English
+1 (506) 500-5957 sales@monovm.com

Category - Oliver K

Everythings you want and need to know in one place.

Search:

The SSH command offers a complete secured and encrypted connection between multiple hosts on the insecure network.  This SSH connection is also beneficial for file transfer, terminal access, and for different tunneling applications. Now let’s have a little information about Winbox; it is a small utility that provides Mikrotik RouterOS administration by a simple GUI(graphical user interface). In simple words, Winbox works as a native Win32 binary, but it can be run on different OS like Linux and Mac OSX by Wine.  Suppose that you use Mikrotik and wish to connect via SSH to another Linux...

In order to reach maximum productivity, you want to have the time on all the machines in your network synced. If you are using MikroTik router hardware, it is most efficient to set up an NTP server on the MikroTik router which will automatically update its time using the internet and share it with the other devices connected to the router. Today, we will show you how to do exactly that. Before getting to the tutorial, however, let us briefly explain what NTP is and why you should use it within your network.   What is NTP? NTP stands for the Network Time Protocol and is a protocol that is...

As we know, every device requires updates to work correctly and fix bugs. Updates are released in order to fix system bugs or even make the system more powerful through optimization. MikroTik routers like every device can receive updates. If you have a MikroTik router, please follow the below steps to update your operating system.   What is Mikrotik? MikroTik itself is a Latvian network equipment manufacturing company. They develop and sell wired and wireless network routers, network switches, access points, as well as operating systems and auxiliary software for their...

If you are an admin of a network, you should always monitor the network and know what goes on in it. Monitoring is the responsibility of each network admin. To do so, MikroTik provides an application named Dude that allows you to monitor your network. Here is a short tutorial on how to install Dude server on MikroTik. At first download the dude package (.npk) and the dude client (.exe) from MikroTik software download page (https://www.mikrotik.com/download).   Step 1: Connect to the MikroTik OS via Winbox. Step 2: Click on files from the left side menu Step 3: Upload the .npk file to...

Cybersecurity has become the most important aspect surrounding the Internet and online privacy. With technology getting better, our devices are being integrated with more sophisticated browser software and complementary tools. One of the most powerful tools for having online privacy is the incognito mode in a security tool.   We all use this browsing mode for different reasons. Its main purpose is not to have any digital footprint across the Internet. The data trail will be removed in incognito mode session, and the websites that you often visit will not be able to track your...

At first, maybe we think the time and date is not important but after we get more experience we know that the time and date is the most important thing in every system. With a correct date and time, we will have a correct log file and even have the possibility to trade between other servers or devices. Follow the steps below to set time and date in MikroTik: At first log in to your MikroTik via Winbox. Choose “Clock” from “system” menu.   In the first tab, you can set the time. Available options are defined below: Time: the current time of the device. Date: the current date of...

Switching firewalld to iptables on CentOS One of the most important changes to be made in the CentOS is changing iptables to firewalld. If you want to revert this switch and go back to using iptables, it is possible however, you must originally configure the firewall. Follow the steps outlined below to change firewalld to iptables. Use the following code to install iptables: yum install –y iptables-services Then mask firewalld service: systemctl mask firewalld Now, we should enable the iptables service: systemctl enable iptables systemctl enable ip6tables Next, enter the iptables...

Linux servers are based on a command-line interface by default, however, some might want to use them with a visual interface. In these cases, we can install an application that provides a GUI (i.e. Graphical User Interface). One of such applications is named GNOME and you can follow the steps outlined below to get it on your machine.   What is GNOME? GNOME (i.e., GNU Network Object Model Environment) is a graphical user interface and set of computer desktop applications for users of the Linux computer operating system. It's intended to make a Linux operating system easy to use for...

Network manager is a service that runs in the background of the system. It allows users to easily set up new network connections. Its true usefulness can be seen when attempting to configure a wireless connection or a virtual private network (i.e. VPN). There are, however, circumstances where this service needs to be disabled and today we will show you exactly how to do that.   Disable Network Manager in CentOS In order to install some applications on CentOS 7 VPS Server, we have to disable the network manager. Consider that we want to install cPanel, unless the...

MikroTik is the operating system created by MikroTik RouterBOARD hardware that users can install on the PC. Users can turn it into the router with essential features such as wireless access point, routing, bandwidth management, VPN server, backhaul link, firewall, hotspot gateway, and so on.  In this guide, we want to learn about How to Traceroute on MikroTik. It is a command-line program that assists in troubleshooting network connectivity issues using echo packets to trace the route.   Traceroute on MikroTik [Mikrotik Traceroute Command] This tool is used to check hops (i.e., the way...