Owner's Manual
Table Of Contents
- User Manual
- Reference Manual
- Table of Contents
- For Your Safety
- Notices
- Bluetooth
- Introduction
- First Steps
- Tutorial
- Basic Photography and Playback
- Guide Mode
- Matching Settings to the Subject or Situation (Scene Mode)
- Special Effects
- More on Photography
- P, S, A, and M Modes
- Recording and Viewing Movies
- Playback and Deletion
- Connections
- Camera Menus
- The Playback Menu: Managing Images
- The Shooting Menu: Shooting Options
- The Setup Menu: Camera Setup
- Setup Menu Options
- Reset Setup Options
- Format Memory Card
- Date Stamp
- Time Zone and Date
- Language
- Monitor Brightness
- Info Display Format
- Auto Info Display
- Auto off Timers
- Self-Timer
- Remote on Duration (ML-L3)
- Image Dust Off Ref Photo
- Image Comment
- Copyright Information
- Beep
- Flicker Reduction
- Buttons
- Rangefinder
- Manual Focus Ring in AF Mode
- File Number Sequence
- Storage Folder
- File Naming
- Location Data
- Airplane Mode
- Connect to Smart Device
- Send to Smart Device (Auto)
- Bluetooth
- Eye-Fi Upload
- Conformity Marking
- Slot Empty Release Lock
- Reset All Settings
- Firmware Version
- Setup Menu Options
- The Retouch Menu: Creating Retouched Copies
- Recent Settings
- Technical Notes
- 18-55mm Lens Warranty
- Camera Warranty
222 B The Setup Menu: Camera Setup
Select Enable to disable the wireless features of Eye-Fi cards and
Bluetooth connections to smart devices.
Adjust settings for connection to smart
devices.
Airplane Mode
G button ➜ B setup menu
Connect to Smart Device
G button ➜ B setup menu
A Security
Although one of the benefits of this product is that it allows others to
freely connect for the wireless exchange of data anywhere within its
range, the following may occur if security is not enabled:
• Data theft: Malicious third-parties may intercept wireless
transmissions to steal user IDs, passwords, and other personal
information.
• Unauthorized access: Unauthorized users may gain access to the
network and alter data or perform other malicious actions.
Note that
due to the design of wireless networks, specialized attacks may allow
unauthorized access even when security is enabled.










