Special

Oldest pages

Showing below up to 100 results in range #51 to #150.

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)

  1. Security disclaimer‏‎ (12:10, 16 June 2015)
  2. FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya‏‎ (10:59, 18 June 2015)
  3. FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya‏‎ (11:09, 18 June 2015)
  4. Page:Storytelling‏‎ (23:58, 18 June 2015)
  5. One-to-one DigiSec trainings for activists, Argentina‏‎ (09:10, 19 June 2015)
  6. Femhack- Encryption and digital security workshop for cis, trans and queer women, Bangalore‏‎ (06:59, 30 June 2015)
  7. Uncluttering‏‎ (14:04, 5 July 2015)
  8. Psychological warfare‏‎ (14:46, 5 July 2015)
  9. SandBox/fr‏‎ (22:26, 6 July 2015)
  10. Sex and Security!, UK‏‎ (13:28, 10 July 2015)
  11. Panel Women and Digital Security Field - Circumvention Tech Festival, Spain‏‎ (13:51, 10 July 2015)
  12. Screenings HackiNetIk, Mexico‏‎ (18:21, 10 July 2015)
  13. FemH3ck - Feminist Caravan 1200 km, Mexico‏‎ (05:51, 12 July 2015)
  14. Holistic digital security training for women journalists, Mexico‏‎ (13:11, 12 July 2015)
  15. Digital security training for antimining activists, Mexico‏‎ (13:21, 12 July 2015)
  16. Digital Security in Abya Yala, the land of vital blood.‏‎ (13:46, 12 July 2015)
  17. El taller más difícil‏‎ (13:56, 12 July 2015)
  18. CryptoFest, Nicaragua‏‎ (05:02, 13 July 2015)
  19. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Indonesia‏‎ (16:13, 14 July 2015)
  20. Digital security trainings for women, Pakistan‏‎ (17:36, 15 July 2015)
  21. Women activists from the Balkans, Macedonia‏‎ (17:49, 15 July 2015)
  22. Digital security training for women activists from the Balkans, Macedonia‏‎ (11:07, 16 July 2015)
  23. Digital Trainer Summit 1- Circumvention Tech Festival, Spain‏‎ (11:25, 16 July 2015)
  24. Digital Trainer Summit 2- Circumvention Tech Festival, Spain‏‎ (11:27, 16 July 2015)
  25. Digital Trainers Summit 3 - Circumvention Tech Festival, Spain‏‎ (11:29, 16 July 2015)
  26. Digital Security Training in Mexico‏‎ (11:43, 16 July 2015)
  27. Digital Trainers Summit - Circumvention Tech Festival, Spain‏‎ (14:18, 16 July 2015)
  28. EnGENDERing digital security workshop - Circumvention Tech Festival, Spain‏‎ (15:21, 16 July 2015)
  29. Panel Gender and Surveillance, Circumvention Tech Festival, Spain‏‎ (15:31, 16 July 2015)
  30. Including gender in privacy and digital security‏‎ (10:29, 17 July 2015)
  31. Shortest retrospective ever‏‎ (13:05, 18 July 2015)
  32. DST̞Kenya̠2‏‎ (03:39, 21 July 2015)
  33. FemH3ck - Hacking our practices: Gender and Technology, Mexico‏‎ (03:56, 21 July 2015)
  34. FemH3ck - Hacking our practices: Gender and Technology, Mexico Story‏‎ (03:58, 21 July 2015)
  35. Network exploitation and monitoring‏‎ (09:25, 21 July 2015)
  36. Digital security training for women activists from the Balkans, Turkey‏‎ (12:19, 21 July 2015)
  37. Digital security open and weekly trainings, Mexico‏‎ (14:46, 25 July 2015)
  38. Object encryption on linux‏‎ (16:14, 25 July 2015)
  39. Holistic security training of trainers, Brasil‏‎ (10:09, 26 July 2015)
  40. Linux server security‏‎ (14:55, 26 July 2015)
  41. Gender Tech Collective stories‏‎ (15:56, 27 July 2015)
  42. Reverse engineering‏‎ (08:47, 31 July 2015)
  43. Digital security and privacy session - Geek Girl festival, Kenya‏‎ (15:20, 1 August 2015)
  44. Simulation: Game of Goose‏‎ (13:42, 2 August 2015)
  45. Holistic Security, Train Of Trainers, Germany‏‎ (10:24, 3 August 2015)
  46. Take back the tech‏‎ (20:27, 4 August 2015)
  47. Threat analysis - Information Mapping I‏‎ (17:41, 6 August 2015)
  48. Gender Tech Privilege in Tech‏‎ (19:05, 6 August 2015)
  49. Gender Tech Researching VAW‏‎ (19:08, 6 August 2015)
  50. Gender Tech Herstory Exhibition‏‎ (19:14, 6 August 2015)
  51. Gender Tech Personal Memories‏‎ (19:18, 6 August 2015)
  52. Uncluttering your machine‏‎ (20:09, 8 August 2015)
  53. Uncluttering electronic waste‏‎ (20:10, 8 August 2015)
  54. Uncluttering your life‏‎ (20:11, 8 August 2015)
  55. Linux development process‏‎ (14:55, 11 August 2015)
  56. Making our own linux images‏‎ (15:14, 11 August 2015)
  57. Simulation: Mixnets‏‎ (17:29, 11 August 2015)
  58. Covert operations‏‎ (08:35, 19 August 2015)
  59. Roleplay‏‎ (17:10, 20 August 2015)
  60. Elicitation‏‎ (17:36, 20 August 2015)
  61. Simulations‏‎ (08:03, 22 August 2015)
  62. Security: Password security‏‎ (09:56, 27 August 2015)
  63. Holistic Security - Demonstrating the interconnectedness‏‎ (12:29, 27 August 2015)
  64. Threat analysis‏‎ (12:37, 27 August 2015)
  65. Threat analysis - Digital Security Indicators‏‎ (12:54, 27 August 2015)
  66. Threat analysis - Individual responses to threat‏‎ (15:30, 27 August 2015)
  67. Threat analysis - Information Mapping II‏‎ (16:06, 27 August 2015)
  68. Threat analysis - Introducing context & risk analysis‏‎ (16:14, 27 August 2015)
  69. Threat analysis - Security planning‏‎ (16:40, 27 August 2015)
  70. Threat analysis - Situational analysis‏‎ (16:41, 27 August 2015)
  71. Threat analysis - Vision and Actor Mapping‏‎ (16:50, 27 August 2015)
  72. Gender Tech Online/Offline Cyberfeminism‏‎ (17:42, 27 August 2015)
  73. Hands On How the internet works‏‎ (17:50, 27 August 2015)
  74. Privacy Analogue data shadows‏‎ (17:54, 27 August 2015)
  75. Training: Training design II‏‎ (18:14, 27 August 2015)
  76. Gender Tech Co-creating a safe space‏‎ (18:15, 27 August 2015)
  77. Holistic security - Collective Memory‏‎ (14:22, 1 September 2015)
  78. Holistic security - Communications Security‏‎ (14:22, 1 September 2015)
  79. Holistic security - What is Security?‏‎ (14:22, 1 September 2015)
  80. Holistic security - A day in your life‏‎ (14:23, 1 September 2015)
  81. Holistic security - Self care‏‎ (14:23, 1 September 2015)
  82. Training: Training design III‏‎ (09:15, 3 September 2015)
  83. Gender Tech Personal Experiences‏‎ (09:40, 3 September 2015)
  84. Digital security for the Association of Media Women, Kenya‏‎ (10:23, 10 September 2015)
  85. TransHackFeminist Convergence 2, Mexico‏‎ (10:48, 10 September 2015)
  86. Talk Online Misoginy, Pakistan‏‎ (08:20, 11 September 2015)
  87. Timeline masters of the internet‏‎ (08:29, 11 September 2015)
  88. Anonymising your traffic with linux‏‎ (08:33, 11 September 2015)
  89. Trolling‏‎ (08:35, 11 September 2015)
  90. Take control of the tech‏‎ (08:36, 11 September 2015)
  91. A feminist internet and its reflection on privacy, security, policy and violence against Women‏‎ (09:14, 11 September 2015)
  92. Clean up all the things‏‎ (10:12, 13 September 2015)
  93. Glossary‏‎ (09:42, 15 September 2015)
  94. Installing linux/en‏‎ (11:29, 16 September 2015)
  95. Digital security meetup for women human rights defenders, Kenya‏‎ (13:00, 16 September 2015)
  96. Holistic Security, WHRD, Mexico‏‎ (22:59, 16 September 2015)
  97. A typical linux distribution‏‎ (14:08, 17 September 2015)
  98. Digital security trainings for female students, Pakistan‏‎ (21:34, 21 September 2015)
  99. Using technology to fight dangerous speech - Peace Tech exchange, Myanmar‏‎ (12:22, 22 September 2015)
  100. Ominous dots‏‎ (17:32, 23 September 2015)

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)