bluejacking

22

Upload: dixitas

Post on 02-Jul-2015

530 views

Category:

Engineering


3 download

DESCRIPTION

Bluejacking seminar presentation

TRANSCRIPT

Page 1: Bluejacking
Page 2: Bluejacking
Page 3: Bluejacking

Technology used for sending unsolicited messages over Bluetooth enabled devices.

Receiver does not get to know who has sent the message to it. It only receives the message along with name and model of the sender's phone.

Range of bluejacking is equal to the range of Bluetooth. It is around 10 meters for mobile phones, and about 100 meters for laptops.

Page 4: Bluejacking

Bluejacking exploits a Bluetooth device's

ability to discover other nearby Bluetooth

devices.

A bluejacker normally send only a text

message, but now it has now become possible

to send images or sounds also.

Bluejacking does not involve the removal or

alteration of any data from the device.

Page 5: Bluejacking
Page 6: Bluejacking

Bluetooth

OBEX

VCARD

Page 7: Bluejacking

Bluetooth is a wireless technology that provides short-range communications

It is proposed to replace the cables connecting portable and/or fixed devices.

Bluetooth works using radio signals in the frequency band of 2.4GHz and supports data transfer rates of up to 3Mbps.

Bluetooth can transmitting voice, data, video and images.

Page 8: Bluejacking

OBEX stands for Object Exchange.

Heart of file transfer over Bluetooth.

It can be used to exchange all sorts of

objects, like files, pictures, calendar

entries, and business cards.

Page 9: Bluejacking

vCard is short for virtual business card.

Address Book exchanges contact

information with other programs

primarily through vCard.

It has .vcf filename extension.

Page 10: Bluejacking
Page 11: Bluejacking
Page 12: Bluejacking
Page 13: Bluejacking
Page 14: Bluejacking

Bluejacking is risk-free since the

recipient has the option to decline the

message received. It can create little

annoyance.

Page 15: Bluejacking

User awareness

Disable device when not in use

Use an unidentifiable device name

Set device to non- discoverable mode when not in use

Use non-guessable PIN codes

Perform pairing only when absolutely required.

Page 16: Bluejacking
Page 17: Bluejacking

It can be used in malls for advertisement purposes. As you cross their shop, you can get a message or any latest scheme they are providing on that day, etc.

They can be used at railway station to give you information about various general rules and about train timings, etc.

It can also be used at café, restaurant, cinema, mobile phone shop or at any electronic shop to provide you various information regarding them.

Page 18: Bluejacking
Page 19: Bluejacking

Bluejacking is a technology that can provideyou with lots of information as you pass by.You may not notice all such things when youare going through any road, etc. but now byjust looking at your phone you can get allthe latest information, latest schemes goingon in any shop, etc. without even enteringthat.But obviously for some people, it is only

something for fun and only those people aremaking inefficient use of it and hencemaking its name bad.

Page 20: Bluejacking

International Journal of Engineering Trends and Technology (IJETT) –Volume 4 Issue 7-

July 2013 ISSN: 2231-5381

http://www.ijettjournal.org Page 3020 Bluejacking Technology: Overview, Key

Challenges and Initial Research Ratika Bali

Department of Computer Science and Engineering Guru Tegh Bahadur Institute of

Technology New Delhi, India

Page 21: Bluejacking

International Journal Of Engineering And Computer

Science ISSN:2319-7242 Volume 2 Issue 6 June, 2013

Page No. 1971-1974

Babita Sandooja, IJECS Volume2 Issue6 June, 2013

Page No.197-1974 Page 19711

THE NEW AND CLEAR APPROACH TO

BLUEJACKIN Babita Sandooja, Renu Yadav, Arun

Gupta, Priyanka Yadav, Preeti Kumari Student,

Department of Computer Science & Engineering

Dronacharya College of engineering, Gurgaon-122001,

INDIA

Page 22: Bluejacking