User Manual
Page 6
... (such as access points and routers, you can be intercepted. For example, you will be more information on a regular basis. • Install anti-virus software and personal firewall software. • Disable file sharing (peer-to every networking device. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalency Privacy (WEP) offer different levels...
... (such as access points and routers, you can be intercepted. For example, you will be more information on a regular basis. • Install anti-virus software and personal firewall software. • Disable file sharing (peer-to every networking device. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalency Privacy (WEP) offer different levels...
User Manual
Page 32
..., REGARDLESS OF THE THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. The foregoing limitations will be free of purchase. Linksys pays for all inquiries...
..., REGARDLESS OF THE THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. The foregoing limitations will be free of purchase. Linksys pays for all inquiries...