Jon Watson

Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.

How easy is it to detect a VPN is being used?
By in VPN & Privacy, on November 29, 2017 at 2:58 pm
How easy is it to detect a VPN is being used?

Virtual Private Networks (VPNs) solve a lot of privacy problems. Since a VPN usually encrypts your traffic between your computer and the VPN provider, it makes it very difficult for an observer to view your traffic to see what you’re up to. However, there are many people who want to be able to hide the […]

The jargon-free guide to computer and internet security
By in Information Security, on October 28, 2017 at 4:08 pm
The jargon-free guide to computer and internet security

In this article we’ll break out the most important aspects of internet safety and security into bite-sized chunks and offer some practical advice on each.

What is a Man in the Middle attack and how can I avoid it?
By in VPN, on October 19, 2017 at 1:53 pm
What is a Man in the Middle attack and how can I avoid it?

A Man in the Middle attack is where a bad guy plays two parties against each other without either party knowing. This guide helps avoid becoming a victim.

What is Two-Factor Authentication (2FA) and do you need it?
By in VPN & Privacy, on October 12, 2017 at 3:58 pm
What is Two-Factor Authentication (2FA) and do you need it?

Two-factor authentication (2FA) is a login system that requires more than just a username and a password. 2FA greatly enhances security and is easy to use.

How to configure a smart DNS proxy service on a DD-WRT router
By in VPN, on October 4, 2017 at 3:01 pm
How to configure a smart DNS proxy service on a DD-WRT router

Many media streaming services will only allow certain content in specific countries. The most common way to enforce those restrictions is to examine the viewer’s IP address and attempt to geo-locate it to a region. VPNs are a common way to circumvent these geo-location tactics, but VPNs can slow down traffic. That’s fine for normal […]

Installing OpenVPN client and server on a DD-WRT router
By in VPN, on September 27, 2017 at 8:23 pm
Installing OpenVPN client and server on a DD-WRT router

This guide explains how to install and configure both a DD-WRT OpenVPN server and the OpenVPN client on the open source DD-WRT router.

How to avoid common security holes
By in Antivirus, on September 20, 2017 at 8:32 am
How to avoid common security holes

Large swaths of personal data is routinely stolen from companies and governments with alarming frequency. It seems like these organizations simply have no clue how insecurely their data is stored, and even less of a clue how to prevent data theft. With few exceptions, these data thefts are made possible by poor code, poor configuration […]

The best free rootkit removal, detection and scanner programs
By in Antivirus, on September 18, 2017 at 2:29 pm
The best free rootkit removal, detection and scanner programs

A rootkit is a particularly nasty piece of malware that is extremely difficult to detect and remove. This article explains how to detect and remove rootkits

The ultimate digital privacy guide for teachers
By in VPN, on September 12, 2017 at 12:44 pm
The ultimate digital privacy guide for teachers

Teachers can find it hard to both be on the internet and also maintain some sort of privacy. This teachers’ guide to online privacy can help.

How law enforcement personnel can protect their privacy online
By in VPN, on August 31, 2017 at 3:47 pm
How law enforcement personnel can protect their privacy online

Internet privacy is a problem for law enforcement as they tend to have a long list of enemies. This article contains online privacy tips for law enforcement