Special

Dead-end pages

The following pages do not link to other pages in Gender and Tech Resources.

Showing below up to 250 results in range #1 to #250.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. 10 trucos para mejorar tu posicionamiento sin vender tu alma a Google
  2. AWID, Big data, Gender and development, Brazil
  3. AWID, Coming Back to Tech, Brazil
  4. AWID, Mediactivismo, nuevas narrativas feministas, Brasil
  5. AWID, Tracking your period: Data economy and the risks for privacy and security of (very) personal data, Brazil
  6. A feminist internet and its reflection on privacy, security, policy and violence against Women
  7. A public library of our own: Building feminist digital libraries
  8. Acompanamiento, Seguridad Digital Activistas Derecho a Decidir, Ecuador
  9. Acompanamiento, Seguridad Digital Activistas Derecho a Decidir, Nicaragua
  10. Acompañamiento, Organización de Mujeres Defensoras, Mexico
  11. Analizar datos de twitter con R
  12. Anonymising with linux
  13. Asesoria, Seguridad interna, Chile
  14. Asesoria, seguridad interna, Costa Rica
  15. Autodefensa Digital Feminista, FemHack Managua 2016
  16. Autodefensa Digital Feminista Avanzado, Nicaragua
  17. Campaign Zero Trollerance, Internet
  18. Cancion Software Libre
  19. Capacitacion, Activistas derecho a decidir, Chile
  20. Capacitación en seguridad digital, La Paz, Bolivia
  21. Captivating capital and copyfighting
  22. Charla, Ciberfeminismos, Congreso Soberania Tecnologica, Barcelona
  23. Charla, Privacidad, Seguridad Digital y Ciberfeminismos: Experiencias desde Latino América, Barcelona
  24. Charla, privacidad, seguridad digital y ciberfeminismos, Sevilla
  25. Cifrar archivos con miniLock
  26. Coming Back to Tech, IFF, Spain
  27. Complete manual 2
  28. Conference, Les corps des femmes comme champ de bataille numériques en Amérique Latine, Orleans, France
  29. Conference Global Tech Women Voices, Internet
  30. Conference Pour une approche féministe et queer des technologies, Orleans, France
  31. Conmemoración dos años impunidad asesinato Macarena Valdes, Chile
  32. Context - Distance
  33. Contraseñas seguras
  34. Conversation, Coffee Chat at ARROW HQ Malaysia
  35. Criptofiesta: ¡aprende a cifrar tus correos!
  36. Criptomonedas (Compras electrónicas anónimamente)
  37. CryptoFest, Nicaragua
  38. Cryptocurrency (Buying things anonymously)
  39. Cryptodance
  40. Cryptorave - Feminist digital security workshops Lab-Ada, Brasil
  41. Cuida los datos
  42. Cuidados, Concentración
  43. Cuidados, Cuerpo
  44. Cuidados, Descargar emociones
  45. DST̞Kenya̠2
  46. DataDetox
  47. Dating platforms
  48. Deep web
  49. Del IGT a Internet es Nuestra
  50. Detect false mobile antennas
  51. Detectar torres falsas de celular
  52. Diagnósticos en seguridad digital para organizaciones defensoras de derechos humanos y del territorio: un manual para facilitadores
  53. Diagnósticos en seguridad digital para organizaciones defensoras de derechos humanos y del territorio: un manual para facilitadores.
  54. Digital Security Assessment for Human Rights Organizations: A guide for facilitators
  55. Digital Security Training in Mexico
  56. Digital Security in Abya Yala, the land of vital blood.
  57. Digital Trainer Summit 1- Circumvention Tech Festival, Spain
  58. Digital Trainer Summit 2- Circumvention Tech Festival, Spain
  59. Digital Trainers Summit - Circumvention Tech Festival, Spain
  60. Digital Trainers Summit 3 - Circumvention Tech Festival, Spain
  61. Digital security and privacy session - Geek Girl festival, Kenya
  62. Digital security for Women, Bosnia
  63. Digital security for the Association of Media Women, Kenya
  64. Digital security meetup for women human rights defenders, Kenya
  65. Digital security open and weekly trainings, Mexico
  66. Digital security tips - Bar Camp Yangon,Myanmar
  67. Digital security training for Journalists, Myanmar
  68. Digital security training for antimining activists, Mexico
  69. Digital security training for central american activists, Guatemala
  70. Digital security training for students, Cambodia
  71. Digital security training for women activists from the Balkans, Macedonia
  72. Digital security training for women activists from the Balkans, Turkey
  73. Digital security trainings, weekly, Cambodia
  74. Digital security trainings for female journalists, Pakistan
  75. Digital security trainings for female students, Pakistan
  76. Digital security trainings for women, Pakistan
  77. Digital security workshop- LAVITS, Brasil
  78. Digital security workshop - Les Degommeuses
  79. Digital security workshop Les Dégommeuses - Paris
  80. Digital security workshop for environmental activists, Brasil
  81. Digital security workshops for women, UK
  82. Edit a thon - Feminisms, Mexico
  83. Editatona Mujeres Nicas
  84. El Experimento
  85. El taller más difícil
  86. Elegir aplicaciones seguras
  87. EnGENDERing digital security workshop - Circumvention Tech Festival, Spain
  88. Encryption trainings for journalists, Mexico
  89. Enviar un mensaje oculto (Esteganografía)
  90. Epu Txawün Pichikeche por una Infancia Libre y sin Represión, Wallmapu
  91. Escuela de Tecnología Libre: soñando otra internet, Ecuador
  92. Europarlament, Digitale Revolution Feminist, Brussels
  93. EventosLAC-PostGTI
  94. Experiencia Webinario Que no te callen
  95. F3mhack - Hacktona Feminista, Sao Paulo, Brasil
  96. Faraday Phone Pouch
  97. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Argentina
  98. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Indonesia
  99. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, La Plata, Argentina
  100. FemH3ck - EnRedadas, Nicaragua
  101. FemH3ck - Feminist Caravan 1200 km, Mexico
  102. FemH3ck - Hacking our practices: Gender and Technology, Mexico
  103. FemH3ck - Hacking our practices: Gender and Technology, Mexico Story
  104. FemH3ck - How the internet works for WHRD, Mexico
  105. FemH3ck - Round table Privacy and security in the Open IT Space, Serbia
  106. FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya
  107. FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya
  108. FemHack Bogotá 2016
  109. FemHack Managua 2016
  110. Femhack- Encryption and digital security workshop for cis, trans and queer women, Bangalore
  111. Feminist Campaigns
  112. Feminist Data Politics: Quantifying Bodies
  113. Feminist Internet Meeting, Malaysia
  114. Ficción especulativa
  115. Formacion Ciberactivismo, Cuenca, Ecuador
  116. Formacion Ciberactivismo, Santa Elena, Ecuador
  117. Formacion Seguridad Digital, El Salvador
  118. Frequently Asked Questions
  119. Funda de Faraday para el teléfono móvil
  120. Gender Gap Tech
  121. Gender Tech Co-creating a safe space
  122. Gender Tech Collective stories
  123. Gender Tech Herstory Exhibition
  124. Gender Tech Online/Offline Cyberfeminism
  125. Gender Tech Personal Experiences
  126. Gender Tech Personal Memories
  127. Gender Tech Privilege in Tech
  128. Gender Tech Researching VAW
  129. Gender and Feminist Initiatives
  130. Gender and Tech curricula sprint event, Berlin
  131. Gender and Technology Institute, Berlin
  132. Gender and Technology Institute, Ecuador
  133. Gender and Technology Institute, LAC, Start Up Meeting, Mexico
  134. Gender and Technology Institute, LAC, Start Up Meeting, Mexico DF
  135. Gender and Technology Institute, Panama
  136. Gender and Technology Institute, Uruguay
  137. Gender and Technology Institute + Privacy Camp, LAC, Start Up Meeting, Barcelona
  138. Gender and Technology Institute Asia
  139. Gender and Technology Institute Asia, Start up Meeting, Colombo, Skri Lanka
  140. Gender and Technology Institute LAC, Start Up Meeting, Managua, Nicaragua
  141. Gendersec training curricula
  142. Glossary
  143. Hacer un análisis de texto
  144. Hackaton - Feminism, Cambodia
  145. Hackaton - election monitoring platform, Guatemala
  146. Hackeando el patriarcado: la experiencia del primer Femhack
  147. Hackerspace Feminista. Quito, Ecuador
  148. Hands On How the internet works
  149. Hands On Understanding the group – Spectrogram
  150. Hands On What does your internet look like?
  151. Herramientas comunicacionales para la protección del territorio y naturaleza, Ecuador
  152. Holistic Security, Train Of Trainers, Germany
  153. Holistic Security, WHRD, Mexico
  154. Holistic Security - Demonstrating the interconnectedness
  155. Holistic digital security training for women activists - self care, Brasil
  156. Holistic digital security training for women journalists, Mexico
  157. Holistic digital security workshop for women, Brasil
  158. Holistic security - A day in your life
  159. Holistic security - Collective Memory
  160. Holistic security - Communications Security
  161. Holistic security - Self care
  162. Holistic security - What is Security?
  163. Holistic security training of trainers, Brasil
  164. How to administrate this wiki
  165. How to install and configure this wiki
  166. How to preload-category
  167. How to update this wiki
  168. IGF, InternetEsNuestra, Mexico
  169. II Festival Ciberfeminista, Tejiendo circuitos, Guatemala
  170. I Festival Ciberfeminista de Guatemala
  171. Including gender in privacy and digital security
  172. Install Party de conceptos de género
  173. Install party free software vs gender codes
  174. Install party software libre vs códigos de género
  175. International Journalism Festival - Perugia
  176. Internet Democracy Project: https://genderingsurveillance.internetdemocracy.in/safety apps howto/
  177. Internet Democracy Project - An Initiative at Point of View (Click for link)
  178. Internet Freedom Festival 1, Spain
  179. Internet Freedom Festival 2, Spain
  180. Internet Freedom Festival 3, Spain
  181. Internet Freedom Festival 4, Spain
  182. Internet Governance Forum, Cyber Security and Safer Internet, Sri Lanka
  183. Jornada de Autocuidado y Autoconocimiento para mujeres, wallmapu
  184. Jornadas de autocuidado feminista. Cuidado físico, emocional y digital, Colombia
  185. La rebeldía es contagiosa
  186. LadyFest Managua 2016
  187. Luchadoras, Tecnología con enfoque de género, Internet
  188. Manual introduction
  189. Manuals with a gender perspective
  190. Mobile Browsing
  191. Mobile Communication
  192. Mobiles: Alternatives
  193. Modificar metadatos
  194. Motivando a la Gyal, Medellin, Colombia
  195. Móvil 1: Funccionamiento
  196. Móvil 2: Complementos
  197. Móvil 3: Alternativas
  198. Network exploitation and monitoring
  199. Oficina Uso crítico y feminista de internet, Brasil
  200. Oficinas de cuidados digitais e segurança da comunicação, Salvador de bahia, Brasil
  201. Ominous dots
  202. One-to-one DigiSec trainings for activists, Argentina
  203. Online Harassment Support Initiatives
  204. Page:Crear un nuevo how to
  205. Page:Create a new how to
  206. Page:Storytelling
  207. Panel, Building feminist infrastructure, IFF, Spain
  208. Panel, Strategizing around online gender-based violence documentation and accompaniment practice, IFF, Spain
  209. Panel, Women Digital Trainers in LAC, IFF, Valencia
  210. Panel , Identiti Terancam di Internet (Threatened Identities on the Internet), Malaysia
  211. Panel Gender and Surveillance, Circumvention Tech Festival, Spain
  212. Panel Including Gender - Re-publica conference, Berlin
  213. Panel Women and Digital Security Field - Circumvention Tech Festival, Spain
  214. Pannel, L'internet critique, entre (des)illusions et spéculations. Marseille, France
  215. Performar en la red
  216. Permacultura digital
  217. Plataforma Ciberseguras, Mexico
  218. Plataformas de citas
  219. Primer Encuentro de Defensa Personal Feminista, Bogota, Colombia
  220. Privacy Analogue data shadows
  221. Privacy From data shadows to data brokers
  222. Privacy Presentation, Cali, Colombia
  223. Privacy awareness talks, Argentina
  224. Programa Luchadoras sobre GTI
  225. Proyecto Apoyo Activo, Mexico
  226. Radio, El desarmador, Bolivia
  227. Raperas Feministas LAC
  228. Readings Surveying for collective learnings into ressources
  229. Red pill or blue pill?
  230. Reunión Introductoria a la Protección Integral y Digital para Defensoras del Territorio, Ecuador
  231. Reverse engineering
  232. SEGUNDO CAMPAMENTO FEMINISTA PARA MUJERES JÓVENES, Oaxaca, Mexico
  233. Safe Mailing list
  234. Safe Space Offline
  235. Safe Space Wikipedia
  236. Safe Spaces Tweets
  237. SandBox
  238. SandBox/fr
  239. Screenings HackiNetIk, Mexico
  240. Security: Password security
  241. Security PGP 101
  242. Security disclaimer
  243. Seguridad Digital Para Activistas Coyhaique, Chile
  244. Seguridad digial para defensores de derechos humanos en contextos mineros
  245. Seguridad digial para defensores de derechos humanos en contextos mineros 2
  246. Seguridad digial para defensores de derechos humanos en contextos mineros 3
  247. Seguridad digital en campañas feministas
  248. Seguridad digital para grupos por el derecho a decidir
  249. Seguridad digital para la defensa personal feminista
  250. Self Care, Concentration

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)