Jon Watson

Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.

Guida alla sicurezza del PC su Internet senza tecnicismi
By in Sicurezza Informatica, on maggio 24, 2018 at 11:33 am
Guida alla sicurezza del PC su Internet senza tecnicismi

Una guida utile per proteggere il proprio pc e navigare su Internet in sicurezza. Ecco come sfruttare le potenzialità della rete senza correre alcun rischio

Linux 2FA: How to secure SSH logins with Google Authenticator and Yubikey
By in Sicurezza Informatica, on maggio 14, 2018 at 6:15 pm
Linux 2FA: How to secure SSH logins with Google Authenticator and Yubikey

This article explains how to enable Yubikey One Time Passwords and Google Authenticator Two-Factor Authentication (2FA) on Linux.

Come identificare ed evitare le truffe via e-mail
By in Sicurezza Informatica, on aprile 10, 2018 at 4:47 pm
Come identificare ed evitare le truffe via e-mail

Le truffe via e-mail più comuni, ecco i consigli su come riconoscerle, come evitare di rimanerne vittima e come segnalarle

Does Linux need antivirus?
By in Antivirus, on aprile 4, 2018 at 11:27 am
Does Linux need antivirus?

There is much debate about Linux antivirus. Opponents of it state that its heritage as a networked, multi-user operating system protects it. The reality is that there’s simply no reason to not install antivirus on your Linux desktop other than hubris.

The ultimate guide to I2P and how to install and use it
By in VPN e Privacy, on marzo 10, 2018 at 5:50 pm
The ultimate guide to I2P and how to install and use it

Tor is mature and stable, but if you’re looking to run a full-on dark web site that remains as hidden as possible, I2P may be the better choice.

What is sandboxing and how to sandbox a program
By in Sicurezza Informatica, on marzo 2, 2018 at 6:10 pm
What is sandboxing and how to sandbox a program

Sandboxing computer programs keeps them separated from each other which prevents the spread of malware and makes systems more stable.

70+ common scams (online and offline) and how to avoid them
By in VPN, on marzo 2, 2018 at 2:13 pm
70+ common scams (online and offline) and how to avoid them

The internet is the most widely used communication tool in existence. It’s also the best tool for scammers and phishers to hunt for victims.

The 20 best free SFTP and FTPS servers for Windows and Linux
By in Amministrazione di rete, I più letti, Net Admin Popular Posts, on gennaio 30, 2018 at 12:39 pm
The 20 best free SFTP and FTPS servers for Windows and Linux

FTP is a fundamental file transfer tool. SFTP secures it for daily sure. Here’s our top list of the top 20 best SFTP servers out there.

How easy is it to detect a VPN is being used?
By in VPN e Privacy, on novembre 29, 2017 at 2:58 pm
How easy is it to detect a VPN is being used?

Virtual Private Networks (VPNs) solve a lot of privacy problems. Since a VPN usually encrypts your traffic between your computer and the VPN provider, it makes it very difficult for an observer to view your traffic to see what you’re up to. However, there are many people who want to be able to hide the […]

The 7 best free SCP servers for Windows, Linux and Mac
By in Amministrazione di rete, on novembre 22, 2017 at 1:05 pm
The 7 best free SCP servers for Windows, Linux and Mac

SCP servers are inherently more secure than FTP. It’s really just an SSH session used solely for transferring files. Here’s our list of the top 7.

Page 1 of 5