Special

Oldest pages

Showing below up to 250 results in range #21 to #270.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. Safe Spaces Tweets‏‎ (12:02, 27 May 2015)
  2. Safe Space Wikipedia‏‎ (13:56, 27 May 2015)
  3. Safe Mailing list‏‎ (14:17, 27 May 2015)
  4. What you need to know before using this manual‏‎ (15:15, 27 May 2015)
  5. Step 0‏‎ (18:27, 27 May 2015)
  6. Context - Distance‏‎ (10:59, 29 May 2015)
  7. Resources‏‎ (11:02, 29 May 2015)
  8. Red pill or blue pill?‏‎ (10:35, 31 May 2015)
  9. Digital security trainings for female journalists, Pakistan‏‎ (11:30, 2 June 2015)
  10. Hands On Understanding the group – Spectrogram‏‎ (13:33, 2 June 2015)
  11. Security PGP 101‏‎ (13:36, 2 June 2015)
  12. Training: Training Skills I‏‎ (14:15, 2 June 2015)
  13. Training: Training design I‏‎ (14:27, 2 June 2015)
  14. Training: Training design IV‏‎ (15:15, 2 June 2015)
  15. FemH3ck - Round table Privacy and security in the Open IT Space, Serbia‏‎ (00:09, 3 June 2015)
  16. Timeline of an anonymous journey‏‎ (08:14, 3 June 2015)
  17. Edit a thon - Feminisms, Mexico‏‎ (04:06, 4 June 2015)
  18. Complete manual 2‏‎ (08:32, 4 June 2015)
  19. Manual introduction‏‎ (14:19, 4 June 2015)
  20. Privacy awareness talks, Argentina‏‎ (03:17, 5 June 2015)
  21. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, La Plata, Argentina‏‎ (04:45, 6 June 2015)
  22. Threats, detection, protection and (counter) moves‏‎ (09:51, 6 June 2015)
  23. Threats and solutions‏‎ (09:57, 6 June 2015)
  24. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Argentina‏‎ (16:27, 7 June 2015)
  25. Petty tyrants‏‎ (17:02, 9 June 2015)
  26. Propaganda‏‎ (19:22, 9 June 2015)
  27. Timeline merchants of death‏‎ (20:20, 10 June 2015)
  28. FemH3ck - How the internet works for WHRD, Mexico‏‎ (16:23, 11 June 2015)
  29. Step 2‏‎ (14:58, 15 June 2015)
  30. Anonymising with linux‏‎ (11:43, 16 June 2015)
  31. Security disclaimer‏‎ (12:10, 16 June 2015)
  32. FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya‏‎ (10:59, 18 June 2015)
  33. FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya‏‎ (11:09, 18 June 2015)
  34. Page:Storytelling‏‎ (23:58, 18 June 2015)
  35. One-to-one DigiSec trainings for activists, Argentina‏‎ (09:10, 19 June 2015)
  36. Femhack- Encryption and digital security workshop for cis, trans and queer women, Bangalore‏‎ (06:59, 30 June 2015)
  37. Uncluttering‏‎ (14:04, 5 July 2015)
  38. Psychological warfare‏‎ (14:46, 5 July 2015)
  39. SandBox/fr‏‎ (22:26, 6 July 2015)
  40. Sex and Security!, UK‏‎ (13:28, 10 July 2015)
  41. Panel Women and Digital Security Field - Circumvention Tech Festival, Spain‏‎ (13:51, 10 July 2015)
  42. Screenings HackiNetIk, Mexico‏‎ (18:21, 10 July 2015)
  43. FemH3ck - Feminist Caravan 1200 km, Mexico‏‎ (05:51, 12 July 2015)
  44. Holistic digital security training for women journalists, Mexico‏‎ (13:11, 12 July 2015)
  45. Digital security training for antimining activists, Mexico‏‎ (13:21, 12 July 2015)
  46. Digital Security in Abya Yala, the land of vital blood.‏‎ (13:46, 12 July 2015)
  47. El taller más difícil‏‎ (13:56, 12 July 2015)
  48. CryptoFest, Nicaragua‏‎ (05:02, 13 July 2015)
  49. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Indonesia‏‎ (16:13, 14 July 2015)
  50. Digital security trainings for women, Pakistan‏‎ (17:36, 15 July 2015)
  51. Women activists from the Balkans, Macedonia‏‎ (17:49, 15 July 2015)
  52. Digital security training for women activists from the Balkans, Macedonia‏‎ (11:07, 16 July 2015)
  53. Digital Trainer Summit 1- Circumvention Tech Festival, Spain‏‎ (11:25, 16 July 2015)
  54. Digital Trainer Summit 2- Circumvention Tech Festival, Spain‏‎ (11:27, 16 July 2015)
  55. Digital Trainers Summit 3 - Circumvention Tech Festival, Spain‏‎ (11:29, 16 July 2015)
  56. Digital Security Training in Mexico‏‎ (11:43, 16 July 2015)
  57. Digital Trainers Summit - Circumvention Tech Festival, Spain‏‎ (14:18, 16 July 2015)
  58. EnGENDERing digital security workshop - Circumvention Tech Festival, Spain‏‎ (15:21, 16 July 2015)
  59. Panel Gender and Surveillance, Circumvention Tech Festival, Spain‏‎ (15:31, 16 July 2015)
  60. Including gender in privacy and digital security‏‎ (10:29, 17 July 2015)
  61. Shortest retrospective ever‏‎ (13:05, 18 July 2015)
  62. DST̞Kenya̠2‏‎ (03:39, 21 July 2015)
  63. FemH3ck - Hacking our practices: Gender and Technology, Mexico‏‎ (03:56, 21 July 2015)
  64. FemH3ck - Hacking our practices: Gender and Technology, Mexico Story‏‎ (03:58, 21 July 2015)
  65. Network exploitation and monitoring‏‎ (09:25, 21 July 2015)
  66. Digital security training for women activists from the Balkans, Turkey‏‎ (12:19, 21 July 2015)
  67. Digital security open and weekly trainings, Mexico‏‎ (14:46, 25 July 2015)
  68. Object encryption on linux‏‎ (16:14, 25 July 2015)
  69. Holistic security training of trainers, Brasil‏‎ (10:09, 26 July 2015)
  70. Linux server security‏‎ (14:55, 26 July 2015)
  71. Gender Tech Collective stories‏‎ (15:56, 27 July 2015)
  72. Reverse engineering‏‎ (08:47, 31 July 2015)
  73. Digital security and privacy session - Geek Girl festival, Kenya‏‎ (15:20, 1 August 2015)
  74. Simulation: Game of Goose‏‎ (13:42, 2 August 2015)
  75. Holistic Security, Train Of Trainers, Germany‏‎ (10:24, 3 August 2015)
  76. Take back the tech‏‎ (20:27, 4 August 2015)
  77. Threat analysis - Information Mapping I‏‎ (17:41, 6 August 2015)
  78. Gender Tech Privilege in Tech‏‎ (19:05, 6 August 2015)
  79. Gender Tech Researching VAW‏‎ (19:08, 6 August 2015)
  80. Gender Tech Herstory Exhibition‏‎ (19:14, 6 August 2015)
  81. Gender Tech Personal Memories‏‎ (19:18, 6 August 2015)
  82. Uncluttering your machine‏‎ (20:09, 8 August 2015)
  83. Uncluttering electronic waste‏‎ (20:10, 8 August 2015)
  84. Uncluttering your life‏‎ (20:11, 8 August 2015)
  85. Linux development process‏‎ (14:55, 11 August 2015)
  86. Making our own linux images‏‎ (15:14, 11 August 2015)
  87. Simulation: Mixnets‏‎ (17:29, 11 August 2015)
  88. Covert operations‏‎ (08:35, 19 August 2015)
  89. Roleplay‏‎ (17:10, 20 August 2015)
  90. Elicitation‏‎ (17:36, 20 August 2015)
  91. Simulations‏‎ (08:03, 22 August 2015)
  92. Security: Password security‏‎ (09:56, 27 August 2015)
  93. Holistic Security - Demonstrating the interconnectedness‏‎ (12:29, 27 August 2015)
  94. Threat analysis‏‎ (12:37, 27 August 2015)
  95. Threat analysis - Digital Security Indicators‏‎ (12:54, 27 August 2015)
  96. Threat analysis - Individual responses to threat‏‎ (15:30, 27 August 2015)
  97. Threat analysis - Information Mapping II‏‎ (16:06, 27 August 2015)
  98. Threat analysis - Introducing context & risk analysis‏‎ (16:14, 27 August 2015)
  99. Threat analysis - Security planning‏‎ (16:40, 27 August 2015)
  100. Threat analysis - Situational analysis‏‎ (16:41, 27 August 2015)
  101. Threat analysis - Vision and Actor Mapping‏‎ (16:50, 27 August 2015)
  102. Gender Tech Online/Offline Cyberfeminism‏‎ (17:42, 27 August 2015)
  103. Hands On How the internet works‏‎ (17:50, 27 August 2015)
  104. Privacy Analogue data shadows‏‎ (17:54, 27 August 2015)
  105. Training: Training design II‏‎ (18:14, 27 August 2015)
  106. Gender Tech Co-creating a safe space‏‎ (18:15, 27 August 2015)
  107. Holistic security - Collective Memory‏‎ (14:22, 1 September 2015)
  108. Holistic security - Communications Security‏‎ (14:22, 1 September 2015)
  109. Holistic security - What is Security?‏‎ (14:22, 1 September 2015)
  110. Holistic security - A day in your life‏‎ (14:23, 1 September 2015)
  111. Holistic security - Self care‏‎ (14:23, 1 September 2015)
  112. Training: Training design III‏‎ (09:15, 3 September 2015)
  113. Gender Tech Personal Experiences‏‎ (09:40, 3 September 2015)
  114. Digital security for the Association of Media Women, Kenya‏‎ (10:23, 10 September 2015)
  115. TransHackFeminist Convergence 2, Mexico‏‎ (10:48, 10 September 2015)
  116. Talk Online Misoginy, Pakistan‏‎ (08:20, 11 September 2015)
  117. Timeline masters of the internet‏‎ (08:29, 11 September 2015)
  118. Anonymising your traffic with linux‏‎ (08:33, 11 September 2015)
  119. Trolling‏‎ (08:35, 11 September 2015)
  120. Take control of the tech‏‎ (08:36, 11 September 2015)
  121. A feminist internet and its reflection on privacy, security, policy and violence against Women‏‎ (09:14, 11 September 2015)
  122. Clean up all the things‏‎ (10:12, 13 September 2015)
  123. Glossary‏‎ (09:42, 15 September 2015)
  124. Installing linux/en‏‎ (11:29, 16 September 2015)
  125. Digital security meetup for women human rights defenders, Kenya‏‎ (13:00, 16 September 2015)
  126. Holistic Security, WHRD, Mexico‏‎ (22:59, 16 September 2015)
  127. A typical linux distribution‏‎ (14:08, 17 September 2015)
  128. Digital security trainings for female students, Pakistan‏‎ (21:34, 21 September 2015)
  129. Using technology to fight dangerous speech - Peace Tech exchange, Myanmar‏‎ (12:22, 22 September 2015)
  130. Ominous dots‏‎ (17:32, 23 September 2015)
  131. Shell scripting‏‎ (22:09, 23 September 2015)
  132. Linux applications‏‎ (09:38, 24 September 2015)
  133. Reconnaissance‏‎ (09:45, 24 September 2015)
  134. Self-dox‏‎ (09:47, 24 September 2015)
  135. Installing linux‏‎ (23:58, 27 September 2015)
  136. Arcane mixing techniques‏‎ (21:55, 29 September 2015)
  137. Timeline that is soooo 1984 ...‏‎ (08:22, 30 September 2015)
  138. Wordsmithing‏‎ (13:55, 9 October 2015)
  139. Digital threats, detection, protection and (counter) moves‏‎ (14:02, 9 October 2015)
  140. Protest threats, detection, protection and (counter) moves‏‎ (14:03, 9 October 2015)
  141. Linux virtualisation‏‎ (14:04, 9 October 2015)
  142. Scenario planning‏‎ (14:07, 9 October 2015)
  143. Threat modeling the quick and dirty way‏‎ (14:40, 9 October 2015)
  144. Networking concepts‏‎ (19:53, 9 October 2015)
  145. Test Manual‏‎ (10:45, 21 October 2015)
  146. Linux security‏‎ (07:08, 17 November 2015)
  147. Panel Including Gender - Re-publica conference, Berlin‏‎ (10:16, 24 November 2015)
  148. Campaign Zero Trollerance, Internet‏‎ (11:12, 24 November 2015)
  149. Europarlament, Digitale Revolution Feminist, Brussels‏‎ (13:33, 24 November 2015)
  150. Talk Magic trick: how to make the women disappear, Transmit Festival, Praha‏‎ (13:51, 24 November 2015)
  151. Stockholm Internet Forum (SIF), Gender equality, Stockholm‏‎ (15:10, 24 November 2015)
  152. F3mhack - Hacktona Feminista, Sao Paulo, Brasil‏‎ (17:19, 30 November 2015)
  153. Cryptorave - Feminist digital security workshops Lab-Ada, Brasil‏‎ (15:56, 1 December 2015)
  154. Digital security workshop for environmental activists, Brasil‏‎ (23:08, 1 December 2015)
  155. Privacy From data shadows to data brokers‏‎ (15:27, 3 December 2015)
  156. Kinky linux command-line‏‎ (14:27, 9 December 2015)
  157. SandBox‏‎ (11:35, 6 January 2016)
  158. Digital security for Women, Bosnia‏‎ (14:22, 6 January 2016)
  159. Linux - Installing/fr‏‎ (21:08, 10 February 2016)
  160. Complete manual/en‏‎ (21:08, 10 February 2016)
  161. Internet Freedom Festival 1, Spain‏‎ (10:13, 22 March 2016)
  162. Internet Freedom Festival 2, Spain‏‎ (10:01, 23 March 2016)
  163. Internet Freedom Festival 3, Spain‏‎ (09:05, 25 March 2016)
  164. FemH3ck - EnRedadas, Nicaragua‏‎ (23:28, 26 March 2016)
  165. Internet Freedom Festival 4, Spain‏‎ (09:35, 28 March 2016)
  166. Internet̙-Plumbing‏‎ (14:25, 6 April 2016)
  167. Complete manual‏‎ (08:03, 7 April 2016)
  168. Hackeando el patriarcado: la experiencia del primer Femhack‏‎ (14:23, 18 April 2016)
  169. Complete manual/es‏‎ (16:24, 19 April 2016)
  170. How to update this wiki‏‎ (00:17, 20 April 2016)
  171. How to install and configure this wiki‏‎ (01:11, 20 April 2016)
  172. I Festival Ciberfeminista de Guatemala‏‎ (00:04, 17 May 2016)
  173. How to preload-category‏‎ (00:56, 9 June 2016)
  174. Page:Create a new how to‏‎ (00:57, 9 June 2016)
  175. International Journalism Festival - Perugia‏‎ (10:42, 10 June 2016)
  176. Page:Crear un nuevo how to‏‎ (12:20, 10 June 2016)
  177. Digital security workshop Les Dégommeuses - Paris‏‎ (15:32, 27 June 2016)
  178. Digital security workshop - Les Degommeuses‏‎ (14:01, 4 July 2016)
  179. Install Party de conceptos de género‏‎ (01:15, 8 July 2016)
  180. Panel, Women Digital Trainers in LAC, IFF, Valencia‏‎ (09:14, 15 July 2016)
  181. Workshop, Regional networks for tackling gender-based online violence, IFF, Valencia‏‎ (09:30, 15 July 2016)
  182. Workshop, Manuals with a gender perspective, IFF, Valencia‏‎ (11:13, 15 July 2016)
  183. Talk, Training to privacy advocacy and digital security from a gender perspective, IFF, Valencia, Spain‏‎ (14:40, 15 July 2016)
  184. Womanity award, Oui Share Festival, Paris, France‏‎ (17:47, 15 July 2016)
  185. Conference Global Tech Women Voices, Internet‏‎ (17:55, 15 July 2016)
  186. Conference Pour une approche féministe et queer des technologies, Orleans, France‏‎ (18:12, 15 July 2016)
  187. EventosLAC-PostGTI‏‎ (02:32, 17 July 2016)
  188. Cuidados, Descargar emociones‏‎ (16:01, 18 July 2016)
  189. Cancion Software Libre‏‎ (17:37, 18 July 2016)
  190. ¿Mascaras para nuestras identidades conectadas?‏‎ (09:48, 19 July 2016)
  191. Workshop Feminists, Madrid, Spain‏‎ (09:51, 19 July 2016)
  192. FemHack Managua 2016‏‎ (02:23, 20 July 2016)
  193. Autodefensa Digital Feminista, FemHack Managua 2016‏‎ (18:12, 20 July 2016)
  194. Elegir aplicaciones seguras‏‎ (16:30, 22 July 2016)
  195. Workshop Digital security, Tech sans Violence, RDC‏‎ (13:42, 29 July 2016)
  196. Programa Luchadoras sobre GTI‏‎ (09:13, 14 September 2016)
  197. Training about gender, privacy and security for WHRD, Nicaragua‏‎ (12:16, 14 September 2016)
  198. Gender and Technology Institute, Ecuador‏‎ (15:19, 14 September 2016)
  199. Editatona Mujeres Nicas‏‎ (17:18, 17 September 2016)
  200. Taller de Software libre, autodefensa digital y seguridad feminista, Medellín-Colombia‏‎ (09:22, 18 September 2016)
  201. FemHack Bogotá 2016‏‎ (10:27, 21 September 2016)
  202. Privacy Presentation, Cali, Colombia‏‎ (17:24, 22 September 2016)
  203. Taller de postporno y software libre, Bogota, Colombia‏‎ (17:26, 22 September 2016)
  204. Rastrear IP de sesión (Facebook)‏‎ (10:17, 30 September 2016)
  205. Luchadoras, Tecnología con enfoque de género, Internet‏‎ (16:23, 10 October 2016)
  206. AWID, Mediactivismo, nuevas narrativas feministas, Brasil‏‎ (12:38, 2 November 2016)
  207. The Atlas of Online Harassment‏‎ (09:55, 15 November 2016)
  208. Hacer un análisis de texto‏‎ (19:54, 19 December 2016)
  209. Cuida los datos‏‎ (18:18, 5 January 2017)
  210. ¿Cómo funciona la telefonía móvil y de que manera mitigar el rastreo de datos? (1ra parte)‏‎ (16:01, 10 January 2017)
  211. Móvil 1: Funccionamiento‏‎ (16:07, 10 January 2017)
  212. Móvil 2: Complementos‏‎ (16:12, 10 January 2017)
  213. Taller Seguridad Digital, Via Campesina, Durango, Euskal Herria‏‎ (12:21, 12 January 2017)
  214. Detectar torres falsas de celular‏‎ (18:40, 12 January 2017)
  215. Funda de Faraday para el teléfono móvil‏‎ (18:43, 12 January 2017)
  216. TAILS‏‎ (10:51, 13 January 2017)
  217. Workshop: Health, sexuality, algorithms and data‏‎ (13:41, 14 January 2017)
  218. Workshop: Safer Nudes @Montreal, Canada‏‎ (14:34, 14 January 2017)
  219. Tracking your period: Data economy and the risks for privacy and security of (very) personal data‏‎ (08:56, 16 January 2017)
  220. Taller Seguridad Digital, Republica Dominicana‏‎ (08:56, 16 January 2017)
  221. AWID, Big data, Gender and development, Brazil‏‎ (08:58, 16 January 2017)
  222. AWID, Coming Back to Tech, Brazil‏‎ (09:00, 16 January 2017)
  223. AWID, Tracking your period: Data economy and the risks for privacy and security of (very) personal data, Brazil‏‎ (09:00, 16 January 2017)
  224. Taller Seguridad Digital, Feministas, Ecuador‏‎ (10:20, 17 January 2017)
  225. Hackerspace Feminista. Quito, Ecuador‏‎ (05:45, 26 January 2017)
  226. Móvil 3: Alternativas‏‎ (14:35, 26 January 2017)
  227. Taller Seguridad Digital, Hackeado al patriarcado, Peru‏‎ (15:17, 31 January 2017)
  228. Web profunda (deep web)‏‎ (15:36, 1 February 2017)
  229. Criptomonedas (Compras electrónicas anónimamente)‏‎ (15:39, 1 February 2017)
  230. La rebeldía es contagiosa‏‎ (17:43, 1 February 2017)
  231. Plataformas de citas‏‎ (15:40, 2 February 2017)
  232. Install party software libre vs códigos de género‏‎ (16:14, 2 February 2017)
  233. Cuidados, Concentración‏‎ (16:21, 2 February 2017)
  234. Cuidados, Cuerpo‏‎ (16:26, 2 February 2017)
  235. Oficina Uso crítico y feminista de internet, Brasil‏‎ (17:36, 2 February 2017)
  236. IGF, InternetEsNuestra, Mexico‏‎ (17:37, 2 February 2017)
  237. Gender and Technology Institute LAC, Start Up Meeting, Managua, Nicaragua‏‎ (14:19, 8 February 2017)
  238. Experiencia Webinario Que no te callen‏‎ (14:26, 8 February 2017)
  239. El Experimento‏‎ (14:35, 8 February 2017)
  240. Del IGT a Internet es Nuestra‏‎ (14:58, 8 February 2017)
  241. Violencias Conectadas, Nicaragua‏‎ (14:55, 9 February 2017)
  242. Cryptodance‏‎ (15:22, 9 February 2017)
  243. Surveillance‏‎ (15:33, 9 February 2017)
  244. Confusing surveillance systems‏‎ (15:38, 9 February 2017)
  245. Encrypting everything‏‎ (15:39, 9 February 2017)
  246. Mobile Communication‏‎ (16:43, 9 February 2017)
  247. Mobile Browsing‏‎ (16:50, 9 February 2017)
  248. Acompañamiento, Organización de Mujeres Defensoras, Mexico‏‎ (16:56, 9 February 2017)
  249. Gender and Technology Institute, Berlin‏‎ (18:05, 9 February 2017)
  250. Webinar, Sexualidad, Derechos Reproductivos y Violencia en línea, Brasil‏‎ (13:31, 10 February 2017)

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)