NetworkingScripting

MikroTik Script: DuckDNS.org DDNS Update

This script is to be used in conjuction with DuckDNS.org’s Dynamic DNS Service. It is to be scheduled/ran on a Mikrotik router. Unlike the original version (click the MikroTik button after the page loads), this …

NetworkingScripting

MikroTik Script: No-IP.com DDNS Update

I’ve been using No-IP.com as my Dynamic DNS service for the past year. I was keeping my DDNS address updated via No-IP’s  Dynamic Update Client for Windows. Using No-IP’s client to keep the DDNS address …

NetworkingScripting

MikroTik Script: RouterOS Backup

For the past few months, I’ve been manually backing up my MikroTik (CCR1009-7G-1C-1S+). It was routine, after making any adjustments to my router, I would promptly create and move the backup to a network share …

Security

Disable Nvidia Telemetry Tracking

The majority of PC users with Nvidia graphics cards are probably not aware that they are being tracked by Nvidia via driver/software. The Nvidia driver installation package offers some flexibility as to what will be …

Photography

Going Mirrorless with the Fujifilm X-T2

Since late 2009, I’ve been using Canon DSLRs as my go-to camera system. I began my venture into the world of photography with my trusted Canon EOS 7D and throughout the years, I’ve owned both …

NetworkingSecurity

MikroTik: Setup SquidBlackList Firewall

Earlier this year I started using both free and subscription-based blacklists from Squidblacklists.org. The blacklists were incredibly simple to implement into RouterOS and once configured, the lists can be scheduled to update at regular intervals …

NetworkingSecurity

MikroTik: Setup SquidBlackList Web Proxy

Earlier this year I started using both free and subscription-based blacklists from Squidblacklists.org. The blacklists were incredibly simple to implement into RouterOS and once configured, the lists can be scheduled to update at regular intervals …

NetworkingSecurity

MikroTik: Setup Brute Force Protection

The following firewall rules will block port scanners and brute force login attempts for SSH, Telnet, and Winbox by creating a dynamically generated MikroTik address list for each respective protocol/port. Furthermore, each of the SSH, …

Scroll to Top