![Nokia 9300i Скачать руководство пользователя страница 88](http://html.mh-extra.com/html/nokia/9300i/9300i_user-manual_253843088.webp)
browse for the certificate file. Press
Delete
to remove a
selected certificate.
To check the authenticity of a certificate, select
Security
>
Certificate manager
. Select a certificate, and
press
View details
. The
Issued to:
field identifies the
owner of this certificate. Make sure that this is the name
of the party to whom the certificate belongs. The
Fingerprint:
field uniquely identifies the certificate.
Contact the help desk or customer service of the owner of
the certificate and ask for the MD5 fingerprint of the
certificate. Compare the fingerprint with the one shown
in the dialog to check whether they match.
Tip: Check the authenticity of a certificate each
time you add a new certificate.
To change the trust settings of a certificate, select
Security
>
Certificate manager
. Select the certificate,
press
View details
, and press
Trust settings
. Depending on
the certificate, a list of the applications that can use the
selected certificate is shown. Select an application field,
and change the value to
Yes
or
No
. Note that you cannot
change the trust settings of a personal certificate.
To change the private key store password, select
Security
>
Certificate manager
, select the
Password
page, and press
Change password
. Enter the current
password, press
OK
, and enter the new password twice.
You need the private key store password when using
personal certificates. The private key store contains the
secret keys that come with personal certificates.
Extras
Go to
Desk
>
Tools
>
Control panel
>
Extras
.
About product
To view the version number of the software, select
Extras
>
About product
, and scroll to the bottom of the
dialog.
Location privacy
Some networks allow others to request the position of
your device (network service). Note that a separate
positioning module is needed for this service.
To set the device to accept or reject all position requests,
select
Extras
>
Location privacy
, and select the
Verification policy
field. Select
Accept all
or
Reject all
.
Location request log
To view the location request log, select
Extras
>
Location
request log
. The log shows a list of received location
requests, displaying the name or phone number of the
requester, time and date, and whether the request was
accepted.
HP printer selection
See "Managing mobile printing settings," p. 110.
Service command editor
Service requests, also known as USSD commands, are
messages that you send to your service provider. These
may be activation commands for network services.
88
Cont
rol panel
Cyan
Cyan
Magenta
Magenta
Yellow
Yellow
Black
Black
file:///C:/USERS/MODEServer/zmao/3934007/ra-8_minime/en/issue_1/ra-8_minime_en_1.xml
Page 88
Sep 27, 2005 12:15:21 PM
Cyan
Cyan
Magenta
Magenta
Yellow
Yellow
Black
Black
file:///C:/USERS/MODEServer/zmao/3934007/ra-8_minime/en/issue_1/ra-8_minime_en_1.xml
Page 88
Sep 27, 2005 12:15:21 PM