Special

Oldest pages

Showing below up to 100 results in range #21 to #120.

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)

  1. Safe Spaces Tweets‏‎ (12:02, 27 May 2015)
  2. Safe Space Wikipedia‏‎ (13:56, 27 May 2015)
  3. Safe Mailing list‏‎ (14:17, 27 May 2015)
  4. What you need to know before using this manual‏‎ (15:15, 27 May 2015)
  5. Step 0‏‎ (18:27, 27 May 2015)
  6. Context - Distance‏‎ (10:59, 29 May 2015)
  7. Resources‏‎ (11:02, 29 May 2015)
  8. Red pill or blue pill?‏‎ (10:35, 31 May 2015)
  9. Digital security trainings for female journalists, Pakistan‏‎ (11:30, 2 June 2015)
  10. Hands On Understanding the group – Spectrogram‏‎ (13:33, 2 June 2015)
  11. Security PGP 101‏‎ (13:36, 2 June 2015)
  12. Training: Training Skills I‏‎ (14:15, 2 June 2015)
  13. Training: Training design I‏‎ (14:27, 2 June 2015)
  14. Training: Training design IV‏‎ (15:15, 2 June 2015)
  15. FemH3ck - Round table Privacy and security in the Open IT Space, Serbia‏‎ (00:09, 3 June 2015)
  16. Timeline of an anonymous journey‏‎ (08:14, 3 June 2015)
  17. Edit a thon - Feminisms, Mexico‏‎ (04:06, 4 June 2015)
  18. Complete manual 2‏‎ (08:32, 4 June 2015)
  19. Manual introduction‏‎ (14:19, 4 June 2015)
  20. Privacy awareness talks, Argentina‏‎ (03:17, 5 June 2015)
  21. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, La Plata, Argentina‏‎ (04:45, 6 June 2015)
  22. Threats, detection, protection and (counter) moves‏‎ (09:51, 6 June 2015)
  23. Threats and solutions‏‎ (09:57, 6 June 2015)
  24. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Argentina‏‎ (16:27, 7 June 2015)
  25. Petty tyrants‏‎ (17:02, 9 June 2015)
  26. Propaganda‏‎ (19:22, 9 June 2015)
  27. Timeline merchants of death‏‎ (20:20, 10 June 2015)
  28. FemH3ck - How the internet works for WHRD, Mexico‏‎ (16:23, 11 June 2015)
  29. Step 2‏‎ (14:58, 15 June 2015)
  30. Anonymising with linux‏‎ (11:43, 16 June 2015)
  31. Security disclaimer‏‎ (12:10, 16 June 2015)
  32. FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya‏‎ (10:59, 18 June 2015)
  33. FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya‏‎ (11:09, 18 June 2015)
  34. Page:Storytelling‏‎ (23:58, 18 June 2015)
  35. One-to-one DigiSec trainings for activists, Argentina‏‎ (09:10, 19 June 2015)
  36. Femhack- Encryption and digital security workshop for cis, trans and queer women, Bangalore‏‎ (06:59, 30 June 2015)
  37. Uncluttering‏‎ (14:04, 5 July 2015)
  38. Psychological warfare‏‎ (14:46, 5 July 2015)
  39. SandBox/fr‏‎ (22:26, 6 July 2015)
  40. Sex and Security!, UK‏‎ (13:28, 10 July 2015)
  41. Panel Women and Digital Security Field - Circumvention Tech Festival, Spain‏‎ (13:51, 10 July 2015)
  42. Screenings HackiNetIk, Mexico‏‎ (18:21, 10 July 2015)
  43. FemH3ck - Feminist Caravan 1200 km, Mexico‏‎ (05:51, 12 July 2015)
  44. Holistic digital security training for women journalists, Mexico‏‎ (13:11, 12 July 2015)
  45. Digital security training for antimining activists, Mexico‏‎ (13:21, 12 July 2015)
  46. Digital Security in Abya Yala, the land of vital blood.‏‎ (13:46, 12 July 2015)
  47. El taller más difícil‏‎ (13:56, 12 July 2015)
  48. CryptoFest, Nicaragua‏‎ (05:02, 13 July 2015)
  49. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Indonesia‏‎ (16:13, 14 July 2015)
  50. Digital security trainings for women, Pakistan‏‎ (17:36, 15 July 2015)
  51. Women activists from the Balkans, Macedonia‏‎ (17:49, 15 July 2015)
  52. Digital security training for women activists from the Balkans, Macedonia‏‎ (11:07, 16 July 2015)
  53. Digital Trainer Summit 1- Circumvention Tech Festival, Spain‏‎ (11:25, 16 July 2015)
  54. Digital Trainer Summit 2- Circumvention Tech Festival, Spain‏‎ (11:27, 16 July 2015)
  55. Digital Trainers Summit 3 - Circumvention Tech Festival, Spain‏‎ (11:29, 16 July 2015)
  56. Digital Security Training in Mexico‏‎ (11:43, 16 July 2015)
  57. Digital Trainers Summit - Circumvention Tech Festival, Spain‏‎ (14:18, 16 July 2015)
  58. EnGENDERing digital security workshop - Circumvention Tech Festival, Spain‏‎ (15:21, 16 July 2015)
  59. Panel Gender and Surveillance, Circumvention Tech Festival, Spain‏‎ (15:31, 16 July 2015)
  60. Including gender in privacy and digital security‏‎ (10:29, 17 July 2015)
  61. Shortest retrospective ever‏‎ (13:05, 18 July 2015)
  62. DST̞Kenya̠2‏‎ (03:39, 21 July 2015)
  63. FemH3ck - Hacking our practices: Gender and Technology, Mexico‏‎ (03:56, 21 July 2015)
  64. FemH3ck - Hacking our practices: Gender and Technology, Mexico Story‏‎ (03:58, 21 July 2015)
  65. Network exploitation and monitoring‏‎ (09:25, 21 July 2015)
  66. Digital security training for women activists from the Balkans, Turkey‏‎ (12:19, 21 July 2015)
  67. Digital security open and weekly trainings, Mexico‏‎ (14:46, 25 July 2015)
  68. Object encryption on linux‏‎ (16:14, 25 July 2015)
  69. Holistic security training of trainers, Brasil‏‎ (10:09, 26 July 2015)
  70. Linux server security‏‎ (14:55, 26 July 2015)
  71. Gender Tech Collective stories‏‎ (15:56, 27 July 2015)
  72. Reverse engineering‏‎ (08:47, 31 July 2015)
  73. Digital security and privacy session - Geek Girl festival, Kenya‏‎ (15:20, 1 August 2015)
  74. Simulation: Game of Goose‏‎ (13:42, 2 August 2015)
  75. Holistic Security, Train Of Trainers, Germany‏‎ (10:24, 3 August 2015)
  76. Take back the tech‏‎ (20:27, 4 August 2015)
  77. Threat analysis - Information Mapping I‏‎ (17:41, 6 August 2015)
  78. Gender Tech Privilege in Tech‏‎ (19:05, 6 August 2015)
  79. Gender Tech Researching VAW‏‎ (19:08, 6 August 2015)
  80. Gender Tech Herstory Exhibition‏‎ (19:14, 6 August 2015)
  81. Gender Tech Personal Memories‏‎ (19:18, 6 August 2015)
  82. Uncluttering your machine‏‎ (20:09, 8 August 2015)
  83. Uncluttering electronic waste‏‎ (20:10, 8 August 2015)
  84. Uncluttering your life‏‎ (20:11, 8 August 2015)
  85. Linux development process‏‎ (14:55, 11 August 2015)
  86. Making our own linux images‏‎ (15:14, 11 August 2015)
  87. Simulation: Mixnets‏‎ (17:29, 11 August 2015)
  88. Covert operations‏‎ (08:35, 19 August 2015)
  89. Roleplay‏‎ (17:10, 20 August 2015)
  90. Elicitation‏‎ (17:36, 20 August 2015)
  91. Simulations‏‎ (08:03, 22 August 2015)
  92. Security: Password security‏‎ (09:56, 27 August 2015)
  93. Holistic Security - Demonstrating the interconnectedness‏‎ (12:29, 27 August 2015)
  94. Threat analysis‏‎ (12:37, 27 August 2015)
  95. Threat analysis - Digital Security Indicators‏‎ (12:54, 27 August 2015)
  96. Threat analysis - Individual responses to threat‏‎ (15:30, 27 August 2015)
  97. Threat analysis - Information Mapping II‏‎ (16:06, 27 August 2015)
  98. Threat analysis - Introducing context & risk analysis‏‎ (16:14, 27 August 2015)
  99. Threat analysis - Security planning‏‎ (16:40, 27 August 2015)
  100. Threat analysis - Situational analysis‏‎ (16:41, 27 August 2015)

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)