Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • ...grammatic work in the form of web applications. Jake will share stories of security breaches, incident responses and enumerate some of the more common issues t
    424 bytes (68 words) - 21:30, 20 May 2015
  • Keeping site security updated ** Drupal: Security updates only
    1 KB (205 words) - 20:44, 28 November 2016
  • a. SMS Blasts (consider reliability, cost, features, security) c. Problem with SMS: security issues
    1 KB (197 words) - 18:25, 5 May 2015
  • Evolving approaches to organizational digital security as part of larger movements for community safety ** E: Security is a big issue with people's online words & actions bleeding into the real
    6 KB (879 words) - 22:05, 25 November 2021
  • security, workflow and accessibility. Come to this session to learn 10
    555 bytes (83 words) - 21:30, 20 May 2015
  • ...ion of security. Context changes what this means! What domains do we apply security to? "I have smoke detectors; I am secure." # Information security
    5 KB (796 words) - 22:19, 7 December 2018
  • why don't people use security tools? - Hacking laptop/desktop config files for better security is still
    5 KB (889 words) - 18:25, 5 May 2015
  • Remote Organizational Security Assessment Best Practices (Beatrice / Jonah) * Propose a lightweight digital security assessment also when we receive a request for training – as a pre-trainin
    4 KB (656 words) - 01:07, 29 November 2020
  • organizational digital security - digital security for groups of people working together. as small as a 6 person collective to ...se steps, it is very helpful to have someone who is thinking about digital security. Expertize may not be needed up to this point, it could all be done interna
    5 KB (776 words) - 23:46, 21 November 2017
  • ** What does safety and security mean to your group? *** May not know digital security but they know what safety is to them.
    5 KB (852 words) - 19:38, 9 December 2023
  • * Use redaction as a tool for information security
    630 bytes (95 words) - 23:37, 4 May 2015
  • ...d).Activists want stuff that can be hosted on their own servers (for extra security) ...ODF. new, buggy software. Can collaboratively edit an ODF file. Also has a security layer.
    2 KB (361 words) - 23:37, 4 May 2015
  • Session to synthesize providing support for digital security training efforts * Responsibility around providing security guidance
    3 KB (397 words) - 23:08, 30 November 2016
  • * [[Security First Conversations]] * [[Human Rights Security and Privacy]]
    4 KB (491 words) - 00:55, 4 February 2020
  • ...fferent. Best solution is to do lots of research with people who are doing security and research in that country. Overall security threat modelling approach:
    3 KB (471 words) - 23:21, 29 November 2017
  • ...balance our use of phones as vectors of surveillance vs phone as tool for security (how do we decide when to use our phones at home?) ==Mobile security practices we in the room use==
    4 KB (643 words) - 19:26, 22 November 2016
  • security and surveillance: going to gmail security attacks that cannot
    3 KB (406 words) - 18:09, 7 November 2019
  • * Information Strategy|Security|Integrity for NGOs - [https://www.opentech.fund/fellowships/difp Digital In
    1 KB (162 words) - 21:35, 30 March 2016
  • E-(Aspiration) – works with Tech capacity and digital security – wants to do workshops in Spanish; how do we do it…what is needed to d * Cyber Security – there are not too many resources in Spanish
    2 KB (369 words) - 00:59, 20 November 2018
  • Two classes of config, w/ security info & wihtout best practice is to #include security into settings.php
    2 KB (243 words) - 18:25, 5 May 2015

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)