Introduce

  1. The Art of War from Sun Tzu
  2. Open Source
  3. Open Hardware

Hardware

  1. List of open-source hardware projects
  2. Bulding PC

Software

  1. OpenBIOS
  2. Running - disk encryption
  3. First line of defense - Operating Systems
  4. Check the authenticity of software

Internet

  1. How to Protect your Internet Anonymity and Privacy
  2. Methods blocks
    1. Bypass censorship
    2. Bypass firewalls
  3. Panic
  4. NAT

Suplements

  1. Sumpletent A: LiveCD
  2. Suplement B: Fake identity

See also

This article is issued from Wikibooks. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.