If you remove software, you can only reinstall it by using the original software package file, or by restoring a full backup thatcontains the removed software package. If you remove a software package, you may no longer be able to open files createdwith that software. If another software package depends on the software package that you removed, the other software packagemay stop working. Refer to the documentation of the installed software package for details.View the installation logTo view the installation log, select Options > View log. A list shows what software has been installed and removed, and the dateof installation or removal. If you encounter problems with the device after installing a software package, you can use this listto find out which software package may be the cause of the problem. The information in this list may also help to pinpointproblems that are caused by software packages that are incompatible with each other.SettingsTo modify installation settings, select Options > Settings and from the following:• Delete — The software package installation file is deleted from the device after installation. If you download softwarepackages using the Web browser, this may help to reduce the amount of storage space required. If you want to store thesoftware package file for possible reinstallation, do not select this option, or make sure that you have a copy of the softwarepackage file stored on a compatible PC or on a CD-ROM.• Select language: — If the software package contains several language versions of the software, select the language versionthat you want to install.• Type — Specify what kind of applications you want installed. You may choose to install only applications with validatedcertificates. This setting applies only to Symbian operating system applications (.sis files).Specify Java application security settingsTo specify security settings for a Java application, select Options > Suite settings.You can define which functions the Java application can access. The value that you can set for each functionality depends onthe protection domain of the software package.• Network access — Create a data connection to the network.• Messaging — Send messages.• App. auto-start — Open the application automatically.• Connectivity — Activate a local data connection, such as a Bluetooth connectivity.• Multimedia — Take pictures or record videos or sound.• Read user data — Read your calendar entries, contacts, or any other personal data• Edit user data — Add personal data, such as entries to your address book.You can define how you will be prompted to confirm Java application access to device functions. Select one of the followingvalues:• Ask every time — Require the Java application to ask for your confirmation each time it uses the functionality.• Ask first time — Require the Java application to ask for initial confirmation to use the functionality.• Always allowed — Allow the Java application to use the functionality without your confirmation.• Not allowed — Prevent the Java application from using the functionality.The security settings help protect your device against harmful Java applications that may use the functions of your device withoutyour permission. Only select Always allowed if you know the supplier and trustworthiness of the application.Certificate managerImportant: Note that even if the use of certificates makes the risks involved in remote connections and softwareinstallation considerably smaller, they must be used correctly in order to benefit from increased security. The existenceof a certificate does not offer any protection by itself; the certificate manager must contain correct, authentic, or trustedcertificates for increased security to be available. Certificates have a restricted lifetime. If Expired certificate or Certificatenot valid yet is shown even if the certificate should be valid, check that the current date and time in your device arecorrect.Before changing any certificate settings, you must make sure that you really trust the owner of the certificate and thatthe certificate really belongs to the listed owner.Digital certificates are used to verify the origins of software but do not guarantee safety. There are three different types ofcertificates: authority certificates, personal certificates, and server certificates. During a secure connection, a server may send aserver certificate to your device. Upon receipt, it is checked through an authority certificate stored on your device. You receivenotification if the identity of the server is not authentic or if you do not have the correct certificate in your device.Download a certificate from a web site, or receive a certificate as an e-mail attachment, or as a message sent through a Bluetoothor infrared connection. Certificates should be used when you connect to an online bank or a remote server to transfer confidentialT o o l sCopyright © 2006 Nokia. All Rights Reserved. 82