bluejacking
Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. These business cards often have a clever or flirtatious message rather than the typical name and phone number. Bluejackers often look for the receiving phone to ping or the user to react. They then send another, more personal message to that device. Once again, in order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking. *
* [Source: Bluetooth wireless technology Hacking Information]
Read Also:
- bluesnarfing
Bluesnarfing allows hackers to gain access to data stored on a Bluetooth enabled phone using Bluetooth wireless technology without alerting the phone’s user of the connection made to the device. The information that can be accessed in this manner includes the phonebook and associated images, calendar, and IMEI (International Mobile Equipment Identity). By setting the […]
- Bluetooth
Bluetooth is defined as being a short-range radio technology (or wireless technology) aimed at simplifying communications among Internet devices and between devices and the Internet. It also aims to simplify data synchronization between Internet devices and other computers. Bluetooth products — that is products using Bluetooth technology — must be qualified and pass interoperability testing […]
- board
Short for printed circuit board or expansion board.
- bogon
Derived from the slang term of bogus (non-existent or fake), in Internet terminology the the term bogon is often used to describe a bogus IP address; or more specifically, the use of an address or a route object that is not properly authorized by the entity to which the address, or resource, was originally assigned.
- boilerplate
Text or graphics elements designed to be used over and over. For example, you could create a boilerplate for a fax message that contains all the standard fax information that doesn’t change, such as your name, address, and phone number. Then whenever you want to create a new fax, you need only insert the boilerplate […]