Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
SMC Networks SMC790WBRA4 manuale d’uso - BKManuals

SMC Networks SMC790WBRA4 manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso SMC Networks SMC790WBRA4. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica SMC Networks SMC790WBRA4 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso SMC Networks SMC790WBRA4 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso SMC Networks SMC790WBRA4 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo SMC Networks SMC790WBRA4
- nome del fabbricante e anno di fabbricazione SMC Networks SMC790WBRA4
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature SMC Networks SMC790WBRA4
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio SMC Networks SMC790WBRA4 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti SMC Networks SMC790WBRA4 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio SMC Networks in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche SMC Networks SMC790WBRA4, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo SMC Networks SMC790WBRA4, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso SMC Networks SMC790WBRA4. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    EZ Connect N Draft 11n Wireless USB2.0 Adapte r ADS L2 BA RRIC AD E ™ 4-Ports Wire less Annex A AD SL/ ADSL2 Mo dem Router SMC7904WBR A4[...]

  • Pagina 2

    Contents 1 Introduction ................... ................... ................... ................... ................... ................... ................. ................. ......... 1 1.1 Packing List ................... ................... ................... ................... ................... ................... ................ ....[...]

  • Pagina 3

    xvii  3.7.8 Other ..................... ................... ................... ................... ................... ................... ................ .......... 45 3.8 Admin ..... ................... ................... ................... ................... .................... ................... ............... ............. 48 3.8.1 [...]

  • Pagina 4

    1 Introduction The SMC7904WBRA4 supports multiple line modes. It provides four 10/100 base-T Ethernet interfaces at the user end. The device provides high-speed ADSL broadband connection to the Internet or Intranet for high-end users, such as net b ars and office users. The device provides high performance access to the Internet, downlink up to 24 [...]

  • Pagina 5

    Front panel The following table describes the LEDs of the device. LED S tatus Color Description On The device is powered on and the initialization is normal. Off Green The device is powered off. On The device is initializing. Power Blinks Red The firmware is upgrading. On The Internet connection is normal. Blinks Data is being transmitted on the In[...]

  • Pagina 6

    Interface Function The button of the antenna. 1.4 System Requirements Recommended system requirements are as follows: A 10/100 base-T Ethernet card is installed on your PC A hub or Switch. (attached to several PCs through one of Ethernet interfaces on the device) Operating system: W indows 98SE, W indows 2000, W indows ME, W indows XP o r W indows [...]

  • Pagina 7

    4  PPP sess ion P AP and CHAP IP fi lter IP QoS Remote access control Line connection status test Remote management (telnet and HTTP) backup and restore of configuration file Ethernet interface supports crossover detection, auto-correction and polarity correction UPnP[...]

  • Pagina 8

    2 Hardware Installation Step 1 Connect the Line interface of the device and the Modem interface of the splitter through a telephone cable. Connect the phone to the Phone i nterface of the s plitter through a cable. Connect the incoming line to the Line interface of the splitter . The splitter has three interfaces: – Line : Connect to a wall phone[...]

  • Pagina 9

    6  Figure 2 (with a telephone set before the splitter) In the actual application, connection 1 is recommended. I Note: When connection 2 is used, the filter must be installed close to the telephone lines. Do not use the splitter instead of the filter . Installing a t elephone directly before the splitter may lead to a failure o f connection betw[...]

  • Pagina 10

    3 About the Web Configuration This chapter describes how to configure the router by using the W eb-based configuration utility . 3.1 How to Access the Router The following is the detailed description of accesing the router for the first time. Step 1 Open the Internet Explorer (IE) browser and enter http://192.168.2.1 . Step 2 In the LOGIN page that[...]

  • Pagina 11

    In the navigation bar , choose Setup W izard . In the Setup Wiz ard page, you can configure the VPI/VCI num ber . The Setup Wizard page guides fast and accurate configuration of the Internet connection and other important parameters. The following sections describe these various configuration parameters. Whether you configure these parameters or us[...]

  • Pagina 12

    The following table describes the parameters of this page. Field Description (Root) SSID SSID BroadCase W ire less Mode Channel Number After configuring the wireless settings, click NEXT . The page shown in the following figure appears. In this page, you can configure the ADSL settings. The following table describes the parameters and buttons in th[...]

  • Pagina 13

    Y ou can choose LLC or VC-Mux . VPI The virtual path between two points in an A TM netw ork, and its valid v alue is from 0 to 255. VCI The virtual channel between two points in an A TM network, ranging from 32 to 65535 (0 to 31 is reserved for local management of A T M traffic). Before you configure the protocol, you must select the country in whi[...]

  • Pagina 14

    PPPoA If the uplink equipment supports the PPPoA encapsulation, you can set the device to initiate the PPPoA dialup. After finishing the settings, click NEXT . The page show n in the following figure appears. 1 1 [...]

  • Pagina 15

    If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. Dynamic IP If the uplink equipment supports the Dynamic IP protocol, you can set the device to initiate the dynamic IP dialup. After finishing the settings, click NEXT . The page show n in the followin[...]

  • Pagina 16

    If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. Static IP If the uplink equipment supports the S tatic IP protocol, you can set the device to initiate the static IP dialup. After finishing the settings, click NEXT . The page show n in the following [...]

  • Pagina 17

    If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. Bridge If the uplink equipment supports the Bridge protocol, you can set the device to initiate the bridge dialup. After finishing the settings, click NEXT . The page show n in the following figure app[...]

  • Pagina 18

    If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. 1483 Route If the uplink equipment supports the 1483 Route protocol, you can set the device to initiate the 1483 route dialup. 15 [...]

  • Pagina 19

    After finishing the settings, click NEXT . The page show n in the following figure appears. If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. 16 [...]

  • Pagina 20

    I Note: After you select the country in which you are in and the correct ISP , the ADSL settings, such as protocol, connection type, VPI, and VCI appears. It is recommended to use the default values. 3.3 Status In the navigation ba r , choose S tatus . In the S tatus p age that is displayed contains: System , LAN , WLAN , W AN , Port Mapping, S tat[...]

  • Pagina 21

    3.3.3 WLAN Choose S tatus > WLAN . The page that is displayed show s some basic wirless LAN settings of the router . 3.3.4 WAN Choose S tatus > W AN . In the W AN page, you can view basic status of W AN, default g ateway , DNS server . If you want to configure the W AN network, refer to the chapter3.6.1 W AN Interface. 18 [...]

  • Pagina 22

    3.3.5 Port Mapping Choose S tatus > Port Mapping . In the Port Mapping page, you can view the mapping relation and the status of port mapping. 3.3.6 Statistic Choose S tatus > S tatistic. The S tatistic page that is displayed contains T raffic S tatistic and DSL S tatistic . 3.3.6.1 Traffic Statistic Choose T raffic S tatistic in the left pan[...]

  • Pagina 23

    3.3.6.2 DSL Statistic Choose DSL S tatistic in the left p ane. The page shown in the following f igure appears. In this page, you can view the ADSL line statistics, downstream rate, upstream rate, and other information. 3.3.7 ARP Table Choose S tatus > ARP T able. In the ARP T able page, you can view the t able which shows a list of learn ed MAC[...]

  • Pagina 24

    3.4.1 LAN Settings Choose LAN > LAN Settings . In the LAN Settings page, you c an configure the LAN network. In this page, you can change IP add ress of the router . T he default I P address is 192.168.2.1. This is the private IP addr ess of the router . This is the address under which the router can be reached in the local network. It can be fr[...]

  • Pagina 25

    Select DHCP Proxy in the DHCP Server Setup page. The page shown in the following figure appears. The following table describes the parameters of this page. Field Description DHCP Proxy Select it, the router acts a surrogate DHCP Server and relays the DHCP re quests and reponses between the remote server and the client. DHCP Server Address Enter the[...]

  • Pagina 26

    The following table describes the parameters in this page. Field Description DHCP Server If set to DHCP Server , the router can assign IP addresses, IP default gateway and DNS Servers to Windows95, Windows NT a nd other systems that support the DHCP client. IP Pool Range It specifies the first and the last of contiguous IP address of the IP address[...]

  • Pagina 27

    Description Field the assigned IP addresses before the IP addresses change. Refresh Refresh the page. Close Close the page. Click MAC-based Assignment in the DHCP Server Setup page. The page shown in the following figure appears. In this page, you can assign the IP addresses on the LAN to the specific individual PC s based on their M AC address. Th[...]

  • Pagina 28

    3.5.1 Basic Settings Choose WLAN > Basic Settings. The page s hown in the following figure appears . In this page, you can configure the parameters for wireless LAN clients that may connect to your access point. The following table describes the parameters and buttons of this page. Field Description Disable W ireless LAN Interface By default, th[...]

  • Pagina 29

    The following table describes the parameters and buttons of this page. Field Description V ap SSID The service set identification (SSID) is a unique name to identify the router i n the wireless LAN Auth T y pe Y ou can choose Open System , Shared Key , or Auto . If you selec t Open System , you can If you select Shared Key , you can If you select A[...]

  • Pagina 30

    The following table describes the parameters and buttons of this page. Field Description SSID T y pe Select the SSID. Encryption Y ou can choose None , WEP , W P A (TKIP) , WP A2 (AES), or W P A2 Mixed . W ire d equivalent privacy (WEP) entrypts data frames be fore transmitting over the wireless network. W i-Fi protected ac cess (WP E) is a subset [...]

  • Pagina 31

    The following table describes the parameters and buttons of this page. Field Description SSID TYPE Select the SSID. Key Length Select 64-bit or 128-bit to use data encryption. Key Format If you choose 64-bit , you can choose ASCII (5 characters) or Hex (10 characters). If you choose 128-bit , y ou can choose ASCII (13 characters) or Hex (26 charact[...]

  • Pagina 32

    The following table describes the parameters of this page. Field Description Fragment Threshold This is the maximum data fragment size (between 256 and 2346bytes) that can be sent in the wireless network before the router fragments the packet into smaller data frames. R TS Threshold Request to send (R TS) is designed to prevent col lisions due to h[...]

  • Pagina 33

    The following table describes the parameters and buttons of this page. Field Description Select Access Control Mode Y ou can choose Disable , Allow Listed , or Deny Listed . Select Allow Listed , only the clients whose MAC address is l isted can access the router . Select Deny Listed , the clients whose MAC address is liste d are denied to access t[...]

  • Pagina 34

    The following table describes the fields of this screen. Label Description Enable WDS Select it to enable the WDS function. Otherwis e, you can not configure the settings of this page. MAC Addr Enter the MAC address (in XX-XX-XX-XX-XX-XX for mat) of the AP . Comment Enter the comment to describe the AP of the MAC addr ess. Apply Change Click it to [...]

  • Pagina 35

    The following table describes the parameters of this page. Field Description Current A TM VC T able This table shows the existed PVCs. It shows the Interface name, channel mode, VPI/VCI, encapsulation mode, local IP address, remote IP address and other information. The maximum item of this table is eight. Click it, the IP Interface-Modify page appe[...]

  • Pagina 36

    Field Description If select Use DHCP , the router is a DHCP client, the W AN IP address is assigned by the remote DHCP server . Local IP Address It is the IP addr ess of W AN inte rface which is provided by your ISP . Remote IP Address This is the gateway IP address which is provided by your ISP . Subnet Mask It is the subnet mask of the local IP a[...]

  • Pagina 37

    The following table describes the parameters and buttons of this page. Field Description 3.6.2 ADSL Settings Choose W AN > ADSL Settings . The page shown in the following figure appears. In this pae, you can select the DSL modulation. Mostly , you ne ed to remain this factory default settings. The router supports these modulations: G .lite , G .[...]

  • Pagina 38

    3.7 Advance In the navigation bar , choose Advance. The Advance page that is displayed contains DNS , Fir ewall , Virtual Server , Routing , IP QOS, Anti-DOs , Port Mapping , and Other . 3.7.1 DNS Choose Advance > DNS. The DNS page that is displayed contains DNS Server and DDNS . 3.7.1.1 DNS Server Choose DNS Server in the left pane. The page sh[...]

  • Pagina 39

    The following table describes the parameters and buttons of this page. Field Description Obtain DNS Automatically Select it, the router accepts the first received DNS assignment from one of the PPPoA, PPPoE or MER enabled PVC(s) during the connection establishment. Set DNS Manually Select it, enter the primary and optional secondar y DNS server IP [...]

  • Pagina 40

    3.7.2 Firewall Choose Adv ance > Firewall . The Firewa ll page that i s displayed contains IP/Port Fileter , MAC Filter , and URL Blocking . 3.7.2.1 IP/Port Filter Choose IP/Port Filter in the left pane. The page shown in the following figure appears. Entries in this table are used to restrict certain types of data packets through the gateway . [...]

  • Pagina 41

    Field Description 3.7.2.2 MAC Filter Choose MAC Filter in th e left pane. The page shown in the following figure appears. Entries in this table are used to restri ct certain types of da ta packets from your l ocal network to Internet through the gateway . These fi lters are helpful in securing or restricting your local network. Click Apply Changes [...]

  • Pagina 42

    Field Description 3.7.2.3 URL Blocking Choose URL Blocking in the left pane. The pa ge shown in the following f igure appears. This page is used to block a fully qualified do main name (FQDN), such as tw .yahoo.comand and filtered keyword. Y ou can add or delete FQDN and filtered keyword. The following table describes the parameters and buttons of [...]

  • Pagina 43

    Click Add to add a virtual server . The page shown in the following figure appears. The following table describes the parameters and buttons of this page. Field Description 3.7.3.2 DMZ Settings Choose DMZ Settings in the left pane. The page shown in the fo llowing figure appears. A demilitarized z one is used to provide In ternet services without s[...]

  • Pagina 44

    3.7.4 Routing Choose Advance > Routing . The page shown in th e following figure appears. The page that is di splayed contains S tatic Route and RIP . 3.7.4.1 Static Route Choose S tatic Route in the left pane. The page shown in the following figure appears. In this page, yo u can configure the routing information. Y ou can add or delete IP rout[...]

  • Pagina 45

    3.7.4.2 RIP Choose RIP in the left pane. The page shown in the following figure appears. If you are using this device as a RIP-enabled router to communicate wi th others who is using the Routing Information Protocol (RIP), enable the RIP . This page is used to select the interfaces on your devices that use RIP , and the version of the protocol used[...]

  • Pagina 46

    3.7.5 IP QoS Choose Advance > IP QOS . The page shown in the following figure appears. Entries i n this table are used to assign the precedence for each incoming packet based on physical LAN port, TCP/UDP port number , and source/destination IP address/subnet masks. Click Add Rule , the page shown in the following figure appears. The following t[...]

  • Pagina 47

    3.7.6 Anti-dos Choose Advance > Anti-Dos . The page shown in the following figure appears. Denial-of-service attack (DoS Attack) is a type o f attack on a network that is designed to bring the network to its knees by flooding it with us eless traffic. In this page, you can prevent DoS attacks. Click Apply Changes to save the settings of this pag[...]

  • Pagina 48

    3.7.8 Other Choose Advance > Other . In the Other page that is displayed contains IGMP Proxy , UPNP , Bridge , and IP PassThrough . 3.7.8.1 IGMP Proxy Choose IGMP Proxy in the left pane. The page shown in t he following figure appears. IGMP proxy enables t he system to issue IGMP host messages on behalf of hosts that the system discovered throug[...]

  • Pagina 49

    Click Apply Changes to save the settings of this page. 3.7.8.2 UPNP Choose UPNP in the left pane. The page shown in the following figure appears. This page is used to configure UPnP . The system acts as a daemon after you enable it. Click Apply Changes to save the settings of this page. 3.7.8.3 Bridge Choose Bridge in the left pane. The page shown [...]

  • Pagina 50

    The following table describes the parameters and buttons of this page. Field Description Click Show MACs . The page shown in the following fi gure appears. This t able shows a list of learned MAC addresses for this bridge. 3.7.8.4 IP PassThrough Choose IP Pass Through in the lef t pane. The pa ge sh own in the f ollowing f igure appears. IP pas sth[...]

  • Pagina 51

    3.8 Admin In the navigation bar , choose Admin . The Admin page that i s displayed contains Remote Access , Commit/Reboot , Password , Backup/Restore , Upgrade Fir eware , Time Zone , System Log , SNMP , TR069 , ACL , and Logout . 3.8.1 Remote Access Choose Admin > Remote Access . The page shown in the following fig ure appears. Y ou can enable [...]

  • Pagina 52

    The following table describes the parameters of this page. Field Description reset to default settings Select it to reset the router to the default settings. commit current settings Select it to save the current settings and reboot the router . Reboot Reboot the router . 3.8.3 Password Choose Admin > Password . The page shown in the following fi[...]

  • Pagina 53

    Field Description user . New Password Enter the password to which you want to change the old password. Confirmed Password Enter the new password again. 3.8.4 Backup/Restore Choose Admin > Backup/Restore . The p age shown in the following figure appears. In t his page, you can backup the current settings to a file and restore the settings from th[...]

  • Pagina 54

    The following table describes the parameters and buttons of this page. Field Description Select File Click Browse to select the firmware file. Upload Select the firmware file and click Upload to begin upgrading the firmware. Reset Click it to begin selecting the firmware file. 3.8.6 Time Zone Choose Admin > Time Zone . The page shown in the foll[...]

  • Pagina 55

    Refresh Refresh the system shown in the page. T ime Mode Y ou can choose Time Server or Manual . Select Time Server , the router gets the system time from the time serve r . Select Manual , you should configure the system time manually . Enable SNTP Client Update Select it, you can choose the correct SNTP server which you want. SNTP Server Choose t[...]

  • Pagina 56

    The following table describes the parameters and buttons of this page. Field Description T rap IP Address Enter the IP address of trap IP . The trap information is sent to the host. Community name (read-only) The network administrators must use this password to read the information of this router . Community name (write-only) The network administra[...]

  • Pagina 57

    The following table describes the parameters and buttons of this page. Field Description 3.8.10 ACL Choose Admin > ACL . The page shown in the following figure appears . In this page, you can configure the IP address in the access control list. If A CL i s enabled, only the effective IP adresses i n ACL can access the ADSL router . 54 [...]

  • Pagina 58

    Step 1 Select Enable and click take effect . Step 2 Configure the ACL. Step 3 Click take effect to take the configuration effect. I Note: If you select Enable in ACL Capability , en sure that your host IP address is in ACL list before it t akes effect. 3.9 Diagnostic In the navigation bar , choose Diagnostic . The Diagnostic page t hat is displayed[...]

  • Pagina 59

    Field Description Host Address Enter the IP a ddress. Go ! Click it to begin to Ping the host address. 3.9.2 ATM Loopback Choose Diagnostic > A TM Loopback . T he page shown i n the following figure appear s. I n this page, you can use VCC loopback function to check the connectivity of the VCC. 3.9.3 ADSL Choose Diagnostic > ADSL . The page s[...]

  • Pagina 60

    57  3.9.4 Diagnostic Choose Diagnostic . The page shown in the following figure appears. In this page, you can test the DSL connection. Click Run Diagnostic T est to begin testing.[...]

  • Pagina 61

    Appendix A Questions & Answers This section describes common problems you may enco unter and possib le solutions to them. Th e Barricade can be easily monitored through panel indicators to identify problems. 1. Question: Why all LED indicators are off? Answer: Check the connection between the power adaptor and the power socket Check the power s[...]

  • Pagina 62

    Click start -> run (input ping demands)-> Ping 192.168.2.1 (MODEM IP address). If cannot reach the modem, please check following configuration: The type of the network cable The connection between the modem and computer Y ou computer ’ s TCP/IP configuration 6. Question: How to load the default setting after incorr ect configuration? Answer[...]

  • Pagina 63

    Appendix B Technical Specifications External Connectors 1 push power switch 1 DC power jack 1 factory reset button 4 LAN 10/100M Auto MDI/MDIX RJ45 ports 1 W AN RJ1 1 DSL port Pr otocol Featur e Bridging/Routing RFC 1483 Bridge IEEE 802.1D transparent bridging Bridge Filtering RFC 1483 Router RIP 1 & 2 supported DHCP (RFC1541) Server, Relay Net[...]

  • Pagina 64

    Ethernet Featur e Fully compliant with IEEE802.3/802.3u auto-negotiation function Support 10base-T , 100base-TX Support half duplex, full duplex Support back pressure flow control for half duplex, IEEE802.3x flow control for full duplex Support MDI/MDIX auto cross Management Support Support WEB/TFTP mode which use as native and long-distance editio[...]

  • Pagina 65

    Appendix C GPL Anouncement GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software [...]

  • Pagina 66

    The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public[...]

  • Pagina 67

    These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same[...]

  • Pagina 68

    this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are no[...]

  • Pagina 69

    9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of[...]

  • Pagina 70

    REPAIR OR CORRECTION. 12. IN NO EVENT UNL ESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR AN Y OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMIT TED ABOVE, BE LIABLE TO Y OU FOR DAMAGES, INCLUDING ANY GENERAL, SP ECIAL, INCIDENTAL OR CONSE QUENTIAL DAMAGES ARISING OUT OF THE USE OR I NABILITY [...]

  • Pagina 71

    68  The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program. You should also get your employer (if you wo[...]

  • Pagina 72

    SMC7904WBR A4[...]