rayman30

joined 2 years ago
MODERATOR OF
[–] rayman30@lemmy.world 9 points 2 years ago (1 children)

Htrrt, tfrrfjhbc? Frttd…uhytg! 😀

 

This a colllection of videos that explores a variety of topics around creating scripts for the Mikrotik platform. It includes step-by-step lessions and tutorials showing you how to create your own MikroTik scripts.

The videos presented provide a hands-on, learn-by-example approach rather than being formal-training style presentations. They dip in to various scripting topics as we meet them using real-world scripting examples.

[–] rayman30@lemmy.world 5 points 2 years ago (2 children)
[–] rayman30@lemmy.world 9 points 2 years ago

Psilograph-Thin

Wow, I am not dyslectic, but my eyes hurt when I read that font!

[–] rayman30@lemmy.world 4 points 2 years ago* (last edited 2 years ago)
  • Seeking Understanding: Humans are naturally curious beings. We want to know the reasons behind events, behaviors, and circumstances to make sense of the world. Asking "why?" helps us gain insight into the causes and mechanisms behind various phenomena.

  • Problem Solving: In many situations, asking "why?" is the first step in finding solutions to problems. By understanding the underlying reasons for a problem, individuals can devise appropriate strategies to address it effectively.

  • Identifying Motivations and Intentions: When people ask "why?" in interpersonal interactions, they are often trying to understand the motivations and intentions of others. This can help with empathy, communication, and building better relationships.

  • Challenging Assumptions: Questioning why something is done a certain way can help challenge existing assumptions or norms. This critical thinking process can lead to innovation and improvements in various aspects of life.

  • Gaining Knowledge: Asking "why?" is a fundamental way to acquire knowledge. It encourages exploration, research, and learning. It's through questioning that people expand their understanding of the world and its complexities.

  • Encouraging Dialogue: In discussions and debates, asking "why?" invites others to provide reasoning and evidence to support their claims. It fosters constructive dialogue and helps clarify different perspectives.

  • Stimulating Curiosity: Asking "why?" is a way to keep curiosity alive. It sparks interest in exploring new ideas and leads to continuous learning.

  • Establishing Cause and Effect: "Why?" questions often seek to establish cause-and-effect relationships. Understanding these relationships is crucial in various fields, including science, history, and psychology.

  • Enhancing Decision Making: When facing choices or making decisions, questioning why certain options are better than others allows individuals to make informed and rational choices.

sponsored by ChatGPT :)

[–] rayman30@lemmy.world 11 points 2 years ago (1 children)

I see you say 'no resale value', but specs like that do 650,- to 700,- here in The Netherlands. Are you sure there is no value here? It seems as a firewall, it will consume lots of electricity. (Too much for 24/7?)

[–] rayman30@lemmy.world 4 points 2 years ago

Super Mario Advance 1,2,3 and 4

[–] rayman30@lemmy.world 56 points 2 years ago (5 children)

Ah, the early days of the internet where every click on a link felt like you discovered something new and exciting. I remember making my own 'homepage' (with stats counter, most of the visits were my own), the dial-up modem's noises, browsing open ftp servers to find interesting warez and generally not worrying about viruses.

[–] rayman30@lemmy.world 2 points 2 years ago

I have all my book stored in Google Books, and I like it.

[–] rayman30@lemmy.world 2 points 2 years ago* (last edited 2 years ago) (2 children)

I had the same problem and used lots of extra dedorant, but I was still sweating. Then I found Odorex Extra Dry Spray. You don't use it like regular deodorant, but instead you spray it on your armpits before you go to bed. You won't sweat for the next two days! I use it for work, I hate it when my shirt shows wet spots when I am hosting a meeting for example. This is for sale in The Netherlands, but I am sure there are alternate brands that offer similar products.

[–] rayman30@lemmy.world 5 points 2 years ago

Hex(0xDEADBEEF) Rip Kevin

 

MikroTik RouterOS comes with a default firewall configuration designed to provide basic network security. As a new user, comprehending these default firewall rules is essential to evaluate the initial level of protection for your network. In this technical guide, we will break down the default firewall rules and teach you how to interpret them to ensure your network's security is optimized.

Accessing the Firewall Configuration

To access the firewall configuration in MikroTik RouterOS, follow these steps:

Step 1: Log in to the MikroTik RouterOS Web Interface or connect via the Terminal (SSH or Telnet).

Step 2: Access the firewall settings by entering the following command in the terminal:

Interpreting Default Firewall Rules

By executing the above command, you will see a list of rules with columns representing essential parameters. Here's how to interpret the default firewall rules:

Column Headers:

  • CHAIN: Specifies the traffic direction the rule applies to (input, forward, or output).
  • SRC-ADDRESS: Defines the source IP address or IP range the rule affects.
  • DST-ADDRESS: Indicates the destination IP address or IP range the rule applies to.
  • PROTOCOL: Specifies the protocol (e.g., TCP, UDP) or all for any protocol.
  • ACTION: Determines what action the rule takes (accept, drop, reject, etc.).
  • COMMENT: Provides a description or comment for the rule (optional).

Default Input Chain Rule

The default rule in the input chain ensures the router itself is protected. It allows established connections (marked as "ESTABLISHED") to be accepted, so responses to outgoing traffic are allowed. It also permits related connections (marked as "RELATED"), enabling protocols like FTP to function correctly. Finally, the rule drops all incoming traffic with an invalid state.

Example Default Input Chain Rule:

0   ;;; defconf: drop all not coming from LAN
    chain=input action=drop in-interface=!yourLANinterface connection-state=new

Default Forward Chain Rule

The default rule in the forward chain controls traffic traversing between different networks. It accepts established and related connections (similar to the input chain) while blocking any new connections from external sources to the router.

Example Default Forward Chain Rule:

0   ;;; defconf: drop all from WAN not DSTNATed
    chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface=!yourWANinterface

Default Output Chain Rule

The default rule in the output chain allows all outgoing traffic from the router to external destinations.

Example Default Output Chain Rule:

0   ;;; defconf: accept all from LAN
    chain=output action=accept out-interface=!yourLANinterface

Enhancing Firewall Rules

To enhance your network security, consider adding custom rules. For example, you can create rules to block specific incoming traffic, allow access to specific services, or implement Layer 7 protocol filtering.

Understanding the default firewall rules in MikroTik RouterOS is crucial to assess the initial level of network security. By interpreting the rules provided in the default configuration, you can evaluate and enhance your network's protection as per your specific requirements. Take advantage of custom firewall rules, connection tracking, and Layer 7 protocol filtering to strengthen your network's defenses and ensure a secure and robust network environment.

 

This community is about all things MikroTik. Hardware, software, questions and answers. Come join us at !mikrotik@lemmy.world

 

TIL that the shortest war in history took place between Britain and Zanzibar on August 27, 1896, lasting only 38 minutes. The conflict arose due to a succession dispute within the Zanzibar Sultanate after the death of the ruling Sultan. As tensions escalated, the British government intervened and issued an ultimatum to the rival claimant, demanding his resignation.

When the ultimatum expired, the British fleet, consisting of warships armed with powerful artillery, swiftly attacked the Sultan's palace. The poorly equipped defenders of the Sultanate, outnumbered and outgunned, stood little chance against the onslaught. Within less than an hour, the Sultan's forces surrendered, and the British installed their preferred candidate as the new Sultan.

view more: next ›