xxiv
Security
Although one of the benefits of this product is that it allows others to freely
connect for the wireless exchange of data anywhere within its range, the
following may occur if security is not enabled:
•
Data theft: Malicious third-parties may intercept wireless transmissions to
steal user IDs, passwords, and other personal information.
•
Unauthorized access: Unauthorized users may gain access to the network
and alter data or perform other malicious actions. Note that due to the
design of wireless networks, specialized attacks may allow unauthorized
access even when security is enabled.
•
Unsecured networks: Connecting to open networks may result in
unauthorized access. Use secure networks only.
Summary of Contents for D5600
Page 57: ...29 First Steps Open the Monitor Open the monitor as shown Do not use force ...
Page 136: ...108 More on Photography 2 Choose an ISO sensitivity Highlight an option and press J ...
Page 396: ...368 Technical Notes A Certificates ...
Page 425: ......
Page 429: ... N j I t I N 0 Cl l w N ...