DL manuals F-SECURE Other MOBILE SECURITY FOR S60 - User Manual F-SECURE MOBILE SECURITY FOR S60 - User Manual - page 3 Other manuals for MOBILE SECURITY FOR S60 -: Quick Manual 123456789101112131415161718192021222324252627282930313233 Page of 33 Go Download Print this page Bookmark us iii Contents About This Guide 1 How This Guide Is Organized .............................................................................................. 2 Conventions Used in F-Secure Guides ................................................................................ 3 Symbols ...................................................................................................................... 3 Chapter 1 Introduction 5 1.1 F-Secure Mobile Security............................................................................................. 6 1.2 Key Features................................................................................................................ 6 Chapter 2 Installation 7 2.1 System Requirements.................................................................................................. 8 2.2 Getting the Product Running on Your Device .............................................................. 8 2.2.1 Installation ........................................................................................................ 8 2.2.2 Activating the Update Service ........................................................................ 10 2.3 Transferring Subscription to a New Device ................................................................ 11 2.4 Uninstalling................................................................................................................. 11 Chapter 3 Using F-Secure Mobile Security 12 3.1 Opening and Closing the Application ......................................................................... 13 3.2 Scanning for Viruses .................................................................................................. 14 3.2.1 Selecting the Virus Protection Mode .............................................................. 14 3.2.2 Processing Infected Files ............................................................................... 15 3.3 Using Firewall............................................................................................................. 17 « ‹ Prev1234567Next › »