hit counter script

Cache Memory; Browser Security - Nokia 8800 Manual

Hide thumbs Also See for 8800:
Table of Contents

Advertisement

9237415_8800_2_en_zh.fm Page 65 Tuesday, April 19, 2005 10:26 AM

Cache memory

A cache is a memory location that is
used to store data temporarily. If you
have tried to access or have accessed
confidential information requiring
passwords, empty the cache after
each use. The information or services
you have accessed is stored in the
cache.
To empty the cache, while browsing,
select Options > Other options >
Clear the cache; in the standby
mode, select Menu > Web > Clear
the cache.

Browser security

Security features may be required
for some services, such as online
banking or shopping. For such
connections you need security
certificates and possibly a security
module, which may be available on
your SIM card. For more information,
contact your service provider.
Security module
The security module improves
security services for applications
requiring a browser connection, and
allows you to use a digital signature.
The security module may contain
certificates as well as private and
public keys. The certificates are
saved in the security module by the
service provider.
M e n u f u n c t i o n s
Select Menu > Web > Settings >
Security settings > Security
module settings and from the
following options:
Security module details — to show
the security module title, status,
manufacturer, and serial number.
Module PIN request — to set the
phone to ask for the module PIN
when using services provided by the
security module. Enter the code, and
select On. To disable the module PIN
request, select Off.
Change module PIN — to change
the module PIN, if allowed by the
security module. Enter the current
module PIN code, then enter the new
code twice.
Change signing PIN — to change
the signing PIN code for the digital
signature. Select the signing PIN you
want to change. Enter the current
PIN code, then enter the new code
twice.
See also "Access codes", page x.
Certificates
Important: Note that even if
the use of certificates makes
the risks involved in remote
connections and software
installation considerably
smaller, they must be used
correctly in order to benefit
from increased security. The
65

Advertisement

Chapters

Table of Contents
loading

This manual is also suitable for:

Rm-13

Table of Contents