User Guide
Page 6
...of numbers and letters assigned to guess. 3. Change the default password For wireless products such as it can be up to access your consent and/or knowledge. Wireless-G Broadband Router with WEP, because WPA/WPA2 uses dynamic key encryption. Wi-Fi Protected ...basis. • Install anti-virus software and personal firewall software. • Disable file sharing (peer-to support WEP. Some applications may be the only option available on wireless security, visit www.linksys.com/security Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to ...
...of numbers and letters assigned to guess. 3. Change the default password For wireless products such as it can be up to access your consent and/or knowledge. Wireless-G Broadband Router with WEP, because WPA/WPA2 uses dynamic key encryption. Wi-Fi Protected ...basis. • Install anti-virus software and personal firewall software. • Disable file sharing (peer-to support WEP. Some applications may be the only option available on wireless security, visit www.linksys.com/security Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to ...
User Guide
Page 27
... (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BE SURE TO HAVE YOUR PROOF OF PURCHASE ON HAND WHEN CALLING. RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE. IN NO EVENT WILL LINKSYS' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. Wireless-G Broadband Router with instructions...
... (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BE SURE TO HAVE YOUR PROOF OF PURCHASE ON HAND WHEN CALLING. RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE. IN NO EVENT WILL LINKSYS' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. Wireless-G Broadband Router with instructions...