project report helper|
Active In SP
Joined: Sep 2010
16-10-2010, 04:53 PM
bluejacking.doc (Size: 147.5 KB / Downloads: 135)
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking.
Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as users carry them around as they move through different physical locations throughout the day. As a communicative device, the mobile phone has been gradually taken up in ways that move beyond merely providing a channel for mediated conversation. One such appropriation is bluejacking, the practice of sending short, unsolicited messages via vCard functionality to other Bluetooth-enabled phones. To choose the recipients of bluejacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area. A bluejacker picks one of the available devices, composes a message within a body of the phone’s contact interface, sends the message to the recipient, and remains in the vicinity to observe any reactions expressed by the recipient.
The messages tend to be anonymous since the recipient has no idea who has sent the bluejack, and the recipient has no information about the bluejacker, except for the name and model of the bluejacker’s mobile phone. Because of Bluetooth’s short-range networking capabilities, bluejacking can only occur between actors who are within 10 meters of each other, which makes this activity highly location-dependent. Contrary to what the name suggests, the bluejack recipient’s phone is not hijacked; that is, the phone is at no time under the control of the bluejacker.
|Tagged Pages: seminar topics on blue jacking, bluejacking seminar topic for cse, info about bluejacking, seminar topic on bluejacking, blue jacking ppt presentation free download, seminar on blue jacking, seminar report on blue jacking,|
|Popular Searches: objective for bluejacking in report, documentation for bluejacking, paper on blue jacking, report of bluejacking, bluejacking attack, advantages and disadvantages of blue jacking, free ieee paper on bluejacking,|
|Possibly Related Threads...|
10-03-2016, 02:39 PM
Last Post: mkaasees
|Bluejacking full report||seminar tips||0||691||
27-11-2012, 04:47 PM
Last Post: seminar tips