MIKROTIK: SETUP SQUIDBLACKLIST FIREWALL

The blacklists were incredibly simple to implement into RouterOS and once configured, the lists can be scheduled to update at regular intervals via the RouterOS system scheduler. Squidblacklist.org provides a…

6 Ways To Secure MikroTik Router

As a network administrator, the first thing is to Secure the Mikrotik (Proxy Router) that we manage, by closing the gaps that might be taken into “attack loopholes” by irresponsible…

How to SMTP Over an SSH Tunnel?

Spammers would sniff it out fairly quickly, and proceed to hammer it. To get around this, I decided to set up an SSH tunnel from a port on my laptop…