627 videos
PGP Encryption with Kleopatra: Protecting Your Privacy on the Dark Web
In this video tutorial, we guide you through the process of creating a PGP key pair using Kleopatra, a user-friendly PGP key manager. Learn how to install Kleopatra, generate your key pair, and understand the importance of passphrase security. We'...
St_Andrews: The Overproduction of Shinorine (a UV-Protecting Molecule) and its P... (2021) - Team Presentation [English]
Title: The Overproduction of Shinorine (a UV-Protecting Molecule) and its Potential Application to Probiotic Sunscreens
Description: Chemical toxins such as octinoxate and oxybenzone, found in many commercially-available sunscreens, contr...
Calling out the BBC Staff for protecting child abusers!
Join the crusade for truth, justice, reform and compensation!
SFScon21 - Lucas Lasota about Protecting Router Freedom within the EU reform of telecom law
Router Freedom is the right that end-users of any Internet Service Provider (ISP) have to choose and use a private modem and router instead of equipment that the ISP provides. Since 2013, the Free Software Foundation Europe has been successfully e...
A03: Protecting jetBlue Airways From Cyber Threats in the "Clouds"
Friday, July 12, 2024: 11:00 am (Marillac Auditorium): JetBlue Airways is a New York-based airline with flights across the U.S., Europe, and Latin America. Every day, thousands of crew members come together to safely transport customers across the...
The Tor Project, protecting online anonimity: Jacob Appelbaum at TEDxFlanders
Esta charla, como todas las TED, está bajo licencia By-NC-ND 4.0
--------------------------------------------------------
Jacob Appelbaum introduces the Tor Project and the Tor Network - an anonymity network used to protect people online. It...
Arch Conf 2020 - Protecting secrets and securing the boot process using a Trusted Platform Module (T
We are going to look at how to use a TPM to store sensitive information like SSH, PGP and disk encryption ke...
Arch Conf 2020 - Protecting secrets and securing the boot process using a Trusted Platform Module (T
We are going to look at how to use a TPM to store sensitive information like SSH, PGP and disk encryptio...