DL manuals F-SECURE Other MOBILE SECURITY 3.0 FOR S60 User Manual F-SECURE MOBILE SECURITY 3.0 FOR S60 User Manual - page 3 12345678910111213141516171819202122232425262728293031 Page of 31 Go Download Print this page Bookmark us iii Contents About This Guide 1 How This Guide Is Organized .............................................................................................. 2 Conventions Used in F-Secure Guides................................................................................ 3 Symbols ...................................................................................................................... 3 Chapter 1 Introduction 5 1.1 F-Secure Mobile Security.............................................................................................6 1.2 Key Features................................................................................................................6 Chapter 2 Installation 7 2.1 System Requirements..................................................................................................8 2.2 Getting the Product Running on Your Device ..............................................................8 2.2.1 Installation ........................................................................................................8 2.2.2 Activating the Update Service ..........................................................................9 2.3 Transferring Subscription to a New Device................................................................10 2.4 Uninstalling.................................................................................................................11 Chapter 3 Using F-Secure Mobile Security 12 3.1 Opening and Closing the Application .........................................................................13 3.2 Scanning for Viruses ..................................................................................................14 3.2.1 Selecting the Virus Protection Mode ..............................................................14 3.2.2 Processing Infected Files ...............................................................................15 3.3 Using Firewall.............................................................................................................17 « ‹ Prev1234567Next › »