Usage Environment of the Computer
It is recommended to use the computer that is connected to the machine with the environment
described below. If you connect the computer in a non-recommended environment, outside parties might
view your login ID, password, and other information.