Linksys WUSB600N (EU) manual Software License Agreement

Page 49

Appendix G

Software License Agreement

Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.

In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

3.You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices.

Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy.

This option is useful when you wish to copy part of the code of the Library into a program that is not a library.

4.You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange.

If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code.

5.A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.

However, linking a “work that uses the Library” with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a “work that uses the library”. The executable is therefore covered by this License. Section 6 states terms for distribution of such executables.

When a “work that uses the Library” uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law.

If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.)

Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself.

6.As an exception to the Sections above, you may also combine or link a “work that uses the Library” with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer’s own use and reverse engineering for debugging such modifications.

You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things:

a)Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable “work that uses the Library”, as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.)

Dualand Wirelessetwork Adapter

46

Image 49
Contents Dual-Band Wireless-N USB Network Adapter Icon Descriptions About This GuideOnline Resources Copyright and TrademarksTable of Contents Chapter Product Overview Thank you for choosing the Linksys DualWirelessGeneral Network Security Guidelines Chapter Wireless Security ChecklistAdditional Security Tips How to Access the Wireless Network Monitor Chapter Advanced ConfigurationHow to Use the Wireless Network Monitor Wii Protected SetupEnter the Adapter’s PIN Number Use the Push ButtonCongratulations! The Adapter is connected to Network On the Adapter’s PIN number screen, click Next Wireless Network StatusConnect Wireless Network StatisticsWireless Security Disabled No Wii Protected SetupWireless Security Enabled Or Passphrase Needed for Connection screen appears WEP Wired Equivalent PrivacyExit to exit the Monitor Enter Key Manually Wireless Security DisabledWireless Security Enabled Profiles Available Wireless NetworksCreate a New Profile Profile InformationNo Wii Protected Setup Wii Protected Setup Use the Push Button Adapter connects to the network Enter Key Manually Congratulations! The profile is Successfully configured Advanced SetupProceed to the section for your security method WPA2 Personal WPA PersonalWPA2 Enterprise WPA EnterpriseRadius Confirm New Settings screen appears Your computer does not recognize the Adapter Appendix a TroubleshootingAdapter does not work properly Windows Vista Configuration Appendix B Windows Vista ConfigurationNew Wireless Connection Click Connect to a networkSecured Network Network Settings Saved Windows XP Wireless Zero Configuration Appendix C Windows XP Wireless Zero ConfigurationYour computer is now connected to your Wireless network WUSB600N Appendix D SpecificationsObtaining Warranty Service Limited WarrantyExclusions and Limitations Technical Support FCC Statement Safety NoticesFCC Radiation Exposure Statement Industry Canada Statement Wireless DisclaimerRèglement d’Industry Canada Avis de nonesponsabilité concernant les appareils sans filDansk Danish iljøinformation for kunder i EU Regulatory Information Norsk Norwegian iljøinformasjon for kunder i EU Malti MalteseInformazzjoni Ambjentali għal Klijenti flwropeaRomână Romanian Informa de mediu pentru clienuropeană Software Licenses Software in Linksys ProductsPreamble ScheduleSoftware License Agreement Software License Agreement No Warranty GNU Lesser General Public License Software License Agreement Software License Agreement Software License Agreement No Warranty Original SSLeay License OpenSSL License8112410B-ST