Panasonic WV-SC385 설치 매뉴얼 - 페이지 8

{카테고리_이름} Panasonic WV-SC385에 대한 설치 매뉴얼을 온라인으로 검색하거나 PDF를 다운로드하세요. Panasonic WV-SC385 36 페이지. Ip video cameras
Panasonic WV-SC385에 대해서도 마찬가지입니다: 사양 (2 페이지), 설치 매뉴얼 (40 페이지), 비교 차트 (6 페이지), 설치 매뉴얼 (40 페이지), 설치 매뉴얼 (40 페이지), 통합 참고 사항 (8 페이지)

Panasonic WV-SC385 설치 매뉴얼

Trademarks and registered trademarks

• Microsoft, Windows, Windows Vista, Internet Explorer, ActiveX and DirectX are either registered trademarks or trade-
marks of Microsoft Corporation in the United States and/or other countries.
• Microsoft product screen shot(s) reprinted with permission from Microsoft Corporation.
• Intel and Intel Core are trademarks or registered trademarks of Intel Corporation in the United States and other coun-
tries.
• Adobe, the Adobe logo and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in
the United States and/or other countries.
• SDHC Logo is a trademark of SD-3C, LLC.
• All other trademarks identified herein are the property of their respective owners.

About copyright and license

Distributing, copying, disassembling, reverse compiling, reverse engineering, and also exporting in violation of export laws
of the software provided with this unit are expressly prohibited.

Network security

As you will use this unit connected to a network, your attention is called to the following security risks.
q Leakage or theft of information through this unit
w Use of this unit for illegal operations by persons with malicious intent
e Interference with or stoppage of this unit by persons with malicious intent
It is your responsibility to take precautions such as those described below to protect yourself against the above network
security risks.
• Use this unit in a network secured by a firewall, etc.
• If this unit is connected to a network that includes PCs, make sure that the system is not infected by computer viruses
or other malicious entities (using a regularly updated anti-virus program, anti-spyware program, etc.).
• Protect your network against unauthorized access by restricting users to those who log in with an authorized user
name and password.
• Apply measures such as user authentication to protect your network against leakage or theft of information, including
image data, authentication information (user names and passwords), alarm mail information, FTP server information
and DDNS server information.
• After the unit is accessed by the administrator, make sure to close the browser.
• Change the administrator password periodically.
• Do not install the camera in locations where the camera or the cables can be destroyed or damaged by persons with
malicious intent.
8