Richard Chamberlain

Richard Chamberlain @sebos

About: Embark on a journey to better Linux security and smarter home labs. Discover SSH security, firewalls, Proxmox VMs, and more with Sebos Cyber Quest!and Ansible scripting,

Location:
Canada
Joined:
Aug 13, 2024

Richard Chamberlain
articles - 60 total

SSH Authentication Key Rotation: Why and How to Expire SSH Keys

Learn how to implement SSH key expiration and rotation using AuthorizedKeysCommand for better security hygiene on Linux servers.

Learn More 8 0Jun 22

Secure SSH Access with Modular Policy Files

Learn how to harden your SSH server using modular configuration files and reusable security policies. Improve manageability, mitigate vulnerabilities, and enforce best practices.

Learn More 1 0Jun 15

🚀 Secure Remote Deployments with SSH Agent Forwarding and GitHub

Learn how to use SSH Agent Forwarding with GitHub for secure, scalable deployments—without exposing private keys on remote servers.

Learn More 1 2Jun 8

🔐 AppArmor and ROS2 – The Article I Tried Not to Write

Discover why AppArmor may not be ideal for ROS2 development with colcon. Learn from real-world insights comparing AppArmor, SELinux, and Oracle Linux in robotics system security.

Learn More 0 0Jun 4

🛡️ Blocking Admin SSH Logins with SELinux (`ssh_sysadm_login`)

Preventing direct administrative SSH access is a vital component of any defense-in-depth strategy. In...

Learn More 0 0Jun 2

Secure SSH by Using a Restricted User: Smarter Linux Hardening

Secure your Linux systems by using a restricted user for SSH access and separating admin privileges. Learn how to configure rbash, limit executable commands, and enhance server security with this practical guide for sysadmins.

Learn More 0 0May 25

Are Your Linux Files as Secure as They Should Be?

Learn how to secure Linux files using DAC, ACLs, and MAC. Explore key tools like AppArmor, SELinux, and Auditd to enhance system access control and prevent unauthorized access.

Learn More 1 1May 22

🛡️ Complete Guide to Fail2Ban: Protect Your SSH Server from Brute Force Attacks

Learn how to secure your SSH servers against brute force attacks using Fail2Ban. Step-by-step setup, testing scripts, and advanced hardening tips included.

Learn More 4 7May 18

🛡️ Securing ROS2 Robotic Projects with Auditd: A Practical Guide

Learn how to monitor and secure your projects using #Auditd and #Linux tools. Don't wait for a breach—audit and secure NOW!

Learn More 0 2May 17

🔐 How to Set Up Multi-Factor Authentication (MFA) on Ubuntu for SSH

Secure your Linux servers with this easy guide on setting up Multi-Factor Authentication (MFA) for SSH on Ubuntu 24.04 using Google Authenticator.

Learn More 1 1May 10

🔐 Securing ROS 2 Robots: Network Intrusion Detection with Suricata

As robots become more connected and operate across public and private networks, network-level intrusion detection is critical. In this guide, part of our comprehensive ROS 2 robot hardening series, you'll learn how to install and configure Suricata on Ubuntu 24.04 to monitor ROS 2 DDS traffic and detect suspicious activity in real time. We walk through host-based deployment, automated scripting via main.sh, and how to validate your setup—empowering you to build safer, more resilient robotic systems.

Learn More 1 0May 7

🔐 Mastering SSH Key-Based Authentication: Secure Passwordless Login for Linux and Windows

Learn how to set up secure, passwordless SSH login on Linux and Windows using SSH keys. Boost your server security and streamline remote access today.

Learn More 0 0May 3

🔐 Securing ROS2 Nodes with SROS2: Encryption and Permissions for Robot Communications

Learn how to secure communication between ROS2 nodes using SROS2. This guide covers keystore setup, node certificate creation, permission management, and encrypted messaging for robotic systems running on Linux.

Learn More 1 0Apr 30

Limiting SSH Access with TCP Wrappers, AllowUsers, and IP Restrictions

Learn how to secure SSH access on your Linux servers using TCP Wrappers, AllowUsers, AllowGroups, and IP restrictions. Step-by-step examples included for locking down your environment and preventing unauthorized access.

Learn More 2 0Apr 27

🔐 Robot Security with ROS2 and UFW: Firewalls for the Future of Robotics

Learn why robot security is essential in a connected world. This guide explores the unique cybersecurity risks robots face, how to configure UFW firewalls for ROS 2 robots, and best practices for securing autonomous systems. Keep your robots safe, updated, and resilient against cyber threats with practical Linux firewall configurations tailored for robotics

Learn More 1 0Apr 27

Setting Up a Secure ROS 2 System: Part 4 AppArmor and Auditd

Secure your ROS 2 robotics environment on Ubuntu using powerful Linux security tools like AppArmor, SELinux, and Auditd. This step-by-step guide covers how to set up mandatory access control, monitor system activity, and build hardened, audit-ready ROS 2 deployments.

Learn More 0 0Apr 25

Your First Steps to a Hardened SSH Server

A beginner-friendly yet technical exploration of SSH and its critical role in Linux system administration. Learn about the SSH daemon (`sshd`), its configuration, and why default settings aren't always secure.

Learn More 0 0Apr 21

Setting Up a Secure ROS 2 System: Part 3 Installing ROS 2

Learn how to automate and streamline your ROS 2 setup on Ubuntu 24.04 with our detailed walkthrough of the ros2_install.sh script. This guide covers everything from installing prerequisites and configuring package repositories to initializing rosdep and setting up your ROS 2 development environment. Ideal for robotics and automation developers looking to save time and ensure a reliable ROS 2 installation. Boost your productivity with this step-by-step guide tailored for the Noble Numbat release!

Learn More 0 0Apr 18

🛡️ Setting Up a Secure ROS 2 System: Part 2 – Updating Ubuntu and Creating a ROS User

Secure your ROS 2 robotic system with SROS2! This guide walks you through setting up encrypted communication between nodes using OpenSSL, certificates, and permission files.

Learn More 1 0Apr 15

🔒 Secure ROS2 Setup: Hardening Your Robot Project from the Start

Secure your ROS2 robot projects from the ground up. This series walks you through essential Linux hardening, ROS2 installation best practices, and network security steps to protect your robotics systems from cyber threats. Ideal for makers, developers, and anyone building secure, connected robots.

Learn More 1 0Apr 14

Running Linux in QEMU: How to Build a VM from an ISO

Learn how to create and boot a Linux virtual machine using QEMU and an ISO file, with support for x86 and PowerPC architectures. Perfect for portable testing environments.

Learn More 1 0Apr 5

Ansible Automation

Automated tools like Ansible are game-changers for rebuilding servers I've been using Ansible a lot...

Learn More 0 0Apr 2

How to Use QEMU to Run Linux VMs in Minutes

Learn how to quickly spin up Kali Linux and Fedora Server virtual machines using QEMU with real-world examples and command explanations.

Learn More 1 1Apr 1

QEMU: Lightweight Virtualization for the Command Line Enthusiast

Discover how QEMU, a powerful CLI-based hypervisor, makes it easy to spin up VMs for quick testing and development across platforms—even on laptops.

Learn More 1 3Mar 31

🚀 Automate Your GitHub Backups with Bash (Stop Losing Code!)

Struggling to keep your code backed up on GitHub? Learn how to automate project linking, authentication, and code check-ins using Bash scripts. Improve your workflow with this step-by-step guide!

Learn More 0 0Mar 10

Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

This article explores a security architecture designed to prevent a mischievous clown robot from going rogue. By leveraging Linux security policies, encryption, and strict access controls, it ensures that the robot’s prank mechanisms—like its bubble gun—operate safely. Key protections include isolating critical modules, enforcing token-based authentication, and implementing kernel-level security with SELinux and AppArmor to prevent unauthorized access.

Learn More 0 0Mar 1

Enhancing Code Reusability in Robotics: A Modular WiFi Scanner with ROS2 & Systemd

Learn how to build a modular WiFi scanner in Python that separates core logic from execution methods. We’ll integrate it with Systemd for automation and ROS2 for real-time robotics applications, demonstrating the power of Separation of Duty for better maintainability and reusability.

Learn More 0 0Feb 26

Building an Ethical Hacking Robot with ROS2: WiFi Scanner Implementation

Discover how to develop a WiFi-scanning robot using ROS2 (Robot Operating System 2). Learn about ROS2 topics, Python scripting, and practical applications for ethical hacking and network analysis.

Learn More 0 0Feb 23

Building a ROS2-Based Autonomous Cybersecurity Robot for Ethical Hacking

Explore the intersection of cybersecurity and robotics with this ROS2-based autonomous ethical hacking robot. Designed for penetration testing and security research, this project integrates Zero Trust Security, encryption, and AI-driven threat detection to secure robotic systems. Learn how to identify, test, and defend against cyber threats in autonomous robots.

Learn More 2 0Feb 14

Automate Port Knocking with Dynamic Port Rotation for Secure SSH Access

Take SSH security to the next level! Learn how to automatically rotate Port Knocking sequences daily using a systemd timer, making it nearly impossible for attackers to guess your SSH access.

Learn More 2 0Feb 9