How does an access transfer control function in a communications network work mathematically?

I read here about Lawful interception in a communications network. There is a function called access transfer control function.
What is it in mathematical terms?

I don’t want understand the process (I know how it is impleme… Continue reading How does an access transfer control function in a communications network work mathematically?

Identify malicous hosts in our network by sending valid domain credentials

We are currently whitelisting the hosts owned by our company on our Cisco switches to prevent private hosts in our network. This works pretty well but someone can still spoof the MAC address of his host.

Now we had the idea … Continue reading Identify malicous hosts in our network by sending valid domain credentials

Identify malicious hosts in our network by sending valid domain credentials

We are currently whitelisting the hosts owned by our company on our Cisco switches to prevent private hosts in our network. This works pretty well but someone can still spoof the MAC address of his host.

Now we had the idea … Continue reading Identify malicious hosts in our network by sending valid domain credentials