Special

Pages without language links

The following pages do not link to other language versions.

Prefix  

Showing below up to 341 results in range #51 to #391.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. Cuidados, Concentración
  2. Cuidados, Cuerpo
  3. Cuidados, Descargar emociones
  4. DST̞Kenya̠2
  5. DataDetox
  6. Dating platforms
  7. Deep web
  8. Del IGT a Internet es Nuestra
  9. Detect false mobile antennas
  10. Detectar torres falsas de celular
  11. Diagnósticos en seguridad digital para organizaciones defensoras de derechos humanos y del territorio: un manual para facilitadores
  12. Diagnósticos en seguridad digital para organizaciones defensoras de derechos humanos y del territorio: un manual para facilitadores.
  13. Digital Security Assessment for Human Rights Organizations: A guide for facilitators
  14. Digital Security Training in Mexico
  15. Digital Security in Abya Yala, the land of vital blood.
  16. Digital Trainer Summit 1- Circumvention Tech Festival, Spain
  17. Digital Trainer Summit 2- Circumvention Tech Festival, Spain
  18. Digital Trainers Summit - Circumvention Tech Festival, Spain
  19. Digital Trainers Summit 3 - Circumvention Tech Festival, Spain
  20. Digital security and privacy session - Geek Girl festival, Kenya
  21. Digital security for Women, Bosnia
  22. Digital security for the Association of Media Women, Kenya
  23. Digital security meetup for women human rights defenders, Kenya
  24. Digital security open and weekly trainings, Mexico
  25. Digital security tips - Bar Camp Yangon,Myanmar
  26. Digital security training for Journalists, Myanmar
  27. Digital security training for antimining activists, Mexico
  28. Digital security training for central american activists, Guatemala
  29. Digital security training for political activists, Cuba
  30. Digital security training for students, Cambodia
  31. Digital security training for women activists from the Balkans, Macedonia
  32. Digital security training for women activists from the Balkans, Turkey
  33. Digital security trainings, weekly, Cambodia
  34. Digital security trainings for female journalists, Pakistan
  35. Digital security trainings for female students, Pakistan
  36. Digital security trainings for women, Pakistan
  37. Digital security workshop- LAVITS, Brasil
  38. Digital security workshop - Les Degommeuses
  39. Digital security workshop Les Dégommeuses - Paris
  40. Digital security workshop for environmental activists, Brasil
  41. Digital security workshops for women, UK
  42. Digital threats, detection, protection and (counter) moves
  43. Edit a thon - Feminisms, Mexico
  44. Editatona Mujeres Nicas
  45. El Experimento
  46. El taller más difícil
  47. Elegir aplicaciones seguras
  48. Elicitation
  49. EnGENDERing digital security workshop - Circumvention Tech Festival, Spain
  50. Encrypting everything
  51. Encryption trainings for journalists, Mexico
  52. Enviar un mensaje oculto (Esteganografía)
  53. Epu Txawün Pichikeche por una Infancia Libre y sin Represión, Wallmapu
  54. Escuela de Tecnología Libre: soñando otra internet, Ecuador
  55. Europarlament, Digitale Revolution Feminist, Brussels
  56. EventosLAC-PostGTI
  57. Experiencia Webinario Que no te callen
  58. F3mhack - Hacktona Feminista, Sao Paulo, Brasil
  59. Faraday Phone Pouch
  60. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Argentina
  61. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Indonesia
  62. FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, La Plata, Argentina
  63. FemH3ck - EnRedadas, Nicaragua
  64. FemH3ck - Feminist Caravan 1200 km, Mexico
  65. FemH3ck - Hacking our practices: Gender and Technology, Mexico
  66. FemH3ck - Hacking our practices: Gender and Technology, Mexico Story
  67. FemH3ck - How the internet works for WHRD, Mexico
  68. FemH3ck - Round table Privacy and security in the Open IT Space, Serbia
  69. FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya
  70. FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya
  71. FemHack Bogotá 2016
  72. FemHack Managua 2016
  73. Femhack- Encryption and digital security workshop for cis, trans and queer women, Bangalore
  74. Feminist Campaigns
  75. Feminist Data Politics: Quantifying Bodies
  76. Feminist Internet Meeting, Malaysia
  77. Ficción especulativa
  78. Formacion Ciberactivismo, Cuenca, Ecuador
  79. Formacion Ciberactivismo, Santa Elena, Ecuador
  80. Formacion Seguridad Digital, El Salvador
  81. Frequently Asked Questions
  82. Funda de Faraday para el teléfono móvil
  83. Game of drones
  84. Gender Gap Tech
  85. Gender Tech Co-creating a safe space
  86. Gender Tech Collective stories
  87. Gender Tech Herstory Exhibition
  88. Gender Tech Online/Offline Cyberfeminism
  89. Gender Tech Personal Experiences
  90. Gender Tech Personal Memories
  91. Gender Tech Privilege in Tech
  92. Gender Tech Researching VAW
  93. Gender and Feminist Initiatives
  94. Gender and Tech curricula sprint event, Berlin
  95. Gender and Technology Institute, Berlin
  96. Gender and Technology Institute, Ecuador
  97. Gender and Technology Institute, LAC, Start Up Meeting, Mexico
  98. Gender and Technology Institute, LAC, Start Up Meeting, Mexico DF
  99. Gender and Technology Institute, Panama
  100. Gender and Technology Institute, Uruguay
  101. Gender and Technology Institute + Privacy Camp, LAC, Start Up Meeting, Barcelona
  102. Gender and Technology Institute Asia
  103. Gender and Technology Institute Asia, Start up Meeting, Colombo, Skri Lanka
  104. Gender and Technology Institute LAC, Start Up Meeting, Managua, Nicaragua
  105. Gendersec training curricula
  106. Glossary
  107. Hacer un análisis de texto
  108. Hackaton - Feminism, Cambodia
  109. Hackaton - election monitoring platform, Guatemala
  110. Hackeando el patriarcado: la experiencia del primer Femhack
  111. Hackerspace Feminista. Quito, Ecuador
  112. Hands On How the internet works
  113. Hands On Understanding the group – Spectrogram
  114. Hands On What does your internet look like?
  115. Herramientas comunicacionales para la protección del territorio y naturaleza, Ecuador
  116. Holistic Security, Train Of Trainers, Germany
  117. Holistic Security, WHRD, Mexico
  118. Holistic Security - Demonstrating the interconnectedness
  119. Holistic digital security training for women activists - self care, Brasil
  120. Holistic digital security training for women journalists, Mexico
  121. Holistic digital security workshop for women, Brasil
  122. Holistic security - A day in your life
  123. Holistic security - Collective Memory
  124. Holistic security - Communications Security
  125. Holistic security - Self care
  126. Holistic security - What is Security?
  127. Holistic security training of trainers, Brasil
  128. How to administrate this wiki
  129. How to install and configure this wiki
  130. How to preload-category
  131. How to update this wiki
  132. IGF, InternetEsNuestra, Mexico
  133. II Festival Ciberfeminista, Tejiendo circuitos, Guatemala
  134. I Festival Ciberfeminista de Guatemala
  135. Including gender in privacy and digital security
  136. Install Party de conceptos de género
  137. Install party free software vs gender codes
  138. Install party software libre vs códigos de género
  139. Installing linux
  140. Installing linux/en
  141. International Journalism Festival - Perugia
  142. Internet Democracy Project: https://genderingsurveillance.internetdemocracy.in/safety apps howto/
  143. Internet Democracy Project - An Initiative at Point of View (Click for link)
  144. Internet Freedom Festival 1, Spain
  145. Internet Freedom Festival 2, Spain
  146. Internet Freedom Festival 3, Spain
  147. Internet Freedom Festival 4, Spain
  148. Internet Governance Forum, Cyber Security and Safer Internet, Sri Lanka
  149. Internet̙-Plumbing
  150. Jornada de Autocuidado y Autoconocimiento para mujeres, wallmapu
  151. Jornadas de autocuidado feminista. Cuidado físico, emocional y digital, Colombia
  152. Kinky linux command-line
  153. La rebeldía es contagiosa
  154. LadyFest Managua 2016
  155. Linux - Installing/fr
  156. Linux applications
  157. Linux development process
  158. Linux security
  159. Linux server security
  160. Linux virtualisation
  161. Luchadoras, Tecnología con enfoque de género, Internet
  162. Main Page
  163. Making our own linux images
  164. Manual introduction
  165. Manuals with a gender perspective
  166. Mobile Browsing
  167. Mobile Communication
  168. Mobiles: Alternatives
  169. Modificar metadatos
  170. Motivando a la Gyal, Medellin, Colombia
  171. Móvil 1: Funccionamiento
  172. Móvil 2: Complementos
  173. Móvil 3: Alternativas
  174. Network exploitation and monitoring
  175. Networking concepts
  176. Object encryption on linux
  177. Oficina Uso crítico y feminista de internet, Brasil
  178. Oficinas de cuidados digitais e segurança da comunicação, Salvador de bahia, Brasil
  179. Ominous dots
  180. One-to-one DigiSec trainings for activists, Argentina
  181. Online Harassment Support Initiatives
  182. Page:Crear un nuevo how to
  183. Page:Create a new how to
  184. Page:Storytelling
  185. Panel, Building feminist infrastructure, IFF, Spain
  186. Panel, Strategizing around online gender-based violence documentation and accompaniment practice, IFF, Spain
  187. Panel, Women Digital Trainers in LAC, IFF, Valencia
  188. Panel , Identiti Terancam di Internet (Threatened Identities on the Internet), Malaysia
  189. Panel Gender and Surveillance, Circumvention Tech Festival, Spain
  190. Panel Including Gender - Re-publica conference, Berlin
  191. Panel Women and Digital Security Field - Circumvention Tech Festival, Spain
  192. Pannel, L'internet critique, entre (des)illusions et spéculations. Marseille, France
  193. Performar en la red
  194. Permacultura digital
  195. Petty tyrants
  196. Plataforma Ciberseguras, Mexico
  197. Plataformas de citas
  198. Primer Encuentro de Defensa Personal Feminista, Bogota, Colombia
  199. Privacy Analogue data shadows
  200. Privacy From data shadows to data brokers
  201. Privacy Presentation, Cali, Colombia
  202. Privacy awareness talks, Argentina
  203. Programa Luchadoras sobre GTI
  204. Propaganda
  205. Protest threats, detection, protection and (counter) moves
  206. Proyecto Apoyo Activo, Mexico
  207. Psychological warfare
  208. Radio, El desarmador, Bolivia
  209. Raperas Feministas LAC
  210. Rastrear IP de sesión (Facebook)
  211. Readings Surveying for collective learnings into ressources
  212. Reconnaissance
  213. Red pill or blue pill?
  214. Resources
  215. Reunión Introductoria a la Protección Integral y Digital para Defensoras del Territorio, Ecuador
  216. Reverse engineering
  217. Roleplay
  218. SEGUNDO CAMPAMENTO FEMINISTA PARA MUJERES JÓVENES, Oaxaca, Mexico
  219. Safe Collaborative Tools
  220. Safe Mailing list
  221. Safe Space Offline
  222. Safe Space Wikipedia
  223. Safe Spaces Tweets
  224. SandBox
  225. SandBox/fr
  226. Scenario planning
  227. Screenings HackiNetIk, Mexico
  228. Security: Password security
  229. Security PGP 101
  230. Security disclaimer
  231. Seguridad Digital Para Activistas Coyhaique, Chile
  232. Seguridad digial para defensores de derechos humanos en contextos mineros
  233. Seguridad digial para defensores de derechos humanos en contextos mineros 2
  234. Seguridad digial para defensores de derechos humanos en contextos mineros 3
  235. Seguridad digital en campañas feministas
  236. Seguridad digital para grupos por el derecho a decidir
  237. Seguridad digital para la defensa personal feminista
  238. Self-dox
  239. Self Care, Concentration
  240. Self care, Body
  241. Self care, Emotions
  242. Servers: From autonomous servers to feminist servers
  243. Sex and Security!, UK
  244. Shell scripting
  245. Shortest retrospective ever
  246. Simulation: Game of Goose
  247. Simulation: Mixnets
  248. Simulations
  249. Step 0
  250. Step 1
  251. Step 2
  252. Step 3
  253. Stockholm Internet Forum (SIF), Gender equality, Stockholm
  254. Style guide for editing this wiki
  255. Surveillance
  256. TAILS
  257. TTC
  258. Take back the tech
  259. Take control of the tech
  260. Talk, Training to privacy advocacy and digital security from a gender perspective, IFF, Valencia, Spain
  261. Talk Magic trick: how to make the women disappear, Transmit Festival, Praha
  262. Talk Online Misoginy, Pakistan
  263. Talk on Digital Security for Women Journalists, Wien, Austria
  264. Taller, Respuestas creativas a violencia on-line, La Plata, Argentina
  265. Taller, seguridad digital, Panama
  266. Taller, seguridad digital, Peru
  267. Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador
  268. Taller Culture Survival, Cuidados digitales feministas, Guatemala
  269. Taller Seguridad Digital, Feministas, Ecuador
  270. Taller Seguridad Digital, Hackeado al patriarcado, Peru
  271. Taller Seguridad Digital, RED de Grupos de Mujeres Rurales, Uruguay
  272. Taller Seguridad Digital, Republica Dominicana
  273. Taller Seguridad Digital, Via Campesina, Durango, Euskal Herria
  274. Taller de Software libre, autodefensa digital y seguridad feminista, Medellín-Colombia
  275. Taller de Telegram y Signal, Colombia
  276. Taller de cartografía y seguridad digital dirigido a mujeres, Oaxaca, Mexico
  277. Taller de postporno y software libre, Bogota, Colombia
  278. Taller de seguridad digital feminista, Bolivia
  279. Taller de seguridad para mujeres, Puebla, Mexico
  280. Taller inmersión de autodefensa digital feminista, Barcelona
  281. Taller sobre seguridad física, digital y demás chiches tecno-feministas, Paraguay
  282. Taller taller de redes sociales y seguridad, Colombia
  283. Test Manual
  284. The Atlas of Online Harassment
  285. Threat analysis
  286. Threat analysis - Digital Security Indicators
  287. Threat analysis - Individual responses to threat
  288. Threat analysis - Information Mapping I
  289. Threat analysis - Information Mapping II
  290. Threat analysis - Introducing context & risk analysis
  291. Threat analysis - Security planning
  292. Threat analysis - Situational analysis
  293. Threat analysis - Vision and Actor Mapping
  294. Threat modeling the quick and dirty way
  295. Threats, detection, protection and (counter) moves
  296. Threats and solutions
  297. Timeline masters of the internet
  298. Timeline merchants of death
  299. Timeline of an anonymous journey
  300. Timeline that is soooo 1984 ...
  301. Tracking your period: Data economy and the risks for privacy and security of (very) personal data
  302. Training, Digital Security and Online Safety Training Philippines
  303. Training: Training Skills I
  304. Training: Training design I
  305. Training: Training design II
  306. Training: Training design III
  307. Training: Training design IV
  308. Training about gender, privacy and security for WHRD, Nicaragua
  309. TransHackFeminist Convergence 2, Mexico
  310. Trolling
  311. Uncluttering
  312. Uncluttering electronic waste
  313. Uncluttering your life
  314. Uncluttering your machine
  315. Uncluttering your mind
  316. Une bibliotheque publique par nous-même : Construire des bibliothèques numériques féministes
  317. Using technology to fight dangerous speech - Peace Tech exchange, Myanmar
  318. Usos creativos feministas de las redes sociales
  319. Violencias Conectadas, Nicaragua
  320. Web profunda (deep web)
  321. Webinar
  322. Webinar, HerNetHerRights, online conference
  323. Webinar, Seguridad servidores y elección de plataformas alojamiento web
  324. Webinar, Sexualidad, Derechos Reproductivos y Violencia en línea, Brasil
  325. Webinario, Estudio Cuerpos de Mujeres, Mexico
  326. What you need to know before using this manual
  327. Womanity award, Oui Share Festival, Paris, France
  328. Women's Safety Apps
  329. Women activists from the Balkans, Macedonia
  330. Wordsmithing
  331. Workshop, Architectures of online harassment, Berlin
  332. Workshop, Imagine, Create, Be. Gender and Technologies, IFF, Spain
  333. Workshop, Manuals with a gender perspective, IFF, Valencia
  334. Workshop, Other than women: Exploring harassment and difference online, Rightscon, Belgium
  335. Workshop, Regional networks for tackling gender-based online violence, IFF, Valencia
  336. Workshop: Health, sexuality, algorithms and data
  337. Workshop: Safer Nudes @Montreal, Canada
  338. Workshop Digital security, Tech sans Violence, RDC
  339. Workshop Feminists, Madrid, Spain
  340. ¿Cómo funciona la telefonía móvil y de que manera mitigar el rastreo de datos? (1ra parte)
  341. ¿Mascaras para nuestras identidades conectadas?

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)