iii
How This Guide Is Organized .............................................................................................. 2
Conventions Used in F-Secure Guides................................................................................ 3
Getting the Product Running on Your Device ..............................................................8
2.2.1 Installation ........................................................................................................8
2.2.2 Activating the Update Service ..........................................................................9
Using F-Secure Mobile Security
Scanning for Viruses ..................................................................................................14
3.2.1 Selecting the Virus Protection Mode ..............................................................14
3.2.2 Processing Infected Files ...............................................................................15
Содержание MOBILE SECURITY 3.0 FOR S60
Страница 1: ...F Secure Mobile Security for S60 User s Guide...
Страница 5: ...1 ABOUT THIS GUIDE How This Guide Is Organized 2 Conventions Used in F Secure Guides 3...
Страница 9: ...5 1 INTRODUCTION F Secure Mobile Security 6 Key Features 6...
Страница 11: ...7 2 INSTALLATION System Requirements 8 Getting the Product Running on Your Device 8 Uninstalling 11...
Страница 27: ...25 Technical Support Overview 26 Virus Descriptions on the Web 26 Electronic Mail Support 26...
Страница 31: ......