SIM card..............................................................................................................................................................................................................
About the SIM card phone book........................................................................................................................................................................
Add a contact to your SIM card..........................................................................................................................................................................
Change or delete a SIM card contact.................................................................................................................................................................
Store text messages on your SIM card...............................................................................................................................................................
About SIM card security.....................................................................................................................................................................................
Protect your SIM card with a PIN code...............................................................................................................................................................
Change the SIM card PIN code...........................................................................................................................................................................
Security...............................................................................................................................................................................................................
Security basics....................................................................................................................................................................................................
Password keeper................................................................................................................................................................................................
Encryption..........................................................................................................................................................................................................
Memory cleaning................................................................................................................................................................................................
Certificates.........................................................................................................................................................................................................
PGP keys.............................................................................................................................................................................................................
Certificate servers..............................................................................................................................................................................................
Key store.............................................................................................................................................................................................................
Smart cards.........................................................................................................................................................................................................
VPN settings.......................................................................................................................................................................................................
Verify security software manually......................................................................................................................................................................
Third-party application control..........................................................................................................................................................................
Troubleshooting: Security..................................................................................................................................................................................
Service books and diagnostic reports.................................................................................................................................................................
Run a diagnostic report......................................................................................................................................................................................
Synchronisation..................................................................................................................................................................................................
About synchronisation.......................................................................................................................................................................................
About synchronisation conflicts.........................................................................................................................................................................
247
247
247
247
247
248
248
248
248
249
249
250
250
252
254
256
257
264
269
271
273
276
277
278
281
282
282
282
282
283
283
283
284
284
284
285
285
285