Preview

Introduction to Bluejacking

Satisfactory Essays
Open Document
Open Document
466 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Introduction to Bluejacking
Introduction to Bluejacking
In this world of technology, there are several new techniques and mechanisms that have made things easier in our lives and have changed the way we carry out different activities. In just a matter of a couple of centuries, humans have developed from rubbing stones and making fire to automate everything. One such technology that has changed our lives in different ways and facilitated several tasks is bluejacking. You must have heard of the term bluetooth, wherein mobile phones and different devices have Bluetooth and they make use of the same for exchanging information.
Bluejacking is nothing but the process of sending out special unsolicited messages via Bluetooth from one Bluetooth enabled device to another Bluetooth-enabled device. The technology can work in a certain range and the devices need to be close to each other, mostly in the range of 10 meters for making sure that the transfer happens. The technology was first developed in Malaysia and has now been adopted by all major brands and companies all over the world. Especially in a world where mobile phones have become an everyday communication model and is used for all applications and day-to-day purposes, bluejacking has received significant attention everywhere.
The major use of bluejacking comes in the sharing and distribution of information. People can now easily share photos, music and even videos and files without making use of any wire, software etc. once both the devices accept the transfer of data, the same can be sent immediately. This has become one of the fastest and the most convenient ways of sharing and transferring data between two or more people. Usually devices are also given a specific name on the basis of which they can be identified and then the data is shared or transferred.
Though the technology has made several things simpler and easier, there is one major problem that arises because of it and that is the issue of security. The ease of sharing

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Next we would like to equip each truck with Bluetooth technology to seamlessly keep our customers connected with our drivers via phone. Our drivers are already using cellphones, however, with the current law, only Bluetooth devices are legal to use in our trucks. We are proposing purchasing Aliph Jawbone Era Bluetooth…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)…

    • 355 Words
    • 3 Pages
    Best Essays
  • Satisfactory Essays

    Application Requirements

    • 274 Words
    • 2 Pages

    |Two current applications of WPANs |PDAs and Smart Phones, even tablets using Bluetooth connections. |…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    When it comes to making improvements to your technology within your company Party Plates, there are some wirelesses technologies that we recommend will be great for your company to build and expand further than you ever thought that it could. Making sure that you are able to reach beyond your regular clients and branch out to all of those that uses all forms of wireless technology. We will show you how you will be able to meet individuals ' needs, as well as big retail corporations, too. You will see that the wireless technology is a system that is easy to learn and train to other employees and will be in the right price range for your company 's needs.…

    • 1360 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    The main fear in the industry due to this technology is protection of privacy. The current [i]system (the article cites the VA system which is already in use) does not control access, it merely monitors it. With no way of managing who has access to what…

    • 400 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In today’s society, Wireless technology has made a tremendous impact on the way we live from day to day. It is a technology that is being used all over the world and has changed the lives of many people and how they operate and live day to day. If you take a look around as you are driving or walking in your town, you will see the vast use of many different wireless technologies. You will see people with mobile devices such as cell phones, tablets, Bluetooth headsets, and even GPS systems for communication and navigation for their leisure in reference to day by day living. Some use these technologies for luxuries, while others for convenience and necessities to perform their daily work duties for daily living. Let’s take a look four different wireless technologies that exist today that have changed the world. Wireless technology has made life more enjoyable and more simple to live by in this era of today’s living.…

    • 780 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Wireless Signals

    • 551 Words
    • 3 Pages

    Wireless signals are all around us as we walk or drive around the city or town where we live. The four types of wireless technologies that are out there are Wi-Fi, Cellular, Bluetooth, and WiMAX. We will be looking at these types of wireless technologies a little more in depth, where are they most commonly used, and how they differ from one another. The first wireless technology that we will be looking at is the Wi-Fi wireless signal. The Wi-Fi signal is mainly associated with computer networking, the specification used to create a wireless local area network is the IEEE 802.11. One would use this type of wireless technology if you were a business owner opening up a coffee shop and needed a public network. The network would have a wired connection to an internet source, then leading to a wireless router that transmits and receives the data from all of the customer’s devices that want to use the Wi-Fi. This will also connect all of the devices to one another through the network. The next type of wireless technology that we will be looking at is Cellular. This type of wireless technology is most often associated with wireless telephones. The cellular network is connected to cells that will enable a user to move around freely while staying connected to the network. This type of signal is used everywhere you go nowadays and are used by everyone. There are a multitude of devices that use these networks at one time and those include, smart phones, tablets, and some computers can use the cell towers to get a signal to be able to use the internet. The first generation of cellular signals was completely analog, and from there with the growing demand of faster speeds and better connectivity technology brought us 2G, 3G, and the ever popular 4G phones. Bluetooth is the next technology that we will touch on and is very similar to the Wi-Fi and cellular networks but on…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Btec Ict Unit 10

    • 2563 Words
    • 11 Pages

    New and developing communication technologies are used within the business world to maximise productivity and access information, whether an employee is working an office or travelling the world. This unit focuses on communication technologies, examining their use within social and business communities. Learners will explore the devices and communication technologies they use on a daily basis and gain an understanding of systems, including mobile internet. Learners will look at network topologies and services, connection software and access methods amongst other areas. They will investigate the OSI and TCP/IP models. Communications technology includes a large range of devices, which are used in the business and social communities. Devices include many of the next generation wireless devices, games consoles and newer generations of mobile phones with voice and video streaming. This unit explores these devices along with their transmission methods and the underlying protocols that enable connectivity and transmission of data including signal theory and data elements. Learners will appreciate why particular transmission methods are chosen for particular situations and be able to compare the effectiveness of the different methods. Finally, learners will be able to use their knowledge and understanding to directly connect communication devices between users. This unit could be delivered as part of a system support and networking focus including other units with networking content. Although largely theoretical, the emphasis in this unit should be on practical activity to learners to…

    • 2563 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Bluetooth enabled devices are exploding on the Internet at an astonishing rate. At the range of connectivity has increased substantially. Insecure Bluetooth connections can introduce a number of potential serious security issues. Hence, there is a need for a minimum standard for connecting Bluetooth enable devices.…

    • 644 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Steve Jobs Impact

    • 854 Words
    • 4 Pages

    A blue box was an electronic device that simulated a telephone operator's dialing console and provided the user with free phone calls. Steve Jobs spent plenty of time at Wozniak's Homebrew Computer Club, a haven for computer geeks and a source of invaluable information about the field of personal computers.…

    • 854 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Almost everyone now days has some computer device on them almost all the time, people are always checking social media through smartphones or performing some online activity. The online infrastructure has endpoints; these endpoints transmit data. Businesses use many technologies to assist them in providing certain personal information that needs to be protected. For example, law enforcement uses computer devices to search for information on a suspect. There are other technologies such as monitoring devices from hospitals that allow real-time feedback of the patient's vitals. Many individuals use laptops or smartphones to access his or her online banking account to transfer, withdraw, or deposit money. All of the information that is gathered and stored online becomes vulnerable, and if…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    [4] Chou. L D, Chen, J.M, kao, h. s. Seamless streaming media for heterogeneous mobile networks.Acm Springer mobile networks and applications. Carlifonia: Wiley and Sons inc., 2006.…

    • 1430 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    * Bluetooth technology: a type of wireless communication to transmit scanned data through radio waves to a terminal…

    • 889 Words
    • 4 Pages
    Good Essays
  • Good Essays

    At this point we discuss why a computerized information system is either more or less secure than traditional methods. One of the primary ideas behind computers is that the computer key or password is unique for each person or group and can be changed as often as necessary with no cost other than time. Changing a real lock, however, is difficult because all of the keys for that lock must be changed which requires more time and of course money which is not as effective for running a business.…

    • 1528 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    b) Transferring files from a personal digital assistant (PDA) to another computer via the Bluetooth…

    • 1463 Words
    • 6 Pages
    Powerful Essays