MikroTik Router Firewall Configuration: Step-by-Step Guide

Date: 14/08/2025

The purpose of a firewall is to filter traffic and manipulate packets. It’s the first—and, unfortunately, in many cases the last—line of defense for your network. The internet is full of advice on configuring this component, but blindly copying someone else’s rules can do more harm than good. So first, make sure you understand how the RouterOS firewall works and what it can do.
Read full article →


Understanding Active Directory Terminology: Navigating the Forest and Trees

Date: 05/08/2025

Hearing terms like “forest,” “trees,” and the associated “trust relationships” for the first time can be quite daunting. Active Directory itself is equally intimidating, often regarded as one of Microsoft’s most complex technologies. To effectively manage AD and comprehend its operations, the first step is to learn the basic terminology and understand how its components relate to each other. That’s what I’ll explain.
Read full article →


Wazuh Guide: Perimeter Security and Protection Strategies

Date: 04/08/2025

Today, I’ll share my experience working with Wazuh, an open-source system that combines SIEM and XDR functionalities. It’s a flexible platform that easily adapts to different tasks, from protecting Active Directory and managing PowerShell tasks to safeguarding databases and quickly identifying vulnerabilities. Wazuh supports all operating systems and integrates with Docker and external APIs.
Read full article →


Checklist: Essential Steps After Purchasing a Virtual Linux Server

Date: 02/08/2025

A virtual server is suitable for handling a wide range of tasks, especially since renting one is quite affordable. If you’re using a VDS, be sure to check out this small checklist to go through after purchasing a virtual server. Ignoring these simple rules can create a serious security vulnerability in your system. The article focuses on setting up a VDS using Ubuntu as an example, but the instructions should work for most modern distributions.
Read full article →


Enhancing Event Auditing in Windows with Sysmon for Security Experts

Date: 25/07/2025

Technical specialists who have attempted to find truly important information in the logs of Microsoft Windows operating systems while investigating cybersecurity incidents or troubleshooting know that important details often don’t make it into the event audit logs. Is it possible to fix this situation without additional financial investment using tools that are guaranteed to be compatible with the Windows environment? Of course, it is!
Read full article →