Panasonic WV-NF284 - i-Pro Network Camera Посібник з монтажу - Сторінка 7

Переглянути онлайн або завантажити pdf Посібник з монтажу для Відеокамера. Panasonic WV-NF284 - i-Pro Network Camera. Panasonic WV-NF284 - i-Pro Network Camera 36 сторінок. Ip video cameras
Також для Panasonic WV-NF284 - i-Pro Network Camera: Технічні характеристики (2 сторінок), Брошура (2 сторінок), Посилання (2 сторінок), Посилання (2 сторінок), Порівняльна таблиця (6 сторінок), Технічні характеристики (2 сторінок), Технічні характеристики (2 сторінок), Інтеграційна примітка (8 сторінок)

Panasonic WV-NF284 - i-Pro Network Camera Посібник з монтажу

Trademarks and Registered Trademarks

• Microsoft, Windows, Internet Explorer, and DirectX are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
• Intel and Pentium are trademarks or registered trademarks of Intel Corporation or its sub-
sidiaries in the United States and other countries.
• Adobe and Reader are either registered trademarks or trademarks of Adobe Systems
Incorporated in the United States and/or other countries.
• SD logo is a trademark.
• Other names of companies and products contained in these operating instructions may be
trademarks or registered trademarks of their respective owners.

Network Security

As you will use this product connected to a network, your attention is called to the following
security risks.
1. Leakage or theft of information through this product
2. Use of this product for illegal operations by persons with malicious intent
3. Interference with or stoppage of this product by persons with malicious intent
It is your responsibility to take precautions such as those described below to protect your-
self against the above network security risks.
• Use this product in a network secured by a firewall, etc.
• If this product is connected to a network that includes PCs, make sure that the system
is not infected by computer viruses or other malicious entities (using a regularly updat-
ed anti-virus program, anti-spyware program, etc.).
• Protect your network against unauthorized access by restricting users to those who log
in with an authorized user name and password.
• Apply measures such as user authentication to protect your network against leakage or
theft of information, including image data, authentication information (user names and
passwords), alarm mail information, FTP server information and DDNS server informa-
tion.
• Do not install the camera in locations where the camera or the cables can be
destroyed or damaged by persons with malicious intent.
7