Jon Watson

Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.

9 best packet sniffers and network analyzers for 2018
By in Net Admin, on luglio 19, 2018 at 4:05 am
9 best packet sniffers and network analyzers for 2018

Packet Sniffing is a colloquial term that refers to the art of network traffic analysis. In this article, we round up the best free packet sniffers.

10 Best free TFTP servers for Windows, Linux and Mac
By in Net Admin, Net Admin Popular Posts, on luglio 19, 2018 at 3:55 am
10 Best free TFTP servers for Windows, Linux and Mac

One of the most widely used file transfer protocols is the Trivial FTP (TFTP) protocol. In this article, we’ll cover off the top 10 best TFTP servers.

70+ common online scams used by cyber criminals and fraudsters
By in VPN, on luglio 8, 2018 at 8:29 am
70+ common online scams used by cyber criminals and fraudsters

The internet is the most widely used communication tool in existence. It’s also the best tool for scammers and phishers to hunt for victims.

The 20 Best Free SFTP and FTPS Servers for Windows and Linux
By in Popular Posts, Net Admin, Net Admin Popular Posts, on giugno 25, 2018 at 12:39 pm
The 20 Best Free SFTP and FTPS Servers for Windows and Linux

FTP is a fundamental file transfer tool. SFTP secures it for daily sure. Here’s our top list of the top 20 best SFTP servers out there.

What is packet sniffing and how can you avoid it?
By in Information Security, on giugno 20, 2018 at 4:01 pm
What is packet sniffing and how can you avoid it?

Your internet traffic is susceptible to packet sniffing and analysis as it travels through various routers en-route to its destination. We explain how to avoid that.

Guida alla sicurezza del PC su Internet senza tecnicismi
By in Sicurezza Informatica, on maggio 24, 2018 at 11:33 am
Guida alla sicurezza del PC su Internet senza tecnicismi

Una guida utile per proteggere il proprio pc e navigare su Internet in sicurezza. Ecco come sfruttare le potenzialità della rete senza correre alcun rischio

Linux 2FA: How to secure SSH logins with Google Authenticator and Yubikey
By in Information Security, on maggio 14, 2018 at 6:15 pm
Linux 2FA: How to secure SSH logins with Google Authenticator and Yubikey

This article explains how to enable Yubikey One Time Passwords and Google Authenticator Two-Factor Authentication (2FA) on Linux.

Come identificare ed evitare le truffe via e-mail
By in Sicurezza Informatica, on aprile 10, 2018 at 4:47 pm
Come identificare ed evitare le truffe via e-mail

Le truffe via e-mail più comuni, ecco i consigli su come riconoscerle, come evitare di rimanerne vittima e come segnalarle

Does Linux need antivirus?
By in Antivirus, on aprile 4, 2018 at 11:27 am
Does Linux need antivirus?

There is much debate about Linux antivirus. Opponents of it state that its heritage as a networked, multi-user operating system protects it. The reality is that there’s simply no reason to not install antivirus on your Linux desktop other than hubris.

The ultimate guide to I2P and how to install and use it
By in VPN & Privacy, on marzo 10, 2018 at 5:50 pm
The ultimate guide to I2P and how to install and use it

Tor is mature and stable, but if you’re looking to run a full-on dark web site that remains as hidden as possible, I2P may be the better choice.

Page 1 of 5