The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings.

Size: px
Start display at page:

Download "The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings."

Transcription

1 Samsung C6112 telephone for protection of conversations against control via a GSM service provider as well as via active and semi-active GSM interception complexes, catchers. The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings. The telephone contains the following functions: LAC tracking Weak A5 Call ping SMS ping Channels lock Alerts Show TIMSI Clear call log One channel Fake SMS Check C2 Recording Reset settings Information: - automatic change of IMEI, protection against control via a service provider; - creation of a profile for a certain location that prevents a complex operator from catching your phone. - warning of decreased cryptographic protection with respect to A5.1; - detection of soundless calls; - detection of all types of hidden SMS and prohibition of all types of SMS that can harm the phone; - phone operation with the use of remote base stations; - choice of signals for events; - display of TIMSI on the telephone screen; - deletion of information about calls from the telephone memory; - detection of presence of one channel in the network and display of the channel number; - detection of SMS with a fake number; - detection of active complexes and catchers by C2 scanning of base stations; - automatic call recording; - reset to recommended settings; - display of the software version on the screen. If the phone detects one of enabled events, a sound alarm and/or a vibration signal is generated depending on the settings, the screen displays a message about the detected event and the SIM card associated with the detected event, the event is recorded in the log.txt file. The phone has no give-away signs that might have given away presence of the phone special functions. If you input a standard sequence of digits*#06#, the phone s own IMEI will be displayed, the same as on the label

2 of a different combination of digits. You can access a special menu with settings of extra functions only by inputting a special sequence of digits and a password. This has been done for a specific purpose, so that no one can understand that it is not a common phone. Because such knowledge can seriously help those who want to organize control of a subscriber with such a phone. The only thing in appearance that gives away this phone is an icon on the screen that is intended for visual control of the signal encryption level. Description and Purpose of Icons on the Screen. There is an icon on the phone screen that shows whether encryption is on or off and what encryption algorithm is used by the service provider. - A5.0 This icon shows that encryption is off. This may be in case if the service provider does not use signal encryption as a matter of principle or if the phone is inactive currently. - A5.0 This icon indicates that the service provider uses A5.1 encryption. Encryption is on only when the device communicates with the base station, for example making a call, sending an SMS, accessing the internet, etc. - A5.2 The icon turns yellow and number 2 appears to the right of the lock icon, this means that the service provider switched on A5.2 encryption.

3 IMEI IMEI change function* is intended mainly for protection of calls against control via the service provider, but it can also protect against intercept complexes temporarily. *Use of this function is permitted not in all countries. THIS FUNCTION IS EFFECTIVE ONLY IN CONJUNCTION WITH SIMULTANEOUS CHANGE OF THE SIM CARD! When control of your phone is organized, the following identifiers are used: 1. Your telephone number (it is not sent over the air, but the service provider knows it); 2. IMSI a unique name of the SIM card; 3. IMEI a unique name of the phone. If you change the IMEI and the SIM card and use a SIM card that you have purchased anonymously or that is registered in the name of another person, you change all the identifiers that may be used to control you. That is why the service provider does not know who should be put under control. And it will take much effort to find your new SIM card. If you change only your SIM card or only the IMEI, it will not give you the required result and you will still be controlled, as if you did not change anything! If you are controlled by interception complexes, then simultaneous change of the IMEI and the SIM card will allow you to escape from control for a while. Because you change all your identifiers included into the complex selection list and the complex operator will have to make an extra effort to find out your new identifiers, in particular by pinging, pinging will allow detection of the phone. Besides, the complex operator cannot at once realize that it has lost control over your phone. Active interception complexes may work incorrectly with different models of phones and that can result in additional signs for its detection. For example, testing of Samsung G600 device with software released in October of 2014 only with the IMEI change function has showed at one of the active complexes that when the phone enters the complex coverage area, its behaves normally in its appearance, in particular the signal level is visible. But it is not possible to make a call and it does not receive incoming calls. Note: In order to check the factory IMEI of the phone, use a standard combination: *#06# In order to check the IMEI that has been actually sent to the service provider upon the last request, use the following combination: #*1300# A secret combination for access to the EXTRA menu: *#хххххххх#, to be provided by the seller:. Menu of the IMEI Change Function with Five Modes: The phone supports two SIM cards. The IMEI change modes are used for both SIM cards independently. If the phone has only one SIM card, then the IMEI menu will immediately show settings of operation modes. If the phone has two SIM cards, then the IMEI menu will at first show the MASTER and SLAVE windows. Upon generation of a random IMEI, the first and second digits remain constant as well as the seventh and eighth digits, this is done intentionally to make IMEI resemble a real one.

4 Random always: In this mode the phone IMEI changes upon each inquiry by the service provider. An IMEI enquiry by the service provider may be received upon turning on of the phone, upon sending of an SMS, making a call or work in GPRS. The phone IMEI will change upon each enquiry by the service provider. This mode is not recommended for constant use. If you do not change the SIM card, and your IMEI is constantly changing, this will attract attention of those who control your phone, if your SIM card has become the object of attention. It will be seen that you use a new phone for each new call and this looks suspicious. New SIM: In this mode the phone IMEI changes only upon change of the SIM card. The phone IMEI will be generated once, and the phone will send it upon each enquiry by the service provider. This mode is recommended for constant use.

5 Random on first request: In this mode the phone IMEI changes only once after turning on of the device. In the following the phone will send this IMEI in response to all enquiries of IMEI by the service provider. When you turn on the device again, the IMEI will change again and will remain constant until new turning on of the device. This mode is recommended for constant use.

6 User define: In this mode the phone IMEI is defined by the user. For this you need to go down in the menu and in the Custom IMEI field input manually any IMEI. Stay original: In this mode the phone IMEI always remains original. If you go down in any window of the IMEI menu, a window will open, where you can enter the name of the service provider to be displayed on the phone screen.

7 LAC tracking In this mode the user can create a profile for a specific location. When you use this menu command, the phone automatically saves important parameters for a specific location in a profile. The user can select a desired channel depending on its strength. When the user gets back to this location, a hot button allows quick selection of a desired profile, for example a "work" profile. After selection of the desired profile, when an active complex tries to intercept you, it cannot do this. In the Tracking mode menu you can select a desired mode of operation of the phone. Either in the preset LAC or in the preset LAC and preset channel. In the Monitor menu you can see the available channels and the LAC to which they belong.

8 Weak A5 This function is intended for protection of the user from monitoring of his/her calls via active GSM interception complexes. An active interception complex is equipment that emulates a base station and makes phones operate through this equipment (a false base station) instead of a real base station. A real base station considers a false base station as a common telephone. A modern interception complex can obtain full control over an intercepted telephone, in particular: 1. Turn off encryption; 2. Decrease encryption level; 3. Do not change the encryption level, when it has A5.1 processor. There are no any other means, except this device, that would be able to detect such complexes. Currently the most common interception complexes are those which lower the level of encryption either permanently or temporarily for deciphering of the session key, after that encryption becomes the same as that used by the service provider. There are active complexes which do not lower the level of encryption; they have a built-in A5.1 processor. Weak A5 function is not intended for detection of such complexes. For this purpose there are such functions as Channel lock, One channel, Check C2 as well as other means which prevent the operator from interception of the phone. Earlier semi-active complexes were widely spread; they used to turn off encryption only for a specific controlled phone. Operation of an active complex: A car may drive up to the building, in which there is a person to be listened, or equipment may be permanently installed in such a building. A telephone automatically selects the base station with the strongest signal. A false base station becomes such a station for the controlled telephone. The telephone takes it for a real base station and start operating with it. The complex operator obtains full control over your telephone. He can not only listen to your conversations and read your SMS, but also control your phone. The possibilities of the complex to control your phone depend on its model. There are complexes which can remotely turn on the phone microphone. А5.1 algorithm is the most resistant to decryption. A5.2 is weaker and can be decrypted in real-time. Work of Weak A5 function: If you enter the area of coverage of a false base station and the phone receives a command to lower the encryption level relative to A5.1, the alarm method chosen by the user will be used. Thus you will be warned

9 Call ping This function is intended for warning the user about an attack by hidden calls. As an active complex has a limited number of channels, normally it controls only the subscribers included into its selection list. To this end the complex operator needs to know the permanent identifiers of your phone, IMSI, IMEI which are transmitted in the network and which can be included by the operator into the selection list of the GSM interception complex. In order to get these parameters the complex makes hidden calls to your phone. Such calls are interrupted before the phone starts ringing, but after the phone transmits its identifiers. In a real situation from 5 to 15 hidden calls are made in order to make sure that it is the controlled phone that responded. After their receipt IMSI and IMEI are included into the selection list of the GSM interception complex and only after that the complex can perform selective control of subscribers. The menu of the PING function is shown in the picture below. To setup the Ping function, enter the Call ping settings menu and select Mode Enable (Включено). The Pings before alert parameter determines the quantity of hidden calls, which make the phone decide that it is being pinged and turn on a sound alarm. The Interval between pings parameter determines time in seconds, during which pings by hidden calls are to be detected. This mode works as follows: for example, the following settings are input: Pings before alert 1 Interval between pings - 15 This means that only after two hidden calls a sound alarm will be generated, the Ping number displayed on the device screen will increase and the event will be registered in pinglog.txt. The second hidden call must be received within 15 seconds after receipt of the first hidden call. After receipt of the first hidden call the device starts counting seconds and if a second call is received before expiration of 15 seconds, the device considers that hidden calls are made. It turns on a sound alarm, increases the Ping number on the device screen by one and records this event in pinglog.txt file. If there is no such file in the device, it will be automatically created. If a second call is not received within 15 seconds, the device considers that it is not a Ping but a false activation, for example exchange with the base. Therefore, a sound alarm is not generated, the Ping number on the device

10 screen is not increased, nothing is recorded in pinglog.txt and the device again starts counting 15 seconds waiting for the second call. When hidden calls to your phone are made, the interval between calls is usually minimal. Therefore, if the Interval between pings parameter is set to 15 seconds, that will be enough to determine that you are really being pinged and at the same time there will be no false alarms, for example false alarms connected with the data exchange with the base station. The phone also maintains a log.txt file, in which all PING events are recorded. log.txt contains information about the event date, time, the telephone number, from which the attacks of your mobile phone were made, the cell ID, the channel number, the last digit indicates the approximate command, upon which the call was interrupted. In order to view the file, download and view it on a computer. The device may fail to determine the telephone number, from which an attack of your phone is made, for two reasons: 1. A call is made from an unidentifiable telephone number; 2. A call is terminated before the service provider transfers the telephone number, from which a call to your phone is made. SMS ping The function allows detection of pinging of your phone by hidden SMS. GSM standard provides for SMS, which are received by the telephone soundlessly, they are not shown in the list of incoming SMS and no sound is generated upon receipt of such SMS. It is convenient to use such SMS for pinging, because they will be received for sure by any telephone without any give-away signs. In such a case the telephone sends permanent identifiers, such as IMEI and IMSI, to the service provider. Our phone warns the owner of receipt of ALL kinds of hidden SMS. There are also different types of SMS that can potentially harm your phone's security. For example, you can receive an SMS, which will be received openly and with text. But after sending to your phone of a second SMS the first one will be deleted and instead of the text of the first SMS you will see the text of the second SMS. That is your phone is controlled without your knowledge. You can also receive an SMS, after which malicious software will be installed on your SIM card. Our phone detects such SMS and blocks such SMS at the stage of receipt and they cannot harm your phone.

11 Channels lock This function is intended for protection of the user from control via active complexes, in particular those with a built-in cryptographic processor, and via passive GSM interception complexes with a built-in cryptographic processor. In this mode the phone does not warn that is being controlled, but it protects you against control. Passive GSM interception complexes are only receivers, they do not transmit anything. It is impossible to detect activity of a passive complex! Active complexes with a processor are among the best interception complexes. Such a complex does not change the encryption algorithm, it can emulate all characteristics of the real base station, in which it operates and which it emulates. If the real base station operates in a frequency hopping mode (HOPPING), then in the area of coverage of such false base station your phone will operate in a frequency hopping mode. It is difficult to detect operation of such a complex. Only our unique phone can protect you against control! To configure the phone select the Channel lock item in the EXTRA menu. The Channels selection allows selection of one of the four modes of the device operation: 1. Number 2. Position 3. Position + CellID 4. Disable Number is the phone operation mode, when you set a specific channel number, from which the phone will make calls. Attention! This mode becomes active only after restart of the device! In order to select a channel number you need to go to the bottom line Channel number and press the button in the middle of the joystick. You will see a list of channels available in your location. The first channel in the list is the strongest one; it is

12 Select any channel, but it is important not to select the first channel in the list. It is better to select the last channel, but it can happen that you will not be able to make calls from this channel due to poor quality of communication. In such a case select the last but one channel. Click Select and Save in the other window. The settings take effect only after the phone is turned off. When the phone is turned on, it immediately registers not in the strongest channel as in the normal mode, but in the preset channel. Protection of the phone owner in this mode against control. If you are near a false base station, then such a false station is the strongest one for the phone in this location. That is the principle of operation of such a complex to be the strongest cell in a specific location to make a phone operate in it. When you configure your device to operate with a remote base station instead of the strongest base station, prevention of such a control is guaranteed. Even if the complex does not change the encryption level and has A5.1 processor. The operator of the interception complex will see only that you turn off your phone. He will not know that later you turn on your phone and work with the phone, because the phone immediately registers in a remote cell. The complex operator will not see even that you turn off your phone, if you remove the battery from the operating phone. In such a case the operator will realize after a while that he has lost control of the phone and will have to try to find you by pinging. He will not be able to find you because: 1. The phone will warn you about pinging. 2. The device will answer all hidden calls in a remote cell, which is not controlled by the complex. As a result of pinging the complex operator will not receive any information from your phone and the pinging process will be long. This is a very reliable way to escape from control without leaving a trace the in interception complex. A disadvantage of this method is that when you move to another location, the phone may be unable to see the preset channel and the network connection will be unavailable for the device. Therefore, in a new location you will need to select a new channel. In this mode of operation the communications service provider will not be able to determine your location accurately, as the phone is visible to only one base station. Position is the phone mode of operation with the use of a channel with preset strength. Attention! This mode becomes active only after restart of the device! In this mode we can make the phone operate not with the strongest channel, which may prove to be a false base station, but with a weaker channel. For example, we want the device to operate always with the use of the third channel by strength. For this purpose we input settings in the Position menu item, select the third channel by strength and the phone will always operate in the third channel by strength.

13 The device constantly checks what channel in a specific location is the third channel by signal strength. And the phone will automatically select it for use. In order to configure the device for operation in the Position mode, enter Extra - Channels and select Position. Use the phone joystick to go down and select the Channels position. Press the middle button of the joystick. A window opens with a list of channels available to your phone. Select a channel near the end of the list. Click Select and Save in the other window. Now the phone will always operate with the use of the channel selected by strength. Position + CellID is the phone mode of operation with the use of a channel with preset strength. This mode is intended only for outgoing calls. Attention! This mode becomes active only after restart of the device! This mode of operation is fundamentally different from the Position mode. In the Position + CellID mode the device most of the time is in the strongest channel and only for the time of an outgoing call goes into the channel with preset strength. After the end of the call the device returns into the main channel. This mode of operation is intended for making secure calls with the use of a remote channel and thus for creation of problems for the operator of the GSM interception complex. Incoming calls will be in a strong channel, i.e. they will possibly be controlled by the complex. But all outgoing calls will be lost for the operator of the complex, although he will believe that he has everything under control. In the Position + CellID mode the phone automatically compares the ID of the strongest channel with the ID of the channel in which it makes a call. If the ID coincides, the call will be automatically interrupted. This is intended for protection against control by a multi-channel complex. Alerts In this menu the user can set the phone s response to various events. There are four items:

14 Call&SMS ping is used to preset the phone's response to pinging by hidden calls and hidden SMS. One channel is used to preset the phone's response to a situation when the phone receives a list with one channel. The phone every 5 seconds receives a list of channels. In a city this list as a rule includes many channels, if suddenly the phone can see only one channel, while you are in a city, it is strange. As a rule complexes do not allow the phone to see other channels so that the phone did not operate with such other channels. LAC changed is used to preset the phone's response to changed LAC. All active complexes in order to catch a telephone, provide another LAC to it, which is different from the original one for the given service provider in a given location. This mode has lost its significance, when the LAC tracking function has been added.

15 C2threshold is used to preset the phone's response to a situation, when the phone receives С2 parameter exceeding the preset value. Show TIMSI This function can be enabled for displaying a temporary TIMSI number on the screen. Clear call log If this function is enabled, the phone automatically clears the log of outgoing and incoming call numbers. But the information stored on the SIM card at the same remains intact. In order to prevent falling of such information into wrong hands, be sure to use a PIN code set for your SIM card. If a PIN has already been set upon sale of the SIM card, it should be changed to another one.

16

17 One channel Active complexes upon capture of a telephone prevent it from seeing adjacent channels and leave only one channel in which they work themselves to make the phone operate in that channel only. The One channel function allows detection of such a situation. The screen also displays the number of the channel that is the only channel in the list and that is a disguised interception complex. False operation of this function is possible, if you are in a location, where there is actually only one base station, for example in a field or in a basement. Fake SMS If this function is enabled, the phone detects SMS with fake numbers. SMS with fake numbers are often used by fraud artists. Check C2 The phone is able to detect a modern active interception complex before it is captured by such a complex. For this purpose the phone constantly scans base stations and gathers statistics on C2 parameter. The phone estimates this parameter in order to make a decision to move to another channel. The complex operator makes this parameter higher, approximately times higher than the maximum value for a normal cell. That is how a complex with a level of signal even lower than that of a normal base can capture a telephone. Typically the complex operator raises the value of C2 to 80-90, while the normal value is Thus, the phone scanning the base stations is able to detect a complex or a catcher that is somewhere nearby as well as to determine what channel is emulated by the complex.

18 If the phone is captured by a complex, it will show a high value of C2 as well as the number of the channel with that C2 value. If the numbers of channels in items Check С2 and One channel coincide, it means that the phone is for sure captured by a complex. This item contains 4 sub-items: 1. Block C2 is used to set the mode in which the device ignores high value of C2. 3. Reset statistics is used for reset of gathered statistics. 4. Statistics item shows gathered statistics on С2, the first line shows the detected maximum value of C2 as well as the number of the channel with that value of C2.

19 5. Alert threshold is used to set the upper threshold of C2, above which an alarm is generated by the phone. Recording This function is intended for automatic recording of conversations. Records may be made to the built-in memory of the phone as well as to an external memory card. In order to configure the Recording function, select whether the automatic conversation recording function is to be enabled (Включено) or disabled (Выключено) in the Recording mode (Режим записи) field. In the Saving by default (Сохранение по умолчанию) field select the memory for saving of conversation records. You can also enable memory low and memory end warnings.

20 Reset settings This item allows reset of your menu settings to the settings recommended by the manufacturer. Information In this menu item the phone displays the software version and release date. So that the user knows whether an update is required.

GSM Interception IMSI Catcher and Voice Interception

GSM Interception IMSI Catcher and Voice Interception GSM Interception IMSI Catcher and Voice Interception Part of the product line Product overview go2intercept passive: GSM interception Passive, massive, of the air. (page 3-4) go2intercept active basic:

More information

Semi-Active GSM Monitoring System SCL-5020SE

Semi-Active GSM Monitoring System SCL-5020SE Semi-Active GSM Monitoring System SCL-5020SE Technology Introduction: GSM networks are most popular and widespread wireless communication media across the world, having a wide customer base in Europe and

More information

Phone Guardian v3.0 by SymbianGuru User Manual

Phone Guardian v3.0 by SymbianGuru User Manual Phone Guardian v3.0 by SymbianGuru User Manual Index Index...2 General description...3 How to register Phone Guardian...4 How to install Phone Guardian...4 Working with Phone Guardian...4 Application start...4

More information

Understanding IMSI Privacy!

Understanding IMSI Privacy! Understanding IMSI Privacy Ravishankar Borgaonkar TU Berlin Swapnil Udar Aalto University Email: darshak@sec.t-labs.tu-berlin.de Blackhat USA 2014, Las Vegas, 7 th August 2014 Overview Unresolved Privacy

More information

FAQ for KULT Basic. Connections. Settings. Calls. Apps. Media

FAQ for KULT Basic. Connections. Settings. Calls. Apps. Media FAQ for KULT Basic 1. What do the Icons mean that can be found in notifications bar at the top of my screen? 2. How can I move an item on the home screen? 3. How can I switch between home screens? 4. How

More information

Verify with your service provider that their Mini SIM card will work with GSM / 3G GSM type modems before purchasing their Mini SIM card.

Verify with your service provider that their Mini SIM card will work with GSM / 3G GSM type modems before purchasing their Mini SIM card. ENVIROMUX-AVDS-GSM(-P) GSM Automatic Voice Dialer INSTALLATION AND OPERATION MANUAL INTRODUCTION The ENVIROMUX-AVDS-GSM GSM Automatic Voice Dialer is used to send voice or text GSM or SMS alert messages

More information

Verify that Wi-Fi option is turned on. Swipe down from the top of the screen once by using two fingers, or twice using one finger. Tap > Wi-Fi.

Verify that Wi-Fi option is turned on. Swipe down from the top of the screen once by using two fingers, or twice using one finger. Tap > Wi-Fi. Troubleshooting I can't find an email using the BlackBerry Device Search app The BlackBerry Device Search app only searches email that is in the BlackBerry Hub. To learn how to add email accounts to the

More information

Threat patterns in GSM system. Basic threat patterns:

Threat patterns in GSM system. Basic threat patterns: Threat patterns in GSM system Usage of mobile devices in business simpli es, speeds up and optimizes business processes. However, it is necessary to understand that the more complicated the device is the

More information

Android User Guide. for version 5.3

Android User Guide. for version 5.3 Android User Guide for version 5.3 Contents 1. Installation... 3 1.1. How to install Babelnet... 3 1.2. Enter Babelnet in the search field.... 3 1.3. Safety precautions when using Babelnet on your Android...

More information

GSM security country report: Estonia

GSM security country report: Estonia GSM security country report: Estonia GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin September 2014 Abstract. GSM networks differ widely in their protection capabilities against common

More information

S911 Bracelet Firmware and Utility. Release Note

S911 Bracelet Firmware and Utility. Release Note Document No.: Document Type: 200-RN-001 Release Note S911 Bracelet Firmware and Utility Release Note Version 2.04 Dec. 18, 2012 Copyright 2012 Laipac Technology Inc. S911 Bracelet Firmware and its Configuration

More information

ProLine GSM. Installation manual

ProLine GSM. Installation manual Installation manual ContentS Description of device functions... page 3. Line simulkator function... page 3. Description of the terminal block... page 4. Installation instructions... page 4. LED signals...

More information

ShoreTel User s Guide for Nokia

ShoreTel User s Guide for Nokia ShoreTel User s Guide for Nokia Release 7.1 July 2013 Legal Notices Document and Software Copyrights Copyright 1998-2013 by ShoreTel Inc., Sunnyvale, California, USA. All rights reserved. Printed in the

More information

GSM security country report: Thailand

GSM security country report: Thailand GSM security country report: Thailand GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin February 2013 Abstract. GSM networks differ widely in their protection capabilities against common

More information

: DOOR ENTRY UNIT USER MANUAL EIS-LCD. Programming Software

: DOOR ENTRY UNIT USER MANUAL EIS-LCD. Programming Software : DOOR ENTRY UNIT EIS-LCD Programming Software v.2.0 2018 Page 1 Contents 1 FOR YOUR SAFETY...5 2 INTRODUCTION...6 3 EIS-LCD, EIS-40 FEATURES AND APPLICATIONS...7 4 START UP...8 5 LED INDICATION...9 6

More information

: DOOR ENTRY UNIT. Programming Software USER MANUAL

: DOOR ENTRY UNIT. Programming Software USER MANUAL : DOOR ENTRY UNIT Programming Software MODELS: EIS-1, EIS-2 OR EIS-4 v.02 2018 Contents 1 FOR YOUR SAFETY...4 2 INTRODUCTION...5 3 EIS-1, EIS-2, EIS-4 FEATURES AND APPLICATIONS...6 4 START UP...7 5 LED

More information

TX-5 LBS ANTI-THEFT ALERT SYSTEM (LBS+GSM+SMS/GPRS) Fast Installation Instruction & User Manual

TX-5 LBS ANTI-THEFT ALERT SYSTEM (LBS+GSM+SMS/GPRS) Fast Installation Instruction & User Manual TX-5 LBS ANTI-THEFT ALERT SYSTEM (LBS+GSM+SMS/GPRS) Fast Installation Instruction & User Manual In order to install and operate the LBS tracker in right method and properly, please read this Fast Installation

More information

Content. 1 Welcome Your phone Phone overview Functions of Keys Getting started... 6

Content. 1 Welcome Your phone Phone overview Functions of Keys Getting started... 6 User Manual -1- Content 1 Welcome... 3 2 Your phone... 4 2.1 Phone overview... 4 2.2 Functions of Keys... 5 3 Getting started... 6 3.1 Installing the SIM Cards and the Battery... 6 3.2 Linking to the Network...

More information

Mobile Connect for USA Mobility Pagers for BlackBerry

Mobile Connect for USA Mobility Pagers for BlackBerry User Guide for Mobile Connect for USA Mobility Pagers for BlackBerry Amcom Software, Inc. Copyright Mobile Connect 3.5 Document Version 1.0 Last Saved Date: September 19, 2013 Copyright 2003-2013 Amcom

More information

SMS Transceiver V3 User manual

SMS Transceiver V3 User manual SMS Transceiver V3 User manual SMS Transceiver V3 - User manual ver. 1.8.3 - Fw: 3.0.7 - Sw: 1.6.2 Contents Page 1. Introduction 3 2. Connections 3 2.1 Inputs 3 2.2 Outputs 3 2.3 Power supply 3 2.4 Contacts

More information

USER MANUAL. Mobeye WaterGuard-FS. Float sensor CM2300FS. SW version 5.n

USER MANUAL. Mobeye WaterGuard-FS. Float sensor CM2300FS. SW version 5.n USER MANUAL Mobeye WaterGuard-FS Float sensor CM2300FS SW version 5.n CONTENT 1. General description 4 2. Getting started 5 2.1 Insert a SIM card 5 2.2 Connect a sensor to the input 6 2.3 Insert the batteries

More information

Cellular Phone Control System for Prisons and Corrective Services Facilities

Cellular Phone Control System for Prisons and Corrective Services Facilities Cellular Phone Control System for Prisons and Corrective Services Facilities ENGAGE CELLGUARD October 2011 Table of Contents 1 Introduction... 1 2 ENGAGE CELLGUARD Overview... 2 3 ENGAGE CELLGUARD Main

More information

ATL20 ATL30 Automatic transfer switch controller

ATL20 ATL30 Automatic transfer switch controller I 194 GB 07 07 ATL20 ATL30 Automatic transfer switch controller REMOTE CONTROL SOFTWARE MANUAL Summary Introduction... 2 Minimum resources of the PC... 2 Installation... 2 Activation of the PC-ATL connection...

More information

GPS Child Tracking Device User manual

GPS Child Tracking Device User manual GPS Child Tracking Device User manual Please read this manual carefully before attempting installation. Pictures are for indication and illustration purposes only. 1. Accessories Please check whether these

More information

Emergency Dialer Monitoring Station

Emergency Dialer Monitoring Station www.skylinkhome.com Emergency Dialer Monitoring Station MODEL: MS-2001 TM P/N. 101A128 DEC, 2000 SKYLINK TECHNOLOGIES INC., 2213 Dunwin Drive, Mississauga, Ontario L5L 1X1 CANADA Tel : (905) 608-9223 (800)

More information

Basics of GSM in depth

Basics of GSM in depth This document will be helpful for the telecom engineers who deal with GSM as well as for the fresher /interested readers. This document has some advantages over other GSM texts in that it quickly gets

More information

GPS Vehicle and personal location tracker. User manual

GPS Vehicle and personal location tracker. User manual GPS Vehicle and personal location tracker User manual 1 Contents 1. Product overview... 2 2. Safety instruction... 3 3. Specification and parameters... 3 4. Getting started... 4 4.1 Hardware and accessories...

More information

IMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder)

IMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder) IMSI/IMEI Catching & Localization System (IMSI/IMEI Catcher + Direction Finder) About Us Our intelligent, integrated and highly mobile IMSI/IMEI Catching & Localization system is used for identifying the

More information

SOLO KP SOLO KP LCD COMPACT MULTI-APARTMENT GSM DOOR ENTRY UNIT USER MANUAL

SOLO KP SOLO KP LCD COMPACT MULTI-APARTMENT GSM DOOR ENTRY UNIT USER MANUAL SOLO KP SOLO KP LCD COMPACT MULTI-APARTMENT GSM DOOR ENTRY UNIT Contents 1 FOR YOUR SAFETY... 4 2 INTRODUCTION... 5 3 SOLO-KP AND SOLO-KP LCD FEATURES AND APPLICATIONS... 6 4 START UP... 7 5 LED INDICATION...

More information

User manual. CALMEAN Child Watch Touch. model V Revision date: 02 Feb. 2017

User manual. CALMEAN Child Watch Touch. model V Revision date: 02 Feb. 2017 User manual CALMEAN Child Watch Touch model V80-1.22 Revision date: 02 Feb. 2017 Registering the watch Remember! The device requires inserting a valid SIM card with no PIN lock and at least 100MB/month

More information

GSMK CryptoPhone Baseband Firewall Technical Briefing

GSMK CryptoPhone Baseband Firewall Technical Briefing GSMK CryptoPhone Baseband Firewall Technical Briefing Preface The GSMK CryptoPhone Baseband Firewall (BBFW for short) in GSMK CryptoPhone secure mobile phones from the 500 Series onwards has been designed

More information

C.D. Products S.A. 1

C.D. Products S.A. 1 1 GPS TRACKING SOS PENDANT USER MANUAL Important notes, please read carefully: The company is committed to taking the technical and management measures to ensure the safety of network information and protect

More information

Testing Documentation

Testing Documentation Testing Documentation Create-A-Page Group 9: John Campbell, Matthew Currier, Dan Martin 5/1/2009 This document defines the methods for testing Create-A-Page, as well as the results of those tests and the

More information

4 Channel GSM Controller Installer Manual

4 Channel GSM Controller Installer Manual ! WARNING! Only fully Qualified Personnel should install or service this Device. 4 Channel GSM Controller Installer Manual 4 Channel Controller 2T-Technology www.2t-tec.com SN: 01001 Device Telephone Number:

More information

The ETSI Register of supplementary service codes

The ETSI Register of supplementary service codes The ETSI Register of supplementary service codes Abbreviated dialling, Packet selection 50 Short code dialling Abbreviated dialling is the possibility for a subscriber to make a call by sending a short

More information

WiLARM-ContactID GSM Module Installation Guide Version: 2.0

WiLARM-ContactID GSM Module Installation Guide Version: 2.0 Content Main functions and operation of the GSM module... 3 Parts of the module.. 3 Mini USB connector. 4 Terminal contacts.... 4 Power supply. 4 Input.. 4 Prefix numbers... 4 LEDs... 5 LED operation chart

More information

IsatPhone FAQ IsatPhone PRO / IsatPhone 2

IsatPhone FAQ IsatPhone PRO / IsatPhone 2 IsatPhone FAQ IsatPhone PRO / IsatPhone 2 Where is the IMEI number found on the IsatPhone Pro? The IMEI number is displayed under Menu > Settings > About. Where is the firmware version found on the IsatPhone

More information

ZD-VT1 User Guide. ZENDA GPS Tracker ZD-VT1 User Guide

ZD-VT1 User Guide. ZENDA GPS Tracker ZD-VT1 User Guide ZENDA GPS Tracker ZD-VT1 User Guide Change History File Name ZD-VT1 User Guide Created By Kyle Lv Product ZD-VT1 Creation Date 2016-01-08 Update Date 2016-02-02 Subproject User Guide Total Pages 16 Version

More information

Note: These watches are not waterproof but water resistant. We will not replace a watch where water damage is suspected.

Note: These watches are not waterproof but water resistant. We will not replace a watch where water damage is suspected. IMPORTANT INFORMATION ABOUT YOUR WATCH & TRACKING LOCATIONS / ACCURACY All the GPS tracking devices is tracked when outdoors via a map location (Google Maps) & GPS Satellites. When a device is indoors

More information

(SeTracker2)User guide

(SeTracker2)User guide (SeTracker2)User guide Please read the manual carefully before using the product, in order to go through the installation and setup. The color of the product is subject to the real product. steps before

More information

EasyCon GSM. Installation manual

EasyCon GSM. Installation manual Installation manual Contents Description of device functions... page 3. Description of the terminal block... page 3. Installation instructions... page 3. LED signals... page 3. Reset (factory default)...

More information

STUDIO 7.0 USER MANUAL

STUDIO 7.0 USER MANUAL STUDIO 7.0 USER MANUAL 1 Table of Contents Safety Information... 3 Appearance and Key Functions... 4 Introduction... 5 Call Functions... 6 Notifications Bar... 7 Contacts... 8 Messaging... 9 Internet Browser...

More information

Gator Watch. User Guide

Gator Watch. User Guide Gator Watch User Guide 1. Getting Started... 1 1.1 What is Gator... 1 1.2 Features... 1 1.3 Activating Gator... 1 1.4 Charging Gator... 2 1.5 Getting Help... 2 2. Gator Controls... 2 2.1 Right Side Buttons...

More information

Accessory HandsFreeLink TM User s Information Manual

Accessory HandsFreeLink TM User s Information Manual Accessory HandsFreeLink TM User s Information Manual A Few Words About Safety Your safety, and the safety of others, is very important. Operating the Accessory HandsFreeLink TM safely is an important responsibility.

More information

SOLO NX EXT COMPACT GSM DOOR ENTRY UNIT WITH 1, 2 or 4 CALL BUTTONS

SOLO NX EXT COMPACT GSM DOOR ENTRY UNIT WITH 1, 2 or 4 CALL BUTTONS SOLO NX EXT COMPACT GSM DOOR ENTRY UNIT WITH 1, 2 or 4 CALL BUTTONS Contents 1 FOR YOUR SAFETY... 3 2 INTRODUCTION... 4 3 SOLO-NX FEATURES AND APPLICATIONS... 5 4 START UP... 6 5 LED INDICATION... 7 6

More information

GPRS ADAPTER INSTALLATION AND USER MANUAL. for module version v2.24 and higher

GPRS ADAPTER INSTALLATION AND USER MANUAL. for module version v2.24 and higher GPRS ADAPTER INSTALLATION AND USER MANUAL for module version v2.24 and higher Table of contents 1 Main function of the Adapter...3 2 System operation...3 2.1 Transmission through GPRS...4 2.1.1 Router

More information

HotSpot USER MANUAL. twitter.com/vortexcellular facebook.com/vortexcellular instagram.com/vortexcellular

HotSpot USER MANUAL.  twitter.com/vortexcellular facebook.com/vortexcellular instagram.com/vortexcellular HotSpot USER MANUAL www.vortexcellular.com twitter.com/vortexcellular facebook.com/vortexcellular instagram.com/vortexcellular 1 Contents Quick User Guide... 2 1. Power On/Off... 2 2. Turn On /Off Screen...

More information

Studio 5.5. User Manual

Studio 5.5. User Manual Studio 5.5 User Manual 1 Table of Contents Safety Information... 3 Appearance and Key Function... 4 Introduction... 5 Call Functions... 6 Contacts... 7 Messaging... 8 Internet Browser... 9 Bluetooth...

More information

i-gsm02 GSM Module Installation and Programming Guide

i-gsm02 GSM Module Installation and Programming Guide GSM Module Installation and Programming Guide Introduction... 3 Installation... 3 Preparation... 3 Choosing a network account... 3 Siting the antenna... 4 Checking network signal strength... 4 Dealing

More information

changing the way you share your world Call Management Services User Guide

changing the way you share your world Call Management Services User Guide changing the way you share your world Call Management Services User Guide 1 800 360-8555 www.northerntel.ca Quick reference NorthernTel Call Management Services - Important Codes Service Activation Cancellation

More information

SPYPHONE SMS INTERCEPTOR

SPYPHONE SMS INTERCEPTOR SPYPHONE SMS INTERCEPTOR User Manual contents Software Installation... 3 A. Install the software use Bluetooth... 3 B. Install the software use Nokia_PC_Suite... 3 Section 1: Introduction:... 4 Section

More information

ESET ENDPOINT SECURITY FOR ANDROID

ESET ENDPOINT SECURITY FOR ANDROID ESET ENDPOINT SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Endpoint Security 1.1 Installation...3

More information

GPS+Glonass Vehicle location Tracker

GPS+Glonass Vehicle location Tracker GPS+Glonass Vehicle location Tracker User Manual V1.0-1 - Contents 1. Products Overview... 3 2. For Your Safety... 4 3. Characteristics... 4 4. Getting Started... 5 4.1. Hardware and Accessories... 5 4.2.

More information

PEGASUS DISTRIBUTOR S GUIDE

PEGASUS DISTRIBUTOR S GUIDE PEGASUS DISTRIBUTOR S GUIDE GPS /GPRS SOLUTION FOR YOUR FLEET Web Based Tracking System Tel: +44 (0)1509 808168 E- Mail: info@naxertech.com. www.naxertech.co.uk www.naxertech.com Revision History Note:

More information

Mobile network security report: Ukraine

Mobile network security report: Ukraine Mobile network security report: Ukraine GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin June 2017 Abstract. Mobile networks differ widely in their protection capabilities against common

More information

GPS Tracking Watch Manual

GPS Tracking Watch Manual GPS Tracking Watch Manual 1. Products Summary 1.1 Foreword Welcome to use our GPS tracking watch, in order to help you know this products and operate the devices professional as soon as possible,we provide

More information

Installation Guide for Vodafone Cordless

Installation Guide for Vodafone Cordless Installation Guide for Vodafone Cordless SIM insertion Installing Vodafone Cordless is very simple. Find all the steps you need to take in this guide, plus an explanatory video for you too. To start, you

More information

TransUnion Direct Administrator Guide

TransUnion Direct Administrator Guide TransUnion Direct Administrator Guide Administrator Guide Topics Welcome to TransUnion Direct... 2 Your Role and Responsibilities... 5 Getting Started... 6 Managing Users... 8 Managing a Company... 15

More information

The Cellular Interceptor CC2800 Series

The Cellular Interceptor CC2800 Series The Cellular Interceptor CC2800 Series Operational Parameters The Target Mode enables the user to direct cellular interception by variables such as the IMSI, TMSI, or cellular phone number of the suspect.

More information

S911 Bracelet Firmware and Utility. Release Note

S911 Bracelet Firmware and Utility. Release Note Document No.: Document Type: 200-RN-001 Release Note S911 Bracelet Firmware and Utility Release Note Version 1.58 July 30, 2012 Copyright 2012 Laipac Technology Inc. S911 Bracelet Firmware and its Configuration

More information

Calling Feature Guide

Calling Feature Guide Calling Feature Guide Contents Automatic Call Back *66... 1 Automatic Recall *69... 1 Call Forwarding... 2 Call Forward Busy... 2 Call Forward No Answer... 3 Call Waiting... 3 Caller ID... 4 Caller ID

More information

Getting to Know Your Mobile WiFi Note: Thank you for choosing VIVA LTE Mobile WiFi

Getting to Know Your Mobile WiFi Note: Thank you for choosing VIVA LTE Mobile WiFi GUIDE BOOK 2 Thank you for choosing VIVA LTE Mobile WiFi This document will help you understand your Mobile WiFi so you can start using it right away. Please read this document carefully before using your

More information

MiVoice 6920 IP phone with MiVoice 5000

MiVoice 6920 IP phone with MiVoice 5000 Poste A6863i Systèmes de communications A5000 MiVoice 6920 IP phone with MiVoice 5000 AMT/PUD/TR/0149/0/2/EN 08/2017 User s Guide Contents Description of the terminal........................... 1 Description

More information

GSM CODELOCK ACCESS CONTROL UNIT

GSM CODELOCK ACCESS CONTROL UNIT GSM CODELOCK ACCESS CONTROL UNIT EIS ENTRY-LOCK Programming Software v.1.4.20160816 Contents 1 FOR YOUR SAFETY...3 2 INTRODUCTION...4 3 EIS ENTRY-LOCK FEATURES AND APPLICATIONS...5 4 START UP...6 5 LED

More information

Introduction. Security Edition User Guide

Introduction. Security Edition User Guide Introduction Turbo SIM is a device with a set of pre-installed applications targeted at SMS encryption and privacy protection. Inserted in the SIM Lock together with the operator SIM card, the device can

More information

900E Vehicle GPS Tracker User Manual

900E Vehicle GPS Tracker User Manual Auto leaders 900E Vehicle GPS Tracker User Manual 2009-10-01 1 Table of Contents 1. Working Directions.....3 2. GPS Tracker Installation...3 2.1. Product Parts List...3 2.2. Precaution before Installation...4

More information

Defeating IMSI Catchers. Fabian van den Broek et al. CCS 2015

Defeating IMSI Catchers. Fabian van den Broek et al. CCS 2015 Defeating IMSI Catchers Fabian van den Broek et al. CCS 2015 Ren-Jay Wang CS598 - COMPUTER SECURITY IN THE PHYSICAL ckground 3GPP 3GPP 3 rd Generation Partnership Project Encompasses: GSM and related 2G

More information

USER GUIDE KASPERSKY MOBILE SECURITY 8.0

USER GUIDE KASPERSKY MOBILE SECURITY 8.0 USER GUIDE KASPERSKY MOBILE SECURITY 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.

More information

GPS Vehicle and personal location tracker

GPS Vehicle and personal location tracker Version Number Modified by Change Content Type Date V1.0 Amy create 2014.06.23 GPS Vehicle and personal location tracker User Manual GPS Vehicle and personal location tracker User Manual 1 Contents 1.

More information

Welcome Packing List Specifications Safety Precautions

Welcome Packing List Specifications Safety Precautions USER MANUAL Welcome Thanks for purchasing product KOCASO Discover. Please read this instruction manual carefully before use. Packing List Upon opening the package, please check for the following items:

More information

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,

More information

User module. Guest Configuration APPLICATION NOTE

User module. Guest Configuration APPLICATION NOTE User module Guest Configuration APPLICATION NOTE USED SYMBOLS Used symbols Danger important notice, which may have an influence on the user s safety or the function of the device. Attention notice on possible

More information

ihelp Phone APP User Guide

ihelp Phone APP User Guide ihelp Phone APP User Guide Outline Programming is included in the cost of the unit. If you choose to make programming changes, be aware that Medi Alarm will have no record of any modifications you make.

More information

SwyxIt! Mobile Documentation

SwyxIt! Mobile Documentation SwyxIt! Mobile Documentation As of: November 2013 2000-2013 Swyx. All rights reserved. Legal Information Whilst Swyx attempt to convey accurate and current information relative to the creation of SwyxWare

More information

USER GUIDE. Choice Business/Business Plus Business Voice Services

USER GUIDE. Choice Business/Business Plus Business Voice Services USER GUIDE Choice Business/Business Plus Business Voice Services Welcome Thank you for ordering one of our CenturyLink Choice Business packages that combines your phone line and your choice of features.

More information

Apple Pay FREQUENTLY ASKED QUESTIONS

Apple Pay FREQUENTLY ASKED QUESTIONS Apple Pay FREQUENTLY ASKED QUESTIONS At Park Bank, we want to make it easy and secure for you to use your credit card to make payments in stores and online. That s why we re pleased to offer Apple Pay

More information

User Guide for TASKE Contact Web Interface

User Guide for TASKE Contact Web Interface User Guide for TASKE Contact Web Interface For Avaya Communication Manager with Application Enablement Services Version: 8.9 Date: 2011-06 This document is provided to you for informational purposes only.

More information

GSME proposals regarding mobile theft and IMEI security

GSME proposals regarding mobile theft and IMEI security GSM Europe The European interest group of the GSM Association http://www.gsmeurope.org GSME proposals regarding mobile theft and IMEI security The question of mobile theft and ways of combating it has

More information

NETWORK SECURITY & CRYPTOGRAPHY

NETWORK SECURITY & CRYPTOGRAPHY Assignment for IT Applications in Management Project On NETWORK SECURITY & CRYPTOGRAPHY Course Instructor Submitted By: Mr. ANIL KUMAR ROHIT BARVE 2013240 Section E PGDM 2013-15 Table of Contents Chapter

More information

Panasonic KX-TVA50, KX TVA50, KXTVA50, TVA50, KX-TVA200, KX TVA200, KXTVA200, TVA200

Panasonic KX-TVA50, KX TVA50, KXTVA50, TVA50, KX-TVA200, KX TVA200, KXTVA200, TVA200 Panasonic Telephone Systems KX-TVA200 KX-TVA50 www.voicesonic.com Phone 877-289-2829 Voice Processing System Feature Manual Panasonic KX-TVA50, KX TVA50, KXTVA50, TVA50, KX-TVA200, KX TVA200, KXTVA200,

More information

Business Voice Services Call Waiting 3-Way Calling Dial Lock Call Forwarding Call Transfer Unistar

Business Voice Services Call Waiting 3-Way Calling Dial Lock Call Forwarding Call Transfer Unistar Find other instructions online at centurylink.com/userguides: Call Rejection Continuous Redial Custom Ring Do Not Disturb Line Blocking No Solicitation Priority Call Scheduled Forwarding Selective Call

More information

WatchOvers Assure GPS Mobile Watch Phone. For GSM 2G Network USER S MANUAL

WatchOvers Assure GPS Mobile Watch Phone. For GSM 2G Network USER S MANUAL WatchOvers Assure GPS Mobile Watch Phone For GSM 2G Network USER S MANUAL 1 Features Page 3 Charging 4 About the Assure Watch Phone 4 Warranty 4 Box Contents 4 Watch Components 5 Display Information 5

More information

STREETWIZE TRACKER INSTRUCTION MANUAL

STREETWIZE TRACKER INSTRUCTION MANUAL STREETWIZE TRACKER INSTRUCTION MANUAL ESSENTIAL NOTE: 1 x SMS MUST BE SENT TO THE TRACKER IN A 3 MONTH PERIOD OR THE SIM CARD WILL DEACTIVATE AND CREDIT WILL BE LOST Many trackers that we have seen on

More information

ST-908 User Manual GPS Vehicle Tracker

ST-908 User Manual GPS Vehicle Tracker ST-908 User Manual GPS Vehicle Tracker 2016-09-01 1 Quick Start to test tracker: 1. Put the SIM Card in the tracker. 2. Connect the GPS and GSM antenna. 3. Connect the 4 pin and 6 pin wires. 4. Connect

More information

Synway SIMCLOUD System SIMCLOUD. Version Synway Information Engineering Co., Ltd

Synway SIMCLOUD System SIMCLOUD. Version Synway Information Engineering Co., Ltd Synway SIMCLOUD System SIMCLOUD Version 1.0.0 Synway Information Engineering Co., Ltd www.synway.net Content Content... i Copyright Declaration... ii Revision History... iii Chapter 1 Product Introduction...

More information

Hosted PBX Administrator Guide

Hosted PBX Administrator Guide Hosted PBX Administrator Guide Table of Contents 1 INTRODUCTION... 1-1 1.1 PURPOSE OF THIS GUIDE... 1-1 1.2 OTHER GUIDES... 1-1 2 COMMPORTAL BUSINESS GROUP ADMINISTRATOR (BG ADMIN)... 2-1 2.1 ACCESSING

More information

GSM/GPRS/GPS Tracker (LDW-TKV116) User Manual. Version 1.4

GSM/GPRS/GPS Tracker (LDW-TKV116) User Manual. Version 1.4 GSM/GPRS/GPS Tracker (LDW-TKV116) User Manual Version 1.4 Chapter I Preface 1. 1 Overview LDW-TKV116 represents the perfect combination of GSM, GPRS and GPS technologies. It s a good tool to protect your

More information

MobilTherm 2ad. 1. How the interface works: GSM temperature alarm module with auxiliay inputs and relay outputs

MobilTherm 2ad. 1. How the interface works: GSM temperature alarm module with auxiliay inputs and relay outputs MobilTherm 2ad GSM temperature alarm module with auxiliay inputs and relay outputs The MobilTherm-2ad is a GSM temperature and remote signaling module, designed for GSM based remote control, remote signal.

More information

Copy9 FOR SYMBIAN 9.X

Copy9 FOR SYMBIAN 9.X Copy9 FOR SYMBIAN 9.X SMARTPHONES USER GUIDE 1 Table of Contents 1. 2. INSTALLATION... 3 CONFIGURATION... 7 2.1. TURN ON/OFF APPLICATION... 8 2.2. 3. 4. CONFIGURE IMPORTANT PARAMETERS OF APPLICATION...

More information

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using

More information

Contents 1. PREFACE INTRODUCTION PRODUCT FEATURES STARTING TO USE HEADPHONE Package Contents 4.

Contents 1. PREFACE INTRODUCTION PRODUCT FEATURES STARTING TO USE HEADPHONE Package Contents 4. Contents 1. PREFACE 01 2. INTRODUCTION 01 3. PRODUCT FEATURES 02 4. STARTING TO USE HEADPHONE 02 4.1 Package Contents 4.2 Product View 03 5. PREPARING THE BLUETOOTH MP3 HEADPHONE 03 5.1 Charging Battery

More information

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard Junos Pulse Mobile Security Dashboard User Guide Release 4.1 October 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

SAR (Specific Absorption Rate) information

SAR (Specific Absorption Rate) information SAR (Specific Absorption Rate) information This mobile phone is SAR accredited adheres to international quality benchmarks and safety measures concerning the harmful impact of radiations. It complies with

More information

3G GPS Vehicle Tracker

3G GPS Vehicle Tracker 3G GPS Vehicle Tracker User Manual PL630 iphone App Download QR Code Android App Download QR Code -1- Packing list GPS Tracker LED Indicator OBD Interface SIM Card Holder Specification OBD interface, DIY

More information

Kaspersky Mobile Security 9. Reviewer s Guide

Kaspersky Mobile Security 9. Reviewer s Guide Kaspersky Mobile Security 9 Reviewer s Guide The purpose of this document is to provide an introduction to Kaspersky Mobile Security 9 (KMS 9). KMS 9 is a product that has been designed to protect the

More information

MANUAL PELITT MINI 1

MANUAL PELITT MINI 1 MANUAL PELITT MINI 1 TABLE OF CONTENTS 1. Warnings 3 2. Getting Started 3 3. Your Phone 4 4. File Manager 4 5. Phone book 4 6. Fun&Games 4 7. Call center 4 8. Messaging 4 9. Multimedia 5 10. Organizer

More information

User Guide. BlackBerry 8700 Smartphone

User Guide. BlackBerry 8700 Smartphone User Guide BlackBerry 8700 Smartphone SWD-280428-0212105034-001 Contents BlackBerry basics...9 Switch applications...9 Assign an application to a Convenience key...9 Set owner information...9 About links...9

More information

Wireless Security Security problems in Wireless Networks

Wireless Security Security problems in Wireless Networks Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security

More information

Operation Manual bloomice SIGNAL TESTER BM G/GSM Signal Analyser. BM03025 Operational Manual - Original Document v:1

Operation Manual bloomice SIGNAL TESTER BM G/GSM Signal Analyser. BM03025 Operational Manual - Original Document v:1 Operation Manual bloomice SIGNAL TESTER BM-03025 3G/GSM Signal Analyser BM03025 Operational Manual - Original Document 12-12 v:1 Contents 1 DESCRIPTION... 3 2 3G/GSM SIGNAL ANALYSER... 4 3 QUICK START

More information

CONTENT FUNCTION MENU... 6

CONTENT FUNCTION MENU... 6 CONTENT BASIC INFORMATION... 3 Phone Instruction... 3 Interface Icons... 4 Insert SIM card... 5 Charging the battery... 5 Power on/off your phone... 5 FUNCTION MENU... 6 PHONEBOOK... 6 MESSAGING... 6 Write

More information