Sniffer Technology For Detecting Lost Mobiles

651 words - 3 pages

A Technical Seminar Report
“Sniffer Technology For Detecting Lost Mobiles”
Submitted to
In partial fulfilment of the requirement for the award of Degree of
“Computer Science and Engineering”
N.KIRTHI [11D61A0554]
Under the guidance of
Mr S.Srinivas
Associate Professor C.S.E Dept
Department of Computer Science and Engineering
(Affiliated to JNTU Hyderabad)
Ibrahimpatnam, Hyderabad-501506

(Affiliated to JNTU Hyderabad)
Ibrahimpatnam, Hyderabad-501506

This is to ...view middle of the document...

We extend sincere thanks to Mr.S.Srinivas ,Head of Department, Computer Science and Engineering for his encouragement and constant support throughtout this project.

N.KIRTHI (11D61A0554)


The main scope of this paper is to detect the lost mobiles. Each and every day thousands of mobiles get misplaced or lost. Though effective way for the blocking of the lost mobile to prevent unauthorized person from making and receiving the calls has been done by the manufacturers of the mobile with the help of International Mobile Equipment Identifier (IMEI), there has been no development or very little progress for the detection of the misplaced mobile phone. For the detection of lost mobile SNIFFER plays a vital role .The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection .The device can be called as a mobile Base station that includes Sniffer Base station, Unidirectional antenna, Tracking software. The sniffer is a small base station that includes transceiver section. It should operate at a frequency which is much different from the frequency of the current cell in which the operation of detection is being carried out. The directional antenna is an important device that is to be designed and used as it acts as eyes for sniffer. The tracking software acts as database of lost mobiles.

There are certain boundary conditions that have to be qualified for the identification of lost mobile like the power of the mobile should be good...

Other assignments on Sniffer Technology For Detecting Lost Mobiles

Network Security And Ethical Hacking Essay

5261 words - 22 pages , security processes, and physical locations such as buildings and perimeters. The National Institute of Standards and Technology (NIST) have published Guidelines on Network Security Testing, the guidelines cover; Security Testing and the System Development Life Cycle, Security Testing Techniques, Deployment Strategies for Security Testing and Common Testing Tools. CHECK is the CESG IT Health Check System and was set up to ensure government

Roles Involved In Network Security Essay

430 words - 2 pages , anniversary, etc.). I could pose as an outside contractor that just happen to have lost its private key accidentally and need to access the system through one of the company computers connected to the network. 2. Using social engineering by offering to send the postcard by email (attachment) containing the invitations to the manager’s birthday party and the need to confirm their attendance by replaying back through their email addresses

Marketing Plan

4888 words - 20 pages consecutively making losses and gain in unpopularity. Sony Ericsson has missed a critical market where its innovative technology would fit perfectly in. This report will argue that by incorporating the tween market as its main target market for the Xperia play. Sony Ericsson will be able to stop the growth in unpopularity, as well as regain and continue to grow in market share. Introduction The purpose of this report is to present a

Nokia-Mission And Vision, Strategies Pursuit, Recommended Technologies, Business Level Strategies And Coporation

3964 words - 16 pages technology companies. The importance of technology and innovation could be seen clearly through the typical example of Apple Inc. it was technology and innovation that has established the name of Apple Inc. in the 1980s; and it was also the technology and innovation that has, once again, raised Apple Inc. to become the real threat for Nokia Inc. iPhone is the product that has been desired by many customers and with it, people have felt the new

Report On Tesco

3649 words - 15 pages machines These technology services have given the company the opportunity to branch out to their consumers shopping needs in a faster, more efficient climate. Recently in August 2010, Tesco launched the first "drive -thru" supermarket in United Kingdom. Allowing their "time-conscious" consumers who cannot wait for their delivery of goods, allows them the convenience of online grocery shopping with the option of the store's drive-thru pick up


516 words - 3 pages responsibilities to helping to ensure the preparedness of emergency response providers for terrorist attacks, major disasters, and other emergencies, Working with other federal and nonfederal agencies to build a comprehensive national incident management system, and developing comprehensive programs for developing interoperative communications technology and ensuring that emergency response providers acquire such technology. ( CIDRAP) In a


4544 words - 19 pages ) Biometrics B) Encryption C) Firewalls D) Content filtering 24. Which of the following is a program or device that can monitor data traveling over a network? A) Malicious code B) Sniffer C) Hoaxes D) Virus 25. What floods a website with so many requests for service that it slows down or crashes the site? A) Denial-of-service attack B) Spoofing C) Sniffer D) None of the above 26. Which is a virus that opens a way

Data Security

8305 words - 34 pages unreliable wireless communication media. Clearly, the protection of information integrity from both accidental or malicious alteration is a must for the proper functioning of information technology. Availability Availability refers to ensuring that authorized users can access and work with information assets, resources, and systems when needed and with the required response and performance. This means that the computer system must


1270 words - 6 pages be found with mobiles. Land lines are most commonly used by big businesses but it’s also used by small businesses, there reason for businesses using telephones it’s to communicate with their customers much of the time. Why do businesses use verbal and written information: Good written and verbal communication is important in delivering information quickly and clearly. This helps preventing misunderstandings and also confusion, and time

Code Of Ethics

1337 words - 6 pages responding to new and emerging health threats; tackling the biggest health problems causing death and disability for Americans; putting advanced technology into action to prevent disease; promoting healthy and safe behaviors for communities and the environment; Making sure there are qualified leaders and training the public health workforce to fight and prevent disease outbreaks; and making sure they stay in tuned with current health issues of the

E-Business - Voice Over Ip

5944 words - 24 pages has to do with digital telephony systems that use IP protocols for voice communication while VoIP is actually a subset of IP Telephony. VoIP is a technology used by IP telephony as a means of transporting phone calls. VoIP systems employ session control protocols to control the set-up and tear-down of calls as well as audio codecs which encode speech allowing transmission over an IP network as digital audio via an audio stream. The choice

Similar Documents

Mr Kochulem Essay

835 words - 4 pages these distinct customers have been defined, a marketing mix strategy of product, distribution, promotion and price can be built by the business to satisfy the target market. Samsung targets those people who want to buy new technology based Android sets with which they can use it for any type of networking as well as communication. As target marketing is a key to success of a business, Samsung has targeted the oversized Samsung Galaxy Note

Management Of Information Systems Essay

1747 words - 7 pages files in general throughout organization’s information technology infrastructure. • Apply to all computerized applications • Combination of hardware, software, and manual procedures to create overall control environment • Security policy • Ranks information risks, identifies acceptable security goals, and identifies mechanisms for achieving these goals • Drives other policies

Advertisement Essay

508 words - 3 pages technology trademark. In big bold letters stating “Creating New Standards for HF Mobiles”(QST Magazine 2013). That further peaks the curiosity of the reader to look more into the advertisement. The fading images near the top give a brief pictorial view of some features that then fade to the background pointing out more capabilities for the reader to investigate. At the top of the page the readers eye are then drawn to the fact that it is a new

Hp And Compaq Case Essay

1700 words - 7 pages still working on with printer and has not made new product for a decade. Not to sunk it needs innovation for new generation of customers. Technological:  HP technology is outdated it needs innovations. It is outdated in his industry and has not made progress of innovation with similar industry like mobiles. So it needs to enter similar business and innovate in current. Environmental:  Environmental issues have become a more increasing