97
Working with the Internet
Content search
With keyword search, you can quickly find the information you are looking for on a
web page.
• To search for text within the current web page, select
Options
>
Find keyword
.
• To go to the previous or next match, scroll up or down.
End the connection
To end the connection and close the Browser application, select
Options
>
Exit
.
Privacy data
All Privacy data can be deleted with the
All
command, or specific items can be
deleted separately, as described below.
To delete All Privacy data, select
Options
>
Clear privacy data
>
All
.
Empty the cache
Emptying the cache memory helps you keep your data secure. The information or
services you have accessed are stored in the cache memory of the device. If you
have accessed or tried to access confidential information requiring passwords,
empty the cache after each browsing session.
With the web browser open, select
Options
>
Clear privacy data
>
Cache
.
Delete Cookies
Cookies contain information collected about your visits to web pages.
To delete cookies, select
Options
>
Clear privacy data
>
Cookies
.
Delete History
History
contain information about web pages you have visited.
To delete history, select
Options
>
Clear privacy data
>
History
.
Form/password data
Form/password data contains information on the password data, or data you enter on
different forms on a web page when in use.
To delete
Form/password data
, select
Options
>
Clear privacy data
>
Form/
password data
.
Connection security
With a secure connection and security certificates, you can safely browse the
internet.
If the security indicator (ICON) is displayed during a connection, the data
transmission between the device and the internet gateway or server is encrypted.
The security icon does not indicate that the data transmission between the gateway
and the content server (where the data is stored) is secure. The service provider
secures the data transmission between the gateway and the content server.
Security certificates may be required for some services, such as banking services.
You are notified if the identity of the server is not authentic or if you do not have the
correct security certificate in your device. For more information, contact your service
provider.
TIP:
To search for text within the current web page, press 2.
IMPORTANT:
Even if the use of certificates makes the risks involved in
remote connections and software installation considerably smaller, they
must be used correctly in order to benefit from increased security. The
existence of a certificate does not offer any protection by itself; the
certificate manager must contain correct, authentic, or trusted certificates
for increased security to be available. Certificates have a restricted lifetime.
If
Expired certificate
or
Certificate not valid yet
is shown, even if the
certificate should be valid, check that the current date and time in your
device are correct.
Before changing any certificate settings, you must make sure that you really
trust the owner of the certificate and that the certificate really belongs to the
listed owner.