7
Notes on Security when Using Wireless LAN
(Impor
t
a
nt
in
forma
ti
o
n
o
n
c
u
s
t
omer r
ig
h
t
s (ma
int
a
ining
pr
i
vacy)
The adva
nt
a
g
e of
u
s
ing
a w
i
reless LAN over a LAN cable
i
s
t
ha
t
, beca
u
se
in
forma
ti
o
n
i
s
excha
ng
ed
u
s
ing
rad
i
o s
ign
als, yo
u
ca
n
eas
i
ly co
nn
ec
t
t
o
t
he
n
e
t
work
i
f yo
u
are w
it
h
in
ra
ng
e of
t
he rad
i
o s
ign
als. A d
i
sadva
nt
a
g
e of
t
h
i
s
i
s
t
ha
t
w
it
h
in
a cer
t
a
in
ra
ng
e,
t
he elec
t
roma
gn
e
ti
c
s
ign
als ca
n
pass
t
hro
ug
h barr
i
ers s
u
ch as walls, so
t
ha
t
i
f sec
u
r
it
y co
unt
ermeas
u
res are
n
o
t
i
mpleme
nt
ed
in
some way, problems s
u
ch as
t
he follow
ing
may occ
u
r.
• Comm
uni
ca
ti
o
n
da
t
a ca
n
be
int
ercep
t
ed
A
t
h
i
rd par
t
y may be able
t
o rece
i
ve w
i
reless
t
ra
n
sm
i
ss
i
o
n
s w
it
ho
ut
a
ut
hor
i
za
ti
o
n
, a
n
d
t
hey
co
u
ld ob
t
a
in
perso
n
al
in
forma
ti
o
n
from
t
hese
t
ra
n
sm
i
ss
i
o
n
s s
u
ch as IDs, passwords, or cred
it
card
nu
mbers, or
t
hey co
u
ld
int
ercep
t
t
he co
nt
e
nt
s of perso
n
al e-ma
i
l messa
g
es.
• U
n
a
ut
hor
i
zed access
t
o
t
he
n
e
t
work
A
t
h
i
rd par
t
y co
u
ld access a
n
in
d
i
v
i
d
u
al or
int
ra-compa
n
y
n
e
t
work w
it
ho
ut
perm
i
ss
i
o
n
a
n
d
carry o
ut
a
n
y of
t
he follow
ing
ac
ti
v
iti
es.
Retrieve personal data or other secret information (information leakage)
Pose as another user and send inappropriate data (impersonation)
Overwrite the contents of intercepted data and resend it (falsification)
Introduce a computer virus which could cause data loss or system crashes (damage)
I
niti
ally,
t
he poss
i
b
i
l
it
y
t
ha
t
s
u
ch problems co
u
ld occ
u
r
t
hro
ug
h se
tting
s co
n
cer
ning
t
he
sec
u
r
it
y of
t
he w
i
reless LAN prod
u
c
t
a
n
d by
u
s
ing
t
he prod
u
c
t
are decreased, beca
u
se
t
he
w
i
reless LAN card a
n
d
t
he access po
int
have sec
u
r
it
y meas
u
res
t
o deal w
it
h
t
hese problems.
We recomme
n
d
t
ha
t
yo
u
u
se
t
h
i
s prod
u
c
t
af
t
er mak
ing
sec
u
r
it
y se
tting
s
u
s
ing
o
u
r ow
n
j
u
d
g
eme
nt
a
n
d ass
u
m
ing
f
u
ll respo
n
s
i
b
i
l
it
y, a
n
d w
it
h yo
u
r f
u
ll
un
ders
t
a
n
d
ing
of problems
t
ha
t
may occ
u
r
i
f yo
u
do
n
o
t
make a
n
y sec
u
r
it
y se
tting
s.
Notes on Setting SSID (Service Set Identifier)
For pro
t
ec
ti
o
n
of sec
u
r
it
y,
n
o
t
e
t
he follow
ing
preca
uti
o
n
s whe
n
se
tting
t
he SSID.
• Cha
ng
e
t
he SSID from
t
he defa
u
l
t
se
tting
.
• Do
n
o
t
se
t
t
ex
t
s by wh
i
ch
t
he ow
n
er ca
n
be
i
de
nti
f
i
ed as
t
he SSID.
Notes on Setting Cryptographic Key
For pro
t
ec
ti
o
n
of sec
u
r
it
y,
n
o
t
e
t
he follow
ing
preca
uti
o
n
s whe
n
se
tting
t
he cryp
t
o
g
raph
i
c key.
• Avo
i
d
u
s
ing
words o
n
a d
i
c
ti
o
n
ary as prac
ti
cably as poss
i
ble.
• Comb
in
e mea
ning
less alpha
nu
mer
i
c charac
t
ers a
n
d symbols.
• Use
t
ex
t
s co
n
s
i
s
t
ed of a
t
leas
t
13 charac
t
ers or more or of 20 charac
t
ers or more
i
f poss
i
ble.
Summary of Contents for TM-T70II-DT
Page 16: ...16 ...
Page 54: ...54 ...
Page 76: ...76 3 From the Multiple displays list select Show desltop only on 2 4 Click OK ...
Page 118: ...118 ...
Page 195: ...Appendix 195 Page 1 Katakana ...
Page 217: ...Appendix 217 Page 35 PC861 Icelandic ...
Page 218: ...218 Page 36 PC862 Hebrew ...
Page 222: ...222 Page 40 ISO8859 15 Latin9 ...
Page 224: ...224 Page 42 PC1118 Lithuanian ...
Page 238: ...238 ...