Jon Watson

Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.

How to avoid and detect Elder Fraud: A guide for older people, carers and relatives
By in Information Security, on August 2, 2017 at 8:01 pm
How to avoid and detect Elder Fraud: A guide for older people, carers and relatives

Elder fraud is a problem in western cultures world-wide.This article can help detect and avoid elder fraud including identity theft and caregiver fraud.

The ultimate guide to desktop Linux security
By in Information Security, on July 24, 2017 at 10:01 am
The ultimate guide to desktop Linux security

Desktop Linux security is considered to be fundamentally better than Windows. This article helps understand why, and offers advice to secure it further.

The 7 best free SCP servers for Windows, Linux and Mac
By in Net Admin, on July 19, 2017 at 4:12 am
The 7 best free SCP servers for Windows, Linux and Mac

SCP servers are inherently more secure than FTP. It’s really just an SSH session used solely for transferring files. Here’s our list of the top 7.

What is a VNC and how does it differ from a VPN?
By in VPN, on June 30, 2017 at 5:09 pm
What is a VNC and how does it differ from a VPN?

The terms Virtual Network Computing (VNC) and Virtual Private Networking (VPN) sound similar but are very different things.

How to identify and avoid email scams
By in Information Security, on June 26, 2017 at 12:42 pm
How to identify and avoid email scams

This article will help you identify the common characteristics of email scams and provides practical advice on how to avoid it, and report it.

What makes Flash so insecure and what are the alternatives?
By in Information Security, on June 8, 2017 at 6:04 pm
What makes Flash so insecure and what are the alternatives?

Disabling Flash is a common step in securing a computer because Flash is so insecure. There have been 595 vulnerabilities exposed in the last 2 years alone

Tor may not be as anonymous as you think
By in VPN & Privacy, on May 30, 2017 at 11:04 am
Tor may not be as anonymous as you think

How you can be identified even when using Tor, including Javascript, Flash, WebRTC, DNS Leaks, doxing, tracking scripts, and poisoned darknet nodes.

How to recognize and protect against credit card scams
By in Information Security, on May 25, 2017 at 12:44 pm
How to recognize and protect against credit card scams

Credit card fraud is big business both online and offline. This article provides information on how to recognize and protect against credit card scams.

How to use Hushmail to encrypt your email
By in Information Security, on May 15, 2017 at 5:02 pm
How to use Hushmail to encrypt your email

Encryption should be a part of your email strategy. This article explains how to use Hushmail to encrypt your email for privacy and security.

Famous codes and ciphers through history and their role in modern encryption
By in Information Security, on May 13, 2017 at 7:23 am
Famous codes and ciphers through history and their role in modern encryption

We’ve been hiding messages for as long as we’ve been sending messages. This article discusses famous ciphers in history and their role in modern encryption.