MikroTik Script: RouterOS Backup

For the past few months, I’ve been manually backing up my MikroTik (CCR1009-7G-1C-1S+). It was routine, after making any adjustments to my router, I would promptly create and move the backup to a network share hosted on my local Synology NAS unit.  Normally, being someone who prefers automating tasks, I…

Disable Nvidia Telemetry Tracking

The majority of PC users with Nvidia graphics cards are probably not aware that they are being tracked by Nvidia via driver/software. The Nvidia driver installation package offers some flexibility as to what will be installed, however, it does not offer an option to exclude telemetry tracking as part of…

Going Mirrorless with the Fujifilm X-T2

Since late 2009, I’ve been using Canon DSLRs as my go-to camera system. I began my venture into the world of photography with my trusted Canon EOS 7D and throughout the years, I’ve owned both crop and full frame (Canon EOS 5D III) cameras. Canon has an amazing assortment of…

MikroTik: Setup SquidBlackList Firewall

Earlier this year I started using both free and subscription-based blacklists from Squidblacklists.org. The blacklists were incredibly simple to implement into RouterOS and once configured, the lists can be scheduled to update at regular intervals via the RouterOS system scheduler. Squidblacklist.org provides a list of available blacklists, but make sure…

MikroTik: Setup SquidBlackList Web Proxy

Earlier this year I started using both free and subscription-based blacklists from Squidblacklists.org. The blacklists were incredibly simple to implement into RouterOS and once configured, the lists can be scheduled to update at regular intervals via the RouterOS system scheduler. Squidblacklist.org provides a list of available blacklists, but make sure…

MikroTik: Setup Brute Force Protection

The following firewall rules will block port scanners and brute force login attempts for SSH, Telnet, and Winbox by creating a dynamically generated MikroTik address list for each respective protocol/port. Furthermore, each of the SSH, Telnet, and Winbox rules function by staging four address lists together in sequence, each consisting…
All articles loaded
No more articles to load