Jon Watson

Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.

How to protect yourself against invisible browser fingerprinting
By in VPN e Privacy, on aprile 26, 2017 at 9:51 am
How to protect yourself against invisible browser fingerprinting

Browser fingerprinting is an invisible method of tracking your activities on the internet. This article contains some practical steps to protect yourself.

DNS changer malware: how to detect it and protect yourself
By in Sicurezza Informatica, on marzo 24, 2017 at 11:00 am
DNS changer malware: how to detect it and protect yourself

DNS is a critical part of security but sadly there are few precautions in place to defeat DNS changer malware. Learn how to spot it and remove it here.

Public key cryptography: What is it, how it work and how to use it in email and file encryption
By in VPN e Privacy, on marzo 16, 2017 at 9:25 pm
Public key cryptography: What is it, how it work and how to use it in email and file encryption

Public key cryptography allows people who have never met to exchange encrypted emails and files. This guide explorers how it works and how you can use it.

How a digital footprint is used to track you online and how to erase it
By in VPN e Privacy, on febbraio 28, 2017 at 1:39 pm
How a digital footprint is used to track you online and how to erase it

Anonymity, like security, has many layers. Observers have developed methods of piercing anonymity which involve differing levels of technology.

Qubes, Whonix, or Tails: which Linux distro should you use to stay anonymous?
By in VPN e Privacy, on febbraio 15, 2017 at 5:12 pm
Qubes, Whonix, or Tails: which Linux distro should you use to stay anonymous?

There are two main ways of achieving anonymity via an operating system: virtualization such as Whonix & Qubes, and the tried-and-true method of Live CDs.

How to set up a hidden Tor service or .onion website
By in VPN e Privacy, on febbraio 7, 2017 at 4:10 pm
How to set up a hidden Tor service or .onion website

A Tor hidden service runs inside the Tor network itself. In this case, network traffic enters the Tor network, but never exits.

How to build a Linux VPN server using Amazon EC2 and OpenVPN
By in VPN e Privacy, on gennaio 21, 2017 at 3:42 pm
How to build a Linux VPN server using Amazon EC2 and OpenVPN

OpenVPN is the most widely used VPN package on the planet. We’ll show you how to build your own Linux VPN using an Amazon EC2 server.

Browser hijacking: What is it and how do you prevent and remove it
By in Sicurezza Informatica, on gennaio 18, 2017 at 3:45 pm
Browser hijacking: What is it and how do you prevent and remove it

Browser hijacking is a type of malware that takes over your browser to make it do things you do not intend. Its effects can run the gamut from mostly harmless ad display up to crippling ransomware infections. This article contains techniques to avoid being infected in the first place, as well as tips to detect and remove hijacks if you do get infected.

How to set up a SOCKS5 proxy on a virtual private server (VPS)
By in VPN e Privacy, on gennaio 12, 2017 at 9:14 pm
How to set up a SOCKS5 proxy on a virtual private server (VPS)

A SOCKS proxy is more limited in that it cannot provide access to remote resources, but it can mask your IP address and provide geo-obfuscation services.

How to Use Psiphon The Censorship-Circumvention Tool
By in VPN e Privacy, on gennaio 2, 2017 at 6:05 pm
How to Use Psiphon The Censorship-Circumvention Tool

Psiphon is a tool that aims to defeat internet censorship. It does so by connecting a Windows desktop or Android device to the Psiphon censorship-circumvention network expressly for the purpose of circumventing internet censorship measures. It’s aimed to help the citizens of countries deemed “enemies of the Internet” to ensure the entire internet is available, but Psiphon can be used anywhere internet access is being curtailed.