- ページ 10
ビデオカメラ Panasonic WV-SF342のPDF インストレーション・マニュアルをオンラインで閲覧またはダウンロードできます。Panasonic WV-SF342 44 ページ。 Ip video cameras
Panasonic WV-SF342 にも: 仕様 (2 ページ), 特徴と仕様 (2 ページ), インストレーション・マニュアル (48 ページ), 統合ノート (8 ページ)
Trademarks and registered trademarks
• Microsoft, Windows, Windows Vista, Internet Explorer, ActiveX and DirectX are either registered
trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
• Intel and Intel Core are trademarks or registered trademarks of Intel Corporation in the United
States and other countries.
• Adobe, the Adobe logo, and Reader are either registered trademarks or trademarks of Adobe
Systems Incorporated in the United States and/or other countries.
• SDHC logo is a trademark.
• Other names of companies and products contained in these operating instructions may be
trademarks or registered trademarks of their respective owners.
About copyright and license
Distributing, copying, disassembling, reverse compiling, reverse engineering, and also exporting in
violation of export laws of the software provided with this unit are expressly prohibited.
Network security
As you will use this unit connected to a network, your attention is called to the following security
risks.
q Leakage or theft of information through this unit
w Use of this unit for illegal operations by persons with malicious intent
e Interference with or stoppage of this unit by persons with malicious intent
It is your responsibility to take precautions such as those described below to protect yourself
against the above network security risks.
• Use this unit in a network secured by a firewall, etc.
• If this unit is connected to a network that includes PCs, make sure that the system is not infect-
ed by computer viruses or other malicious entities (using a regularly updated anti-virus pro-
gram, anti-spyware program, etc.).
• Protect your network against unauthorized access by restricting users to those who log in with
an authorized user name and password.
• Apply measures such as user authentication to protect your network against leakage or theft of
information, including image data, authentication information (user names and passwords),
alarm mail information, FTP server information and DDNS server information.
• After the unit is accessed by the administrator, make sure to close the browser for added secu-
rity.
• Change the administrator password periodically for added security.
• Do not install the camera in locations where the camera or the cables can be destroyed or
damaged by persons with malicious intent.
10