beautypg.com

Certificate management, Se ttings – Nokia N78 User Manual

Page 146

background image

These codes can only include the numbers from 0 to

9.
If you forget the PIN or the PIN2 code, contact your

service provider. If you forget the lock code, contact

a Nokia Care point or your service provider.

See

"Access codes", p. 19.

Avoid using access codes similar to the emergency

numbers to prevent accidental dialling of the

emergency number.

Keypad autolock period

— Select whether the

keypad is locked when your device has been idle for

a certain period of time.

Tip: To lock or unlock the keypad manually,

press the left selection key, then *.

Phone autolock period

— To avoid unauthorised

use, you can set a time-out after which the device

automatically locks. A locked device cannot be used

until the correct lock code is entered. To turn off the

autolock period, select

None

.

Tip: To lock the device manually, press the

power key. A list of commands opens. Select

Lock phone

.

Lock if SIM card changed

— You can set the device

to ask for the lock code when an unknown SIM card

is inserted into your device. The device maintains a

list of SIM cards that are recognised as the owner’s

cards.

Closed user group

— You can specify a group of

people to whom you can call and who can call you

(network service).

Confirm SIM services

— You can set the device to

display confirmation messages when you are using

a SIM card service (network service).

Certificate management

Press

, and select

Tools

>

Settings

>

General

>

Security

>

Certificate management

.

Digital certificates do not guarantee safety; they are

used to verify the origin of software.
In the certificate management main view, you can see

a list of authority certificates that are stored in your

device. Scroll right to see a list of personal certificates,

if available.
Digital certificates should be used if you want to

connect to an online bank or another site or remote

server for actions that involve transferring confidential

information. They should also be used if you want to

reduce the risk of viruses or other malicious software

and be sure of the authenticity of software when

downloading and installing software.

Important: Even if the use of certificates makes

the risks involved in remote connections and software

installation considerably smaller, they must be used

correctly in order to benefit from increased security.

The existence of a certificate does not offer any

146

Se

ttings