Blackberry CURVE 8980 User Manual
Page 10

327
Reset the device.........................................................................................................................................................................................................................................
327
327
327
328
View the amount of available memory....................................................................................................................................................................................................
328
Best practice: Conserving memory on your device................................................................................................................................................................................
328
329
SIM card......................................................................................................................................................................................................................................................
330
330
Add a contact to your SIM card................................................................................................................................................................................................................
330
Copy contacts from your SIM card to your contact list.........................................................................................................................................................................
330
Copy a contact from your contact list to your SIM card........................................................................................................................................................................
330
Change a SIM card contact......................................................................................................................................................................................................................
331
Delete a SIM card contact........................................................................................................................................................................................................................
331
331
About SIM card security............................................................................................................................................................................................................................
332
332
Change the SIM card PIN code................................................................................................................................................................................................................
332
Change the display name for a phone number......................................................................................................................................................................................
332
333
333
335
Encryption...................................................................................................................................................................................................................................................
338
Memory cleaning........................................................................................................................................................................................................................................
340
Certificates..................................................................................................................................................................................................................................................
342
PGP keys.....................................................................................................................................................................................................................................................
350
Certificate servers......................................................................................................................................................................................................................................
356
Key stores....................................................................................................................................................................................................................................................
358
361
Software tokens..........................................................................................................................................................................................................................................
365
365
367
367
Third-party application control................................................................................................................................................................................................................
367
371
372
372
374