Backups should be made at constant intervals to safeguard against any mishaps. This is quite simple to do, simply head to the .>>Files window inside winbox. Within this files window, you will be presented with a Backup button that will create a Backup for You. This backup will also have a time stamp based on when the backup was created. Please ensure the time of your MikroTik router is set correctly under >> System > Clock before creating your backups
New versions of MikroTik RouterOS are being released all the time, and you will need to upgrade your RoouterBoards to make use of new features and bug fixes. To Start off, you will need to go to www.mikrotik.com to download the latest version available.
Once in the downloads section of MikroTik website you will need to choose the version of MikroTik device that you are using, be it a 400, 600, 800 series etc. You may then proceed to download the Combined Package.
Once the file downloaded, we can proceed to copy it to the MikroTik Router. Strart by logging into the router (Make sure you log into the IP address and not the MAC address), and to the Files Interface.
Once the Files window is open, you can drag and drop the upgrade package into this files list, or you can copy and paste the upgrade packages, whichever is easiest for you.
Once the file has finished copying to you router, you simply need to reboot the MikroTik to complete the update. You must however reboot the unit via winbox, as simply unplugging the power and plugging it back in again will not have any effect.
Every Good Network Administrator want’s to keep track of activities performed by his/her End Users. The KGB Keylogger is very handy tool for this purpose specially when security of the department is concerned. This product have lots of features like key-logging, screenshots, program activity monitoring, website monitoring, computer activity and chatting logs. The cool thing of this software is No one can find it after installing because it can not be found in running processes, task managers and add/ remove programs. The software can be launched by pressing secret combination of keys prescribed by the admin of the software. Admin can disable what feature he don’t wants to log. Like keylogging may be not required by every one, so it can be easily disabled in setting. This software can be run on standalone environments or Admin can also receive user’s log at his local SMTP mail server. You can download it from here