2. Abstract:
Introduction to Bluejacking.
Origin.
Application.
Usage.
How to bluejack?
Process of Bluejacking.
Prevention.
Code of ethics.
Conclusion.
3. Introduction to Bluejacking
Bluejacking is the sending of unsolicited messages
over Bluetooth-enabled devices.
Bluetooth has a very limited range.Usually around 10
meters on mobile phones, but laptops can reach upto 100
meters with powerful transmitters.
5. Origin
Ajack did a bluetooth discovery to see if there
was another bluetooth device around.
Ajack told IT Web that he used his Ericsson
cellphone in a bank to send a message to
someone with a Nokia 7650.
This bluejack phenomenon started after a
Malaysian IT consultant named “Ajack” posted a
comment on a mobile phone forum.
6. Application
Bluejacking is done when where there is
many devices has avaiable bluetooth devices.
These places mainly include Railway
Station, Airport,Hotels,Bus Stations,Café &
Bank.
7. Usage
Experimental results show that the system provides a
viable solution for realizing permission-based mobile
advertising.
The main use of bluejacking tools or bluejacking is in
advertising purpose and location based purpose.
Bluejacking can be used in many fields and for various
purposes like in the busy shopping centre,train station,
high street,cinema,café/restaurant.
8. How to bluejack?
Assuming that you now have a Bluetooth
phone in your hands, the first thing to do is to
make sure that Bluetooth is enabled.
The handbook of the particular phone (or PDA
etc) that you have but somewhere in the Menu
item you will find the item that enables and
disabled Bluetooth.
9. The various steps involved –in
mobile
First press the 5-way joystick down.
Then choose "New contact“.
Then in the first line choose your desired
message.
Then go to the contact.
Then scroll down to send.
Then choose "Via Bluetooth”.
Then press "Select"
10. The various steps involved – in
computer/laptop
Create a new contact.
Enter the message into one of the name fields.
Save the new contact.
Go to the address book.
Right-click on the message/contact.
Go to action.
Go to send Bluetooth.Click on other and choose a
device by double clicking.
11.
12. Process of Bluejacking
Go to contact
Create a new
contact
Write a short
message you
want to send in
next line
Our phone will
search for
devices
Select this
contact and
send Via
bluetooth
Save this
contact
All the devices
near us will be
displayed
Select any one
we like and send
We have
bluejacked
someone
13. Prevention
To prevent being Bluejacked, disable
Bluetooth on the mobile device when not in
use.
The device will not show up on a
“Bluejacker’s” phone when he/she attempts
to send a message and they do not queue
up.
14. Code of ethics
Do not hack any device.
Do not send any abusive message.
Do not threaten anyone.
Must not reveal ourself to the victim.
Do disable if you don’t want to bluejack
15.
16. Conclusion
Low cost and power consumption
technology.
Bluejacking is a technique by which we
can interact with new people.