Password protection is not a new feature in cellular phones. This is among those rarely used functions available in most handsets. All phones have this one function to set a password to your phone to prevent misuse. However, we do warn that you still need to monitor your phone and not leave it to unauthorised use. While going through the functions in your phone, you’ll come across two security codes – PIN and PIN2. These are two codes which are generally 4 digits wide, but can go up to 8 digits. PIN is used to prevent unauthorised access to your cell phone. Normally, most OEMs set these to default values of 1234 and 12345, respectively. You or the handset user would be prompted to key in the PIN on accessing keypad.
Similarly, in order to access the priority numbers in the phone, there is another PIN2 that you need to key in. As a protective measure, the phone gives you just three chances at entering the correct PIN. So be sure, don’t take your password lightly. If you don’t get the code right on the third try, the subscriber identity module (SIM) card gets locked. Once your SIM card is locked, you need to contact your cellular operator and request a PIN unlocking key (PUK). Your operator would provide this code after you verify your identification and provide them with your international mobile subscriber identity (IMSI) number. You can get your IMSI by referring to your SIM card. It’s the 15-digit number printed on your SIM.
By taking this single precautionary step, you would save any fidgety and inquisitive person from getting hold of your personal information. For increased security, you can install third-party applications to prevent unauthorised access to your phone. However the choice depends on how critical the information on your phone is. Else, increasing the number of applications on your handset would just eat into the processor causing a slowdown in its operation. Practically, one, or at the most two levels of security is more than sufficient. Depending on what you want to keep away, you can use either of the solutions mentioned in the following sections.