Jon Watson

Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.

How law enforcement personnel can protect their privacy online
By in VPN, on agosto 31, 2017 at 3:47 pm
How law enforcement personnel can protect their privacy online

Internet privacy is a problem for law enforcement as they tend to have a long list of enemies. This article contains online privacy tips for law enforcement

Small business guide to data protection
By in VPN e Privacy, on agosto 3, 2017 at 11:03 am
Small business guide to data protection

Business data has to be available to support the activities of the business, but organizations also have an obligation to keep customer data secure.

How to avoid and detect Elder Fraud: A guide for older people, carers and relatives
By in Sicurezza Informatica, on agosto 2, 2017 at 8:01 pm
How to avoid and detect Elder Fraud: A guide for older people, carers and relatives

Elder fraud is a problem in western cultures world-wide.This article can help detect and avoid elder fraud including identity theft and caregiver fraud.

The ultimate guide to desktop Linux security
By in Sicurezza Informatica, on luglio 24, 2017 at 10:01 am
The ultimate guide to desktop Linux security

Desktop Linux security is considered to be fundamentally better than Windows. This article helps understand why, and offers advice to secure it further.

What is a VNC and how does it differ from a VPN?
By in VPN, on giugno 30, 2017 at 5:09 pm
What is a VNC and how does it differ from a VPN?

The terms Virtual Network Computing (VNC) and Virtual Private Networking (VPN) sound similar but are very different things.

What makes Flash so insecure and what are the alternatives?
By in Sicurezza Informatica, on giugno 8, 2017 at 6:04 pm
What makes Flash so insecure and what are the alternatives?

Disabling Flash is a common step in securing a computer because Flash is so insecure. There have been 595 vulnerabilities exposed in the last 2 years alone

Tor may not be as anonymous as you think
By in VPN e Privacy, on maggio 30, 2017 at 11:04 am
Tor may not be as anonymous as you think

How you can be identified even when using Tor, including Javascript, Flash, WebRTC, DNS Leaks, doxing, tracking scripts, and poisoned darknet nodes.

How to recognize and protect against credit card scams
By in Sicurezza Informatica, on maggio 25, 2017 at 12:44 pm
How to recognize and protect against credit card scams

Credit card fraud is big business both online and offline. This article provides information on how to recognize and protect against credit card scams.

How to use Hushmail to encrypt your email
By in Sicurezza Informatica, on maggio 15, 2017 at 5:02 pm
How to use Hushmail to encrypt your email

Encryption should be a part of your email strategy. This article explains how to use Hushmail to encrypt your email for privacy and security.

Famous codes and ciphers through history and their role in modern encryption
By in Sicurezza Informatica, on maggio 13, 2017 at 7:23 am
Famous codes and ciphers through history and their role in modern encryption

We’ve been hiding messages for as long as we’ve been sending messages. This article discusses famous ciphers in history and their role in modern encryption.