• Welcome to Professional A2DGC Business
  • 011-43061583
  • info@a2dgc.com

Blogs

13

Jul

RomCom

  • Jul 13, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google RomCom Microsoft Threat Intelligence has identified threat actors abusing a recently disclosed vulnerability, CVE-2023-36884, in phishing campaigns containing malicious Word documents against government entities in Europe and North America. CVE-2023-36884 was disclosed along with three other vulnerabilities by Google TAG, no patch was released for the vulnerability and […]

12

Jul

CDMA Vs GSM

  • Jul 12, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google CDMA Vs GSM Difference between CDMA and GSM Cellular mobile services have been used all over the world for a long time and still evolving day by day. With these services, various communication services also evolved, and CDMA and GSM are two of them. CDMA and GSM are the two […]

11

Jul

Switching Modes

  • Jul 11, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google Introduction to Switching Modes Data transmission and error checking on transmitted and received frames are handled by Layer 2 switches on the data connection layer. The MAC address determines how Layer 2 switches forward packets. The different packet-forwarding modes are referred to as switching modes. Switching mode distinguishes between […]

10

Jul

Switching

  • Jul 10, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google Switching When a user accesses the internet or another computer network outside their immediate location, messages are sent through the network of transmission media. This technique of transferring the information from one computer network to another network is known as switching. Switching in a computer network is achieved by […]

08

Jul

Challenge Response Authentication Mechanism (CRAM)

  • Jul 08, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google Challenge Response Authentication Mechanism (CRAM) In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities. While challenge-response authentication can be as simple as a password, it can also be as dynamic as a randomly generated request. […]

07

Jul

Server Name Indication (SNI)

  • Jul 07, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google Server Name Indication What is Server Name Indication (SNI)? This article will provide a detailed explanation of the topic called Server Name Indication (SNI). Before moving on to the main topic, let us understand the server name. What is Server Name? A server name is just a computer’s […]

06

Jul

Operations of Blue & Red Teaming

  • Jul 06, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google Operation of Blue & Red Teaming Security is a multifaceted field with multiple roles for carrying out diverse operations. In this article, we demystify the concept of the red and blue teams in security. First, why do we need to bifurcate security roles for two teams on Penetration […]

04

Jul

Autonomous System

  • Jul 04, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google Autonomous System What is Autonomous System? An autonomous system (AS) consists of several connected Internet Protocol routing prefixes. One or more network operators manage all these routing prefixes in place of a single administrative entity or organization. These IP prefixes have a clearly defined routing policy that states […]

03

Jul

Onion Routing

  • Jul 03, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google Onion Routing   Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. There is a large set of precautionary measures and best practices to make web browsing safer […]

01

Jul

Software Defined Networking (SDN)

  • Jul 01, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google Software Defined Networking (SDN) Introduction Software-defined networking (SDN) is a new networking paradigm that separates the network’s control and data planes. The traditional networking architecture has a tightly coupled relationship between the data and control planes. This means that network devices, such as routers and switches, are responsible for […]

30

Jun

New Delhi is using Facial Recognition! For Good or Bad is the Question

  • Jun 30, 2023

The Delhi police using Automated Facial Recognition Technology to screen crowds Indian legislation enforcement is beginning to significantly impact facial recognition expertise. Facial recognition Technology is an automated process of comparing two images of faces to determine whether they represent the same individual. The Delhi Police trial of a facial recognition system commissioned by the […]

30

Jun

Blue Smacking

  • Jun 30, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google   Blue Smack Attack in Wireless Networks Blue smacking is one of the older types of attacks against the protocol. In our investigation of this attack, you’ll find that it’s a variant of a common attack called denial of service against networks, devices, and applications. In short, when we […]