Special

Pages without language links

The following pages do not link to other language versions.

Prefix  

Showing below up to 291 results in range #101 to #391.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. Encryption trainings for journalists, Mexico
  2. Enviar un mensaje oculto (Esteganografía)
  3. Epu Txawün Pichikeche por una Infancia Libre y sin Represión, Wallmapu
  4. Escuela de Tecnología Libre: soñando otra internet, Ecuador
  5. Europarlament, Digitale Revolution Feminist, Brussels
  6. EventosLAC-PostGTI
  7. Experiencia Webinario Que no te callen
  8. F3mhack - Hacktona Feminista, Sao Paulo, Brasil
  9. Faraday Phone Pouch
  10. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Argentina
  11. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Indonesia
  12. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, La Plata, Argentina
  13. FemH3ck - EnRedadas, Nicaragua
  14. FemH3ck - Feminist Caravan 1200 km, Mexico
  15. FemH3ck - Hacking our practices: Gender and Technology, Mexico
  16. FemH3ck - Hacking our practices: Gender and Technology, Mexico Story
  17. FemH3ck - How the internet works for WHRD, Mexico
  18. FemH3ck - Round table Privacy and security in the Open IT Space, Serbia
  19. FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya
  20. FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya
  21. FemHack Bogotá 2016
  22. FemHack Managua 2016
  23. Femhack- Encryption and digital security workshop for cis, trans and queer women, Bangalore
  24. Feminist Campaigns
  25. Feminist Data Politics: Quantifying Bodies
  26. Feminist Internet Meeting, Malaysia
  27. Ficción especulativa
  28. Formacion Ciberactivismo, Cuenca, Ecuador
  29. Formacion Ciberactivismo, Santa Elena, Ecuador
  30. Formacion Seguridad Digital, El Salvador
  31. Frequently Asked Questions
  32. Funda de Faraday para el teléfono móvil
  33. Game of drones
  34. Gender Gap Tech
  35. Gender Tech Co-creating a safe space
  36. Gender Tech Collective stories
  37. Gender Tech Herstory Exhibition
  38. Gender Tech Online/Offline Cyberfeminism
  39. Gender Tech Personal Experiences
  40. Gender Tech Personal Memories
  41. Gender Tech Privilege in Tech
  42. Gender Tech Researching VAW
  43. Gender and Feminist Initiatives
  44. Gender and Tech curricula sprint event, Berlin
  45. Gender and Technology Institute, Berlin
  46. Gender and Technology Institute, Ecuador
  47. Gender and Technology Institute, LAC, Start Up Meeting, Mexico
  48. Gender and Technology Institute, LAC, Start Up Meeting, Mexico DF
  49. Gender and Technology Institute, Panama
  50. Gender and Technology Institute, Uruguay
  51. Gender and Technology Institute + Privacy Camp, LAC, Start Up Meeting, Barcelona
  52. Gender and Technology Institute Asia
  53. Gender and Technology Institute Asia, Start up Meeting, Colombo, Skri Lanka
  54. Gender and Technology Institute LAC, Start Up Meeting, Managua, Nicaragua
  55. Gendersec training curricula
  56. Glossary
  57. Hacer un análisis de texto
  58. Hackaton - Feminism, Cambodia
  59. Hackaton - election monitoring platform, Guatemala
  60. Hackeando el patriarcado: la experiencia del primer Femhack
  61. Hackerspace Feminista. Quito, Ecuador
  62. Hands On How the internet works
  63. Hands On Understanding the group – Spectrogram
  64. Hands On What does your internet look like?
  65. Herramientas comunicacionales para la protección del territorio y naturaleza, Ecuador
  66. Holistic Security, Train Of Trainers, Germany
  67. Holistic Security, WHRD, Mexico
  68. Holistic Security - Demonstrating the interconnectedness
  69. Holistic digital security training for women activists - self care, Brasil
  70. Holistic digital security training for women journalists, Mexico
  71. Holistic digital security workshop for women, Brasil
  72. Holistic security - A day in your life
  73. Holistic security - Collective Memory
  74. Holistic security - Communications Security
  75. Holistic security - Self care
  76. Holistic security - What is Security?
  77. Holistic security training of trainers, Brasil
  78. How to administrate this wiki
  79. How to install and configure this wiki
  80. How to preload-category
  81. How to update this wiki
  82. IGF, InternetEsNuestra, Mexico
  83. II Festival Ciberfeminista, Tejiendo circuitos, Guatemala
  84. I Festival Ciberfeminista de Guatemala
  85. Including gender in privacy and digital security
  86. Install Party de conceptos de género
  87. Install party free software vs gender codes
  88. Install party software libre vs códigos de género
  89. Installing linux
  90. Installing linux/en
  91. International Journalism Festival - Perugia
  92. Internet Democracy Project: https://genderingsurveillance.internetdemocracy.in/safety apps howto/
  93. Internet Democracy Project - An Initiative at Point of View (Click for link)
  94. Internet Freedom Festival 1, Spain
  95. Internet Freedom Festival 2, Spain
  96. Internet Freedom Festival 3, Spain
  97. Internet Freedom Festival 4, Spain
  98. Internet Governance Forum, Cyber Security and Safer Internet, Sri Lanka
  99. Internet̙-Plumbing
  100. Jornada de Autocuidado y Autoconocimiento para mujeres, wallmapu
  101. Jornadas de autocuidado feminista. Cuidado físico, emocional y digital, Colombia
  102. Kinky linux command-line
  103. La rebeldía es contagiosa
  104. LadyFest Managua 2016
  105. Linux - Installing/fr
  106. Linux applications
  107. Linux development process
  108. Linux security
  109. Linux server security
  110. Linux virtualisation
  111. Luchadoras, Tecnología con enfoque de género, Internet
  112. Main Page
  113. Making our own linux images
  114. Manual introduction
  115. Manuals with a gender perspective
  116. Mobile Browsing
  117. Mobile Communication
  118. Mobiles: Alternatives
  119. Modificar metadatos
  120. Motivando a la Gyal, Medellin, Colombia
  121. Móvil 1: Funccionamiento
  122. Móvil 2: Complementos
  123. Móvil 3: Alternativas
  124. Network exploitation and monitoring
  125. Networking concepts
  126. Object encryption on linux
  127. Oficina Uso crítico y feminista de internet, Brasil
  128. Oficinas de cuidados digitais e segurança da comunicação, Salvador de bahia, Brasil
  129. Ominous dots
  130. One-to-one DigiSec trainings for activists, Argentina
  131. Online Harassment Support Initiatives
  132. Page:Crear un nuevo how to
  133. Page:Create a new how to
  134. Page:Storytelling
  135. Panel, Building feminist infrastructure, IFF, Spain
  136. Panel, Strategizing around online gender-based violence documentation and accompaniment practice, IFF, Spain
  137. Panel, Women Digital Trainers in LAC, IFF, Valencia
  138. Panel , Identiti Terancam di Internet (Threatened Identities on the Internet), Malaysia
  139. Panel Gender and Surveillance, Circumvention Tech Festival, Spain
  140. Panel Including Gender - Re-publica conference, Berlin
  141. Panel Women and Digital Security Field - Circumvention Tech Festival, Spain
  142. Pannel, L'internet critique, entre (des)illusions et spéculations. Marseille, France
  143. Performar en la red
  144. Permacultura digital
  145. Petty tyrants
  146. Plataforma Ciberseguras, Mexico
  147. Plataformas de citas
  148. Primer Encuentro de Defensa Personal Feminista, Bogota, Colombia
  149. Privacy Analogue data shadows
  150. Privacy From data shadows to data brokers
  151. Privacy Presentation, Cali, Colombia
  152. Privacy awareness talks, Argentina
  153. Programa Luchadoras sobre GTI
  154. Propaganda
  155. Protest threats, detection, protection and (counter) moves
  156. Proyecto Apoyo Activo, Mexico
  157. Psychological warfare
  158. Radio, El desarmador, Bolivia
  159. Raperas Feministas LAC
  160. Rastrear IP de sesión (Facebook)
  161. Readings Surveying for collective learnings into ressources
  162. Reconnaissance
  163. Red pill or blue pill?
  164. Resources
  165. Reunión Introductoria a la Protección Integral y Digital para Defensoras del Territorio, Ecuador
  166. Reverse engineering
  167. Roleplay
  168. SEGUNDO CAMPAMENTO FEMINISTA PARA MUJERES JÓVENES, Oaxaca, Mexico
  169. Safe Collaborative Tools
  170. Safe Mailing list
  171. Safe Space Offline
  172. Safe Space Wikipedia
  173. Safe Spaces Tweets
  174. SandBox
  175. SandBox/fr
  176. Scenario planning
  177. Screenings HackiNetIk, Mexico
  178. Security: Password security
  179. Security PGP 101
  180. Security disclaimer
  181. Seguridad Digital Para Activistas Coyhaique, Chile
  182. Seguridad digial para defensores de derechos humanos en contextos mineros
  183. Seguridad digial para defensores de derechos humanos en contextos mineros 2
  184. Seguridad digial para defensores de derechos humanos en contextos mineros 3
  185. Seguridad digital en campañas feministas
  186. Seguridad digital para grupos por el derecho a decidir
  187. Seguridad digital para la defensa personal feminista
  188. Self-dox
  189. Self Care, Concentration
  190. Self care, Body
  191. Self care, Emotions
  192. Servers: From autonomous servers to feminist servers
  193. Sex and Security!, UK
  194. Shell scripting
  195. Shortest retrospective ever
  196. Simulation: Game of Goose
  197. Simulation: Mixnets
  198. Simulations
  199. Step 0
  200. Step 1
  201. Step 2
  202. Step 3
  203. Stockholm Internet Forum (SIF), Gender equality, Stockholm
  204. Style guide for editing this wiki
  205. Surveillance
  206. TAILS
  207. TTC
  208. Take back the tech
  209. Take control of the tech
  210. Talk, Training to privacy advocacy and digital security from a gender perspective, IFF, Valencia, Spain
  211. Talk Magic trick: how to make the women disappear, Transmit Festival, Praha
  212. Talk Online Misoginy, Pakistan
  213. Talk on Digital Security for Women Journalists, Wien, Austria
  214. Taller, Respuestas creativas a violencia on-line, La Plata, Argentina
  215. Taller, seguridad digital, Panama
  216. Taller, seguridad digital, Peru
  217. Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador
  218. Taller Culture Survival, Cuidados digitales feministas, Guatemala
  219. Taller Seguridad Digital, Feministas, Ecuador
  220. Taller Seguridad Digital, Hackeado al patriarcado, Peru
  221. Taller Seguridad Digital, RED de Grupos de Mujeres Rurales, Uruguay
  222. Taller Seguridad Digital, Republica Dominicana
  223. Taller Seguridad Digital, Via Campesina, Durango, Euskal Herria
  224. Taller de Software libre, autodefensa digital y seguridad feminista, Medellín-Colombia
  225. Taller de Telegram y Signal, Colombia
  226. Taller de cartografía y seguridad digital dirigido a mujeres, Oaxaca, Mexico
  227. Taller de postporno y software libre, Bogota, Colombia
  228. Taller de seguridad digital feminista, Bolivia
  229. Taller de seguridad para mujeres, Puebla, Mexico
  230. Taller inmersión de autodefensa digital feminista, Barcelona
  231. Taller sobre seguridad física, digital y demás chiches tecno-feministas, Paraguay
  232. Taller taller de redes sociales y seguridad, Colombia
  233. Test Manual
  234. The Atlas of Online Harassment
  235. Threat analysis
  236. Threat analysis - Digital Security Indicators
  237. Threat analysis - Individual responses to threat
  238. Threat analysis - Information Mapping I
  239. Threat analysis - Information Mapping II
  240. Threat analysis - Introducing context & risk analysis
  241. Threat analysis - Security planning
  242. Threat analysis - Situational analysis
  243. Threat analysis - Vision and Actor Mapping
  244. Threat modeling the quick and dirty way
  245. Threats, detection, protection and (counter) moves
  246. Threats and solutions
  247. Timeline masters of the internet
  248. Timeline merchants of death
  249. Timeline of an anonymous journey
  250. Timeline that is soooo 1984 ...
  251. Tracking your period: Data economy and the risks for privacy and security of (very) personal data
  252. Training, Digital Security and Online Safety Training Philippines
  253. Training: Training Skills I
  254. Training: Training design I
  255. Training: Training design II
  256. Training: Training design III
  257. Training: Training design IV
  258. Training about gender, privacy and security for WHRD, Nicaragua
  259. TransHackFeminist Convergence 2, Mexico
  260. Trolling
  261. Uncluttering
  262. Uncluttering electronic waste
  263. Uncluttering your life
  264. Uncluttering your machine
  265. Uncluttering your mind
  266. Une bibliotheque publique par nous-même : Construire des bibliothèques numériques féministes
  267. Using technology to fight dangerous speech - Peace Tech exchange, Myanmar
  268. Usos creativos feministas de las redes sociales
  269. Violencias Conectadas, Nicaragua
  270. Web profunda (deep web)
  271. Webinar
  272. Webinar, HerNetHerRights, online conference
  273. Webinar, Seguridad servidores y elección de plataformas alojamiento web
  274. Webinar, Sexualidad, Derechos Reproductivos y Violencia en línea, Brasil
  275. Webinario, Estudio Cuerpos de Mujeres, Mexico
  276. What you need to know before using this manual
  277. Womanity award, Oui Share Festival, Paris, France
  278. Women's Safety Apps
  279. Women activists from the Balkans, Macedonia
  280. Wordsmithing
  281. Workshop, Architectures of online harassment, Berlin
  282. Workshop, Imagine, Create, Be. Gender and Technologies, IFF, Spain
  283. Workshop, Manuals with a gender perspective, IFF, Valencia
  284. Workshop, Other than women: Exploring harassment and difference online, Rightscon, Belgium
  285. Workshop, Regional networks for tackling gender-based online violence, IFF, Valencia
  286. Workshop: Health, sexuality, algorithms and data
  287. Workshop: Safer Nudes @Montreal, Canada
  288. Workshop Digital security, Tech sans Violence, RDC
  289. Workshop Feminists, Madrid, Spain
  290. ¿Cómo funciona la telefonía móvil y de que manera mitigar el rastreo de datos? (1ra parte)
  291. ¿Mascaras para nuestras identidades conectadas?

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)