C o n t r o l   p a n e l
Changing the restriction password
To change the password used for restricting voice, fax, and data calls, select 
Security
 > 
Device security
, and select the 
Call
restriction
 page. Select the 
Restriction password
 field, and press 
Change
. Enter the current code, and then the new code twice.
The restriction password must be four digits long.
Certificate manager
Important:  Note that even if the use of certificates makes the risks involved in remote connections and software
installation considerably smaller, they must be used correctly in order to benefit from increased security. The existence
of a certificate does not offer any protection by itself; the certificate manager must contain correct, authentic, or trusted
certificates for increased security to be available. Certificates have a restricted lifetime. If Expired certificate or Certificate
not valid yet is shown even if the certificate should be valid, check that the current date and time in your device are
correct.
Before changing any certificate settings, you must make sure that you really trust the owner of the certificate and that
the certificate really belongs to the listed owner.
Digital certificates may be used for:
  connecting to an online banking service or another site or remote server to transfer confidential information
  reducing the risk of viruses or other malicious software, and checking the authenticity of software when downloading and
installing it
Managing certificates
Personal certificates are certificates that are issued to you. They are listed on the 
User
 page.
Authority certificates are on the 
Other
 page. They are used by some services, such as banking, for checking the validity of other
certificates.
To add certificates, select 
Security
 > 
Certificate manager
. Press 
Add
 to add a new certificate. You can then browse for the
certificate file. Press 
Delete
 to remove a selected certificate.
To check the authenticity of a certificate, select 
Security
 > 
Certificate manager
. Select a certificate, and press 
View details
. The
Issued to:
 field identifies the owner of this certificate. Make sure that this is the name of the party to whom the certificate
belongs. The 
Fingerprint:
 field uniquely identifies the certificate. Contact the help desk or customer service of the owner of the
certificate and ask for the MD5 fingerprint of the certificate. Compare the fingerprint with the one shown in the dialog to check
whether they match.
Tip: Check the authenticity of a certificate each time you add a new certificate.
To change the trust settings of a certificate, select 
Security
 > 
Certificate manager
. Select the certificate, press 
View details
, and
press 
Trust settings
. Depending on the certificate, a list of the applications that can use the selected certificate is shown. Select
an application field, and change the value to 
Yes
 or 
No
. Note that you cannot change the trust settings of a personal certificate.
To change the private key store password, select 
Security
 > 
Certificate manager
, select the 
Password
 page, and press 
Change
password
. Enter the current password, press 
OK
, and enter the new password twice. You need the private key store password
when using personal certificates. The private key store contains the secret keys that come with personal certificates.
Extras
Go to 
Desk
 > 
Tools
 > 
Control panel
 > 
Extras
.
About product
To view the version number of the software, select 
Extras
 > 
About product
, and scroll to the bottom of the dialog.
Location privacy
Some networks allow others to request the position of your device (network service). Note that a separate positioning module
is needed for this service.
To set the device to accept or reject all position requests, select 
Extras
 > 
Location privacy
, and select the 
Verification policy
 field.
Select 
Accept all
 or 
Decline all
.
Location request log
To view the location request log, select 
Extras
 > 
Location request log
. The log shows a list of received location requests,
displaying the name or phone number of the requester, time and date, and whether the request was accepted.
Copyright   2005 Nokia. All Rights Reserved.
71





Actions web hosting footer




 

 

 

 

Home | About Us | Network | Compare Plans | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

Terms Of Service

jsp web hosting

 

Our web partners: Web Hosting PHP Jsp Web Hosting Java Web Hosting Jsp Web Hosting Cheapest Web Hosting  Java Web Hosting

Cheap Web Hosting Java Hosting Cheapest Hosting Quality Web Templates Best Web Templates Web Design Templates

Java Web Hosting Cheap Hosting Cheap Web Hosting Jsp Web Hosting Tomcat Web Hosting

Quality Web Hosting Best Web Hosting Java Web Hosting

Actionswebhosting.com Business web hosting division of Vision Web Hosting Inc. All rights reserved.