BLUETOOTH

WHAT IS BLUETOOTH? & HOW DOES IT WORK? Bluetooth is an open wireless protocol for exchanging data over short distances between devices. It’s not a wireless Internet connection like Wi-Fi. It’s a fast way to hook up devices without cords, such as headsets connected to cell phones, computers connected to wireless printers or keyboards, or … Read more

MOBILE SECURITY IMPORTANCE

“WHY IS MOBILE SECURITY IMPORTANT?” Mobile devices are the fastest growing consumer technology, with worldwide unit sales expected to increase from 300 million in 2010, to 650 million in 2012. Mobile applications are likewise booming. In June 2011, for the first time ever people on average spent more time using mobile applications (81 minutes) than … Read more

SIM

A SIM card orSubscriber Identity Module is a portable memory chip used in some models of cellular telephones. The SIM card makes it easy to switch to a new phone by simply sliding the SIM out of the old phone and into the new one. The SIM holds personal identity information, cell phone number, phone … Read more

PROTOCOLS USED IN MOBILE

The Main Protocols used by Mobile Phones: SMS EMS MMS WAP. INTRODUCTION TO SMS MESSAGING- SMS stands for Short Message Service. It is a technology that enables the sending and receiving of messages between mobile phones. SMS first appeared in Europe in 1992. It was included in the GSM (Global System for Mobile Communications) standards … Read more

MOBILE PHONE STANDARDS

ADVANCED MOBILE PHONE SYSTEM (AMPS) Advanced Mobile Phone System (AMPS) was an analogmobile phone system standard developed by Bell Labs, and officially introduced in the Americas in 1983 and Australia in 1987. It was the primary analog mobile phone system in North America (and other locales) through the 1980s and into the 2000s. As of … Read more

MOBILE GENERATION

In 1895 a few years after invention of telephone, Marconi demonstrated the first radio based wireless transmission. The first radio based conversation was used in ships during 1915. The first public mobile telephone system known as Mobile Telephone System (MTS) was introduced in United States in 1946. AT&T Bell laboratories devised the cellular concept which … Read more

MOBILE SECURITY

*INTRODUCTION* In the field of networking, the specialist area of network security consists of the provisions made in an underlying computer networksrtp, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access, and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together. Security Management … Read more

ANONYMOUS SURFING

“HIDING YOUR IDENTITY: ANONYMOUS SURFING” Anonymous web browsing is browsing the World Wide Web without making ones IP Address or any other personally identifiable information available to the websites that one is visiting. A degree of anonymity can be achieved by using a proxy server. If the proxy server is trusted, anonymity will be retained … Read more

internet security types

“TYPES OF INTERNET SECURITY” NETWORK LAYER SECURITY- TCP/IP can be made secure with the help of cryptographic methods and protocols that have been developed for securing communications on the Internet. These protocols include SSL and TLS for web traffic, PGP for email, and IPsec for the network layer security. IPSEC PROTOCOL- This protocol is designed … Read more