author-image

Jon Watson

Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.

Articles by Jon

Want to set up a hidden service on the Tor network? Or how about an onion site that is only accessible via Tor? No problem! We’ll take you through the process step by step.
By Jon Watson in VPN & Privacy on December 13, 2023
OpenVPN is the most widely used VPN package on the planet. We'll show you how to build your own Linu
By Jon Watson in VPN & Privacy on January 21, 2018
Browser hijacking is a type of malware that takes over your browser to make it do things you do not
By Jon Watson in Information Security on March 18, 2017
A SOCKS proxy is more limited in that it cannot provide access to remote resources, but it can mask
By Jon Watson in VPN & Privacy on May 24, 2018
Psiphon is designed to help the citizens of countries deemed "enemies of the Internet", but it can b
By Jon Watson in VPN & Privacy on May 20, 2021
Adding password protection to your documents and folders will help secure them. All of the major off
By Jon Watson in Information Security on December 18, 2018
Step by step guide to setting up uTorrent with a VPN for Linux desktop to form a fast, secure, and s
By Jon Watson in VPN & Privacy on March 19, 2017
Trying to stay safe while torrenting, but unsure what's the best way to protect yourself? Here, we discuss the differences between PeerBlock and VPN and let you know which is the best option for you.
By Jon Watson in VPN & Privacy on January 28, 2023
Page 4 of 4