
Jon Watson
Linux and Internet Security Expert
Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.
Articles by Jon
This article explains how to enable Yubikey One Time Passwords and Google Authenticator Two-Factor A
By Jon Watson
in Information Security
on October 12, 2022
There is much debate about Linux antivirus. Opponents of it state that its heritage as a networked,
By Jon Watson
in Antivirus
on March 3, 2022
Tor is mature and stable, but if you’re looking to run a full-on dark web site that remains as hid
By Jon Watson
in VPN & Privacy
on March 12, 2018
Sandboxing is a way of isolating specific programs and apps. We’ll explore why it’s so useful and tell you to go about creating sandboxes of your own.
By Jon Watson
in Information Security
on April 2, 2024
Virtual Private Networks solve privacy problems but they are banned in some situations. This article
By Jon Watson
in VPN & Privacy
on August 30, 2020
In this article we'll break out the most important aspects of internet safety and security into bite
By Jon Watson
in Information Security
on June 8, 2022
We explain exactly what a Man in the Middle (MitM) attack is, common types of MitM attacks plus what you can do to avoid them.
By Jon Watson
in VPN
on December 29, 2023
Two-Factor Authentication (2FA) is a relatively easy way to prevent attackers logging into online accounts with stolen credentials. We take a look at what it involves and why it’s become so prevalent.
By Jon Watson
in VPN & Privacy
on December 28, 2023
Many media streaming services use geo-location to restrict access to some content. Configuring a DD-
By Jon Watson
in VPN
on October 4, 2017