hit counter script

Nokia RM-230 User Manual page 74

Nokia cell phone user manual
Hide thumbs Also See for RM-230:
Table of Contents

Advertisement

Avoid using access codes similar to emergency numbers to prevent accidental
dialing of the emergency number.
Code in
use—to select the active code,
PIN
or UPIN, for the active USIM. This is
shown only if the active USIM supports UPIN, and the UPIN is not rejected.
PIN code request
or
UPIN code
request—to set the phone to request the code each
time the phone is switched on. Some SIM cards may not allow the PIN code
request to be turned Off. If you select
Code in use
> UPIN,
UPIN code request
is
shown instead.
PIN code
or
UPIN
code,
PIN2
code, and
Lock
code—to change the codes
Keypad autolock period
>
User
defined—to automatically lock the keypad after a
defined period of inactivity
Phone autolock
period—to set a time-out after which the phone is automatically
locked. To use the phone again, you need to enter the correct lock code. To turn off
the autolock period, select None.
Lock if SIM card
changed—to set the phone to prompt for the lock code when an
unknown, new SIM card is inserted into your phone. The phone keeps a list of SIM
cards that are recognized as the owner cards.
Closed user group
(network service)—to specify a group of people whom you can
call and who can call you. For more information, contact your service provider. To
activate the default group agreed on with the service provider, select Default. If
you want to use another group (you need to know the group index number), select
On.
When calls are limited to closed user groups, calls may be possible to the official emergency
number programmed into your device.
Confirm SIM services
(network service)—to set the phone to display confirmation
messages when you use a SIM card service
Certificate management
A list of authority certificates that have been stored in your phone is displayed in
Certificate
management. To see a list of personal certificates if available,
scroll right.
Digital certificates should be used if you want to connect to an online bank or
another site or remote server for actions that involve transferring confidential
information. They should also be used if you want to reduce the risk of viruses or
other malicious software and be sure of the authenticity of software when
downloading and installing software.
74

Advertisement

Table of Contents
loading

Table of Contents