DL manuals F-SECURE Other MOBILE SECURITY 6 FOR WINDOWS MOBILE - User Manual F-SECURE MOBILE SECURITY 6 FOR WINDOWS MOBILE - User Manual - page 3 Other manuals for MOBILE SECURITY 6 FOR WINDOWS MOBILE -: Quick Manual 123456789101112131415161718192021222324252627282930313233343536 Page of 36 Go Download Print this page Bookmark us iii Contents About This Guide 1 How This Guide Is Organized .............................................................................................. 2 Conventions Used in F-Secure Guides ................................................................................ 3 Chapter 1 Introduction 5 1.1 F-Secure Mobile Security............................................................................................. 6 1.2 Key features ................................................................................................................. 7 Chapter 2 Installation and activation 8 2.1 System requirements ................................................................................................... 9 2.2 Getting the product running on your Windows Mobile ................................................. 9 2.2.1 Installation ........................................................................................................ 9 2.2.2 Activating the update service.......................................................................... 11 2.3 Transferring subscription to a new device.................................................................. 12 2.4 Uninstalling F-Secure Mobile Security ....................................................................... 12 Chapter 3 Using F-Secure Mobile Security 14 3.1 Opening and closing the application .......................................................................... 15 3.2 Scanning for viruses................................................................................................... 16 3.2.1 Selecting the virus protection mode ............................................................... 16 3.2.2 Processing infected files................................................................................. 18 3.3 Using firewall..............................................................................................................19 3.3.1 Selecting the protection level.......................................................................... 19 « ‹ Prev1234567Next › »