Linksys WUSB600N (EU) manual Software License Agreement

Page 45

Appendix G

Software License Agreement

c.If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)

These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.

Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.

In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

3.You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:

a.Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,

b.Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,

c.Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)

The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.

If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.

4.You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

5.You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.

6.Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients’ exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.

Dualand Wirelessetwork Adapter

42

Image 45
Contents Dual-Band Wireless-N USB Network Adapter Icon Descriptions About This GuideOnline Resources Copyright and TrademarksTable of Contents Chapter Product Overview Thank you for choosing the Linksys DualWirelessChapter Wireless Security Checklist General Network Security GuidelinesAdditional Security Tips How to Access the Wireless Network Monitor Chapter Advanced ConfigurationHow to Use the Wireless Network Monitor Wii Protected SetupUse the Push Button Enter the Adapter’s PIN NumberCongratulations! The Adapter is connected to Network On the Adapter’s PIN number screen, click Next Wireless Network StatusConnect Wireless Network StatisticsNo Wii Protected Setup Wireless Security DisabledWireless Security Enabled Or Passphrase Needed for Connection screen appears WEP Wired Equivalent PrivacyExit to exit the Monitor Enter Key Manually Wireless Security DisabledWireless Security Enabled Profiles Available Wireless NetworksCreate a New Profile Profile InformationNo Wii Protected Setup Wii Protected Setup Use the Push Button Adapter connects to the network Enter Key Manually Congratulations! The profile is Successfully configured Advanced SetupProceed to the section for your security method WPA2 Personal WPA PersonalWPA2 Enterprise WPA EnterpriseRadius Confirm New Settings screen appears Appendix a Troubleshooting Your computer does not recognize the AdapterAdapter does not work properly Windows Vista Configuration Appendix B Windows Vista ConfigurationNew Wireless Connection Click Connect to a networkSecured Network Network Settings Saved Windows XP Wireless Zero Configuration Appendix C Windows XP Wireless Zero ConfigurationYour computer is now connected to your Wireless network WUSB600N Appendix D SpecificationsLimited Warranty Obtaining Warranty ServiceExclusions and Limitations Technical Support Safety Notices FCC StatementFCC Radiation Exposure Statement Industry Canada Statement Wireless DisclaimerRèglement d’Industry Canada Avis de nonesponsabilité concernant les appareils sans filDansk Danish iljøinformation for kunder i EU Regulatory Information Norsk Norwegian iljøinformasjon for kunder i EU Malti MalteseInformazzjoni Ambjentali għal Klijenti flwropeaRomână Romanian Informa de mediu pentru clienuropeană Software Licenses Software in Linksys ProductsPreamble ScheduleSoftware License Agreement Software License Agreement No Warranty GNU Lesser General Public License Software License Agreement Software License Agreement Software License Agreement No Warranty Original SSLeay License OpenSSL License8112410B-ST