After surviving multiple layoff rounds at Digital Equipment Corporation, a large computer company in its day, I started Scott Consulting in 1994. A larger firm bought Scott Consulting in 1999, just as the dot com bust devastated the IT Service industry. A glutton for punishment, I went out on my own again in late 1999 and started Infrasupport Corporation, this time with a laser focus on infrastructure and security. I accepted a job offer with Red Hat, Inc. in 2015 as a Senior Technical Account Manager.

I'm also a published author. Jerry Barkley is an IT contractor, not a superhero. But after he uncovers a cyberattack that could lead to millions dead and nobody believes his warnings, if he doesn't act then who will? Real superheroes are ordinary people who step up when called. "Virus Bomb" and "Bullseye Breach" are available everywhere books are sold. More info at Enjoy the fiction....

Authored Content

Woman programming

After building your own VPN on Linux, it's time to finally use it.

After you install OpenVPN, it's time to configure it.
Open ethernet cords.

After setting up a VPN server, the next step is installing and configuring OpenVPN.
Person drinking a hot drink at the computer

The first step in building a VPN is setting up a VPN server.