Difference between revisions of "Lesson 5 Further Reading"

 
Line 1: Line 1:
  
*How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10
+
*[https://securityinabox.org/en/chapter-10 How to use mobile phones as securely as possible]
  
*How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11
+
*[https://securityinabox.org/en/chapter-11 How to use smartphones as securely as possible ]
  
*Mobile Security https://securityinabox.org/en/portable_security
+
*[https://securityinabox.org/en/portable_security Mobile Security]
  
*Surveillance Self Defense https://ssd.eff.org/
+
*[https://ssd.eff.org/ Surveillance Self Defense]
  
*How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9
+
*[https://securityinabox.org/en/chapter-9 How to protect yourself and your data when using social networking sites]

Latest revision as of 21:39, 28 May 2014