Posts: 1
Threads: 1
Joined: Nov 2012
i need the detail of this topic please help
Posts: 7,939
Threads: 421
Joined: Jun 2012
to get information about the topic "bluejacking " full report ppt and related topic refer the page link bellow
http://studentbank.in/report-bluejacking
good...good seminar ppt on bluejacking...completely satisfied
good ppt on bluejacking...completely satisfied wid the power point presentation
Posts: 7,939
Threads: 421
Joined: Jun 2012
to get information about the topic "bluejacking" full report refer the page link bellow
http://studentbank.in/report-bluejacking
okay thank you.gjgjlhlhlhlhiohywuyuiwyuqghjkajksghsyfisghlkj;jkhjklhilhilhyuioyuuisutkjasgjkgjashgjklaghujkghkjgjkgjgajkgjajja
Posts: 7,939
Threads: 421
Joined: Jun 2012
to get information about the topic "bluejacking" full report refer the page link bellow
http://studentbank.in/report-bluejacking
kindly give me the report on the topic bluejacking
Posts: 2
Threads: 0
Joined: Aug 2016
(28-01-2013, 08:51 PM)Guest Wrote: good...good seminar ppt on bluejacking...completely satisfied
Posts: 2,532
Threads: 0
Joined: Aug 2016
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.
Definition - What does Bluejacking mean?
Bluejacking is a hacking method that allows an individual to send anonymous messages to Bluetooth-enabled devices within a certain radius. First, the hacker scans his surroundings with a Bluetooth-enabled device, searching for other devices. The hacker then sends an unsolicited message to the detected devices.
Bluejacking is also known as bluehacking.
Techopedia explains Bluejacking
Bluejacking exploits a basic Bluetooth feature that allows devices to send messages to contacts within range.
Bluejacking does not involve device hijacking, despite what the name implies. The bluejacker may send only unsolicited messages. Hijacking does not actually occur because the attacker never has control of the victim’s device. At worst, bluejacking is an annoyance.
Bluesnarfing and bluebugging, however, are actual attacks that may result in a user losing control of his device. Although bluejacking, bluesnarfing and bluebugging use Bluetooth as the point of entry, bluesnarfing and bluebugging are far more harmful.
Bluejacking can be prevented by setting a device to hidden, invisible or non-discoverable mode.