If you are reading this from the screen of a laptop or a smartphone, you almost certainly have Bluetooth. This technology was once created as a universal wireless communications protocol that allowed fast and easy exchange of data between various types of devices. Bluetooth, however, can be used for other purposes — for instance, controlling your desktop PC remotely or even using your phone as an advanced wireless key to your PC. The overwhelming majority of today’s mobile phones and portable computers have Bluetooth chips onboard, so all you need to use for this purpose is proper software. A good example of such a program is Blue Lock.
The idea behind this tiny and free program is pretty simple and yet brilliant. To save you the trouble of having to lock your PC every time you need to leave your workplace for a few minutes, it uses your Bluetooth-enabled phone as a key. Whenever you leave your desk and the program loses track of your phone, it immediately locks the system. To unlock it upon your return, you must either enter your password or just come back with the same phone in your pocket. Once it’s in range, Blue Lock will unlock your system and let you continue your work. The program takes a minute or so to download and configure for use with your phone and is a good choice for anyone who walks around the office a lot and wants to add some free automation to the process. The program uses the standard desktop locking mechanism of the Windows OS, so it’s essentially the same action you perform using the standard CTRL+ALT+DEL key combination. Your PC can always be unlocked with your password.
Apparently, it’s just one example of how Bluetooth can be used in an unusual way, but it should give you an idea of its potential in areas different from pure data exchange.
Evidence Killer 2005 1.0 Evidence Killer 2005 completely eliminates all hidden evidence of activites on your computer. Protect your privacy with Evidence Killer 2005 and completely eliminate sensitive
BlueAuditor 1.7.2 BlueAuditor is a program for detecting, scanning and monitoring Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against