Linksys manual Linksys E3000 Appendix F Software End User License Agreement

Page 75

Linksys E3000

Appendix F: Software End User License Agreement

 

 

table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots..)

These requirements apply to the modified work as a whole.. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it..

Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library..

In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License..

3.You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library.. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License.. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish..) Do not make any other change in these notices..

Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy..

This option is useful when you wish to copy part of the code of the Library into a program that is not a library..

4.You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange..

If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not

compelled to copy the source along with the object code..

5.A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”.. Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License..

However, linking a “work that uses the Library” with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a “work that uses the library”.. The executable is therefore covered by this License.. Section 6 states terms for distribution of such executables..

When a “work that uses the Library” uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not.. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library.. The threshold for this to be true is not precisely defined by law..

If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work.. (Executables containing this object code plus portions of the Library will still fall under Section 6..)

Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6.. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself..

6.As an exception to the Sections above, you may also combine or link a “work that uses the Library” with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer’s own use and reverse engineering for debugging such modifications..

You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License.. You must supply a copy of this License.. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License.. Also, you must do one of these things:

High Performance Wireless-N Router

72

Image 75
Contents User Guide Contents Appendix C Specifications Appendix D Warranty Information Appendix E Regulatory InformationAppendix F Software End User License Agreement Product Overview TopBack Wall-Mounting Placement Horizontal PlacementCisco Connect InstallationMain Menu Main Menu Computers and Devices Local Access versus Guest AccessMain Menu Guest Access Main Menu Router SettingsConnect with the Easy Setup Key Computers and Other DevicesComputer Wireless Printer Create or Update the Easy Setup KeyConnect Manually Parental Controls First-Time Access of Parental ControlsSet Up Parental Controls Restrict Internet Access ListPersonalize Guest AccessRouter Settings Change Parental Controls PasswordRouter Details Easy Setup KeyChange Router Name or Password Other OptionsWindows How to Exit Cisco ConnectHow to Access Cisco Connect Advanced SettingsInternet Setup Advanced ConfigurationHow to Access the Browser-Based Utility Setup Basic SetupAutomatic Configuration Dhcp Static IPPPPoE Telstra Cable Optional SettingsDhcp Reservation Network SetupDhcp Server Settings Router AddressDynDNS..org Setup DdnsTime Settings Ddns ServiceAdvanced Routing Setup MAC Address CloneSetup Advanced Routing MAC Address CloneStatic Routing Wireless Basic Wireless SettingsGHz or 2.4 GHz Wireless Security, Simultaneous NetworksGHz Wireless Settings Wireless Configuration ManualWi-Fi Protected Setup Personal Options Wireless Wireless SecurityGHz or 2..4 GHz Wireless Security Security ModeWEP WPA PersonalGHz and 2..4 GHz Advanced Wireless Wireless Wireless MAC FilterWireless Advanced Wireless Settings Wireless MAC FilterLinksys E3000 Web Filters Security FirewallSecurity VPN Passthrough FirewallStorage Disk Disk ManagementCreate Share Shared Folder Access Shared FolderShared Folder Edit Database SetupStorage Media Server Format DiskMedia Folder AccessStorage FTP Server Add a Media FolderCreate Storage AdministrationInformation Create or Edit an FTP FolderCreate or Edit a Group Account User ManagementGroup Management Create or Edit a User AccountSummary Internet Access PolicyApplications and Gaming Single Port Forwarding Applications and Gaming Port Range ForwardingSingle Port Forwarding Port Range Triggering Applications & Gaming Port Range TriggeringApplications and Gaming DMZ Port Range ForwardingQoS Applications and Gaming QoSVoice Device Online GamesAdd a New Game MAC AddressAdministration Management Router PasswordSummary Log Administration LogAdministration Diagnostics DiagnosticsFirmware Upgrade Administration Factory DefaultsAdministration Firmware Upgrade Factory DefaultsStatus Local Network Status Router5GHz/2..4GHz Wireless Network Status Wireless NetworkSelect Never dial a connection Appendix a TroubleshootingClick Advanced Settings Select Tools Internet OptionsClick Save Settings Go to Start Control Panel FirewallSelect UPnP Framework Overview Appendix B How to Install and Access USB StorageInstall the USB Storage Device Access the USB Storage DeviceWindows Explorer Map a DriveWindows Vista Access Mapped DriveOn your desktop, double-click the Network icon Windows XP On your desktop, double-click the My Computer icon Map Network Drive Mac OS Display Shared Folder on the Desktop Click Connect AsGo to Finder Preferences Check Connected Servers Select Login Items Add to Startup Login ItemsAdvanced Configuration Advanced Users Only Access the Browser-Based UtilityCreate a Shared Folder Create a User Account Create a User Group AccountEnvironmental Appendix C SpecificationsAppendix D Warranty Information Limited WarrantyExclusions and Limitations Technical Support Obtaining Warranty ServiceFCC Radiation Exposure Statement Safety Notices Industry Canada StatementAppendix E Regulatory Information FCC StatementWireless Disclaimer Avis d’Industrie CanadaRestrictions dans la bande 5 GHz Linksys E3000 Schedule Cisco Software License Agreement Appendix F Software End User License AgreementCisco Products Software LicensesLinksys E3000 Appendix F Software End User License Agreement Linksys E3000 Appendix F Software End User License Agreement Linksys E3000 Appendix F Software End User License Agreement Schedule Open Source and Third Party Licenses Schedule 2-APreamble Linksys E3000 Appendix F Software End User License Agreement No Warranty GNU Lesser General Public License Schedule 2-BLinksys E3000 Appendix F Software End User License Agreement Linksys E3000 Appendix F Software End User License Agreement Linksys E3000 Appendix F Software End User License Agreement END of Terms and Conditions END of Schedule 2-B Openssl License Schedule 2-CEND of Schedule 2-C 10012110NC-RR