Posts

MikroTik rsc File

Image
Mastering the MikroTik .rsc File: Your Guide to Portable Configurations If you’ve ever managed a MikroTik router, you’ve likely encountered two types of "backup" files: the standard .backup and the flexible .rsc . While the binary backup is great for a quick "undo" button, the .rsc (RouterOS Script) file is the true secret weapon for network administrators. In this post, we’ll dive into what an .rsc file is, why it’s superior for migrations, and how to use it like a pro.      What exactly is a .rsc file? Unlike a standard system backup, an .rsc file is a plain-text script . It contains the exact CLI (Command Line Interface) commands required to rebuild your router’s configuration from scratch. Think of it this way: A .backup file is a "snapshot" of the router's entire brain. An .rsc file is a "recipe" that tells the router how to cook the configuration. Why use .rsc instead of .backup? Most beginners rely on /system backup , but experien...

Thank you sir Paeng

Thank you, Sir Paeng. Dati akong bata, careless, at minsan masyadong emotional, madalas kong itake things personal. I was still learning how to manage my emotions, my mindset, and my approach to work. Pero despite all that, you still gave me the opportunity to grow. You never treated me differently; instead, you accepted my flaws and helped me see my own capabilities, kahit ako mismo minsan nagdududa pa. You inspired me to become better not through pressure, but through trust, patience, and consistency. Hanggang ngayon, you continue to make me believe that I can still improve, learn, and do more. Your belief in me pushed me to aim higher and take responsibility for my growth. Maraming salamat sa tiwala at pagtanggap, at sa mga lessons you shared lalo na sa negotiation, rational thinking, at decision-making. These are lessons I continue to carry with me, hindi lang sa trabaho, kundi sa araw-araw na buhay. Through your actions, you showed me what real leadership looks like leading with f...

The Dude 3.6: My Favorite Network Monitoring Tool—Simple Yet Effective

Image
For a certain generation of network administrators, the sound of an alarm going off wasn't just a crisis—it was the signature notification of **The Dude** network monitor. Specifically, we’re talking about **The Dude client 3.6**, a version that, despite its age, still holds a very special place in the hearts of those who ran MikroTik environments during its prime. Why are people still talking about a version that's well over a decade old? Let's take a nostalgic trip down memory lane and appreciate the power and simplicity of this networking legend. What Made The Dude 3.6 a Classic? 1. The Graphical Genius and Real-World Examples The most enduring feature of The Dude was—and still is—its intuitive, visual network mapping. Version 3.6 allowed you to: **Auto-Discover and Map:...

BREAKING: “Facebook Recovery Agents” Exposed as Scammers Targeting Filipino Users

Image
  🚨 BREAKING: “Facebook Recovery Agents” Exposed as Scammers Targeting Filipino Users 📢 A New Online Threat Is Spreading If you’ve seen comments on Facebook saying — “PM me, I can recover your hacked account,” you’re not alone. A wave of so-called  “Facebook Recovery Experts”  is sweeping through local groups, offering “account recovery help.” But here’s the truth:  it’s all a scam. 🧠 What’s Really Going On These scammers pretend to be tech specialists or “Meta support staff.” They look professional — using fake badges, Meta logos, and friendly chat messages. They promise to restore your hacked Facebook account for a small “service fee.” Once you trust them, they strike. They’ll either: Steal your  account credentials , or Take your  money  and disappear. It’s a  growing trend  targeting Filipinos desperate to get their pages or businesses back. 🕵️‍♂️ Common Scam Scenarios 1. The “Official-Looking” Meta Agent They use names like  “FB...

Firewall: Understanding Custom Chains

Image
Understanding Custom Chains Ever wondered what makes MikroTik firewalls so flexible? It’s the custom chain feature — a powerful way to group and reuse firewall rules efficiently. Think of it as creating “mini rule blocks” or “functions” inside your firewall configuration. Let’s break it down in a practical, Pinoy-friendly way. 🔥 What Is a Custom Chain? In MikroTik, a custom chain works like a shortcut or function . Instead of writing repetitive rules for every scenario, you can group related ones together. When a packet matches your condition, you “jump” into your custom chain, process the rules, then return to the main flow. ⚙️ Example: LAN Traffic Filtering Here’s a simple setup where we handle LAN traffic separately: # MikroTik Firewall Example /ip firewall filter add chain=forward src-address=192.168.88.0/24 action=jump jump-target=LAN-RULES add chain=LAN-RULES protocol=tcp dst-port=80,443 action=accept comment=...

DNS for Beginners: Simple Guide to How the Internet Works

Image
DNS for Beginners: Simple Guide to How the Internet Works The Domain Name System (DNS) is like the phonebook of the internet. It translates human-friendly domain names like pinoytechshare.blogspot.com into IP addresses that computers understand. In this guide, we'll break down DNS in simple terms for beginners. 1. How DNS Works When you type a website address in your browser: Your device asks a resolver (usually your ISP) to find the IP address. The resolver checks its cache. If not found, it queries the root DNS servers . Root servers point to TLD servers (like .com, .org). TLD servers point to the authoritative server for the domain. The resolver gets the IP and your browser connects to the website. 2. Common DNS Record Types A record: Maps a domain to an IPv4 address. AAAA record: Maps a domain to an IPv6 address. CNAME: Alias of another domain. MX: Mail exchange server for email delivery. NS: Nameserver for the domain. TXT: Text...

Understanding CGNAT (Carrier-Grade NAT / NAT444)

Image
Understanding CGNAT (Carrier-Grade NAT / NAT444) Continuing from our discussion on why you shouldn’t use public IPs in DHCP networks , let’s dive deeper into what Internet Service Providers (ISPs) do when they run out of public IPv4 addresses. The answer lies in a system called Carrier-Grade NAT (CGNAT) — also known as NAT444 . 🌐 Why CGNAT Exists The Internet runs primarily on IPv4, which uses 32-bit addresses — a maximum of about 4.3 billion unique IPs. When the internet started, that number seemed huge. But as the number of devices, mobile users, and ISPs exploded, the available IPv4 pool began to dry up. ISPs faced a dilemma: assign each customer a unique public IP and eventually run out, or find a way to share a smaller number of IPs among thousands of users. That’s where CGNAT comes in. CGNAT allows multiple subscribers to share a single publi...