Canon PIXMA SELPHY CP1200 User Guide

Page of 66
65
While Printing
Do not disconnect the printer from other devices until printing is finished, 
which may cause incomplete or incorrect prints.
This product can print using PictBridge over wireless LANs.
PictBridge technical standards facilitate direct connection of cameras, 
printers, and other devices for easy printing. Support for the PictBridge 
DPS over IP standard enables the product to print wirelessly in network 
environments.
WPA Supplicant License
WPA Supplicant 
Copyright (c) 2003-2012, Jouni Malinen <j@w1.fi> and contributors All Rights 
Reserved.
This program is licensed under the BSD license (the one with advertisement clause 
removed).
If you are submitting changes to the project, please see CONTRIBUTIONS file for more 
instructions.
License
This software may be distributed, used, and modified under the terms of BSD license:
Redistribution and use in source and binary forms, with or without modification, are 
permitted provided that the following conditions are met:
1.  Redistributions of source code must retain the above copyright notice, this list of 
conditions and the following disclaimer.
2.  Redistributions in binary form must reproduce the above copyright notice, this list of 
conditions and the following disclaimer in the documentation and/or other materials 
provided with the distribution.
3.  Neither the name(s) of the above-listed copyright holder(s) nor the names of its 
contributors may be used to endorse or promote products derived from this software 
without specific prior written permission.
Security Precautions
Because Wi-Fi uses radio waves to transmit signals, security precautions 
more stringent than when using a LAN cable are required.
Keep the following points in mind when using Wi-Fi.
• 
Use only networks you are authorized to use.  
This product searches for Wi-Fi networks in the vicinity and displays the 
results on the screen.  
Networks you are not authorized to use (unknown networks) may also 
be displayed. However, attempting to connect to or using such networks 
could be regarded as unauthorized access. Be sure to use only networks 
you are authorized to use, and do not attempt to connect to other 
unknown networks.
If security settings have not been properly set, the following problems may 
occur.
• 
Transmission monitoring
Third parties with malicious intent may monitor Wi-Fi transmissions and 
attempt to acquire the data you are sending.
• 
Unauthorized network access
Third parties with malicious intent may gain unauthorized access to the 
network you are using to steal, modify, or destroy information.
Additionally, you could fall victim to other types of unauthorized access 
such as impersonation (where someone assumes an identity to gain 
access to unauthorized information) or springboard attacks (where 
someone gains unauthorized access to your network as a springboard to 
cover their tracks when infiltrating other systems).
To prevent these types of problems from occurring, be sure to thoroughly 
secure your Wi-Fi network.
Only use this product’s Wi-Fi function with a proper understanding of 
Wi-Fi security, and balance risk and convenience when adjusting security 
settings.