1792C001 Canon Cameras

User Manual - Page 188

For 1792C001.

PDF File Manual, 189 pages, Download pdf file

Loading ...
Loading ...
Loading ...
188
Before Use
Basic Guide
Advanced Guide
Index
Camera Basics
Auto Mode /
Hybrid Auto Mode
Other Shooting Modes
P Mode
Tv, Av, and M Mode
Playback Mode
Wireless Features
Setting Menu
Accessories
Appendix
Third-Party Software
expat.h
Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd
Permission is hereby granted, free of charge, to any person obtaining
a copy of this software and associated documentation les (the
"Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Software, and to permit
persons to whom the Software is furnished to do so, subject to the
following conditions:
The above copyright notice and this permission notice shall be
included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR
ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE
OR OTHER DEALINGS IN THE SOFTWARE.
If security settings have not been properly set, the following problems may
occur.
Transmission monitoring
Third parties with malicious intent may monitor Wi-Fi transmissions
and attempt to acquire the data you are sending.
Unauthorized network access
Third parties with malicious intent may gain unauthorized access to
the network you are using to steal, modify, or destroy information.
Additionally, you could fall victim to other types of unauthorized access
such as impersonation (where someone assumes an identity to gain
access to unauthorized information) or springboard attacks (where
someone gains unauthorized access to your network as a springboard
to cover their tracks when inltrating other systems).
To prevent these types of problems from occurring, be sure to thoroughly
secure your Wi-Fi network.
Only use this camera’s Wi-Fi function with a proper understanding of
Wi-Fi security, and balance risk and convenience when adjusting security
settings.
Loading ...