Difference between revisions of "Lesson 2 Further Reading"

 
Line 1: Line 1:
  
*http://flossmanuals.net/basic-internet-security/
+
http://flossmanuals.net/basic-internet-security/
  
*[https://securityinabox.org/en/chapter-7 How to keep your Internet communications private]  
+
[https://securityinabox.org/en/chapter-7 How to keep your Internet communications private]  
  
 
'''Public Key Encryption'''
 
'''Public Key Encryption'''
Line 8: Line 8:
 
Read through a couple of interesting guides on how you can set-up public key data encryption for your email communications.
 
Read through a couple of interesting guides on how you can set-up public key data encryption for your email communications.
  
*https://flossmanuals.net/basic-internet-security/ch027_mail-encryption-gpg
+
https://flossmanuals.net/basic-internet-security/ch027_mail-encryption-gpg
 
      
 
      
*http://equalit.ie/esecman/chapter2_4.html#2_4b
+
http://equalit.ie/esecman/chapter2_4.html#2_4b
 
      
 
      
*https://securityinabox.org/en/thuderbird_encryption
+
https://securityinabox.org/en/thuderbird_encryption
 
      
 
      
*https://www.vaultletsoft.com
+
https://www.vaultletsoft.com
 
      
 
      
*https://www.enlocked.com
+
https://www.enlocked.com

Latest revision as of 22:37, 28 May 2014

http://flossmanuals.net/basic-internet-security/

How to keep your Internet communications private

Public Key Encryption

Read through a couple of interesting guides on how you can set-up public key data encryption for your email communications.

https://flossmanuals.net/basic-internet-security/ch027_mail-encryption-gpg

http://equalit.ie/esecman/chapter2_4.html#2_4b

https://securityinabox.org/en/thuderbird_encryption

https://www.vaultletsoft.com

https://www.enlocked.com