Samsung Galaxy S II 4G Manual Do Utilizador
Settings
164
Encrypt SD Card
Prevent another user from using your SD card to make unauthorized calls or from accessing
information stored on your SD card by protecting the information using a password. When
enabled, your phone will ask for a password each time you use the phone. Using this option you
can also change your SD card PIN number.
information stored on your SD card by protecting the information using a password. When
enabled, your phone will ask for a password each time you use the phone. Using this option you
can also change your SD card PIN number.
Important:
Password screen lock protection represents the highest level of security;
therefore, you must setup a screen lock password in order to use SD card
encryption. For more information, see
therefore, you must setup a screen lock password in order to use SD card
encryption. For more information, see
1. Press
>
and tap Settings > Security > Encrypt external SD card.
2. Follow the instructions to encrypt the SD card.
Make Passwords Visible
When enabled, this feature allows you to view the text being entered into a password field as
you type it. Many times, other applications insert an asterisk (*) as you type. This can cause
issues and confusion. What if you mistyped the password or used the wrong case? When
enabled, you can see your entry. This feature is enabled by default.
you type it. Many times, other applications insert an asterisk (*) as you type. This can cause
issues and confusion. What if you mistyped the password or used the wrong case? When
enabled, you can see your entry. This feature is enabled by default.
1. Press
>
and tap Settings > Security.
2. Tap the Make passwords visible enable or disable the option.
Device Administrators
Activating this feature allows Google to administrate your phone in a way similar to IT security
settings on a corporate PC. This would be beneficial in the case that your phone was lost or
stolen. The phone could be “deactivated” or “restricted” (through administration) from a remote
location.
settings on a corporate PC. This would be beneficial in the case that your phone was lost or
stolen. The phone could be “deactivated” or “restricted” (through administration) from a remote
location.
The Device Administration feature allows you to select one or more administration applications
that control your phone for security purposes (for example, if your phone is lost or stolen).
that control your phone for security purposes (for example, if your phone is lost or stolen).
These applications enforce remote or local phone security policies. Some of the features a
phone administration application might control are:
phone administration application might control are:
●
Setting the number of failed password attempts before the phone is restored to factory
settings.
settings.
●
Automatically locking the phone.
●
Restoring factory settings on the phone.
Note: If a phone uses multiple enabled administration applications, the strictest policy is
enforced.