Special

Orphaned pages

The following pages are not linked from or transcluded into other pages in Gender and Tech Resources.

Showing below up to 236 results in range #21 to #256.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. Conference, Les corps des femmes comme champ de bataille numériques en Amérique Latine, Orleans, France
  2. Conference Global Tech Women Voices, Internet
  3. Conference Pour une approche féministe et queer des technologies, Orleans, France
  4. Conmemoración dos años impunidad asesinato Macarena Valdes, Chile
  5. Contraseñas seguras
  6. Criptofiesta: ¡aprende a cifrar tus correos!
  7. Cryptocurrency (Buying things anonymously)
  8. Cryptodance
  9. Cuida los datos
  10. Cuidados, Concentración
  11. Cuidados, Cuerpo
  12. Cuidados, Descargar emociones
  13. DST̞Kenya̠2
  14. DataDetox
  15. Dating platforms
  16. Deep web
  17. Del IGT a Internet es Nuestra
  18. Detect false mobile antennas
  19. Detectar torres falsas de celular
  20. Diagnósticos en seguridad digital para organizaciones defensoras de derechos humanos y del territorio: un manual para facilitadores
  21. Diagnósticos en seguridad digital para organizaciones defensoras de derechos humanos y del territorio: un manual para facilitadores.
  22. Digital Security Assessment for Human Rights Organizations: A guide for facilitators
  23. Digital Security Training in Mexico
  24. Digital Security in Abya Yala, the land of vital blood.
  25. Digital Trainer Summit 1- Circumvention Tech Festival, Spain
  26. Digital Trainer Summit 2- Circumvention Tech Festival, Spain
  27. Digital Trainers Summit - Circumvention Tech Festival, Spain
  28. Digital Trainers Summit 3 - Circumvention Tech Festival, Spain
  29. Digital security for Women, Bosnia
  30. Digital security for the Association of Media Women, Kenya
  31. Digital security training for central american activists, Guatemala
  32. Digital security training for students, Cambodia
  33. Digital security trainings, weekly, Cambodia
  34. Digital security trainings for women, Pakistan
  35. Digital security workshop- LAVITS, Brasil
  36. Digital security workshop - Les Degommeuses
  37. Digital security workshop Les Dégommeuses - Paris
  38. Digital security workshop for environmental activists, Brasil
  39. Editatona Mujeres Nicas
  40. El Experimento
  41. El taller más difícil
  42. Elegir aplicaciones seguras
  43. Enviar un mensaje oculto (Esteganografía)
  44. Epu Txawün Pichikeche por una Infancia Libre y sin Represión, Wallmapu
  45. Escuela de Tecnología Libre: soñando otra internet, Ecuador
  46. Europarlament, Digitale Revolution Feminist, Brussels
  47. EventosLAC-PostGTI
  48. Experiencia Webinario Que no te callen
  49. Faraday Phone Pouch
  50. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Argentina
  51. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Indonesia
  52. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, La Plata, Argentina
  53. FemH3ck - Feminist Caravan 1200 km, Mexico
  54. FemH3ck - Hacking our practices: Gender and Technology, Mexico
  55. FemH3ck - Hacking our practices: Gender and Technology, Mexico Story
  56. FemH3ck - How the internet works for WHRD, Mexico
  57. FemH3ck - Round table Privacy and security in the Open IT Space, Serbia
  58. FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya
  59. FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya
  60. FemHack Bogotá 2016
  61. FemHack Managua 2016
  62. Femhack- Encryption and digital security workshop for cis, trans and queer women, Bangalore
  63. Feminist Campaigns
  64. Feminist Internet Meeting, Malaysia
  65. Ficción especulativa
  66. Formacion Ciberactivismo, Cuenca, Ecuador
  67. Formacion Ciberactivismo, Santa Elena, Ecuador
  68. Formacion Seguridad Digital, El Salvador
  69. Funda de Faraday para el teléfono móvil
  70. Gender Gap Tech
  71. Gender Tech Co-creating a safe space
  72. Gender Tech Collective stories
  73. Gender Tech Herstory Exhibition
  74. Gender Tech Online/Offline Cyberfeminism
  75. Gender Tech Personal Experiences
  76. Gender Tech Personal Memories
  77. Gender Tech Privilege in Tech
  78. Gender Tech Researching VAW
  79. Gender and Feminist Initiatives
  80. Gender and Tech curricula sprint event, Berlin
  81. Gender and Technology Institute, Berlin
  82. Gender and Technology Institute, Ecuador
  83. Gender and Technology Institute, LAC, Start Up Meeting, Mexico
  84. Gender and Technology Institute, Panama
  85. Gender and Technology Institute, Uruguay
  86. Gender and Technology Institute Asia
  87. Gendersec training curricula
  88. Glossary
  89. Hacer un análisis de texto
  90. Hackaton - Feminism, Cambodia
  91. Hackerspace Feminista. Quito, Ecuador
  92. Hands On Understanding the group – Spectrogram
  93. Hands On What does your internet look like?
  94. Herramientas comunicacionales para la protección del territorio y naturaleza, Ecuador
  95. Holistic Security, WHRD, Mexico
  96. Holistic Security - Demonstrating the interconnectedness
  97. Holistic digital security training for women activists - self care, Brasil
  98. Holistic digital security workshop for women, Brasil
  99. Holistic security training of trainers, Brasil
  100. How to administrate this wiki
  101. How to install and configure this wiki
  102. How to preload-category
  103. How to update this wiki
  104. II Festival Ciberfeminista, Tejiendo circuitos, Guatemala
  105. I Festival Ciberfeminista de Guatemala
  106. Install Party de conceptos de género
  107. Install party free software vs gender codes
  108. Install party software libre vs códigos de género
  109. Installing linux/en
  110. International Journalism Festival - Perugia
  111. Internet Democracy Project: https://genderingsurveillance.internetdemocracy.in/safety apps howto/
  112. Internet Freedom Festival 1, Spain
  113. Internet Freedom Festival 2, Spain
  114. Internet Freedom Festival 3, Spain
  115. Internet Freedom Festival 4, Spain
  116. Internet̙-Plumbing
  117. Jornada de Autocuidado y Autoconocimiento para mujeres, wallmapu
  118. Jornadas de autocuidado feminista. Cuidado físico, emocional y digital, Colombia
  119. La rebeldía es contagiosa
  120. LadyFest Managua 2016
  121. Linux - Installing/fr
  122. Luchadoras, Tecnología con enfoque de género, Internet
  123. Main Page
  124. Manuals with a gender perspective
  125. Mobile Communication
  126. Mobiles: Alternatives
  127. Modificar metadatos
  128. Motivando a la Gyal, Medellin, Colombia
  129. Oficinas de cuidados digitais e segurança da comunicação, Salvador de bahia, Brasil
  130. One-to-one DigiSec trainings for activists, Argentina
  131. Online Harassment Support Initiatives
  132. Page:Storytelling
  133. Panel, Building feminist infrastructure, IFF, Spain
  134. Panel, Strategizing around online gender-based violence documentation and accompaniment practice, IFF, Spain
  135. Panel, Women Digital Trainers in LAC, IFF, Valencia
  136. Panel Gender and Surveillance, Circumvention Tech Festival, Spain
  137. Panel Including Gender - Re-publica conference, Berlin
  138. Pannel, L'internet critique, entre (des)illusions et spéculations. Marseille, France
  139. Performar en la red
  140. Permacultura digital
  141. Plataforma Ciberseguras, Mexico
  142. Plataformas de citas
  143. Primer Encuentro de Defensa Personal Feminista, Bogota, Colombia
  144. Privacy Analogue data shadows
  145. Privacy From data shadows to data brokers
  146. Privacy Presentation, Cali, Colombia
  147. Programa Luchadoras sobre GTI
  148. Radio, El desarmador, Bolivia
  149. Raperas Feministas LAC
  150. Rastrear IP de sesión (Facebook)
  151. Readings Surveying for collective learnings into ressources
  152. Red pill or blue pill?
  153. Reunión Introductoria a la Protección Integral y Digital para Defensoras del Territorio, Ecuador
  154. SEGUNDO CAMPAMENTO FEMINISTA PARA MUJERES JÓVENES, Oaxaca, Mexico
  155. SandBox
  156. SandBox/fr
  157. Security: Password security
  158. Security PGP 101
  159. Seguridad Digital Para Activistas Coyhaique, Chile
  160. Seguridad digial para defensores de derechos humanos en contextos mineros
  161. Seguridad digial para defensores de derechos humanos en contextos mineros 2
  162. Seguridad digial para defensores de derechos humanos en contextos mineros 3
  163. Seguridad digital en campañas feministas
  164. Seguridad digital para grupos por el derecho a decidir
  165. Seguridad digital para la defensa personal feminista
  166. Self Care, Concentration
  167. Self care, Body
  168. Self care, Emotions
  169. Servers: From autonomous servers to feminist servers
  170. Step 0
  171. Step 3
  172. Stockholm Internet Forum (SIF), Gender equality, Stockholm
  173. TAILS
  174. TTC
  175. Take back the tech
  176. Talk, Training to privacy advocacy and digital security from a gender perspective, IFF, Valencia, Spain
  177. Talk Magic trick: how to make the women disappear, Transmit Festival, Praha
  178. Talk Online Misoginy, Pakistan
  179. Taller, seguridad digital, Panama
  180. Taller, seguridad digital, Peru
  181. Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador
  182. Taller Culture Survival, Cuidados digitales feministas, Guatemala
  183. Taller Seguridad Digital, Feministas, Ecuador
  184. Taller Seguridad Digital, RED de Grupos de Mujeres Rurales, Uruguay
  185. Taller Seguridad Digital, Via Campesina, Durango, Euskal Herria
  186. Taller de Software libre, autodefensa digital y seguridad feminista, Medellín-Colombia
  187. Taller de Telegram y Signal, Colombia
  188. Taller de cartografía y seguridad digital dirigido a mujeres, Oaxaca, Mexico
  189. Taller de seguridad digital feminista, Bolivia
  190. Taller de seguridad para mujeres, Puebla, Mexico
  191. Taller inmersión de autodefensa digital feminista, Barcelona
  192. Taller sobre seguridad física, digital y demás chiches tecno-feministas, Paraguay
  193. Taller taller de redes sociales y seguridad, Colombia
  194. Test Manual
  195. The Atlas of Online Harassment
  196. Threat analysis
  197. Threat analysis - Digital Security Indicators
  198. Threat analysis - Individual responses to threat
  199. Threat analysis - Information Mapping I
  200. Threat analysis - Information Mapping II
  201. Threat analysis - Introducing context & risk analysis
  202. Threat analysis - Security planning
  203. Threat analysis - Situational analysis
  204. Threat analysis - Vision and Actor Mapping
  205. Threat modeling the quick and dirty way
  206. Threats and solutions
  207. Timeline of an anonymous journey
  208. Training: Training Skills I
  209. Training: Training design I
  210. Training: Training design II
  211. Training: Training design III
  212. Training: Training design IV
  213. Training about gender, privacy and security for WHRD, Nicaragua
  214. TransHackFeminist Convergence 2, Mexico
  215. Uncluttering
  216. Usos creativos feministas de las redes sociales
  217. Webinar
  218. Webinar, HerNetHerRights, online conference
  219. Webinar, Seguridad servidores y elección de plataformas alojamiento web
  220. Webinar, Sexualidad, Derechos Reproductivos y Violencia en línea, Brasil
  221. Webinario, Estudio Cuerpos de Mujeres, Mexico
  222. What you need to know before using this manual
  223. Womanity award, Oui Share Festival, Paris, France
  224. Women's Safety Apps
  225. Women activists from the Balkans, Macedonia
  226. Workshop, Architectures of online harassment, Berlin
  227. Workshop, Imagine, Create, Be. Gender and Technologies, IFF, Spain
  228. Workshop, Manuals with a gender perspective, IFF, Valencia
  229. Workshop, Other than women: Exploring harassment and difference online, Rightscon, Belgium
  230. Workshop, Regional networks for tackling gender-based online violence, IFF, Valencia
  231. Workshop: Health, sexuality, algorithms and data
  232. Workshop: Safer Nudes @Montreal, Canada
  233. Workshop Digital security, Tech sans Violence, RDC
  234. Workshop Feminists, Madrid, Spain
  235. ¿Cómo funciona la telefonía móvil y de que manera mitigar el rastreo de datos? (1ra parte)
  236. ¿Mascaras para nuestras identidades conectadas?

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)