Empty the cache, End the connection, Connection security – Nokia MOBILE PHONE N86 User Manual

Page 55: Browser

Advertising
background image

Select

Options

>

Go to

>

Bookmarks

. You can select web

addresses from a list or from a collection of bookmarks in

the Recently visited pages folder.
If you start to enter a web address, the field opens

automatically.

indicates the homepage defined for the default access

point.

To go to a new web page, select

Options

>

Go to

>

New

web page

.

To send and add bookmarks, or to set a bookmark as the

homepage, select

Options

>

Bookmark options

.

To edit, move, or delete bookmarks, select

Options

>

Bookmark manager

.

Empty the cache

The information or services you have accessed are stored

in the cache memory of the device.
A cache is a memory location that is used to store data

temporarily. If you have tried to access or have accessed

confidential information requiring passwords, empty the

cache after each use.

To empty the cache, select

Options

>

Clear privacy

data

>

Cache

.

End the connection

To end the connection and close the browser, select

Options

>

Exit

.

To delete the information the network server collects

about your visits to various web pages, select

Options

>

Clear privacy data

>

Cookies

.

Connection security

If the security indicator ( ) is displayed during a

connection, the data transmission between the device and

the internet gateway or server is encrypted.
The security icon does not indicate that the data

transmission between the gateway and the content server

(where the data is stored) is secure. The service provider

secures the data transmission between the gateway and

the content server.
Security certificates may be required for some services,

such as banking services. You are notified if the identity of

the server is not authentic or if you do not have the correct

security certificate in your device. For more information,

contact your service provider.
Important: Even if the use of certificates makes the risks

involved in remote connections and software installation

considerably smaller, they must be used correctly in order

to benefit from increased security. The existence of a

certificate does not offer any protection by itself; the

certificate manager must contain correct, authentic, or

trusted certificates for increased security to be available.

Certificates have a restricted lifetime. If "Expired

55

Browser

Advertising