xxiv
Security
Although one of the benefits of this product is that it allows others to freely
connect for the wireless exchange of data anywhere within its range, the
following may occur if security is not enabled:
•
Data theft: Malicious third-parties may intercept wireless transmissions to
steal user IDs, passwords, and other personal information.
•
Unauthorized access: Unauthorized users may gain access to the network
and alter data or perform other malicious actions. Note that due to the
design of wireless networks, specialized attacks may allow unauthorized
access even when security is enabled.
•
Unsecured networks: Connecting to open networks may result in
unauthorized access. Use secure networks only.
Содержание D5600
Страница 57: ...29 First Steps Open the Monitor Open the monitor as shown Do not use force ...
Страница 125: ...97 More on Photography A Live View Press the X button to zoom in for precise focus in live view 0 53 X button ...
Страница 136: ...108 More on Photography 2 Choose an ISO sensitivity Highlight an option and press J ...
Страница 396: ...368 Technical Notes A Certificates ...
Страница 425: ......
Страница 429: ... N j I t I N 0 Cl l w N ...