Preventing Leakage of Information from Machines
Specifying Address Book Access Permissions
Encrypting Data in the Address Book
Encrypting Data on the Hard Disk
Enabling the Encryption Settings
Deleting Data on the Hard Disk
Specifying the HDD Authentication Code