BLUEJACKING SEMINAR PDF

Tech Engineering for the year , and Bluejacking Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field i. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to meters with powerful transmitters. Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react.

Author:Gurisar Daile
Country:Argentina
Language:English (Spanish)
Genre:Personal Growth
Published (Last):26 October 2013
Pages:98
PDF File Size:18.32 Mb
ePub File Size:18.45 Mb
ISBN:542-5-32223-286-3
Downloads:63377
Price:Free* [*Free Regsitration Required]
Uploader:Zulkizilkree



Tech Engineering for the year , and Bluejacking Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field i.

Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to meters with powerful transmitters. Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology.

Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book.

Devices that are set in non-discoverable mode are not susceptible to bluejacking. Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as users carry them around as they move through different physical locations throughout the day. As a communicative device, the mobile phone has been gradually taken up in ways that move beyond merely providing a channel for mediated conversation. One such appropriation is bluejacking, the practice of sending short, unsolicited messages via vCard functionality to other Bluetooth-enabled phones.

To choose the recipients of bluejacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area.

Ajack told IT Web that he used his Ericsson cellphone in a bank to send a message to someone with a Nokia Becoming bored while standing in a bank queue, Ajack did a Bluetooth discovery to see if there was another Bluetooth device around.

He took out his and started looking at his phone. Ajack then posted the story on a mobile Web site and other people started trying it out. Bluejacking has become popular among young people wanting to play practical jokes.

A year-old named Ellie from Surrey in the UK has started a dedicated bluejacking site called bluejackq. The site explains what bluejacking is and also has forums where people can share their bluejacking experiences.

How To Bluejack Assuming that you now have a Bluetooth phone in your hands, the first thing to do is to make sure that Bluetooth is enabled. You will need to read the handbook of the particular phone or PDA etc that you have but somewhere in the Menu item you will find the item that enables and disabled Bluetooth. The Tube yes, Bluetooth works underground , on the train, in a Cafe or standing in line are all good places to start. This is a facility available within the Mobile Phone that was designed to send a Contact to someone else - useful in Business when trading names and addresses, however we are now going to use it to send our message that was contained in the Name field of the contact - clever eh?

Your phone or PDA will start to search the airwaves for other devices that within range. If you are lucky you will see a list of them appear, or it will say that it cannot find any. If the latter happens then relocate to another crowd or wait a while and try again. If you have a list of found devices then let the fun begin. Unfortunately, almost every Bluetooth enabled device will not yet be configured with a useful name - so you are going to have to guess.

Some devices will be called by their Phone manufacturer e. Nokia, Sony or maybe a random string. Try one at random and look around to see who grabs their phone and then looks perplexed when they read your message : If you want to name your Phone so it appears as a name in the list on a BlueJackers phone see how to name our phone. You can build a library of contacts with predefined messages. Mobile The various steps involve in this are as follows: 1.

First press the 5-way joystick down. Then choose options. Then choose "New contact" 4. Then in the first line choose your desired message. Then press done. Then go to the contact. Then press options. Then scroll down to send. Then choose "Via Bluetooth" Then the phone will be searching for enabled Devices. Then press "Select" 1.

Go to contacts in your Address Book program e. Outlook 2. Create a new contact 3. Save the new contact 5. Go to the address book 6. Go to action 8. Go to Send to Bluetooth 9. Click on other Select a device from the list and double click on it Conclusion Bluejacking is technique by which we can interact with new people and has ability to revolunerise market by sending advertisement about the product, enterprise etc.

Now a day it is used in sale promotion or sale tools and in dating. This technique is used in many fields like cinema , train station, shopping malls ,mobile phone shops etc. The basic technology behind bluejacking is similar to Bluetooth because we can do bluejacking in the mobile or PADs or computers or laptop configured with Bluetooth.

Now a day new and new techniques are developing using Bluetooth. So we conclude that in future this technology become the key for advertising and to interact with world and to get the location messages on the phone when you are somewhere out.

Bluejacks are location specific. We first wanted to determine the types of places where bluejacks took place. The data indicate that bluejacking is an activity that primarily occurs in public spaces, outside of the home. Bluejacks frequently occurred in public transportation locales This suggests that bluejackers are targeting strangers, presumably taking advantage of anonymity, opportunities for interaction and available Bluetooth enabled devices afforded by densely populated public spaces.

There are few security issue which can be minimized by taking some simple precaution like when you do not want to be blue jacked just off your Bluetooth. Posted by.

CANON MV400 MANUAL PDF

Bluejacking Seminar pdf report with PPT

Voodooshura Maximum Permitted Power dBm. Instead of receiving anonymous messages over the Windows network, a Bluetooth receives anonymous wireless business cards. Initially, Bluebugging was carried out using laptops. Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. Ajack then posted the story on a mobile Web site and other people started trying it out. Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as users carry them around as they move through different physical locations throughout the day. This technique is bluejackinng in many fields like cinematrain station, shopping malls ,mobile phone shops etc.

LA REDACCION EVELYNE REBERG PDF

Blue Jacking , Seminar Reports | PPT | PDF | DOC | Presentation |

It can be used in many fields and for various purposes. It can be defined as the practice through messages are sent between the mobile users with the use of a Bluetooth wireless connection. The users can send the message that can include the pictures to all the users within the range of meters. Lots of people might think that it involves the device hijacking considering its name, but in reality, the bluejacker can only send unsolicited messages to the users. However, the Bluejacking has no relation to the hacking of a phone.

Related Articles