Blackberry 8110 Cell Phone User Manual


 
Set your device to turn on and turn off automatically............................................................................................................................................................................239
Check the battery power level....................................................................................................................................................................................................................239
Check the battery power level using a voice command............................................................................................................................................................................41
Reset the device...........................................................................................................................................................................................................................................239
Extend battery life........................................................................................................................................................................................................................................239
SIM card...............................................................................................................................................................................................................................................241
About the SIM card phone book..................................................................................................................................................................................................................173
Add a contact to your SIM card ..................................................................................................................................................................................................................173
Copy contacts from your SIM card to your address book........................................................................................................................................................................173
Copy a contact from your address book to your SIM card......................................................................................................................................................................174
Change a SIM card contact..........................................................................................................................................................................................................................174
Delete a SIM card contact............................................................................................................................................................................................................................174
Store SMS text messages on your SIM card...............................................................................................................................................................................................82
About SIM card security..............................................................................................................................................................................................................................242
Protect your SIM card with a PIN code.....................................................................................................................................................................................................243
Change the SIM card PIN code..................................................................................................................................................................................................................243
Change the display name for a phone number........................................................................................................................................................................................243
Security...............................................................................................................................................................................................................................................245
Security basics..............................................................................................................................................................................................................................................245
Password keeper..........................................................................................................................................................................................................................................246
Encryption......................................................................................................................................................................................................................................................248
Memory cleaning..........................................................................................................................................................................................................................................250
Advanced security.........................................................................................................................................................................................................................................251
Smart cards....................................................................................................................................................................................................................................................253
Software tokens............................................................................................................................................................................................................................................254
Security troubleshooting.............................................................................................................................................................................................................................254
Third-party application control......................................................................................................................................................................................................257
About permissions for third-party applications.......................................................................................................................................................................................257
Reset connection permissions for third-party applications ..................................................................................................................................................................257
About direct Internet connections for third-party applications............................................................................................................................................................257
Set up a direct Internet connection for a third-party application........................................................................................................................................................257
Set permissions for a third-party application..........................................................................................................................................................................................257
Connection permissions for third-party applications.............................................................................................................................................................................258
Interaction permissions for third-party applications..............................................................................................................................................................................258
Data permissions for third-party applications........................................................................................................................................................................................259
BrickBreaker.......................................................................................................................................................................................................................................261
About BrickBreaker.......................................................................................................................................................................................................................................261
BrickBreaker capsules..................................................................................................................................................................................................................................261