Blackberry 8350I Cell Phone User Manual


 
Best practice: Conserving memory on your device................................................................................................................................................................................ 247
The application memory on my device is low......................................................................................................................................................................................... 248
SIM card...................................................................................................................................................................................................................................................... 249
About the SIM card phone book............................................................................................................................................................................................................... 249
Add a contact to your SIM card................................................................................................................................................................................................................ 249
Copy contacts from your SIM card to your contact list......................................................................................................................................................................... 249
Copy a contact from your contact list to your SIM card........................................................................................................................................................................ 249
Change a SIM card contact...................................................................................................................................................................................................................... 250
Delete a SIM card contact........................................................................................................................................................................................................................ 250
Store SMS text messages on your SIM card........................................................................................................................................................................................... 250
About SIM card security............................................................................................................................................................................................................................ 251
Protect your SIM card with a PIN code................................................................................................................................................................................................... 251
Change the SIM card PIN code................................................................................................................................................................................................................ 251
Change the display name for a phone number...................................................................................................................................................................................... 251
Security........................................................................................................................................................................................................................................................ 252
Security basics............................................................................................................................................................................................................................................ 252
Password keeper........................................................................................................................................................................................................................................ 254
Encryption................................................................................................................................................................................................................................................... 256
Memory cleaning........................................................................................................................................................................................................................................ 259
Certificates.................................................................................................................................................................................................................................................. 260
PGP keys..................................................................................................................................................................................................................................................... 268
Certificate servers...................................................................................................................................................................................................................................... 274
Key stores.................................................................................................................................................................................................................................................... 276
Smart cards................................................................................................................................................................................................................................................. 279
Software tokens.......................................................................................................................................................................................................................................... 283
VPN settings............................................................................................................................................................................................................................................... 284
About security self-tests............................................................................................................................................................................................................................ 285
Verify security software............................................................................................................................................................................................................................. 285
Third-party application control................................................................................................................................................................................................................ 285
Troubleshooting: Security......................................................................................................................................................................................................................... 289
Service books and diagnostic reports...................................................................................................................................................................................................... 291
Service books.............................................................................................................................................................................................................................................. 291
Diagnostic reports...................................................................................................................................................................................................................................... 292
Wi-Fi diagnostic reports............................................................................................................................................................................................................................ 294
Accessibility options.................................................................................................................................................................................................................................. 296
About accessibility options....................................................................................................................................................................................................................... 296
Change the display font............................................................................................................................................................................................................................ 296
Use reverse contrast for the screen display............................................................................................................................................................................................ 296