Difference between revisions of "Lesson 5 Further Reading"

Ben (Talk | contribs)
Ben (Talk | contribs)
Line 1: Line 1:
  
How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10
+
*How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10
  
How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11
+
*How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11
  
Mobile Security https://securityinabox.org/en/portable_security
+
*Mobile Security https://securityinabox.org/en/portable_security
  
Surveillance Self Defense https://ssd.eff.org/
+
*Surveillance Self Defense https://ssd.eff.org/
  
How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9
+
*How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9

Revision as of 21:35, 28 May 2014

Last modified on 28 May 2014, at 21:35