperamos poder incluir cada vez mas temas que respondan a nuestra comunidad y sus necesidades.
+
Finally, since we're all at different points in the process of learning and using digital security tools and tactics, most of us have areas that we could brush up on or learn more about. In the section of this manual entitled [[Complete_manual#Establishing_a_baseline_of_privacy_and_security_knowledge|'Establishing a baseline of privacy and security knowledge']], you'll find descriptions and links to a list of basic and intermediate security and privacy topics that can enable or amplify digital tactics and strategies. Examples of these topics include: how the Internet works, how different kinds of encryption work and how to use them, how to assess your risk, how to set up and use different types of secure communication channels, and more. As this manual evolves and expands over the next few years, we hope to include more in-depth technical topics contextualized for our community and needs.

Latest revision as of 08:59, 29 September 2019

Information about message (contribute)
This message has no documentation. If you know where or how this message is used, you can help other translators by adding documentation to this message.
Message definition (Complete manual)
Finally, since we're all at different points in the process of learning and using digital security tools and tactics, most of us have areas that we could brush up on or learn more about. In the section of this manual entitled [[Complete_manual#Establishing_a_baseline_of_privacy_and_security_knowledge|'Establishing a baseline of privacy and security knowledge']], you'll find descriptions and links to a list of basic and intermediate security and privacy topics that can enable or amplify digital tactics and strategies. Examples of these topics include: how the Internet works, how different kinds of encryption work and how to use them, how to assess your risk, how to set up and use different types of secure communication channels, and more. As this manual evolves and expands over the next few years, we hope to include more in-depth technical topics contextualized for our community and needs.
TranslationFinally, since we're all at different points in the process of learning and using digital security tools and tactics, most of us have areas that we could brush up on or learn more about. In the section of this manual entitled [[Complete_manual#Establishing_a_baseline_of_privacy_and_security_knowledge|'Establishing a baseline of privacy and security knowledge']], you'll find descriptions and links to a list of basic and intermediate security and privacy topics that can enable or amplify digital tactics and strategies. Examples of these topics include: how the Internet works, how different kinds of encryption work and how to use them, how to assess your risk, how to set up and use different types of secure communication channels, and more. As this manual evolves and expands over the next few years, we hope to include more in-depth technical topics contextualized for our community and needs.

Finally, since we're all at different points in the process of learning and using digital security tools and tactics, most of us have areas that we could brush up on or learn more about. In the section of this manual entitled 'Establishing a baseline of privacy and security knowledge', you'll find descriptions and links to a list of basic and intermediate security and privacy topics that can enable or amplify digital tactics and strategies. Examples of these topics include: how the Internet works, how different kinds of encryption work and how to use them, how to assess your risk, how to set up and use different types of secure communication channels, and more. As this manual evolves and expands over the next few years, we hope to include more in-depth technical topics contextualized for our community and needs.