To call the contact, press the call key.To edit the phone number, select Options > Edit. Youmay need your PIN2 code to edit your fixed dialingnumbers.To delete the contact, press the backspace key.Memory card securityYou can protect a memory card with a password toprevent unauthorized access. To set a password, selectOptions > Set password. The password can be up to 8characters long and is case-sensitive. The password isstored in your device and you do not need to enter itagain while you use the memory card on the samedevice. If you use the memory card on another device,you are asked for the password. Not all memory cardssupport password protection.To remove the memory card password, select Options >Remove password. When you remove the password,the data on the memory card is not protected againstunauthorized use.Certificate managerImportant: Even if the use of certificates makesthe risks involved in remote connections and softwareinstallation considerably smaller, they must be usedcorrectly in order to benefit from increased security. Theexistence of a certificate does not offer any protectionby itself; the certificate manager must contain correct,authentic, or trusted certificates for increased securityto be available. Certificates have a restricted lifetime. If"Expired certificate" or "Certificate not valid yet" isshown even if the certificate should be valid, check thatthe current date and time in your device are correct.Before changing any certificate settings, you mustmake sure that you really trust the owner of thecertificate and that the certificate really belongs to thelisted owner.Digital certificates are used to verify the origins ofsoftware but do not guarantee safety. There are threedifferent types of certificates: authority certificates,personal certificates, and server certificates. During asecure connection, a server may send a servercertificate to your device. Upon receipt, it is checkedthrough an authority certificate stored on your device.You receive notification if the identity of the server isnot authentic or if you do not have the correctcertificate in your device.Download a certificate from a web site, or receive acertificate as an e-mail attachment, or as a messagesent through a Bluetooth or infrared connection.Certificates should be used when you connect to anonline bank or a remote server to transfer confidentialinformation. They should also be used if you want toreduce the risk of viruses or other malicious software,and to check the authenticity of software when youdownload and install software to your device.Tip: When you add a new certificate, check itsauthenticity.92 Security