ZyXEL Communications network camera инструкция обслуживания

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91

Идти на страницу of

Хорошее руководство по эксплуатации

Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации ZyXEL Communications network camera. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции ZyXEL Communications network camera или обучающее видео для пользователей. Условием остается четкая и понятная форма.

Что такое руководство?

Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции ZyXEL Communications network camera можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.

К сожалению немного пользователей находит время для чтения инструкций ZyXEL Communications network camera, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.

Из чего должно состоять идеальное руководство по эксплуатации?

Прежде всего в инструкции ZyXEL Communications network camera должна находится:
- информация относительно технических данных устройства ZyXEL Communications network camera
- название производителя и год производства оборудования ZyXEL Communications network camera
- правила обслуживания, настройки и ухода за оборудованием ZyXEL Communications network camera
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам

Почему мы не читаем инструкций?

Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск ZyXEL Communications network camera это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок ZyXEL Communications network camera и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта ZyXEL Communications, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания ZyXEL Communications network camera, как это часто бывает в случае бумажной версии.

Почему стоит читать инструкции?

Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства ZyXEL Communications network camera, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.

После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции ZyXEL Communications network camera. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.

Содержание руководства

  • Страница 1

    IPC-3605N The First Consumer-Friendly Network Camera Edition 1.1, 2/2012 www .zyxel.com Copyrigh t © 201 1 ZyXEL Communica tions Cor poration[...]

  • Страница 2

    [...]

  • Страница 3

    1 Contents 2  Getting to know your IPC-3605N ............................................................................... 6  2.1  Package Contents .............................................................................................. 6  2.2  Features .........................................................................[...]

  • Страница 4

    Important Notices Regulatory Notice This device complies with Part 15 of the FCC Rules. Operation is subject to the following two cond itions: (1) This device m ay not cause harm ful interference , and (2) This device must acce pt any interference received, including interfe rence th at may cause undesired operation. FCC Interference Statement This[...]

  • Страница 5

    About This Manual This manual is inde nted only for users of the ZyXEL IPC-3 60 5 N netw ork camera. Conventions in this Manual While using this manual, pay attention to symbols and notations used to draw attention to special situations, su ch as: Caution! Information provided with this symbol is critical to prevent dam age to the product or injury[...]

  • Страница 6

    2 Getting to know your IPC-3605N 2.1 Package Contents Before setup, ensure your package contains all contents. If anything is missing, contact your distributor. Number Contents IPC-3605N Network Camera Ethernet Cable Power Adapter Quick Installation Guide Install Disk Mounting Screw x3/ Screw Mount x3 USB Wireless Adapter[...]

  • Страница 7

    2.2 Features ZyXEL’s IPC-3605N is an easy to inst all product with support for H.264/MPEG- 4/MJPEG video compression formats to help ensure high quality video with reduced bandwidth consumption.  Small and smart functional design  2 megapixel/HD resolution  Dual H.264, MJPEG, or MPEG-4 video streams  Active bandwidth management  Ne[...]

  • Страница 8

    2.3 Camera Layout Number Contents Light Sensor Lens IR LEDs x6 (inside) USB Wireless Adapter Connector Audio Input Reset Button MicroSD Card Slot (on side) Microphone LED status indicator Speaker Focus adjustment ring Microphone input Power adapter port Composite video jack Ethernet port I/O (2 in/1 out) & RJ-485 connecto r[...]

  • Страница 9

    2.4 LED Status Indicator The LED status indicator consists of one red and one blue LED. Depending on the camera’s status, the LEDs will app ear as follows: Red IR LEDs (Left), Blue Status LED (Right) When the IP camera is turned on, the LED s will light in th e following patterns: Red LEDs Blue LED Indication On On System booting Off On Successfu[...]

  • Страница 10

    2.5 Digital I/O Connector Block The I/O connector on the back of the cam era provides a central interface between your home security system and various input devices. The two digital inputs are normally used with security sensors. They work by detecting a change in the state of an open or closed circu it. You can check the status of the circuit in [...]

  • Страница 11

    3 Installation 3.1 Connecting your IPC-3605N The picture below illustrates the basi c connection of your IPC-3605N camera: The following table describes the nu mbered item s: Number Contents Ethernet cable from PC to hub/router. Ethernet cable from router to camera . Use the bundled Ethernet cable to connect the LAN port of the IP camer a to the LA[...]

  • Страница 12

    3.2 Wireless While using the ZyXEL Wireless adapter, you’ ll be able to connect your camera to your network via WiFi. Keep in mind that you can only have one active connection at any given time – either through LAN or a wireless network. Note: If the wireless connection drops or seems slow, try m oving your IP camera closer to the wireless acce[...]

  • Страница 13

    3.3 Wall and Ceiling Mounting In order to mount the camera on the wa ll or ceiling, use the included screws to fix the bracket to a flat surface. Af ter the camera has been affixed, adjust the camera to the required viewing angle. Follow the steps below to mount your camera: Step 1: Detach the metal mounting plate from the base of the camera by ins[...]

  • Страница 14

    3.4 Dismounting the Camera The following instructions will deta il how to remove the camera from a mounted surface. A flat head and Philli ps screwdriver will be required. Step 1: Remove the came ra from the metal mounting plate by inserting a flat head screw driver into the rectangular hole on the wide end of the plastic base, and pushing downward[...]

  • Страница 15

    3.5 Disassemble/Assemble the camera stand The camera comes at tached to its stand when delivered from ZyXEL. If you need to detach or reattach the stand, follow the diagrams below. To reattach the camera stand:[...]

  • Страница 16

    4 Initial Setup Before running the setup utility, make sure you have the IP Camera properly connected. To begin setup, insert the installation CD supplied with the camera into the CD-ROM drive of the viewing PC, and the eaZy Wizard utility will s tart and guide you during the installation process of th e hardware and software for your IP camera. 4.[...]

  • Страница 17

    Accessing your camera Your camera’s video feeds can be accesse d in a number of ways, as follows. 1) Your camera is CloudEnabled™ and can be viewed from any PC running a modern web browser with the Flash plug- in installed. When you first setup your camera using the included CD, it will r egister your camera with iSecurity +. Simply point your [...]

  • Страница 18

    4.2 CloudEnabled™ Viewing 4.2.1 Accessing via iSecurity+ Smartphone App iSecurity+ is an iOS/Androi d App designed to allow you to quickly and easily access, control, and view your camera’s video feeds from anywhere. The iSecurity+ can be located on the App St ore and Android Market from your device by searching “iSecurity+,” or directly fr[...]

  • Страница 19

    This page allows you to easily adjust your cam era’s time zone, display and audio settings, and infrared lighting. Sharing options can be accessed from the Sharing tab at the top of the screen.[...]

  • Страница 20

    4.3 Direct Viewing of your Ca mera (For Advanced Users) 4.3.1 Accessing via PC web browser Users can access their video feeds and camer a m anagement tools easily through any web browser. Simply follow these steps. 1) Open any web browser (Internet Expl orer, Safari, Firefox, Chrome, etc.) 2) Type in your camera’s IP address (eg. 192.168.1.11. Th[...]

  • Страница 21

    7) You’re now ready to view and manage your camera from your web browser. Note: If your IP camera falls behind a firewall, you will need to enable ports 80 and 554 in your firewall and link them to the internal IP address of the camera. Should you have more than one, increase the values above by 1 (For example, the second camera would have ports [...]

  • Страница 22

    The following table describes the labels found on this screen. Number Label Description Left control panel provides co ntrol over video recording, voice communication, I/O, and snapshot Video stream Allows you to change between stream-1 and stream-2. (Stream 2 can be enabled and configured in [Settings] > [Video] Video mode selection Allows you [...]

  • Страница 23

    4.3.1.2 Icons The following table describes th e icons found on this screen. Icon Label Description Fit to browser Resizes the live vi deo pane to fit your browser window Actual size Resizes the live vi deo pane to the original size Brightness Adjusts the camera’s brightness. Microphone Volume Adjust microphone volume. Click the icon to m ute the[...]

  • Страница 24

    With the device configured, clicking the will allow you to speak throug h your microphone and be heard from the cam era for 90 seconds. Note: When using the voice communication f eature, you may experience various degrees of delay between transmission fr om the com puter and playback on the camera, depending on the condition of your network environ[...]

  • Страница 25

    2) For stream-2, set the cod ec to “Motion JPEG.” 3) Launch the web browser on your iPhone, Andr oid phone, or other mobile internet device, and enter [IP address]/mjpeg.html into the address field of your phone’s web browser to watch live vi deo on your mobile device. (Note: The IP required IP address is located at the bottom of the page, ju[...]

  • Страница 26

    4.3.3 Accessing via 3GPP Mobile Phone You can access your IP camera via 3GPP-co mpatible mobile phones provided your camera has a stable internet connection, and your mobile devices has a stable connection to the 3G network. There are also several steps which must be taken to ensure 3GPP functionality. 1) The second video stream (locat ed at [Setup[...]

  • Страница 27

    5 Configuration 5.1 Video Settings The Video Settings screen consists of all the basic settings options. To access the main setup page, click on the setup button at the top right in the live view screen. You can configure detailed settings of your IP camera here. The following table describes the labels found on this screen. Label Description Turbo[...]

  • Страница 28

    Framerate Framerate. 5~30 FPS. Higher framerate is more bandwidth-intensive. Quality Video quality settings. 64kpbs~3Mbps. Active Bandwidth Management Allows the IPC-3605N to intelligently change video bitrate depending on network congestion. This avoids video deterioration and frame dropping. Video Preference Allows you to c hoose between a prefer[...]

  • Страница 29

    The following table describes the labels found on this screen. Label Description Video Properties Brightness Set image brightness (1~100) Sharpness Set image sharpness (1~8) Saturation Set image saturation (1~ 10) White Balance Set image’s white balance to com pensate for different lighting conditions. Flickerless Sets Flickerless mode. 50(defaul[...]

  • Страница 30

    5.3 Audio Settings The Audio Settings screen allows you to en able or disable audio, as well as adjust volume. Stream-2 audio is only available fo r adjustm ent when it is selected and 3GPP mode has been checked in video settings. To access the Audio Settings screen, go to set tings, then select Audio from the sidebar. The following screen will app[...]

  • Страница 31

    To access the user settings pane, navigate to Se ttings, then select Users fro m the sidebar. The following screen will appear. The following table describes the la bels found within this screen. Label Description Modify/Remove Click here to Modify or Remove an existing viewer Add Click here to add a new viewer or administrator Allow anonymous view[...]

  • Страница 32

    5.5 Network Settings The Network Settings page allows you to check your network settings and make detailed adjustments. To access the Network Settings pane, navigate to settings and select Netw ork from the sidebar. The following screen will appear. 5.5.1 Ethernet Settings The Ethernet Settings page will allow you to choose your IP address conf igu[...]

  • Страница 33

    On this page, you can set the camera to obt ain an IP address via DHCP (recommended), use a manual IP address, or obtain an IP a ddress via PPPoE, for which a valid user name and password are required. 5.5.2 Wireless Settings If you have installed the ZyXEL wireless adap ter, you’ll be able to set up a wireless connection from this page. To conne[...]

  • Страница 34

    5.5.3 Network Diagnostic Here you can run the diagnostic tool for your current network settings, and it will show error messages if any anomaly is detected. For further information on error m essages, please refer to the troubleshooting section. 5.5.4 Network Bandwidth This automatic network connection test helps users better define the appropriate[...]

  • Страница 35

    This message indicates that the currently c onnected network has the capacity to support up to 10 network cameras of identical bit rate settings (either on Stream 1 or Stream 2). If the message shows a less favorable result, go to [Setup] > [Video] to select a lower bitrate. 5.5.5 Advanced This page allows you to adjust advanced ne twork setting[...]

  • Страница 36

    The following table describes th e labels on this screen. Label Description DNS Server Set the DNS server to be found via DHCP, or enter a manual DNS address NTP Configuration NTP stands for Network Time Prot ocol. To synchronize your camera’s clock with an NTP server, choose to either obtain an NTP server address via DHCP, or use an external NTP[...]

  • Страница 37

    To access the UPnP screen, navigate to [S ettings] > [Network] > [UPnP]. The following screen will appear. Note: To enable UPnP on Windows, go to Add or Remove Programs in Control Panel, then click Add/Re move Windows Components, double-click “Network Services,” and ch eck “UPnP User Interface.” 5.5.8 RTP If you want to broadcast vide[...]

  • Страница 38

    represents highest priority is 46. The defau lt DSCP value is 0, which indicates normal priority (no QoS). The following is a table of recommended DS CP values. The drop precedence indicates the order in which IP packet s will be dropped when the ne twork is congested. Packets with a higher drop precedence will be dropped fi rst. Each class in the [...]

  • Страница 39

    The following table describes the labels found in this screen. Label Description SMTP Server Enter SMTP server information in this field (ie. smtp.gmail.com) SMTP Port Enter your SMTP server’s port information From Address Enter your full e-mail address (ie. xxxx@xx.com ) To Address Enter the full e-mail address you wish to receive notifications.[...]

  • Страница 40

    The following table describes the la bels found within this screen. Label Description FTP Address Enter the addr ess of your FTP server FTP Port Enter the port of your FTP server User Name Enter your user name here Password Enter your Password here Upload Path Enter the file path of the folder where you want snapshots to be stored. Save Save settin[...]

  • Страница 41

    The HTTP Server page allows you to set your camera to input the URL of an HTTP server used by an NVR in order to signal your NVR that there’s an event being triggered. To access this page, navigate to [Setup] > [Event Setup] > [Eve nt Server Setup] > [HTTP]. The following screen will appear. 5.6.1.6 SMS Server Your IP camera is capable o[...]

  • Страница 42

    Clear Clear settings Cancel Cancel After you input your settings, click [Nex t]. The following page will appear. This page allows you to input the message that will be sent when an event is triggered. Enter your message, then click [Next] . The following screen will appear. This page will allow you to test your camera’ s SMS functionality. To sen[...]

  • Страница 43

    To create an event trigger, click the [Creat e] button. The following screen will appear. The following table describes th e fields in this screen. Field Des criptio n Event Trigger Set the trigger for this event. Trigg ers can be based on schedule, I/O port activity, or audio detection. Schedule If you wish to schedule an event, input the time and[...]

  • Страница 44

    Select the actions to be taken, then click [ Finish] to complete trigger se tup. 5.6.3 Motion Detection Motion Detection allows you to define up to th ree regions that will trigger an event if motion is detected. Select a region, sensitivity le vel (S1: Lowest ~ S5: Highest ) from the dropdown list, and then click and drag on the video display to d[...]

  • Страница 45

    5.7 Recording Setup The IPC-3605N supports storage of both snapshot s and video clips to local storage. To configure this function, navigate to [Setup] > [Recording Setup]. The following screen will appear. This page allows you to view your SD Card ’s status, capacity, and gives you the option of formatting the card, as well as enabling record[...]

  • Страница 46

    Note:  This camera uses a First In, First Out storage method. W hen the SD card is full, the oldest files will be au tom atically rewritten.  If you want to record video clips of detected motion to the SD card, you’ll need to set a motion detection re gion before setting up event-based recording. 5.8 Recording Hi story The Recording History[...]

  • Страница 47

    5.10 Multi-Camera This page allows you to add, modify, or delete additional IP cam eras on your camera list. To access this page, navigate to [Setup] > [Multi-Cam era]. The following screen will appear. To add a camera, click [Add] . The following screen will appear. The following table describes the la bels found within this screen.[...]

  • Страница 48

    Camera The # by which this camera will be identified IP Address Enter the camera’s IP address he re User Name Enter the username used to access th e new camera in this field Password Enter the password used to access the new camera in this field RTSP Port Enter the camera ’s RTSP port (default 554) HTTP Port Enter the camera’s HTTP port (defa[...]

  • Страница 49

    6 Event Viewer The Event Viewer allows you to view detailed logs of events which have been triggered. To access this page, navigate to [Setup], then select [Event Viewer] from the top panel. Select any type of event from the sidebar (Motion, I/O, Scheduled Triggers, or Audio Detection) to view that type ’s history, or click on image links to view[...]

  • Страница 50

    7 Maintenance The Maintenance screen provides information about your IP camera, access to the h istory log, and system maintenance functions. 7.1 Informatio n To access the Maintenance Inform ation screen, navigate to [Setup], then select [Maintenance] from the top panel. The following screen will appear. 7.2 Log This page provides a system log for[...]

  • Страница 51

    7.3.1 Reboot Camera Press the [Reboot] button to reboot your camera. 7.3.2 Profile Management Profile Management allows users to easily set up multiple c ameras. After one camera is properly configured, users can export that came ra’s configuration to a profile on their PC, which can then be loaded onto other cameras. Th is feature also serves as[...]

  • Страница 52

    7.3.3 Firmware Update Firmware updates are available at us.zyxe l.com/support. After downloading the latest firmware for your camera, click the [Browse] button to locate the firmware file on your hard drive, then click the [Upgrade] button to update the cam era’s firmware. Once the upgrade process begins, it must not be inte rrupted or you risk p[...]

  • Страница 53

    8 Troubleshooting During the course of insta llation, you might encounter va rious issues. The following section contains some troubleshooting proce dures to help you so lve these problems. 8.1 Reconfiguring Your Device Anytime you need to re-configure your IP camera, you can simply double-click on the eaZy Wizard icon to launch the eaZ y Wi zard c[...]

  • Страница 54

    8.3 Resetting to Factory Defaults If you’ve forgotten your password, or your cam era’s been acting ge nerally strange, you can follow the steps below to reset the camera to its default settings. To reset the cam era: 1) Press and hold the reset button (locat ed on the camera’s rear panel) for approximately 10 seconds. When successf ul, you sh[...]

  • Страница 55

    8.4 Trouble with Active X After launching your browser and entering your camera’s IP address, you’ll be asked for the username and password combination (D efault is admin/admin, case sensitive.) No User Interface in the Brows er This issue could have three possible causes. 1) ActiveX was not installed. Follow the instructions on-screen to insta[...]

  • Страница 56

    If you’ve gone through all above steps but still can’t obtain video/audio on your browser, close all browser windows and delete the ‘IPSurveillance Embedded” folder found in C:Program Files. (If using 64-bit windows, l ook in C:Program Files (x86)), then open your browser, log into your IP camera, and reinstall the ActiveX client. If your[...]

  • Страница 57

    8.5 Trouble with Remot e Viewing on Browser You can view your camera’s video streams remo tely over the Internet. If you’re having trouble viewing video remotely, refer to th e section below for troubleshooting tips. The above figure depicts a typical setup in which:  The IP camera has a static virtual IP address of 192.168.0.1  The WAN I[...]

  • Страница 58

    3) Enable port forwarding on your router and allow traffic on the ports the IP camera is using. You may need to consult the ma nufacturer of your router for setting details. Note: Your router may require a reboot after port forw arding is set. The following figure details the settings r equire d to remotely view the IP cam era. After taking the abo[...]

  • Страница 59

    8.6 Symptoms, Causes, and Solutions Listed below are some common pr oblems, and their sol utions. Symptom Possible Cause/Solution Problems accessing from LAN network using web browser The entered IP address is incorrect. Make sure the IP address you entered matches the IP address of your ca mera. If you are certain that your camera is configured wi[...]

  • Страница 60

    Symptom Possible Cause/Solution Scanning and connecting to wireless AP takes a long time Too many wireless APs nearby. The amount of time taken to scan wireless APs depends on the number of wireless APs around the camera. If there are too many wireless APs (30 or more), it may take as long as 3 minutes to complete the scanning process. A possible w[...]

  • Страница 61

    Symptom Possible Cause/Solution Network diagnosis shows error icon Network connection error. The network connection test verifies that the camera has su cce ssfully connected to the LAN network. When the diagnosis result shows a red excla mation mark icon, it means that the camera fails to connect to the LAN network. Check if the LAN cable is secur[...]

  • Страница 62

    Symptom Possible Cause/Solution Part of the image becomes pixilated/Image artifacts appear Network bandwidth is insufficient. Without sufficient bandwidth, video quality will deteriorate and image errors like pixilation or frame-drop may occur. When you view your camera remotely from the Internet, your camera needs sufficient upload bandwidth to tr[...]

  • Страница 63

    Symptom Possible cause/solution A warning message appears stating “Your video quality is too high for your Internet bandwidth.” Network quality is not high enough. This means the camera’s browser interface, WebVUer, could not receive a steady strea m of video data from your camera. The loss of video data might also be caused by network conges[...]

  • Страница 64

    9 Technical Specifications Category IPC-3605N Camera Image Sensor Lens  Focal Length: 4.0mm  Max Aperture Ratio: F1.5  Fixed Iris Focus Range 0.5m ~ INF Min imu m Illumination IR Mode: 0 lux with built in IR LEDs on (12 LEDs in total; effective distance up to 10m) Color m ode: 1.0 lux Shutter Tim e 1/5 ~ 1/16 000 Sec Video Video Compressio[...]

  • Страница 65

    Category IPC-3605N Software NVR Station  Multiple channel management (32-channels)  Fast and intuitive camera setup  Search and playba ck record ings by eve n t types  Scheduled a nd event-base d managem ent  Smart motion and audio detection Web Browser Internet Explorer (ActiveX)  Remotely view and configure camera on Inte rnet E[...]

  • Страница 66

    10 Open-Sourced Components 3 r d Party Software Version License Addgroup V1.13.4 Busybox, GPLv2 Adduser V1.13.4 Busybox, GPLv2 Ash V1.13.4 Busybox, GPLv2 AVN-IPv4LL V1.13.4 GPL Busybox V1.13.4 Busybox, GPLv2 Cat V1.13.4 Busybox, GPLv2 Chattr V1.13.4 Busybox, GPLv2 Chgrp V1.13.4 Busybox, GPLv2 Chmod V1.13.4 Busybox, GPLv2 Chown V1.13.4 Busybox, GPLv[...]

  • Страница 67

    Iwlist V29 GPL Iwpriv V29 GPL Kill V1.13.4 Busybox, GPLv2 Ln V1.13.4 Busybox, GPLv2 Login V1.13.4 Busybox, GPLv2 Ls V1.13.4 Busybox, GPLv2 Lsattr V1.13.4 Busybox, GPLv2 Mini_httpd V1.19 GPL Mkdir V1.13.4 Busybox, GPLv2 Mkdosfs V2.11 GPL Mknod V1.13.4 Busybox, GPLv2 Mktemp V1.13.4 Busybox, GPLv2 More V1.13.4 Busybox, GPLv2 Mount V1.13.4 Busybox, GPL[...]

  • Страница 68

    Libc-2.11.so V2.11 GPLv3 Libcrypt.so V2.11 GPLv3 Libcrypt.so.1 V2.11 GPLv3 Libcrypt-2.11.so V2.11 GPLv3 Libcrypto.so V0.98m GPL Libcrypto.so.0.9.8 V0.98m GPL Libdl.so V2.11 GPLv3 Libdl.so.2 V2.11 GPLv3 Libdl-2.11.so V2.11 GPLv3 Libgcc_s.so V4.4.0 GPLv3 Libgcc_s.so.1 V4.4.0 GPLv3 Libip4tc.a V1.4.10 GPL Libip4tc.la V1.4.10 GPL Libip6tc.a V1.4.10 GPL [...]

  • Страница 69

    Libsockipc.so.1.2 V2.11 GPLv3 Libssl.so V0.98m GPL Libssl.so.0.9.8 V0.98m GPL Libstdc++.so V4.4.0 GPLv3 Libstdc++.so.6.0.11 V4.4.0 GPLv3 Libthread_db.so V4.4.0 GPLv3 Libthread_db.so.1 V2.11 GPLv3 Libthread_db-1.0.so V2.11 GPLv3 Libthreadutil.so V1.4.1 GPL Libthreadutil.so.2 V1.4.1 GPL Libthreadutil.so.2.0.2 V1.4.1 GPL Libupnp.so V1.4.1 GPL Libupnp.[...]

  • Страница 70

    Pivot_root V1.13.4 Busybox, GPLv2 Poweroff V1.13.4 Busybox, GPLv2 Reboot V1.13.4 Busybox, GPLv2 Rmmod V1.13.4 Busybox, GPLv2 Route V1.13.4 Busybox, GPLv2 Runlevel V1.13.4 Busybox, GPLv2 Start-stop-daemon V1.13.4 Busybox, GPLv2 Sulogin V1.13.4 Busybox, GPLv2 Swapoff V1.13.4 Busybox, GPLv2 Swapon V1.13.4 Busybox, GPLv2 Switch_root V1.13.4 Busybox, GP[...]

  • Страница 71

    gratis or for a fee, you must give the recipi ents all the rights that you have. Yo u must make sure t h at t hey, too, receive or can get the source c ode. And you m u st show them these terms so they know their ri ghts. We protect y our rights wi th two st eps: (1) copy right the software, a nd (2) offer you this license which gives you legal per[...]

  • Страница 72

    Program, t he distribution of t he whole must be on the te rms of this Li cense, whose perm issions for othe r licensees extend to the entire whole, an d thus to each a nd every part regardl ess of who wrote it. Thus , it is not the intent o f this section to claim rights or con t est your rights to work written entirely by you; rather, the intent [...]

  • Страница 73

    refrain entirel y from dist ribution of the Pro gram. If any po rtion of thi s section is held inval id or unenforceable under any part icular circumstance, the ba lance of the section is in tended to apply and the section as a whole is intended to appl y in other circum stances. It is not the purpose of t his section to ind uce you to infri nge an[...]

  • Страница 74

    This product con tains ad dgroup, adduser, ash, busybox, cat, chattr, chgrp, chmod, ch own, cp, cttyhack, date, dd, del group, deluser , df, dmesg, ech o, egrep, false , fgrep, grep, gnuzip, gzip, h ostname, i p, ipaddr, iplink, iproute, kill, ln, login, ls, lsattr, mkdir, m knod, mktemp, more, mount, mount point, mv, netstat, ni ce, ping, ping 6, [...]

  • Страница 75

    Also, for eac h distributo r's protecti on, we want to make certa in that ever yone underst ands that t here is no warranty for this free librar y. If th e library is modified by someone else and passed on, we wan t its recipients to know that what they have is not the origin al version, so that any problems introdu ced by others will not refl[...]

  • Страница 76

    The "Library", below, refer s to any such software lib rary or wo rk which has been distribut ed under these terms. A "wor k based on the Library " means either the Li brary or any deri vative work unde r copyright l aw: that is to say, a work containing the Li brary or a po rtion of it , either verbat im or with modificati ons [...]

  • Страница 77

    Thus, it is not the intent of this sectio n to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise th e right to control the distributi on of derivative o r collective works ba sed on the Library. In addition, mere aggreg ation of another work not ba sed on the Library with the Library (or with a w[...]

  • Страница 78

    Otherwise, if the work is a derivativ e of the Library, you m ay distribute the object code for the work under the terms of Section 6. Any executabl es containing that work als o fall u nder Section 6, whethe r or not they are linked directly with the Library itself. 6. As an except ion to the Sections a bove, you m ay also compile or link a "[...]

  • Страница 79

    8. You ma y not copy, m odify, subli cense, link wit h, or distri bute the Library ex cept as expressly p rovided under this Lice nse. Any attempt otherwise t o copy, modi fy, sublicense, link with, or distribut e the Library is void, and will automatically ter minate your rights under this Licen se. Ho wever, parties who have received copies, or r[...]

  • Страница 80

    Each version is gi ven a distinguishin g version number. If t he Library specifies a version n umber of this License which applies to it and "any later version", you h ave the option of following the terms and conditions either of that version or of any later v e rsion published by the Free Software Foundation. If the Library does n ot sp[...]

  • Страница 81

    License as published by the Free Software Foundation; either version 2 of the License, or (at your op tion) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WA RRANTY; witho ut even th e implied war r anty of MERCHANTABILI TY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public Li[...]

  • Страница 82

    This product contains ld-2.11.so , ld-lin ux.so.3, libc. so, libc.so .6, libc-2.11.so, libcryp t.so, libcryp t.so.1, libcrypt-2.11.so, libd l.so, libdl.so.2, libdl-2 .11.so, libgcc_s.so , libgcc_s.so.1, lib m.so, libm.so.6, libm- 2.11.so, li bnsl.so, li bnsl.so.1, libnsl-2.11 .so, libnss _dns.so, l ibnss_dns .so.2, li bnss_dns-2. 11.so, libnss_file[...]

  • Страница 83

    domains, we st and ready to extend this provision t o those dom ains in future versions of the GPL, as nee ded to protect the freedom of users. Finally, every program is threatened constantly by so ftware patents . States shoul d not allow pat ents to restrict develo pment and use of softwa re on gene ral-purpose com puters, but in those that do, w[...]

  • Страница 84

    The “System Libraries” of an executabl e work incl ude anything, other t han the work as a whol e, that (a) is included i n the norm al form of packaging a Major Component , but whi ch is not pa rt of that Major Compone nt, and (b ) serves on ly to enable use of the work with t hat Major C omponent, or to im plement a Standard Interface for whi[...]

  • Страница 85

    4. Conveying V erbatim Copies. You may con vey verbatim copies of the Program' s source code as y ou receive it, in any medium , provided that you conspicuously an d appropriately publish on each copy an appropriate cop yright notice; keep in tact all notices stating that this License and a ny non-perm issive terms added i n accord with sectio[...]

  • Страница 86

     c) Convey individual copies of the obj ect cod e with a copy of the written offer to provide the Correspondi ng Source. This a lternative is allowed only occasional ly and nonc ommercially, and only if yo u received the object code wi th su ch an offer, in accord with subsection 6b.  d) Convey the object code by of fering access from a desig[...]

  • Страница 87

    7. Additional Terms. “Additional perm issions” are terms that supplement the terms of this License by making exceptions fro m one or more of its conditions. Additional permissions th at are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If a[...]

  • Страница 88

    license, and (b) permanently, if the copyrigh t ho lder fails to notify you of t he violation by some reaso nable means prior to 60 days after the cessation. Moreover, your license from a particular copyr igh t holder is reinstated permanently if the copyrigh t ho lder notifies you of the violation by some reasonable means, this is the first time y[...]

  • Страница 89

    Each contributor gr ants you a non-ex clusive, worldw id e, royalty-free patent license under the contributor' s essential pate nt claims, to m ake, use, sell, offer for sal e, import a nd otherwi se run, modi fy and propa gate the contents o f its contri butor versi on. In the following three paragra phs, a “patent licens e” is a ny expre[...]

  • Страница 90

    part which is the covere d work, but the spec ial requ irements of the GNU Affero General Public License, section 13, concerning interaction thro ugh a network will apply to the combination as su ch. 14. Revised Versions of this License. The Free Soft ware Foundati on may publ ish revise d and/or new versions of the GNU Ge neral Public License from[...]

  • Страница 91

    How to Apply These Terms to Your New Programs If you devel op a new pr ogram, and you want it t o be of the greatest possible use to the publ ic, the best wa y to achieve this is to make it free software which ev eryone can redistribute and change un der these term s. To do so, attach the following notices to t he program. It is safest to attach th[...]