Special

Dead-end pages

The following pages do not link to other pages in Gender and Tech Resources.

Showing below up to 312 results in range #21 to #332.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. Captivating capital and copyfighting
  2. Charla, Ciberfeminismos, Congreso Soberania Tecnologica, Barcelona
  3. Charla, Privacidad, Seguridad Digital y Ciberfeminismos: Experiencias desde Latino América, Barcelona
  4. Charla, privacidad, seguridad digital y ciberfeminismos, Sevilla
  5. Cifrar archivos con miniLock
  6. Coming Back to Tech, IFF, Spain
  7. Complete manual 2
  8. Conference, Les corps des femmes comme champ de bataille numériques en Amérique Latine, Orleans, France
  9. Conference Global Tech Women Voices, Internet
  10. Conference Pour une approche féministe et queer des technologies, Orleans, France
  11. Conmemoración dos años impunidad asesinato Macarena Valdes, Chile
  12. Context - Distance
  13. Contraseñas seguras
  14. Conversation, Coffee Chat at ARROW HQ Malaysia
  15. Criptofiesta: ¡aprende a cifrar tus correos!
  16. Criptomonedas (Compras electrónicas anónimamente)
  17. CryptoFest, Nicaragua
  18. Cryptocurrency (Buying things anonymously)
  19. Cryptodance
  20. Cryptorave - Feminist digital security workshops Lab-Ada, Brasil
  21. Cuida los datos
  22. Cuidados, Concentración
  23. Cuidados, Cuerpo
  24. Cuidados, Descargar emociones
  25. DST̞Kenya̠2
  26. DataDetox
  27. Dating platforms
  28. Deep web
  29. Del IGT a Internet es Nuestra
  30. Detect false mobile antennas
  31. Detectar torres falsas de celular
  32. Diagnósticos en seguridad digital para organizaciones defensoras de derechos humanos y del territorio: un manual para facilitadores
  33. Diagnósticos en seguridad digital para organizaciones defensoras de derechos humanos y del territorio: un manual para facilitadores.
  34. Digital Security Assessment for Human Rights Organizations: A guide for facilitators
  35. Digital Security Training in Mexico
  36. Digital Security in Abya Yala, the land of vital blood.
  37. Digital Trainer Summit 1- Circumvention Tech Festival, Spain
  38. Digital Trainer Summit 2- Circumvention Tech Festival, Spain
  39. Digital Trainers Summit - Circumvention Tech Festival, Spain
  40. Digital Trainers Summit 3 - Circumvention Tech Festival, Spain
  41. Digital security and privacy session - Geek Girl festival, Kenya
  42. Digital security for Women, Bosnia
  43. Digital security for the Association of Media Women, Kenya
  44. Digital security meetup for women human rights defenders, Kenya
  45. Digital security open and weekly trainings, Mexico
  46. Digital security tips - Bar Camp Yangon,Myanmar
  47. Digital security training for Journalists, Myanmar
  48. Digital security training for antimining activists, Mexico
  49. Digital security training for central american activists, Guatemala
  50. Digital security training for students, Cambodia
  51. Digital security training for women activists from the Balkans, Macedonia
  52. Digital security training for women activists from the Balkans, Turkey
  53. Digital security trainings, weekly, Cambodia
  54. Digital security trainings for female journalists, Pakistan
  55. Digital security trainings for female students, Pakistan
  56. Digital security trainings for women, Pakistan
  57. Digital security workshop- LAVITS, Brasil
  58. Digital security workshop - Les Degommeuses
  59. Digital security workshop Les Dégommeuses - Paris
  60. Digital security workshop for environmental activists, Brasil
  61. Digital security workshops for women, UK
  62. Edit a thon - Feminisms, Mexico
  63. Editatona Mujeres Nicas
  64. El Experimento
  65. El taller más difícil
  66. Elegir aplicaciones seguras
  67. EnGENDERing digital security workshop - Circumvention Tech Festival, Spain
  68. Encryption trainings for journalists, Mexico
  69. Enviar un mensaje oculto (Esteganografía)
  70. Epu Txawün Pichikeche por una Infancia Libre y sin Represión, Wallmapu
  71. Escuela de Tecnología Libre: soñando otra internet, Ecuador
  72. Europarlament, Digitale Revolution Feminist, Brussels
  73. EventosLAC-PostGTI
  74. Experiencia Webinario Que no te callen
  75. F3mhack - Hacktona Feminista, Sao Paulo, Brasil
  76. Faraday Phone Pouch
  77. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Argentina
  78. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Indonesia
  79. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, La Plata, Argentina
  80. FemH3ck - EnRedadas, Nicaragua
  81. FemH3ck - Feminist Caravan 1200 km, Mexico
  82. FemH3ck - Hacking our practices: Gender and Technology, Mexico
  83. FemH3ck - Hacking our practices: Gender and Technology, Mexico Story
  84. FemH3ck - How the internet works for WHRD, Mexico
  85. FemH3ck - Round table Privacy and security in the Open IT Space, Serbia
  86. FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya
  87. FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya
  88. FemHack Bogotá 2016
  89. FemHack Managua 2016
  90. Femhack- Encryption and digital security workshop for cis, trans and queer women, Bangalore
  91. Feminist Campaigns
  92. Feminist Data Politics: Quantifying Bodies
  93. Feminist Internet Meeting, Malaysia
  94. Ficción especulativa
  95. Formacion Ciberactivismo, Cuenca, Ecuador
  96. Formacion Ciberactivismo, Santa Elena, Ecuador
  97. Formacion Seguridad Digital, El Salvador
  98. Frequently Asked Questions
  99. Funda de Faraday para el teléfono móvil
  100. Gender Gap Tech
  101. Gender Tech Co-creating a safe space
  102. Gender Tech Collective stories
  103. Gender Tech Herstory Exhibition
  104. Gender Tech Online/Offline Cyberfeminism
  105. Gender Tech Personal Experiences
  106. Gender Tech Personal Memories
  107. Gender Tech Privilege in Tech
  108. Gender Tech Researching VAW
  109. Gender and Feminist Initiatives
  110. Gender and Tech curricula sprint event, Berlin
  111. Gender and Technology Institute, Berlin
  112. Gender and Technology Institute, Ecuador
  113. Gender and Technology Institute, LAC, Start Up Meeting, Mexico
  114. Gender and Technology Institute, LAC, Start Up Meeting, Mexico DF
  115. Gender and Technology Institute, Panama
  116. Gender and Technology Institute, Uruguay
  117. Gender and Technology Institute + Privacy Camp, LAC, Start Up Meeting, Barcelona
  118. Gender and Technology Institute Asia
  119. Gender and Technology Institute Asia, Start up Meeting, Colombo, Skri Lanka
  120. Gender and Technology Institute LAC, Start Up Meeting, Managua, Nicaragua
  121. Gendersec training curricula
  122. Glossary
  123. Hacer un análisis de texto
  124. Hackaton - Feminism, Cambodia
  125. Hackaton - election monitoring platform, Guatemala
  126. Hackeando el patriarcado: la experiencia del primer Femhack
  127. Hackerspace Feminista. Quito, Ecuador
  128. Hands On How the internet works
  129. Hands On Understanding the group – Spectrogram
  130. Hands On What does your internet look like?
  131. Herramientas comunicacionales para la protección del territorio y naturaleza, Ecuador
  132. Holistic Security, Train Of Trainers, Germany
  133. Holistic Security, WHRD, Mexico
  134. Holistic Security - Demonstrating the interconnectedness
  135. Holistic digital security training for women activists - self care, Brasil
  136. Holistic digital security training for women journalists, Mexico
  137. Holistic digital security workshop for women, Brasil
  138. Holistic security - A day in your life
  139. Holistic security - Collective Memory
  140. Holistic security - Communications Security
  141. Holistic security - Self care
  142. Holistic security - What is Security?
  143. Holistic security training of trainers, Brasil
  144. How to administrate this wiki
  145. How to install and configure this wiki
  146. How to preload-category
  147. How to update this wiki
  148. IGF, InternetEsNuestra, Mexico
  149. II Festival Ciberfeminista, Tejiendo circuitos, Guatemala
  150. I Festival Ciberfeminista de Guatemala
  151. Including gender in privacy and digital security
  152. Install Party de conceptos de género
  153. Install party free software vs gender codes
  154. Install party software libre vs códigos de género
  155. International Journalism Festival - Perugia
  156. Internet Democracy Project: https://genderingsurveillance.internetdemocracy.in/safety apps howto/
  157. Internet Democracy Project - An Initiative at Point of View (Click for link)
  158. Internet Freedom Festival 1, Spain
  159. Internet Freedom Festival 2, Spain
  160. Internet Freedom Festival 3, Spain
  161. Internet Freedom Festival 4, Spain
  162. Internet Governance Forum, Cyber Security and Safer Internet, Sri Lanka
  163. Jornada de Autocuidado y Autoconocimiento para mujeres, wallmapu
  164. Jornadas de autocuidado feminista. Cuidado físico, emocional y digital, Colombia
  165. La rebeldía es contagiosa
  166. LadyFest Managua 2016
  167. Luchadoras, Tecnología con enfoque de género, Internet
  168. Manual introduction
  169. Manuals with a gender perspective
  170. Mobile Browsing
  171. Mobile Communication
  172. Mobiles: Alternatives
  173. Modificar metadatos
  174. Motivando a la Gyal, Medellin, Colombia
  175. Móvil 1: Funccionamiento
  176. Móvil 2: Complementos
  177. Móvil 3: Alternativas
  178. Network exploitation and monitoring
  179. Oficina Uso crítico y feminista de internet, Brasil
  180. Oficinas de cuidados digitais e segurança da comunicação, Salvador de bahia, Brasil
  181. Ominous dots
  182. One-to-one DigiSec trainings for activists, Argentina
  183. Online Harassment Support Initiatives
  184. Page:Crear un nuevo how to
  185. Page:Create a new how to
  186. Page:Storytelling
  187. Panel, Building feminist infrastructure, IFF, Spain
  188. Panel, Strategizing around online gender-based violence documentation and accompaniment practice, IFF, Spain
  189. Panel, Women Digital Trainers in LAC, IFF, Valencia
  190. Panel , Identiti Terancam di Internet (Threatened Identities on the Internet), Malaysia
  191. Panel Gender and Surveillance, Circumvention Tech Festival, Spain
  192. Panel Including Gender - Re-publica conference, Berlin
  193. Panel Women and Digital Security Field - Circumvention Tech Festival, Spain
  194. Pannel, L'internet critique, entre (des)illusions et spéculations. Marseille, France
  195. Performar en la red
  196. Permacultura digital
  197. Plataforma Ciberseguras, Mexico
  198. Plataformas de citas
  199. Primer Encuentro de Defensa Personal Feminista, Bogota, Colombia
  200. Privacy Analogue data shadows
  201. Privacy From data shadows to data brokers
  202. Privacy Presentation, Cali, Colombia
  203. Privacy awareness talks, Argentina
  204. Programa Luchadoras sobre GTI
  205. Proyecto Apoyo Activo, Mexico
  206. Radio, El desarmador, Bolivia
  207. Raperas Feministas LAC
  208. Readings Surveying for collective learnings into ressources
  209. Red pill or blue pill?
  210. Reunión Introductoria a la Protección Integral y Digital para Defensoras del Territorio, Ecuador
  211. Reverse engineering
  212. SEGUNDO CAMPAMENTO FEMINISTA PARA MUJERES JÓVENES, Oaxaca, Mexico
  213. Safe Mailing list
  214. Safe Space Offline
  215. Safe Space Wikipedia
  216. Safe Spaces Tweets
  217. SandBox
  218. SandBox/fr
  219. Screenings HackiNetIk, Mexico
  220. Security: Password security
  221. Security PGP 101
  222. Security disclaimer
  223. Seguridad Digital Para Activistas Coyhaique, Chile
  224. Seguridad digial para defensores de derechos humanos en contextos mineros
  225. Seguridad digial para defensores de derechos humanos en contextos mineros 2
  226. Seguridad digial para defensores de derechos humanos en contextos mineros 3
  227. Seguridad digital en campañas feministas
  228. Seguridad digital para grupos por el derecho a decidir
  229. Seguridad digital para la defensa personal feminista
  230. Self Care, Concentration
  231. Self care, Body
  232. Self care, Emotions
  233. Servers: From autonomous servers to feminist servers
  234. Sex and Security!, UK
  235. Shortest retrospective ever
  236. Step 0
  237. Stockholm Internet Forum (SIF), Gender equality, Stockholm
  238. Style guide for editing this wiki
  239. TAILS
  240. TTC
  241. Take back the tech
  242. Take control of the tech
  243. Talk, Training to privacy advocacy and digital security from a gender perspective, IFF, Valencia, Spain
  244. Talk Magic trick: how to make the women disappear, Transmit Festival, Praha
  245. Talk Online Misoginy, Pakistan
  246. Talk on Digital Security for Women Journalists, Wien, Austria
  247. Taller, Respuestas creativas a violencia on-line, La Plata, Argentina
  248. Taller, seguridad digital, Panama
  249. Taller, seguridad digital, Peru
  250. Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador
  251. Taller Culture Survival, Cuidados digitales feministas, Guatemala
  252. Taller Seguridad Digital, Feministas, Ecuador
  253. Taller Seguridad Digital, Hackeado al patriarcado, Peru
  254. Taller Seguridad Digital, RED de Grupos de Mujeres Rurales, Uruguay
  255. Taller Seguridad Digital, Republica Dominicana
  256. Taller Seguridad Digital, Via Campesina, Durango, Euskal Herria
  257. Taller de Software libre, autodefensa digital y seguridad feminista, Medellín-Colombia
  258. Taller de Telegram y Signal, Colombia
  259. Taller de cartografía y seguridad digital dirigido a mujeres, Oaxaca, Mexico
  260. Taller de postporno y software libre, Bogota, Colombia
  261. Taller de seguridad digital feminista, Bolivia
  262. Taller de seguridad para mujeres, Puebla, Mexico
  263. Taller inmersión de autodefensa digital feminista, Barcelona
  264. Taller sobre seguridad física, digital y demás chiches tecno-feministas, Paraguay
  265. Taller taller de redes sociales y seguridad, Colombia
  266. Test Manual
  267. Threat analysis
  268. Threat analysis - Digital Security Indicators
  269. Threat analysis - Individual responses to threat
  270. Threat analysis - Information Mapping I
  271. Threat analysis - Information Mapping II
  272. Threat analysis - Introducing context & risk analysis
  273. Threat analysis - Security planning
  274. Threat analysis - Situational analysis
  275. Threat analysis - Vision and Actor Mapping
  276. Threats and solutions
  277. Timeline of an anonymous journey
  278. Tracking your period: Data economy and the risks for privacy and security of (very) personal data
  279. Training, Digital Security and Online Safety Training Philippines
  280. Training: Training Skills I
  281. Training: Training design I
  282. Training: Training design II
  283. Training: Training design III
  284. Training: Training design IV
  285. Training about gender, privacy and security for WHRD, Nicaragua
  286. TransHackFeminist Convergence 2, Mexico
  287. Uncluttering electronic waste
  288. Uncluttering your life
  289. Uncluttering your mind
  290. Using technology to fight dangerous speech - Peace Tech exchange, Myanmar
  291. Usos creativos feministas de las redes sociales
  292. Violencias Conectadas, Nicaragua
  293. Web profunda (deep web)
  294. Webinar
  295. Webinar, HerNetHerRights, online conference
  296. Webinar, Seguridad servidores y elección de plataformas alojamiento web
  297. Webinar, Sexualidad, Derechos Reproductivos y Violencia en línea, Brasil
  298. Webinario, Estudio Cuerpos de Mujeres, Mexico
  299. What you need to know before using this manual
  300. Womanity award, Oui Share Festival, Paris, France
  301. Women activists from the Balkans, Macedonia
  302. Workshop, Architectures of online harassment, Berlin
  303. Workshop, Imagine, Create, Be. Gender and Technologies, IFF, Spain
  304. Workshop, Manuals with a gender perspective, IFF, Valencia
  305. Workshop, Other than women: Exploring harassment and difference online, Rightscon, Belgium
  306. Workshop, Regional networks for tackling gender-based online violence, IFF, Valencia
  307. Workshop: Health, sexuality, algorithms and data
  308. Workshop: Safer Nudes @Montreal, Canada
  309. Workshop Digital security, Tech sans Violence, RDC
  310. Workshop Feminists, Madrid, Spain
  311. ¿Cómo funciona la telefonía móvil y de que manera mitigar el rastreo de datos? (1ra parte)
  312. ¿Mascaras para nuestras identidades conectadas?

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)