logging in or signing up BLUEJACKING HumanHumanity Download Post to : URL : Related Presentations : Let's Connect Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 7323 Category: Education License: All Rights Reserved Like it (2) Dislike it (0) Added: November 30, 2012 This Presentation is Public Favorites: 11 Presentation Description No description available. Comments Posting comment... By: hameedulla (4 month(s) ago) i need this ppt, pls sent to my mail id firstname.lastname@example.org Saving..... Post Reply Close Saving..... Edit Comment Close By: shilpa08 (4 month(s) ago) plzzz send me ppt on my email id email@example.com Saving..... Post Reply Close Saving..... Edit Comment Close By: rekhavert (5 month(s) ago) hi ..... plz send me bluejacking ppt on my email id firstname.lastname@example.org its very urgent for me plz send..... Saving..... Post Reply Close Saving..... Edit Comment Close By: yogeshchaudhary22 (11 month(s) ago) pls snd meee this ppt to my mail.........email@example.com Saving..... Post Reply Close Saving..... Edit Comment Close By: bhanu461 (12 month(s) ago) Can You PLease Send Me The PPT To My Mail "firstname.lastname@example.org".. Saving..... Post Reply Close Saving..... Edit Comment Close loading.... See all Premium member Presentation Transcript PowerPoint Presentation: BlUEJACKINGPowerPoint Presentation: This bluejack phenomenon started after a Malaysian IT consultant named “ Ajack ” posted a comment on a mobile phone forum. Ajack told IT Web that he used his Ericsson cellphone in a bank to send a message to someone with a Nokia 7650. Becoming bored while standing in a bank queue OverviewPowerPoint Presentation: , Ajack did a Bluetooth discovery to see if there was another Bluetooth device around. Discovering a Nokia 7650 in the area , he created a new contact and filled in the first name with ‘Buy Ericsson!' and sent a business card to the Nokia phone.Abstract of Bluejacking: Abstract of Bluejacking Bluejacking is the sending of unsolicited(voluntarily) messages over Bluetooth to Bluetooth-enabled devices such as mobile phones,laptop computers, sending a vCard which typically contains a message in the name field (i.e. for Bluedating or bluechat ) to another Bluetooth enabled device .PowerPoint Presentation: Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters. Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology.How To Bluejack:: How To Bluejack : Assuming that you now have a Bluetooth phone in your hands, the first thing to do is to make sure that Bluetooth is enabled. You will need to read the handbook of the particular phone that you have but somewhere in the Menu item you will find the item that enables and disabled Bluetooth.PowerPoint Presentation: Your phone or PDA will start to search the airwaves for other devices that within range . If you are lucky you will see a list of them appear, or it will say that it cannot find any . If the latter happens then relocate to another crowd or wait a while and try again . If you have a list of found devices then let the fun begin.PowerPoint Presentation: Bluejacking is searchind anonymous, unwanted messages to other users …………PowerPoint Presentation: The various steps involve in this are as follows: 1. First press the 5-way joystick down. 2. Then choose options. 3. Then choose "New contact" 4. Then in the first line choose your desired message. 5. Then press done. 6. Then go to the contact. 7. Then press options. 8. Then scroll down to send 9.Then choose "Via Bluetooth" 10. Then the phone will be searching for enabled Devices. 11. Then press " Select“ sendingBluejacking is sending anonymous, unwanted messages to other users with ... anonymous, unwanted messages to other users with ...: sending Bluejacking is sending anonymous, unwanted messages to other users with ... anonymous, unwanted messages to other users with ...PowerPoint Presentation: Now, remember that Bluetooth only works over short distances, so you need to find a crowd. BlueJacking is very new so not everyone will have a Bluetooth phone or PDA(Personal Digital Asistant ) so the bigger the crowd the more likely you will have of finding a 'victim'. on the train, in a Cafe or standing in line are all good places to start.PowerPoint Presentation: Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking , the sending and receiving devices must be within 10 meters of one anot . herPowerPoint Presentation: Unfortunately, almost every Bluetooth enabled device will not yet be configured with a useful name . Some devices will be called by their Phone manufacturer (e.g. Nokia, Sony) If you want to name your Phone so it appears as a name in the list on a BlueJackers phone see how to name our phone.PowerPoint Presentation: We can use Bluetooth by Bluetoothing to devices in the place of headphones with wiresBLUEJACK USES: BLUEJACK USES Plug speakers (headphones ) 3,5-mm stereo mini jack on the blue backlightingPowerPoint Presentation: ... TX is a wireless music transmitter that connects to any headphone ...PowerPoint Presentation: We can connect internet to pc using mobile as modem through BLUEJACKINGPowerPoint Presentation: CONNECTING INTERNET FROM MOBILE TO PC THROUGH BLUEJACKINGAdvantages OF BLUEJACKING: Advantages OF BLUEJACKING Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well… We can easily transfer data from mobile to laptop We can transfer data from mobile to mobile in a short period We can enjoy music by wireless headphones through BluejackingDisadvantages: Disadvantages Bluejacking is also confused with Bluesnarfing which is the way in which mobile phones are illegally hacked via Bluetooth virus attacksConclusion: Conclusion Because of the technology's ease of adoption, significantly lower maintenance costs, and greater workflow efficiency. We can easily transfer the data on the spot in fraction of seconds with out using cardreaders etc……..PowerPoint Presentation: Thank You CHBR A.SAIPRASANTH You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.