Canon PowerShot SX730 HS Owner's Manual

Page of 289
188
Before Use
Basic Guide
Advanced Guide
Index
Camera Basics
Auto Mode / 
Hybrid Auto Mode
Other Shooting Modes
P Mode
Tv, Av, and M Mode
Playback Mode
Wireless Features
Setting Menu
Accessories
Appendix
Third-Party Software
 
expat.h 
Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd 
 
Permission is hereby granted, free of charge, to any person obtaining 
a copy of this software and associated documentation files (the 
"Software"), to deal in the Software without restriction, including 
without limitation the rights to use, copy, modify, merge, publish, 
distribute, sublicense, and/or sell copies of the Software, and to permit 
persons to whom the Software is furnished to do so, subject to the 
following conditions:  
 
The above copyright notice and this permission notice shall be 
included in all copies or substantial portions of the Software. 
 
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF 
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED 
TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A 
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT 
SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR 
ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN 
ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE 
OR OTHER DEALINGS IN THE SOFTWARE.
If security settings have not been properly set, the following problems may 
occur.
 
Transmission monitoring 
Third parties with malicious intent may monitor Wi-Fi transmissions 
and attempt to acquire the data you are sending.
 
Unauthorized network access 
Third parties with malicious intent may gain unauthorized access to 
the network you are using to steal, modify, or destroy information. 
Additionally, you could fall victim to other types of unauthorized access 
such as impersonation (where someone assumes an identity to gain 
access to unauthorized information) or springboard attacks (where 
someone gains unauthorized access to your network as a springboard 
to cover their tracks when infiltrating other systems).
To prevent these types of problems from occurring, be sure to thoroughly 
secure your Wi-Fi network.
Only use this camera’s Wi-Fi function with a proper understanding of 
Wi-Fi security, and balance risk and convenience when adjusting security 
settings.