Special

Oldest pages

Showing below up to 50 results in range #71 to #120.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Women activists from the Balkans, Macedonia‏‎ (17:49, 15 July 2015)
  2. Digital security training for women activists from the Balkans, Macedonia‏‎ (11:07, 16 July 2015)
  3. Digital Trainer Summit 1- Circumvention Tech Festival, Spain‏‎ (11:25, 16 July 2015)
  4. Digital Trainer Summit 2- Circumvention Tech Festival, Spain‏‎ (11:27, 16 July 2015)
  5. Digital Trainers Summit 3 - Circumvention Tech Festival, Spain‏‎ (11:29, 16 July 2015)
  6. Digital Security Training in Mexico‏‎ (11:43, 16 July 2015)
  7. Digital Trainers Summit - Circumvention Tech Festival, Spain‏‎ (14:18, 16 July 2015)
  8. EnGENDERing digital security workshop - Circumvention Tech Festival, Spain‏‎ (15:21, 16 July 2015)
  9. Panel Gender and Surveillance, Circumvention Tech Festival, Spain‏‎ (15:31, 16 July 2015)
  10. Including gender in privacy and digital security‏‎ (10:29, 17 July 2015)
  11. Shortest retrospective ever‏‎ (13:05, 18 July 2015)
  12. DST̞Kenya̠2‏‎ (03:39, 21 July 2015)
  13. FemH3ck - Hacking our practices: Gender and Technology, Mexico‏‎ (03:56, 21 July 2015)
  14. FemH3ck - Hacking our practices: Gender and Technology, Mexico Story‏‎ (03:58, 21 July 2015)
  15. Network exploitation and monitoring‏‎ (09:25, 21 July 2015)
  16. Digital security training for women activists from the Balkans, Turkey‏‎ (12:19, 21 July 2015)
  17. Digital security open and weekly trainings, Mexico‏‎ (14:46, 25 July 2015)
  18. Object encryption on linux‏‎ (16:14, 25 July 2015)
  19. Holistic security training of trainers, Brasil‏‎ (10:09, 26 July 2015)
  20. Linux server security‏‎ (14:55, 26 July 2015)
  21. Gender Tech Collective stories‏‎ (15:56, 27 July 2015)
  22. Reverse engineering‏‎ (08:47, 31 July 2015)
  23. Digital security and privacy session - Geek Girl festival, Kenya‏‎ (15:20, 1 August 2015)
  24. Simulation: Game of Goose‏‎ (13:42, 2 August 2015)
  25. Holistic Security, Train Of Trainers, Germany‏‎ (10:24, 3 August 2015)
  26. Take back the tech‏‎ (20:27, 4 August 2015)
  27. Threat analysis - Information Mapping I‏‎ (17:41, 6 August 2015)
  28. Gender Tech Privilege in Tech‏‎ (19:05, 6 August 2015)
  29. Gender Tech Researching VAW‏‎ (19:08, 6 August 2015)
  30. Gender Tech Herstory Exhibition‏‎ (19:14, 6 August 2015)
  31. Gender Tech Personal Memories‏‎ (19:18, 6 August 2015)
  32. Uncluttering your machine‏‎ (20:09, 8 August 2015)
  33. Uncluttering electronic waste‏‎ (20:10, 8 August 2015)
  34. Uncluttering your life‏‎ (20:11, 8 August 2015)
  35. Linux development process‏‎ (14:55, 11 August 2015)
  36. Making our own linux images‏‎ (15:14, 11 August 2015)
  37. Simulation: Mixnets‏‎ (17:29, 11 August 2015)
  38. Covert operations‏‎ (08:35, 19 August 2015)
  39. Roleplay‏‎ (17:10, 20 August 2015)
  40. Elicitation‏‎ (17:36, 20 August 2015)
  41. Simulations‏‎ (08:03, 22 August 2015)
  42. Security: Password security‏‎ (09:56, 27 August 2015)
  43. Holistic Security - Demonstrating the interconnectedness‏‎ (12:29, 27 August 2015)
  44. Threat analysis‏‎ (12:37, 27 August 2015)
  45. Threat analysis - Digital Security Indicators‏‎ (12:54, 27 August 2015)
  46. Threat analysis - Individual responses to threat‏‎ (15:30, 27 August 2015)
  47. Threat analysis - Information Mapping II‏‎ (16:06, 27 August 2015)
  48. Threat analysis - Introducing context & risk analysis‏‎ (16:14, 27 August 2015)
  49. Threat analysis - Security planning‏‎ (16:40, 27 August 2015)
  50. Threat analysis - Situational analysis‏‎ (16:41, 27 August 2015)

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)