Microsoft Corporation RM-482 Manual De Usuario

Descargar
Página de 116
DRAFT
unlocked and password removed. Formatting a memory card
deletes all data stored on the card.
Encryption
Select 
Menu
 > 
Ctrl. panel
 > 
Phone
 > 
Encryption
.
Encrypt your device or memory card to prevent outsiders
from accessing your important information.
Encrypt device memory or
memory card
To encrypt the device memory, select 
Phone memory
.
To encrypt the memory card, select 
Memory card
 and from
the following:
Encrypt without saving key
 — Encrypt the memory card
without saving the encryption key. If you select this
option, you cannot use the memory card in other devices,
and if you restore factory settings, you cannot decrypt the
memory card.
Encrypt and save key
 — Encrypt the memory card and
save the key manually in the default folder. For security,
store the key to a safe place outside the device. For
example, you can send the key to your computer. Enter a
pass phrase for the key and a name for the key file. The
pass phrase should be long and complex.
Encrypt with restored key
 — Encrypt the memory card
with a key you have received. Select the key file, and enter
the pass phrase.
Decrypt device memory or
memory card
Always remember to decrypt the device memory and/or the
memory card before updating the device software.
To decrypt the device memory, select 
Phone memory
.
To decrypt the memory card without destroying the
encryption key, select 
Memory card
 > 
Decrypt
.
To decrypt the memory card and destroy the encryption key,
select 
Memory card
 > 
Decrypt and turn off encryption
.
Certificate manager
Select 
Menu
 > 
Ctrl. panel
 > 
Settings
 and 
General
 >
Security
 > 
Certificate management
.
Digital certificates are used to verify the origins of software
but do not guarantee safety. There are four different types of
certificates: authority certificates, personal certificates,
trusted site certificates, and device certificates. During a
secure connection, a server may send a server certificate to
your device. Upon receipt, it is checked through an authority
certificate stored in your device. You receive notification if
the identity of the server is not authentic or if you do not have
the correct certificate in your device.
You can download a certificate from a web site, or receive a
certificate as a message. Certificates should be used when
you connect to an online bank or a remote server to transfer
confidential information. They should also be used if you
want to reduce the risk of viruses or other malicious software,
and to check the authenticity of software when you
download and install software to your device.
Cyan
Cyan
Magenta
Magenta
Yellow
Yellow
Black
Black