Extend battery life
.........................................................................................................................................................................................................................................
213
View the amount of available memory on your device
............................................................................................................................................................................
214
Best practice: Optimizing your device performance
...............................................................................................................................................................................
214
SIM card
...............................................................................................................................................................................................................................................
215
About the SIM card phone book
.................................................................................................................................................................................................................
148
Add a contact to your SIM card
.................................................................................................................................................................................................................
148
Copy contacts from your SIM card to your address book
.......................................................................................................................................................................
148
Copy a contact from your address book to your SIM card
......................................................................................................................................................................
148
Change a SIM card contact
.........................................................................................................................................................................................................................
149
Delete a SIM card contact
...........................................................................................................................................................................................................................
149
Store SMS text messages on your SIM card
...............................................................................................................................................................................................
69
About SIM card security
...............................................................................................................................................................................................................................
216
Protect your SIM card with a PIN code
......................................................................................................................................................................................................
217
Change the SIM card PIN code
...................................................................................................................................................................................................................
217
Change the display name for a phone number
.........................................................................................................................................................................................
217
Security
................................................................................................................................................................................................................................................
219
Security basics
...............................................................................................................................................................................................................................................
219
Password keeper
...........................................................................................................................................................................................................................................
220
Encryption
......................................................................................................................................................................................................................................................
222
Memory cleaning
..........................................................................................................................................................................................................................................
224
Certificates
....................................................................................................................................................................................................................................................
225
Certificate servers
.........................................................................................................................................................................................................................................
231
Key stores
.......................................................................................................................................................................................................................................................
233
Smart cards
....................................................................................................................................................................................................................................................
235
Software tokens
............................................................................................................................................................................................................................................
238
About PGP keys
............................................................................................................................................................................................................................................
238
About security self-tests
.............................................................................................................................................................................................................................
239
Verify security software
..............................................................................................................................................................................................................................
239
Security troubleshooting
.............................................................................................................................................................................................................................
239
Third-party application control
......................................................................................................................................................................................................
241
About permissions for third-party applications
........................................................................................................................................................................................
241
Reset connection permissions for third-party applications
..................................................................................................................................................................
241
About direct Internet connections for third-party applications
............................................................................................................................................................
241
Set up a direct Internet connection for a third-party application
.........................................................................................................................................................
241
Set permissions for a third-party application
...........................................................................................................................................................................................
241
Connection permissions for third-party applications
.............................................................................................................................................................................
242
Interaction permissions for third-party applications
..............................................................................................................................................................................
242
Data permissions for third-party applications
.........................................................................................................................................................................................
243