Product Manual
Page 18
...to log in to your camera's configuration interface. Clicking on the Password will open the Maintenance > Admin page where you with links to various support websites and downloads related to your Password. Clicking on the Device Name will open the Maintenance > Admin page ... Device Name: The Device Name is a unique name that your device. MAC Address: Displays the MAC address of your device. Clicking on the Show Password checkbox will open a window for your camera. D-Link DCS-930L User Manual 18 Camera Password: Displays the current password for you identify it...
...to log in to your camera's configuration interface. Clicking on the Password will open the Maintenance > Admin page where you with links to various support websites and downloads related to your Password. Clicking on the Device Name will open the Maintenance > Admin page ... Device Name: The Device Name is a unique name that your device. MAC Address: Displays the MAC address of your device. Clicking on the Show Password checkbox will open a window for your camera. D-Link DCS-930L User Manual 18 Camera Password: Displays the current password for you identify it...
Product Manual
Page 21
... to configure your connection using the Internet Connection Setup Wizard that do not have Java installed, you may manually configure your network by -step instructions. D-Link DCS-930L User Manual 21 Section 4 - Configuration Live Video ActiveX: For Windows® Users that includes step-by using the Manual Internet Connection Setup...
... to configure your connection using the Internet Connection Setup Wizard that do not have Java installed, you may manually configure your network by -step instructions. D-Link DCS-930L User Manual 21 Section 4 - Configuration Live Video ActiveX: For Windows® Users that includes step-by using the Manual Internet Connection Setup...
Product Manual
Page 42
... security features of TKIP. Security What is built on your wireless connection. The password can access the network. WPA2 is based on a computer's hardware-specific MAC address, which is an alpha-numeric password between 8 and 63 characters long. TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking... 2 major improvements over WEP: Improved data encryption through the extensible authentication protocol (EAP). WEP regulates access to ensure that the keys haven't been tampered with. D-Link DCS-930L User Manual 42
... security features of TKIP. Security What is built on your wireless connection. The password can access the network. WPA2 is based on a computer's hardware-specific MAC address, which is an alpha-numeric password between 8 and 63 characters long. TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking... 2 major improvements over WEP: Improved data encryption through the extensible authentication protocol (EAP). WEP regulates access to ensure that the keys haven't been tampered with. D-Link DCS-930L User Manual 42