iii
How This Guide Is Organized .............................................................................................. 2
Conventions Used in F-Secure Guides................................................................................ 3
Getting the Product Running on Your Device ..............................................................8
2.2.1 Installation ........................................................................................................8
2.2.2 Activating the Update Service ..........................................................................9
Using F-Secure Mobile Security
Scanning for Viruses ..................................................................................................14
3.2.1 Selecting the Virus Protection Mode ..............................................................14
3.2.2 Processing Infected Files ...............................................................................15
Summary of Contents for MOBILE SECURITY 3.0 FOR S60
Page 1: ...F Secure Mobile Security for S60 User s Guide...
Page 5: ...1 ABOUT THIS GUIDE How This Guide Is Organized 2 Conventions Used in F Secure Guides 3...
Page 9: ...5 1 INTRODUCTION F Secure Mobile Security 6 Key Features 6...
Page 27: ...25 Technical Support Overview 26 Virus Descriptions on the Web 26 Electronic Mail Support 26...
Page 31: ......