Skip to Content
How Personal & Internet Security Work
book

How Personal & Internet Security Work

by Preston Gralla
May 2006
Beginner
288 pages
2h 32m
English
Que
Content preview from How Personal & Internet Security Work

Chapter 11. Bluetooth Security Dangers

Bluetooth Security Dangers

Wi-Fi (also known as 802.11b/g) is the most popular type of wireless technology for connecting computers, but there’s another kind of wireless technology that has become widely used—Bluetooth. It is used primarily for cell phones and personal digital assistants (PDAs), although it can also be used for wireless keyboards, mice, and headphones and for connecting computers to one another.

Bluetooth was designed so that you do not need to do anything to connect devices to one another. Simply turn on the device, and it automatically looks for another Bluetooth device. If it finds one or more such devices, they set ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Absolute Beginner’s Guide To: Security, Spam, Spyware & Viruses

Absolute Beginner’s Guide To: Security, Spam, Spyware & Viruses

Andy Walker
Detecting and Combating Malicious Email

Detecting and Combating Malicious Email

Julie JCH Ryan, Cade Kamachi

Publisher Resources

ISBN: 0789735539Purchase book