7
Notes on Security when Using Wireless LAN
(Impor
t
a
nt
in
forma
ti
o
n
o
n
c
u
s
t
omer r
ig
h
t
s (ma
int
a
ining
pr
i
vacy)
The adva
nt
a
g
e of
u
s
ing
a w
i
reless LAN over a LAN cable
i
s
t
ha
t
, beca
u
se
in
forma
ti
o
n
i
s
excha
ng
ed
u
s
ing
rad
i
o s
ign
als, yo
u
ca
n
eas
i
ly co
nn
ec
t
t
o
t
he
n
e
t
work
i
f yo
u
are w
it
h
in
ra
ng
e of
t
he rad
i
o s
ign
als. A d
i
sadva
nt
a
g
e of
t
h
i
s
i
s
t
ha
t
w
it
h
in
a cer
t
a
in
ra
ng
e,
t
he elec
t
roma
gn
e
ti
c
s
ign
als ca
n
pass
t
hro
ug
h barr
i
ers s
u
ch as walls, so
t
ha
t
i
f sec
u
r
it
y co
unt
ermeas
u
res are
n
o
t
i
mpleme
nt
ed
in
some way, problems s
u
ch as
t
he follow
ing
may occ
u
r.
• Comm
uni
ca
ti
o
n
da
t
a ca
n
be
int
ercep
t
ed
A
t
h
i
rd par
t
y may be able
t
o rece
i
ve w
i
reless
t
ra
n
sm
i
ss
i
o
n
s w
it
ho
ut
a
ut
hor
i
za
ti
o
n
, a
n
d
t
hey
co
u
ld ob
t
a
in
perso
n
al
in
forma
ti
o
n
from
t
hese
t
ra
n
sm
i
ss
i
o
n
s s
u
ch as IDs, passwords, or cred
it
card
nu
mbers, or
t
hey co
u
ld
int
ercep
t
t
he co
nt
e
nt
s of perso
n
al e-ma
i
l messa
g
es.
• U
n
a
ut
hor
i
zed access
t
o
t
he
n
e
t
work
A
t
h
i
rd par
t
y co
u
ld access a
n
in
d
i
v
i
d
u
al or
int
ra-compa
n
y
n
e
t
work w
it
ho
ut
perm
i
ss
i
o
n
a
n
d
carry o
ut
a
n
y of
t
he follow
ing
ac
ti
v
iti
es.
Retrieve personal data or other secret information (information leakage)
Pose as another user and send inappropriate data (impersonation)
Overwrite the contents of intercepted data and resend it (falsification)
Introduce a computer virus which could cause data loss or system crashes (damage)
I
niti
ally,
t
he poss
i
b
i
l
it
y
t
ha
t
s
u
ch problems co
u
ld occ
u
r
t
hro
ug
h se
tting
s co
n
cer
ning
t
he
sec
u
r
it
y of
t
he w
i
reless LAN prod
u
c
t
a
n
d by
u
s
ing
t
he prod
u
c
t
are decreased, beca
u
se
t
he
w
i
reless LAN card a
n
d
t
he access po
int
have sec
u
r
it
y meas
u
res
t
o deal w
it
h
t
hese problems.
We recomme
n
d
t
ha
t
yo
u
u
se
t
h
i
s prod
u
c
t
af
t
er mak
ing
sec
u
r
it
y se
tting
s
u
s
ing
o
u
r ow
n
j
u
d
g
eme
nt
a
n
d ass
u
m
ing
f
u
ll respo
n
s
i
b
i
l
it
y, a
n
d w
it
h yo
u
r f
u
ll
un
ders
t
a
n
d
ing
of problems
t
ha
t
may occ
u
r
i
f yo
u
do
n
o
t
make a
n
y sec
u
r
it
y se
tting
s.
Notes on Setting SSID (Service Set Identifier)
For pro
t
ec
ti
o
n
of sec
u
r
it
y,
n
o
t
e
t
he follow
ing
preca
uti
o
n
s whe
n
se
tting
t
he SSID.
• Cha
ng
e
t
he SSID from
t
he defa
u
l
t
se
tting
.
• Do
n
o
t
se
t
t
ex
t
s by wh
i
ch
t
he ow
n
er ca
n
be
i
de
nti
f
i
ed as
t
he SSID.
Notes on Setting Cryptographic Key
For pro
t
ec
ti
o
n
of sec
u
r
it
y,
n
o
t
e
t
he follow
ing
preca
uti
o
n
s whe
n
se
tting
t
he cryp
t
o
g
raph
i
c key.
• Avo
i
d
u
s
ing
words o
n
a d
i
c
ti
o
n
ary as prac
ti
cably as poss
i
ble.
• Comb
in
e mea
ning
less alpha
nu
mer
i
c charac
t
ers a
n
d symbols.
• Use
t
ex
t
s co
n
s
i
s
t
ed of a
t
leas
t
13 charac
t
ers or more or of 20 charac
t
ers or more
i
f poss
i
ble.
Содержание TM-H6000IV-DT
Страница 54: ...54 ...
Страница 65: ...Chapter 2 Setup 65 2 5 Select the position where the DM D110 USB is to be installed from A B C or D ...
Страница 116: ...116 ...
Страница 122: ...122 ...
Страница 188: ...188 ...
Страница 195: ...Chapter 6 Handling 195 6 4 Pull out some paper and close the roll paper cover 5 Tear off the paper with the cutter ...
Страница 206: ...206 Common to All Pages When the international character set See International Character Sets on page 219 is USA ...
Страница 207: ...Appendix 207 Page 0 PC437 USA Standard Europe ...
Страница 208: ...208 Page 1 Katakana ...
Страница 209: ...Appendix 209 Page 2 PC850 Multilingual ...
Страница 210: ...210 Page 3 PC860 Portuguese ...
Страница 211: ...Appendix 211 Page 4 PC863 Canadian French ...
Страница 212: ...212 Page 5 PC865 Nordic ...
Страница 213: ...Appendix 213 Page 16 WPC1252 ...
Страница 214: ...214 Page 17 PC866 Cyrillic 2 ...
Страница 215: ...Appendix 215 Page 18 PC852 Latin2 ...
Страница 216: ...216 Page 19 PC858 Euro ...
Страница 220: ...220 ...