Jon Watson
Linux and Internet Security Expert
Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.
Articles by Jon
This article explains how to enable Yubikey One Time Passwords and Google Authenticator Two-Factor A
By Jon Watson
in Information Security
on October 12, 2022
There is much debate about Linux antivirus. Opponents of it state that its heritage as a networked,
By Jon Watson
in Antivirus
on March 3, 2022
Tor is mature and stable, but if you’re looking to run a full-on dark web site that remains as hid
By Jon Watson
in VPN & Privacy
on March 12, 2018
Sandboxing is a way of isolating specific programs and apps. We’ll explore why it’s so useful and tell you to go about creating sandboxes of your own.
By Jon Watson
in Information Security
on April 2, 2024
In this article we'll break out the most important aspects of internet safety and security into bite
By Jon Watson
in Information Security
on June 8, 2022
We explain exactly what a Man in the Middle (MitM) attack is, common types of MitM attacks plus what you can do to avoid them.
By Jon Watson
in VPN
on July 2, 2025
Two-Factor Authentication (2FA) is a relatively easy way to prevent attackers logging into online accounts with stolen credentials. We take a look at what it involves and why it’s become so prevalent.
By Jon Watson
in VPN & Privacy
on January 24, 2026
Many media streaming services use geo-location to restrict access to some content. Configuring a DD-
By Jon Watson
in VPN
on October 4, 2017
This guide explains how to install and configure both a DD-WRT OpenVPN server and the OpenVPN client
By Jon Watson
in VPN
on March 17, 2018