• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: Dmitry Bubnov

Firewall Level 2: Configuring a MikroTik Router to Block Common Attacks
DevOps

Firewall Level 2: Configuring a MikroTik Router to Block Common…

1 week ago23/08/2025Dmitry Bubnov260
In this article, we’ll cover how to harden a MikroTik router against attacks and port scans, and how to keep your network off blocklists. The techniques you learn here will also help you configure other types of…
CONTINUE READING 🡒
MikroTik Router Firewall Configuration: Step-by-Step Guide
DevOps

MikroTik Router Firewall Configuration: Step-by-Step Guide

1 month ago11/08/2025Dmitry Bubnov660
The firewall is the first—and, unfortunately, in many cases the last—line of defense for a network. The internet is full of advice on how to configure it, but blindly copying someone else’s rules can do more harm…
CONTINUE READING 🡒
Protecting MikroTik. How to make your router safe
Mobile Security

Protecting MikroTik. How to make your router safe

31.08.202008/04/2025Dmitry Bubnov211
Firmware of popular routers often contains errors identified by security researchers on a regular basis. However, it is not enough just to find a bug - it must be neutralized. Today, I will explain how to protect…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com