A multi-user dungeon (MUD) is both a style of role-playing game and the name of one of the original text-based multiplayer online role-playing games of this genre. MUD was created by Roy Trubshaw and Richard Bartle in 1980. MUD was modeled after earlier text-based adventure games and became a popular game to play over Telenet, an early commercial...
Bluejacking exploits a basic Bluetooth feature that allows devices to send messages to contacts within range.
Bluejacking does not involve device hijacking, despite what the name implies. The bluejacker may send only unsolicited messages. Hijacking does not actually occur because the attacker never has control of the victim’s device. At worst, bluejacking is an annoyance.
Bluesnarfing and bluebugging, however, are actual attacks that may result in a user losing control of his device. Although bluejacking, bluesnarfing and bluebugging use Bluetooth as the point of entry, bluesnarfing and bluebugging are far more harmful.
Bluejacking can be prevented by setting a device to hidden, invisible or non-discoverable mode.
Read More »
Join 138,000+ IT pros on our weekly newsletter
Home | Advertising Info | Write for Us | About | Contact Us
2010 - 2014
Janalta Interactive Sites: