2026-03-25
MikroTik released a new RouterOS 7.22. In short: the developers decided to turn regular containers into a more user-friendly “Apps” ecosystem, added a native Reverse Proxy, and upgraded BGP to the level of …
2025-11-03
pfSense — a tank in the world of firewalls.
Is updated less often, but runs for years without surprises.
🏢 Who pfSense is for Corporation with 100+ users Needs official support Has old but reliable hardware Value …
2025-11-02
OPNsense — it’s like pfSense, but prettier, faster, and with an API.
Want an office firewall you wouldn’t be embarrassed to show your boss? Here it is.
💼 Who OPNsense is for Office of 10–50 people VPN for all …
2025-11-01
Imagine: an old router for 2000 ₽ blocks ads, shares a VPN, works as a Mesh system and doesn’t slow down even with 50 devices.
This is not magic — this is OpenWRT.
🏠 Who needs OpenWRT OpenWRT turns an ordinary router …
2025-10-21
Tired of intrusive ads that slow down page loads and track your every move?
Browser extensions are good, but what if you could block ads for your entire home network — smartphones, Smart TVs and IoT devices — all at …
2025-10-09
Noticed how in Gmail or other mail services the logos of big companies — and even a blue checkmark — appear next to their messages?
It’s not just pretty — it’s the result of BIMI (Brand Indicators for Message …
2025-08-27
The Problem with Certificates at Scale In previous articles, we discussed that OpenVPN uses certificates for authentication. This method is reliable but has significant drawbacks:
Inconvenience for users: Each user must …
2025-08-26
VPN: Not Just an “On” Button For many users, a VPN is simply an “On” button. However, when it comes to building your own secure tunnel, it’s important to understand its architecture. OpenVPN is …
2025-08-25
OpenVPN: A Time-Tested Standard Introduction In a world where the speed and simplicity of WireGuard have become the new standard, OpenVPN remains one of the most reliable and flexible VPN protocols. It works both on …
2025-08-23
When Control Matters Most Services like Tailscale and NetBird are convenient, but they rely on a third-party control server responsible for authentication, key distribution, and route exchange. For those who, for …
2025-08-22
When Zero-config VPN Means More Than Just Tailscale Although Tailscale has become the benchmark for simplicity, it’s not the only player in the Zero-config VPN field. ZeroTier and NetBird offer similar functionality but …
2025-08-21
What is Tailscale? Tailscale is a VPN service that positions itself as a Zero-config VPN. It uses the WireGuard protocol to create a secure mesh network between all your devices. The key difference from other solutions …
2025-08-20
Evolution of Remote Access Traditional VPN services, which most of us are familiar with, work on the “hub-and-spoke” principle (star topology). This means that all traffic from the client to the protected …
2025-08-19
Dynamic Routing on Keenetic: BGP and OSPF When Static Routing Isn’t Enough In most home networks, routing is simple: all traffic is sent through a single ISP. In such cases, static routing is sufficient. But what …
2025-08-18
Keenetic as a VPN Client: Network-Wide Protection Why Use a Router-Level VPN Client? Setting up a VPN client on every individual device can be tedious. Moreover, many devices (Smart TVs, gaming consoles, IoT gadgets) …
2025-08-17
Keenetic as a VPN Server: Secure Remote Access The Remote Access Problem When you’re away from home or the office, accessing local resources — such as a network-attached storage (NAS), server, or smart devices — can be …
2025-08-16
Keenetic: A Router Whose Main Asset Is Its Operating System A Quick Look at Keenetic In the world of home routers, where most devices come with proprietary, bloated firmware, Keenetic stands out with its unique approach. …
2025-08-14
Introduction: The First Line of Defense for Your Server Before thinking about complex intrusion detection systems such as Fail2ban or CrowdSec, you need to build the first and most reliable line of defense—a firewall. A …
2025-07-30
We conclude our series on communication link redundancy by exploring perhaps the most critical scenario for modern companies: ensuring continuous Internet access for web services, applications, and data centers. If your …
2025-07-29
Redundancy of Interoffice Links (Site-to-Site VPN, MPLS, Dark Fiber) We’ve already discussed how to ensure reliable connectivity within a single building. Now let’s look at a more complex but equally critical topic: …
2025-07-27
In today’s world, where every aspect of business depends on IT, and downtime is measured not only in lost revenue but also in missed opportunities and reputational damage, connection stability becomes a critically …
2025-07-11
Introduction: UniFi – An Ecosystem for Modern Networks In the world of business networking, many solutions exist—but few offer the same level of integration, management simplicity, and aesthetics as the UniFi product …
2025-07-10
Introduction: Mikrotik – More Than Just a Router When it comes to networking hardware for home or small offices, most people think of consumer-grade routers like those from TP-Link, ASUS, or D-Link. However, there’s a …
2025-06-23
031 | Proxy Servers in Action: 3proxy — A Compact and Multifunctional Proxy Server 🤏⚙️ In our exploration of proxy servers, we’ve already looked at giants like Nginx and HAProxy, as well as the versatile …
2025-06-19
In today’s internet-driven world, where data constantly travels between millions of devices, it’s often not enough to establish a direct connection — you may need a “middleman.” That’s where a proxy server …
2025-06-15
We’ve already established that renting 1C in the cloud is often the best choice for small and medium-sized businesses. But how do you choose the right provider — and just as importantly, how do you secure access to your …
2025-05-31
Now that you know about the different types of DNS records, let’s figure out how to configure them and, just as importantly, how to ensure everything is working correctly. Proper DNS setup is a key step to your …
2025-05-30
Continuing the topic of DNS, in addition to the basic A and MX records, there are three other critically important records that are responsible for the security of your mail and its deliverability — that is, ensuring …
2025-05-29
We’ve already discussed how to get your own domain and reviewed the available options for building and hosting a website and email. Now it’s time to dive into what ties all these elements together — the Domain Name …