Nikon Z 6 Bedienungsanleitung Seite 241

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 272
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 240
241Technical Notes
Security
Although one of the benefits of this product is that it allows others to freely
connect for the wireless exchange of data anywhere within its range, the
following may occur if security is not enabled:
Data theft: Malicious third-parties may intercept wireless transmissions to
steal user IDs, passwords, and other personal information.
Unauthorized access: Unauthorized users may gain access to the network
and alter data or perform other malicious actions. Note that due to the
design of wireless networks, specialized attacks may allow unauthorized
access even when security is enabled.
Unsecured networks: Connecting to open networks may result in
unauthorized access. Use secure networks only.
A Conformity Marking
The standards with which the camera complies can be viewed using the
Conformity marking option in the setup menu.
A Certificates
Seitenansicht 240
1 2 ... 236 237 238 239 240 241 242 243 244 245 246 ... 271 272

Kommentare zu diesen Handbüchern

Keine Kommentare