Microsoft Corporation RM-294 Manual De Usuario

Descargar
Página de 112
To call the contact, press the call key.
To edit the phone number, select 
Options
 > 
Edit
. You
may need your PIN2 code to edit your fixed dialing
numbers.
To delete the contact, press the backspace key.
Memory card security
You can protect a memory card with a password to
prevent unauthorized access. To set a password, select
Options
 > 
Set password
. The password can be up to 8
characters long and is case-sensitive. The password is
stored in your device and you do not need to enter it
again while you use the memory card on the same
device. If you use the memory card on another device,
you are asked for the password. Not all memory cards
support password protection.
To remove the memory card password, select 
Options
 >
Remove password
. When you remove the password,
the data on the memory card is not protected against
unauthorized use.
Certificate manager
Important:  Even if the use of certificates makes
the risks involved in remote connections and software
installation considerably smaller, they must be used
correctly in order to benefit from increased security. The
existence of a certificate does not offer any protection
by itself; the certificate manager must contain correct,
authentic, or trusted certificates for increased security
to be available. Certificates have a restricted lifetime. If
"Expired certificate" or "Certificate not valid yet" is
shown even if the certificate should be valid, check that
the current date and time in your device are correct.
Before changing any certificate settings, you must
make sure that you really trust the owner of the
certificate and that the certificate really belongs to the
listed owner.
Digital certificates are used to verify the origins of
software but do not guarantee safety. There are three
different types of certificates: authority certificates,
personal certificates, and server certificates. During a
secure connection, a server may send a server
certificate to your device. Upon receipt, it is checked
through an authority certificate stored on your device.
You receive notification if the identity of the server is
not authentic or if you do not have the correct
certificate in your device.
Download a certificate from a web site, or receive a
certificate as an e-mail attachment, or as a message
sent through a Bluetooth or infrared connection.
Certificates should be used when you connect to an
online bank or a remote server to transfer confidential
information. They should also be used if you want to
reduce the risk of viruses or other malicious software,
and to check the authenticity of software when you
download and install software to your device.
Tip: When you add a new certificate, check its
authenticity.
92
Security
file:///C:/USERS/MODEServer/lkatajis/13055716/rm-227_slender/en/issue_1/rm-227_slender_en-US_1.xml
Page 92
Dec 20, 2006 9:03:12 AM
file:///C:/USERS/MODEServer/lkatajis/13055716/rm-227_slender/en/issue_1/rm-227_slender_en-US_1.xml
Page 92
Dec 20, 2006 9:03:12 AM