Home > Samsung > Telephone > Samsung Intensity 2 Manual

Samsung Intensity 2 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Samsung Intensity 2 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1705 Samsung manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							176
    Algorithm in all material mentioning or referencing this software 
    or this function.
    License is also granted to make and use derivative works 
    provided that such works are identified as derived from the RSA 
    Data Security, Inc. MD5 Message-Digest Algorithm in all 
    material mentioning or referencing the derived work.
    RSA Data Security, Inc. makes no representations concerning 
    either the merchantability of this software or the suitability of this 
    software for any particular purpose. It is provided as is without 
    express or implied warranty of any kind.
    These notices must be retained in any copies of any part of this 
    documentation and/or software.
    Copyright (c) 1989 Regents of the University of California.
    All rights reserved.
    Redistribution and use in source and binary forms are permitted 
    provided that the above copyright notice and this paragraph are 
    duplicated in all such forms and that any documentation, 
    advertising materials, and other materials related to such 
    distribution and use acknowledge that the software was 
    developed by the University of California, Berkeley.  The name of 
    the University may not be used to endorse or promote products 
    derived from this software without specific prior written 
    permission. THIS SOFTWARE IS PROVIDED ``AS IS AND WITHOUT ANY 
    EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT 
    LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY 
    AND FITNESS FOR A PARTICULAR PURPOSE.
    LICENSE ISSUES
    ==============
    The OpenSSL toolkit stays under a dual license, i.e. both the 
    conditions of the OpenSSL License and the original SSLeay 
    license apply to the toolkit. See below for the actual license texts. 
    Actually both licenses are BSD-style Open Source licenses. In 
    case of any license issues related to OpenSSL please contact 
    [email protected].
    OpenSSL License
    Copyright (c) 1998-2004 The OpenSSL Project. 
    All rights reserved.
    Redistribution and use in source and binary forms, with or 
    without modification, are permitted provided that the following 
    conditions are met:
    1) Redistributions of source code must retain the above copyright 
    notice, this list of conditions and the following disclaimer.
    2) Redistributions in binary form must reproduce the above 
    copyright notice, this list of conditions and the following 
    u460.book  Page 176  Tuesday, June 8, 2010  5:09 PM 
    						
    							Warranty Information       177
    disclaimer in the documentation and/or other materials provided 
    with the distribution.
    3) All advertising materials mentioning features or use of this 
    software must display the following acknowledgment:
    This product includes software developed by the OpenSSL 
    Project for use in the OpenSSL Toolkit. (
    http://www.openssl.org/)
    4) The names OpenSSL Toolkit and OpenSSL Project must 
    not be used to endorse or promote products derived from this 
    software without prior written permission. For written 
    permission, please contact [email protected].
    5) Products derived from this software may not be called 
    OpenSSL nor may OpenSSL appear in their names without 
    prior written permission of the OpenSSL Project.
    6) Redistributions of any form whatsoever must retain the 
    following acknowledgment: 
    This product includes software developed by the OpenSSL 
    Project for use in the OpenSSL Toolkit (http://www.openssl.org/)
    THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS 
    IS AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, 
    BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 
    MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 
    ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT 
    OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 
    DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 
    SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 
    PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND 
    ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 
    LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 
    ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN 
    IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    This product includes cryptographic software written by Eric 
    Young ([email protected]). This product includes software 
    written by Tim Hudson ([email protected]).
    Original SSLeay License
    Copyright (C) 1995-1998 Eric Young ([email protected])
    All rights reserved.
    This package is an SSL implementation written by Eric Young 
    ([email protected]).
    The implementation was written so as to conform with 
    Netscape’s SSL.
    This library is free for commercial and non-commercial use as 
    long as the following conditions are adhered to. The following 
    conditions apply to all code found in this distribution, be it the 
    RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL 
    documentation included with this distribution is covered by the 
    u460.book  Page 177  Tuesday, June 8, 2010  5:09 PM 
    						
    							178
    same copyright terms except that the holder is Tim Hudson 
    ([email protected]). Copyright remains Eric Youngs, and as such 
    any Copyright notices in the code are not to be removed. If this 
    package is used in a product, Eric Young should be given 
    attribution as the author of the parts of the library used. 
    This can be in the form of a textual message at program startup 
    or in documentation (online or textual) provided with the 
    package.
    Redistribution and use in source and binary forms, with or 
    without modification, are permitted provided that the following 
    conditions are met:
    1) Redistributions of source code must retain the copyright 
    notice, this list of conditions and the following disclaimer.
    2) Redistributions in binary form must reproduce the above 
    copyright notice, this list of conditions and the following 
    disclaimer in the documentation and/or other materials provided 
    with the distribution.
    3) All advertising materials mentioning features or use of this 
    software must display the following acknowledgement:
    This product includes cryptographic software written by Eric 
    Young([email protected])
    The word cryptographic can be left out if the routines from the 
    library being used are not cryptographic related).4) If you include any Windows specific code (or a derivative 
    thereof) from the apps directory (application code) you must 
    include an acknowledgement: This product includes software 
    written by Tim Hudson ([email protected])
    THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS AND ANY 
    EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 
    LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY 
    AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN 
    NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 
    FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, 
    OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 
    TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 
    OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 
    HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER 
    IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 
    NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE 
    USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY 
    OF SUCH DAMAGE.
    The license and distribution terms for any publicly available 
    version or derivative of this code cannot be changed. i.e. this 
    code cannot simply be copied and put under another distribution 
    license [including the GNU Public Licence.]
    u460.book  Page 178  Tuesday, June 8, 2010  5:09 PM 
    						
    							Warranty Information       179
    Copyright (C) 2004, Karlsruhe University
    Redistribution and use in source and binary forms, with or without 
    modification, are permitted provided that the following conditions 
    are met:
    1. Redistributions of source code must retain the above copyright 
    notice, this list of conditions and the following disclaimer.
    2. Redistributions in binary form must reproduce the above 
    copyright notice, this list of conditions and the following 
    disclaimer in the documentation and/or other materials provided 
    with the distribution.
    THIS SOFTWARE IS PROVIDED BY THE AUTHOR AS IS AND ANY 
    EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 
    LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY 
    AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN 
    NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, 
    INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 
    CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 
    PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF 
    USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 
    HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER 
    IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 
    NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE 
    USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY 
    OF SUCH DAMAGE.
    The Australian Public Licence B (OZPLB)  Version 1-0
    Copyright (c) 2005, University of New South Wales, Australia
    All rights reserved.
    Developed by: Operating Systems, Embedded and Distributed 
    Systems Group (DiSy), University of New South Wales
    http://www.disy.cse.unsw.edu.au
    Permission is granted by University of New South Wales, free of 
    charge, to any person obtaining a copy of this software and any 
    associated documentation files (the Software) to deal with the 
    Software without restriction, including (without limitation) the 
    rights to use, copy, modify, adapt, merge, publish, distribute, 
    communicate to the public, sublicense, and/or sell, lend or rent 
    out copies of the Software, and to permit persons to whom the 
    Software is furnished to do so, subject to the following 
    conditions:
    Redistributions of source code must retain the above copyright 
    notice, this list of conditions and the following disclaimers.
    Redistributions in binary form must reproduce the above 
    copyright notice, this list of conditions and the following 
    disclaimers in the documentation and/or other materials provided 
    with the distribution.
    Neither the name of University of New South Wales, nor the 
    names of its contributors, may be used to endorse or promote 
    u460.book  Page 179  Tuesday, June 8, 2010  5:09 PM 
    						
    							180
    products derived from this Software without specific prior written 
    permission.
    EXCEPT AS EXPRESSLY STATED IN THIS LICENCE AND TO THE 
    FULL EXTENT PERMITTED BY APPLICABLE LAW, THE SOFTWARE 
    IS PROVIDED AS-IS, AND NATIONAL ICT AUSTRALIA AND ITS 
    CONTRIBUTORS MAKE NO REPRESENTATIONS, WARRANTIES OR 
    CONDITIONS OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING 
    BUT NOT LIMITED TO ANY REPRESENTATIONS, WARRANTIES OR 
    CONDITIONS REGARDING THE CONTENTS OR ACCURACY OF THE 
    SOFTWARE, OR OF TITLE, MERCHANTABILITY, FITNESS FOR A 
    PARTICULAR PURPOSE, NONINFRINGEMENT, THE ABSENCE OF 
    LATENT OR OTHER DEFECTS, OR THE PRESENCE OR ABSENCE 
    OF ERRORS, WHETHER OR NOT DISCOVERABLE.
    TO THE FULL EXTENT PERMITTED BY APPLICABLE LAW, IN NO 
    EVENT SHALL NATIONAL ICT AUSTRALIA OR ITS CONTRIBUTORS 
    BE LIABLE ON ANY LEGAL THEORY (INCLUDING, WITHOUT 
    LIMITATION, IN AN ACTION OF CONTRACT, NEGLIGENCE OR 
    OTHERWISE) FOR ANY CLAIM, LOSS, DAMAGES OR OTHER 
    LIABILITY, INCLUDING (WITHOUT LIMITATION) LOSS OF 
    PRODUCTION OR OPERATION TIME, LOSS, DAMAGE OR 
    CORRUPTION OF DATA OR RECORDS; OR LOSS OF ANTICIPATED 
    SAVINGS, OPPORTUNITY, REVENUE, PROFIT OR GOODWILL, OR 
    OTHER ECONOMIC LOSS; OR ANY SPECIAL, INCIDENTAL, 
    INDIRECT, CONSEQUENTIAL, PUNITIVE OR EXEMPLARY 
    DAMAGES, ARISING OUT OF OR IN CONNECTION WITH THIS LICENCE, THE SOFTWARE OR THE USE OF OR OTHER DEALINGS 
    WITH THE SOFTWARE, EVEN IF NATIONAL ICT AUSTRALIA OR ITS 
    CONTRIBUTORS HAVE BEEN ADVISED OF THE POSSIBILITY OF 
    SUCH CLAIM, LOSS, DAMAGES OR OTHER LIABILITY.
    If applicable legislation implies representations, warranties, or 
    conditions, or imposes obligations or liability on University of New 
    South Wales or one of its contributors in respect of the Software 
    that cannot be wholly or partly excluded, restricted or modified, 
    the liability of University of New South Wales or the contributor is 
    limited, to the full extent permitted by the applicable legislation, 
    at its option, to:
    a. in the case of goods, any one or more of the following:
    i. the replacement of the goods or the supply of equivalent goods;
    ii. the repair of the goods;
    iii. the payment of the cost of replacing the goods or of acquiring 
    equivalent goods;
    iv. the payment of the cost of having the goods repaired; or
    b. in the case of services:
    i. the supplying of the services again; or
    ii. the payment of the cost of having the services supplied again.
    The construction, validity and performance of this licence is 
    governed by the laws in force in New South Wales, Australia.
    u460.book  Page 180  Tuesday, June 8, 2010  5:09 PM 
    						
    							Warranty Information       181
    Copyright (C) 2003-2006, National ICT Australia (NICTA)
    Redistribution and use in source and binary forms, with or 
    without modification, are permitted provided that the following 
    conditions are met:
    1. Redistributions of source code must retain the above copyright 
    notice, this list of conditions and the following disclaimer.
    2. Redistributions in binary form must reproduce the above 
    copyright notice, this list of conditions and the following 
    disclaimer in the documentation and/or other materials provided 
    with the distribution.
    THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND 
    CONTRIBUTORS ``AS IS AND ANY EXPRESS OR IMPLIED 
    WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 
    WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A 
    PARTICULAR USE.
    ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR 
    CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IDENTAL, 
    SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES 
    (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 
    SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 
    PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND 
    ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 
    LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN 
    IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.Mach Operating System
    Copyright (c) 1993 Carnegie Mellon University
    All Rights Reserved.
    Permission to use, copy, modify and distribute this software and 
    its documentation is hereby granted, provided that both the 
    copyright notice and this permission notice appear in all copies of 
    the software, derivative works or modified versions, and any 
    portions thereof, and that both notices appear in supporting 
    documentation.
    CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN 
    ITS AS IS CONDITION.  CARNEGIE MELLON DISCLAIMS ANY 
    LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER 
    RESULTING FROM THE USE OF THIS SOFTWARE.
    Carnegie Mellon requests users of this software to return to:
    Software Distribution Coordinator, or 
    [email protected]
    School of Computer Science
    Carnegie Mellon University
    Pittsburgh PA 15213-3890
    any improvements or extensions that they make and grant 
    Carnegie Mellon the rights to redistribute these changes.
    u460.book  Page 181  Tuesday, June 8, 2010  5:09 PM 
    						
    							182
    Precautions for Transfer and Disposal
    If data stored on this device is deleted or reformatted using the 
    standard methods, the data only appears to be removed on a 
    superficial level, and it may be possible for someone to retrieve 
    and reuse the data by means of special software.
    To avoid unintended information leaks and other problems of this 
    sort, it is recommended that the device be returned to Samsung’s 
    Customer Care Center for an Extended File System (EFS) Clear 
    which will eliminate all user memory and return all settings to 
    default settings. Please contact the 
    Samsung Customer Care 
    Center for details.
    Important!: Please provide warranty information (proof of purchase) to 
    Samsung’s Customer Care Center in order to provide this service 
    at no charge. If the warranty has expired on the device, charges 
    may apply.
    Customer Care Center:
    1000 Klein Rd.
    Plano, TX 75074
    Toll Free Tel: 1.888.987.HELP (4357)
    Samsung Telecommunications America, LLC:
    1301 East Lookout Drive
    Richardson, Texas 75082
    Phone: 1-800-SAMSUNG (726-7864)
    Important!: If you are using a handset other than a standard numeric keypad, dial the numbers listed in brackets.
    Phone: 1-888-987-HELP (4357)©2010 Samsung Telecommunications America. All rights 
    reserved.
    No reproduction in whole or in part allowed without prior written 
    approval. Specifications and availability subject to change 
    without notice.
    u460.book  Page 182  Tuesday, June 8, 2010  5:09 PM 
    						
    							       183
    Index
    AAdding a New Contact 43Alarm Clock
    disabling an alarm 106erasing an alarm 107setting an alarm 106Answer Options 133Answering a Call 34Assisted Dialing 136Auto Retry 134
    B
    Backup Assistant 58Banners
    ERI 119personal 118Battery
    charging 8indicator 6installing 7non-supported batteries 9removing 7Bluetooth
    menu 112
    options 113sending My Name Card 57sending name cards (vCards) 57service profiles 112Browse & Download 85
    C
    Calculator 102Converter 104Eco 103Normal 102Tip 103Calendar
    adding a new event 104viewing an event 105Call Functions
    answering a call 34answering Call-Waiting calls 34Call In-Progress options 35making a call 34Recent Calls 35sending calls to Voicemail 34Voice Commands 37
    Call Settings
    Answer Options 133Assisted Dialing 136Auto Retry 134data settings 135DTMF Tones 135One Touch Dial 134TTY Mode 134Voice Privacy 135Camera
    key 17, 21lens 19options 99settings 99taking pictures 98Chat 77Clock Format 124Contacts
    adding 43Backup Assistant 58editing 46erasing 45Favorites 52
    u460.book  Page 183  Tuesday, June 8, 2010  5:09 PM 
    						
    							184
    fields 43finding 48Groups 49managing 47My Name Card 56speed dials 51Converter 104
    DData Settings 135Dial Fonts 123Dialing
    assisted 136Directional Keys 20Display
    backlight 119banners 118Easy Set-up 118language 127settings 118themes 121DTMF Tones 135
    EEasy Set-up
    Displays 10, 118Sounds 10, 116
    Email 75mobile email 75mobile web mail 76Emergency Contacts
    adding 54re-assigning or unassigning 55End/Power key 21Entering Text 59changing text entry mode 60entering numbers 62entering smileys 63entering symbols 62entering upper and lower case 62using Palabra mode 61using T9 Word 61ERI Banner 119
    F
    Favorites 52assigning 53removing 53using 54Fonts
    dial 123menu 123messaging font size 124
    settings 123
    GGames 84Getting Started 4Groups 49changing contact assignments 50creating 50sending messages 51viewing 49
    H
    HAC 151Health and Safety Information 139Home screen 23banners 118changing font color 125changing wallpaper 120choosing font colors 24event status icons 26features 23icons 24setting clock format 124setting display theme 121
    I
    Icons
    Annunciator line 24
    u460.book  Page 184  Tuesday, June 8, 2010  5:09 PM 
    						
    							       185
    Event Status 26Home screen 24In Case of Emergency 54assigning 54entering personal info 55removing emergency contacts 55
    K
    Keypad
    lock settings 115
    L
    Language setting 127Left soft key 20Lock
    edit codes 128key 22setting 130Locking and Unlocking
    locking the keypad 12locking the phone 11unlocking the keypad 12unlocking the phone 11
    MMain Menu Settings 121Media Center
    Extras 85
    Music & Tones 80Search 80Memory Card
    formatting 14installing 13removing 14Memory Settings 136card 137phone 137save options 136Menu
    customizing 26items 27number accelerators 28outline 28understanding 26Messaging 64font size 124Message Folders 71New Message Key 64Picture Messages 66Quick Reply 64QWERTY action 64settings 78Text Messages 65
    types of messages 64viewing by contact (threaded) 71viewing by time 72Voice Messages 68Mobile IM 76Mobile Web 84command keys 87entering a URL 88exiting 86launching 86navigating 87options menu 90placing calls 91screen orientation 87settings 91using Favorites 88M-Ratings 151Music & Tones 80My Music 81, 93add to playlist 94creating a playlist 94editing a playlist 95player settings 94playing music 93sync music 82
    u460.book  Page 185  Tuesday, June 8, 2010  5:09 PM 
    						
    All Samsung manuals Comments (0)

    Related Manuals for Samsung Intensity 2 Manual