13
3
U
SING
F-S
ECURE
M
OBILE
S
ECURITY
Opening and closing the application........................................... 14
Scanning for viruses................................................................... 15
Using firewall .............................................................................. 18
Protecting confidential information ............................................. 19
Protecting web browsing ............................................................ 22
Keeping the application up-to-date............................................. 24
Purchasing subscription service time ......................................... 26
Troubleshooting.......................................................................... 28
Summary of Contents for MOBILE SECURITY 6 FOR S60 -
Page 1: ...F Secure Mobile Security for S60 User s Guide ...
Page 5: ...1 ABOUT THIS GUIDE How This Guide Is Organized 2 Conventions Used in F Secure Guides 3 ...
Page 9: ...5 1 INTRODUCTION F Secure Mobile Security 6 Key features 7 ...
Page 33: ...25 Technical Support Overview 26 Virus descriptions on the web 26 Electronic mail support 26 ...
Page 37: ......