Nokia N79 Cell Phone User Manual


 
Avoid using access codes similar to the emergency
numbers to prevent accidental dialling of the
emergency number.
Keypad autolock period — Select whether the
keypad is locked when your device has been idle for
a certain period of time.
Tip: To lock or unlock the keypad manually,
press the left selection key, then *.
Phone autolock period — To avoid unauthorised
use, you can set a time-out after which the device
automatically locks. A locked device cannot be used
until the correct lock code is entered. To turn off the
autolock period, select None.
Tip: To lock the device manually, press the
power key. A list of commands opens. Select
Lock phone.
In the offline or flight profiles, you may need to unlock
the device and change to the calling profile before
making a call.
Lock if SIM card changed — You can set the device
to ask for the lock code when an unknown SIM card
is inserted into your device. The device maintains a
list of SIM cards that are recognised as the owner’s
cards.
Closed user group — You can specify a group of
people to whom you can call and who can call you
(network service).
When calls are limited to closed user groups, calls may
be possible to the official emergency number
programmed into your device.
Confirm SIM services — You can set the device to
display confirmation messages when you are using
a SIM card service (network service).
Certificate management
Press , and select Tools > Settings > General >
Security > Certificate management.
Digital certificates do not guarantee safety; they are
used to verify the origin of software.
In the certificate management main view, you can see
a list of authority certificates that are stored in your
device. Scroll right to see a list of personal certificates,
if available.
Digital certificates should be used if you want to
connect to an online bank or another site or remote
server for actions that involve transferring confidential
information. They should also be used if you want to
reduce the risk of viruses or other malicious software
and be sure of the authenticity of software when
downloading and installing software.
Important: Even if the use of certificates makes
the risks involved in remote connections and software
installation considerably smaller, they must be used
correctly in order to benefit from increased security.
The existence of a certificate does not offer any
156
Settings