Operating Instructions
10
English
is reduced.
Security-related settings may not have been
made immediately after the purchase of a
wireless LAN device. In order to reduce the
possibility of occurrence of security problems, the
customer is requested to ensure that all security-
related settings have been made for the wireless
LAN devices, and the operation manual of each
wireless LAN device is followed.
Please note that due to the specifications of the
wireless LAN, security settings may be breached
by special methods.
Panasonic recommends the customer to properly
understand the problems that may occur if the
product is used without making security settings,
and to use the product after making security-
related settings based on the decision and
responsibility of the customer themselves.
Disposal
The lamp contains mercury. When discarding the
product and the removed old lamp unit, please
contact your local authorities or dealer and ask
for the correct method of disposal.
Security-related requests
The use of this product is likely to be
accompanied with the following dangers.
•
Leakage of private information of customers
using this product
•
Unauthorized operation of the product by a
malicious third party
•
Interference or stopping of operation of the
product by a malicious third party
Use the projector with a safe and secure network
by setting a firewall, etc.
Security-related cautions when using a
wireless LAN product
In the case of wireless LAN, information is
exchanged between the computer or a similar
device and wireless access points by using radio
waves rather than a LAN cable, and therefore,
there is an advantage that a LAN connection can
be freely established as long as radio waves can
reach the location.
On the other hand, if the radio waves are within
a certain range, they will reach all locations by
surpassing the obstacles (such as walls), and
therefore, if security-related settings have not
been made, the following problems may occur.
•
Communication contents may be stolen
A malicious third person may deliberately
intercept the radio waves, and may steal the
following communication contents.
– Personal information such as ID, password,
credit card number, etc.
– E-mail contents
•
There may be an unauthorized entry
A malicious third person may access a
personal or company’s network without
permission, and the following unauthorized
actions may be performed.
– Extracting personal information and
confidential information (information
leakage)
– Communicating under the pretext of some
particular person so that unauthorized
information can be let out (spoofing)
– Rewriting and dispatching intercepted
communication contents (falsification)
– Sending out a computer virus, etc. so as to
damage the data or system (destruction)
Essentially, a wireless LAN adapter and wireless
LAN access point are equipped with a security
mechanism to handle such problems, and
therefore, by making security-related settings
for a wireless LAN product, and then using the
product, the possibility of occurrence of problems










