author-image

Jon Watson

Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.

Articles by Jon

Disabling Flash is a common step in securing a computer because Flash is so insecure. There have bee
By Jon Watson in Information Security on August 22, 2018
How you can be identified even when using Tor, including Javascript, Flash, WebRTC, DNS leaks, doxin
By Jon Watson in VPN & Privacy on May 17, 2021
Credit card fraud is big business both online and offline. This article provides information on how
By Jon Watson in Information Security on September 11, 2018
Encryption should be a part of your email strategy. This article explains how to use Hushmail to enc
By Jon Watson in Information Security on May 15, 2017
Want to know about the Caesar cipher? Or how the Enigma machine works? Find out in this comprehensive article on history's most famous codes and ciphers.
By Jon Watson in Information Security on August 30, 2023
DNS changer malware can cause your computer to visit a different IP address than the one you intended. This guide tells you how to detect infections – and how to avoid them in the first place.
By Jon Watson in Information Security on October 18, 2023
Public key cryptography allows people who have never met to exchange encrypted emails and files. Thi
By Jon Watson in VPN & Privacy on October 19, 2018
Anonymity, like security, has many layers. Observers have developed methods of piercing anonymity wh
By Jon Watson in VPN & Privacy on June 16, 2021
There are two main ways of achieving anonymity via an operating system: virtualization such as Whoni
By Jon Watson in VPN & Privacy on August 3, 2023
Page 3 of 4