Security settings, Phone and sim, Certificate management – Nokia MOBILE PHONE N86 User Manual

Page 133: Se ttings

Advertising
background image

Turning control — Select

Silencing calls

and

Snoozing

alarms

to mute calls and snooze alarms by turning your

device so that the display faces down.

Security settings

Phone and SIM

Select

Menu

>

Tools

>

Settings

and

General

>

Security

>

Phone and SIM card

and from the following:

PIN code request — When active, the code is requested

each time the device is switched on. Deactivating the PIN

code request may not be allowed by some SIM cards.

PIN code, PIN2 code, and Lock code — You can change

the PIN code, PIN2 code, and lock code. These codes can

only include the numbers from 0 to 9.
If you forget the PIN or the PIN2 code, contact your service

provider. If you forget the lock code, contact a Nokia Care

point or your service provider.
Avoid using access codes similar to the emergency

numbers to prevent accidental dialling of the emergency

number.

Keypad autolock period — Select whether the keypad

is locked when your device has been idle for a certain

period of time.

Phone autolock period — To avoid unauthorised use,

you can set a time-out after which the device

automatically locks. A locked device cannot be used until

the correct lock code is entered. To turn off the autolock

period, select

None

.

Tip: To lock the device manually, press the power key. A

list of commands opens. Select

Lock phone

.

Lock if SIM card changed — You can set the device to ask

for the lock code when an unknown SIM card is inserted

into your device. The device maintains a list of SIM cards

that are recognised as the owner’s cards.

Closed user group — You can specify a group of people

to whom you can call and who can call you (network

service).
Confirm SIM services — You can set the device to display

confirmation messages when you are using a SIM card

service (network service).

Certificate management

Select

Menu

>

Tools

>

Settings

and

General

>

Security

>

Certificate management

.

Digital certificates do not guarantee safety; they are used

to verify the origin of software.
In the certificate management main view, you can see a

list of authority certificates that are stored in your device.

Scroll right to see a list of personal certificates, if available.
Digital certificates should be used if you want to connect

to an online bank or another site or remote server for

actions that involve transferring confidential information.

They should also be used if you want to reduce the risk of

viruses or other malicious software and be sure of the

authenticity of software when downloading and installing

software.
Important: Even if the use of certificates makes the risks

involved in remote connections and software installation

considerably smaller, they must be used correctly in order

to benefit from increased security. The existence of a

133

Se

ttings

Advertising