Short notes:WPA2 Vulnerability

WPA2 Security protocol is one of the best and commonly used Wi-Fi encryption and authentication standards. According to PCWorld, security experts has uncovered a vulnerability that could compromise the Wi-Fi security. Wi-Fi users in the same network and logged in…

Bluejacking Tools Revamped

Bluejacking Tools has revamp its looks with a more modern and sleek look. In addition, security of the site has been reviews in order to make this a safer site to surf in. Cotinue to enjoy great news, articles and…

Spy on the PC

** The promotion for the spy on PC software has ended** (Jan 2011) In the previous post, I’ve introduced the mobile spy software and reviews has been excellent judging from those who bother to email me after getting it. In…

Bluetooth Remote Control

Bluetooth Remote Control turns your mobile phone into a universal controller for Windows. Features: See Desktop on the phone Play Songs from Media Player Java Based Customize simple keymaps or, for full control over the UI

Bluevoice BETA

Bluevoice Beta This Application allows voice Chat on through bluetooth To use this application with succes, you must have on your device bluetooth and you must be able to play voice content Features: Allows voices messages to be sent via…

Bluetooth network vulnerability

This is an excellent article on Bluetooth network attacks and countermeasures. This article is written by MSc Keijo Haataja from the Department of CS, University of Kuopio, Finland. Article is useful for anyone who has already have some knowledge on…