Cisco Systems AM10 manual END of Schedule 2-C

Page 30

Appendix E: Software End User License Agreement

2.Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3.All advertising materials mentioning features or use of this software must display the following acknowledgement:

“This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”

The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related.

4.If you include anyWindows specific code (or a derivative thereof ) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@ cryptsoft.com)”

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS’’ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License.]

END OF SCHEDULE 2-C

28

Image 30
Contents User guide Contents Product Overview Storing the CapUSB Extension Base Installation InstallationClick Next. Go to step If your network does not use wireless security, go to step Wireless Network ConfigurationNew Wireless Connection WindowsWindows Vista Click Connect to a networkWireless Network Configuration This screen appears while the Valet ConnectorWindows XP Appendix a Troubleshooting Make sure that the computers are powered onSecurity Key Bits Up to 128-Bit Encryption Appendix B SpecificationsNo. of Antennas Internal Antennas Connector Type Storage Humidity To 90% NoncondensingExclusions and Limitations Appendix C Warranty InformationLimited Warranty A, Canada, Asia Pacific, Australia, New ZealandObtaining Warranty Service Technical SupportFCC Statement Safety NoticesAppendix D Regulatory Information FCC Radiation Exposure StatementWireless Disclaimer Industry Canada StatementRèglement d’Industry Canada Appendix D Regulatory Information Software Licenses Appendix E Software End User License AgreementCisco Products Schedule 1 Cisco Software License AgreementAppendix E Software End User License Agreement Appendix E Software End User License Agreement END of Schedule Schedule 2 Open Source and Third Party Licenses Version 2, JuneAppendix E Software End User License Agreement END of Terms and Conditions END of Schedule 2-A Schedule 2-B Version 2.1, FebruaryAppendix E Software End User License Agreement Appendix E Software End User License Agreement Appendix E Software End User License Agreement END of Terms and Conditions END of Schedule 2-B Openssl License END of Schedule 2-C