Blackberry 8800 User Manual page 9

Blackberry 8800: user guide
Hide thumbs Also See for 8800:
Table of Contents

Advertisement

Extend battery life.........................................................................................................................................................................................................................................213
View the amount of available memory on your device............................................................................................................................................................................214
Best practice: Optimizing your device performance...............................................................................................................................................................................214
SIM card...............................................................................................................................................................................................................................................215
About the SIM card phone book.................................................................................................................................................................................................................148
Add a contact to your SIM card .................................................................................................................................................................................................................148
Copy contacts from your SIM card to your address book.......................................................................................................................................................................148
Copy a contact from your address book to your SIM card......................................................................................................................................................................148
Change a SIM card contact.........................................................................................................................................................................................................................149
Delete a SIM card contact...........................................................................................................................................................................................................................149
Store SMS text messages on your SIM card...............................................................................................................................................................................................69
About SIM card security...............................................................................................................................................................................................................................216
Protect your SIM card with a PIN code......................................................................................................................................................................................................217
Change the SIM card PIN code...................................................................................................................................................................................................................217
Change the display name for a phone number.........................................................................................................................................................................................217
Security................................................................................................................................................................................................................................................219
Security basics...............................................................................................................................................................................................................................................219
Password keeper...........................................................................................................................................................................................................................................220
Encryption......................................................................................................................................................................................................................................................222
Memory cleaning..........................................................................................................................................................................................................................................224
Certificates....................................................................................................................................................................................................................................................225
Certificate servers.........................................................................................................................................................................................................................................231
Key stores.......................................................................................................................................................................................................................................................233
Smart cards....................................................................................................................................................................................................................................................235
Software tokens............................................................................................................................................................................................................................................238
About PGP keys............................................................................................................................................................................................................................................238
About security self-tests.............................................................................................................................................................................................................................239
Verify security software ..............................................................................................................................................................................................................................239
Security troubleshooting.............................................................................................................................................................................................................................239
Third-party application control......................................................................................................................................................................................................241
About permissions for third-party applications........................................................................................................................................................................................241
Reset connection permissions for third-party applications ..................................................................................................................................................................241
About direct Internet connections for third-party applications............................................................................................................................................................241
Set up a direct Internet connection for a third-party application.........................................................................................................................................................241
Set permissions for a third-party application...........................................................................................................................................................................................241
Connection permissions for third-party applications.............................................................................................................................................................................242
Interaction permissions for third-party applications..............................................................................................................................................................................242
Data permissions for third-party applications.........................................................................................................................................................................................243

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents