Linksys WRT400N manual Software End User License Agreement

Page 48

Appendix E

Software End User License Agreement

freedom and the wherewithal to run that program using a modified version of the Library.

The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run.

GNU LESSER GENERAL PUBLIC LICENSE

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

0.This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called “this License”). Each licensee is addressed as “you”.

A “library” means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables.

The “Library”, below, refers to any such software library or work which has been distributed under these terms. A “work based on the Library” means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term “modification”.)

“Source code” for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library.

Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does.

1.You may copy and distribute verbatim copies of the Library’s complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library.

You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

2.You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:

a)The modified work must itself be a software library.

b)You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change.

c)You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.

d)If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.

(For example, a function in a library to compute square roots has a purpose that is entirely well- defined independent of the application. Therefore, Subsection 2d requires that any application- supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.)

These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.

Simultaneous Dual-Band Wireless-N Router

44

Image 48
Contents Simultaneous Dual-Band Wireless-N Router Icon Descriptions Online ResourcesCopyright and Trademarks Table of Contents Appendix D Regulatory Information Appendix E Software End User License AgreementFront Panel Back PanelHorizontal Placement Wall-Mounting PlacementGeneral Network Security Guidelines Additional Security TipsHow to Access the Web-Based Utility Setup Basic SetupInternet Setup LanguageAutomatic Configuration Dhcp Static IPPPPoE PptpOptional Settings L2TPTelstra Cable Network Setup Network Address Server Settings DhcpRouter Address Setup Ddns Time SettingDdns Service DynDNS.orgSetup MAC Address Clone Setup Advanced RoutingMAC Address Clone Advanced RoutingWireless Basic Wireless Settings Configuration ViewGHz or 2.4 GHz Wireless Settings Simultaneous NetworksWi-Fi Protected Setup Method #1Method #2 Wireless Wireless Security Wireless SecuritySecurity Mode Method #3WPA2 Personal WPA2 EnterpriseRadius Wireless Wireless MAC Filter Wireless MAC FilterAccess Restriction MAC Address Filter ListWireless Advanced Wireless Settings GHz or 2.4 GHz Advanced WirelessSecurity Firewall Security VPN PassthroughFirewall Web FiltersInternet Access To create an Internet Access PolicyBlocked Applications Applications and Gaming Single Port Forwarding Applications and Gaming Port Range ForwardingSingle Port Forwarding Port Range ForwardingApplications and Gaming DMZ Applications & Gaming Port TriggeringPort Triggering Triggered RangeQoS Quality of Service Internet Access PriorityApplications and Gaming QoS CategoryOnline Games MAC Address GamesEthernet Port Add a New GameAdministration Management Router PasswordSummary Administration Log Administration DiagnosticsLog Ping TestAdministration Factory Defaults Administration Firmware UpgradeStatus Router Status Wireless Network 5GHz/2.4GHz Wireless NetworkStatus Local Network Internet ConnectionAppendix a Troubleshooting Appendix B Specifications Limited Warranty Obtaining Warranty ServiceExclusions and Limitations Technical Support Safety Notices FCC StatementFCC Radiation Exposure Statement Industry Canada StatementWireless Disclaimer Avis d’Industrie CanadaRestrictions dans la bande 5 GHz Dansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Cisco Products Software LicensesSchedule Cisco Software License Agreement Software End User License Agreement Software End User License Agreement Schedule Network Magic Features Schedule Open Source and Third Party LicensesSchedule 3-A GNU General Public LicenseSoftware End User License Agreement Software End User License Agreement No Warranty Schedule 3-BEND of Schedule 3-A GNU Lesser General Public License Software End User License Agreement Software End User License Agreement Software End User License Agreement Schedule 3-C END of Schedule 3-BOpenSSL License Original SSLeay LicenseEND of Schedule 3-C