Category:Security: Difference between revisions

From P2P Foundation
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
This new section will monitor 'peer to peer warfare', security, cyber-crime and similar issues.
This new section will monitor 'peer to peer warfare', security, cyber-crime and similar issues.
=[[Internet Security Resources]]=
#[[FLOSS Manual for Circumvention Tools‎]] ; Bypassing Internet Censorship. [http://en.flossmanuals.net/CircumventionTools/AboutThisManual]
#[[Guide to Mobile Security for Citizen Journalists‎;]] [http://mobileactive.org/mobilesecurity-citizenjournalism]
#[[EPIC Online Guide to Practical Privacy Tools‎]] [http://epic.org/privacy/tools.html]
#[[Anonymous Blogging with WordPress and Tor]]‎ [http://advocacy.globalvoicesonline.org/projects/guide/]
#[[Security in a Box‎]]
#[[Quick Guide to Secure Communication‎]] [http://www.digiactive.org/2009/06/26/secure-comm/]
#[[Everyone's Guide to Bypassing Internet Censorship‎]]





Revision as of 03:15, 21 February 2011

This new section will monitor 'peer to peer warfare', security, cyber-crime and similar issues.


Internet Security Resources

  1. FLOSS Manual for Circumvention Tools‎ ; Bypassing Internet Censorship. [1]
  2. Guide to Mobile Security for Citizen Journalists‎; [2]
  3. EPIC Online Guide to Practical Privacy Tools‎ [3]
  4. Anonymous Blogging with WordPress and Tor[4]
  5. Security in a Box‎
  6. Quick Guide to Secure Communication‎ [5]
  7. Everyone's Guide to Bypassing Internet Censorship‎


Key Articles

  1. John Robb on Cyberinfrastructure Defense
  2. The Power of Statelessness. By Jakub Grygiel: The withering appeal of the state [6]
  3. How To Communicate Securely in Repressive Environments. Patrick Meier: Core to effective strategic nonviolent action is the need to remain proactive and on the offensive; the rationale being that both the resistance movement and repressive regime have an equal amount of time allocated when the show-down begins. If the movement becomes idle at any point, this may give the regime the opportunity to regain the upper hand, or vice versa.


Key Tags

For updates, see the following tags:

  1. http://del.icio.us/mbauwens/P2P-Warfare
  2. http://del.icio.us/mbauwens/P2P-Security
  3. http://del.icio.us/mbauwens/P2P-Crime
  4. http://del.icio.us/mbauwens/P2P-Policing

Pages in category "Security"

The following 200 pages are in this category, out of 409 total.

(previous page) (next page)
(previous page) (next page)