Mobile hacking via blutooth

In this post i will tell  you how actually  mobile phones are get hacked  . i will describe it step by step that how mobile get hacke but plz don’t utilize it and try . If you will try then it will your responsibility. I mainly describe the process  of Bluejacking .    Friends there is a bluetooth hacking software , using bluetooth hacking software anyone can “hack any cell phones”  the latest version of this software is Bluetooth Hack v 1.07. anyone can easly download it from any file sharing site. Like...

MOBILE HACKING:BLUTOOTH HACKING

Bluetooth is a very common thing for mobile technology and used frequntly by user to tranfer data. But as frequent they transfer the data , less they put attention on security . Even most of them donot think about  that their mobile can be hacked via blutooth. So now from today i am going to describe about blutooth hackings and security and it will continue in upcoming post. Bluejacking, Bluesnarfing, Bluebugging and Bluetoothing are the main type of bluetooth hacks. Bluejacking is the simplest of the four.  It is an attempt to send...

How does anti-virus software work?The Working mechanism of antivirus

An anti-virus software program is a computer program that can be used to scan files to identify and eliminate computer viruses and other malicious software (malware).......................     * Examining files to look for known viruses by means of a virus   dictionary    * Identifying suspicious behavior from any computer program    which might indicate infection Most commercial anti-virus software uses both of these approaches, with an emphasis on the virus dictionary approach. Virus...