Dahua DH-NC1800 Скачать руководство пользователя страница 13

User’s Manual 

 

Cybersecurity Recommendations 

Appendix 3

Security Statement 

 

If you connect the product to the Internet, you need to bear the risks, including but not limited 
to the possibility of network attacks, hacker attacks, virus infections, etc., please strengthen the 
protection of the network, platform data and personal information, and take the necessary 
measures to ensure the cyber security of platform, including but not limited to use complex 
passwords, regularly change passwords, and timely update platform products to the latest 
version, etc. Dahua does not assume any responsibility for the product abnormality, information 
leakage and other problems caused by this, but will provide product-related security 
maintenance. 

 

Where applicable laws are not expressly prohibited, for any profit, income, sales loss, data loss 
caused by the use or inability to use this product or service, or the cost, property damage, 
personal injury, service interruption, business information loss of purchasing alternative goods 
or services, or any special, direct,  indirect, incidental, economic, covering, punitive, special or 
ancillary damage, regardless of the theory of liability (contract, tort, negligence, or other) , 
Dahua and its employees, licensors or affiliates are not liable for compensation, even if they 
have been notified of the possibility of such damage. Some jurisdictions do not allow limitation 
of liability for personal injury, incidental or consequential damages, etc., so this limitation may 
not apply to you. 

 

Dahua's total liability for all your damages (except for the case of personal injury or death due to 
the company's negligence, subject to applicable laws and regulations) shall not exceed the price 
you paid for the products. 

Security Recommendations 

The necessary measures to ensure the basic cyber security of the platform: 

1.

 

Use Strong Passwords 

Please refer to the following suggestions to set passwords: 

 

The length should not be less than 8 characters. 

 

Include at least two types of characters; character types include upper and lower case 

letters, numbers and symbols. 

 

Do not contain the account name or the account name in reverse order. 

 

Do not use continuous characters, such as 123, abc, etc. 

 

Do not use overlapped characters, such as 111, aaa, etc. 

2.

 

Customize the Answer to the Security Question 

The security question setting should ensure the difference of answers, choose different 

questions and customize different answers (all questions are prohibited from being set to the 

same answer) to reduce the risk of security question being guessed or cracked. 

Содержание DH-NC1800

Страница 1: ...802 11AX 1800 M Wireless Adapter DH NC1800 Quick Start Guide V1 0 0 ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD...

Страница 2: ...l data of others such as their face fingerprints and license plate number You need to be in compliance with your local privacy protection laws and regulations to protect the legitimate rights and inte...

Страница 3: ...ion of the functions operations and technical data If there is any doubt or dispute we reserve the right of final explanation Upgrade the reader software or try other mainstream reader software if the...

Страница 4: ...allation Requirements WARNING Strictly abide by local electrical safety standards and make sure that the voltage in the area is steady and conforms to the power requirements of the device Do not expos...

Страница 5: ...ting environment Temperature 0 to 40 32 F to 104 F Humidity 10 90 RH non condensing Maintenance Requirements Power off the device before maintenance Mark key components on the maintenance circuit diag...

Страница 6: ...ling the wireless USB adapter Windows 10 supported 1 2 Connecting to Wi Fi network Windows 10 used as an example 3 Uninstalling the existing wireless adapter driver on your computer 5 Appendix 1 Addin...

Страница 7: ...nstalling the existing wireless adapter driver on your computer Use the USB extension cable to connect the wireless USB adapter to the USB port of your Step 1 computer Connect the device Figure 1 1 Do...

Страница 8: ...e click Setup exe and then install the wireless USB adapter according to the prompts Step 4 Double click Setup exe Figure 1 4 Wait a moment until the initialization finishes Now you can connect to the...

Страница 9: ...corner of your screen select the desired Wi Fi network and Step 1 then click Connect Connect to Wi Fi network Figure 2 1 If the wireless network is encrypted enter its wireless password click Next an...

Страница 10: ...User s Manual 4 Successfully connected to Wi Fi network Figure 2 3...

Страница 11: ...uter Perform the following steps Windows 10 used as an example Click in the bottom left corner of your screen and then click Step 1 Appendix Figure 1 1 Click settings icon Click Apps Step 2 Appendix F...

Страница 12: ...as an example Right click on your desktop and choose Personalize Step 1 Appendix Figure 2 1 Choose Personalize Select Themes from the left sidebar and then click Desktop icon settings Step 2 Appendix...

Страница 13: ...egligence or other Dahua and its employees licensors or affiliates are not liable for compensation even if they have been notified of the possibility of such damage Some jurisdictions do not allow lim...

Страница 14: ...ces under Windows and Telnet port 23 and SSH port 22 under Linux At the same time close the database port to the outside or only open to a specific IP address such as MySQL port 3306 to reduce the ris...

Страница 15: ...User s Manual 9 More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations...

Страница 16: ...User s Manual...

Отзывы: