User contributions
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)
- 18:51, 27 May 2014 (diff | hist) . . (+1) . . Encrypted connections
- 18:51, 27 May 2014 (diff | hist) . . (+1) . . Encrypted connections
- 18:51, 27 May 2014 (diff | hist) . . (-8) . . Encrypted connections
- 18:50, 27 May 2014 (diff | hist) . . (+17) . . Encrypted connections
- 18:49, 27 May 2014 (diff | hist) . . (+5) . . Encrypted connections
- 18:48, 27 May 2014 (diff | hist) . . (+6) . . Encrypted connections
- 18:47, 27 May 2014 (diff | hist) . . (+975) . . N Using a VPN for Secure Internet Browsing (Created page with "Open Source VoIP alternatives There has been a lot of movement to develop and release secure protocols and software for VoIP communications. Some of them are developed by the ...")
- 18:47, 27 May 2014 (diff | hist) . . (-977) . . Instant Messaging and VoIP
- 18:46, 27 May 2014 (diff | hist) . . (0) . . Instant Messaging and VoIP
- 18:45, 27 May 2014 (diff | hist) . . (+23) . . Instant Messaging and VoIP
- 18:39, 27 May 2014 (diff | hist) . . (+22) . . Encrypted connections
- 18:38, 27 May 2014 (diff | hist) . . (0) . . N File:Mailencryption.jpg (current)
- 18:37, 27 May 2014 (diff | hist) . . (0) . . N File:Webmail.jpg (current)
- 18:37, 27 May 2014 (diff | hist) . . (+59) . . Encrypted connections
- 18:35, 27 May 2014 (diff | hist) . . (+24) . . Encrypted connections
- 18:33, 27 May 2014 (diff | hist) . . (0) . . Encrypted connections
- 18:32, 27 May 2014 (diff | hist) . . (0) . . N File:HTTP.png (current)
- 18:31, 27 May 2014 (diff | hist) . . (0) . . N File:SSL.png (current)
- 18:31, 27 May 2014 (diff | hist) . . (+32) . . Encrypted connections
- 21:04, 15 May 2014 (diff | hist) . . (-1) . . Encrypted connections
- 21:41, 12 May 2014 (diff | hist) . . (+175) . . Lesson 5 Further Reading
- 21:39, 12 May 2014 (diff | hist) . . (+231) . . N Lesson 5 Further Reading (Created page with " How to use mobile phones as securely as possible How to use smartphones as securely as possible Mobile Security Surveillance Self Defense How to protect y...")
- 21:27, 12 May 2014 (diff | hist) . . (+598) . . N Lesson 5 Exercises (Created page with "'''Exercise 1''' Send yourself a spoofed email from http://emkei.cz/ '''Exercise 2''' Install the Google Chrome extension or use the online version of http://regex.info/exif....") (current)
- 21:21, 12 May 2014 (diff | hist) . . (+3,404) . . N Mobile profiling and surveillance (Created page with "The world of digital mobile communications operates on largely similar principles to the Internet. Your mobile device has a unique number, received its connection from a regio...")
- 21:12, 12 May 2014 (diff | hist) . . (-74) . . Profiling
- 21:02, 12 May 2014 (diff | hist) . . (+1,856) . . N Profiling (Created page with "Modern technology is a lot more pervasive and invasive in the way it amasses personal information and compiles profiles of our identity and persona. Analysis of these profiles...")
- 21:01, 12 May 2014 (diff | hist) . . (+1,272) . . N Data Forensics (Created page with "This is stored in the file's metadata and it can be accessed with specialised software. Knowing who and when created a particular document may help you authenticate it or iden...")
- 21:00, 12 May 2014 (diff | hist) . . (+266) . . N Email spoofing (Created page with "Receiving a message from your friend joe.average@webmail.com is often evidence enough that it was Joe Average with an account at webmail.com who sent you the email. Unfortunat...")
- 20:57, 12 May 2014 (diff | hist) . . (+844) . . Online Learning (→Lesson 5 – Digital investigative journalism)
- 20:29, 12 May 2014 (diff | hist) . . (+745) . . Online Learning (→Lesson 5 – Digital investigative journalism)
- 20:28, 12 May 2014 (diff | hist) . . (+2,098) . . N Destroying temporary files (Created page with "These files are copies of documents you are working on, generated automatically by the operating system. Imagine that you are writing a large report. It takes you a week of wo...")
- 20:08, 12 May 2014 (diff | hist) . . (+2,413) . . N Destroying data (Created page with "In order to ensure that deleted information really is destroyed, you will have to rely on special software that removes the data securely and permanently. Using these tools is...")
- 22:56, 11 May 2014 (diff | hist) . . (+2,042) . . Information storage
- 22:54, 11 May 2014 (diff | hist) . . (+2,106) . . N Information storage (Created page with "Computer and flash disk theft and confiscation is still the preferred method of security agencies around the world to get at activists' data. Media: How to get into any Windo...")
- 22:53, 11 May 2014 (diff | hist) . . (+58) . . Online Learning (→Lesson 6 – Seven steps to better passwords)
- 22:52, 11 May 2014 (diff | hist) . . (+59) . . Online Learning (→Lesson 5 – Digital investigative journalism)
- 22:52, 11 May 2014 (diff | hist) . . (+59) . . Online Learning (→Lesson 4 - Digital information management)
- 22:49, 11 May 2014 (diff | hist) . . (+1,098) . . Online Learning (→Lesson 4 - Digital information management)
- 22:21, 11 May 2014 (diff | hist) . . (+697) . . Online Learning (→Lesson 4 - Digital information management)
- 22:17, 11 May 2014 (diff | hist) . . (-24) . . Lesson 3 Further Reading
- 22:16, 11 May 2014 (diff | hist) . . (0) . . Online Learning (→Lesson 3 – Goodbye Censorship!)
- 22:15, 11 May 2014 (diff | hist) . . (+130) . . Lesson 4 Further Reading
- 22:14, 11 May 2014 (diff | hist) . . (+95) . . N Lesson 4 Further Reading (Created page with " Introduction to Securing Personal Data How to protect sensitive files on your computer")
- 22:13, 11 May 2014 (diff | hist) . . (+86) . . Lesson 4 Exercises (current)
- 22:11, 11 May 2014 (diff | hist) . . (+870) . . N Lesson 4 Exercises (Created page with "Go through the https://security.ngoinabox.org/en/truecrypt _main.html chapter to set up an encrypted partition. Practice moving files in an out of the encrypted container. Go...")
- 22:07, 11 May 2014 (diff | hist) . . (-1) . . Online Learning (→Lesson 3 – Goodbye Censorship!)
- 22:07, 11 May 2014 (diff | hist) . . (+59) . . Online Learning (→Lesson 3 – Goodbye Censorship!)
- 22:06, 11 May 2014 (diff | hist) . . (0) . . Online Learning (→Lesson 2 – Privacy! On the Internet?)
- 22:06, 11 May 2014 (diff | hist) . . (0) . . Online Learning (→Lesson 2 – Privacy! On the Internet?)
- 22:06, 11 May 2014 (diff | hist) . . (0) . . Online Learning (→Lesson 2 – Privacy! On the Internet?)
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)