Bluejacking Seminar Ppt Download For Mac

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
  1. Vlc Download For Mac
  2. Downloader For Mac
  3. Download
  4. Free Downloads For Mac
  5. Download Manager For Mac
  1. Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. For bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol.
  2. Download the best PowerPoint templates, backgrounds, graphics, diagrams, infographics and plugins for Microsoft® PowerPoint® from PresentationPro. PresentationPro was started in 1993 in Atlanta, GA building high end custom presentations for some of the world's largest and most successful companies.

PowerPoint Presentation: Present Scenario primarily occurs in bluejacking seminar ppt spaces Security issues previously involved with bluejacking has been resolved as- In order for information to be duplicated, the devices would have to be paired. Seminar report On “Bluejacking”. Bluejack, and the recipient has no information about the bluejacker, except for the name and model of the bluejacker’s mobile phone. Because of Bluetooth’s short-range networking capabilities, bluejacking can only occur between actors who are within 10 meters of each. Bluejacking: Seminar Report and PPT Abstract of Bluejacking Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. For bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluejacking a very interesting topic for technical seminar presentation for the computer science and engineering students Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. Bluejacking Seminar and PPT with pdf report: Bluejacking is based on Bluetooth technology, vCard, OBEX protocol.It can be used in many fields and for various purposes. It can be defined as the practice through messages are sent between the mobile users with the use of a Bluetooth wireless connection.

Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking.
Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as users carry them around as they move through different physical locations throughout the day. As a communicative device, the mobile phone has been gradually taken up in ways that move beyond merely providing a channel for mediated conversation. One such appropriation is bluejacking, the practice of sending short, unsolicited messages via vCard functionality to other Bluetooth-enabled phones. To choose the recipients of bluejacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area. A bluejacker picks one of the available devices, composes a message within a body of the phone’s contact interface, sends the message to the recipient, and remains in the vicinity to observe any reactions expressed by the recipient.
The messages tend to be anonymous since the recipient has no idea who has sent the bluejack, and the recipient has no information about the bluejacker, except for the name and model of the bluejacker’s mobile phone. Because of Bluetooth’s short-range networking capabilities, bluejacking can only occur between actors who are within 10 meters of each other, which makes this activity highly location-dependent. Contrary to what the name suggests, the bluejack recipient’s phone is not hijacked; that is, the phone is at no time under the control of the bluejacker.
Origin
This bluejack phenomenonstarted after a Malaysian IT consultant named “Ajack” posted a comment on amobile phone forum. Ajack told IT Web that he used his Ericsson cellphone in abank to send a message to someone with a Nokia 7650.
Becoming bored whilestanding in a bank queue, Ajack did a Bluetooth discovery to see if there wasanother Bluetooth device around. Discovering a Nokia 7650 in the vicinity, hecreated a new contact and filled in the first name with ‘Buy Ericsson!' andsent a business card to the Nokia phone.
“A guy a few feet awayfrom me suddenly had his 7650 beep. He took out his 7650 and started looking athis phone. I couldn't contain myself and left the bank,” he says.
Ajack then posted thestory on a mobile Web site and other people started trying it out.“I gave it the namebluejacking (taken from the words Bluetooth and hijacking) and it has justtaken off from there.”He says bluejacking iscommon in Malaysia and is happening everywhere there are lots of Bluetoothdevices. Bluejacking has becomepopular among young people wanting to play practical jokes. A 13-year-old namedEllie from Surrey in the UK has started a dedicated bluejacking site called bluejackq.
The site explains whatbluejacking is and also has forums where people can share their bluejackingexperiences.
How To Bluejack
Assuming that you now have aBluetooth phone in your hands, the first thing to do is to make sure thatBluetooth is enabled. You will need to read the handbook of the particularphone (or PDA etc) that you have but somewhere in the Menu item you will findthe item that enables and disabled Bluetooth.
Now, remember that Bluetoothonly works over short distances, so if you are in the middle of Dartmoor thenBlueJacking isn't going to work for you (unless the sheep have mobile phonesthese days!) so you need to find a crowd. BlueJacking is very new so noteveryone will have a Bluetooth phone or PDA so the bigger the crowd the morelikely you will have of finding a 'victim'. The Tube (yes, Bluetooth worksunderground), on the train, in a Cafe or standing in line are all good places tostart.
You will now need to create anew Contact in your Phone Book - however rather than putting someone’s name inthe Name field you write your short message instead - so for example ratherthan creating a contact called Alan Philips you would write - 'Hey, youhave been BlueJacked!' instead (or whatever message you want to send)
Now select the new contact andfrom the Menu of the phone choose 'Send via Bluetooth'. This is afacility available within the Mobile Phone that was designed to send a Contactto someone else - useful in Business when trading names and addresses, howeverwe are now going to use it to send our message that was contained in the Namefield of the contact - clever eh?
Your phone or PDA will start tosearch the airwaves for other devices that within range. If you are lucky youwill see a list of them appear, or it will say that it cannot find any. If thelatter happens then relocate to another crowd or wait a while and try again. Ifyou have a list of found devices then let the fun begin.
Unfortunately, almost everyBluetooth enabled device will not yet be configured with a useful name - so youare going to have to guess. Some devices will be called by their Phonemanufacturer (e.g. Nokia, Sony) or maybe a random string. Try one at random andlook around to see who grabs their phone and then looks perplexed when theyread your message :) If you want to name your Phone so it appears as a name inthe list on a BlueJackers phone see how to name our phone .You can build alibrary of contacts with predefined messages.
Mobile
The various steps involve inthis are as follows:
2.Then choose options.
4.Then in the first line choose your desired message.
6.Then go to the contact.
8.Then scroll down to send.
10.Then the phone will be searching for enabled Devices.


1. Go to contacts in your Address Book program (e.g. Outlook)
3. Enter the message into one of the 'name' fields
5. Go to the address book
7. Go to action
9. Click on other
10.Select a device from the list and double clickon it
Conclusion
Bluejacking is technique bywhich we can interact with new people and has ability to revolunerise market bysending advertisement about the product, enterprise etc. on the Bluetoothconfigured mobile phone so that the people get aware about them by seeing themon the phone.
Download
Now a day it is used in salepromotion or sale tools and in dating. This technique is used in many fieldslike cinema , train station, shopping malls ,mobile phone shops etc. now a daysthere are new tools available in the markets by which bluejacking can be done. Thebasic technology behind bluejacking is similar to Bluetooth because we can dobluejacking in the mobile or PADs or computers or laptop configured with Bluetooth.
Now a day new and new techniquesare developing using Bluetooth. Some of the latest news is :
Bluetooth Technology NowStandard in Cars ,BlueParrott Bluetooth B100 Wireless Headset ,Motorola & Burton Launch BluetoothSnowjackets ,Bluetooth shipment units 3ma week ,O'Neil Launches 'The Hub' Bluetooth Snowboard Jacket ,CellStar LaunchesBluetooth Web Surfer ,Emergence of new Bluetooth usage_models ,Heart MonitorSends Crucial Information to Cell Phones ,Impulsesoft Delivers Stereo MusicOver Bluetooth ,TDK Systems builds on the benefits of Bluetooth ,ImpulsesoftDelivers Stereo Music Over Bluetooth .
DownloadSo we conclude that in future this technology become the key for advertising and to interact with world and to get the location messages on the phone when you are somewhere out. Bluejacks are location specific. We first wanted to determine the types of places where bluejacks took place. The data indicate that bluejacking is an activity that primarily occurs in public spaces, outside of the home. Bluejacks frequently occurred in public transportation locales (23.4%), stores and shopping malls (32.1%) and restaurants (9.8%), bars (11.2%) and cafes (7.3%) but almost never at home (0.7%). This suggests that bluejackers are targeting strangers, presumably taking advantage of anonymity, opportunities for interaction and available Bluetooth enabled devices afforded by densely populated public spaces.There are few security issue which can be minimized by taking some simple precaution like when you do not want to be blue jacked just off your Bluetooth.

Abstraction-
Bluejacking
is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking

Vlc Download For Mac


Download Attachment............................
Similar Threads:

Downloader For Mac


Download

    bluejacking.doc
    147.5 KB
    266

Free Downloads For Mac

*

Download Manager For Mac

Click on the 'file icon' or 'file name' to start downloading