Thursday, October 14, 2010

Choosing the Right Bluetooth Headset Properly

Bluetooth headset will be great option to be taken particularly for people who need to travel a lot. With this certain headset, people could get easiness in have communication or entertainment since this device do not need any cable or wire. However, before buying a certain product, it will be better for you to give more attention to these important factors. Therefore, you will get the most appropriate device that will bring higher comfort for you.

The first thing to do is checking whether the headset fits your ear. Make sure that you are choosing a certain product that is comfortable for your ear, especially if you frequently need to use it in long time. You should also choose whether you need to have a product with or without boom. Boom is a kind of extended microphone that is designed to be arched toward your mouth.

Second, think about the design of the headset. If you want to have a product that fits securely in your ear, you can choose a product in earbud type. However, this certain model might be less comfortable in your ears. Another option will be headset in earloop design. It is more comfortable than the earbud one in your ear, but you have to be really careful since it is easy to fall off.

Third, think about the features that you need to get from the headset. Check the battery in order to find out whether it is replaceable. It also allows you to get more information about the talk time and the standby time. Checking the connectivity will be important as well to check the number of devices that are compatible with the headset.

The fourth thing to check is also very important. Make sure that you are checking the quality of the sound produced by the headset. Good headset will have clear and audible voice. A product with noise reduction as well as echo cancellation is also perfect choice.
By considering those important aspects, you will have easiness in finding the most appropriate headset for your needs. Just try it.
Read more...

Wednesday, October 13, 2010

Bluetooth Car Kits: How to Pair iPhone, BlackBerry and Nokia Phones to a Parrot Car Kit

Pairing Bluetooth car kits with mobile phones can prove challenging. Different manufacturers and sometimes individual phones, set up Bluetooth connections with different menus and selections. This guide shows how to pair iPhone 4, BlackBerry Curve 8900, and Nokia E72 phones with an MKi9100 Parrot car kit and accompanies a video on each.

<span class="fullpost">

People often navigate their phone menu system knowing that they need to achieve a Bluetooth connection, but without any idea how to achieve this. This is not surprising as there are so many different mobile phones on the market, and therefore many different ways of setting up the same Bluetooth function. Often if a successful connection is made, this is down to luck rather than understanding.

Here in this guide we set out the pairing Bluetooth procedure for three different brands of phone; the iPhone 4, BlackBerry Curve 8900, and the Nokia E72. This guide should be similar for other phones from these manufacturers, however they are not guaranteed to be the same. For other brands of phone, it is easier to get an understanding of what functions need to be found, by seeing these three sets of menu selections.
A mini screen MKi9100 Parrot car kit was used for the pairing of each phone.
To begin with it is necessary for the mobile phone to be within Bluetooth range, this means the phone should be inside the car and the vehicle engine needs to be switched on.

Pair iPhone 4:
Select main menu - Settings - General - Bluetooth,Turn Bluetooth on,Select Parrot device and enter MKi default code '0000'.

Pair BlackBerry Curve 8900:
Select BlackBerry Menu button - Manage connections - turn Bluetooth on - Set up Bluetooth - Search,The phone finds the MKi9100 device, click on this to select it,Enter the MKi default code '0000' to complete pairing,Before clicking "Yes" on the phone to connect to the Parrot kit, tick the box that says "don't ask this again", for automatic pairing each time the phone enters the car.

Pair Nokia E72:
Select function buttons: Menu - Ctrl. panel - Connectivity - Bluetooth (for first time Bluetooth use the phone will need to be assigned a name),On this menu there are three tabs - "Settings", "Paired devices" and "Blocked Devices" scroll right on the main navigation button for the second "Paired devices" tab,Click on Options - New paired device - More devices,The phone searches for the kit, when found click on it and enter MKi default code '0000',Click yes to "Authorise device to make connections automatically" (for automatic pairing on entering the car),Click yes to "Authorise device to accept connection" (to synchronise contact address book from phone to car).
In most cases these steps will prove to be sufficient however if pairing fails, it can be of assistance to set up the Parrot kit to look for a phone to pair with.

Set up the MKi9100 Parrot Car Kit to Look for Phones:
Click scroll wheel and turn until reach "Settings" (click to select),Click scroll wheel to select "Bluetooth",Turn scroll wheel till reach "Pair with" (click to select),Click to select "Other phones".
Once paired each of these three phones should now benefit from automatic address book synchronisation, from phone to the Bluetooth car kit. This allows caller ID to be shown on the Parrot car kit screen and is a common feature of all kits that have a display.
</span> Read more...

What It Is Bluetooth and How It Works?

I know many experienced computer users never give an idea of Bluetooth. "Oh, yes, I think that's built into my laptop, but I have never" is a common refrain. Originally as a technology that eventually the horrors of multiple cables and cords-free, non-Bluetooth succeeded regarded as fast as expected. Until recently, many are simply not useful (with emphasis on "Utility") Bluetooth devices available - at least not for desktop computing. Users of handheld computers (like my iPaq), the technology faster and allows us to easily portable keyboards, headsets, printers, (do the often determine not to be a lot of connections, including desktops and laptops), etc. in our portable devices. Bluetooth phones allow you to connect a PDA or laptop to the Internet through it.
<span class="fullpost">
Bluetooth was developed using the Personal Area Network (PAN) - a way for devices to communicate in relative proximity to each other wirelessly. Bluetooth transmission range of about 1 meter to 100 meters, depending on the nature of the performance of the unit. Therefore, the most powerful (Class 1) can communicate over a distance of about 300 meters, similar to a typical Wi-Fi network.

Such as 802.11b and g, Bluetooth transmits in the radio frequency of 2.4 GHz, its speed to about 1 Mbit / s (much slower than Wi-Fi, but more or less equivalent to limited with a typical broadband Internet connection). Using LMP (Link Manager Protocol) to manage connections between devices.
Bluetooth vulnerabilities

Bluetooth can be in one of three levels of security work types:

1. is not security.
2. provides security at the level of service, after the channel established.
3. provides security at the link level, before the channel is established.

Every Bluetooth device has a unique 48-bit address of the device.The authentication scheme is the challenge-response, using symmetric keys, and encryption with a key are to (negotiated by communication devices, each device having a defined maximum key length) to 128 bits done. A 128-bit random key link handles securities transactions between two or more devices.

When two Bluetooth devices establish a communication channel to create both an initialization key. A password or personal identification number is the key and initialization is created and the link key is using. Then the link key is used for authentication.

The first vulnerability is the password or PIN. As with primary key, much safer than short ones. If an attacker is able to discover the password, you can calculate the possible key to the introduction and then calculating the binding key. Make the password long will it much more difficult to carry out the first step.

The initial key exchange is done through an encrypted connection made that was it particularly vulnerable. It is best if this part of the BT device pairing takes place in a physically secure (ie, where it is unlikely that viewers with BT devices that could intercept the communication). A hacker can record broadcasts sent on the incidence of BT and use them to re-create the PIN.

Instead of using the same password all the time, it should be changed frequently (how often depends on the type of equipment required and the level of security.)

Link buttons can be a combination of keys or the keys of the device. The best security is the practice to use the arrow keys instead of combination units. When using a unit must use the same key for all secure transactions, and the key must be shared with other trusted devices. This means that each device can recognize familiar intercourse with other trusted devices access to this key.

You can identify the Bluetooth address to a specific device (and associated users) and recording of transactions, which create problems of privacy.
Why Does Bluetooth Security?

Many users only use Bluetooth technology to a wireless headset or similar device to connect their laptops, and one wonders why security is a big deal. Implementation of security, even for such couples, the device allows a user to prevent unauthorized use of headphones.

Another use of Bluetooth is to create a temporary computer network. For example, multiple people can connect to a conference room in your Bluetooth-enabled laptops together to share files in the session.

If you use Bluetooth to create a temporary network, it is usually ad-hoc network, ie computers communicate directly with each other rather than in a Wireless Access Point (WAP). This means you have no central point of control of security, as there is with a WAP browser (such as a WAP can add MAC address filtering and other built-in security mechanisms) does. Therefore, the security is a concern because it can expose sensitive data stored on your laptop to others in the Bluetooth network. Remember that the range for Class 1 Bluetooth devices can be over 300 meters - enough so that, at some points, the equivalent of BT Wireless from the "war drivers" fi, but not to connect to the Team to see.

Another special concern is the safety of mobile phones. These phones can access their stored information such as addresses and phone numbers of contacts, calendar and other PDA data. Hacking on these phones using Bluetooth is called Bluesnarfing. Latest phones and software updates for older phones can affect patch this vulnerability.

A related technique called Bluebugging hacking, and attempts to access your commands so that the hacker actually calling add or delete contact information or eavesdrop on conversations of the participants. This vulnerability is included for handset manufacturers. If you are a BT-enabled phone, which is important for the software updated or extended with the latest mobile phone models are often our own.

Bluetooth devices may also be subject to Denial of Service (DoS), typically by bombarding the device with applications to the point that makes the battery degrades.

Finally, there are "mobile worms" as Cabir can use Bluetooth technology to spread to other BT devices. Cabir targets phones that use the operating system simbian.

The relatively short range of most Bluetooth devices to mitigate the risk of most of these vulnerabilities. For example, in the practice Bluebugging Bluesnarfing or against a BT phone, the hacker would usually within 10 meters (slightly less than 33 feet) are from your destination.

</span>
Read more...

Tuesday, October 12, 2010

Mini PCI-e Bluetooth Security: Beware Of It

Most people are not aware, almost every laptop WiFi mini-PCIe and so mobile. An external wireless card can be purchased online providers or in stores like Best Buy and CompUSA. It is important to note advanced wireless card, it is often more than a low-power wireless cards expensive, the resources of the portable computer can use battery. Now the wireless card that the physical connections and data link posted, they are ready to begin.

<span class="fullpost">
Mini-PCI wireless Bluetooth

If the adapter is installed with the computer, the driver asked. Download and install the latest drivers from four, if not installed. After the driver and adapter connection manager installed, you must use the adapter to connect to browse. Finally, and the most important issue is security. 
Once a connection between the two systems, you can on the safety of mini PCIe wifi troubles. Once the security checks is enabled properly, it is time that the wireless connection is running. We also recommend must meet safety standards for the exchange of files.
 
Although not all computers wireless support, some manufacturers have wireless standards, wireless network card is adopted there. However, there is a wireless card more and more each day in freedom. 
Mini-PCI wireless card for laptops. Therefore, instead of a round, stand by the court as a whole, the wireless card for your device hammer. See what the adapter and the wireless card is compatible with the network.
 
There are hundreds of Adware Remove Programs to promote. 
Is your best, download Spybot and the promotion of the best current areas adware removal software is intended. Or just Google statement, "the notice withdrawn." Like I said, there are hundreds. Some are good, some not. Free Spybot is the big house to see what kind of works, but I know some of you and Google, or authorization). Gei it one.

</span>
Read more...

Monday, October 11, 2010

Bluetooth Security and Bluesnarfing Blues

Bluesnarfing is the identification of Bluetooth devices in "discoverable" mode to combine and steal personal data such as pictures, SMS messages, address book or IMEI of the phone. If you could be a device is turned on Bluetooth and vulnerable and "visible" to anyone within 10 meters of your device may be connected and download their 'data without their authorization for the use of easy to use.

Bluetooth is a popular way to exchange data between compatible devices regular mobile phones, PDAs, laptops, etc. Bluesnarfing a technique of abusing the Bluetooth "pairing" protocols, which recognize the nature of the technology and equipment is allowed to authenticate each other to transfer data between them.
<span class="fullpost"> 
It is an easy technique, even more than with conventional systems, hacking, with the advances in phone and PDA functionality and storage systems, the extent and direction of Bluesnarfing attacks will increase, and much more serious than those committed to the Address Book Paris Hilton.
 
The following is a summary of the three most prominent methods accepted Bluesnarfing attack:
 
Backdoor Attack is a method of establishing a recognized "trust" between the device "matching" mechanisms. If the device is enabled by default and does not require approval of connectivity, an attacker can connect, without being detected - unless, of course, the owner of the device is actually your screen look at the exact time of the attack. Not only can an attacker to data from the device by this attack, the other services are deployed on the device, how can modem or Internet connection, WAP and GPRS access doors without the knowledge of the owner to restore.
 
BlueBug attack is the technique of making a connection profile in series with the device to the AT command set protocol command. Command is obtained, once access to the AT, through the use of easy-to free software to use to start monitoring, stop or redirect calls and SMS, or connect to data services used such as the Internet (and if this happen in theory, an attacker could, in theory calls from anywhere in the world). This attack, for instance, could allow an attacker to configure the forwarding of calls to 900 numbers or the identity of the victim.
 
Snarfing attack technique is used to connect to a Bluetooth device without the attention of their "owners to access (and use) of a limited part of its" data using free software. This would include access to: Properties from the menu of the phone call, configuration and security option, profile, screen, ring tones, calendar and clock settings. The attack also allows access to your IMEI number (the unique number for the phone to the 'net) is identified and can be used to "clone" your number to make fraudulent calls.
 
Bluesnarfing is easily prevented and no reason to be sad, simple configuration changes can attacks by reducing the cost of Penetration Testing and Ethical Hacking prevent activities in this area, that is their staff, or ensure their personal device safely. Also, remember that behind every "Convenience" is a potential weakness and never leave your phone (or technology) is in default.
</span>
Read more...

Sunday, October 10, 2010

Bluetooth Security Concept

These days the security of Bluetooth is a big problem, all communication technology, the problem of identity theft and privacy faces, Bluetooth is no exception. Almost everyone knows that to require e-mail services and networks. What users of Bluetooth need to realize that Bluetooth also requires security measures as well.

The good news for Bluetooth users is that the security scares, like most scares, are normally over dramatized and blown is told entirely from proportion.The truth are to manage these problems easily, with various measures already in order to ensure the security of the Bluetooth technology.
<span class="fullpost">
It \ 's true that some Bluetooth phones that were hacked hacked into.Most devices are usually those who don \' t have any security at all.

According to Bluetooth specialists, in order to hack into a Bluetooth device, the hacker:

1.Force two paired devices to break their relationship.

2.Steal packages will be used to send the pen again.

3. Decode the pin.

Of course, the hacker also within reach of the appliance, and recommend very expensive developer type equipment.Most professionals that you recommend a longer screw with 8 points.

Bluetooth Security Basics

The \ "pairing \" is one of the basic level of security for Bluetooth devices.Pairing is two or more Bluetooth devices sharing through the profiles to be recognized - in most cases they get the same pin.

The basic specifications for Bluetooth use an encryption algorithm that is totally secure. Once the two devices together, and they are sure.

Until you have successfully paired, the Bluetooth devices won \ 't communicate other.Due to mating and the fact that at short range - Bluetooth technology is considered secure.

As the news has indicated, experienced hackers have ways developed to manage this level of security. There are ways to avoid this

Threat, how to install software to prevent hackers from getting in.

With the increasingly popular Bluetooth \ 's really not surprising that safety always in question. As Bluetooth bigger and better

Security will always be something that no one takes lightly.

If you were '\ ve concerns about Bluetooth security in the past, you can be sure that the new devices offer more security and better. Blocks hackers always something that every owner is concerned about - \ and the manufacturer's certainly aware of.

</span>


Read more...