Tools
100
Copyright © 2006 Nokia. All rights reserved.
code is blocked, and you need to unblock it before you can
use the SIM card again. See the information about the
PUK code in this section.
PIN2 code—This code (4 to 8 digits) is supplied with some
SIM cards, and is required to access some functions in
your device.
Lock code (also known as security code)—This code (5
digits) can be used to lock the device to avoid
unauthorized use. The factory setting for the lock code is
12345. To avoid unauthorized use of your device, change
the lock code. Keep the new code secret and in a safe
place separate from your device.
Personal unblocking key (PUK) code and PUK2 code—
These codes (8 digits) are required to change a blocked
PIN code or PIN2 code, respectively. If the codes are not
supplied with the SIM card, contact the operator whose
SIM card is in your device.
Certificate management
Digital certificates do not guarantee safety; they are used
to verify the origin of software.
Glossary: Digital certificates are used to verify the
origin of the XHTML or WML pages and installed
software. However, they can only be trusted if the
origin of the certificate is known to be authentic.
In the certificate management main view, you can see a
list of authority certificates that are stored in your device.
Press to see a list of personal certificates, if available.
Digital certificates should be used if you want to connect
to an online bank or another site or remote server for
actions that involve transferring confidential information.
They should also be used if you want to reduce the risk of
viruses or other malicious software and be sure of the
authenticity of software when downloading and installing
software.
Important: Even if the use of certificates makes the
risks involved in remote connections and software
installation considerably smaller, they must be used
correctly in order to benefit from increased security. The
existence of a certificate does not offer any protection by
itself; the certificate manager must contain correct,
authentic, or trusted certificates for increased security to
be available. Certificates have a restricted lifetime. If
Expired certificate or Certificate not valid yet is shown
even if the certificate should be valid, check that the
current date and time in your device are correct.
View certificate details—check authenticity
You can only be sure of the correct identity of a server
when the signature and the period of validity of a server
certificate have been checked.