●● Unauthorized network access
Third parties with malicious intent may gain unauthorized access to the network you are using to steal, modify, or destroy information. Additionally, you could fall victim to other types of unauthorized access such as impersonation (where someone assumes an identity to gain access to unauthorized information) or springboard attacks (where someone gains unauthorized access to your network as a springboard to cover their tracks when infiltrating other systems).
To prevent these types of problems from occurring, be sure to thoroughly secure your
Only use this camera’s
The camera can print to
Trademarks and Licensing
●● Microsoft and Windows are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries.
●● Macintosh and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries.
●● App Store, iPhone, and iPad are trademarks of Apple Inc. ●● The SDXC logo is a trademark of
●● HDMI, the HDMI logo and
●● The iFrame logo and the iFrame symbol are trademarks of Apple Inc.
●●
●● The
●● All other trademarks are the property of their respective owners.
●● This device incorporates exFAT technology licensed from Microsoft.
●● This product is licensed under AT&T patents for the
a personal and
Disclaimer
●● Unauthorized reproduction of this guide is prohibited. ●● All measurements based on Canon testing standards.
●● Information subject to change without notice, as are product specifications and appearance.
●● Illustrations and screenshots in this guide may differ slightly from the actual equipment.
●● The above items notwithstanding, Canon cannot be held liable for any loss arising from the use of this product.
Before Use
Basic Guide
Advanced Guide
1 | Camera Basics |
|
|
2 | Auto Mode / |
Hybrid Auto Mode | |
|
|
3 | Other Shooting Modes |
|
|
4 | P Mode |
|
|
5 | Tv, Av, M, C1, and C2 Mode |
|
|
6 | Playback Mode |
|
|
7 | |
|
|
8 | Setting Menu |
|
|
9 | Accessories |
|
|
10 | Appendix |
Index
203