Remote access to a USB key via the Internet or LAN. What is Dongle? Implementation of protection using automatic means

(software) and data from copying, illegal use and unauthorized distribution.

Modern electronic keys

Operating principle of electronic keys. The key is attached to a specific computer interface. Next, the protected program sends it information through a special driver, which is processed in accordance with a given algorithm and returned back. If the key's answer is correct, then the program continues its work. Otherwise, it may perform actions specified by the developers, for example, switching to demo mode, blocking access to certain functions.

There are special keys that can license (limit the number of program copies running on the network) of a protected application over the network. In this case, one key is enough for the entire local network. The key is installed on any workstation or server on the network. Protected applications access the key over the local network. The advantage is that they do not need to carry an electronic key with them to work with the application within the local network.

Story

Protecting software from unlicensed use increases the developer's profit. Today, there are several approaches to solving this problem. The vast majority of software creators use various software modules that control user access using activation keys, serial numbers etc. Such protection is a cheap solution and cannot claim to be reliable. The Internet is replete with programs that allow you to illegally generate an activation key (key generators) or block a request for a serial number/activation key (patches, cracks). In addition, one should not neglect the fact that the legal user himself can make his serial number public.

These obvious shortcomings led to the creation of hardware-based software protection in the form of an electronic key. It is known that the first electronic keys (that is, hardware devices to protect software from illegal copying) appeared in the early 1980s, but, for obvious reasons, primacy in the idea and direct creation of the device is very difficult to establish.

Software protection using an electronic key

Software Development Kit

Dongles are classified as hardware methods of software protection, but modern electronic dongles are often defined as multi-platform hardware and software tool systems for software protection. The fact is that in addition to the key itself, companies that produce electronic keys provide an SDK (Software Developer Kit). The SDK includes everything you need to start using the presented technology in your own software products- development tools, complete technical documentation, support for various operating systems, detailed examples, code snippets, tools for automatic protection. The SDK may also include demo keys for building test projects.

Protection technology

Automated protection

For most families of hardware keys, automatic tools (included in the SDK) have been developed that allow you to protect the program “in a few mouse clicks.” In this case, the application file is “wrapped” in the developer’s own code. The functionality implemented by this code varies depending on the manufacturer, but most often the code checks for the presence of a key, controls the licensing policy (set by the software supplier), implements a mechanism to protect the executable file from debugging and decompilation (for example, compressing the executable file), etc.

The important thing is that using the automatic protection tool does not require access to the application's source code. For example, when localizing foreign products (when there is no possibility of interfering with the software source code), such a protection mechanism is indispensable, but it doesn't allow use the full potential of electronic keys and implement flexible and individual protection.

Implementing protection using API functions

In addition to using automatic protection, the software developer is given the opportunity to independently develop protection by integrating the protection system into the application at the source code level. For this purpose, the SDK includes libraries for various programming languages ​​containing a description of the API functionality for a given key. An API is a set of functions designed to exchange data between an application, a system driver (and a server in the case of network keys) and the key itself. API functions provide various operations with the key: searching, reading and writing memory, encrypting and decrypting data using hardware algorithms, licensing network software, etc.

Skillful application this method provides a high level of application security. It is quite difficult to neutralize the protection built into the application due to its uniqueness and “fuzzy” nature in the body of the program. The very need to study and modify the executable code of a protected application to bypass the protection is a serious obstacle to hacking it. Therefore, the task of the security developer, first of all, is to protect against possible automated hacking methods by implementing its own protection using the key management API.

Bypass protection

There is no information about full emulation of modern Guardant keys. Existing table emulators are implemented only for specific applications. The possibility of their creation was due to the non-use (or illiterate use) of the basic functionality of electronic keys by security developers.

There is also no information about full or at least partial emulation of LOCK keys, or about any other ways to bypass this protection.

Hacking a software module

The attacker examines the logic of the program itself in order to, after analyzing the entire application code, select a protection block and deactivate it. Hacking of programs is accomplished through debugging (or step-by-step execution), decompilation, and RAM dump. These methods of analyzing executable program code are most often used by attackers in combination.

Debugging is done using special program- a debugger that allows you to execute any application step by step, emulating the operating environment for it. An important feature of the debugger is the ability to set stopping points (or conditions) code execution. Using them, it is easier for an attacker to track places in the code in which access to the key is implemented (for example, stopping execution on a message like “The key is missing! Check for the presence of the key in the USB interface”).

Disassembly- a method of converting the code of executable modules into a programming language understandable to humans - Assembler. In this case, the attacker gets a printout (listing) of what the application does.

Decompilation- converting the application's executable module into program code in the language high level and getting a representation of the application close to source code. Can be carried out only for some programming languages ​​(in particular, for .NET applications created in C# and distributed in bytecode - a relatively high-level interpreted language).

The essence of the attack using memory dump is to read the contents random access memory at the moment when the application began to execute normally. As a result, the attacker receives the working code (or the part of interest) in its “pure form” (if, for example, the application code was encrypted and is only partially decrypted during the execution of one or another section). The main thing for an attacker is to choose the right moment.

Note that there are many ways to counteract debugging, and security developers use them: non-linearity of the code (multi-threading), non-deterministic sequence of execution, “littering” the code (with useless functions that perform complex operations in order to confuse the attacker), using the imperfections of the debuggers themselves and etc.

In this article we will look at the problem of obtaining remote access to a USB dongle, in particular, to a 1C electronic key using , and we will also consider the technology of electronic keys.

What is a USB key?

An electronic key, or dongle, is a reliable means of protecting software. Its use prevents illegal copying, use and distribution. Software manufacturers thus protect their copyrights and guarantee the authenticity of the product to customers.

The technology is based on a special microcontroller with its own unique operating algorithm. Electronic keys are equipped with a small volume of non-volatile memory; some may even have a built-in cryptoprocessor.

The main mystery of the operation of USB keys lies in the principle of their operation. First of all, for it to work you need an interface specific program. Only interaction with the required version allows you to use a dongle. Accordingly, the program itself is launched for full operation only after receiving the correct response from the electronic key.


Types of electronic keys and their distribution

The most complex and expensive types of USB keys are equipped with a built-in licensing function, which allows them to be used on all computers on the local network. There is no need to buy a separate dongle for each machine. But this option is suitable only for those who plan to use the key within one room.

But there are software keys that strictly prohibit sharing. They must be used on one computer and not transfer access. Otherwise, the response algorithm with the application does not work.

It is also a common scenario when local computer do not support operating system, with which the application will have to work. In this case, a virtual OS (VMware, Hyper-V, VirtualBox, etc.) is installed on the computer and the application is launched in it. But the essence of the problem is not so much this, but the fact that not a single virtual environment gives access rights to the physical serial or USB ports of your computer. What to do in this case?

For example, you work on Mac OS and you need to generate reports in the program 1c accounting, which only supports Windows and needs electronic key for start. You install any virtual Windows OS and launch the 1C program, having previously installed the dongle in the USB connector of your Mac. As a result, the software does not start and the key is not recognized. How to provide remote access to 1C key?

It’s hard to imagine a smartphone and tablet servicing workshop, like any other workshop, without soldering or measuring equipment. But the main place here is always occupied by tools for software repair: unlocking, recovery and firmware. They are the ones who help the technician unlock, flash or revive a non-working device.

Let's get to know them better.

BOXING

What is boxing?

How to choose?

Dongles can also be divided into more universal ones, supporting the maximum number of models from popular manufacturers and the most popular operations, and dongles designed for certain devices and operations.

Universal solutions:

Specialized solutions:

Reset FRP

Samsung and LG

SMART CARD

What is a smart card?

The smart card is used to authenticate your purchase and identify your device to the developer's server. In fact, it looks like a regular mobile phone SIM card. The smart card is designed to store data about the firmware version, the firmware itself and other special information.


Smart card chip structure

Important! A smart card has a limited number of information recording cycles. Usually the software warns the user that an update is required. That's why do not update the smart card unless necessary. It may simply become blocked, and as a result you will no longer be able to use this smart card or even the box (it all depends on the developer of the box). If you are unable to update your smart card when required, your best bet is to contact technical support.

What to choose: boxing or dongle?

Boxing is suitable if:

  • connection via COM port is required;
  • Phone recovery is only possible using JTAG or eMMC interface.

Dongle is suitable if:

  • you are going to work with the phone in working condition;
  • you need to unlock, flash, repair IMEI, remove FRP;
  • The PC recognizes the phone;
  • you are not going to work with the hardware of the device.

In the continuation of this article you will learn about possible errors and problems that arise when working with dongles and boxes, and how to detect and eliminate their cause.

Of course, in Russia no one uses the word “dongle”; we use the more familiar “adapter”. But this absurd situation, when the word exists but is not used, must stop. Moreover, we live in a world where dongles have become a pervasive aspect of our existence.

New iPhone users who can't give up the headphone jack are regular dongle users. Many people use streaming devices that transmit images to the TV - Microsoft Wireless Display Adapter or its analogues. Even Google is now making dongles so you can connect your headphones to the Pixel 2.

Yes, Google, which just recently announced a huge commitment to developing devices that use sophisticated AI technologies, is also in the dongle business. Plus they made Chromecast.

Since we have unknowingly found ourselves in a society filled with dongles, this is a good time to think about the origin of such a stupid word. In simple terms, a dongle adds functionality to another device.

However, the word “dongle” is not new. It first appears in print in New Scientist, back in 1981:

“A dongle is an additional piece of memory that is connected to the computer, and without which the program refuses to work.” Such a device was connected to the Commodore Pet computer. Later the word gained popularity and at some point may well have seemed new - a fairly common occurrence.

“What you find new is likely not new,” Stanford University linguist and lexicographer Sarah Ogilvy tells Mashable. “Many new words have much older origins than you might think.”

But what happened about 40 years ago for such a curious word to arise?

"As for its actual origin, I think it's just a playful variation on the word 'dangle,'" says lexicographer Ben Zimmer. This explanation seems plausible, since dongles do get loose a lot. It is also possible that the word "dongle" comes from "dong" (bell tongue), which also naturally dangles.

You know the problem when in a store you say that you need “printer ink”, and they tell you that “there is no ink, only ink”? To avoid similar cases There is a wonderful word dongle, which we should spread as much as possible for our own convenience. When we want a device that expands the functionality of something, a seller or friend will always understand us perfectly.

Each technology (not necessarily computer technology) goes through three stages during its existence: the stage of development and implementation, the stage of mass practical use, and the stage of displacement from the market by competing developments. Sometimes technology is “lucky”: the first stage passes very quickly, but the second lasts for many, many years, and the third occurs so reluctantly and smoothly that it is sometimes difficult to even notice it. The most people feel especially good in this regard simple developments, moreover, supported by one powerful company that has a great influence on the market (however, in the computer market now the second is much more important than the first, especially taking into account the fact that the “ecological niche” for primitive things is very limited). But it is difficult for complex and seemingly interesting and useful technologies that are promoted together. A technology becomes especially bad if, without having time to take a serious place in the market, it receives a competitor of the first category. A striking example of such a case is Bluetooth. Back in 1998, as many as five large companies began creating new technology wireless communication. And the names seem to be big Intel, IBM, Toshiba, Ericsson and Nokia, and the need for new solutions is ripe... At the same time, a whole consortium was created, and even developed something. Literally three years later, the development stage was over; it was time to implement and use it. Great amount companies announced their wireless devices supporting new technology. However, competitors were already looming on the horizon at that time (and the strongest of them was the IEEE 802.11 standard), but they were all much more complex, and, therefore, not necessary for many applications and significantly more expensive or, conversely, weaker technically. So it seemed like Bluetooth had a great future ahead of it. You don’t have to talk about the mood of those years; just read two articles (this one or this one) published on our website on one fine April day in 2001 (in them, by the way, the technology itself is well described, so I’ll also focus on this issue I won't). In general, all the people are having fun and rejoicing :)

The reality turned out to be much more unpleasant. Seven nannies, as expected, had a child who, if not without an eye, was definitely hard of hearing; the devices produced by different companies suffered from severe inability to communicate with each other. Some developments were never brought to fruition; as a result, many interesting devices, which were even shown in prototypes at CeBIT 2001, did not appear on the wider market. Microsoft also added problems to the promotion of the new standard; in Windows XP, official support for Bluetooth did not appear, device drivers are still not certified, and since one of the goals of developing the technology was communication mobile devices With personal computers(and not just with each other), producers had to think even harder. Under appropriate conditions, manufacturers of chipsets for motherboards: Bluetooth remains an optional extra for PCs. Another year went by without much trouble. The start began to drag on; instead of making full use of the new technology, we continued to watch the attempts of manufacturers to finally finish everything. However, starting from 2002, it was already possible to use Bluetooth... but is it necessary? The choice of devices was quite narrow, the prices were high, so fixing compatibility problems was only part of the story (you can get some impression of how the situation was in general from this article).

Meanwhile, 802.11 matured and became cheaper. Moreover, the corresponding adapters have become standard equipment on some computers (from Apple in particular). And other companies began to think that there are no unnecessary opportunities if you don’t have to pay too much for them. She dealt the strongest blow to the back of her brainchild Intel company this year: one of the three main components of the new Centrino platform is wireless radio communication... according to the 802.11 standard. And the company can be understood: this protocol is better suited for building networks of computers into which a laptop PC needs to be integrated than Bluetooth, and it copes with other responsibilities no worse. Which wireless communication protocol the company implements in chipsets for desktop computers is now a rhetorical question. The rest of the manufacturers are unlikely to lag behind Intel; they are already racing to see who can implement more features. It’s also easy to predict which option users will choose: buy, for example, a cell phone with Bluetooth support and decide on how to ensure it works with the computer, or pay even a little more for a handset with Wi-Fi, but not solve any problems (except perhaps with energy consumption, but they will do something about that) and not buy anything extra for the computer (especially if they have already admired the dances with tambourines performed by Bluetooth enthusiasts). And so it began... Announcements of portable Wi-Fi adapters for already released models of portable equipment and the equipment itself with built-in protocol support. Well, why not? At least Microsoft is not against it, and one of the chipset manufacturers has placed its bets on the technology, so there will be someone to “connect” with. So Bluetooth suddenly migrated from the first stage to the third.

But what about the use? Has no one really managed to join the new wireless communication technology except enthusiasts? Well, not exactly. After all, not every computer has a Wi-Fi adapter yet, and you can’t buy a phone with it at all. At the same time, there are already a lot of models with Bluetooth support on the market, and at very attractive prices (a phone, for example, can be bought for less than $100). Thus, if today you need a more convenient way to connect various devices than an infrared port or, especially, various cables, then it makes sense to turn your attention to Bluetooth. What needs to be done for this? At a minimum, purchase the appropriate adapter for your computer. The most optimal, in my opinion, is an adapter with USB interface 1.1 (the so-called USB Dongle): since the Bluetooth speed does not exceed 1 Mbit/s, the interface will not become a bottleneck in data exchange, but such an adapter can be used with both desktop and mobile computer, and with any (USB ports have long been present in any computer) and for this you don’t even have to climb inside the case. Similar adapters have been produced for a long time and by many companies. However, the diversity is only apparent: the basis of any such device is only one microcircuit, and they are produced by only two manufacturers. Today we will look at adapters based on Cambridge Silicon Radio (CSR) chips produced by a Taiwanese company.

Bluetooth USB Dongle Class 1

According to Bluetooth standard, devices are divided into two classes, depending on sensitivity and, accordingly, operating radius. First-class devices have a sensitivity of -88 dBm and in open areas allow communication at a distance of up to 100 m. I note that similar products are not in the lines of quite a lot of companies and no wonder: not all users need such distances. On the other hand, I came up with an area for using first-class long-range dongles :)

Despite the high operating range, the device is quite compact and does not have any external antennas(although some manufacturers also attach them to Class 2 adapters). Dimensions and appearance it closely resembles a regular flash drive, only a little more angular. The body is made of translucent plastic, through which the filling of the device is clearly visible. The transparency of the case allows the stylish blue activity indicator to be very in an interesting way illuminate the room when the external lighting is turned off :) There is no protective cap covering the connector (like flash drives), but, in general, it is not needed.

The delivery package is as simple as three pennies: the dongle itself, a short printed manual (Getting Started) in English and German languages, as well as a CD with software and complete documentation in the same two languages. I wouldn’t mind having a USB extension cable, even if it’s a short one. The fact is that, despite the compactness of the device, with a width of almost two centimeters it is not very convenient to connect to USB ports on a remote strip or expansion card will often interfere with neighbors. It connects to the “standard” port quite easily, but only to the upper of the two. In this case, you can only insert a cable into the lower connector, but not anything larger (the flash drive will not fit in any way), and even then it will go in with some difficulty and at a not quite standard angle. Fortunately, it does not interfere with the mouse and keyboard; it is possible with the printer connector (I couldn’t check it, because I had already started to forget in which year I last used a printer connected via LPT).

All this is packed in a nice and compact cardboard box, which contains a lot of useful information on its walls.

Bluetooth USB Dongle Class 2

If you don't need ultra-high sensitivity, which you have to pay for, the best option is a second class dongle. In addition, it is worth noting that most transceivers in portable devices still belong to this class, so even if you want to work with your PDA at a distance of 100 meters from an Internet access point (PC-based or dedicated), this is for you It won't necessarily succeed. But there is some confusion with the operating range of second-class devices: as far as I remember, the standard says 10 meters, but X-Micro stubbornly indicates 20 (however, it is quite possible that the sensitivity of second-class devices from this manufacturer, amounting to -70 dBm, is somewhat better than required by the standard, so that they can actually work with each other over long distances). However, it is very difficult, if not impossible, to check all this - we are talking about distance in open areas, but where to look for it in the city (and the level of interference, again, is somewhat higher than zero)? :)

The drive itself has become smaller since now the requirements for the antenna with which the main board operates are less stringent, the board can be compressed somewhat, however, this primarily concerns the length and thickness of the device the width has remained almost the same, so problems are possible when connecting the device to port on a bracket or card, but plugging it into a “standard” port is somewhat more convenient (due to its smaller thickness) than the older model. Transparent plastic was abandoned, but the “color music” in the room did not disappear: the LED is visible through a special slot. In general, with its smaller size, the device looks somewhat nicer than its “brother”.

The delivery set has not changed in any way, and the packaging is the same - only one icon on the front side has changed, and the recess for the dongle has changed in size and shape.

Software

The elemental base of both dongles is the same, so it is not surprising that both devices are equipped with the same software released by the chip manufacturer. The installation generally goes smoothly, but some users may be scared by the message that the device drivers are not certified it is quite logical: since Microsoft does not want to support this technology, and it does not provide software certification. In fact, we talked about the main functions of the CSR software almost a year and a half ago, so now we’ll go over it just to refresh our memory (over the past time everything has become somewhat more reliable and more convenient, but new versions of the software are still based on the same principles as before).

So, what changes after installing the software? The “My Bluetooth Places” icon appears on the desktop, serving as a kind of analogue of “Network Neighborhood”. In this folder you can find “attached” to this computer BT devices, view the entire BT network to search for new devices (in this case, a device does not mean a pocket computer or a phone in general, but the services they provide), proceed to setting up BT point parameters, etc. And in the system area of ​​the taskbar, a new icon appears, clicking on which with the left mouse button sends us to the folder described above, and with the right mouse button, as expected, brings up a menu with which you can go to setting up the entire household, quickly “connecting” any device to the computer -device (for example, remote access by mobile phone) or temporarily disable the operation of the adapter. You can also call the adapter properties settings dialog using the control panel applet. Actually, almost all of this was there before, with the exception of some small details.

Let's take a better look at the settings dialog. It is intended for advanced users (which you and I are :)), but if you are unsure of your abilities, it is better to use the appropriate “wizard”.

The first page is more informational than setup. Here you can, for example, see the software version. You can change the type of computer, although this only affects what icon it will appear on the Bluetooth network. If you wish, you can change the name of the computer (by default it is the same as on a regular local network), although there is no need for this either.

But the next page is already more interesting: here we can actually select the computer security level, allowing or denying various devices connect to a computer. You can deny or allow access to all devices, allow access only to devices “paired” with the computer, or simply allow the computer to respond to calls from only devices from the list, ignoring all others.

The next tab allows the computer to search for other Bluetooth devices in range automatically at certain intervals, and also selects which devices will be displayed in the “My Bluetooth Places” folder - all possible ones or only those belonging to certain classes.

The next two tabs are very important. The first of them allows you to configure the services provided by this computer to other Bluetooth devices. The main thing is whether this service will start automatically or at the user’s choice (for a long time I was bothered by the standard XP icon, reporting that network cable not connected to one of the network interfaces until I remembered the possibility of simply turning off this service :)), and whether it is necessary to establish a secure connection to access this service. Also here you can create virtual serial ports (needed for compatibility with old software) or remove them when the need disappears.

The penultimate tab is very similar to the previous one, however, they perform diametrically opposite functions: here you will configure access to remote services (that is, those not belonging to this computer, but provided to it by other devices). Of course, the settings on both devices must be the same. For example, if you want to link two computers to transfer files, then both need to configure File Transfer in the same way on both tabs: if one of them tries to “pair” with the other, and the other is configured to use an unsecured connection, no connection will work. With other devices the situation is somewhat simpler: since it is rarely possible to configure them, you just need to read the documentation what type of connection you need to select and work accordingly on the “Client Applications” tab.

Why were two bookmarks required, although theoretically it would have been possible to get by with one? The fact is that Bluetooth is an asymmetrical protocol, like USB with its master-slave protocol. However, there is an important difference: any device can be both a client and a server at the same time (in general, there is no honest point-to-point mode in Bluetooth, but in principle it can be emulated), and the “server” part of the device is naturally customizable separate from the “client” one.

The last tab is purely informational - it talks about the Bluetooth controllers installed in the computer (and there can be several of them at the same time).

Practice of use

What can you use Bluetooth for? For most users, the main incentive is to buy a mobile phone, or, less commonly, a PDA. Well, let's see what we can do.

According to the information on the packaging, any mobile phone can be used as a fax or a means of remote Internet access (via GPRS or GSM), as well as as an Object Exchange service. I don’t know if the latter is supported by at least one program for a PC other than Microsoft Outlook, but the latter allows you to at least exchange contacts with your phone in the format of business cards (in general, cards can be sent simply using standard software), as well as synchronize events in built-in phone organizer and Outlook. Not all phones support file transfer, and only a few of them provide full data synchronization (you can transfer your phone book one entry at a time using business cards, but you don’t want to do that at all). According to the manufacturer, the devices were tested with Nokia phones 7650 and 3650, as well as Ericsson T68 and T39, and full support for all Bluetooth connection capabilities was found only in the latter. Actually, this is one of the main reasons for the low popularity of Bluetooth low compatibility. Manufacturers are trying to solve this problem, but there is no final solution in sight other than slightly adjusting the standard (which is currently being done), and changing the standard will only help new devices, but not those already released and sold (does Bluetooth have time for this? In my opinion, it has already expired).

My phone (Philips Fisio 820) was not on the list of those tested, especially since it was interesting to check it for lice. A long dance with a tambourine did not give any results - the native software from the phone could not find it when connected via Bluetooth. Thus, I was left with only those capabilities that were provided by the program included with the dongles, i.e. without synchronization and without the ability to change the melody or logo on the screen. I don’t have any complaints about the phone’s operation in GPRS modem or fax mode, but by and large I didn’t need them: to use both on a desktop computer, it’s easier to buy a regular fax modem (I have Internet access generally through the district local network, so GPRS is needed like a hare needs a brake light :)). On the other hand, if you don’t have a landline phone, this may be quite useful. Well, for the user of a portable or pocket computer these opportunities are all the more necessary.

By the way, about computers. Software primarily aimed at connecting two PCs or a PC with a PDA. In this case, everything works and works well. However, this was known a year and a half ago :) There is only one subtlety - everything is fine as long as there are only two computers. The fact is that initially Bluetooth was not aimed at creating a network, then these capabilities had to be quickly introduced and this was not done in the best way (as described in the mentioned article). So if you want to fully connect with Bluetooth assistance several computers, you will have to fork out for a special “access point” (Access Point). If just sharing files is enough, then it will work on any number of computers without additional investment.

What else can be used? Appeared and peripherals with Bluetooth interface. The printer has already been reviewed earlier; we have not yet been able to obtain a digital digital converter with this interface, but along with the dongles we also received a modem made by the same company. You will be able to read the report on its testing in the near future. Here I’ll just say that there were no problems with the connection interface; even additional drivers were not required, since support for remote access is included in the software for the Bluetooth adapter. And so the modem is like a modem.

Total

The prospects for the technology are not very bright, but if wireless interface needed now, then Bluetooth would be a good option. The low operating speed will not interfere with the use of a printer or modem, but synchronizing the PDA with a desktop computer via Bluetooth is generally a pleasure. I think that the most justified purchase of a Class 2 adapter is unlikely to be yours portable devices will be from desktop computer or laptop at a distance of more than 10 meters. A Class 1 dongle would be good if you need to, for example, contact your housemate. Naturally, it is easier to extend the cable to the neighboring apartment, but if there are 20 meters between the apartments, and even diagonally, it is inconvenient to pull the network cable (again, thunderstorms occur in our area). If you also chip in for an Access Point, then you can connect several computers without any wires. Such a connection, of course, is not suitable for transferring video to each other (the operating speed in symmetric mode is only a little more than 400 Kbps, i.e. a little faster than a floppy disk, but playing games or sharing Internet access via an ADSL modem or dedicated channel is quite possible. Unfortunately, the introduction of Bluetooth is still largely hampered by poor compatibility with those devices on which the main hope was placed when it was created cell phones. However, if all you need from the phone is its use as a GPRS modem or fax (which is extremely important for laptop users, but in the case of desktop computers it is not the best solution), Bluetooth will cope with the task 100%. If you are looking for a way to conveniently synchronize notebook and phone organizer (for backup anything can happen), then in this case you may well be disappointed. Here the cable still remains unrivaled - everything always works with its help. However, users of some phone models will be able to take full advantage of Bluetooth.

In general, it is unknown how long the standard will last tomorrow. But today, albeit with some limitations, it works, and for some applications there are simply no comparable competitors (a simple example: a laptop lying in a bag or briefcase can wake up from time to time and use the mobile phone in your pocket to check mail no cable, neither the infrared port will allow you to do this in a convenient way). Well, tomorrow... tomorrow will be a new day :)

If you take a bigger tambourine...

About two weeks have passed since the article was written, and I finally managed to get synchronization with the phone to work. True, for this I had to rearrange everything that was possible several times. The path leading to success turned out to be not so difficult:

  1. We install the software for the dongle and connect it to the computer.
  2. We search for Bluetooth devices. We find the phone (if we don’t find it, then this is a separate problem).
  3. Select the phone in the list of devices. Select its COM port and connect the latter to the computer.
  4. In this position, we launch the software installer from Philips. In the list of modems we see “ Unknown device" We choose him

Subsequently, there are no more difficulties: we launch the software and it connects to the phone automatically. In general, you can eventually make everything (or almost everything) work. Another question is that you don’t really want to waste precious time fighting the developers’ shortcomings.