Reference Manual
Table Of Contents
- Camera Manuals
- Table of Contents
- For Your Safety
- Notices
- Introduction
- First Steps
- Tutorial
- Basic Photography and Playback
- Guide Mode
- Matching Settings to the Subject or Situation (Scene Mode)
- Special Effects
- More on Photography
- P, S, A, and M Modes
- Recording and Viewing Movies
- More on Playback
- Connections
- Camera Menus
- The Playback Menu: Managing Images
- The Shooting Menu: Shooting Options
- The Setup Menu: Camera Setup
- Setup Menu Options
- Reset Setup Options
- Format Memory Card
- Date Stamp
- Time Zone and Date
- Language
- Monitor Brightness
- Info Display Format
- Auto Info Display
- Auto off Timers
- Self-Timer
- Image Dust Off Ref Photo
- Image Comment
- Copyright Information
- Beep
- Flicker Reduction
- Buttons
- Rangefinder
- Manual Focus Ring in AF Mode
- File Number Sequence
- Storage Folder
- File Naming
- Location Data
- Airplane Mode
- Send to Smart Device (Auto)
- Bluetooth
- Eye-Fi Upload
- Conformity Marking
- Slot Empty Release Lock
- Reset All Settings
- Firmware Version
- Setup Menu Options
- The Retouch Menu: Creating Retouched Copies
- Recent Settings
- Troubleshooting
- Technical Notes
- Kit Lenses
- Index
167Connections
Preparing for Pairing
Before connecting, ready your smart device by installing the
SnapBridge app and enabling Bluetooth.
1 Search for “snapbridge” on the Apple App Store®
(iOS) or Google Play™ (Android™) and install the
SnapBridge app.
Information on supported operating systems is available
from the download site. This camera is not compatible with
the SnapBridge 360/170 app.
2 Enable Bluetooth on the smart device.
For more information, see the documentation for the smart
device.
D Connecting to the Camera
Connect to the camera using the SnapBridge app, not the Settings app
on your device.
A Security
Although one of the benefits of this product is that it allows others to
freely connect for the wireless exchange of data anywhere within its
range, the following may occur if security is not enabled:
• Data theft: Malicious third-parties may intercept wireless
transmissions to steal user IDs, passwords, and other personal
information.
• Unauthorized access: Unauthorized users may gain access to the
network and alter data or perform other malicious actions. Note that
due to the design of wireless networks, specialized attacks may allow
unauthorized access even when security is enabled.