Long pages
Showing below up to 50 results in range #1 to #50.
- (hist) Refreshing Summer Cocktail And Mocktail Recipes [15,017 bytes]
- (hist) Tech For Activists Hub [11,916 bytes]
- (hist) Tactic : Voting with our dollars in more ways [7,907 bytes]
- (hist) Tactic : Optimising online chat spaces [7,161 bytes]
- (hist) Tutorial : automate process of posting on multiple social media platforms [6,224 bytes]
- (hist) Tactic : Stop Saying Zionism When You Mean Jewish Supremacy [6,212 bytes]
- (hist) Tutorial : using bots for chat sharing and reposting across platforms [5,767 bytes]
- (hist) Making a home laboratory is a lot cheaper and more possible than it was in the past [5,668 bytes]
- (hist) Educational: Mass Review Campaigns And Automation Detection Concerns [5,654 bytes]
- (hist) The Highest SEO Software That Experts Use On Daily Basis [5,328 bytes]
- (hist) Educational: Learning Bot and Fake Account Detection [5,304 bytes]
- (hist) When Seo Software Means Larger Than Money [5,015 bytes]
- (hist) Fear and Self-Censorship in Pro-Palestine Rallies [4,750 bytes]
- (hist) Social Media Monitoring and Crowdsourced Investigations [4,518 bytes]
- (hist) How Websites Can Detect Bots and Automation [4,440 bytes]
- (hist) Tor, VPNs and Private Browsing [4,184 bytes]
- (hist) Wearable and Concealable Cameras [4,007 bytes]
- (hist) Token Colonialist Speaker at Anti-colonial Protests [3,931 bytes]
- (hist) Operational Security (OpSec) Basics [3,906 bytes]
- (hist) Community Radio and Walkie Talkie Networks [3,896 bytes]
- (hist) Directional Mics and Long-Distance Audio Gear [3,891 bytes]
- (hist) Adversarial Fashion and Anti-Surveillance Wearables [3,887 bytes]
- (hist) Microwave Drone Disruption Devices [3,866 bytes]
- (hist) Breaking the Chains of Politeness: Unmasking Colonial Control Through Self-Censorship [3,837 bytes]
- (hist) Mesh Networks for Offline Connectivity [3,735 bytes]
- (hist) RF and IMSI Catcher Detection (Rayhunter) [3,732 bytes]
- (hist) Using SEC/Gov Databases for Corporate Research [3,729 bytes]
- (hist) Cross Platform Posting and Scheduling (IFTTT, Buffer) [3,722 bytes]
- (hist) Faraday Enclosures and Signal Blockers [3,721 bytes]
- (hist) RF and Bug Detection Tools [3,719 bytes]
- (hist) LoRa Messaging (Meshtastic, etc) [3,712 bytes]
- (hist) Metadata Removal from Files and Images [3,702 bytes]
- (hist) Secure Email and PGP Basics [3,701 bytes]
- (hist) Laser Window Microphones [3,635 bytes]
- (hist) Web Scraping and Public Record Mining [3,630 bytes]
- (hist) Audio Cleanup and Transcription (Whisper, etc) [3,610 bytes]
- (hist) Encrypted Messaging Apps (Signal, Wire) [3,587 bytes]
- (hist) Secure Volunteer Coordination Platforms (Crabgrass, Mattermost) [3,568 bytes]
- (hist) Offline Internet-in-a-Box (PirateBox, LibraryBox) [3,564 bytes]
- (hist) Image and Video Enhancement (Upscaling, Denoising) [3,544 bytes]
- (hist) Tactic : Using AI to our Advantage [3,535 bytes]
- (hist) Geospatial OSINT (Satellites, Maps, Photos) [3,498 bytes]
- (hist) Automation Tools (Zapier, n8n, Make) [3,451 bytes]
- (hist) Image and Video Metadata and Verification Tools [3,411 bytes]
- (hist) Bluetooth and Firechat-Style Protest Networks [3,401 bytes]
- (hist) Notification Aggregators and Dashboards [3,386 bytes]
- (hist) AI Summarizers and Text Analysis [3,349 bytes]
- (hist) Tactic : Maximising Sydney Sunday March Visibility [3,346 bytes]
- (hist) A message to so called creatives who are scared of developments [3,229 bytes]
- (hist) A message to so called non-violent revolutionaries on neglecting tech [3,134 bytes]