Remotely access your MikroTik router easily

Remotely access your MikroTik router easily

Remote WinBox is a service that allows you to securely connect WinBox to your MikroTik device via the cloud. This will give you WinBox access from anywhere. It’s perfect for connecting to devices on the other side of LTE; private networks; while traveling; to perform tech support; etc.

Here’s a Quick Start Guide for setting it up:
RemoteWinbox Guide

If you think you can figure it out on your own, you can go directly to their website at

Download NBA 2K21 for Free

NBA 2K21 is the latest release in the world-renowned, best-selling NBA 2K series. With exciting improvements upon its best-in-class gameplay, competitive and community online features, and deep, varied game modes, NBA 2K21 offers one-of-a-kind immersion into all facets of NBA basketball and culture – where Everything is Game.

Download here:

Sale ends 5/27/2021 at 11:00 PM

Iron Dome, Israel’s High-Tech Rocket Shield

The Israeli–Palestinian conflict is an ongoing violent struggle between Israelis and Palestinians. Various attempts have been made to resolve the conflict as part of the Israeli–Palestinian peace process. It has been referred to as the world’s “most intractable conflict”, with the ongoing Israeli occupation of the West Bank and the Gaza Strip reaching 54 years.

Since the rocket launches and airstrikes began, at least 122 Palestinians have been killed, including 31 children, while seven Israelis have been killed, including one child. On 11 May, the Israel Defense Forces claimed that at least 15 of the Palestinian casualties were confirmed members of Hamas, and also claimed that some Palestinian civilian casualties were caused by errant rocket launches within the Gaza Strip. As of 12 May 2021, both Israel and the Palestinian National Authority reported injuries for at least 300 Palestinians and 200 Israelis.

Iron Dome (Hebrew: כִּפַּת בַּרְזֶל‎, kippat barzel) is a mobile all-weather air defense system developed by Rafael Advanced Defense Systems and Israel Aerospace Industries. The system is designed to intercept and destroy short-range rockets and artillery shells fired from distances of 4 kilometres (2.5 mi) to 70 kilometres (43 mi) away and whose trajectory would take them to an Israeli populated area. Israel hopes to increase the range of Iron Dome’s interceptions, from the current maximum of 70 kilometres (43 mi) to 250 kilometres (160 mi) and make it more versatile so that it could intercept rockets coming from two directions simultaneously.

See some Github Iron Dome Projects:

World’s deadliest computer virus

The worm (ILOVEYOU Virus) originated in the Pandacan neighborhood of Manila in the Philippines on May 4, 2000, thereafter the following daybreak westward across the world as employees began their workday that Friday morning, moving first to Hong Kong, then to Europe, and finally the United States. The outbreak was later estimated to have caused US$5.5–8.7 billion in damages worldwide and estimated to cost US$10–15 billion to remove the worm. Within ten days, over fifty million infections had been reported, and it is estimated that 10% of Internet-connected computers in the world had been affected. Damage cited was mostly the time and effort spent getting rid of the infection and recovering files from backups. The Pentagon, CIA, the British Parliament, and most large corporations decided to completely shut down their mail systems to protect themselves. At the time, it was one of the world’s most destructive computer-related disasters ever.

The events inspired the song “E-mail” on the Pet Shop Boys‘ UK top-ten album of 2002, Release, the lyrics of which play thematically on the human desires, enabling the mass destruction of this computer infection.

National Institute of Standards and Technology (NIST) Releases Tips and Tactics for Dealing With Ransomware

Ransomware is a type of malware from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system so that it is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them.

NIST’s advices:

  • Use antivirus software at all times — and make sure it’s set up to automatically scan your emails and removable media (e.g., flash drives) for ransomware and other malware.
  • Keep all computers fully patched with security updates.
  • Use security products or services that block access to known ransomware sites on the internet.
  • Configure operating systems or use third-party software to allow only authorized applications to run on computers, thus preventing ransomware from working.
  • Restrict or prohibit use of personally owned devices on your organization’s networks and for telework or remote access unless you’re taking extra steps to assure security.

NIST also advises users to follow these tips for their work computers:

  • Use standard user accounts instead of accounts with administrative privileges whenever possible.
  • Avoid using personal applications and websites, such as email, chat and social media, on work computers.
  • Avoid opening files, clicking on links, etc. from unknown sources without first checking them for suspicious content. For example, you can run an antivirus scan on a file, and inspect links carefully.

Unfortunately, even with protective measures in place, eventually a ransomware attack may still succeed. Organizations can prepare for this by taking steps to ensure that their information will not be corrupted or lost, and that normal operations can resume quickly. 

NIST recommends that organizations follow these steps to accelerate their recovery:

  • Develop and implement an incident recovery plan with defined roles and strategies for decision making.
  • Carefully plan, implement and test a data backup and restoration strategy. It’s important not only to have secure backups of all your important data, but also to make sure that backups are kept isolated so ransomware can’t readily spread to them.
  • Maintain an up-to-date list of internal and external contacts for ransomware attacks, including law enforcement.

NIST has also published a more detailed fact sheet on how to stay prepared against ransomware attacks. You can find this material and more on ransomware at the NIST and CISA websites. These materials were produced by staff members in NIST’s Information Technology Laboratory and National Cybersecurity Center of Excellence.

Some Filipinos are earning cryptocurrency during the pandemic by playing a video game

One small community in the rural Philippines that turned to the NFT game, Axie Infinity (, to earn an income in cryptocurrency during the COVID-19 pandemic. It shows how the “play-to-earn” gaming phenomenon is creating new opportunities for thousands of players around the world, especially in emerging economies where job opportunities are lacking and government relief has been limited. If you want to learn more visit or join their discord

AI makes GTA V more realistic


We present an approach to enhancing the realism of synthetic images. The images are enhanced by a convolutional network that leverages intermediate representations produced by conventional rendering pipelines. The network is trained via a novel adversarial objective, which provides strong supervision at multiple perceptual levels. We analyze scene layout distributions in commonly used datasets and find that they differ in important ways. We hypothesize that this is one of the causes of strong artifacts that can be observed in the results of many prior methods. To address this we propose a new strategy for sampling image patches during training. We also introduce multiple architectural improvements in the deep network modules used for photorealism enhancement. We confirm the benefits of our contributions in controlled experiments and report substantial gains in stability and realism in comparison to recent image-to-image translation methods and a variety of other baselines.



Cignal Connect Satellite Broadband


Satellite broadband is a technology that enables internet connectivity to areas that are currently not covered by fiber and mobile broadband. This makes Cignal Connect the perfect solution for people in remote or isolated areas, giving you internet access wherever you are.


1.2m Antenna and 3W BUC

The combination of the 1.2 antenna and 3W BUC (Block Upconverter) gives you a stable connection and optimal quality of service

HT 2300 Modem

The HT 2300 Modem is a powerful, next-generation satellite terminal designed for residential and SME use.


You may reach them at:

Cignal Sales Number

Sales Number: (02) 8888-5555

Mobile Number: 0949 997 7600 (up to 7603) or 0917 658 5555

Sales Emails: /


Subscriber Identity Module (SIM) Card Registration Act, appealed to congress to be passed immediately, citing that some prepaid SIMs are being used for illegal activities

Under the proposed SIM Card Registration Act, end-users of prepaid SIM cards shall be required to present a valid ID and photo and sign a control-numbered registration form issued by the service provider of the purchased SIM card.

Gatchalian adds that his proposed bill will work together with the Internet Transactions Act (ITA), of which he is also the principal author, to curb illegal online activities. “With these two laws in place, the e-commerce sphere would be a safer place for consumers and businesses alike.”

According to the lawmaker, telecommunications companies and even delivery riders support this measure. He said even text scams would be eradicated if the bill would be passed into law.

House Bill No. 5793


The Lyceum of the Philippines University, Manila Campus has officially launched its Bachelor of Science in Esports degree


The Bachelor of Science in Esports focuses on the back-end or the business of esports. This program comprises track in Esports Management and Game Design and Development grounded on the fundamental knowledge of esports. The program prepares the students to develop business plans, organize and coach teams, plan and implement events utilizing live streaming, and promote events via digital technology. With the fast-growing billion-dollar industry, the workforce opportunities within the esports ecosystem have a growing demand for professionals with passion and knowledge of the esports industry. Students enrolled in the Bachelor of Science in Esports will explore the culture of esports, and experience opportunities for internships through industry partnerships to prepare the students with careers in the esports industry.


The BSE program is expected to produce God-centered, nationalistic, environment-conscious and globally-competitive professionals with wholesome values and attitudes. They will be recognized for their outstanding and innovative contributions in the esports industry, in the service of God and country.

BSE Track 1: Esports Management

This track covers fundamental concepts of Esports management. This is meant to enhance the management and organization, planning and team management, and business skills of the students. The program also enables the students to develop business plans and organize events utilizing online streaming, marketing, and advertising events through digital technology.

BSE Track 2: Game Design and Development

This track covers the concepts, principles, and techniques in design and development grounded on the fundamental knowledge of esports. This aims to develop knowledge and understanding of esports blended with the concept of game design theories and game programming. The program enables the students to enhance creativity and inventiveness in game design and game development.