Cryptocurrency is a type of digital currency that uses cryptography for security and anti-counterfeiting measures. Public and private keys are often used to transfer cryptocurrency between individuals. As a counter-culture movement that is often connected to cypherpunks, cryptocurrency is essentially a fiat currency. This means users must reach a...
In mobile computing, a jammer is a mobile communications device that transmits on the same frequency range as a cellphone to create strong cell tower interference and block cellphone signals and call transmission. Jammers are usually undetectable, and users may experience minimal effects such as poor signal reception. Jamming devices may be used in any location but are typically deployed where cellphone use may be disruptive, such as in libraries and restaurants.
A working cellphone must be in constant communication with its network provider via a cell tower or base station. By sending out radio waves in cellphone frequencies, jammers launch denial-of-service attacks (DoS), causing mobile devices to lose base station communication. Jammers come in a variety of shapes and sizes, including:
All jamming device types have three main parts, as follows:
Handheld jammers are capable of disrupting signals within nine to 30 meters, while more powerful jammers create a huge bubble stretching as far as a mile or 1.6 kilometers. In many countries, jammers are illegal, except in the military, law enforcement and other government agencies, where jammers are largely used to prevent bomb detonation or to isolate suspects in hostage situations.
Read More »
Join 138,000+ IT pros on our weekly newsletter
Home | Advertising Info | Write for Us | About | Contact Us
2010 - 2015
Partner Sites :