Jon Watson

Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.

70+ common online scams used by cyber criminals and fraudsters
By in VPN, on July 8, 2018 at 8:29 am
70+ common online scams used by cyber criminals and fraudsters

The internet is the most widely used communication tool in existence. It’s also the best tool for scammers and phishers to hunt for victims.

The 20 Best Free SFTP and FTPS Servers for Windows and Linux
By in Popular Posts, Net Admin, Net Admin Popular Posts, on June 25, 2018 at 12:39 pm
The 20 Best Free SFTP and FTPS Servers for Windows and Linux

FTP is a fundamental file transfer tool. SFTP secures it for daily sure. Here’s our top list of the top 20 best SFTP servers out there.

What is packet sniffing and how can you avoid it?
By in Information Security, on June 20, 2018 at 4:01 pm
What is packet sniffing and how can you avoid it?

Your internet traffic is susceptible to packet sniffing and analysis as it travels through various routers en-route to its destination. We explain how to avoid that.

Linux 2FA: How to secure SSH logins with Google Authenticator and Yubikey
By in Information Security, on May 14, 2018 at 6:15 pm
Linux 2FA: How to secure SSH logins with Google Authenticator and Yubikey

This article explains how to enable Yubikey One Time Passwords and Google Authenticator Two-Factor Authentication (2FA) on Linux.

Does Linux need antivirus?
By in Antivirus, on April 4, 2018 at 11:27 am
Does Linux need antivirus?

There is much debate about Linux antivirus. Opponents of it state that its heritage as a networked, multi-user operating system protects it. The reality is that there’s simply no reason to not install antivirus on your Linux desktop other than hubris.

The ultimate guide to I2P and how to install and use it
By in VPN & Privacy, on March 10, 2018 at 5:50 pm
The ultimate guide to I2P and how to install and use it

Tor is mature and stable, but if you’re looking to run a full-on dark web site that remains as hidden as possible, I2P may be the better choice.

What is sandboxing and how to sandbox a program
By in Information Security, on March 2, 2018 at 6:10 pm
What is sandboxing and how to sandbox a program

Sandboxing computer programs keeps them separated from each other which prevents the spread of malware and makes systems more stable.

How easy is it to detect a VPN is being used?
By in VPN & Privacy, on November 29, 2017 at 2:58 pm
How easy is it to detect a VPN is being used?

Virtual Private Networks (VPNs) solve a lot of privacy problems. Since a VPN usually encrypts your traffic between your computer and the VPN provider, it makes it very difficult for an observer to view your traffic to see what you’re up to. However, there are many people who want to be able to hide the […]

The 7 best free SCP servers for Windows, Linux and Mac
By in Net Admin, on November 22, 2017 at 1:05 pm
The 7 best free SCP servers for Windows, Linux and Mac

SCP servers are inherently more secure than FTP. It’s really just an SSH session used solely for transferring files. Here’s our list of the top 7.

10 Best free TFTP servers for Windows, Linux and Mac
By in Net Admin, Net Admin Popular Posts, on November 22, 2017 at 1:05 pm
10 Best free TFTP servers for Windows, Linux and Mac

One of the most widely used file transfer protocols is the Trivial FTP (TFTP) protocol. In this article, we’ll cover off the top 10 best TFTP servers.

Page 1 of 5