Oldest pages
Showing below up to 50 results in range #101 to #150.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- Gender Tech Personal Memories (19:18, 6 August 2015)
 - Uncluttering your machine (20:09, 8 August 2015)
 - Uncluttering electronic waste (20:10, 8 August 2015)
 - Uncluttering your life (20:11, 8 August 2015)
 - Linux development process (14:55, 11 August 2015)
 - Making our own linux images (15:14, 11 August 2015)
 - Simulation: Mixnets (17:29, 11 August 2015)
 - Covert operations (08:35, 19 August 2015)
 - Roleplay (17:10, 20 August 2015)
 - Elicitation (17:36, 20 August 2015)
 - Simulations (08:03, 22 August 2015)
 - Security: Password security (09:56, 27 August 2015)
 - Holistic Security - Demonstrating the interconnectedness (12:29, 27 August 2015)
 - Threat analysis (12:37, 27 August 2015)
 - Threat analysis - Digital Security Indicators (12:54, 27 August 2015)
 - Threat analysis - Individual responses to threat (15:30, 27 August 2015)
 - Threat analysis - Information Mapping II (16:06, 27 August 2015)
 - Threat analysis - Introducing context & risk analysis (16:14, 27 August 2015)
 - Threat analysis - Security planning (16:40, 27 August 2015)
 - Threat analysis - Situational analysis (16:41, 27 August 2015)
 - Threat analysis - Vision and Actor Mapping (16:50, 27 August 2015)
 - Gender Tech Online/Offline Cyberfeminism (17:42, 27 August 2015)
 - Hands On How the internet works (17:50, 27 August 2015)
 - Privacy Analogue data shadows (17:54, 27 August 2015)
 - Training: Training design II (18:14, 27 August 2015)
 - Gender Tech Co-creating a safe space (18:15, 27 August 2015)
 - Holistic security - Collective Memory (14:22, 1 September 2015)
 - Holistic security - Communications Security (14:22, 1 September 2015)
 - Holistic security - What is Security? (14:22, 1 September 2015)
 - Holistic security - A day in your life (14:23, 1 September 2015)
 - Holistic security - Self care (14:23, 1 September 2015)
 - Training: Training design III (09:15, 3 September 2015)
 - Gender Tech Personal Experiences (09:40, 3 September 2015)
 - Digital security for the Association of Media Women, Kenya (10:23, 10 September 2015)
 - TransHackFeminist Convergence 2, Mexico (10:48, 10 September 2015)
 - Talk Online Misoginy, Pakistan (08:20, 11 September 2015)
 - Timeline masters of the internet (08:29, 11 September 2015)
 - Anonymising your traffic with linux (08:33, 11 September 2015)
 - Trolling (08:35, 11 September 2015)
 - Take control of the tech (08:36, 11 September 2015)
 - A feminist internet and its reflection on privacy, security, policy and violence against Women (09:14, 11 September 2015)
 - Clean up all the things (10:12, 13 September 2015)
 - Glossary (09:42, 15 September 2015)
 - Installing linux/en (11:29, 16 September 2015)
 - Digital security meetup for women human rights defenders, Kenya (13:00, 16 September 2015)
 - Holistic Security, WHRD, Mexico (22:59, 16 September 2015)
 - A typical linux distribution (14:08, 17 September 2015)
 - Digital security trainings for female students, Pakistan (21:34, 21 September 2015)
 - Using technology to fight dangerous speech - Peace Tech exchange, Myanmar (12:22, 22 September 2015)
 - Ominous dots (17:32, 23 September 2015)