Canon PowerShot G16 User Guide - Page 211

Radio Wave Interference Precautions, Security Precautions

Page 211 highlights

Radio Wave Interference Precautions • This product may receive interference from other devices that emit radio waves. To avoid interference, be sure to use this product as far away as possible from such devices, or avoid using the devices at the same time as this product. Security Precautions Because Wi-Fi uses radio waves to transmit signals, security precautions more stringent than when using a LAN cable are required. Keep the following points in mind when using Wi-Fi. • Only use networks you are authorized to use. This product searches for Wi-Fi networks in the vicinity and displays the results on the screen. Networks you are not authorized to use (unknown networks) may also be displayed. However, attempting to connect to or using such networks could be regarded as unauthorized access. Be sure to use only networks you are authorized to use, and do not attempt to connect to other unknown networks. If security settings have not been properly set, the following problems may occur. • Transmission monitoring Third parties with malicious intent may monitor Wi-Fi transmissions and attempt to acquire the data you are sending. • Unauthorized network access Third parties with malicious intent may gain unauthorized access to the network you are using to steal, modify, or destroy information. Additionally, you could fall victim to other types of unauthorized access such as impersonation (where someone assumes an identity to gain access to unauthorized information) or springboard attacks (where someone gains unauthorized access to your network as a springboard to cover their tracks when infiltrating other systems). To prevent these types of problems from occurring, be sure to thoroughly secure your Wi-Fi network. Only use this camera's Wi-Fi function with a proper understanding of Wi-Fi security, and balance risk and convenience when adjusting security settings. The camera can print to PictBridge-compatible printers via Wi-Fi. PictBridge technical standards make it easy to connect digital cameras, printers, and other devices directly. Additionally, a new standard called DPS over IP enables PictBridge connections in network environments, and the camera is also compatible with this standard. Cover Before Use Common Camera Operations Basic Guide Advanced Guide 1 Camera Basics 2 Auto Mode / Hybrid Auto Mode 3 Other Shooting Modes 4 P Mode 5 Tv, Av, M, C1, and C2 Mode 6 Playback Mode 7 Wi-Fi Functions 8 Setting Menu 9 Accessories 10 Appendix Index 211

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214

211
1
2
3
4
5
6
7
8
9
10
Cover
Before Use
Common Camera
Operations
Advanced Guide
Camera Basics
Auto Mode /
Hybrid Auto Mode
Other Shooting
Modes
Tv, Av, M, C1,
and C2 Mode
Playback Mode
Wi-Fi Functions
Setting Menu
Accessories
Appendix
Index
Basic Guide
P Mode
Unauthorized network access
Third parties with malicious intent may gain unauthorized access to
the network you are using to steal, modify, or destroy information.
Additionally, you could fall victim to other types of unauthorized access
such as impersonation (where someone assumes an identity to gain
access to unauthorized information) or springboard attacks (where
someone gains unauthorized access to your network as a springboard to
cover their tracks when infiltrating other systems).
To prevent these types of problems from occurring, be sure to thoroughly
secure your Wi-Fi network.
Only use this camera’s Wi-Fi function with a proper understanding of
Wi-Fi security, and balance risk and convenience when adjusting security
settings.
The camera can print to PictBridge-compatible printers
via Wi-Fi. PictBridge technical standards make it easy
to connect digital cameras, printers, and other devices
directly. Additionally, a new standard called DPS over IP
enables PictBridge connections in network environments,
and the camera is also compatible with this standard.
Radio Wave Interference Precautions
This product may receive interference from other devices that emit radio
waves. To avoid interference, be sure to use this product as far away as
possible from such devices, or avoid using the devices at the same time
as this product.
Security Precautions
Because Wi-Fi uses radio waves to transmit signals, security precautions
more stringent than when using a LAN cable are required.
Keep the following points in mind when using Wi-Fi.
Only use networks you are authorized to use.
This product searches for Wi-Fi networks in the vicinity and displays the
results on the screen. Networks you are not authorized to use (unknown
networks) may also be displayed. However, attempting to connect to or
using such networks could be regarded as unauthorized access. Be sure
to use only networks you are authorized to use, and do not attempt to
connect to other unknown networks.
If security settings have not been properly set, the following problems may
occur.
Transmission monitoring
Third parties with malicious intent may monitor Wi-Fi transmissions and
attempt to acquire the data you are sending.