Panasonic WJ-GXE100 Installation Guide - Page 8

Trademarks and registered trademarks, Copyright, Network security - software

Page 8 highlights

Trademarks and registered trademarks • Adobe, Acrobat Reader, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. • Microsoft, Windows, Windows Vista, Internet Explorer, ActiveX, and DirectX are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. • Microsoft product screen shot(s) reprinted with permission from Microsoft Corporation. • Intel and Intel Core are trademarks of Intel Corporation in the U.S. and other countries. • iPad, iPhone, and iPod touch are trademarks of Apple Inc., registered in the U.S. and other countries. • Android is a trademark of Google Inc. • All other trademarks identified herein are the property of their respective owners. Copyright Distributing, copying, disassembling, reverse compiling and reverse engineering of the software provided with this product are all expressly prohibited. In addition, exporting any software provided with this product violating export laws is prohibited. Network security As you will use this unit connected to a network, your attention is called to the following security risks. q Leakage or theft of information through this unit w Use of this unit for illegal operations by persons with malicious intent e Interference with or stoppage of this unit by persons with malicious intent It is your responsibility to take precautions such as those described below to protect yourself against the above network security risks. • Use this unit in a network secured by a firewall, etc. • If this unit is connected to a network that includes PCs, make sure that the system is not infect- ed by computer viruses or other malicious entities (using a regularly updated anti-virus program, anti-spyware program, etc.). • Protect your network against unauthorized access by restricting users to those who log in with an authorized user name and password. • Apply measures such as user authentication to protect your network against leakage or theft of information, including image data, authentication information (user names and passwords), alarm mail information, FTP server information and DDNS server information. • After the unit is accessed by the administrator, make sure to close the browser. • Change the administrator password periodically. • Do not install this unit in locations where the unit or the cables can be destroyed or damaged by persons with malicious intent. 8

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32

8
Trademarks and registered trademarks
Adobe, Acrobat Reader, and Reader are either registered trademarks or trademarks of Adobe
Systems Incorporated in the United States and/or other countries.
• Microsoft, Windows, Windows Vista, Internet Explorer, ActiveX, and DirectX are either regis
-
tered trademarks or trademarks of Microsoft Corporation in the United States and/or other
countries.
• Microsoft product screen shot(s) reprinted with permission from Microsoft Corporation.
• Intel and Intel Core are trademarks of Intel Corporation in the U.S. and other countries.
• iPad, iPhone, and iPod touch are trademarks of Apple Inc., registered in the U.S. and other
countries.
• Android is a trademark of Google Inc.
• All other trademarks identified herein are the property of their respective owners.
Copyright
Distributing, copying, disassembling, reverse compiling and reverse engineering of the software
provided with this product are all expressly prohibited. In addition, exporting any software provided
with this product violating export laws is prohibited.
Network security
As you will use this unit connected to a network, your attention is called to the following security
risks.
q
Leakage or theft of information through this unit
w
Use of this unit for illegal operations by persons with malicious intent
e
Interference with or stoppage of this unit by persons with malicious intent
It is your responsibility to take precautions such as those described below to protect yourself
against the above network security risks.
• Use this unit in a network secured by a firewall, etc.
• If this unit is connected to a network that includes PCs, make sure that the system is not infect
-
ed by computer viruses or other malicious entities (using a regularly updated anti-virus pro-
gram, anti-spyware program, etc.).
• Protect your network against unauthorized access by restricting users to those who log in with
an authorized user name and password.
• Apply measures such as user authentication to protect your network against leakage or theft of
information, including image data, authentication information (user names and passwords),
alarm mail information, FTP server information and DDNS server information.
• After the unit is accessed by the administrator, make sure to close the browser.
• Change the administrator password periodically.
• Do not install this unit in locations where the unit or the cables can be destroyed or damaged
by persons with malicious intent.