Feeds
85%

LG Renoir eight-megapixel cameraphone

Serious alternative to the you-know-what

Choosing a cloud hosting partner with confidence

You can simply flick through these with your finger, and drag and drop as many of them as you like onto the main part of the screen, moving them around as you like. Close the widgets function, and they remain on screen until you choose to drag them off again.

Pressing the main menu button calls u a side bar of four sub-menu category icons: communication, entertainment, utilities and settings. Tap these and you get a grid of related function icons to select from.

LG Renoir KC910 8Mp cameraphone

Buttons are well-space to avoid mis-presses

You’ll find the screen lock automatically kicks in to prevent accidental pressing, or you can lock it by pressing a button on the side of the phone. Press and hold an on-screen lock icon, or the side button, and it unlocks easily enough.

Usefully, you can tap the top of the screen in most menu screens to get an status summary which, as well as various connectivity and battery read-outs, also provides switches for Bluetooth, Wi-Fi and the music player.

When you're composing messages and emails, or typing notes or memos, hold the phone in portrait mode to use the virtual phone numberpad for normal texting input. Alternatively, turn the phone sideways, and a motion sensor automatically flips the screen sideways and pops up a Qwerty keyboard.

Its keys are small, but it is surprisingly usable - we found it perfectly fine for tapping in messages. And if you want to see a full message you’re composing, a virtual button press hides the keyboard or numbered to view full text on screen, giving plenty more reading room.

Internet Security Threat Report 2014

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.