beautypg.com

Security precautions – Canon IXUS 180 User Manual

Page 142

background image

142

Before Use

Basic Guide

Advanced Guide

Camera Basics

Auto Mode
Other Shooting

Modes
P Mode

Playback Mode

Setting Menu

Wi-Fi Functions

Accessories

Appendix

Index

The camera can print to PictBridge-compatible printers

via Wi-Fi. PictBridge technical standards make it easy

to connect digital cameras, printers, and other devices

directly. Additionally, a new standard called DPS over IP

enables PictBridge connections in network environments,

and the camera is also compatible with this standard.

Trademarks and Licensing

Microsoft and Windows are trademarks or registered trademarks of

Microsoft Corporation in the United States and/or other countries.

Macintosh and Mac OS are trademarks of Apple Inc., registered in the

U.S. and other countries.

App Store, iPhone, and iPad are trademarks of Apple Inc.

The SDXC logo is a trademark of SD-3C, LLC.

Wi-Fi

®

, Wi-Fi Alliance

®

, WPA™, WPA2™ and Wi-Fi Protected Setup™

are trademarks or registered trademarks of the Wi-Fi Alliance.

The N-Mark is a trademark or registered trademark of NFC Forum, Inc. in

the United States and in other countries.

All other trademarks are the property of their respective owners.

This device incorporates exFAT technology licensed from Microsoft.

This product is licensed under AT&T patents for the MPEG-4 standard

and may be used for encoding MPEG-4 compliant video and/or decoding

MPEG-4 compliant video that was encoded only (1) for a personal and

non-commercial purpose or (2) by a video provider licensed under the

AT&T patents to provide MPEG-4 compliant video. No license is granted

or implied for any other use for MPEG-4 standard.

Security Precautions

Because Wi-Fi uses radio waves to transmit signals, security precautions

more stringent than when using a LAN cable are required.

Keep the following points in mind when using Wi-Fi.

Only use networks you are authorized to use.

This product searches for Wi-Fi networks in the vicinity and displays the

results on the screen. Networks you are not authorized to use (unknown

networks) may also be displayed. However, attempting to connect to or

using such networks could be regarded as unauthorized access. Be sure

to use only networks you are authorized to use, and do not attempt to

connect to other unknown networks.

If security settings have not been properly set, the following problems may

occur.

Transmission monitoring
Third parties with malicious intent may monitor Wi-Fi transmissions and

attempt to acquire the data you are sending.

Unauthorized network access
Third parties with malicious intent may gain unauthorized access to

the network you are using to steal, modify, or destroy information.

Additionally, you could fall victim to other types of unauthorized access

such as impersonation (where someone assumes an identity to gain

access to unauthorized information) or springboard attacks (where

someone gains unauthorized access to your network as a springboard to

cover their tracks when infiltrating other systems).

To prevent these types of problems from occurring, be sure to thoroughly

secure your Wi-Fi network.

Only use this camera’s Wi-Fi function with a proper understanding of

Wi-Fi security, and balance risk and convenience when adjusting security

settings.

This manual is related to the following products: