DL manuals F-SECURE Other MOBILE SECURITY FOR WINDOWS MOBILE - User Manual F-SECURE MOBILE SECURITY FOR WINDOWS MOBILE - User Manual - page 3 Other manuals for MOBILE SECURITY FOR WINDOWS MOBILE -: Quick Manual 1234567891011121314151617181920212223242526272829303132333435 Page of 35 Go Download Print this page Bookmark us iii Contents About This Guide 1 How This Guide Is Organized .............................................................................................. 2 Conventions Used in F-Secure Guides ................................................................................ 3 Chapter 1 Introduction 5 1.1 F-Secure Mobile Security............................................................................................. 6 1.2 Key features ................................................................................................................. 6 Chapter 2 Installation and Activation 7 2.1 System Requirements.................................................................................................. 8 2.2 Getting the Product Running on Your Windows Mobile ............................................... 8 2.2.1 Installation ........................................................................................................ 8 2.2.2 Activating The Update Service ....................................................................... 10 2.3 Transferring Subscription to a New Device ................................................................ 11 2.4 Uninstalling F-Secure Mobile Security ....................................................................... 11 Chapter 3 Using F-Secure Mobile Security 13 3.1 Opening and Closing the Application ......................................................................... 14 3.2 Scanning for Viruses .................................................................................................. 15 3.2.1 Selecting the Virus Protection Mode .............................................................. 15 3.2.2 Processing Infected Files ............................................................................... 16 3.3 Using Firewall............................................................................................................. 18 3.3.1 Selecting the Protection Level ........................................................................ 18 « ‹ Prev1234567Next › »