
Stop Losing Code - Automate Your GitHub Backups with Bash Scripts
Step-by-step guide to secure and automate code backups using GitHub and Bash.

Step-by-step guide to secure and automate code backups using GitHub and Bash.
Introduction Imagine a world where robots entertain us at theme parks, birthday parties, or public events. Now, imagine one of these robots is a mischievous clown robot designed to perform pranks—...
When exploring robotics and automation, it’s easy to find demonstration code that blends system-generated logic with user-defined logic. While these demos are great for learning, they often lack th...
One of the key software technologies needed for my Ethical Hacking Robot is ROS2 (Robot Operating System 2). ROS2 is a powerful middleware framework that allows developers to create modular softwar...
Introduction Cybersecurity and robotics are two rapidly evolving fields, yet their intersection remains largely unexplored. As robots become more advanced and widely used in industries such as heal...
Introduction Now that you have Port Knocking configured, let’s take it a step further! Instead of using a static knocking sequence, we will automatically rotate knock ports daily using a systemd t...

Introduction: Why Port Knocking Matters Every open SSH port is an open invitation. Even in a home lab, exposed SSH services are routinely scanned by bots and malicious actors looking for a foothol...
In my last article, TCPDump & Python, we explored using the tcpdump command to capture local network traffic. But for my ethical hacking robot, I need to take things a step further. Instead of ...
As part of the effort to build an Ethical Hacking Robot, it’s crucial to determine the right tools for network analysis. One such tool is TCPDump, a command-line packet analyzer that allows users t...
Alright, let’s set the record straight—I don’t hate the Raspberry Pi. In fact, some of my earliest projects were built on one. But this time, I want something more than a Raspberry Pi project that ...