DL manuals F-SECURE Other MOBILE SECURITY 6 FOR S60 - User Manual F-SECURE MOBILE SECURITY 6 FOR S60 - User Manual - page 3 Other manuals for MOBILE SECURITY 6 FOR S60 -: Quick Manual 12345678910111213141516171819202122232425262728293031323334353637 Page of 37 Go Download Print this page Bookmark us iii Contents About This Guide 1 How This Guide Is Organized .............................................................................................. 2 Conventions Used in F-Secure Guides ................................................................................ 3 Symbols ...................................................................................................................... 3 Chapter 1 Introduction 5 1.1 F-Secure Mobile Security............................................................................................. 6 1.2 Key features ................................................................................................................. 7 Chapter 2 Installation 8 2.1 System requirements ................................................................................................... 9 2.2 Getting the product running on your device ................................................................. 9 2.2.1 Installation ........................................................................................................ 9 2.2.2 Activating the product after the installation..................................................... 11 2.3 Transferring the subscription to a new device............................................................ 12 2.4 Uninstalling................................................................................................................. 12 Chapter 3 Using F-Secure Mobile Security 13 3.1 Opening and closing the application .......................................................................... 14 3.2 Scanning for viruses................................................................................................... 15 3.2.1 Selecting the virus protection mode ............................................................... 15 3.2.2 Processing infected files................................................................................. 17 3.3 Using firewall..............................................................................................................18 « ‹ Prev1234567Next › »