Before You Connect The Camera To The Computer - Canon PoverShot SD430 User Manual

Table of Contents

Advertisement

121
Read This First
Before You Connect the Camera to the Computer
Precautions when Connecting
• The connection may not operate correctly if you attach the camera to the computer with an
interface cable via a USB hub.
• The con nection may not operate correctly if you are using other USB devices, excluding USB
mice or keyboards, at the same time as the camera. If this occurs, disconnect the other
devices from the computer and try reconnecting the camera.
• Do not connect two or more cameras at the same time to the same computer. The
connections may not operate correctly.
• Never allow the computer to go into standby (sleep) mode while a camera is connected via
the USB interface. If it does happen, never disconnect the interface cable. Try to awaken the
computer with the camera in the connected state Some computers will not awaken properly
if you disconnect the camera while they are in standby (sleep) mode. Please refer to your
computer manual for instructions regarding the standby (sleep) mode.
• You are recommended to power the camera from a household power source
(AC adapter) when connecting to a computer (if available for your camera
model). Ensure that you use fully charged batteries if you will not be using a
household power source.
• See the
Camera User Guide
for procedures connecting the camera to the
computer.
Security Precautions for Wireless LAN Products
Since wireless LANs use radio signals to exchange information between devices instead of
cables, they have the merits of making a LAN connection possible within the range of the radio
signal. Conversely, the following problems may occur if the network security settings are not
correctly configured because the radio signals can travel beyond barriers (for example, walls) to
their full range.
• Data Content Can Be Spied Upon
Third parties with malicious intent may deliberately eavesdrop on radio signals and spy on
image and other data in transmission.
• Unauthorized Access
Third parties with malicious intent may access the network without consent and obtain image
data (information leakage). They may commit the following offences:
• Impersonate a person and transmit the data to others, distributing fraudulent information
(impersonation)
• Alter and transmit intercepted transmissions (falsification)
• Corrupt image data (data corruption)
Wireless LAN products generally have security features to deal with these issues, allowing you
to configure the security settings and use the product with minimal risk.
If you choose to use the product without configuring the security features, we recommend that
you gain a full understanding of the potential problems and use the product on the basis of
your own judgement and responsibility.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Diciital ixus wirelessDiciital elph wireless

Table of Contents