Chapter 1
Preparation — Precautions for use
ENGLISH - 17
f
Prevent hot and cool air from the air conditioning system to blow directly to the ventilation ports (intake and
exhaust) of the projector.
Power supply unit
Power supply unit
Track
system
Air exhaust port
Air intake port
Air exhaust port
Air intake port
300 mm (11-13/16") or longer
200 mm (7-7/8") or longer
*1
200 mm (7-7/8") or longer
Main unit
Track system
Air exhaust port
Main unit
300 mm (11-13/16") or longer
90 mm(3-17/32") or longer
*1
*1 Distance from the wall or ceiling surface which will block the whole air intake port
f
Do not install the projector in a confined space.
When installing the projector in a confined space, provide air conditioning or ventilation separately. Exhaust heat
may accumulate when the ventilation is not enough, triggering the protection circuit of the projector.
Security
When using this product, take safety measures against the following incidents.
f
Personal information being leaked via this product
f
Unauthorized operation of this product by a malicious third party
f
Interfering or stopping of this product by a malicious third party
Take sufficient security measures. (
x
pages 98, 127)
f
Make your password difficult to guess as much as possible.
f
Change your password periodically. Set the password from the [SECURITY] menu → [SECURITY PASSWORD
CHANGE].
f
Panasonic Corporation or its affiliate companies will never ask for your password directly. Do not divulge your
password in case you receive such inquiries.
f
The connecting network must be secured by a firewall, etc.
f
Set a password for the web control and restrict the users who can log in. Set the password for the web control
from the [Change password] page of the web control screen.
r
Security when using the wireless LAN product
The advantage of a wireless LAN is that information can be exchanged between a PC or other such equipment
and a wireless access point using radio waves, instead of using a LAN cable, as long as you are within range for
radio transmissions.
On the other hand, because the radio waves can travel through obstacles (such as walls) and are available
everywhere within a given range, problems of the type listed below may occur if security settings are insufficient.
f
Transmitted data may be intercepted
A malicious third-part may intentionally intercept radio waves and monitor the following transmitted data.
g
Personal information such as your ID, password, credit card number
g
Content of an Email
f
Illegally accessed
A malicious third party may access your personal or corporate network without authorization and engage in the
following types of behavior.
g
Retrieve personal and/or secret information (information leak)
g
Spread false information by impersonating a particular person (spoofing)
g
Overwrite intercepted communications and issue false data (tampering)
g
Spread harmful software such as a computer virus and crash your data and/or system (system crash)
Since most wireless LAN adapters or access points are equipped with security features to take care of these
problems, you can reduce the possibility of these problems occurring when using this product by making the
appropriate security settings for the wireless LAN device.