Difference between revisions of "Lesson 3 Further Reading"
| Line 1: | Line 1: | ||
| − | http://flossmanuals.net/basic-internet-security/ | + | *http://flossmanuals.net/basic-internet-security/ |
How to keep your Internet communications private | How to keep your Internet communications private | ||
| Line 7: | Line 7: | ||
Read through a couple of interesting guides on how you can set-up public key data encryption for your email communications. | Read through a couple of interesting guides on how you can set-up public key data encryption for your email communications. | ||
| − | https://flossmanuals.net/basic-internet-security/ch027_mail-encryption-gpg | + | *https://flossmanuals.net/basic-internet-security/ch027_mail-encryption-gpg |
| − | http://equalit.ie/esecman/chapter2_4.html#2_4b | + | *http://equalit.ie/esecman/chapter2_4.html#2_4b |
| − | https://securityinabox.org/en/thuderbird_encryption | + | *https://securityinabox.org/en/thuderbird_encryption |
| − | https://www.vaultletsoft.com | + | *https://www.vaultletsoft.com |
| − | https://www.enlocked.com | + | *https://www.enlocked.com |
Revision as of 21:37, 28 May 2014
How to keep your Internet communications private
Public Key Encryption
Read through a couple of interesting guides on how you can set-up public key data encryption for your email communications.