author-image

Jon Watson

Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.

Articles by Jon

Tor is mature and stable, but if you’re looking to run a full-on dark web site that remains as hid
By Jon Watson in VPN & Privacy on March 12, 2018
Sandboxing is a way of isolating specific programs and apps. We’ll explore why it’s so useful and tell you to go about creating sandboxes of your own.
By Jon Watson in Information Security on April 2, 2024
Virtual Private Networks solve privacy problems but they are banned in some situations. This article
By Jon Watson in VPN & Privacy on August 30, 2020
In this article we'll break out the most important aspects of internet safety and security into bite
By Jon Watson in Information Security on June 8, 2022
Two-Factor Authentication (2FA) is a relatively easy way to prevent attackers logging into online accounts with stolen credentials. We take a look at what it involves and why it’s become so prevalent. 
By Jon Watson in VPN & Privacy on December 28, 2023
A rootkit is a particularly nasty piece of malware that is extremely difficult to detect and remove.
By Jon Watson in Antivirus on March 3, 2022
Elder financial fraud targets elderly victims and is a huge problem resulting in massive losses. We explain what the different types of elder fraud are and how to avoid them. 
By Jon Watson in Information Security on June 30, 2020
This round up of practical tips will help secure your Linux desktop. 
By Jon Watson in Information Security on March 15, 2022
Email scams continue to be common, but most of them are easy to avoid if you're aware of them. We'll list some of the most common scams and discuss the steps you can take to avoid getting caught out.
By Jon Watson in Information Security on June 20, 2023
Page 2 of 4