Empty The Cache; End The Connection; Connection Security - Nokia MOBILE PHONE N86 User Manual

Nokia cell phone - mobile phone user manual
Hide thumbs Also See for MOBILE PHONE N86:
Table of Contents

Advertisement

Select
Options
Go to
> Bookmarks. You can select web
>
addresses from a list or from a collection of bookmarks in
the Recently visited pages folder.
If you start to enter a web address, the
automatically.
indicates the homepage defined for the default access
point.
To go to a new web page, select
web
page.
To send and add bookmarks, or to set a bookmark as the
homepage, select
Options
To edit, move, or delete bookmarks, select
Bookmark
manager.

Empty the cache

The information or services you have accessed are stored
in the cache memory of the device.
A cache is a memory location that is used to store data
temporarily. If you have tried to access or have accessed
confidential information requiring passwords, empty the
cache after each use.
To empty the cache, select
data
> Cache.
field opens
Options
Go to
>
>
Bookmark
options.
>
Options
Options
Clear privacy
>

End the connection

To end the connection and close the browser, select
Options
> Exit.
To delete the information the network server collects
about your visits to various web pages, select
Clear privacy data

Connection security

New
If the security indicator ( ) is displayed during a
connection, the data transmission between the device and
the internet gateway or server is encrypted.
The security icon does not indicate that the data
transmission between the gateway and the content server
>
(where the data is stored) is secure. The service provider
secures the data transmission between the gateway and
the content server.
Security certificates may be required for some services,
such as banking services. You are notified if the identity of
the server is not authentic or if you do not have the correct
security certificate in your device. For more information,
contact your service provider.
Important: Even if the use of certificates makes the risks
involved in remote connections and software installation
considerably smaller, they must be used correctly in order
to benefit from increased security. The existence of a
certificate does not offer any protection by itself; the
certificate manager must contain correct, authentic, or
trusted certificates for increased security to be available.
Certificates have a restricted lifetime. If "Expired
> Cookies.
Options
>
55

Advertisement

Table of Contents
loading

This manual is also suitable for:

N-gage - game deck cell phone 3.4 mbN86 8mp

Table of Contents