author-image

Jon Watson

Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.

Articles by Jon

Businesses are liable for securing their own data as well as that of customers. We explain how to protect information from various threats.
By Jon Watson in VPN & Privacy on February 8, 2023
TFTP is critical in maintaining embedded device patches and configurations and will be around for a long time to come. We show you the best TFTP servers for both Windows and Linux systems.
By Jon Watson in Net Admin on February 2, 2024
Do you need to send large amounts of data around your network reliably and securely? You need an SFTP server. There are several options, and in this guide we identify the best free SFTP and FTPS server tools on the market.
By Jon Watson in Net Admin on March 11, 2024
Looking at ways to get a birds-eye view of your network's traffic and establish some control of data loss and flows? In this article, we round up the best packet sniffers/network analyzers.
By Jon Watson in Net Admin on March 11, 2024
We look at the best free SCP and SSH servers for Windows, Linux and MacOS.
By Jon Watson in Net Admin on February 2, 2024
Browser fingerprinting is a way of collecting your data and using it to identify you. In this post, we reveal exactly how browser fingerprinting works and how to prevent browser fingerprinting.
By Jon Watson in VPN & Privacy on October 9, 2020
Email is not inherently secure and the wide variety of email services protect your emails in differe
By Jon Watson in VPN & Privacy on November 29, 2019
The small packets of data that routinely travel across the internet can be intercepted and interrogated by all manner of ne'er-do-wells. We find out what makes packet sniffing dangerous and how best to protect your traffic.
By Jon Watson in Information Security on January 5, 2024
This article explains how to enable Yubikey One Time Passwords and Google Authenticator Two-Factor A
By Jon Watson in Information Security on October 12, 2022
Page 1 of 4
124