Panasonic WJ-GXE100 Installation Guide Page 8

  • Download
  • Add to my manuals
  • Print
  • Page
    / 32
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 7
8
Trademarks and registered trademarks
• Adobe, Acrobat Reader, and Reader are either registered trademarks or trademarks of Adobe
Systems Incorporated in the United States and/or other countries.
• Microsoft, Windows, Windows Vista, Internet Explorer, ActiveX, and DirectX are either regis-
tered trademarks or trademarks of Microsoft Corporation in the United States and/or other
countries.
• Microsoftproductscreenshot(s)reprintedwithpermissionfromMicrosoftCorporation.
• IntelandIntelCorearetrademarksofIntelCorporationintheU.S.andothercountries.
• iPad, iPhone,andiPod touch are trademarksof AppleInc., registered in theU.S. andother
countries.
• AndroidisatrademarkofGoogleInc.
• Allothertrademarksidentifiedhereinarethepropertyoftheirrespectiveowners.
Copyright
Distributing, copying, disassembling, reverse compiling and reverse engineering of the software
provided with this product are all expressly prohibited. In addition, exporting any software provided
with this product violating export laws is prohibited.
Network security
As you will use this unit connected to a network, your attention is called to the following security
risks.
q Leakage or theft of information through this unit
w Use of this unit for illegal operations by persons with malicious intent
e Interference with or stoppage of this unit by persons with malicious intent
It is your responsibility to take precautions such as those described below to protect yourself
against the above network security risks.
• Usethisunitinanetworksecuredbyafirewall,etc.
• IfthisunitisconnectedtoanetworkthatincludesPCs,makesurethatthesystemisnotinfect-
ed by computer viruses or other malicious entities (using a regularly updated anti-virus pro-
gram, anti-spyware program, etc.).
• Protectyournetworkagainstunauthorizedaccessbyrestrictinguserstothosewhologinwith
an authorized user name and password.
• Applymeasuressuchasuserauthenticationtoprotectyournetworkagainstleakageortheftof
information, including image data, authentication information (user names and passwords),
alarm mail information, FTP server information and DDNS server information.
• Aftertheunitisaccessedbytheadministrator,makesuretoclosethebrowser.
• Changetheadministratorpasswordperiodically.
• Donotinstallthisunitinlocationswheretheunitorthecablescanbedestroyedordamaged
by persons with malicious intent.
Page view 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 31 32

Comments to this Manuals

No comments