z
Security Precautions
Because Wi-Fi uses radio waves to transmit signals, security precautions
more stringent than when using a LAN cable are required.
Keep the following points in mind when using Wi-Fi.
z
Only use networks you are authorized to use.
This product searches for Wi-Fi networks in the vicinity and displays
the results on the screen. Networks you are not authorized to use
(unknown networks) may also be displayed. However, attempting to
connect to or using such networks could be regarded as unauthorized
access. Be sure to use only networks you are authorized to use, and do
not attempt to connect to other unknown networks.
If security settings have not been properly set, the following problems may
occur.
z
Transmission monitoring
Third parties with malicious intent may monitor Wi-Fi transmissions and
attempt to acquire the data you are sending.
z
Unauthorized network access
Third parties with malicious intent may gain unauthorized access to
the network you are using to steal, modify, or destroy information.
Additionally, you could fall victim to other types of unauthorized access
such as impersonation (where someone assumes an identity to gain
access to unauthorized information) or springboard attacks (where
someone gains unauthorized access to your network as a springboard
to cover their tracks when infiltrating other systems).
To prevent these types of problems from occurring, be sure to thoroughly
secure your Wi-Fi network.
Only use this camera’s Wi-Fi function with a proper understanding of
Wi-Fi security, and balance risk and convenience when adjusting security
settings.
318
Summary of Contents for PowerShot G5X Mark II
Page 51: ...Instead of pressing the button z z Touch Instead of pressing the button z z Touch 51 ...
Page 193: ...Selecting all images on a card z z All images on card OK 193 ...
Page 254: ...Ending Wi Fi Connections 1 Press the button 2 Disconnect exit OK 254 ...
Page 305: ...5 Access the printing screen z z button Print image 6 Print 305 ...
Page 306: ...Appendix 306 ...