LINKDING
Shared bookmarks
Shared bookmarks
Sort by
Added ↑
Added ↓
Title ↑
Title ↓
Apply
Tags
Analysis of malicious documents - Part 01 - Introduction and VMs - Greater Internet Freedom
#security
#how-to
#toolkits
#forensics
|
This (mini)course is aimed at those digital security enthusiasts and practitioners (technical support, facilitators, first responders, etc.)
2 months ago
|
View
Shared by
teclista
Mobile Forensic Analysis: A Case Study Walkthrough - Part 01 - Starting a Case and Preliminary Triage - Greater Internet Freedom
#security
#toolkits
#forensics
#mobile
|
This guide provides a comprehensive walkthrough of a forensic investigation into a potential infection of an Android device, received by a civic society organization that operates as a helpline for individuals at risk.
2 months ago
|
View
Shared by
teclista
Líneas de atención feministas | Feminist HelpLines Index
#security
#feminism
#support
2 months ago
|
View
Shared by
teclista
Is Telegram really an encrypted messaging app? – A Few Thoughts on Cryptographic Engineering
#security
#Telegram
|
This blog is reserved for more serious things, and ordinarily I wouldn't spend time on questions like the above. But much as I'd like to spend my time writing about exciting topics, sometimes the world requires a bit of what Brad Delong calls "Intellectual Garbage Pickup," namely: correcting wrong, or mostly-wrong ideas that spread unchecked…
3 months ago
|
View
Shared by
teclista
Dangerzone: Convert potentially dangerous documents into safe PDFs
#security
#software
|
Take potentially dangerous PDFs, office documents, or images and convert them to a safe PDF.
4 months ago
|
View
Shared by
teclista
Previous
1
Next
User
Everyone
jorgesanz
teclista
Apply
Tags
-security
f
eminism
forensics
h
ow-to
m
obile
s
oftware
support
T
elegram
toolkits