First page Back Continue Last page Overview Graphics
By the end of this lecture you will know
The ways by which commercial organizations and spammers collect your personal information
How to defend your private information
Settings/plugins of common GNU/Linux applications that help you strike a balance between usability and privacy
Notes: