Tuesday, February 26, 2019

cara menghilangkan emmbedde excell pada word

pada saat kita menyisipkan file table excell pada ms word
kita menemukan tulisan emmbeded seperti di bawah ini :

solusinya cukup mudah
anda block saja tulusan embed itu seluruhnya
lalu tekan alt + f9

alt ( ditahan jangan di lepas ) + f9 ( pada keyboard anda )

lihat apakah tulisan embede itu teha hilang atau tidak
bila belum juga berhasil , silahkan instal ulang pc anda kemungkinan kena virus system 32 nya.

terimakasih

Wednesday, February 6, 2019

Blokir Proxy dan DNS Mikrotik dari Luar

/ip firewall rule
add comment=”BLOKIR DNS DARI LUAR” chain=input action=drop connection-state=new protocol=udp in-interface=[interface internet ip publik] dst-port=53 log=no log-prefix=””
add comment=”BLOKIR PROXY DARI LUAR” chain=input action=drop connection-state=new protocol=tcp in-interface=[interface internet ip publik] dst-port=[port proxy kita] log=no log-prefix=””

sumber

Filter Rule Mikrotik Mode Dasar

add chain=input protocol=tcp tcp-flags=syn,rst action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w comment=”” disabled=yes
add chain=input protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w comment=”” disabled=yes
add chain=input protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w comment=”” disabled=yes
add chain=input protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w comment=”” disabled=yes
add chain=input src-address-list=”port scanners” action=drop comment=”” disabled=yes
add chain=input protocol=tcp dst-port=21 src-address-list=ftp_blacklist action=drop comment=”Filter FTP to Box” disabled=yes
add chain=output protocol=tcp content=”530 Login incorrect” dst-limit=1/1m,9,dst-address/1m action=accept comment=”” disabled=yes
add chain=output protocol=tcp content=”530 Login incorrect” action=add-dst-to-address-list address-list=ftp_blacklist address-list-timeout=3h comment=”” disabled=yes
add chain=forward protocol=tcp action=jump jump-target=tcp comment=”Separate Protocol into Chains” disabled=yes
add chain=forward protocol=udp action=jump jump-target=udp comment=”” disabled=yes
add chain=forward protocol=icmp action=jump jump-target=icmp comment=”” disabled=yes
add chain=udp protocol=udp dst-port=69 action=drop comment=”Blocking UDP Packet” disabled=yes
add chain=udp protocol=udp dst-port=111 action=drop comment=”” disabled=yes
add chain=udp protocol=udp dst-port=135 action=drop comment=”” disabled=yes
add chain=udp protocol=udp dst-port=137-139 action=drop comment=”” disabled=yes
add chain=udp protocol=udp dst-port=2049 action=drop comment=”” disabled=yes
add chain=udp protocol=udp dst-port=3133 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=69 action=drop comment=”Bloking TCP Packet” disabled=yes
add chain=tcp protocol=tcp dst-port=111 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=119 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=135 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=137-139 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=445 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=2049 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=12345-12346 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=20034 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=3133 action=drop comment=”” disabled=yes
add chain=tcp protocol=tcp dst-port=67-68 action=drop comment=”” disabled=yes
add chain=icmp protocol=icmp icmp-options=0:0-255 limit=5,5 action=accept comment=”Limited Ping Flood” disabled=yes
add chain=icmp protocol=icmp icmp-options=3:3 limit=5,5 action=accept comment=”” disabled=yes
add chain=icmp protocol=icmp icmp-options=3:4 limit=5,5 action=accept comment=”” disabled=yes
add chain=icmp protocol=icmp icmp-options=8:0-255 limit=5,5 action=accept comment=”” disabled=yes
add chain=icmp protocol=icmp icmp-options=11:0-255 limit=5,5 action=accept comment=”” disabled=yes
add chain=icmp protocol=icmp action=drop comment=”” disabled=yes
add chain=input dst-address-type=broadcast action=accept comment=”Allow Broadcast Traffic” disabled=yes
add chain=input connection-state=established action=accept comment=”Connection State” disabled=yes
add chain=input connection-state=related action=accept comment=”” disabled=yes
add chain=input connection-state=invalid action=drop comment=”” disabled=yes

sumber

Protect Ddos Mikrotik

/ip firewal filter
add action=add-src-to-address-list address-list=DDOS address-list-timeout=15s chain=input disabled=no dst-port=1337 protocol=tcp
add action=add-src-to-address-list address-list=DDOS address-list-timeout=15m chain=input disabled=no dst-port=7331 protocol=tcp src-address-list=knock
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”Port scanners to list ” disabled=no protocol=tcp psd=21,3s,3,1
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”SYN/FIN scan” disabled=no protocol=tcp tcp-flags=fin,syn
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”SYN/RST scan” disabled=no protocol=tcp tcp-flags=syn,rst
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”FIN/PSH/URG scan” disabled=no protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”ALL/ALL scan” disabled=no protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list=”port scanners” address-list-timeout=2w chain=input comment=”NMAP NULL scan” disabled=no protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg

sumber

Load Balancing PCC Mikrotik

WAN1 =192.168.165.2/24 interface=ether1-Modem1
WAN2 =192.168.166.2/24 interface=ether2-Modem2
WAN3 =192.168.167.2/24 interface=ether3-Modem3
Local  =192.168.77.1/24   interface=ether4-Lan
/ip firewall mangle
add action=accept chain=prerouting disabled=no in-interface=ether1-Modem1
add action=accept chain=prerouting disabled=no in-interface=ether2-Modem2
add action=accept chain=prerouting disabled=no in-interface=ether3-Modem3
add action=mark-connection chain=prerouting disabled=no dst-address-type=!local new-connection-mark=wan1_conn passthrough=yes per-connection-classifier=both-addresses-and-ports:3/0 src-address=192.168.77.0/24
add action=mark-connection chain=prerouting disabled=no dst-address-type=!local new-connection-mark=wan2_conn passthrough=yes per-connection-classifier=both-addresses-and-ports:3/1 src-address=192.168.77.0/24
add action=mark-connection chain=prerouting disabled=no dst-address-type=!local new-connection-mark=wan3_conn passthrough=yes per-connection-classifier=both-addresses-and-ports:3/2 src-address=192.168.77.0/24
add action=mark-routing chain=prerouting connection-mark=wan1_conn disabled=no new-routing-mark=to_wan1 passthrough=yes src-address=192.168.77.0/24
add action=mark-routing chain=prerouting connection-mark=wan2_conn disabled=no new-routing-mark=to_wan2 passthrough=yes src-address=192.168.77.0/24
add action=mark-routing chain=prerouting connection-mark=wan3_conn disabled=no new-routing-mark=to_wan3 passthrough=yes src-address=192.168.77.0/24

/ip firewall nat
add action=masquerade chain=srcnat disabled=no out-interface=ether1-Modem1 src-address=192.168.77.0/24
add action=masquerade chain=srcnat disabled=no out-interface=ether2-Modem2 src-address=192.168.77.0/24
add action=masquerade chain=srcnat disabled=no out-interface=ether3-Modem3 src-address=192.168.77.0/24 

/ip route
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.165.1 routing-mark=to_wan1 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.166.1 routing-mark=to_wan2 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.167.1 routing-mark=to_wan3 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.165.1 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.166.1 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.167.1 scope=30 target-scope=10

Agar perlu di ingat, bagi anda yang menggunakan dial pppoe langsung di mikrotik untuk interfacenya di arahkan langsung ke interface pppoenya bukan interface ethernet mikrotiknya.
sumber : master Isur Ganteng's