Справочник Пользователя для Microsoft Corporation RM-481

Скачать
Страница из 115
To open a locked memory card, select 
Options
 > 
Unlock
memory card
. Enter the password.
If you cannot recall the password to unlock a locked
memory card, you may reformat the card, in which case
the card is unlocked and password removed. Formatting
a memory card deletes all data stored on the card.
Encryption
Select 
Menu
 > 
Ctrl. panel
 > 
Phone
 > 
Encryption
.
Encrypt your device or memory card to prevent outsiders
from accessing your important information.
Encrypt device memory or
memory card
To encrypt the device memory, select 
Phone memory
.
To encrypt the memory card, select 
Memory card
 and
from the following:
Encrypt without saving key
 — Encrypt the memory
card without saving the encryption key. If you select
this option, you cannot use the memory card in other
devices, and if you restore factory settings, you cannot
decrypt the memory card.
Encrypt and save key
 — Encrypt the memory card and
save the key manually in the default folder. For security,
store the key to a safe place outside the device. For
example, you can send the key to your computer. Enter
a pass phrase for the key and a name for the key file.
The pass phrase should be long and complex.
Encrypt with restored key
 — Encrypt the memory
card with a key you have received. Select the key file,
and enter the pass phrase.
Decrypt device memory or
memory card
Always remember to decrypt the device memory and/or
the memory card before updating the device software.
To decrypt the device memory, select 
Phone memory
.
To decrypt the memory card without destroying the
encryption key, select 
Memory card
 > 
Decrypt
.
To decrypt the memory card and destroy the encryption
key, select 
Memory card
 > 
Decrypt and turn off
encryption
.
Certificate manager
Select 
Menu
 > 
Ctrl. panel
 > 
Settings
 and 
General
 >
Security
 > 
Certificate management
.
Digital certificates are used to verify the origins of
software but do not guarantee safety. There are four
different types of certificates: authority certificates,
personal certificates, trusted site certificates, and device
certificates. During a secure connection, a server may send
a server certificate to your device. Upon receipt, it is
checked through an authority certificate stored in your
device. You receive notification if the identity of the server
is not authentic or if you do not have the correct certificate
in your device.
86
Secur
ity and data management
Cyan
Cyan
Magenta
Magenta
Yellow
Yellow
Black
Black
2009-11-09 15:1:46