- Encrypted connections + (27 May 2014 18:52:51)
- Instant Messaging and VoIP + (27 May 2014 18:54:38)
- Using a VPN for Secure Internet Browsing + (27 May 2014 18:55:17)
- File:URLblocking.jpg + (27 May 2014 19:09:18)
- File:IPbanning.jpg + (27 May 2014 19:09:37)
- File:Keywordfiltering.jpg + (27 May 2014 19:09:59)
- File:DNStampering.jpg + (27 May 2014 19:10:19)
- File:IPrequesting.png + (27 May 2014 19:11:03)
- File:SiteBlocked3.png + (27 May 2014 19:11:27)
- File:Blocksite23.png + (27 May 2014 19:11:56)
- Internet Censorship + (27 May 2014 19:17:40)
- Circumventing Censorship + (27 May 2014 19:29:06)
- File:Usingaproxy2.jpg + (27 May 2014 19:29:32)
- File:StupidCensorship.jpg + (27 May 2014 19:29:52)
- File:Proxyserver3.jpg + (27 May 2014 19:30:17)
- File:Tor3.png + (27 May 2014 19:30:37)
- Lesson 3 Exercises + (27 May 2014 19:34:30)
- File:Encrypting4.png + (27 May 2014 19:41:36)
- File:Truecrypt.jpg + (27 May 2014 19:42:01)
- File:Destroydata4.png + (27 May 2014 19:46:28)
- File:Temporaryfiles4.gif + (27 May 2014 19:48:51)