Difference between revisions of "MUM 2011 HU"

From MikroTik Wiki
Jump to: navigation, search
(Day 2)
(Day 2)
Line 16: Line 16:
 
*[http://mum.mikrotik.com/presentations/HU11/maia.pdf Routing Security - Threats and best practices for External and Internal Routing] by Wardner Maia (MD Brazil, Brazil)
 
*[http://mum.mikrotik.com/presentations/HU11/maia.pdf Routing Security - Threats and best practices for External and Internal Routing] by Wardner Maia (MD Brazil, Brazil)
 
*Using Mikrotik's API along with PHP based management system by Mikolaj Jopczynski (Tychy Online, Poland)
 
*Using Mikrotik's API along with PHP based management system by Mikolaj Jopczynski (Tychy Online, Poland)
*Bridged to Routed by Dennis Burgess (Link Technologies, USA)
+
*[http://mum.mikrotik.com/presentations/HU11/bridged.pdf Bridged to Routed] by Dennis Burgess (Link Technologies, USA)
 
*RouterOS v5 released by Janis Megis, MikroTik (Latvia)
 
*RouterOS v5 released by Janis Megis, MikroTik (Latvia)
 
*[http://mum.mikrotik.com/presentations/HU11/imre.pdf ID card based authentication in public WiFi hotspot] by Imre Kuus (Sonictest, Estonia)
 
*[http://mum.mikrotik.com/presentations/HU11/imre.pdf ID card based authentication in public WiFi hotspot] by Imre Kuus (Sonictest, Estonia)

Revision as of 13:57, 16 March 2011

Day 1

Day 2

Photos