Jon Watson
Linux and Internet Security Expert
Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.
Articles by Jon
DNS changer malware can cause your computer to visit a different IP address than the one you intended. This guide tells you how to detect infections – and how to avoid them in the first place.
By Jon Watson
in Information Security
on October 18, 2023
Public key cryptography allows people who have never met to exchange encrypted emails and files. Thi
By Jon Watson
in VPN & Privacy
on October 19, 2018
Anonymity, like security, has many layers. Observers have developed methods of piercing anonymity wh
By Jon Watson
in VPN & Privacy
on June 16, 2021
There are two main ways of achieving anonymity via an operating system: virtualization such as Whoni
By Jon Watson
in VPN & Privacy
on August 3, 2023
Want to set up a hidden service on the Tor network? Or how about an onion site that is only accessible via Tor? No problem! We’ll take you through the process step by step.
By Jon Watson
in VPN & Privacy
on December 13, 2023
OpenVPN is the most widely used VPN package on the planet. We'll show you how to build your own Linu
By Jon Watson
in VPN & Privacy
on January 21, 2018
A SOCKS proxy is more limited in that it cannot provide access to remote resources, but it can mask
By Jon Watson
in VPN & Privacy
on May 24, 2018
Psiphon is designed to help the citizens of countries deemed "enemies of the Internet", but it can b
By Jon Watson
in VPN & Privacy
on May 20, 2021
Step by step guide to setting up uTorrent with a VPN for Linux desktop to form a fast, secure, and s
By Jon Watson
in VPN & Privacy
on March 19, 2017