Bluejacking

ABSTRACT

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.

Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking.

Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as users carry them around as they move through different physical locations throughout the day. As a communicative device, the mobile phone has been gradually taken up in ways that move beyond merely providing a channel for mediated conversation. One such appropriation is bluejacking, the practice of sending short, unsolicited messages via vCard functionality to other Bluetooth-enabled phones. To choose the recipients of bluejacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area. A bluejacker picks one of the available devices, composes a message within a body of the phone’s contact interface, sends the message to the recipient, and remains in the vicinity to observe any reactions expressed by the recipient.

If you are interested in this seminar topic, Click here to know 
how to get the full report. * conditions apply

5G Mobile Technology

ABSTRACT

5G Technology stands for 5th Generation Mobile technology. 5G technologies will change the way most high-bandwidth users access their phones. With 5G pushed over a VOIP-enabled device, people will experience a level of call volume and data transmission never experienced before.5G technology is offering the services in Product Engineering, Documentation, supporting electronic transactions (e-Payments, e-transactions) etc. As the customer becomes more and more aware of the mobile phone technology, he or she will look for a decent package all together, including all the advanced features a cellular phone can have. Hence the search for new technology is always the main motive of the leading cell phone giants to out innovate their competitors. Recently apple has produced shivers all around the electronic world by launching its new handset, the I-phone. Features that are getting embedded in such a small piece of electronics are huge.

The 5G technologies include all type of advanced features which makes 5G mobile technology most powerful and in huge demand in near future. The gigantic array of innovative technology being built into new cell phones is stunning. 5G technology which is on hand held phone offering more power and features than at least 1000 lunar modules. A user can also hook their 5G technology cell phone with their Laptop to get broadband internet access. 5G technology including camera, MP3 recording, video player, large phone memory, dialing speed, audio player and much more you never imagine. For children rocking fun Bluetooth technology and Piconets has become in market.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Co-operative Linux

ABSTRACT

This seminar describes Cooperative Linux, a port of the Linux kernel that allows it to run as an unprivileged lightweight virtual machine in kernel mode, on top of another OS kernel. It allows Linux to run under any operating system that supports loading drivers, such as Windows or Linux, after minimal porting efforts. The paper includes the present and future implementation details, its applications, and its comparison with other Linux virtualization methods. Among the technical details, it also presents the CPU-complete context switch code, hardware interrupt forwarding, the interface between the host OS and Linux, and the management of the VM‘s pseudo physical RAM.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Fluorescent Multilayer Disc (FMD)

ABSTRACT

Compact discs were a revolutionary product at its time and influenced many spheres of human activity. People started recording music of high quality, which didn’t get worse with the time as it happens to be on tape. As soon as CDs appeared in computer industry they immediately became an undoubted helper both for users and for programmers. The latter were able to increase volume of their program products by adding video and audio elements etc. Later discs were used for digital video (VideoCD).

But technologies are progressing. Data are growing faster and faster. A usual CD is far not enough (640 MBytes). So, there appeared DVD technology. Of course we are happy with those 17 GBytes that can be kept on one DVD disc, but this is a limiting point. So we need a completely new method of storing information on portable data medium. And at last, the company Constellation 3D demonstrates a new format: FMD (Fluorescent Multilayer Disk), which can provide us with a staggering 140 GB of storage space seems to be an enticing solution for the storage-hungry masses.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Maemo

ABSTRACT

Maemo is a software platform developed by Nokia for smartphones and Internet Tablets. It is based on the Debian Linux distribution. The platform comprises the Maemo operating system and the Maemo SDK.

Maemo is mostly based on open source code, and has been developed by Maemo Devices within Nokia in collaboration with many open source projects such as the Linux kernel, Debian, and GNOME. Maemo is based on Debian GNU/Linux and draws much of its GUI, frameworks, and libraries from the GNOME project. It uses the Matchbox window manager, and the GTK-based Hildon as its GUI and application framework.

The UI in Maemo 4 is similar to many handheld interfaces, and features a “Home” screen, which acts as a central point from which all applications and settings are accessed. The Home Screen is divided into areas for launching applications, a menu bar, and a large customisable area that can display information such as an RSS reader, Internet radio player, and Google search box.

The Maemo 5 UI is slightly different: The menu bar and info area are consolidated to the top of the display, and the four desktops can be customized with shortcuts and widgets.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Rover technology

ABSTRACT

Location-aware computing involves the automatic tailoring of information and services based on the current location of the user. We have designed and implemented Rover, a system that enables location-based services, as well as the traditional time-aware, user-aware and device-aware services. To achieve system scalability to very large client sets, Rover servers are implemented in an “action-based” concurrent software architecture that enables fine-grained application-specific scheduling of tasks. We have demonstrated feasibility through implementations for both outdoor and indoor environments on multiple platforms. The intriguing aspect of this scenario is the automatic tailoring of information and services based on the current location of the user. We refer to this paradigm as location-aware computing.

The different technology components needed to realize location-aware computing are present today, powered by the increasing capabilities of mobile personal computing devices and the increasing deployment of wireless connectivity (IEEE 802.11 wireless LANs [7], Bluetooth [1], Infra-red [2], Cellular services, etc.). Location-aware, in addition to the more traditional notions of time-aware, user-aware, and device-aware. Rover has a location service that can track the location of every user, either by automated location determination technology (for example, using signal strength or time difference) or by the user manually entering current location (for example, by clicking on a map).

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

CAPTCHA security for Phishing: Secure or not?

ABSTRACT

Addressing recent online banking threats, the banking industry offers us several solutions for our safety online banking experience, however those solutions may not finally secure the users under the rising threats. The main challenges are how to enable safe online banking on a compromised host, and solving the general ignorance of security warning.
CAPTCHA is primarily used to anti bot automated login, also, CAPTCHA base application can further provides secure PIN input against keylogger and mouse-logger for Bank’s customer.

Assuming users are always unconscious of security warning in our model, we have designed a series of attacks and defenses under this interesting condition. We will start by formalizing a security defense utilizing CAPCTCHA, its limitations are analyzed; Then, we will attack a local bank employing CAPTCHA solution, which we show how its can be bypassed from its vulnerability in its implementation. We further introduce – Control-Relaying Man-In-The-Middle (CR-MITM) attack, a remote attack just like a Remote Terminal Service that can capture and relay user inputs without local Trojan assistant, which is possible to defeat CAPTCHA phishing protection in the future. Under our model, we conclude, visual security defense alone is feeble for anti-phishing.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

  • © 2008 – 2013 seminars4you,

Follow

Get every new post delivered to your Inbox.

Join 1,339 other followers