8
• Adobe, Adobe logos, and Acrobat are registered trademarks of Adobe Systems Incorporated in the U.S. and/or other
countries.
• Microsoft, Windows and Windows XP are registered trademarks of Microsoft Corporation in the U.S. and/or other countries.
• Other names of companies and products contained in these operating instructions may be trademarks or registered trade-
marks of their respective owners.
Trademarks and Registered Trademarks
There are 3 sets of operating instructions for the WJ-ND300A as follows.
• Installation Guide (this book)
• Operating Instructions (PDF)
• Setup Instructions (PDF)
The "Installation Guide" contains descriptions of how to install/connect this unit, and descriptions of how to operate this unit
with the buttons on the front panel.
Refer to the "Operating Instructions" on the provided CD-ROM for descriptions of how to operate this unit with a PC.
Refer to the "Setup Instructions" on the provided CD-ROM for descriptions of how to perform the required settings and how to
connect to other devices.
Adobe
®
Reader is required to read the "Operating Instructions" and the "Setup Instructions" on the provided CD-ROM. When
the Adobe
®
Reader is not installed on the PC, download the latest Adobe
®
Reader from the Adobe web site and install it.
"WJ-ND300A" or "ND300A" shown in the illustrations used in these operating instructions indicate this unit or the WJ-ND300A
series.
About these Operating Instructions
Network Security
As you will use this product connected to a network, your attention is called to the following security risks.
1. Leakage or theft of information through this product
2. Use of this product for illegal operations by persons with malicious intent
3. Interference with or stoppage of this product by persons with malicious intent
It is your responsibility to take precautions such as those described below to protect yourself against the above network
security risks.
• Use this product in a network secured by a firewall, etc.
• If this product is connected to a network that includes PCs, make sure that the system is not infected by computer
viruses or other malicious entities (using a regularly updated anti-virus program, anti-spyware program, etc.).
• Protect your network against unauthorized access by restricting users to those who log in with an authorized user
name and password.
• Apply measures such as user authentication to protect your network against leakage or theft of information, including
image data, authentication information (user names and passwords), alarm mail information, FTP server information
and DDNS server information.