hit counter script

Nokia N80 User Manual page 105

Hide thumbs Also See for N80:
Table of Contents

Advertisement

PIN2 code—This code (4 to 8 digits) is supplied with some
SIM cards, and is required to access some functions in your
device.
Lock code (also known as security code)—This code
(5 digits) can be used to lock the device to avoid
unauthorized use. The factory setting for the lock code is
12345. To avoid unauthorized use of your device, change
the lock code. Keep the new code secret and in a safe place
separate from your device. If you forget the code, contact
your service provider or Nokia Care Center.
Personal unblocking key (PUK) code and PUK2 code—These
codes (8 digits) are required to change a blocked PIN code
or PIN2 code, respectively. If the codes are not supplied
with the SIM card, contact the operator whose SIM card is
in your device.
UPUK code—This code (8 digits) is required to change a
blocked UPIN code. If the code is not supplied with the
USIM card, contact the operator whose USIM card is in
your device.
Certif. management
Digital certificates do not guarantee safety; they are used
to verify the origin of software.
In the certificate management main view, you can see a
list of authority certificates that are stored in your device.
Press
to see a list of personal certificates, if available.
96
Digital certificates should be used if you want to connect
to an online bank or another site or remote server for
actions that involve transferring confidential information.
They should also be used if you want to reduce the risk of
viruses or other malicious software and be sure of the
authenticity of software when downloading and installing
software.
View certificate details—check authenticity
You can only be sure of the correct identity of a server
when the signature and the period of validity of a server
certificate have been checked.
Copyright © 2007 Nokia. All rights reserved.
Important: Even if the use of certificates makes the
risks involved in remote connections and software
installation considerably smaller, they must be
used correctly in order to benefit from increased
security. The existence of a certificate does not
offer any protection by itself; the certificate
manager must contain correct, authentic, or
trusted certificates for increased security to be
available. Certificates have a restricted lifetime.
If
Expired certificate
or
Certificate not valid yet
is shown even if the certificate should be valid,
check that the current date and time in your device
are correct.

Advertisement

Table of Contents
loading

Table of Contents