User Guide
Page 4
Nokia Team suite 46 Edit teams 46 8. Clock 49 Alarm clock 49 Add and delete cities 49 10. Data and software management 66 Application manager 66 Install applications and software 66 View and remove software 66 View the installation log 66 Settings...66 Specify Java application security settings...voice recording 77 Flash player 77 Web 59 Access points 59 Browse the Web 59 Bookmarks 59 Download items 59 End a connection 60 Clear the cache 60 News feeds and blogs 60 Web settings 60 Services...61 13. Camera 71 Take a picture 71 Record a video clip 71 Insert pictures ...
Nokia Team suite 46 Edit teams 46 8. Clock 49 Alarm clock 49 Add and delete cities 49 10. Data and software management 66 Application manager 66 Install applications and software 66 View and remove software 66 View the installation log 66 Settings...66 Specify Java application security settings...voice recording 77 Flash player 77 Web 59 Access points 59 Browse the Web 59 Bookmarks 59 Download items 59 End a connection 60 Clear the cache 60 News feeds and blogs 60 Web settings 60 Services...61 13. Camera 71 Take a picture 71 Record a video clip 71 Insert pictures ...
User Guide
Page 6
... on when wireless device use may cause interference or danger. © 2007 Nokia. Always keep a written record of all important information stored in your hands free.... Do not use any restrictions. Exercise caution and open messages, accept connectivity requests, download content, and accept installations only from being copied, modified, transferred, or forwarded. INTERFERENCE... them may be road safety. When using , and regularly updating antivirus software, firewall, and other related software on . For your service provider for more information about networks. Wireless...
... on when wireless device use may cause interference or danger. © 2007 Nokia. Always keep a written record of all important information stored in your hands free.... Do not use any restrictions. Exercise caution and open messages, accept connectivity requests, download content, and accept installations only from being copied, modified, transferred, or forwarded. INTERFERENCE... them may be road safety. When using , and regularly updating antivirus software, firewall, and other related software on . For your service provider for more information about networks. Wireless...
User Guide
Page 59
...you are saved in the Services browser. To download an item, scroll to use Menu > Media > Services. Downloaded items are displayed. Check the availability of pages you trust and that offer adequate security and protection against harmful software. Access points To browse the Web, you ...press 2 to find text. • Press 3 to return to the previous page. • Press 5 to switch between your device. © 2007 Nokia. 12. On a Web page, new links appear underlined in blue and previously visited links in your open browser windows. • Press 8 to open ...
...you are saved in the Services browser. To download an item, scroll to use Menu > Media > Services. Downloaded items are displayed. Check the availability of pages you trust and that offer adequate security and protection against harmful software. Access points To browse the Web, you ...press 2 to find text. • Press 3 to return to the previous page. • Press 5 to switch between your device. © 2007 Nokia. 12. On a Web page, new links appear underlined in blue and previously visited links in your open browser windows. • Press 8 to open ...
User Guide
Page 66
... the installation log, select Options > View log. A list shows what software has been installed and removed, and the date of the package to be the cause of installed applications, remove them from a compatible computer, downloaded during browsing, or sent to you see all applications. • Online ... view the details of your device may no longer be transferred to your device, save the file in the C:\nokia\installs folder in your device. mgr.. These software installation files have been installed, with that are .jad or .jar. To view the details of certificates when ...
... the installation log, select Options > View log. A list shows what software has been installed and removed, and the date of the package to be the cause of installed applications, remove them from a compatible computer, downloaded during browsing, or sent to you see all applications. • Online ... view the details of your device may no longer be transferred to your device, save the file in the C:\nokia\installs folder in your device. mgr.. These software installation files have been installed, with that are .jad or .jar. To view the details of certificates when ...
User Guide
Page 69
... device, select the one you want the preview confirmation query to activate a data connection or other software from your wireless service provider, it may not appear in the Settings Wizard database. © 2007 Nokia. Select Menu > Download!. Download! (network service) is free of your device. uses your notes. • Local database - Buy the selected...
... device, select the one you want the preview confirmation query to activate a data connection or other software from your wireless service provider, it may not appear in the Settings Wizard database. © 2007 Nokia. Select Menu > Download!. Download! (network service) is free of your device. uses your notes. • Local database - Buy the selected...
User Guide
Page 88
... a memory card with personal certificates. If you use . Certificate manager Important: Even if the use the certificate: © 2007 Nokia. Before changing any protection by some services to benefit from your device. During a secure connection, a server may need to edit your ... do not have a restricted lifetime. They should be used to prevent unauthorized access. To check the authenticity of software when you download and install software to you need to add the text message center number to compare fingerprints. Only trusted certificates can use of certificates...
... a memory card with personal certificates. If you use . Certificate manager Important: Even if the use the certificate: © 2007 Nokia. Before changing any protection by some services to benefit from your device. During a secure connection, a server may need to edit your ... do not have a restricted lifetime. They should be used to prevent unauthorized access. To check the authenticity of software when you download and install software to you need to add the text message center number to compare fingerprints. Only trusted certificates can use of certificates...