Operation Manual
xv
Notice of Security with Wireless Devices
Wireless LAN provides data transfer by means of electric waves instead of LAN
cables between communicating devices such as personal computers and a wireless
LAN station. Wireless LAN has an advantage of simple and ubiquitous LAN
connection in the ranges where electric waves are available. Since electric waves can
penetrate through walls and reach everywhere, wireless LAN without proper security
settings includes some security threats and can produce the situations mentioned
below.
•
Eavesdropping
Malicious third parties can intercept the transmission and monitor your mail to
steal personal information such as an identification number, password, and credit
card number.
•
Intruding
Malicious third parties can connect to a personal or office network without
authorization and illegally perform the following:
•
Obtaining access to confidential customer records or sensitive corporate
information (Information leakage)
•
Faking the original information (Spoofing)
•
Altering the original data and transmitting (Falsification)
•
Spreading computer viruses resulting in the destruction of data or systems
(Destruction)
Although wireless LAN cards and wireless LAN stations (Access Points) have
security measures against the threats above, no security settings may have been
configured at the time of your purchase.
All security features must be configured according to reference manuals of the
wireless LAN devices, which results in reducing vulnerability to the attacks
described above.
Use the wireless devices with a clear understanding that wireless LAN includes
vulnerabilities that could allow attackers to simply bypass security features. Security
measures are important for all users to understand for the safe use of wireless LAN.
SHARP encourages all users to configure the security settings with their own
judgment and responsibility.
Содержание Actius PC-MC22
Страница 24: ...Overview of Computer xxiv Rear Bottom Battery Pack 2 1 Modem Jack 4 20 Ventilation Openings vii ...
Страница 48: ...Basic Operations 1 24 1 ...
Страница 112: ...Setup Utility 5 8 5 ...
Страница 136: ...Appendixes A 24 Appendixes ...
Страница 152: ...Troubleshooting T 16 Troubleshooting ...