Friday, September 2, 2011

Bluejacking: an Unsolicited Act

Bluejacking: an Unsolicited Act

Bluejacking is a term related to Bluetooth. Today, you find many products in the market that is Bluetooth-enabled. The latest products include PDAs, mobile phones and laptops that incorporate Bluetooth wireless communication system as the main feature.

This feature enables you to send phonebook contact list, business cards, images, and files to other Bluetooth-enabled devices. Many people are using this technology for sending unsolicited messages and images. This sending of unsolicited text messages or pictures from one Bluetooth-enabled device to other device is termed as bluejacking.

These offensive, unsolicited messages may be sometimes harmless or sometimes not. As the receiver does not know that his mobile phone is bluejacked, he might think that his phone is malfunctioning. To date, mobile users who carry our bluejacking just want to have fun with others with non-malicious intention. However, in near future, it could lead to serious problems.

How Bluejacking Works?

Carrying out a bluejacking is not an easy task. To carry out bluejacking, the sender and receiver must be within 10 meters of each other. The Bluejacking process includes that following easy steps:

· Go to Contacts on your mobile phone

· Create a new contact containing a short message that you want to send in the "Last Name" field

· Save the contacts

· Send this contact via Bluetooth. The mobile phone will search for all the Bluetooth-enabled devices near to you.

· Select the device name from the list to which you want to send the message

And, that's it, you have bluejacked someone.

Does Bluejacking Can Harm Your Mobile?

Bluejacking cannot harm your device. A bluejacker has no power to take control of your mobile in any case. He cannot access your personal information, not he can remove or alter your phone directory. Still, it is always advisable to avoid adding the contacts to your phone book that are not known to you.

How Can You Prevent Bluejacking?

There is hardly any software available to prevent or detect bluejacking. You can prevent it by following some protective habits:

· Set your Bluetooth device mode to hidden so that the sender is unable to find your device.

· Turn off your Bluetooth device if there is no need of it, especially in public areas like shopping malls, coffee house, theatres, bars, restaurants and electronic devices store houses.

· Ignore the messages and consider them as spam messages that you get in your email. Just simply delete them.

 

Chris enjoys writing articles on topics like bluejacking and how to send a text message . Visit to read more detail.

Random Post

0 comments:

Post a Comment

 
We're building a new world - We're Blog123 !