Richard Chamberlain

Richard Chamberlain @sebos

About: Embark on a journey to better Linux security and smarter home labs. Discover SSH security, firewalls, Proxmox VMs, and more with Sebos Cyber Quest!and Ansible scripting,

Location:
Canada
Joined:
Aug 13, 2024

Richard Chamberlain
articles - 99 total

OS Updates on the Corporate Linux Desktop

Remember when please update your systems ASAP emails meant crossing your fingers? There's a better way.

Learn More 1 0Feb 1

Controlling Software on the Corporate Linux Desktop

Ever worked somewhere that did software audits? Remember the scrambling to uninstall unapproved tools...

Learn More 1 0Jan 26

Making Linux Work as a Corporate Desktop

🔒 Corporate Linux Desktop Security: The Immutable Advantage Quick take: Traditional Linux...

Learn More 2 0Jan 18

Prototyping Enterprise Infrastructure in Proxmox: 11+ VMs, 8 VLANs, and Ansible Automation

Building a complete SMB environment using 100% open-source tools—no proprietary licensing, no vendor lock-in. Proxmox for virtualization, OPNSense for routing/firewall, Ansible for automation, Rocky Linux for VMs.

Learn More 1 0Jan 4

Building Enterprise Security for Small Business with Linux and Open Source

The most dangerous phrase in the language is, 'We've always done it this way.'" — Grace Hopper For...

Learn More 1 0Dec 28 '25

Is Linux Finally Ready for the Corporate Desktop?

For over a decade, people have proclaimed the "Year of the Linux Desktop." It never quite...

Learn More 1 0Dec 22 '25

When One Witness Isn't Enough: Remote Verification for AIDE

Building a Distributed Integrity Network with Remote Backup and Cryptographic Verification

Learn More 0 0Dec 14 '25

A Hungry Tale About File Permissions

Understanding Linux File Permissions Through a Story About Burgers

Learn More 1 0Dec 11 '25

AIDE Automation Framework From Integrity Checks to Self-Verification

Modular scripting, cryptographic signing, and a tamper-evident ledger for Linux integrity management

Learn More 1 0Dec 7 '25

When RHEL 9 Meets a Legacy Windows Server - A Crypto Policy Story

Navigating Cipher Compatibility with Custom Crypto Policies on RHEL 9

Learn More 0 0Dec 7 '25

Secure SSH Shell Applications - Planning Guide

Securing SSH shell applications is straightforward and can be done quickly with a few well-placed configurations. This article walks through how to set up a terminal-based application accessed via SSH and secure it in a way that restricts users to just the application..

Learn More 0 0Nov 30 '25

Build Your Own AIDE Automation - Guide

Learn to Design and Implement Custom AIDE Automation with Cryptographic Verification from First Principles

Learn More 1 0Nov 30 '25

AIDE Daily Automation Build - Checklist Your Implementation Roadmap

A Complete Step-by-Step Checklist for Deploying Signed, Verifiable AIDE Integrity Monitoring

Learn More 0 0Nov 30 '25

AIDE in Motion Automating and Signing System Integrity Checks

Proving System Integrity with GPG Signatures and Cryptographic Verification of AIDE Baselines and Reports

Learn More 0 0Nov 30 '25

SSH Access to Proxmox Without Exposing Your Lab

How I Use a Hardened Jump Box, Yubikey MFA, and QubesOS Vaulting to Securely Manage My Proxmox Server

Learn More 0 0Nov 23 '25

AIDE - File Integrity Monitoring for System Security

Implement Silent File Verification with AIDE to Detect Unauthorized Changes Before Attackers Cover Their Tracks

Learn More 0 0Nov 23 '25

Fine-Tune Access, Visibility, and Security

Take Control of Individual Shares with Precise Permissions, IP Restrictions, and User-Based Access Rules

Learn More 0 0Nov 9 '25

Securing Samba at the Global Level – Controlling the Server’s DNA

Lock Down Your Linux Samba Server with Encryption, Access Controls, and Logging for a Hardened SMB Setup

Learn More 0 1Nov 5 '25

The Network in QubesOS – Architecture, Routing, and Real-World Tests

A Deep Dive Into QubesOS Network Isolation and How to Verify Your VPN, TOR, and Inter-VM Firewalling Actually Works

Learn More 0 0Oct 30 '25

Samba on Linux - File Sharing for Mixed Environments

Enable Controlled File Access Between Windows and Linux with This Step-by-Step Samba Guide

Learn More 5 1Oct 26 '25

Qubes OS A Journey to a “Reasonably Secure Operating System”

I used to think Linux was secure by default—until I tried Qubes OS. It flipped my assumptions and...

Learn More 3 0Oct 25 '25

Where do long-dwell attackers hide inside modern networks?

Open question for sysadmins and security folks: which blind spot lets attackers live inside networks for months or years?

Learn More 0 0Oct 21 '25

Making CUPS Classes Work for You

Simplifying Load Balancing and Failover Printing in Business Environments

Learn More 1 0Oct 19 '25

QubesOS A Hypervisor as a Desktop

Exploring Compartmentalization, dom0, and the Security Mindset Behind Qubes

Learn More 1 0Oct 18 '25

Securing Printers with CUPS Why It Matters

Hardening Linux Print Infrastructure with Role-Based Access Control and Policies

Learn More 7 0Oct 13 '25

Securing CUPS with Role-Based Access Control (RBAC)

Manage User Permissions for Centralized Printing with Fine-Grained Access Contro

Learn More 1 2Oct 7 '25

Linux Printing with CUPS

CUPS Print Server with Network Printer Access

Learn More 1 0Sep 28 '25

Customizing Password Policies in Linux Using PAM and User Groups

Learn how to define group-specific password policies using PAM substacks in Linux.

Learn More 1 0Sep 21 '25

How to Secure Different User Types in Linux: A Guide for IT Teams

Learn how to implement tailored security policies for various Linux user types including system admins, developers, and business users.

Learn More 1 0Sep 8 '25

Secure SSH Shell Applications

Learn how to safely expose terminal-based apps over SSH without giving users unrestricted shell access. Step-by-step guidance with configuration examples and security best practices.

Learn More 1 0Aug 31 '25