bibliography
Page 1 of 1
bibliography
Bluetooth Smart Ready devices are the most effective way to connect to billions of Bluetooth devices in market today, and the over 5 million Bluetooth enabled devices commercialized every single day.
Why Bluetooth technology? Why Bluetooth Smart Ready? Why Bluetooth Smart ?
by Jeevan kumar. 10/24/2011
http://www.bluetooth.com/MikesBlog/Lists/Posts/Post.aspx?ID=74
A Bluetooth chip is designed to replace cables by taking the information normally carried by the cable, and transmitting it to a receiver Bluetooth chip, which will then give the information received to the computer, phone, whatever.
Palowireless, Bluetooth and 802.11b(Part 1 & 2) , January 2002
http://www.palowireless.com/blueartciles/cc4_bluetooth802.11b_part1.asp
The distributed protocol used in Bluetooth 2.0 is designed to alleviate the problems of the present Bluetooth's master/slave-based Piconet, which drops the Piconet when a master leaves.
EE Times Online , Scientist tips features of Bluetooth 2.0 , July 2002 http://www.eetimes.com/story/OEG20020611S0033
National Cyber Alert System
Cyber Security Tip ST05-015
Authors: Mindi McDowell, Matt Lytle
Understanding Bluetooth Technology
Produced 2005 by US-CERT, a government organization.
What are some security concerns?
Depending upon how it is configured, Bluetooth technology can be fairly secure. You can take advantage of its use of key authentication and encryption. Unfortunately, many Bluetooth devices rely on short numeric PIN numbers instead of more secure passwords or passphrases.
One advice Disable Bluetooth when you are not using it - Unless you are actively transferring information from one device to another, disable the technology to prevent unauthorized people from accessing it.
http://www.us-cert.gov/cas/tips/ST05-015.html
Why Bluetooth technology? Why Bluetooth Smart Ready? Why Bluetooth Smart ?
by Jeevan kumar. 10/24/2011
http://www.bluetooth.com/MikesBlog/Lists/Posts/Post.aspx?ID=74
A Bluetooth chip is designed to replace cables by taking the information normally carried by the cable, and transmitting it to a receiver Bluetooth chip, which will then give the information received to the computer, phone, whatever.
Palowireless, Bluetooth and 802.11b(Part 1 & 2) , January 2002
http://www.palowireless.com/blueartciles/cc4_bluetooth802.11b_part1.asp
The distributed protocol used in Bluetooth 2.0 is designed to alleviate the problems of the present Bluetooth's master/slave-based Piconet, which drops the Piconet when a master leaves.
EE Times Online , Scientist tips features of Bluetooth 2.0 , July 2002 http://www.eetimes.com/story/OEG20020611S0033
National Cyber Alert System
Cyber Security Tip ST05-015
Authors: Mindi McDowell, Matt Lytle
Understanding Bluetooth Technology
Produced 2005 by US-CERT, a government organization.
What are some security concerns?
Depending upon how it is configured, Bluetooth technology can be fairly secure. You can take advantage of its use of key authentication and encryption. Unfortunately, many Bluetooth devices rely on short numeric PIN numbers instead of more secure passwords or passphrases.
One advice Disable Bluetooth when you are not using it - Unless you are actively transferring information from one device to another, disable the technology to prevent unauthorized people from accessing it.
http://www.us-cert.gov/cas/tips/ST05-015.html
Luis_PM- Posts : 3
Join date : 2011-08-18
Support sheet
Support:
(3/200)
User type: 0
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
|
|