12
3
U
SING
F-S
ECURE
M
OBILE
S
ECURITY
Opening and Closing the Application ......................................... 13
Scanning for Viruses .................................................................. 14
Using Firewall............................................................................. 17
Protecting Confidential Information ............................................ 18
Keeping the Application Up-to-Date ........................................... 20
Purchasing Subscription Service Time....................................... 23
Troubleshooting.......................................................................... 24
Summary of Contents for MOBILE SECURITY FOR S60 -
Page 1: ...F Secure Mobile Security for S60 User s Guide...
Page 5: ...1 ABOUT THIS GUIDE How This Guide Is Organized 2 Conventions Used in F Secure Guides 3...
Page 9: ...5 1 INTRODUCTION F Secure Mobile Security 6 Key Features 6...
Page 29: ...25 Technical Support Overview 26 Virus Descriptions on the Web 26 Electronic Mail Support 26...
Page 33: ......