ZyXEL Communications network camera Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 91 Seiten
- 1.47 mb
Zur Seite of
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung ZyXEL Communications network camera an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von ZyXEL Communications network camera, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung ZyXEL Communications network camera die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung ZyXEL Communications network camera. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung ZyXEL Communications network camera sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts ZyXEL Communications network camera
- Den Namen des Produzenten und das Produktionsjahr des Geräts ZyXEL Communications network camera
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts ZyXEL Communications network camera
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von ZyXEL Communications network camera zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von ZyXEL Communications network camera und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service ZyXEL Communications finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von ZyXEL Communications network camera zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts ZyXEL Communications network camera, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von ZyXEL Communications network camera widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
IPC-3605N The First Consumer-Friendly Network Camera Edition 1.1, 2/2012 www .zyxel.com Copyrigh t © 201 1 ZyXEL Communica tions Cor poration[...]
-
Seite 2
[...]
-
Seite 3
1 Contents 2 Getting to know your IPC-3605N ............................................................................... 6 2.1 Package Contents .............................................................................................. 6 2.2 Features .........................................................................[...]
-
Seite 4
Important Notices Regulatory Notice This device complies with Part 15 of the FCC Rules. Operation is subject to the following two cond itions: (1) This device m ay not cause harm ful interference , and (2) This device must acce pt any interference received, including interfe rence th at may cause undesired operation. FCC Interference Statement This[...]
-
Seite 5
About This Manual This manual is inde nted only for users of the ZyXEL IPC-3 60 5 N netw ork camera. Conventions in this Manual While using this manual, pay attention to symbols and notations used to draw attention to special situations, su ch as: Caution! Information provided with this symbol is critical to prevent dam age to the product or injury[...]
-
Seite 6
2 Getting to know your IPC-3605N 2.1 Package Contents Before setup, ensure your package contains all contents. If anything is missing, contact your distributor. Number Contents IPC-3605N Network Camera Ethernet Cable Power Adapter Quick Installation Guide Install Disk Mounting Screw x3/ Screw Mount x3 USB Wireless Adapter[...]
-
Seite 7
2.2 Features ZyXEL’s IPC-3605N is an easy to inst all product with support for H.264/MPEG- 4/MJPEG video compression formats to help ensure high quality video with reduced bandwidth consumption. Small and smart functional design 2 megapixel/HD resolution Dual H.264, MJPEG, or MPEG-4 video streams Active bandwidth management Ne[...]
-
Seite 8
2.3 Camera Layout Number Contents Light Sensor Lens IR LEDs x6 (inside) USB Wireless Adapter Connector Audio Input Reset Button MicroSD Card Slot (on side) Microphone LED status indicator Speaker Focus adjustment ring Microphone input Power adapter port Composite video jack Ethernet port I/O (2 in/1 out) & RJ-485 connecto r[...]
-
Seite 9
2.4 LED Status Indicator The LED status indicator consists of one red and one blue LED. Depending on the camera’s status, the LEDs will app ear as follows: Red IR LEDs (Left), Blue Status LED (Right) When the IP camera is turned on, the LED s will light in th e following patterns: Red LEDs Blue LED Indication On On System booting Off On Successfu[...]
-
Seite 10
2.5 Digital I/O Connector Block The I/O connector on the back of the cam era provides a central interface between your home security system and various input devices. The two digital inputs are normally used with security sensors. They work by detecting a change in the state of an open or closed circu it. You can check the status of the circuit in [...]
-
Seite 11
3 Installation 3.1 Connecting your IPC-3605N The picture below illustrates the basi c connection of your IPC-3605N camera: The following table describes the nu mbered item s: Number Contents Ethernet cable from PC to hub/router. Ethernet cable from router to camera . Use the bundled Ethernet cable to connect the LAN port of the IP camer a to the LA[...]
-
Seite 12
3.2 Wireless While using the ZyXEL Wireless adapter, you’ ll be able to connect your camera to your network via WiFi. Keep in mind that you can only have one active connection at any given time – either through LAN or a wireless network. Note: If the wireless connection drops or seems slow, try m oving your IP camera closer to the wireless acce[...]
-
Seite 13
3.3 Wall and Ceiling Mounting In order to mount the camera on the wa ll or ceiling, use the included screws to fix the bracket to a flat surface. Af ter the camera has been affixed, adjust the camera to the required viewing angle. Follow the steps below to mount your camera: Step 1: Detach the metal mounting plate from the base of the camera by ins[...]
-
Seite 14
3.4 Dismounting the Camera The following instructions will deta il how to remove the camera from a mounted surface. A flat head and Philli ps screwdriver will be required. Step 1: Remove the came ra from the metal mounting plate by inserting a flat head screw driver into the rectangular hole on the wide end of the plastic base, and pushing downward[...]
-
Seite 15
3.5 Disassemble/Assemble the camera stand The camera comes at tached to its stand when delivered from ZyXEL. If you need to detach or reattach the stand, follow the diagrams below. To reattach the camera stand:[...]
-
Seite 16
4 Initial Setup Before running the setup utility, make sure you have the IP Camera properly connected. To begin setup, insert the installation CD supplied with the camera into the CD-ROM drive of the viewing PC, and the eaZy Wizard utility will s tart and guide you during the installation process of th e hardware and software for your IP camera. 4.[...]
-
Seite 17
Accessing your camera Your camera’s video feeds can be accesse d in a number of ways, as follows. 1) Your camera is CloudEnabled™ and can be viewed from any PC running a modern web browser with the Flash plug- in installed. When you first setup your camera using the included CD, it will r egister your camera with iSecurity +. Simply point your [...]
-
Seite 18
4.2 CloudEnabled™ Viewing 4.2.1 Accessing via iSecurity+ Smartphone App iSecurity+ is an iOS/Androi d App designed to allow you to quickly and easily access, control, and view your camera’s video feeds from anywhere. The iSecurity+ can be located on the App St ore and Android Market from your device by searching “iSecurity+,” or directly fr[...]
-
Seite 19
This page allows you to easily adjust your cam era’s time zone, display and audio settings, and infrared lighting. Sharing options can be accessed from the Sharing tab at the top of the screen.[...]
-
Seite 20
4.3 Direct Viewing of your Ca mera (For Advanced Users) 4.3.1 Accessing via PC web browser Users can access their video feeds and camer a m anagement tools easily through any web browser. Simply follow these steps. 1) Open any web browser (Internet Expl orer, Safari, Firefox, Chrome, etc.) 2) Type in your camera’s IP address (eg. 192.168.1.11. Th[...]
-
Seite 21
7) You’re now ready to view and manage your camera from your web browser. Note: If your IP camera falls behind a firewall, you will need to enable ports 80 and 554 in your firewall and link them to the internal IP address of the camera. Should you have more than one, increase the values above by 1 (For example, the second camera would have ports [...]
-
Seite 22
The following table describes the labels found on this screen. Number Label Description Left control panel provides co ntrol over video recording, voice communication, I/O, and snapshot Video stream Allows you to change between stream-1 and stream-2. (Stream 2 can be enabled and configured in [Settings] > [Video] Video mode selection Allows you [...]
-
Seite 23
4.3.1.2 Icons The following table describes th e icons found on this screen. Icon Label Description Fit to browser Resizes the live vi deo pane to fit your browser window Actual size Resizes the live vi deo pane to the original size Brightness Adjusts the camera’s brightness. Microphone Volume Adjust microphone volume. Click the icon to m ute the[...]
-
Seite 24
With the device configured, clicking the will allow you to speak throug h your microphone and be heard from the cam era for 90 seconds. Note: When using the voice communication f eature, you may experience various degrees of delay between transmission fr om the com puter and playback on the camera, depending on the condition of your network environ[...]
-
Seite 25
2) For stream-2, set the cod ec to “Motion JPEG.” 3) Launch the web browser on your iPhone, Andr oid phone, or other mobile internet device, and enter [IP address]/mjpeg.html into the address field of your phone’s web browser to watch live vi deo on your mobile device. (Note: The IP required IP address is located at the bottom of the page, ju[...]
-
Seite 26
4.3.3 Accessing via 3GPP Mobile Phone You can access your IP camera via 3GPP-co mpatible mobile phones provided your camera has a stable internet connection, and your mobile devices has a stable connection to the 3G network. There are also several steps which must be taken to ensure 3GPP functionality. 1) The second video stream (locat ed at [Setup[...]
-
Seite 27
5 Configuration 5.1 Video Settings The Video Settings screen consists of all the basic settings options. To access the main setup page, click on the setup button at the top right in the live view screen. You can configure detailed settings of your IP camera here. The following table describes the labels found on this screen. Label Description Turbo[...]
-
Seite 28
Framerate Framerate. 5~30 FPS. Higher framerate is more bandwidth-intensive. Quality Video quality settings. 64kpbs~3Mbps. Active Bandwidth Management Allows the IPC-3605N to intelligently change video bitrate depending on network congestion. This avoids video deterioration and frame dropping. Video Preference Allows you to c hoose between a prefer[...]
-
Seite 29
The following table describes the labels found on this screen. Label Description Video Properties Brightness Set image brightness (1~100) Sharpness Set image sharpness (1~8) Saturation Set image saturation (1~ 10) White Balance Set image’s white balance to com pensate for different lighting conditions. Flickerless Sets Flickerless mode. 50(defaul[...]
-
Seite 30
5.3 Audio Settings The Audio Settings screen allows you to en able or disable audio, as well as adjust volume. Stream-2 audio is only available fo r adjustm ent when it is selected and 3GPP mode has been checked in video settings. To access the Audio Settings screen, go to set tings, then select Audio from the sidebar. The following screen will app[...]
-
Seite 31
To access the user settings pane, navigate to Se ttings, then select Users fro m the sidebar. The following screen will appear. The following table describes the la bels found within this screen. Label Description Modify/Remove Click here to Modify or Remove an existing viewer Add Click here to add a new viewer or administrator Allow anonymous view[...]
-
Seite 32
5.5 Network Settings The Network Settings page allows you to check your network settings and make detailed adjustments. To access the Network Settings pane, navigate to settings and select Netw ork from the sidebar. The following screen will appear. 5.5.1 Ethernet Settings The Ethernet Settings page will allow you to choose your IP address conf igu[...]
-
Seite 33
On this page, you can set the camera to obt ain an IP address via DHCP (recommended), use a manual IP address, or obtain an IP a ddress via PPPoE, for which a valid user name and password are required. 5.5.2 Wireless Settings If you have installed the ZyXEL wireless adap ter, you’ll be able to set up a wireless connection from this page. To conne[...]
-
Seite 34
5.5.3 Network Diagnostic Here you can run the diagnostic tool for your current network settings, and it will show error messages if any anomaly is detected. For further information on error m essages, please refer to the troubleshooting section. 5.5.4 Network Bandwidth This automatic network connection test helps users better define the appropriate[...]
-
Seite 35
This message indicates that the currently c onnected network has the capacity to support up to 10 network cameras of identical bit rate settings (either on Stream 1 or Stream 2). If the message shows a less favorable result, go to [Setup] > [Video] to select a lower bitrate. 5.5.5 Advanced This page allows you to adjust advanced ne twork setting[...]
-
Seite 36
The following table describes th e labels on this screen. Label Description DNS Server Set the DNS server to be found via DHCP, or enter a manual DNS address NTP Configuration NTP stands for Network Time Prot ocol. To synchronize your camera’s clock with an NTP server, choose to either obtain an NTP server address via DHCP, or use an external NTP[...]
-
Seite 37
To access the UPnP screen, navigate to [S ettings] > [Network] > [UPnP]. The following screen will appear. Note: To enable UPnP on Windows, go to Add or Remove Programs in Control Panel, then click Add/Re move Windows Components, double-click “Network Services,” and ch eck “UPnP User Interface.” 5.5.8 RTP If you want to broadcast vide[...]
-
Seite 38
represents highest priority is 46. The defau lt DSCP value is 0, which indicates normal priority (no QoS). The following is a table of recommended DS CP values. The drop precedence indicates the order in which IP packet s will be dropped when the ne twork is congested. Packets with a higher drop precedence will be dropped fi rst. Each class in the [...]
-
Seite 39
The following table describes the labels found in this screen. Label Description SMTP Server Enter SMTP server information in this field (ie. smtp.gmail.com) SMTP Port Enter your SMTP server’s port information From Address Enter your full e-mail address (ie. xxxx@xx.com ) To Address Enter the full e-mail address you wish to receive notifications.[...]
-
Seite 40
The following table describes the la bels found within this screen. Label Description FTP Address Enter the addr ess of your FTP server FTP Port Enter the port of your FTP server User Name Enter your user name here Password Enter your Password here Upload Path Enter the file path of the folder where you want snapshots to be stored. Save Save settin[...]
-
Seite 41
The HTTP Server page allows you to set your camera to input the URL of an HTTP server used by an NVR in order to signal your NVR that there’s an event being triggered. To access this page, navigate to [Setup] > [Event Setup] > [Eve nt Server Setup] > [HTTP]. The following screen will appear. 5.6.1.6 SMS Server Your IP camera is capable o[...]
-
Seite 42
Clear Clear settings Cancel Cancel After you input your settings, click [Nex t]. The following page will appear. This page allows you to input the message that will be sent when an event is triggered. Enter your message, then click [Next] . The following screen will appear. This page will allow you to test your camera’ s SMS functionality. To sen[...]
-
Seite 43
To create an event trigger, click the [Creat e] button. The following screen will appear. The following table describes th e fields in this screen. Field Des criptio n Event Trigger Set the trigger for this event. Trigg ers can be based on schedule, I/O port activity, or audio detection. Schedule If you wish to schedule an event, input the time and[...]
-
Seite 44
Select the actions to be taken, then click [ Finish] to complete trigger se tup. 5.6.3 Motion Detection Motion Detection allows you to define up to th ree regions that will trigger an event if motion is detected. Select a region, sensitivity le vel (S1: Lowest ~ S5: Highest ) from the dropdown list, and then click and drag on the video display to d[...]
-
Seite 45
5.7 Recording Setup The IPC-3605N supports storage of both snapshot s and video clips to local storage. To configure this function, navigate to [Setup] > [Recording Setup]. The following screen will appear. This page allows you to view your SD Card ’s status, capacity, and gives you the option of formatting the card, as well as enabling record[...]
-
Seite 46
Note: This camera uses a First In, First Out storage method. W hen the SD card is full, the oldest files will be au tom atically rewritten. If you want to record video clips of detected motion to the SD card, you’ll need to set a motion detection re gion before setting up event-based recording. 5.8 Recording Hi story The Recording History[...]
-
Seite 47
5.10 Multi-Camera This page allows you to add, modify, or delete additional IP cam eras on your camera list. To access this page, navigate to [Setup] > [Multi-Cam era]. The following screen will appear. To add a camera, click [Add] . The following screen will appear. The following table describes the la bels found within this screen.[...]
-
Seite 48
Camera The # by which this camera will be identified IP Address Enter the camera’s IP address he re User Name Enter the username used to access th e new camera in this field Password Enter the password used to access the new camera in this field RTSP Port Enter the camera ’s RTSP port (default 554) HTTP Port Enter the camera’s HTTP port (defa[...]
-
Seite 49
6 Event Viewer The Event Viewer allows you to view detailed logs of events which have been triggered. To access this page, navigate to [Setup], then select [Event Viewer] from the top panel. Select any type of event from the sidebar (Motion, I/O, Scheduled Triggers, or Audio Detection) to view that type ’s history, or click on image links to view[...]
-
Seite 50
7 Maintenance The Maintenance screen provides information about your IP camera, access to the h istory log, and system maintenance functions. 7.1 Informatio n To access the Maintenance Inform ation screen, navigate to [Setup], then select [Maintenance] from the top panel. The following screen will appear. 7.2 Log This page provides a system log for[...]
-
Seite 51
7.3.1 Reboot Camera Press the [Reboot] button to reboot your camera. 7.3.2 Profile Management Profile Management allows users to easily set up multiple c ameras. After one camera is properly configured, users can export that came ra’s configuration to a profile on their PC, which can then be loaded onto other cameras. Th is feature also serves as[...]
-
Seite 52
7.3.3 Firmware Update Firmware updates are available at us.zyxe l.com/support. After downloading the latest firmware for your camera, click the [Browse] button to locate the firmware file on your hard drive, then click the [Upgrade] button to update the cam era’s firmware. Once the upgrade process begins, it must not be inte rrupted or you risk p[...]
-
Seite 53
8 Troubleshooting During the course of insta llation, you might encounter va rious issues. The following section contains some troubleshooting proce dures to help you so lve these problems. 8.1 Reconfiguring Your Device Anytime you need to re-configure your IP camera, you can simply double-click on the eaZy Wizard icon to launch the eaZ y Wi zard c[...]
-
Seite 54
8.3 Resetting to Factory Defaults If you’ve forgotten your password, or your cam era’s been acting ge nerally strange, you can follow the steps below to reset the camera to its default settings. To reset the cam era: 1) Press and hold the reset button (locat ed on the camera’s rear panel) for approximately 10 seconds. When successf ul, you sh[...]
-
Seite 55
8.4 Trouble with Active X After launching your browser and entering your camera’s IP address, you’ll be asked for the username and password combination (D efault is admin/admin, case sensitive.) No User Interface in the Brows er This issue could have three possible causes. 1) ActiveX was not installed. Follow the instructions on-screen to insta[...]
-
Seite 56
If you’ve gone through all above steps but still can’t obtain video/audio on your browser, close all browser windows and delete the ‘IPSurveillance Embedded” folder found in C:Program Files. (If using 64-bit windows, l ook in C:Program Files (x86)), then open your browser, log into your IP camera, and reinstall the ActiveX client. If your[...]
-
Seite 57
8.5 Trouble with Remot e Viewing on Browser You can view your camera’s video streams remo tely over the Internet. If you’re having trouble viewing video remotely, refer to th e section below for troubleshooting tips. The above figure depicts a typical setup in which: The IP camera has a static virtual IP address of 192.168.0.1 The WAN I[...]
-
Seite 58
3) Enable port forwarding on your router and allow traffic on the ports the IP camera is using. You may need to consult the ma nufacturer of your router for setting details. Note: Your router may require a reboot after port forw arding is set. The following figure details the settings r equire d to remotely view the IP cam era. After taking the abo[...]
-
Seite 59
8.6 Symptoms, Causes, and Solutions Listed below are some common pr oblems, and their sol utions. Symptom Possible Cause/Solution Problems accessing from LAN network using web browser The entered IP address is incorrect. Make sure the IP address you entered matches the IP address of your ca mera. If you are certain that your camera is configured wi[...]
-
Seite 60
Symptom Possible Cause/Solution Scanning and connecting to wireless AP takes a long time Too many wireless APs nearby. The amount of time taken to scan wireless APs depends on the number of wireless APs around the camera. If there are too many wireless APs (30 or more), it may take as long as 3 minutes to complete the scanning process. A possible w[...]
-
Seite 61
Symptom Possible Cause/Solution Network diagnosis shows error icon Network connection error. The network connection test verifies that the camera has su cce ssfully connected to the LAN network. When the diagnosis result shows a red excla mation mark icon, it means that the camera fails to connect to the LAN network. Check if the LAN cable is secur[...]
-
Seite 62
Symptom Possible Cause/Solution Part of the image becomes pixilated/Image artifacts appear Network bandwidth is insufficient. Without sufficient bandwidth, video quality will deteriorate and image errors like pixilation or frame-drop may occur. When you view your camera remotely from the Internet, your camera needs sufficient upload bandwidth to tr[...]
-
Seite 63
Symptom Possible cause/solution A warning message appears stating “Your video quality is too high for your Internet bandwidth.” Network quality is not high enough. This means the camera’s browser interface, WebVUer, could not receive a steady strea m of video data from your camera. The loss of video data might also be caused by network conges[...]
-
Seite 64
9 Technical Specifications Category IPC-3605N Camera Image Sensor Lens Focal Length: 4.0mm Max Aperture Ratio: F1.5 Fixed Iris Focus Range 0.5m ~ INF Min imu m Illumination IR Mode: 0 lux with built in IR LEDs on (12 LEDs in total; effective distance up to 10m) Color m ode: 1.0 lux Shutter Tim e 1/5 ~ 1/16 000 Sec Video Video Compressio[...]
-
Seite 65
Category IPC-3605N Software NVR Station Multiple channel management (32-channels) Fast and intuitive camera setup Search and playba ck record ings by eve n t types Scheduled a nd event-base d managem ent Smart motion and audio detection Web Browser Internet Explorer (ActiveX) Remotely view and configure camera on Inte rnet E[...]
-
Seite 66
10 Open-Sourced Components 3 r d Party Software Version License Addgroup V1.13.4 Busybox, GPLv2 Adduser V1.13.4 Busybox, GPLv2 Ash V1.13.4 Busybox, GPLv2 AVN-IPv4LL V1.13.4 GPL Busybox V1.13.4 Busybox, GPLv2 Cat V1.13.4 Busybox, GPLv2 Chattr V1.13.4 Busybox, GPLv2 Chgrp V1.13.4 Busybox, GPLv2 Chmod V1.13.4 Busybox, GPLv2 Chown V1.13.4 Busybox, GPLv[...]
-
Seite 67
Iwlist V29 GPL Iwpriv V29 GPL Kill V1.13.4 Busybox, GPLv2 Ln V1.13.4 Busybox, GPLv2 Login V1.13.4 Busybox, GPLv2 Ls V1.13.4 Busybox, GPLv2 Lsattr V1.13.4 Busybox, GPLv2 Mini_httpd V1.19 GPL Mkdir V1.13.4 Busybox, GPLv2 Mkdosfs V2.11 GPL Mknod V1.13.4 Busybox, GPLv2 Mktemp V1.13.4 Busybox, GPLv2 More V1.13.4 Busybox, GPLv2 Mount V1.13.4 Busybox, GPL[...]
-
Seite 68
Libc-2.11.so V2.11 GPLv3 Libcrypt.so V2.11 GPLv3 Libcrypt.so.1 V2.11 GPLv3 Libcrypt-2.11.so V2.11 GPLv3 Libcrypto.so V0.98m GPL Libcrypto.so.0.9.8 V0.98m GPL Libdl.so V2.11 GPLv3 Libdl.so.2 V2.11 GPLv3 Libdl-2.11.so V2.11 GPLv3 Libgcc_s.so V4.4.0 GPLv3 Libgcc_s.so.1 V4.4.0 GPLv3 Libip4tc.a V1.4.10 GPL Libip4tc.la V1.4.10 GPL Libip6tc.a V1.4.10 GPL [...]
-
Seite 69
Libsockipc.so.1.2 V2.11 GPLv3 Libssl.so V0.98m GPL Libssl.so.0.9.8 V0.98m GPL Libstdc++.so V4.4.0 GPLv3 Libstdc++.so.6.0.11 V4.4.0 GPLv3 Libthread_db.so V4.4.0 GPLv3 Libthread_db.so.1 V2.11 GPLv3 Libthread_db-1.0.so V2.11 GPLv3 Libthreadutil.so V1.4.1 GPL Libthreadutil.so.2 V1.4.1 GPL Libthreadutil.so.2.0.2 V1.4.1 GPL Libupnp.so V1.4.1 GPL Libupnp.[...]
-
Seite 70
Pivot_root V1.13.4 Busybox, GPLv2 Poweroff V1.13.4 Busybox, GPLv2 Reboot V1.13.4 Busybox, GPLv2 Rmmod V1.13.4 Busybox, GPLv2 Route V1.13.4 Busybox, GPLv2 Runlevel V1.13.4 Busybox, GPLv2 Start-stop-daemon V1.13.4 Busybox, GPLv2 Sulogin V1.13.4 Busybox, GPLv2 Swapoff V1.13.4 Busybox, GPLv2 Swapon V1.13.4 Busybox, GPLv2 Switch_root V1.13.4 Busybox, GP[...]
-
Seite 71
gratis or for a fee, you must give the recipi ents all the rights that you have. Yo u must make sure t h at t hey, too, receive or can get the source c ode. And you m u st show them these terms so they know their ri ghts. We protect y our rights wi th two st eps: (1) copy right the software, a nd (2) offer you this license which gives you legal per[...]
-
Seite 72
Program, t he distribution of t he whole must be on the te rms of this Li cense, whose perm issions for othe r licensees extend to the entire whole, an d thus to each a nd every part regardl ess of who wrote it. Thus , it is not the intent o f this section to claim rights or con t est your rights to work written entirely by you; rather, the intent [...]
-
Seite 73
refrain entirel y from dist ribution of the Pro gram. If any po rtion of thi s section is held inval id or unenforceable under any part icular circumstance, the ba lance of the section is in tended to apply and the section as a whole is intended to appl y in other circum stances. It is not the purpose of t his section to ind uce you to infri nge an[...]
-
Seite 74
This product con tains ad dgroup, adduser, ash, busybox, cat, chattr, chgrp, chmod, ch own, cp, cttyhack, date, dd, del group, deluser , df, dmesg, ech o, egrep, false , fgrep, grep, gnuzip, gzip, h ostname, i p, ipaddr, iplink, iproute, kill, ln, login, ls, lsattr, mkdir, m knod, mktemp, more, mount, mount point, mv, netstat, ni ce, ping, ping 6, [...]
-
Seite 75
Also, for eac h distributo r's protecti on, we want to make certa in that ever yone underst ands that t here is no warranty for this free librar y. If th e library is modified by someone else and passed on, we wan t its recipients to know that what they have is not the origin al version, so that any problems introdu ced by others will not refl[...]
-
Seite 76
The "Library", below, refer s to any such software lib rary or wo rk which has been distribut ed under these terms. A "wor k based on the Library " means either the Li brary or any deri vative work unde r copyright l aw: that is to say, a work containing the Li brary or a po rtion of it , either verbat im or with modificati ons [...]
-
Seite 77
Thus, it is not the intent of this sectio n to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise th e right to control the distributi on of derivative o r collective works ba sed on the Library. In addition, mere aggreg ation of another work not ba sed on the Library with the Library (or with a w[...]
-
Seite 78
Otherwise, if the work is a derivativ e of the Library, you m ay distribute the object code for the work under the terms of Section 6. Any executabl es containing that work als o fall u nder Section 6, whethe r or not they are linked directly with the Library itself. 6. As an except ion to the Sections a bove, you m ay also compile or link a "[...]
-
Seite 79
8. You ma y not copy, m odify, subli cense, link wit h, or distri bute the Library ex cept as expressly p rovided under this Lice nse. Any attempt otherwise t o copy, modi fy, sublicense, link with, or distribut e the Library is void, and will automatically ter minate your rights under this Licen se. Ho wever, parties who have received copies, or r[...]
-
Seite 80
Each version is gi ven a distinguishin g version number. If t he Library specifies a version n umber of this License which applies to it and "any later version", you h ave the option of following the terms and conditions either of that version or of any later v e rsion published by the Free Software Foundation. If the Library does n ot sp[...]
-
Seite 81
License as published by the Free Software Foundation; either version 2 of the License, or (at your op tion) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WA RRANTY; witho ut even th e implied war r anty of MERCHANTABILI TY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public Li[...]
-
Seite 82
This product contains ld-2.11.so , ld-lin ux.so.3, libc. so, libc.so .6, libc-2.11.so, libcryp t.so, libcryp t.so.1, libcrypt-2.11.so, libd l.so, libdl.so.2, libdl-2 .11.so, libgcc_s.so , libgcc_s.so.1, lib m.so, libm.so.6, libm- 2.11.so, li bnsl.so, li bnsl.so.1, libnsl-2.11 .so, libnss _dns.so, l ibnss_dns .so.2, li bnss_dns-2. 11.so, libnss_file[...]
-
Seite 83
domains, we st and ready to extend this provision t o those dom ains in future versions of the GPL, as nee ded to protect the freedom of users. Finally, every program is threatened constantly by so ftware patents . States shoul d not allow pat ents to restrict develo pment and use of softwa re on gene ral-purpose com puters, but in those that do, w[...]
-
Seite 84
The “System Libraries” of an executabl e work incl ude anything, other t han the work as a whol e, that (a) is included i n the norm al form of packaging a Major Component , but whi ch is not pa rt of that Major Compone nt, and (b ) serves on ly to enable use of the work with t hat Major C omponent, or to im plement a Standard Interface for whi[...]
-
Seite 85
4. Conveying V erbatim Copies. You may con vey verbatim copies of the Program' s source code as y ou receive it, in any medium , provided that you conspicuously an d appropriately publish on each copy an appropriate cop yright notice; keep in tact all notices stating that this License and a ny non-perm issive terms added i n accord with sectio[...]
-
Seite 86
c) Convey individual copies of the obj ect cod e with a copy of the written offer to provide the Correspondi ng Source. This a lternative is allowed only occasional ly and nonc ommercially, and only if yo u received the object code wi th su ch an offer, in accord with subsection 6b. d) Convey the object code by of fering access from a desig[...]
-
Seite 87
7. Additional Terms. “Additional perm issions” are terms that supplement the terms of this License by making exceptions fro m one or more of its conditions. Additional permissions th at are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If a[...]
-
Seite 88
license, and (b) permanently, if the copyrigh t ho lder fails to notify you of t he violation by some reaso nable means prior to 60 days after the cessation. Moreover, your license from a particular copyr igh t holder is reinstated permanently if the copyrigh t ho lder notifies you of the violation by some reasonable means, this is the first time y[...]
-
Seite 89
Each contributor gr ants you a non-ex clusive, worldw id e, royalty-free patent license under the contributor' s essential pate nt claims, to m ake, use, sell, offer for sal e, import a nd otherwi se run, modi fy and propa gate the contents o f its contri butor versi on. In the following three paragra phs, a “patent licens e” is a ny expre[...]
-
Seite 90
part which is the covere d work, but the spec ial requ irements of the GNU Affero General Public License, section 13, concerning interaction thro ugh a network will apply to the combination as su ch. 14. Revised Versions of this License. The Free Soft ware Foundati on may publ ish revise d and/or new versions of the GNU Ge neral Public License from[...]
-
Seite 91
How to Apply These Terms to Your New Programs If you devel op a new pr ogram, and you want it t o be of the greatest possible use to the publ ic, the best wa y to achieve this is to make it free software which ev eryone can redistribute and change un der these term s. To do so, attach the following notices to t he program. It is safest to attach th[...]