Samsung Intensity 2 Manual
Have a look at the manual Samsung Intensity 2 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1705 Samsung manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
176 Algorithm in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided as is without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software. Copyright (c) 1989 Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. LICENSE ISSUES ============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact [email protected]. OpenSSL License Copyright (c) 1998-2004 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1) Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2) Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following u460.book Page 176 Tuesday, June 8, 2010 5:09 PM
Warranty Information 177 disclaimer in the documentation and/or other materials provided with the distribution. 3) All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. ( http://www.openssl.org/) 4) The names OpenSSL Toolkit and OpenSSL Project must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected]. 5) Products derived from this software may not be called OpenSSL nor may OpenSSL appear in their names without prior written permission of the OpenSSL Project. 6) Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/) THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product includes cryptographic software written by Eric Young ([email protected]). This product includes software written by Tim Hudson ([email protected]). Original SSLeay License Copyright (C) 1995-1998 Eric Young ([email protected]) All rights reserved. This package is an SSL implementation written by Eric Young ([email protected]). The implementation was written so as to conform with Netscape’s SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the u460.book Page 177 Tuesday, June 8, 2010 5:09 PM
178 same copyright terms except that the holder is Tim Hudson ([email protected]). Copyright remains Eric Youngs, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1) Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2) Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3) All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young([email protected]) The word cryptographic can be left out if the routines from the library being used are not cryptographic related).4) If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson ([email protected]) THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public Licence.] u460.book Page 178 Tuesday, June 8, 2010 5:09 PM
Warranty Information 179 Copyright (C) 2004, Karlsruhe University Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The Australian Public Licence B (OZPLB) Version 1-0 Copyright (c) 2005, University of New South Wales, Australia All rights reserved. Developed by: Operating Systems, Embedded and Distributed Systems Group (DiSy), University of New South Wales http://www.disy.cse.unsw.edu.au Permission is granted by University of New South Wales, free of charge, to any person obtaining a copy of this software and any associated documentation files (the Software) to deal with the Software without restriction, including (without limitation) the rights to use, copy, modify, adapt, merge, publish, distribute, communicate to the public, sublicense, and/or sell, lend or rent out copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimers. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimers in the documentation and/or other materials provided with the distribution. Neither the name of University of New South Wales, nor the names of its contributors, may be used to endorse or promote u460.book Page 179 Tuesday, June 8, 2010 5:09 PM
180 products derived from this Software without specific prior written permission. EXCEPT AS EXPRESSLY STATED IN THIS LICENCE AND TO THE FULL EXTENT PERMITTED BY APPLICABLE LAW, THE SOFTWARE IS PROVIDED AS-IS, AND NATIONAL ICT AUSTRALIA AND ITS CONTRIBUTORS MAKE NO REPRESENTATIONS, WARRANTIES OR CONDITIONS OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY REPRESENTATIONS, WARRANTIES OR CONDITIONS REGARDING THE CONTENTS OR ACCURACY OF THE SOFTWARE, OR OF TITLE, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT, THE ABSENCE OF LATENT OR OTHER DEFECTS, OR THE PRESENCE OR ABSENCE OF ERRORS, WHETHER OR NOT DISCOVERABLE. TO THE FULL EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL NATIONAL ICT AUSTRALIA OR ITS CONTRIBUTORS BE LIABLE ON ANY LEGAL THEORY (INCLUDING, WITHOUT LIMITATION, IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHERWISE) FOR ANY CLAIM, LOSS, DAMAGES OR OTHER LIABILITY, INCLUDING (WITHOUT LIMITATION) LOSS OF PRODUCTION OR OPERATION TIME, LOSS, DAMAGE OR CORRUPTION OF DATA OR RECORDS; OR LOSS OF ANTICIPATED SAVINGS, OPPORTUNITY, REVENUE, PROFIT OR GOODWILL, OR OTHER ECONOMIC LOSS; OR ANY SPECIAL, INCIDENTAL, INDIRECT, CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES, ARISING OUT OF OR IN CONNECTION WITH THIS LICENCE, THE SOFTWARE OR THE USE OF OR OTHER DEALINGS WITH THE SOFTWARE, EVEN IF NATIONAL ICT AUSTRALIA OR ITS CONTRIBUTORS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH CLAIM, LOSS, DAMAGES OR OTHER LIABILITY. If applicable legislation implies representations, warranties, or conditions, or imposes obligations or liability on University of New South Wales or one of its contributors in respect of the Software that cannot be wholly or partly excluded, restricted or modified, the liability of University of New South Wales or the contributor is limited, to the full extent permitted by the applicable legislation, at its option, to: a. in the case of goods, any one or more of the following: i. the replacement of the goods or the supply of equivalent goods; ii. the repair of the goods; iii. the payment of the cost of replacing the goods or of acquiring equivalent goods; iv. the payment of the cost of having the goods repaired; or b. in the case of services: i. the supplying of the services again; or ii. the payment of the cost of having the services supplied again. The construction, validity and performance of this licence is governed by the laws in force in New South Wales, Australia. u460.book Page 180 Tuesday, June 8, 2010 5:09 PM
Warranty Information 181 Copyright (C) 2003-2006, National ICT Australia (NICTA) Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR USE. ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, IDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.Mach Operating System Copyright (c) 1993 Carnegie Mellon University All Rights Reserved. Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided that both the copyright notice and this permission notice appear in all copies of the software, derivative works or modified versions, and any portions thereof, and that both notices appear in supporting documentation. CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS AS IS CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE. Carnegie Mellon requests users of this software to return to: Software Distribution Coordinator, or [email protected] School of Computer Science Carnegie Mellon University Pittsburgh PA 15213-3890 any improvements or extensions that they make and grant Carnegie Mellon the rights to redistribute these changes. u460.book Page 181 Tuesday, June 8, 2010 5:09 PM
182 Precautions for Transfer and Disposal If data stored on this device is deleted or reformatted using the standard methods, the data only appears to be removed on a superficial level, and it may be possible for someone to retrieve and reuse the data by means of special software. To avoid unintended information leaks and other problems of this sort, it is recommended that the device be returned to Samsung’s Customer Care Center for an Extended File System (EFS) Clear which will eliminate all user memory and return all settings to default settings. Please contact the Samsung Customer Care Center for details. Important!: Please provide warranty information (proof of purchase) to Samsung’s Customer Care Center in order to provide this service at no charge. If the warranty has expired on the device, charges may apply. Customer Care Center: 1000 Klein Rd. Plano, TX 75074 Toll Free Tel: 1.888.987.HELP (4357) Samsung Telecommunications America, LLC: 1301 East Lookout Drive Richardson, Texas 75082 Phone: 1-800-SAMSUNG (726-7864) Important!: If you are using a handset other than a standard numeric keypad, dial the numbers listed in brackets. Phone: 1-888-987-HELP (4357)©2010 Samsung Telecommunications America. All rights reserved. No reproduction in whole or in part allowed without prior written approval. Specifications and availability subject to change without notice. u460.book Page 182 Tuesday, June 8, 2010 5:09 PM
183 Index AAdding a New Contact 43Alarm Clock disabling an alarm 106erasing an alarm 107setting an alarm 106Answer Options 133Answering a Call 34Assisted Dialing 136Auto Retry 134 B Backup Assistant 58Banners ERI 119personal 118Battery charging 8indicator 6installing 7non-supported batteries 9removing 7Bluetooth menu 112 options 113sending My Name Card 57sending name cards (vCards) 57service profiles 112Browse & Download 85 C Calculator 102Converter 104Eco 103Normal 102Tip 103Calendar adding a new event 104viewing an event 105Call Functions answering a call 34answering Call-Waiting calls 34Call In-Progress options 35making a call 34Recent Calls 35sending calls to Voicemail 34Voice Commands 37 Call Settings Answer Options 133Assisted Dialing 136Auto Retry 134data settings 135DTMF Tones 135One Touch Dial 134TTY Mode 134Voice Privacy 135Camera key 17, 21lens 19options 99settings 99taking pictures 98Chat 77Clock Format 124Contacts adding 43Backup Assistant 58editing 46erasing 45Favorites 52 u460.book Page 183 Tuesday, June 8, 2010 5:09 PM
184 fields 43finding 48Groups 49managing 47My Name Card 56speed dials 51Converter 104 DData Settings 135Dial Fonts 123Dialing assisted 136Directional Keys 20Display backlight 119banners 118Easy Set-up 118language 127settings 118themes 121DTMF Tones 135 EEasy Set-up Displays 10, 118Sounds 10, 116 Email 75mobile email 75mobile web mail 76Emergency Contacts adding 54re-assigning or unassigning 55End/Power key 21Entering Text 59changing text entry mode 60entering numbers 62entering smileys 63entering symbols 62entering upper and lower case 62using Palabra mode 61using T9 Word 61ERI Banner 119 F Favorites 52assigning 53removing 53using 54Fonts dial 123menu 123messaging font size 124 settings 123 GGames 84Getting Started 4Groups 49changing contact assignments 50creating 50sending messages 51viewing 49 H HAC 151Health and Safety Information 139Home screen 23banners 118changing font color 125changing wallpaper 120choosing font colors 24event status icons 26features 23icons 24setting clock format 124setting display theme 121 I Icons Annunciator line 24 u460.book Page 184 Tuesday, June 8, 2010 5:09 PM
185 Event Status 26Home screen 24In Case of Emergency 54assigning 54entering personal info 55removing emergency contacts 55 K Keypad lock settings 115 L Language setting 127Left soft key 20Lock edit codes 128key 22setting 130Locking and Unlocking locking the keypad 12locking the phone 11unlocking the keypad 12unlocking the phone 11 MMain Menu Settings 121Media Center Extras 85 Music & Tones 80Search 80Memory Card formatting 14installing 13removing 14Memory Settings 136card 137phone 137save options 136Menu customizing 26items 27number accelerators 28outline 28understanding 26Messaging 64font size 124Message Folders 71New Message Key 64Picture Messages 66Quick Reply 64QWERTY action 64settings 78Text Messages 65 types of messages 64viewing by contact (threaded) 71viewing by time 72Voice Messages 68Mobile IM 76Mobile Web 84command keys 87entering a URL 88exiting 86launching 86navigating 87options menu 90placing calls 91screen orientation 87settings 91using Favorites 88M-Ratings 151Music & Tones 80My Music 81, 93add to playlist 94creating a playlist 94editing a playlist 95player settings 94playing music 93sync music 82 u460.book Page 185 Tuesday, June 8, 2010 5:09 PM