EXPOSED-FULL NAME LIST – THE PANAMA PAPERS – ALGERIA – Companies and Officers

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

 

EXPOSED-FULL NAME LIST – THE PANAMA PAPERS – ALBANIA – Companies and Officers

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Erstmals: Die streng geheime BDVP-Polizei- und STASI-Liste der DDR: HSDVP-Karl-Liebknecht

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Erstmals: Die streng geheime BDVP-Polizei- und STASI-Liste der DDR: BDVP- Rostock

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Unveiled – Tactical Tech: New Linux Digital Security Guides

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

To: Cryptome
From: Maria Xynou <maria[at]tacticaltech.org>
Subject: NEW: Digital security guides for Linux
Date: Thu, 21 Jul 2016 15:30:35 +0200I’m getting in touch to let you know that Tactical Tech has just released a new section on Security in-a-Box of six digital security tool guides specifically for **Linux**:

 

https://securityinabox.org/en/guides-linux

Security in-a-Box is a joint project of Tactical Tech and Front Line Defenders which provides practical help and information on digital security, published in 17 languages and reaching over 2 million people every year.

The six new Linux tool guides offer in-depth step-by-step help in installing and running six of the most essential open-source digital security tools, including the Tor Browser, Thunderbird with Enigmail for encrypted email and the Firefox browser with privacy Add-ons:

–  Tor Browser for online anonymity & censorship circumvention:

https://securityinabox.org/en/guide/torbrowser/linux

– Thunderbird, Enigmail and OpenPGP for secure emails:

https://securityinabox.org/en/guide/thunderbird/linux

– VeraCrypt for secure file storage:

https://securityinabox.org/en/guide/veracrypt/linux

– Jitsi and OTR for encrypted instant messaging and VoIP calls:

https://securityinabox.org/en/guide/jitsi/linux

– Firefox add-ons for secure browsing:

https://securityinabox.org/en/guide/firefox/linux

– KeePassX for secure passwords:

https://securityinabox.org/en/guide/keepassx/linux

The new guides add to our existing 25 tool guides for Windows, Android and social media, as well as 11 in-depth tactics covering all aspects of digital security.

As an essential resource for digital security trainers, consultants as well as anyone interested in digital security, we’re delighted to release these guides for the leading secure, open-source alternative operating system to Windows.

If you could share this news on your website and with your networks, we’d be very grateful.

We’d be happy to answer any questions you may have.

We’d also welcome any feedback on the new Linux guides or any other aspect of Security in-a-Box.

Many thanks and look forward to hearing from you,

Maria.

Maria Xynou
Editorial Researcher
Tactical Technology Collective
https://www.tacticaltech.org
PGP Key Fingerprint: C378 A514 3CFB C736 4538 531F A32C A210 C6E2 40D8


 
 

 

 

Security Guide Training, Security Guide For Ibm I V7.1, Security Guide Jobs, Security Guide Microsoft, Security Guide Book, Security Guide Ios, Security Guide For Developers, Security Guide Apple, Security Awareness Guide, Security Administration Guide Sas, Security Administration Guide Sybase, Security A+ Guide, Security Classification Guide Army, Security Classification Guide Air Force, Social Security Guide Australia, Racf Security Administrator’s Guide, Deep Security Admin Guide, Security Guide Book, Guide Security Blackburn, Security Buyers Guide, Social Security Guide Book, Security Guard Guide Book, Network Security Guide Beginners, Siebel Security Guide Bookshelf 8.1, Security Officer Guide Book, Church Security Guide Book, Ccna Security Guide Book, Security Guide Cucm 10, Security Guide Cucm 10.5, Security Guide Cucm, Security Guide Centos 7, Security Classification Guide, Security Classification Guide Army, Security Classification Guide Navy, Security Camera Guide, Security Classification Guide Canada, Security Classification Guide Air Force, Security Guard Duties, Security Guide Debian, Guide Security Darwen, Security Design Guide, Security Classification Guide Definition, Security Classification Guide Dod, Security Requirements Guide Disa, Security Guide Job Description, Security+ Study Guide Download, Security Classification Guide Database, Security Equipment Guide, Security+ Exam Guide, Security Equipment Guide Ssb\/sg-20, Security Classification Guide Example, Security Missions Guide Eve, Openstack Security Guide Epub, Border Security Episode Guide, Sap Hana Security Guide_en.pdf, Ccna Security Exam Guide, Physical Security Evaluation Guide, Security Guide For Interconnecting Information Technology Systems, Security Guide For Windows Random Password Generator, Security Guide For Ibm I V7.1, Security Guide For Sap Solution Manager 7.2, Security Guide For Developers, Security Center Administrator Guide Genetec, Grc Security Guide, Genworth Security Guide, Rcmp Security Equipment Guide G1-001, Security Guide Hana, Security Hardening Guide, Security Hardening Guide Vmware Vsphere 5, Security Hardening Guide For Ibm Websphere Portal, Security Hardening Guide For Windows Server 2008, Security Hardening Guide For Windows Server 2012, Access Security Guide Hp Procurve, Access Security Guide Hp Procurve 5400, Security Guide Red Hat, Access Security Guide Hp Procurve 2610, Security Guide Ios, Security Implementation Guide, Security Information Guide, Security Classification Guide Is, Cyber Security Guide Icc, Security Technical Implementation Guide, Security Camera Installation Guide, Security Camera Installation Guide Pdf, Joint Security Implementation Guide, Deep Security Installation Guide, Security Guide Jobs, Security Guide Job Description, Security Guard Job Guide, Guide Security Services Jobs, Jboss Security Guide, Java Security Guide, Journalist Security Guide, Jenkins Security Guide, Junos Security Guide, Joomla Security Guide, High Security Guide Keys, Swtor Security Key Guide, Social Security Guide In Kuwait, Kvm Security Guide, Access Security Guide K\/ka\/kb.15.15, Kentico Security Guide, Guide Kaspersky Security Center, Kaspersky Security Guide, Sap Gui-security Guide Im Kapitel 2.5, Security Guidelines, Security Guide Linux, Security Lighting Guide, Security Location Guide, Nsa Security Guide Linux, Social Security Guidelines, Social Security Guide Law, Security Camera Lens Guide, Guide Security Services Ltd, Security Camera Layout Guide, Security Guide Microsoft, Security Guide Mac Os X, Security Guide Mdg, Security Metrics Guide For Information Technology Systems, Security Markings Guide, Security Missions Guide Eve, Security Manager Guide, Security Manager’s Guide To Video Surveillance, Security Metrics Guide, Security Guide Solution Manager 7.1, Security Classification Guide Navy, Security Guide To Network Fundamentals 4th Edition, Security Guide To Network Fundamentals 4th Edition Pdf, Security Guide To Network Fundamentals Answers, Linux Security Guide Nsa, Security + Guide To Network, Router Security Guide Nsa, Security+guide To Network Fundamentals Chapter 2 Answers, Security Guide To Network Fundamentals 4th Edition Scribd, Scap-security-guide Not Applicable, Security Guide Openstack, Security Guide Oracle, Os X Security Guide, Security Onion Guide, Security Officer Guide, Security Operations Guide, Security Officer Guide Book, Home Security Guide.org, Ios Security Guide October 2014, Security Configuration Guide On Vnx For File, Security Guide Pdf, Security Guide Password Generator, Security Plus Guide, Security Products Guide, Security Policy Guide, Security+ Study Guide Pdf, Sap Security Guide Pdf, Openstack Security Guide Pdf, Ccna Security Guide Pdf, Ricoh Security Guide Password, Factorytalk Security Quick Start Guide, Ccna Security Quick Guide, Stronghold Of Security Quest Guide, Security Guide Red Hat, Security Guide Ricoh, Security Guide Random Password Generator, Redhat 7 Security Guide, Security Guide Rails, Security Guide Rhel 6, Security Requirements Guide, Security Requirements Guide Disa, Security+ Review Guide, Security Readiness Guide, Security Guide Sap Solution Manager 7.1, Security Guide Sap, Security Guide Sap Hana, Security Guide Siebel 8.1, Security Guide Sap Pi, Security Guide Siebel, Security + Study Guide, Security+ Study Guide Pdf, Guide Security Services, Security+ Study Guide Sy0-401 Pdf, Security Guide Training, Security Guide To Network Fundamentals 4th Edition, Security Guide To Network Fundamentals 4th Edition Pdf, Security Guide To Network Fundamentals Answers, Security + Guide To Network, Security+guide To Network Fundamentals Chapter 2 Answers, Security + Guide To, Security Testing Guide, Security+ Training Guide Pdf, Security Testing Guide Owasp, Security Guide Ubuntu, Security Guide Unity Connection, Security Update Guide, Security Classification Guide Uk, Security Classification Guide Usaf, Scap Security Guide Ubuntu, Security Center User Guide, Microsoft Security Update Guide, Security Onion User Guide, Norton Security User Guide, Security Hardening Guide Vmware Vsphere 5, Wcf Security Guide V2, Security Technical Implementation Guide Version 3, Security Technical Implementation Guide Version 3.7, Security Technical Implementation Guide Version 3.4, Security Technical Implementation Guide Version 3.1, Security Guide For Hyper-v In Windows Server 2012, R 3 Security Guide Volume Ii, Security Guide For Hyper-v, R\/3 Security Guide Volume Iii Checklists, Security Guide Windows Server 2012, Security Guide Windows 7, Security Guide Windows Server 2008 R2, Security Guide Windows 10, Security Guide Windows 8.1, Security Guide Windows Server 2008, Security Guide Windows 2008, Security Guide Windows, Security Guide For Windows Random Password Generator, Nsa Security Guide Windows 7, Security Guide Mac Os X, Xenserver Security Guide, Xampp Security Guide, Xccdf Security Guide, Yosemite Security Guide, Security Configuration Guide Zone-based Policy Firewall, Hyper-v Security Guide.zip