Jon Watson

Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.

Articles by Jon

Businesses are liable for securing their own data as well as that of customers. We explain how to protect information from various threats.
By Jon Watson in VPN & Privacy on February 8, 2023
TFTP is critical in maintaining embedded device patches and configurations and will be around for a long time to come. We show you the best TFTP servers for both Windows and Linux systems.
By Jon Watson in Net Admin on September 21, 2023
Do you need to send large amounts of data around your network reliably and securely? You need an SFTP server. There are several options, and in this guide we identify the best free SFTP and FTPS server tools on the market.
By Jon Watson in Net Admin on September 21, 2023
Looking at ways to get a birds-eye view of your network's traffic and establish some control of data loss and flows? In this article, we round up the best packet sniffers/network analyzers.
By Jon Watson in Net Admin on September 29, 2023
We look at the best free SCP and SSH servers for Windows, Linux and MacOS.
By Jon Watson in Net Admin on September 29, 2023
Browser fingerprinting is a way of collecting your data and using it to identify you. In this post, we reveal exactly how browser fingerprinting works and how to prevent browser fingerprinting.
By Jon Watson in VPN & Privacy on October 9, 2020
Email is not inherently secure and the wide variety of email services protect your emails in differe
By Jon Watson in VPN & Privacy on November 29, 2019
Your internet traffic is susceptible to packet sniffing and analysis as it travels through various r
By Jon Watson in Information Security on November 9, 2020
This article explains how to enable Yubikey One Time Passwords and Google Authenticator Two-Factor A
By Jon Watson in Information Security on October 12, 2022
Page 1 of 4
124