A keypunch or key punch is a device used for precisely punching holes in specific locations on a stiff card. It was used in conjunction with early punched card computers. The punched card served as the program instruction for the computer. The locations of the punches were determined by the keys being struck by a human operator, much like typing...
In mobile computing, a jammer is a mobile communications device that transmits on the same frequency range as a cellphone to create strong cell tower interference and block cellphone signals and call transmission. Jammers are usually undetectable, and users may experience minimal effects such as poor signal reception. Jamming devices may be used in any location but are typically deployed where cellphone use may be disruptive, such as in libraries and restaurants.
A working cellphone must be in constant communication with its network provider via a cell tower or base station. By sending out radio waves in cellphone frequencies, jammers launch denial-of-service attacks (DoS), causing mobile devices to lose base station communication. Jammers come in a variety of shapes and sizes, including:
All jamming device types have three main parts, as follows:
Handheld jammers are capable of disrupting signals within nine to 30 meters, while more powerful jammers create a huge bubble stretching as far as a mile or 1.6 kilometers. In many countries, jammers are illegal, except in the military, law enforcement and other government agencies, where jammers are largely used to prevent bomb detonation or to isolate suspects in hostage situations.
Read More »
Join 138,000+ IT pros on our weekly newsletter
Home | Advertising Info | Write for Us | About | Contact Us
2010 - 2015
Partner Sites :