Features: This document contains the manual entries to enter some of the most popular motorola ringtones manually into your phone
Category: Articles
Articles on Bluejacking
GSM, Bluetooth and WIFI security
Features: comprehensive page on security of major mobile technologies
Potential Threats to WAP phones
Features: This paper will review WAP, WAP Push, WML, and WMLScript and their ability to host malicious software. Exploits such as buffer overflows, authentication, and encryption schemes are outside the scope of this paper. Finally to detech such future threats,…
Analysis of 3G Mobile Security
Features: Online Page which is a report on 3G security
Neverbefore Bluetooth Intrusion
Features: Protect yourself again intruder using this manual learn how an attacker step by step gains access to symbian and bluetooth enable phones Takes control and even can steal call credit