SlideShare une entreprise Scribd logo
1  sur  27
•
SUBMITED TO:-
Mr. Deepak Tiwari
Miss. Bhagyashree Gurjar
SUBMITED BY:-
NiharikaMundra
CONTENTS
 INTRODUCTION
 ORIGIN OF BLUEJACK
 SOFTWARE TOOLS
 HOW TO BLUEJACK
 RELATED CONCEPTS
 CODE OF ETHICS
 USAGE OF BLUEJACKING
 ADVANTAGES
 DISADVANTAGES
 CONCLUSION
WHAT IS BLUEJACKING
 Bluejacking is the sending of unsolicited messages
over Bluetooth to Bluetooth-enabled devices such as
mobile phones, PDAs or laptop computers,etc.
 Bluetooth has a very limited range; usually around 10
meters on mobile phones, but laptops can reach up to
100 meters with powerful transmitters.
ORIGIN OF BLUEJACKING
 This bluejack phenomenon started after a
Malaysian IT consultant named “Ajack” posted a
comment on a mobile phone forum.
 Ajack told IT Web that he used his Ericsson
cellphone in a bank to send a message to someone
with a Nokia 7650.
 Ajack did a Bluetooth discovery to see if there was
another Bluetooth device around. Discovering a
Nokia 7650 in the vicinity, he created a new
contact and filled in the first name with ‘Buy
Ericsson!' and sent a business card to the Nokia
phone.
SOFTWARE TOOLS
 Bluespam:- BlueSpam searches for all discoverable
Bluetooth devices and sends a file to them (spams
them) if they support OBEX.
 Meeting point:- Meeting point is the perfect tools to
search for Bluetooth devices. Combine it with any
bluejacking tools and have lots of fun. This software is
compatible with pocket PC, Windows.
 Freejack:- Freejack is compatible to java phone like
Nokia N-series
 Easyjacking (eJack):- Allows sending of text
Messages to other Bluetooth enables devices.
HOW TO BLUEJACK
 Your phone or PDA will start to search the airwaves for
other devices within range.
 If you are lucky you will see a list of them appear, or it
will say that it cannot find any.
 If the latter happens then relocate to another crowd or wait
a while and try again.
 If you have a list of found devices then let the fun begin.
RELATED CONCEPTS
 Bluesnarfing.
 Bluebugging.
 Bluecasting.
BLUESNARFING
 It is the unauthorized access of
information from a wireless
device through a Bluetooth
connection, often between
phones, desktops and laptops.
It is a type of hacking.
 Even if your device is hidden
bluesnarfing can also be done.
BLUEBUGGING
 It is a form of Bluetooth
attack. Allows the user to
take control of a victim's
phone to call the user's
phone. This means that the
bluebug user can simply
listen to any conversation his
victim is having in real life.
BLUECASTING
 It is generally provisioned by Bluetooth Kiosk,
a physical server provisioning the digital media
over Bluetooth to interested device.
 In some temples which offer ringtone ,
wallpapers of god use Bluecasting.
 Many companies also use to advertise various
offers by Bluecasting
CODE OF ETHICS
 Do not hack any device.
 Don't send abusive messages.
 Don't threaten anyone .
 Don't put your personal information in a
BlueJack message.
 Do disable Bluetooth if you don't want to be
BlueJacked.
 If bluejacker is caught 'in the act' he/she will be
as co-operative as possible and not hide any
details of their activity.
USAGE OF BLUEJACKING
 Bluejacking can be used in many
fields and for various purposes like
in the busy shopping centre,railway
station, high street, cinema,
café/restaurant/pub,etc.
 The main use of bluejacking tools
or bluejacking is in advertising
purpose.
 Experimental results show that the
system provides a viable solution
for realizing permission-based
mobile advertising.
ADVANTAGES
 Usually, a bluejacker will only send a text
message, but with modern phones it’s possible
to send images or sounds as well.
 We can easily transfer data from mobile to
laptop.
 We can transfer data from mobile to mobile in a
short period.
DISADVANTAGES
 Bluejacking is also confused with Bluesnarfing
which is the way in which mobile phones are
illegally hacked via Bluetooth.
 Virus attacks.
CONCLUION
Bluejacking is a technique by which we can
interact with new people and has ability to
revolutionerise market by sending advertisement
about the product, enterprise etc. on the
Bluetooth configured mobile phone so that the
people get aware about them by seeing them on
the phone.
REFRECES
 http.//www.seminaronly.com/computer
%20science/bluejacing.php
 http.//www.bluejackingtools.com/
 http.//www.wikipedia.org/wiki/bluejack
 http.//www.webopedia.com/TERM/B/bluejacki
ng.html
Thank You

Contenu connexe

Tendances (20)

Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth Network security
Bluetooth Network securityBluetooth Network security
Bluetooth Network security
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
 
Blue1
Blue1Blue1
Blue1
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
 

Similaire à Bluejacking by Niharika Mundra

Similaire à Bluejacking by Niharika Mundra (19)

blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Blue Jacking
Blue Jacking Blue Jacking
Blue Jacking
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
 
Blue jacking mercy
Blue jacking mercyBlue jacking mercy
Blue jacking mercy
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
SEMINAR ON bluejackng
SEMINAR ON bluejackngSEMINAR ON bluejackng
SEMINAR ON bluejackng
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Bluejacking ppt.pptx
Bluejacking ppt.pptxBluejacking ppt.pptx
Bluejacking ppt.pptx
 
Blue Jacking
Blue JackingBlue Jacking
Blue Jacking
 
Device Hacking
Device HackingDevice Hacking
Device Hacking
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 

Dernier

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

Bluejacking by Niharika Mundra

  • 1. • SUBMITED TO:- Mr. Deepak Tiwari Miss. Bhagyashree Gurjar SUBMITED BY:- NiharikaMundra
  • 2.
  • 3. CONTENTS  INTRODUCTION  ORIGIN OF BLUEJACK  SOFTWARE TOOLS  HOW TO BLUEJACK  RELATED CONCEPTS  CODE OF ETHICS  USAGE OF BLUEJACKING  ADVANTAGES  DISADVANTAGES  CONCLUSION
  • 4. WHAT IS BLUEJACKING  Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers,etc.  Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
  • 5.
  • 6. ORIGIN OF BLUEJACKING  This bluejack phenomenon started after a Malaysian IT consultant named “Ajack” posted a comment on a mobile phone forum.  Ajack told IT Web that he used his Ericsson cellphone in a bank to send a message to someone with a Nokia 7650.  Ajack did a Bluetooth discovery to see if there was another Bluetooth device around. Discovering a Nokia 7650 in the vicinity, he created a new contact and filled in the first name with ‘Buy Ericsson!' and sent a business card to the Nokia phone.
  • 7.
  • 8. SOFTWARE TOOLS  Bluespam:- BlueSpam searches for all discoverable Bluetooth devices and sends a file to them (spams them) if they support OBEX.  Meeting point:- Meeting point is the perfect tools to search for Bluetooth devices. Combine it with any bluejacking tools and have lots of fun. This software is compatible with pocket PC, Windows.  Freejack:- Freejack is compatible to java phone like Nokia N-series  Easyjacking (eJack):- Allows sending of text Messages to other Bluetooth enables devices.
  • 9. HOW TO BLUEJACK  Your phone or PDA will start to search the airwaves for other devices within range.  If you are lucky you will see a list of them appear, or it will say that it cannot find any.  If the latter happens then relocate to another crowd or wait a while and try again.  If you have a list of found devices then let the fun begin.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. RELATED CONCEPTS  Bluesnarfing.  Bluebugging.  Bluecasting.
  • 18. BLUESNARFING  It is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops and laptops. It is a type of hacking.  Even if your device is hidden bluesnarfing can also be done.
  • 19. BLUEBUGGING  It is a form of Bluetooth attack. Allows the user to take control of a victim's phone to call the user's phone. This means that the bluebug user can simply listen to any conversation his victim is having in real life.
  • 20. BLUECASTING  It is generally provisioned by Bluetooth Kiosk, a physical server provisioning the digital media over Bluetooth to interested device.  In some temples which offer ringtone , wallpapers of god use Bluecasting.  Many companies also use to advertise various offers by Bluecasting
  • 21. CODE OF ETHICS  Do not hack any device.  Don't send abusive messages.  Don't threaten anyone .  Don't put your personal information in a BlueJack message.  Do disable Bluetooth if you don't want to be BlueJacked.  If bluejacker is caught 'in the act' he/she will be as co-operative as possible and not hide any details of their activity.
  • 22. USAGE OF BLUEJACKING  Bluejacking can be used in many fields and for various purposes like in the busy shopping centre,railway station, high street, cinema, café/restaurant/pub,etc.  The main use of bluejacking tools or bluejacking is in advertising purpose.  Experimental results show that the system provides a viable solution for realizing permission-based mobile advertising.
  • 23. ADVANTAGES  Usually, a bluejacker will only send a text message, but with modern phones it’s possible to send images or sounds as well.  We can easily transfer data from mobile to laptop.  We can transfer data from mobile to mobile in a short period.
  • 24. DISADVANTAGES  Bluejacking is also confused with Bluesnarfing which is the way in which mobile phones are illegally hacked via Bluetooth.  Virus attacks.
  • 25. CONCLUION Bluejacking is a technique by which we can interact with new people and has ability to revolutionerise market by sending advertisement about the product, enterprise etc. on the Bluetooth configured mobile phone so that the people get aware about them by seeing them on the phone.
  • 26. REFRECES  http.//www.seminaronly.com/computer %20science/bluejacing.php  http.//www.bluejackingtools.com/  http.//www.wikipedia.org/wiki/bluejack  http.//www.webopedia.com/TERM/B/bluejacki ng.html