SlideShare a Scribd company logo
1 of 10
Download to read offline
PrivateGSM Demo
Quick Start Guide for Nokia Symbian 9, 3rd and 5th ed.




Demo Version for evaluation only
NOT FOR SALE: the PrivateGSM version you can purchase
is sold within the Enterprise VoIP Security Suite solution.




© 2005-2011 PrivateWave Italia SpA - All trademarks and copyrights are property of their respective owners. All rights reserved.
PrivateGSM Demo                                          1



Summary




1. Before you begin                                          2


1.1 Some advices...                                          2
1.2 ...and one tip                                           2



2. Activation...in 3 easy steps!                             3


1 Install PrivateGSM                                         3
2 Select a network access point                              3
3 Launch the auto-activation                                 4



3. How it works                                              5


1   Invite your contacts                                     5
2   Make a secure call using PrivateGSM                      5
3   Receive a secure call using PrivateGSM                   6
4   Call phases                                              7
5   Call quality level                                       7
6   Check your security                                      8
7   Receive Only mode                                        8



4. Contacts                                                  9



                                             Quick Start Guide
PrivateGSM Demo                                                                                          2



1. Before you begin...


1.1 Some advices...
=   Your phone calls’ security is granted by using the VoIP data line instead of the voice one.
    Under particular events, due to the VoIP network condition, it could be present a little latency.
    If a WiFi internet connection is available, consider to use it for a better communication quality.

= As a VoIP phone call, with data-packet exchanging, both the caller and the called pay for the calling.
  To save your money consider to subscribe an unlimited mobile internet data plan with your mobile
  operator.

= When making a secure call, before being connected to your contact, the system needs to exchange
  and verify the security keys. It takes a while, so you need to wait some seconds before starting the
  conversation.


1.2 ...and one tip
=   You can save in your address book the contacts to whom you want to make secure calls by adding the
    secure prefix +801.




                                                                                             Quick Start Guide
PrivateGSM Demo                                                                           3



2. Activation...in 3 easy steps!


1   Install PrivateGSM


                                    You can download PrivateGSM on your mobile from

                                    http://www.privatewave.com

                                    Just enter your mobile number or your email address;
                                    you will receive a message including a download link.

                                    Click on the link to start downloading, then install
                                    PrivateGSM.




2   Select a network access point


                                    After the installation, in order to use PrivateGSM, you
                                    have to set its internet connection.




                                       !
                                              Be careful: improper configuration of
                                              the Network Access Point may lead to in-
                                              ability to use PrivateGSM.


                                    It is always possible to change the access point from
                                    the main menu of PrivateGSM, just selecting:

                                    Settings >> Default access point

                                    Select a new access point from the list and confirm. Restart
                                    the application in order to make the changes effective.




                                                                               Quick Start Guide
PrivateGSM Demo                                                                     4



                                 A little hint: if you don’t know your access point,
                                 search in the suggested list for an option showing the
                                 word “internet” and then select it.



3   Launch the Auto-Activation


                                 At the end of the installation, in order to start making
                                 phone calls, PrivateGSM asks you to choose between
                                 manual and auto-activation. Choose “Auto” and
                                 complete the installation process.




                                    !
                                          We strongly encourage automatic acti-
                                          vation. Manual activation is only recom-
                                          mended for expert users. Some automa-
                                          tions, designed to simplify product use,
                                          will be lost with manual activation.




                                                                         Quick Start Guide
PrivateGSM Demo                                                                      5



3. How it works


1   Invite your contacts


                                   Using your mobile address book, you can invite your
                                   contacts to join PrivateGSM.

                                   Open PrivateGSM main menu, select “Invite others”
                                   and choose the contacts to whom you want to make
                                   secure calls. They will receive a text message includ-
                                   ing the installation link.

                                   Anyway, they can also download the software as de-
                                   scribed in step 1.




2   Make a secure call using PrivateGSM


                                   Calling with PrivateGSM is very easy; you only need to
                                   add the secure prefix +801 before the number you
                                   want to call.




                                      !
                                            Remember to use the number in the
                                            international format, including the
                                            country code:

                                            +41 079 1234567

                                            with PrivateGSM becomes:

                                            +801 41 079 1234567




                                                                          Quick Start Guide
PrivateGSM Demo                                                                        6



                                    It is either possible to make a secure call through the
                                    PrivateGSM menu. Select “Dial secure call”: your
                                    address book will appear and you will just have to se-
                                    lect a name to activate a secure call.




                                       !
                                             To make a secure call, you and the called
                                             party must be running PrivateGSM soft-
                                             ware and be connected to the Internet.




3   Receive a secure call using PrivateGSM


                                    Once PrivateGSM has been installed and all the set-
                                    tings have been correctly configured on your mobile,
                                    you will be able to receive a secure call.

                                    PrivateGSM displays an information note when an
                                    incoming secure call is ringing on your phone. You
                                    only need to press the answer button to allow the
                                    connection. The system exchanges and verifies the
                                    security keys and the conversation can start.




                                       !
                                             To receive a secure call, you must be run-
                                             ning PrivateGSM software and be con-
                                             nected to the Internet.




                                                                            Quick Start Guide
PrivateGSM Demo                                                                                         7




4   Call phases

    To establish a call, PrivateGSM completes three phases, shown by three icons:




                    1. Red light: the connection is starting. This step may take several seconds.




                    2. Yellow light: ZRTP keys are being exchanged to secure the call.




                    3. Green light: secure call is established. Now it is possible to speak in a secure way.




5   Call quality level

    Some factors that affect the GSM network (i.e. GPRS use, poor signal, frequent radio cell changes,
    roaming), could decrease call quality, increasing voice delay. The “green light icon”, shown above,
    changes to display the current quality level:




                    Poor connection quality.




                    Average connection quality.




                    Good connection quality.




                                                                                             Quick Start Guide
PrivateGSM Demo                                                                8




6   Check your security


                          A PrivateGSM phone call is always encrypted.

                          To verify that there are no intrusions, after the call con-
                          nection the system displays a security code consist-
                          ing of two random words to both parties.

                          If both, you and your contact, see the same security
                          code then the call is secure.

                          The security code is different each time you make or
                          receive a secure call.




7   Receive Only Mode


                          As the trial period expires, PrivateGSM turns in Re-
                          ceive Only mode.

                          In this mode PrivateGSM still allows you to receive
                          secure calls for as long as the software will be in-
                          stalled on your phone, but it won’t be no more pos-
                          sible to call other PrivateGSM users.




                                                                    Quick Start Guide
PrivateGSM Demo                                                                                       9



4. Contacts


For additional help and more information, please visit the support section at:

http://www.privatewave.com

To contact our technical support:

Tel: +39 02 911 930 891
E-mail: support@privatewave.com

Office hours: Monday to Friday, 10.00 AM - 12.00 PM and 2.30 PM - 4.30 PM (GMT +1)




We remind you that the PrivateGSM Demo version is for evaluation purpose only, to show how the
software works. The full version on sale is part of the Enterprise VoIP Security Suite solution for fixed-
mobile encryption in a company network.

For more information or technical details on the Enterprise VoIP Security Suite, get in contact with
our sales team:

E-mail: sales@privatewave.com




                                                                                           Quick Start Guide

More Related Content

Viewers also liked

Ovid: Recursos para el aprendizaje, para el uso clínico y de investigación
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigaciónOvid: Recursos para el aprendizaje, para el uso clínico y de investigación
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigaciónSEDIC
 
C:\Fake Path\Afrika Sunrise
C:\Fake Path\Afrika SunriseC:\Fake Path\Afrika Sunrise
C:\Fake Path\Afrika Sunriseguest63f4b26
 
Medical Assistance Direct Review 2010
Medical Assistance Direct Review 2010Medical Assistance Direct Review 2010
Medical Assistance Direct Review 2010Chris Alford
 
Cs335 Midterm Project Presentation
Cs335 Midterm Project PresentationCs335 Midterm Project Presentation
Cs335 Midterm Project Presentationguestce0287b
 
9th Agenda For 3 8 10
9th Agenda For 3 8 109th Agenda For 3 8 10
9th Agenda For 3 8 10guest70534bf
 
Presentacion house
Presentacion housePresentacion house
Presentacion housePakitalero
 
Perception Pcm P1
Perception Pcm P1Perception Pcm P1
Perception Pcm P1RMS
 
Intelligens ház
Intelligens házIntelligens ház
Intelligens házkleila83
 
Clf 7 steps to becoming an engaging leader
Clf   7 steps to becoming an engaging leaderClf   7 steps to becoming an engaging leader
Clf 7 steps to becoming an engaging leaderThe Impact Factory
 
Class1 Intro Is
Class1 Intro IsClass1 Intro Is
Class1 Intro IsRMS
 
Presentatie Concept Minor
Presentatie Concept MinorPresentatie Concept Minor
Presentatie Concept MinorScholtes
 
7th Agenda For 3 8 10
7th Agenda For 3 8 107th Agenda For 3 8 10
7th Agenda For 3 8 10guest70534bf
 

Viewers also liked (20)

Ovid: Recursos para el aprendizaje, para el uso clínico y de investigación
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigaciónOvid: Recursos para el aprendizaje, para el uso clínico y de investigación
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigación
 
C:\Fake Path\Afrika Sunrise
C:\Fake Path\Afrika SunriseC:\Fake Path\Afrika Sunrise
C:\Fake Path\Afrika Sunrise
 
Medical Assistance Direct Review 2010
Medical Assistance Direct Review 2010Medical Assistance Direct Review 2010
Medical Assistance Direct Review 2010
 
Comic Superhasen Teil 2
Comic Superhasen Teil 2Comic Superhasen Teil 2
Comic Superhasen Teil 2
 
Atomosphere
AtomosphereAtomosphere
Atomosphere
 
Atomosphere
AtomosphereAtomosphere
Atomosphere
 
Cs335 Midterm Project Presentation
Cs335 Midterm Project PresentationCs335 Midterm Project Presentation
Cs335 Midterm Project Presentation
 
9th Agenda For 3 8 10
9th Agenda For 3 8 109th Agenda For 3 8 10
9th Agenda For 3 8 10
 
Presentacion house
Presentacion housePresentacion house
Presentacion house
 
Testwith Video On Click
Testwith Video On ClickTestwith Video On Click
Testwith Video On Click
 
Perception Pcm P1
Perception Pcm P1Perception Pcm P1
Perception Pcm P1
 
Intelligens ház
Intelligens házIntelligens ház
Intelligens ház
 
Clf 7 steps to becoming an engaging leader
Clf   7 steps to becoming an engaging leaderClf   7 steps to becoming an engaging leader
Clf 7 steps to becoming an engaging leader
 
Top Tips For Powerful Presentations
Top Tips For Powerful PresentationsTop Tips For Powerful Presentations
Top Tips For Powerful Presentations
 
Atomosphere
AtomosphereAtomosphere
Atomosphere
 
Class1 Intro Is
Class1 Intro IsClass1 Intro Is
Class1 Intro Is
 
Gmg2010seminar2
Gmg2010seminar2Gmg2010seminar2
Gmg2010seminar2
 
Presentatie Concept Minor
Presentatie Concept MinorPresentatie Concept Minor
Presentatie Concept Minor
 
Bellyton
BellytonBellyton
Bellyton
 
7th Agenda For 3 8 10
7th Agenda For 3 8 107th Agenda For 3 8 10
7th Agenda For 3 8 10
 

Similar to Quick Start Guide for PrivateGSM Demo Nokia Symbian

Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ... Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...pleasure16
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with muleAnil Kumar V
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with muleAnil Kumar V
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox ConfigureSamsung Business USA
 
DI Amsterdam meetup windows hello core slides 20200319
DI Amsterdam meetup windows hello core slides 20200319DI Amsterdam meetup windows hello core slides 20200319
DI Amsterdam meetup windows hello core slides 20200319Martin Sandren
 
MongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
MongoDB World 2016: Do What Matters: Migrating to Self-Managed InfrastructureMongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
MongoDB World 2016: Do What Matters: Migrating to Self-Managed InfrastructureMongoDB
 
How to control laptop using smartphone
How to control laptop using smartphoneHow to control laptop using smartphone
How to control laptop using smartphoneJabez Winston
 
Data Security and Technical White Paper Final (1)
Data Security and Technical White Paper Final (1)Data Security and Technical White Paper Final (1)
Data Security and Technical White Paper Final (1)Lloyd SOLDATT
 
Samsung. Blockchain Keystore SDK and Use Cases
Samsung. Blockchain Keystore SDK and Use CasesSamsung. Blockchain Keystore SDK and Use Cases
Samsung. Blockchain Keystore SDK and Use CasesLennartF
 
Working With Sametime For Mobile Devices
Working With Sametime For Mobile DevicesWorking With Sametime For Mobile Devices
Working With Sametime For Mobile DevicesGabriella Davis
 
What's new in Zimbra Collaboration 8.7.x
What's new in Zimbra Collaboration 8.7.xWhat's new in Zimbra Collaboration 8.7.x
What's new in Zimbra Collaboration 8.7.xZimbra
 

Similar to Quick Start Guide for PrivateGSM Demo Nokia Symbian (20)

Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ... Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure
 
DI Amsterdam meetup windows hello core slides 20200319
DI Amsterdam meetup windows hello core slides 20200319DI Amsterdam meetup windows hello core slides 20200319
DI Amsterdam meetup windows hello core slides 20200319
 
msrm .pptx
msrm .pptxmsrm .pptx
msrm .pptx
 
MongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
MongoDB World 2016: Do What Matters: Migrating to Self-Managed InfrastructureMongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
MongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
 
assign3.docx
assign3.docxassign3.docx
assign3.docx
 
How to control laptop using smartphone
How to control laptop using smartphoneHow to control laptop using smartphone
How to control laptop using smartphone
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Mbs r33 b
Mbs r33 bMbs r33 b
Mbs r33 b
 
Data Security and Technical White Paper Final (1)
Data Security and Technical White Paper Final (1)Data Security and Technical White Paper Final (1)
Data Security and Technical White Paper Final (1)
 
3 d secure pin (1)
3 d secure pin (1)3 d secure pin (1)
3 d secure pin (1)
 
Samsung. Blockchain Keystore SDK and Use Cases
Samsung. Blockchain Keystore SDK and Use CasesSamsung. Blockchain Keystore SDK and Use Cases
Samsung. Blockchain Keystore SDK and Use Cases
 
Working With Sametime For Mobile Devices
Working With Sametime For Mobile DevicesWorking With Sametime For Mobile Devices
Working With Sametime For Mobile Devices
 
What's new in Zimbra Collaboration 8.7.x
What's new in Zimbra Collaboration 8.7.xWhat's new in Zimbra Collaboration 8.7.x
What's new in Zimbra Collaboration 8.7.x
 
Quick installation guide
Quick installation guideQuick installation guide
Quick installation guide
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 

More from PrivateWave Italia SpA

PrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateWave Italia SpA
 
PrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateWave Italia SpA
 
Private gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivate gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivateWave Italia SpA
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateWave Italia SpA
 
Enterprise voip security suite brochure_es
Enterprise voip security suite brochure_esEnterprise voip security suite brochure_es
Enterprise voip security suite brochure_esPrivateWave Italia SpA
 
Enterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itEnterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itPrivateWave Italia SpA
 
Privatewave e marketing communication online
Privatewave e marketing communication onlinePrivatewave e marketing communication online
Privatewave e marketing communication onlinePrivateWave Italia SpA
 
Sicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazioneSicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazionePrivateWave Italia SpA
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishPrivateWave Italia SpA
 
Khamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkKhamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkPrivateWave Italia SpA
 
Cellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiCellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiPrivateWave Italia SpA
 

More from PrivateWave Italia SpA (20)

PrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_en
 
PrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_it
 
Private gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivate gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_it
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical Overview
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
 
Enterprise voip security suite brochure_es
Enterprise voip security suite brochure_esEnterprise voip security suite brochure_es
Enterprise voip security suite brochure_es
 
Enterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itEnterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_it
 
Private gsm demol manuale nokia_it
Private gsm demol manuale nokia_itPrivate gsm demol manuale nokia_it
Private gsm demol manuale nokia_it
 
Private gsm demo user_manual_nokia_en
Private gsm demo user_manual_nokia_enPrivate gsm demo user_manual_nokia_en
Private gsm demo user_manual_nokia_en
 
Privatewave e marketing communication online
Privatewave e marketing communication onlinePrivatewave e marketing communication online
Privatewave e marketing communication online
 
Sicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazioneSicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica Amministrazione
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - english
 
Technical Sheet - PrivateGSM CSD
Technical Sheet - PrivateGSM CSDTechnical Sheet - PrivateGSM CSD
Technical Sheet - PrivateGSM CSD
 
Technical Sheet - PrivateGSM VoIP
Technical Sheet - PrivateGSM VoIPTechnical Sheet - PrivateGSM VoIP
Technical Sheet - PrivateGSM VoIP
 
Sicurezza per le comunicazioni VoIP
Sicurezza per le comunicazioni VoIP Sicurezza per le comunicazioni VoIP
Sicurezza per le comunicazioni VoIP
 
Khamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkKhamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social network
 
La sicurezza dei dispositivi mobili
La sicurezza dei dispositivi mobiliLa sicurezza dei dispositivi mobili
La sicurezza dei dispositivi mobili
 
Enterprise VolP Security Suite
Enterprise VolP Security SuiteEnterprise VolP Security Suite
Enterprise VolP Security Suite
 
Privatewave e i social network
Privatewave e i social networkPrivatewave e i social network
Privatewave e i social network
 
Cellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiCellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tutti
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Quick Start Guide for PrivateGSM Demo Nokia Symbian

  • 1. PrivateGSM Demo Quick Start Guide for Nokia Symbian 9, 3rd and 5th ed. Demo Version for evaluation only NOT FOR SALE: the PrivateGSM version you can purchase is sold within the Enterprise VoIP Security Suite solution. © 2005-2011 PrivateWave Italia SpA - All trademarks and copyrights are property of their respective owners. All rights reserved.
  • 2. PrivateGSM Demo 1 Summary 1. Before you begin 2 1.1 Some advices... 2 1.2 ...and one tip 2 2. Activation...in 3 easy steps! 3 1 Install PrivateGSM 3 2 Select a network access point 3 3 Launch the auto-activation 4 3. How it works 5 1 Invite your contacts 5 2 Make a secure call using PrivateGSM 5 3 Receive a secure call using PrivateGSM 6 4 Call phases 7 5 Call quality level 7 6 Check your security 8 7 Receive Only mode 8 4. Contacts 9 Quick Start Guide
  • 3. PrivateGSM Demo 2 1. Before you begin... 1.1 Some advices... = Your phone calls’ security is granted by using the VoIP data line instead of the voice one. Under particular events, due to the VoIP network condition, it could be present a little latency. If a WiFi internet connection is available, consider to use it for a better communication quality. = As a VoIP phone call, with data-packet exchanging, both the caller and the called pay for the calling. To save your money consider to subscribe an unlimited mobile internet data plan with your mobile operator. = When making a secure call, before being connected to your contact, the system needs to exchange and verify the security keys. It takes a while, so you need to wait some seconds before starting the conversation. 1.2 ...and one tip = You can save in your address book the contacts to whom you want to make secure calls by adding the secure prefix +801. Quick Start Guide
  • 4. PrivateGSM Demo 3 2. Activation...in 3 easy steps! 1 Install PrivateGSM You can download PrivateGSM on your mobile from http://www.privatewave.com Just enter your mobile number or your email address; you will receive a message including a download link. Click on the link to start downloading, then install PrivateGSM. 2 Select a network access point After the installation, in order to use PrivateGSM, you have to set its internet connection. ! Be careful: improper configuration of the Network Access Point may lead to in- ability to use PrivateGSM. It is always possible to change the access point from the main menu of PrivateGSM, just selecting: Settings >> Default access point Select a new access point from the list and confirm. Restart the application in order to make the changes effective. Quick Start Guide
  • 5. PrivateGSM Demo 4 A little hint: if you don’t know your access point, search in the suggested list for an option showing the word “internet” and then select it. 3 Launch the Auto-Activation At the end of the installation, in order to start making phone calls, PrivateGSM asks you to choose between manual and auto-activation. Choose “Auto” and complete the installation process. ! We strongly encourage automatic acti- vation. Manual activation is only recom- mended for expert users. Some automa- tions, designed to simplify product use, will be lost with manual activation. Quick Start Guide
  • 6. PrivateGSM Demo 5 3. How it works 1 Invite your contacts Using your mobile address book, you can invite your contacts to join PrivateGSM. Open PrivateGSM main menu, select “Invite others” and choose the contacts to whom you want to make secure calls. They will receive a text message includ- ing the installation link. Anyway, they can also download the software as de- scribed in step 1. 2 Make a secure call using PrivateGSM Calling with PrivateGSM is very easy; you only need to add the secure prefix +801 before the number you want to call. ! Remember to use the number in the international format, including the country code: +41 079 1234567 with PrivateGSM becomes: +801 41 079 1234567 Quick Start Guide
  • 7. PrivateGSM Demo 6 It is either possible to make a secure call through the PrivateGSM menu. Select “Dial secure call”: your address book will appear and you will just have to se- lect a name to activate a secure call. ! To make a secure call, you and the called party must be running PrivateGSM soft- ware and be connected to the Internet. 3 Receive a secure call using PrivateGSM Once PrivateGSM has been installed and all the set- tings have been correctly configured on your mobile, you will be able to receive a secure call. PrivateGSM displays an information note when an incoming secure call is ringing on your phone. You only need to press the answer button to allow the connection. The system exchanges and verifies the security keys and the conversation can start. ! To receive a secure call, you must be run- ning PrivateGSM software and be con- nected to the Internet. Quick Start Guide
  • 8. PrivateGSM Demo 7 4 Call phases To establish a call, PrivateGSM completes three phases, shown by three icons: 1. Red light: the connection is starting. This step may take several seconds. 2. Yellow light: ZRTP keys are being exchanged to secure the call. 3. Green light: secure call is established. Now it is possible to speak in a secure way. 5 Call quality level Some factors that affect the GSM network (i.e. GPRS use, poor signal, frequent radio cell changes, roaming), could decrease call quality, increasing voice delay. The “green light icon”, shown above, changes to display the current quality level: Poor connection quality. Average connection quality. Good connection quality. Quick Start Guide
  • 9. PrivateGSM Demo 8 6 Check your security A PrivateGSM phone call is always encrypted. To verify that there are no intrusions, after the call con- nection the system displays a security code consist- ing of two random words to both parties. If both, you and your contact, see the same security code then the call is secure. The security code is different each time you make or receive a secure call. 7 Receive Only Mode As the trial period expires, PrivateGSM turns in Re- ceive Only mode. In this mode PrivateGSM still allows you to receive secure calls for as long as the software will be in- stalled on your phone, but it won’t be no more pos- sible to call other PrivateGSM users. Quick Start Guide
  • 10. PrivateGSM Demo 9 4. Contacts For additional help and more information, please visit the support section at: http://www.privatewave.com To contact our technical support: Tel: +39 02 911 930 891 E-mail: support@privatewave.com Office hours: Monday to Friday, 10.00 AM - 12.00 PM and 2.30 PM - 4.30 PM (GMT +1) We remind you that the PrivateGSM Demo version is for evaluation purpose only, to show how the software works. The full version on sale is part of the Enterprise VoIP Security Suite solution for fixed- mobile encryption in a company network. For more information or technical details on the Enterprise VoIP Security Suite, get in contact with our sales team: E-mail: sales@privatewave.com Quick Start Guide