Bluetooth headset will be great option to be taken particularly for people who need to travel a lot. With this certain headset, people could get easiness in have communication or entertainment since this device do not need any cable or wire. However, before buying a certain product, it will be better for you to give more attention to these important factors. Therefore, you will get the most appropriate device that will bring higher comfort for you.
The first thing to do is checking whether the headset fits your ear. Make sure that you are choosing a certain product that is comfortable for your ear, especially if you frequently need to use it in long time. You should also choose whether you need to have a product with or without boom. Boom is a kind of extended microphone that is designed to be arched toward your mouth.
Second, think about the design of the headset. If you want to have a product that fits securely in your ear, you can choose a product in earbud type. However, this certain model might be less comfortable in your ears. Another option will be headset in earloop design. It is more comfortable than the earbud one in your ear, but you have to be really careful since it is easy to fall off.
Third, think about the features that you need to get from the headset. Check the battery in order to find out whether it is replaceable. It also allows you to get more information about the talk time and the standby time. Checking the connectivity will be important as well to check the number of devices that are compatible with the headset.
The fourth thing to check is also very important. Make sure that you are checking the quality of the sound produced by the headset. Good headset will have clear and audible voice. A product with noise reduction as well as echo cancellation is also perfect choice.
By considering those important aspects, you will have easiness in finding the most appropriate headset for your needs. Just try it.
Read more...
Bluetooth Security Issues
Thursday, October 14, 2010
Choosing the Right Bluetooth Headset Properly
Wednesday, October 13, 2010
Bluetooth Car Kits: How to Pair iPhone, BlackBerry and Nokia Phones to a Parrot Car Kit
Pairing Bluetooth car kits with mobile phones can prove challenging. Different manufacturers and sometimes individual phones, set up Bluetooth connections with different menus and selections. This guide shows how to pair iPhone 4, BlackBerry Curve 8900, and Nokia E72 phones with an MKi9100 Parrot car kit and accompanies a video on each.
<span class="fullpost">
People often navigate their phone menu system knowing that they need to achieve a Bluetooth connection, but without any idea how to achieve this. This is not surprising as there are so many different mobile phones on the market, and therefore many different ways of setting up the same Bluetooth function. Often if a successful connection is made, this is down to luck rather than understanding.
Here in this guide we set out the pairing Bluetooth procedure for three different brands of phone; the iPhone 4, BlackBerry Curve 8900, and the Nokia E72. This guide should be similar for other phones from these manufacturers, however they are not guaranteed to be the same. For other brands of phone, it is easier to get an understanding of what functions need to be found, by seeing these three sets of menu selections.
A mini screen MKi9100 Parrot car kit was used for the pairing of each phone.
To begin with it is necessary for the mobile phone to be within Bluetooth range, this means the phone should be inside the car and the vehicle engine needs to be switched on.
Pair iPhone 4:
Select main menu - Settings - General - Bluetooth,Turn Bluetooth on,Select Parrot device and enter MKi default code '0000'.
Pair BlackBerry Curve 8900:
Select BlackBerry Menu button - Manage connections - turn Bluetooth on - Set up Bluetooth - Search,The phone finds the MKi9100 device, click on this to select it,Enter the MKi default code '0000' to complete pairing,Before clicking "Yes" on the phone to connect to the Parrot kit, tick the box that says "don't ask this again", for automatic pairing each time the phone enters the car.
Pair Nokia E72:
Select function buttons: Menu - Ctrl. panel - Connectivity - Bluetooth (for first time Bluetooth use the phone will need to be assigned a name),On this menu there are three tabs - "Settings", "Paired devices" and "Blocked Devices" scroll right on the main navigation button for the second "Paired devices" tab,Click on Options - New paired device - More devices,The phone searches for the kit, when found click on it and enter MKi default code '0000',Click yes to "Authorise device to make connections automatically" (for automatic pairing on entering the car),Click yes to "Authorise device to accept connection" (to synchronise contact address book from phone to car).
In most cases these steps will prove to be sufficient however if pairing fails, it can be of assistance to set up the Parrot kit to look for a phone to pair with.
Set up the MKi9100 Parrot Car Kit to Look for Phones:
Click scroll wheel and turn until reach "Settings" (click to select),Click scroll wheel to select "Bluetooth",Turn scroll wheel till reach "Pair with" (click to select),Click to select "Other phones".
Once paired each of these three phones should now benefit from automatic address book synchronisation, from phone to the Bluetooth car kit. This allows caller ID to be shown on the Parrot car kit screen and is a common feature of all kits that have a display.
</span>
Read more...
What It Is Bluetooth and How It Works?
<span class="fullpost">
Bluetooth was developed using the Personal Area Network (PAN) - a way for devices to communicate in relative proximity to each other wirelessly. Bluetooth transmission range of about 1 meter to 100 meters, depending on the nature of the performance of the unit. Therefore, the most powerful (Class 1) can communicate over a distance of about 300 meters, similar to a typical Wi-Fi network.
Such as 802.11b and g, Bluetooth transmits in the radio frequency of 2.4 GHz, its speed to about 1 Mbit / s (much slower than Wi-Fi, but more or less equivalent to limited with a typical broadband Internet connection). Using LMP (Link Manager Protocol) to manage connections between devices.
Bluetooth vulnerabilities
Bluetooth can be in one of three levels of security work types:
1. is not security.
2. provides security at the level of service, after the channel established.
3. provides security at the link level, before the channel is established.
Every Bluetooth device has a unique 48-bit address of the device.The authentication scheme is the challenge-response, using symmetric keys, and encryption with a key are to (negotiated by communication devices, each device having a defined maximum key length) to 128 bits done. A 128-bit random key link handles securities transactions between two or more devices.
When two Bluetooth devices establish a communication channel to create both an initialization key. A password or personal identification number is the key and initialization is created and the link key is using. Then the link key is used for authentication.
The first vulnerability is the password or PIN. As with primary key, much safer than short ones. If an attacker is able to discover the password, you can calculate the possible key to the introduction and then calculating the binding key. Make the password long will it much more difficult to carry out the first step.
The initial key exchange is done through an encrypted connection made that was it particularly vulnerable. It is best if this part of the BT device pairing takes place in a physically secure (ie, where it is unlikely that viewers with BT devices that could intercept the communication). A hacker can record broadcasts sent on the incidence of BT and use them to re-create the PIN.
Instead of using the same password all the time, it should be changed frequently (how often depends on the type of equipment required and the level of security.)
Link buttons can be a combination of keys or the keys of the device. The best security is the practice to use the arrow keys instead of combination units. When using a unit must use the same key for all secure transactions, and the key must be shared with other trusted devices. This means that each device can recognize familiar intercourse with other trusted devices access to this key.
You can identify the Bluetooth address to a specific device (and associated users) and recording of transactions, which create problems of privacy.
Why Does Bluetooth Security?
Many users only use Bluetooth technology to a wireless headset or similar device to connect their laptops, and one wonders why security is a big deal. Implementation of security, even for such couples, the device allows a user to prevent unauthorized use of headphones.
Another use of Bluetooth is to create a temporary computer network. For example, multiple people can connect to a conference room in your Bluetooth-enabled laptops together to share files in the session.
If you use Bluetooth to create a temporary network, it is usually ad-hoc network, ie computers communicate directly with each other rather than in a Wireless Access Point (WAP). This means you have no central point of control of security, as there is with a WAP browser (such as a WAP can add MAC address filtering and other built-in security mechanisms) does. Therefore, the security is a concern because it can expose sensitive data stored on your laptop to others in the Bluetooth network. Remember that the range for Class 1 Bluetooth devices can be over 300 meters - enough so that, at some points, the equivalent of BT Wireless from the "war drivers" fi, but not to connect to the Team to see.
Another special concern is the safety of mobile phones. These phones can access their stored information such as addresses and phone numbers of contacts, calendar and other PDA data. Hacking on these phones using Bluetooth is called Bluesnarfing. Latest phones and software updates for older phones can affect patch this vulnerability.
A related technique called Bluebugging hacking, and attempts to access your commands so that the hacker actually calling add or delete contact information or eavesdrop on conversations of the participants. This vulnerability is included for handset manufacturers. If you are a BT-enabled phone, which is important for the software updated or extended with the latest mobile phone models are often our own.
Bluetooth devices may also be subject to Denial of Service (DoS), typically by bombarding the device with applications to the point that makes the battery degrades.
Finally, there are "mobile worms" as Cabir can use Bluetooth technology to spread to other BT devices. Cabir targets phones that use the operating system simbian.
The relatively short range of most Bluetooth devices to mitigate the risk of most of these vulnerabilities. For example, in the practice Bluebugging Bluesnarfing or against a BT phone, the hacker would usually within 10 meters (slightly less than 33 feet) are from your destination.