Security IT

Introduce

 * 1) The Art of War from Sun Tzu
 * 2) Open Source
 * 3) Open Hardware

Hardware

 * 1) List of open-source hardware projects
 * 2) Bulding PC

Software

 * 1) OpenBIOS
 * 2) Running - disk encryption
 * 3) First line of defense - Operating Systems
 * 4) Check the authenticity of software

Internet

 * 1) How to Protect your Internet Anonymity and Privacy
 * 2) Methods blocks
 * 3) Bypass censorship
 * 4) Bypass firewalls
 * 5) Panic
 * 6) NAT

Suplements

 * 1) Sumpletent A: LiveCD
 * 2) Suplement B: Fake identity