BLUEJACKING SEMINAR PDF

Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to meters with powerful transmitters. Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another.

Author:Faut Kigat
Country:Puerto Rico
Language:English (Spanish)
Genre:Politics
Published (Last):20 December 2005
Pages:98
PDF File Size:20.86 Mb
ePub File Size:15.54 Mb
ISBN:830-5-91094-908-4
Downloads:6765
Price:Free* [*Free Regsitration Required]
Uploader:Malagul



It can be used in many fields and for various purposes. It can be defined as the practice through messages are sent between the mobile users with the use of a Bluetooth wireless connection. The users can send the message that can include the pictures to all the users within the range of meters.

Lots of people might think that it involves the device hijacking considering its name, but in reality, the bluejacker can only send unsolicited messages to the users. However, the Bluejacking has no relation to the hacking of a phone.

The users can send the messages from the sending device anonymously to the people who are within the range and open to receive it. Generally, the bluejacking is common in the areas having the high population to the people whose mobile phones and Bluetooth are enabled. The perfect example of such type of areas is mobile phone stores, restaurants, shopping malls, airports, railway stations, etc.

The users just have to enable the Bluetooth on their phone and they will able to receive the contacts, messages, and other important things from the phone of the other users by using the Bluehacking.

Prevention against the Bluejacking In order to protect yourself from Bluejacking, you should disable the Bluetooth on your mobile device while not using it. You should delete the message voice accepting if a Bluejacking message is received. If you receive a Bluejacked message, never tell your personal information in response to the user. Step Two After that, enter a Bluejacking message in the space in the name field. It can be anything such as I am a Bluejacking expert or I am a pro in Bluejacking.

The major use of this option is to forward contacts to the other mobile phones. Step Four A list of devices that are in its range will be shown on the phone. In that case, choose a contact from the list and send a message.

Step Six The users need to be aware of the security laws of the place if they are Bluejacking other devices. There may be a chance that sending unsolicited messages through Bluejacking may be illegal in some locations. In General, the Bluetooth on the mobile phones have a very limited range, i. Conclusion Because of its low cost and power consumption this technology has a great future ahead. Bluejacking is a technique by which we can interact with new people. It has also the ability to rebellion market by sending advertisement about the product, enterprise etc.

Content of the Seminar and pdf report for Bluejacking Introduction.

78M08 DATASHEET PDF

Blue Jacking , Seminar Reports | PPT | PDF | DOC | Presentation |

It can be used in many fields and for various purposes. It can be defined as the practice through messages are sent between the mobile users with the use of a Bluetooth wireless connection. The users can send the message that can include the pictures to all the users within the range of meters. Lots of people might think that it involves the device hijacking considering its name, but in reality, the bluejacker can only send unsolicited messages to the users. However, the Bluejacking has no relation to the hacking of a phone. The users can send the messages from the sending device anonymously to the people who are within the range and open to receive it. Generally, the bluejacking is common in the areas having the high population to the people whose mobile phones and Bluetooth are enabled.

ANAS SUDIJONO PENGANTAR STATISTIK PENDIDIKAN PDF

Bluejacking Seminar pdf report with PPT

Tech Engineering for the year , and Bluejacking Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field i. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to meters with powerful transmitters. Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology.

ACT A1382 PDF

Voodooshura Maximum Permitted Power dBm. Instead of receiving anonymous messages over the Windows network, a Bluetooth receives anonymous wireless business cards. Initially, Bluebugging was carried out using laptops. Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. Ajack then posted the story on a mobile Web site and other people started trying it out.

380EX MANUAL PDF

.

Related Articles