Nokia N86 Automobile Parts User Manual


 
Turning control — Select Silencing calls and Snoozing
alarms to mute calls and snooze alarms by turning your
device so that the display faces down.
Security settings
Phone and SIM
Select Menu > Tools > Settings and General >
Security > Phone and SIM card and from the following:
PIN code request — When active, the code is requested
each time the device is switched on. Deactivating the PIN
code request may not be allowed by some SIM cards.
PIN code, PIN2 code, and Lock code — You can change
the PIN code, PIN2 code, and lock code. These codes can
only include the numbers from 0 to 9.
If you forget the PIN or the PIN2 code, contact your service
provider. If you forget the lock code, contact a Nokia Care
point or your service provider.
Avoid using access codes similar to the emergency
numbers to prevent accidental dialling of the emergency
number.
Keypad autolock period — Select whether the keypad
is locked when your device has been idle for a certain
period of time.
Phone autolock period — To avoid unauthorised use,
you can set a time-out after which the device
automatically locks. A locked device cannot be used until
the correct lock code is entered. To turn off the autolock
period, select None.
Tip: To lock the device manually, press the power key. A
list of commands opens. Select Lock phone.
Lock if SIM card changed — You can set the device to ask
for the lock code when an unknown SIM card is inserted
into your device. The device maintains a list of SIM cards
that are recognised as the owner’s cards.
Closed user group — You can specify a group of people
to whom you can call and who can call you (network
service).
Confirm SIM services — You can set the device to display
confirmation messages when you are using a SIM card
service (network service).
Certificate management
Select Menu > Tools > Settings and General >
Security > Certificate management.
Digital certificates do not guarantee safety; they are used
to verify the origin of software.
In the certificate management main view, you can see a
list of authority certificates that are stored in your device.
Scroll right to see a list of personal certificates, if available.
Digital certificates should be used if you want to connect
to an online bank or another site or remote server for
actions that involve transferring confidential information.
They should also be used if you want to reduce the risk of
viruses or other malicious software and be sure of the
authenticity of software when downloading and installing
software.
Important: Even if the use of certificates makes the risks
involved in remote connections and software installation
considerably smaller, they must be used correctly in order
to benefit from increased security. The existence of a
133
Settings