How To – Upgrade MikroTik RouterOS

New versions of MikroTik RouterOS are being released all the time, and you will  need to upgrade your RoouterBoards to make use of new features and bug fixes.  To Start off, you will need to go to to download the latest version available.


Once in the downloads section of MikroTik website you will need to choose the version of MikroTik device that you are using, be it a 400, 600, 800 series etc. You may then proceed to download the Combined Package.


Once the file downloaded, we can proceed to copy it to the MikroTik Router.  Strart by logging into the router (Make sure you log into the IP address and not the MAC address), and to the Files Interface.


Once the Files window is open, you can drag and drop the upgrade package into this files list, or you can copy and paste the upgrade packages, whichever is easiest for you.


Once the file has finished copying to you router, you simply need to reboot the MikroTik to complete the update. You must however reboot the unit via winbox, as simply unplugging the power and plugging it back in again will not have any effect.

Monitor Your Computer in a Hidden Way With KGB Keylogger Software

Every Good Network Administrator want’s to keep track of activities performed by his/her End Users.  The KGB Keylogger is very handy tool for this purpose specially when security of the department is concerned. This product have lots of features like key-logging, screenshots, program activity monitoring, website monitoring, computer activity and chatting logs.  The cool thing of this software is No one can find it after installing because it can not be found in running processes, task managers and add/ remove programs.  The software can be launched by pressing secret combination of keys prescribed by the admin of the software.  Admin can disable what feature he don’t wants to log.  Like keylogging may be not required by every one, so it can be easily disabled in setting.  This software can be run on standalone environments or Admin can also receive user’s log at his local SMTP mail server.  You can download it from here

Completely Delete Data from Your Hard Drive (Specially Good For Govt Departments)

The recycle bin of Windows does not delete data from your hard drive when you click on”empty recycle bin” or deleting file pressing SHIFT+DELETE button.  Its just mark the space available for new data to write. So its mean data is always there until new takes the same place where deleted data was written. even then, sometimes fragments of data remain.

To truly overcome on this sensitive security issue you need to delete the data completely from your hard/flash disks. Here is cool free software with the name of eraser.


Once you have downloaded and installed Eraser, run the software. At the top of the screen, click Settings to view the software’s high-tech security options

Under Erase Settings, use the drop down menu to view potential deletion methods. You will notice methods based on military methods from around the world. By default, Eraser uses the 35 pass method, which should completely decimate all data.


If you want to be able to deny later that you purposely erased information on your hard drive, you can designate a specific file or series of files to use in the re-writing process. This might allow you plausible deniability later.

plausible deniability

When you have saved your favorite settings, click the drop-down arrow next to erase schedule and choose New Task.


Click the Add button towards the bottom of the window to choose files and locations to erase.

task window 1

From the next window, you can choose to erase specific files, files in a specific folder, unused space on a drive, or everything in the recycle bin. When you have made your selections, click OK twice to run Eraser.

stuff to erase

Eraser is a good way to delete data from your hard drive. Will it stand up against the best cyber crime fighters in the world? We do not know for certain, and would really rather not find out!