Security ................................................................... 31
Tethering ................................................................. 43
Phone Calls ............................................................ 44
Placing Calls .................................................................... 44
Contacts ................................................................. 50
6