User Manual - Page 230

For 2208C001.

Loading ...
Loading ...
Loading ...
230
Camera Basics
Auto Mode /
Hybrid Auto Mode
Other Shooting Modes
P Mode
Tv, Av, M, and C Mode
Playback Mode
Wireless Features
Setting Menu
Accessories
Appendix
Before Use
Basic Guide
Advanced Guide
Index
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR
ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE
OR OTHER DEALINGS IN THE SOFTWARE.
AES-128 Library
Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. All rights
reserved.
LICENSE TERMS
The redistribution and use of this software (with or without changes) is
allowed without the payment of fees or royalties provided that:
1. source code distributions include the above copyright notice, this list of
conditions and the following disclaimer;
2. binary distributions include the above copyright notice, this list of
conditions and the following disclaimer in their documentation;
3. the name of the copyright holder is not used to endorse products built
using this software without specic written permission.
DISCLAIMER
This software is provided 'as is' with no explicit or implied warranties in
respect of its properties, including, but not limited to, correctness and/or
tness for purpose.
If security settings have not been properly set, the following problems may
occur.
Transmission monitoring
Third parties with malicious intent may monitor Wi-Fi transmissions and
attempt to acquire the data you are sending.
Unauthorized network access
Third parties with malicious intent may gain unauthorized access to
the network you are using to steal, modify, or destroy information.
Additionally, you could fall victim to other types of unauthorized access
such as impersonation (where someone assumes an identity to gain
access to unauthorized information) or springboard attacks (where
someone gains unauthorized access to your network as a springboard to
cover their tracks when inltrating other systems).
To prevent these types of problems from occurring, be sure to thoroughly
secure your Wi-Fi network.
Only use this camera’s Wi-Fi function with a proper understanding of
Wi-Fi security, and balance risk and convenience when adjusting security
settings.
Third-Party Software
expat.h
Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd
Permission is hereby granted, free of charge, to any person obtaining a
copy of this software and associated documentation les (the “Software”),
to deal in the Software without restriction, including without limitation the
rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
sell copies of the Software, and to permit persons to whom the Software
is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included
in all copies or substantial portions of the Software.
Loading ...