Help Guide

Index
Appendix
Errors and Warnings
94
Troubleshooting
Settings
Playback
Shooting
Setup and Basics
Learning About the Camera
Accessories
Wireless Features
Wireless Features/Accessories
Security Precautions
Because Wi-Fi uses radio waves to transmit signals, security precautions
more stringent than when using a LAN cable are required.
Keep the following points in mind when using Wi-Fi.
Only use networks you are authorized to use.
This product searches for Wi-Fi networks in the vicinity and displays
the results on the screen. Networks you are not authorized to use
(unknown networks) may also be displayed. However, attempting to
connect to or using such networks could be regarded as unauthorized
access. Be sure to use only networks you are authorized to use, and
do not attempt to connect to other unknown networks.
If security settings have not been properly set, the following problems may
occur.
Transmission monitoring
Third parties with malicious intent may monitor Wi-Fi transmissions
and attempt to acquire the data you are sending.
Unauthorized network access
Third parties with malicious intent may gain unauthorized access to
the network you are using to steal, modify, or destroy information.
Additionally, you could fall victim to other types of unauthorized access
such as impersonation (where someone assumes an identity to gain
access to unauthorized information) or springboard attacks (where
someone gains unauthorized access to your network as a springboard
to cover their tracks when inltrating other systems).
To prevent these types of problems from occurring, be sure to thoroughly
secure your Wi-Fi network.
Only use this camera’s Wi-Fi function with a proper understanding of
Wi-Fi security, and balance risk and convenience when adjusting security
settings.
Third-Party Software
AES-128 Library
Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. All rights
reserved.
LICENSE TERMS
The redistribution and use of this software (with or without changes) is
allowed without the payment of fees or royalties provided that:
1. source code distributions include the above copyright notice, this list
of conditions and the following disclaimer;
2. binary distributions include the above copyright notice, this list of
conditions and the following disclaimer in their documentation;
3. the name of the copyright holder is not used to endorse products
built using this software without specic written permission.
DISCLAIMER
This software is provided 'as is' with no explicit or implied warranties in
respect of its properties, including, but not limited to, correctness and/
or tness for purpose.