background image

31

5

T

ECHNICAL

 S

UPPORT

Overview..................................................................................... 32
Web Club.................................................................................... 32
Virus Descriptions on the Web ................................................... 32
Electronic Mail Support............................................................... 32

Содержание MOBILE SECURITY 80 Series

Страница 1: ...F Secure Mobile Security for Series 80 User s Guide...

Страница 2: ...Corporation will not be liable for any errors or omission of facts contained herein F Secure Corporation reserves the right to modify specifications cited in this document without prior notice Compani...

Страница 3: ...m Requirements 8 2 2 Installing F Secure Mobile Security 8 2 2 1 Activating The Update Service 9 2 3 Uninstalling F Secure Mobile Security 10 Chapter 3 Using F Secure Mobile Security 11 3 1 Overview 1...

Страница 4: ...Subscription Service Time 21 3 7 Firewall 22 3 7 1 Protection Levels 22 Chapter 4 Troubleshooting 26 4 1 Updates 27 4 2 Subscription 29 4 3 Firewall 29 4 4 Uninstallation 30 Chapter 5 Technical Suppor...

Страница 5: ...1 ABOUT THIS GUIDE How This Guide Is Organized 2 Conventions Used in F Secure Guides 3...

Страница 6: ...pter 2 Installation Gives instructions on installing and setting up F Secure Mobile Security Chapter 3 Using F Secure Mobile Security Describes how to use F Secure Mobile Security Chapter 4 Troublesho...

Страница 7: ...l Italics black is used for file and folder names for figure and table captions and for directory tree names Courier New is used for messages on your computer screen WARNING The warning symbol indicat...

Страница 8: ...ortable Document Format The PDF document can be used for online viewing and printing using Adobe Acrobat Reader When printing the manual please print the entire manual including the copyright and disc...

Страница 9: ...5 1 INTRODUCTION F Secure Mobile Security 6 Key Features 6...

Страница 10: ...ion database F Secure Mobile Security gets the latest virus definition databases automatically 1 2 Key Features F Secure Mobile Security offers the following key features Transparent Operation The app...

Страница 11: ...7 2 INSTALLATION System Requirements 8 Installing F Secure Mobile Security 8 Uninstalling F Secure Mobile Security 10...

Страница 12: ...ement and press Ok 4 Wait until the installation is complete 5 Enter your subscription number when prompted 6 Press Yes to update the virus definition database Device Nokia Series 80 devices Nokia 930...

Страница 13: ...age as an SMS message If you do not receive it enter your subscription number when you start the F Secure Mobile Security for the first time To activate the update service later press Activate in the...

Страница 14: ...Mobile Security 1 Open F Secure Mobile Security 2 Open Tools menu and select Uninstall Mobile Security 3 Press Unistall to confirm the uninstallation IMPORTANT Remove all quarantined and infected fil...

Страница 15: ...F SECURE MOBILE SECURITY Overview 12 Starting F Secure Mobile Security 12 Main View 13 Selecting the Virus Protection 14 Processing Infected Files 17 Keeping F Secure Mobile Security Up To Date 19 Fi...

Страница 16: ...t When F Secure Mobile Security detects an infected file you can delete or quarantine it If you delete the file it is removed completely while the quarantined file is locked up so that it cannot be ac...

Страница 17: ...anual Scan 15 Press Update to get the latest virus definition database update For more information see Keeping F Secure Mobile Security Up To Date 19 Virus protection Displays the type of virus scan i...

Страница 18: ...anning type 1 Press Settings in the main view 2 Select Virus Protection then select one of the following Real time F Secure Mobile Security runs in the background and scans files when they are accesse...

Страница 19: ...Security detects a virus during a real time scan it displays the following warning Figure 3 2 Virus alert in F Secure Mobile Security Press View to view a list of all infected files For more informat...

Страница 20: ...cted The number of infections found Press Infections to to view a list of infected files For more information about removing infected files see Processing Infected Files 17 Not Scanned The number of f...

Страница 21: ...obile Security The list displays the name of the infected file and the current infection status A Quarantined file is locked and cannot be accessed A Released file is infected but is not quarantined S...

Страница 22: ...ls view displays the path and file name of the infected file and the name of the virus that has infected the file Press Close to close the Infections list and return to the main view You can find in d...

Страница 23: ...n a connection to the Internet or manually whenever you want Automatic Updates You can set F Secure Mobile Security to download updates automatically once a day when the device has an active connectio...

Страница 24: ...ect the Internet access point to connect to the update server F Secure Mobile Security connects to the update server and downloads the latest virus definition database The application takes the virus...

Страница 25: ...nuously protected you should purchase additional service time well before the expiration date The additional service time purchased is either added to the time remaining in your previous order or to y...

Страница 26: ...evel gives you good protection and does not affect using the most common applications Figure 3 6 Firewall Settings with Normal protection level 3 7 1 Protection Levels The firewall has five protection...

Страница 27: ...y used applications High protection Deny All Stops all network traffic You cannot use your e mail MMS or web services Total protection Custom Allows preinstalled applications to connect but may stop r...

Страница 28: ...l The Internet uses Internet Protocol IP packets to deliver information from one device to another IP packets include other protocols which are designed for different kinds of tasks Port A port is an...

Страница 29: ...akes it possible for two devices to make a connection and exchange information TCP guarantees that the information is delivered in exactly the same form it was sent TCP is often referred to as TCP IP...

Страница 30: ...26 4 TROUBLESHOOTING Updates 27 Subscription 29 Firewall 29 Uninstallation 30...

Страница 31: ...ernet access point settings with your operator You should also check that the date and time settings in your device are correct If you have problems connecting through WAP access points you should con...

Страница 32: ...1MB the automatic updates add approximately 10 cents to your phone bill If an updated application is also available because of the large amount of data F Secure Mobile Security displays the amount of...

Страница 33: ...g Subscription Service Time 21 4 3 Firewall Q How can I use IM with F Secure Mobile Security A IM works with Allow All and Normal protection levels If you are using High protection you have to make a...

Страница 34: ...30 4 4 Uninstallation Q I can t uninstall F Secure Mobile Security what should I do A Check that you don t have an active or open connection through the firewall close all connections and try again...

Страница 35: ...31 5 TECHNICAL SUPPORT Overview 32 Web Club 32 Virus Descriptions on the Web 32 Electronic Mail Support 32...

Страница 36: ...ite open the Web Club page and click Web Club on the Web Club tab of the General property page To connect to the Web Club directly from within your Web browser go to http www f secure com webclub 5 3...

Страница 37: ...your F Secure software program including the build number if available Name and version number of your operating system including the build number A detailed description of the problem including any...

Страница 38: ...er Communications The latest real time virus threat scenario news are available at the F Secure Antivirus Research Team weblog at http www f secure com weblog Services for Individuals and Businesses F...

Страница 39: ...www f secure com...

Отзывы: