Panasonic WV-NF284 - i-Pro Network Camera Kurulum Kılavuzu - Sayfa 7

Video Kamera Panasonic WV-NF284 - i-Pro Network Camera için çevrimiçi göz atın veya pdf Kurulum Kılavuzu indirin. Panasonic WV-NF284 - i-Pro Network Camera 36 sayfaları. Ip video cameras
Ayrıca Panasonic WV-NF284 - i-Pro Network Camera için: Teknik Özellikler (2 sayfalar), Broşür (2 sayfalar), Referans (2 sayfalar), Referans (2 sayfalar), Karşılaştırma Tablosu (6 sayfalar), Teknik Özellikler (2 sayfalar), Teknik Özellikler (2 sayfalar), Entegrasyon Notu (8 sayfalar)

Panasonic WV-NF284 - i-Pro Network Camera Kurulum Kılavuzu

Trademarks and Registered Trademarks

• Microsoft, Windows, Internet Explorer, and DirectX are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
• Intel and Pentium are trademarks or registered trademarks of Intel Corporation or its sub-
sidiaries in the United States and other countries.
• Adobe and Reader are either registered trademarks or trademarks of Adobe Systems
Incorporated in the United States and/or other countries.
• SD logo is a trademark.
• Other names of companies and products contained in these operating instructions may be
trademarks or registered trademarks of their respective owners.

Network Security

As you will use this product connected to a network, your attention is called to the following
security risks.
1. Leakage or theft of information through this product
2. Use of this product for illegal operations by persons with malicious intent
3. Interference with or stoppage of this product by persons with malicious intent
It is your responsibility to take precautions such as those described below to protect your-
self against the above network security risks.
• Use this product in a network secured by a firewall, etc.
• If this product is connected to a network that includes PCs, make sure that the system
is not infected by computer viruses or other malicious entities (using a regularly updat-
ed anti-virus program, anti-spyware program, etc.).
• Protect your network against unauthorized access by restricting users to those who log
in with an authorized user name and password.
• Apply measures such as user authentication to protect your network against leakage or
theft of information, including image data, authentication information (user names and
passwords), alarm mail information, FTP server information and DDNS server informa-
tion.
• Do not install the camera in locations where the camera or the cables can be
destroyed or damaged by persons with malicious intent.
7