Jon Watson

Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.

10 email services compared on privacy and security: Gmail, ProtonMail, Outlook, and more
By in VPN & Privacy, on October 12, 2018 at 12:12 pm
10 email services compared on privacy and security: Gmail, ProtonMail, Outlook, and more

Email is not inherently secure and the wide variety of email services protect your emails in different ways. This article looks at the most popular email services and how they protect your email.

The 20 Best Free SFTP and FTPS Servers for Windows and Linux
By in Popular Posts, Net Admin, Net Admin Popular Posts, on August 26, 2018 at 6:50 pm
The 20 Best Free SFTP and FTPS Servers for Windows and Linux

FTP is a fundamental file transfer tool. SFTP secures it for daily sure. Here’s our top list of the top 20 best SFTP servers out there.

9 best packet sniffers and network analyzers for 2018
By in Net Admin, on July 19, 2018 at 4:05 am
9 best packet sniffers and network analyzers for 2018

Packet Sniffing is a colloquial term that refers to the art of network traffic analysis. In this article, we round up the best free packet sniffers.

10 Best free TFTP servers for Windows, Linux and Mac
By in Net Admin, Net Admin Popular Posts, on July 19, 2018 at 3:55 am
10 Best free TFTP servers for Windows, Linux and Mac

One of the most widely used file transfer protocols is the Trivial FTP (TFTP) protocol. In this article, we’ll cover off the top 10 best TFTP servers.

70+ common online scams used by cyber criminals and fraudsters
By in VPN, on July 8, 2018 at 8:29 am
70+ common online scams used by cyber criminals and fraudsters

The internet is the most widely used communication tool in existence. It’s also the best tool for scammers and phishers to hunt for victims.

What is packet sniffing and how can you avoid it?
By in Information Security, on June 20, 2018 at 4:01 pm
What is packet sniffing and how can you avoid it?

Your internet traffic is susceptible to packet sniffing and analysis as it travels through various routers en-route to its destination. We explain how to avoid that.

Linux 2FA: How to secure SSH logins with Google Authenticator and Yubikey
By in Information Security, on May 14, 2018 at 6:15 pm
Linux 2FA: How to secure SSH logins with Google Authenticator and Yubikey

This article explains how to enable Yubikey One Time Passwords and Google Authenticator Two-Factor Authentication (2FA) on Linux.

Does Linux need antivirus?
By in Antivirus, on April 4, 2018 at 11:27 am
Does Linux need antivirus?

There is much debate about Linux antivirus. Opponents of it state that its heritage as a networked, multi-user operating system protects it. The reality is that there’s simply no reason to not install antivirus on your Linux desktop other than hubris.

The ultimate guide to I2P and how to install and use it
By in VPN & Privacy, on March 10, 2018 at 5:50 pm
The ultimate guide to I2P and how to install and use it

Tor is mature and stable, but if you’re looking to run a full-on dark web site that remains as hidden as possible, I2P may be the better choice.

What is sandboxing and how to sandbox a program
By in Information Security, on March 2, 2018 at 6:10 pm
What is sandboxing and how to sandbox a program

Sandboxing computer programs keeps them separated from each other which prevents the spread of malware and makes systems more stable.

Page 1 of 5