Nokia N-GAGE User Guide - Page 133

Security settings, Phone and SIM, Certificate management, Confirm SIM services

Page 133 highlights

Turning control - Select Silencing calls and Snoozing alarms to mute calls and snooze alarms by turning your device so that the display faces down. Security settings Phone and SIM Select Menu > Tools > Settings and General > Security > Phone and SIM card and from the following: PIN code request - When active, the code is requested each time the device is switched on. Deactivating the PIN code request may not be allowed by some SIM cards. PIN code, PIN2 code, and Lock code - You can change the PIN code, PIN2 code, and lock code. These codes can only include the numbers from 0 to 9. If you forget the PIN or the PIN2 code, contact your service provider. If you forget the lock code, contact a Nokia Care point or your service provider. Avoid using access codes similar to the emergency numbers to prevent accidental dialling of the emergency number. Keypad autolock period - Select whether the keypad is locked when your device has been idle for a certain period of time. Phone autolock period - To avoid unauthorised use, you can set a time-out after which the device automatically locks. A locked device cannot be used until the correct lock code is entered. To turn off the autolock period, select None. Tip: To lock the device manually, press the power key. A list of commands opens. Select Lock phone. Lock if SIM card changed - You can set the device to ask for the lock code when an unknown SIM card is inserted into your device. The device maintains a list of SIM cards that are recognised as the owner's cards. Closed user group - You can specify a group of people to whom you can call and who can call you (network service). Confirm SIM services - You can set the device to display confirmation messages when you are using a SIM card service (network service). Certificate management Select Menu > Tools > Settings and General > Security > Certificate management. Digital certificates do not guarantee safety; they are used to verify the origin of software. In the certificate management main view, you can see a list of authority certificates that are stored in your device. Scroll right to see a list of personal certificates, if available. Digital certificates should be used if you want to connect to an online bank or another site or remote server for actions that involve transferring confidential information. They should also be used if you want to reduce the risk of viruses or other malicious software and be sure of the authenticity of software when downloading and installing software. Important: Even if the use of certificates makes the risks involved in remote connections and software installation considerably smaller, they must be used correctly in order to benefit from increased security. The existence of a 133 Settings

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159

Turning control
— Select
Silencing calls
and
Snoozing
alarms
to mute calls and snooze alarms by turning your
device so that the display faces down.
Security settings
Phone and SIM
Select
Menu
>
Tools
>
Settings
and
General
>
Security
>
Phone and SIM card
and from the following:
PIN code request
— When active, the code is requested
each time the device is switched on. Deactivating the PIN
code request may not be allowed by some SIM cards.
PIN code
,
PIN2 code
, and
Lock code
— You can change
the PIN code, PIN2 code, and lock code. These codes can
only include the numbers from
0
to
9
.
If you forget the PIN or the PIN2 code, contact your service
provider. If you forget the lock code, contact a Nokia Care
point or your service provider.
Avoid using access codes similar to the emergency
numbers to prevent accidental dialling of the emergency
number.
Keypad autolock period
— Select whether the keypad
is locked when your device has been idle for a certain
period of time.
Phone autolock period
— To avoid unauthorised use,
you can set a time-out after which the device
automatically locks. A locked device cannot be used until
the correct lock code is entered. To turn off the autolock
period, select
None
.
Tip:
To lock the device manually, press the power key. A
list of commands opens. Select
Lock phone
.
Lock if SIM card changed
— You can set the device to ask
for the lock code when an unknown SIM card is inserted
into your device. The device maintains a list of SIM cards
that are recognised as the owner’s cards.
Closed user group
— You can specify a group of people
to whom you can call and who can call you (network
service).
Confirm SIM services
— You can set the device to display
confirmation messages when you are using a SIM card
service (network service).
Certificate management
Select
Menu
>
Tools
>
Settings
and
General
>
Security
>
Certificate management
.
Digital certificates do not guarantee safety; they are used
to verify the origin of software.
In the certificate management main view, you can see a
list of authority certificates that are stored in your device.
Scroll right to see a list of personal certificates, if available.
Digital certificates should be used if you want to connect
to an online bank or another site or remote server for
actions that involve transferring confidential information.
They should also be used if you want to reduce the risk of
viruses or other malicious software and be sure of the
authenticity of software when downloading and installing
software.
Important:
Even if the use of certificates makes the risks
involved in remote connections and software installation
considerably smaller, they must be used correctly in order
to benefit from increased security. The existence of a
133
Settings