Publicité
Publicité

Contenu connexe

Publicité

Bluejacking

  1. PRESENTED BY: NEHA SAHARE SONALI SHUKLA GUIDED BY: PROF. ABHILASHA BORKAR
  2. Introduction History Technologies Bluetooth vCard OBEX protocol How to bluejack Applications Advantages Disadvantages Conclusion
  3.  Bluejacking is the sending of unwanted messages over Bluetooth to Bluetooth- enabled devices.  It is done by sending a v-Card( Versit Card).  This technique is widely used for promotional purpose.
  4. Bluejacking was allegedly first conducted by a Malaysian IT consultant, ‘Ajack’ who used his Bluetooth-enabled phone to publicize Sony Ericsson.
  5. BLUEJACKING TECHNOLOGIES BLUETOOTH v-CARD OBEX protocol
  6.  Wireless networking standard created for personal networks (PANs).  Has a very limited range.  Easy way to send data.
  7.  Electronic business card.  Identified by their .vcf filename extensions.  Designed to support multiple languages.
  8.  It is the heart of file transfer over bluetooth.  It is a session layer protocol.  Optimized for ad- hoc wireless links.
  9. (i) (ii) (iii) (iv) (v)
  10. 1 •RED FANG 2 •BLUESNIFF 3 •BLUEBUG
  11. GUERILLA MARKETING SOCIAL NETWORKING OR GAMING
  12. Mostly prone to bluejacking
  13.  Copyright sound files will only be sent with the written consent of the copyright holder.  Can easily transfer data.  Can enjoy music by wireless headphones.
  14.  Vulnerable to virus attacks.  Causes irritation in any person.  Complete takeover of devices through a Trojan horse program.
  15. It is the modus operandi by which we can network with new people and has the ability to revolutionize market by propelling advertisements about the products, services, enterprises, etc. on the Bluetooth-configured devices. Bluejacking future prospects in the field of advertising and marketing are vividly dazzling.
  16. [1] International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 7 July, 2013. [2] International Journal Of Engineering And Computer Science Volume 2 Issue 6 June, 2013. [3] International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012.
Publicité