Firewall

Phishing scams with MikroTik routers

IDNetworks.net. Bank phishing scam calls its victims, crypto jacked Rocke expands its arsenal, and MikroTik routers hacked to transmit their data. Bank phishing scam...
aguez stw
2 min read

Block VPN Access Tutorials using MikroTik

Block VPN access using Mikrotik. To get to the configuration stage we must first understand how VPN (Virtual Private Network) works. Usually, people use...
aguez stw
46 sec read

Load Balancing used to the MikroTiK (PCC Method)

MikroTik load balancing is a technique for distributing traffic loads on two or more connection lines in a balanced way, so that traffic can...
aguez stw
5 min read

WannaCry Malware Deployment Prevention

Ransomware WannaCry The last few months have carried out massive attacks happening in many countries of the world. Malware WannaCry uses security gaps in...
aguez stw
1 min read

Tutorial Block Facebook access using MikroTik

This is a tutorial on how to block Facebook access using a proxy. Are you ready to try to block Facebook by using a...
aguez stw
54 sec read