Lock if SIM
changed—You can set the device to ask for
the lock code when an unknown SIM card is inserted into
your device. The device maintains a list of SIM cards that
are recognized as the owner's cards.
Closed user
group—You can specify a group of people to
whom you can call and who can call you (network service).
When calls are limited to closed user groups, calls may be
possible to the official emergency number programmed
into your device.
Confirm SIM
services—You can set the device to display
confirmation messages when you are using a SIM card
service (network service).
Glossary of PIN and lock codes
If you forget any of these codes, contact your service provider.
Personal identification number (PIN) code—This code protects
your SIM card against unauthorized use. The PIN code (4 to
8 digits) is usually supplied with the SIM card. After three
consecutive incorrect PIN code entries, the code is blocked,
and you need the PUK code to unblock it.
PIN2 code—This code (4 to 8 digits) is supplied with some SIM
cards, and is required to access some functions in your device.
Lock code (also known as security code)—This code (5 digits)
can be used to lock the device to avoid unauthorized use.
The factory setting for the lock code is 12345. To avoid
unauthorized use of your device, change the lock code.
Keep the new code secret and in a safe place separate
from your device. If you forget the code, contact your
service provider.
Personal unblocking key (PUK) code and PUK2 code—These
codes (8 digits) are required to change a blocked PIN code
or PIN2 code, respectively. If the codes are not supplied
with the SIM card, contact the operator whose SIM card is
in your device.
Certificate management
Digital certificates do not guarantee safety; they are used
to verify the origin of software.
In the certificate management main view, you can see a
list of authority certificates that are stored in your device.
Press
to see a list of personal certificates, if available.
Digital certificates should be used if you want to connect to
an online bank or another site or remote server for actions
that involve transferring confidential information. They
should also be used if you want to reduce the risk of viruses
or other malicious software and be sure of the authenticity
of software when downloading and installing software.
103