Toshiba P200 Series User Manual page 66

Toshiba dvd video player user's manual
Hide thumbs Also See for P200 Series:
Table of Contents

Advertisement

11a, 11b, 11g and 11n wireless are based on IEEE 802.11a, 802.11b,
802.11g and 802.11n respectively. The IEEE 802.11n specification has not
been finalized and is currently in draft release. The TOSHIBA 11a/b/g/n
Wireless LAN Adapters are based on the Draft Release, Version 1.0, of the
IEEE 802.11n specification. An Adapter with 11a/b, 11a/b/g or 11a/b/g/n
can communicate on any of its supported formats; the actual connection
will be based on the access point to which it connects.
Connection compatibility with the wireless equipment in Draft 11n mode is
not guaranteed.
The Draft 11n function cannot be used with WEP/TKIP. Draft 11n mode can
be used only with WPA-PSK (AES) mode or no security mode.
Security
1. TOSHIBA strongly recommends that you enable the WPA encryption
function otherwise your computer could be left open to illicit access via
the wireless LAN connection which may result in an intrusion that can
lead to the theft or loss of stored data among other things. In addition,
the owner of an Internet connection is responsible for all browsing,
downloading, and uploading activities on that connection. Therefore, an
unsecured wireless network connected directly to the Internet is an
open invitation for outsiders to abuse your ISP account and privileges.
2. TOSHIBA is not liable for the eavesdropping on your data due to the
use of the wireless LAN connection and any damage that may occur
thereof.
Bluetooth wireless technology
Bluetooth
electronic devices such as desktop computers, printers and mobile phones.
Bluetooth wireless technology has the following features:
Worldwide operation
The Bluetooth radio transmitter and receiver operate in the 2.4 GHz band,
which is license-free and compatible with radio systems in most countries
in the world.
Radio links
You can easily establish links between two or more devices. The link is
maintained even if the devices are not within line of sight.
Security
Two advanced security mechanisms ensure a high level of security:
Authentication prevents access to critical data and makes it impossible
to falsify the origin of a message.
Encryption prevents eavesdropping and maintains link privacy.
User's Manual
®
wireless technology eliminates the need for cables between
Operating Basics
4-9

Advertisement

Table of Contents
loading

Table of Contents