103
29: Third-party program control
through your corporation’s network, set the
Company Network
field.
•
To control whether third-party programs can
access the Internet through your service
provider, set the
Carrier Internet
field.
Related topics
Set permissions for third-party programs (See page
102.)
Control connections with the device (See page 103.)
Control access to personal information (See page 103.)
Control connections with the device
1.
In the device options, click
Advanced Options.
2.
Click
Applications.
3. Click the trackwheel.
4. Click
Edit Default Permissions.
5. In the
Interactions
group, set the following fields:
•
To control whether third-party programs can
communicate with other programs on your
BlackBerry® device, such as the device
runtime store, persistent store, and global e
vents, set the
Interprocess Communications
field.
•
To control whether third-party programs can
simulate actions, such as the pressing of a key
or button on your device, and send those
simulated actions to the program that you are
currently using, set the
Keystroke Injection
field.
•
To control whether third-party programs can
register a filter with the browser to handle
content from a domain such as a custom-
encoded document, set the
Browser Filters
field.
•
To control whether third-party programs can
be used by your device as a source for
customized themes, set the
Theme Data
field.
Related topics
Set permissions for third-party programs (See page
102.)
Control external connections (See page 102.)
Control access to personal information (See page 103.)
Control access to personal
information
1.
In the device options, click
Advanced Options.
2.
Click
Applications.
3. Click the trackwheel.
4. Click
Edit Default Permissions.
5. In the
User Data
group, set the following fields:
•
To control whether third-party programs can
access email messages, SMS messages, or
PIN messages, set the
field.
•
To control whether third-party programs can
access personal information management
(PIM) items, such as tasks, memos, contacts,
and calendar entries, set the
PIM
field.
•
To control whether third-party programs can
access the key store, set the
Key Store
field.
If you allow third-party programs to access
the key store, you must type the key store
password when a third-party program
attempts to access private contents of the key
store.
•
To control whether third-party programs can
access the key store with password caching
turned on, set the
Key Store Medium
Security
field.
Related topics
Set permissions for third-party programs (See page
102.)
Summary of Contents for 8707 - VERSION 4.1
Page 1: ...BlackBerry Wireless Handheld Version 4 1 User Guide...
Page 4: ......
Page 8: ......
Page 10: ...10 User Guide...
Page 22: ...22 User Guide...
Page 26: ...26 User Guide...
Page 32: ...32 User Guide To move between presentation views in a presentation press M...
Page 36: ...36 User Guide...
Page 40: ...40 User Guide...
Page 56: ...56 User Guide...
Page 64: ...64 User Guide...
Page 66: ...66 User Guide...
Page 68: ...68 User Guide...
Page 70: ...70 User Guide...
Page 72: ...72 User Guide...
Page 76: ...76 User Guide...
Page 84: ...84 User Guide...
Page 86: ...86 User Guide...
Page 88: ...88 User Guide Reset the device Remove and reinsert the battery...
Page 92: ...92 User Guide...
Page 100: ...100 User Guide...
Page 104: ...104 User Guide...
Page 108: ...108 User Guide...
Page 110: ...110 User Guide...
Page 112: ...112 User Guide...
Page 122: ...122 User Guide...
Page 126: ...126 User Guide...
Page 130: ...130 User Guide...
Page 134: ...134 User Guide...