- Circumventing Censorship + (27 May 2014 19:29:06)
- File:Usingaproxy2.jpg + (27 May 2014 19:29:32)
- File:StupidCensorship.jpg + (27 May 2014 19:29:52)
- File:Proxyserver3.jpg + (27 May 2014 19:30:17)
- File:Tor3.png + (27 May 2014 19:30:37)
- Lesson 3 Exercises + (27 May 2014 19:34:30)
- File:Encrypting4.png + (27 May 2014 19:41:36)
- File:Truecrypt.jpg + (27 May 2014 19:42:01)
- File:Destroydata4.png + (27 May 2014 19:46:28)
- File:Temporaryfiles4.gif + (27 May 2014 19:48:51)
- IP forensics + (27 May 2014 20:03:51)
- File:Emailspoofing5.png + (27 May 2014 20:04:11)
- Email spoofing + (27 May 2014 20:08:55)
- Data Forensics + (27 May 2014 20:14:25)
- File:Properties5.jpg + (27 May 2014 20:14:45)
- File:Metadata5.jpg + (27 May 2014 20:15:05)
- Profiling + (27 May 2014 20:16:31)
- Mobile profiling and surveillance + (27 May 2014 20:19:03)
- File:Mobileprofiling.png + (27 May 2014 20:19:24)
- File:Distancetotowers5.png + (27 May 2014 20:19:52)