Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such. as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in. the name field (i.e for bluedating or bluechat) to another Bluetooth enabled device via the OBEX. protocol.
The information in this slide is not mine but it is adapted from various search engines and websites like google, yahoo, twitter etc. The theme of the slides is taken from slidesgo. you can find this theme under the category technology. Hope you guys like it and it helps you.
Presentation on Blue Jacking.
~ By The Avi Sharma
Presentation Download Link - https://www.slideshare.net/AvinashSha...
Follow us -
Youtube - https://www.youtube.com/watch?v=aVHWA23YB90
Instagram - https://instagram.com/the_avi_sharma_
Telegram - https://t.me/theavisharma
WhatsApp - https://chat.whatsapp.com/LcRzPABUGdZ5otH4mG6zIP
This Presentation is prepared by the higher authority of polite group
under the supervision of Syed Mubashair Abid and other members are Ch.Junaid Arshad and Muhammad Aftab Mustafa
Bluetooth network-security-seminar-reportROHIT SAGAR
basic network to protect blue-tooth from any un-authorised persons and devices ;its vital importance is to protect and send the data with or without any encrypted key
It includes versions of Bluetooth, how Bluetooth works, Bluetooth profile, Bluetooth core architecture, power classes of Bluetooth, Bluetooth protocol, advantages and applications of Bluetooth.
Project Loon is a research and development project being developed by Google
Project loon is a network of balloon Travelling on edge of space , designed to connect with the people In Rural and Remote areas.
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers,etc.
Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
Presentation on Blue Jacking.
~ By The Avi Sharma
Presentation Download Link - https://www.slideshare.net/AvinashSha...
Follow us -
Youtube - https://www.youtube.com/watch?v=aVHWA23YB90
Instagram - https://instagram.com/the_avi_sharma_
Telegram - https://t.me/theavisharma
WhatsApp - https://chat.whatsapp.com/LcRzPABUGdZ5otH4mG6zIP
This Presentation is prepared by the higher authority of polite group
under the supervision of Syed Mubashair Abid and other members are Ch.Junaid Arshad and Muhammad Aftab Mustafa
Bluetooth network-security-seminar-reportROHIT SAGAR
basic network to protect blue-tooth from any un-authorised persons and devices ;its vital importance is to protect and send the data with or without any encrypted key
It includes versions of Bluetooth, how Bluetooth works, Bluetooth profile, Bluetooth core architecture, power classes of Bluetooth, Bluetooth protocol, advantages and applications of Bluetooth.
Project Loon is a research and development project being developed by Google
Project loon is a network of balloon Travelling on edge of space , designed to connect with the people In Rural and Remote areas.
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers,etc.
Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
Security threats analysis in bluetooth enabled mobile devicesIJNSA Journal
Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular way of wireless interconnections for exchanging information. The main goal of this paper is to analyze the most critical Bluetooth attacks in real scenarios. In order to find out the major vulnerabilities in modern Bluetooth-enabled mobile devices several attacks have performed successfully such as Surveillance, Obfuscation, Sniffing, Unauthorized Direct Data Access (UDDA) and Man-in-the-Middle
Attack (MITM). To perform the testbed, several devices are used such as mobile phones, laptops,
notebooks, wireless headsets, etc. and all the tests are carried out by pen-testing software like hcittml, braudit, spoafiooph, hridump, bluesnarfer, bluebugger and carwhisperer.
Bluetooth smart (also known as Bluetooth low energy or BLE) is introduced in the legacy Bluetooth 4.0 specification by Bluetooth special interest group. Bluetooth smart is primarily designed for low power embedded devices with limited computation capabilities. With expeditious growth in the IoT technology, BLE has become substantiate criterion for the smart devices.
Bluetooth specification supports the asymmetrical architecture of the LE devices. Memory and processing power requirements of peripheral devices are much lower than the central. This will be a great advantage in case of single mode - peripheral only devices. Device that acts always as peripheral can be designed with low memory, longer battery life and low power consumption. Low power smart wearable devices available in market such as heart rate monitors, blood pressure monitors, fitness kit, smart watches etc run on a small coin cell battery for years.
Industrial Internet of Things or IIOT utilizes software, hardware, and cloud systems and services to connect the machines used in industrial environments. However, cybersecurity threats are something you need to worry about. You have to know how to keep your apps secure against these threats.
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
When Android first made its way into the consumer market, no one could have predicted the impact it would have. Android was an operating system developed with a simple idea at its core: Google’s founders wanted smarter mobile devices that better served their users. Today, that simple idea has helped make Android the most popular mobile OS on the market, with a global share of 66%.
Android’s popularity can largely be traced to its sheer diversity. Almost from the beginning, it has been an open platform, and there are countless devices from countless manufacturers that users can choose between. Therein lies the problem – due to its widespread popularity, Android finds itself targeted by criminals and malware with greater frequency than any other operating system. This means that although the OS is not inherently vulnerable, any vulnerabilities that do exist tend to be exploited if they aren’t patched in a timely fashion. Moreover, because so many different vendors count themselves as players in the Android space, it’s inevitable that some will lag behind with security patching. In the meantime, their devices will remain vulnerable, even as they’re being used to handle sensitive business data.
“Nearly every organization supporting smartphones and tablets must have a strategy to support Android devices, despite some of the security challenges,” reads a recent white paper by J. Gold Associates. “As we moved to a more mobile world over the past several years, the number of potential attack points increased dramatically, and many of them consisted of user-selected and often unsecured devices as a byproduct of BYOD,” the paper continues. “The ability to secure data and prevent corporate breaches consistently ranks among the top issues both IT and general management struggle with on a regular basis. A February 2016 Ponemon Institute survey shows that 67% of companies are either certain or very likely to have had a security breach due to a mobile device.”
Slow security patching is far from the only threat facing Android within the enterprise. To grant themselves additional freedoms and run certain applications, many users choose to root their devices, stripping away core security functionality in the interest of personalization. And though measures such as Samsung KNOX and Android for Work exist to separate corporate and private data, these software solutions can be fooled by a savvy enough user.
That’s where BlackBerry comes in. Security has always been in our blood, and we’ve always made it our priority to protect both our clients and their data. That’s why we’ve made our own foray into the Android device market, bringing our full security expertise to bear.
Design and implement a smart system to detect intruders and firing using IoT IJECEIAES
The security system is essential for occupants' convenience and protection from intruders and fire. Theft and fire are the most important requirement for the security system. The advancement of wireless sensor networks using IoTs increased the features in a security system and play an important role in daily life. In this paper, the proposed system is divided into two units. The first one about security which use to take snapshots by a camera whenever there is fire or intruders in the security zone and mail it to the owner every three seconds by using Arduino configured with MATLAB program. MATLAB program plays the main role to coordinate between sensors and to turn on/off the cameras. The second unit is about controlling the appliances and also the main door by using AVR microcontroller configured by CVAVR software that connected with Bluetooth sensor and controlled by a smartphone by using the implementation software built-up in the smartphone. To arrival of the control unit, the user should send code from the software implementation to the framework that use to turn on/off the devices or open/close the door. This proposed system is designed and implemented in details in this paper.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
3. INTRODUCTION
01
Sending of unsolicited messages over
Bluetooth to Bluetooth-enabled devices
such as mobile phones, PDAs or laptop
computers via the OBEX protocol is
Bluejacking.
4. BLUETOOTH
Bluetooth is a wireless technology that
provides short range communications.
Bluetooth is used for sending messages or
connecting to remote headsets or various
other devices.
5. Advantages
and
disadvantages
of bluetooth
It avoids interference from other wireless
technologies and is very cheap to use. Also
free if it’s already installed in device.
The technology is also adopted in many
products such as headsets, in car system,
printer, webcam, GPS, keyboard, mouse etc.
Battery drains easily, it is not secure and
works very slow.
6. BLUEJACKING
02 Bluejacking is a hacking method
that involves sending of
unsolicited messages over
Bluetooth to Bluetooth-enabled
devices.
7. ORIGIN
Bluejacking was reportedly first carried
out by a Malaysian IT consultant named
Ajack who used his phone to advertise
Sony Ericsson. He also invented the
name, which he claims is an amalgam
of Bluetooth and Ajack, his username
on Esato, a Sony Ericsson fan online
forum. Jacking is, however, an
extremely common shortening of hijack,
the act of taking over something.
BLUEJACKED
8. OBEX PROTOCOL
03
OBJECT EXCHANGE is a transfer protocol that
defines data objects and a communication
protocol for devices that can exchange data and
commands in a resource-sensitive standardized
fashion.
9. PROTOCOLS
OBEX PUSH
Used for
transferring file
OBEX FILE TRANSFER
Used to store and
retrieve files
PHONEBOOK ACCESS
Similar to file transfer,
but uses a target.
IRMC
Used to exchange
phone books entries
10. A VersitCard is an electronic
business (or personal) card and also
the name of an industry
specification for the kind of
communication exchange that is
done on business or personal cards.
Vcard
Vcard
11. How to
Bluejack?
04 Assuming that you now have a Bluetooth phone in
your hands, the first thing to do is to make
sure that Bluetooth is enabled. You will need
to read the handbook of the particular phone
(or PDA etc.) that you have but somewhere in
the Menu item you will find the item that
enables and disabled Bluetooth.
12. Steps to bluejack
Select an area with plenty of
mobile users.
Go to contacts in your
Address Book.
Step 1
Step 2
15. Steps to bluejack
Choose one phone and send
the contact
You will get the message
"card sent" and then listen for
the SMS message tone of your
victim's phone.
Step 7
Step 8
18. Bluejacking can be used in many
fields and for various purposes.
The main fields where the
bluejacking is used are as follows:
-
Busy shopping centre - Train
Station - High Street - On Trains
and Buses - Movie Theatres -
Cafés and Restaurant - Shopping
Centres - Electronics Shop
USAGE
18
19. PREVENTIVE MEASURE
TURNING OFF
turn your Bluetooth
device off in certain
public areas
HIDDING
Set the Bluetooth
device to hidden
IGNORING
Ignore bluejacking
messages by refusing
or deleting them
20. Users can equip their gadgets with mobile security
products such as Symantec Mobile Security Suite
5.0, which include antivirus, firewall, anti-SMS spam
and data encryption technologies, that are easy to
deploy, manage and maintain.
The layered security in Symantec Mobile Security
Suite 5.0, would help IT administrators to provide
layered security in order to mitigate the unique
security risks of mobile devices.
TOOLS TO PREVENT
20
21. The main goal of Security Testing is to identify the threats in the system and
measure its potential vulnerabilities, so the threats can be encountered, and the
system does not stop functioning or can not be exploited. It also helps in
detecting all possible security risks in the system and helps developers to fix the
problems through coding.
In bluejacking, security hackers can use a security tool like Intruder
for identifying threats.
Intruder is an enterprise-grade vulnerability scanner that is easy to use.
Providing intelligently prioritized results as well as proactive scans for the latest
threats, Intruder helps save time and keeps businesses of all sizes safe from
hackers.
SECURITY TESTING
21
22. Bluejackers will only send messages/pictures.
They will never try to 'hack' a device for the
purpose of copying or modifying any files on
any device or upload.
CODE OF
ETHICS
1
If no interest is shown by the recipient after 2
messages the bluejacker will desist and move
on. • The Bluejacker will restrict their activity
to 10 messages maximum unless in
exceptional circumstances
If a Bluejacker is caught 'in the act' he/she will
be as co-operative as possible and not hide
any details of their activity.
2
3
23. We conclude that in future this
technology can become the key for
advertising and to interact with
new people, with the world and to
get the location messages on the
phone when we are out
somewhere. Because of its low
cost and power consumption this
technology has a great future
ahead.
CONCLUSION
Greetings to everyone, this is komal here and i have my colleagues with me as well siddharth jadhav and sneha rana. Hope everyone knows that well what we have gathered here for but since i’m starting i’ll introduce again we’ve gathered here for our subject seminar and the subj which is allotted to us is software engineering. And as it says in the slide our topic is bluejacking. There’s this character jack in titanic if you’ve seen the movie you might know and there’s this colour blue. So most of you might have contemplated that are we going to talk about blue jack. And the answer is no! Ofc not. Anyways, jokes apart to know about topic you have to be all ears in the seminar. Thank you
These are our table of contents, introduction, bluetooth, bluejacking and conclusion. Before going into detail, there might a question popping up in your minds, why do we have to learn about bluetooth when your topic is bluejacking? i’ll have to say that to us bluejacking was totally a new topic. So, before researching about bluejacking we researched about bluetooth. I’m not sure if you guys are aware about the functions, advantages and disadvantages of bluetooth. Hence, we tried to cover this from basics concepts of bluetooth as it’ll help people who are unaware of some bluetooth related terms to get the clear view of bluejacking.
Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. There are still so many terms which might new for you. Starting with bluetooth.
Bluetooth consists of very limited range usually around 10 mtrs on mobile phones but for pcs or laptops it could reach upto 100 meters with powerful transmitters.
An Unsolicited Message means a message which is transmitted in response to a locally occurring event. Bluejacking also mean for sending a vCard which typically contains a message in the name field (i.e. for blue dating or blue chat) to another Bluetooth enabled device via the OBEX PROTOCOL.. So you simply type a message and send it to other bluetooth enabled device without their permission.
Becoming bored while standing in a bank queue, Ajack did a Bluetooth discovery to see if there was another Bluetooth device around. Discovering a Nokia 7650 in the vicinity, he created a new contact and filled in the first name with ‘Buy Ericsson!' and sent a business card to the Nokia phone. “A guy a few feet away from me suddenly had his 7650 beep. He took out his 7650 and started looking at his phone. I couldn't contain myself and left the bank,” he says. So, this term came into the world
This technology works over Bluetooth and Infrared Data Association (IrDA) protocols. OBEX is primarily used as a push or pull application. The typical example could be an object push of business cards to someone else. • It performs a function that is similar to Hypertext Transfer Protocol (HTTP) but it does not require the resources that an HTTP server requires making it perfect for low‐end devices with limited resources.
The following protocols runs over OBEX, or have bindings to do so. 1. OBEX Push: used for transferring a file from the originator of the request to the recipient. 2. OBEX File Transfer Protocol : Used to store and retrieve files. 3. Phonebook Access : Similar to file transfer, but uses a target. Phonebook entries can be listed and retrieved from certain directories. 4. IrMC : Used to exchange phonebooks entries, calendar notes, messages, etc.; in its connected form.
We have often mentioned vCards in our presentation. So, for the people who don’t know what are they. vcards are often attached to e-mail messages, but can be exchanged in other ways, such as on the World Wide Web. They can contain name and address information, phone numbers, URLs, logos, photographs, and even audio clips. vCard was developed by a consortium founded by Apple, AT&T, IBM, and Siemens, which turned the specification over to an industry group, and name of the consortium was the Internet Mail Consortium (IMC) in 1996.
So once you’ve switched on your bluetooth, Your phone or PDA will start to search the airwaves for other devices within range. If you are lucky you will see a list of them appear, or it will say that it cannot find any. If the latter happens then relocate to another crowd or wait a while and try again. If you have a list of found devices then let the fun begin.
last step will be to lookout for the shock look in your victim and enjoyyy their panic reaction.
BlueSpam searches for all discoverable Bluetooth devices and sends a file to them (spams them) if they support OBEX. By default a small text will be send.
Meeting point It is the perfect tool to search for Bluetooth devices. You can set your meeting point to a certain channel and meet up with people you’ve not met before. Combine it with any bluejacking tools and have lots of fun. This software is compatible with pocket PC, palm, Windows.
Magic Blue Hack This Bluejacking Software is one of the newer software to help blue jack mobile phones. While the security backdoor has been patched in the newer phones, as long as pairing was previously done, the software can gain easy access the device.
Freejack Freejack is compatible to java phone like Nokia N-series.
Easyjacking (eJack) Allows sending of text Messages to other Bluetooth enables devices.
Proximitymail
Prevent bluejacking by turning your Bluetooth device off in certain public areas. Locations include shopping centers, coffee houses, movie theaters, eateries, bars and clubs, public transportation vehicles, phone and electronic stores. • Set the Bluetooth device to hidden, invisible or non-discoverable mode from the menu. This prevents the sender from seeing your device. Check your manufacturer's manual for disabling procedure. The phone maintains functionality in other modes. • Ignore bluejacking messages by refusing or deleting them. The messages vary but the typical messages come from an admirer, a jokester or someone sending a business card. Consider bluejacking the same way you think about spam.
Bluejackers will only send messages/pictures. They will never try to 'hack' a device for the purpose of copying or modifying any files on any device or upload. • Any such messages or pictures sent will not be of an insulting, libelous or pornographic nature. • If no interest is shown by the recipient after 2 messages the bluejacker will desist and move on. • The Bluejacker will restrict their activity to 10 messages maximum unless in exceptional circumstances e.g. the continuous exchange of messages between bluejacker & victim • If the Bluejacker senses that he/she is causing distress rather than mirth to the recipient they will immediately deceases all activity towards them. • If a Bluejacker is caught 'in the act' he/she will be as co-operative as possible and not hide any details of their activity.