IPC-3605N The First Consumer-Friendly Network Camera Edition 1.1, 2/2012 www.zyxel.
1 2 3 4 5 6 7 8 9 10 11 Contents Getting to know your IPC-3605N ............................................................................... 6 2.1 Package Contents.............................................................................................. 6 2.2 Features............................................................................................................. 7 2.3 Camera Layout .................................................................................................
Important Notices Regulatory Notice This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation. FCC Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
About This Manual This manual is indented only for users of the ZyXEL IPC-3605N network camera. Conventions in this Manual While using this manual, pay attention to symbols and notations used to draw attention to special situations, such as: Caution! Information provided with this symbol is critical to prevent damage to the product or injury to the user. Important! This symbol indicates instructions that a user must follow in order to complete a task.
2 Getting to know your IPC-3605N 2.1 Package Contents Before setup, ensure your package contains all contents. If anything is missing, contact your distributor.
2.2 Features ZyXEL’s IPC-3605N is an easy to install product with support for H.264/MPEG4/MJPEG video compression formats to help ensure high quality video with reduced bandwidth consumption. Small and smart functional design 2 megapixel/HD resolution Dual H.
2.
2.4 LED Status Indicator The LED status indicator consists of one red and one blue LED. Depending on the camera’s status, the LEDs will appear as follows: Red IR LEDs (Left), Blue Status LED (Right) When the IP camera is turned on, the LEDs will light in the following patterns: Red LEDs On Off On Off Blinking (Every 0.5 seconds) Off Off Blinking Blue LED On On Off Off Off Blinking (Every 0.5 seconds) Blinking (Every 0.
2.5 Digital I/O Connector Block The I/O connector on the back of the camera provides a central interface between your home security system and various input devices. The two digital inputs are normally used with security sensors. They work by detecting a change in the state of an open or closed circuit. You can check the status of the circuit in [Setup] > [Event Setup] > [I/O Status] The output port is normally used to trigger external audio or visual indicators, like sirens or strobe lights.
3 Installation 3.1 Connecting your IPC-3605N The picture below illustrates the basic connection of your IPC-3605N camera: The following table describes the numbered items: Number Contents Ethernet cable from PC to hub/router. Ethernet cable from router to camera. Use the bundled Ethernet cable to connect the LAN port of the IP camera to the LAN port of your hub/router. Wireless adapter (optional). If you’re using the USB Wi-Fi adapter, plug it into the USB port on your camera for wireless reception.
3.2 Wireless While using the ZyXEL Wireless adapter, you’ll be able to connect your camera to your network via WiFi. Keep in mind that you can only have one active connection at any given time – either through LAN or a wireless network. Note: If the wireless connection drops or seems slow, try moving your IP camera closer to the wireless access point for an improved signal.
3.3 Wall and Ceiling Mounting In order to mount the camera on the wall or ceiling, use the included screws to fix the bracket to a flat surface. After the camera has been affixed, adjust the camera to the required viewing angle. Follow the steps below to mount your camera: Step 1: Detach the metal mounting plate from the base of the camera by inserting a flat head screwdriver into the rectangular hole at the wide end of the base and pressing downward to push the plate away from the rest of the camera.
3.4 Dismounting the Camera The following instructions will detail how to remove the camera from a mounted surface. A flat head and Phillips screwdriver will be required. Step 1: Remove the camera from the metal mounting plate by inserting a flat head screw driver into the rectangular hole on the wide end of the plastic base, and pushing downward. Step 2: Use a Phillips head screwdriver to remove the metal mounting plate from the mounting surface.
3.5 Disassemble/Assemble the camera stand The camera comes attached to its stand when delivered from ZyXEL. If you need to detach or reattach the stand, follow the diagrams below.
4 Initial Setup Before running the setup utility, make sure you have the IP Camera properly connected. To begin setup, insert the installation CD supplied with the camera into the CD-ROM drive of the viewing PC, and the eaZy Wizard utility will start and guide you during the installation process of the hardware and software for your IP camera. 4.1 Adjusting the Focus After initial setup, the camera’s focus will need to be adjusted.
Accessing your camera Your camera’s video feeds can be accessed in a number of ways, as follows. 1) Your camera is CloudEnabled™ and can be viewed from any PC running a modern web browser with the Flash plug-in installed. When you first setup your camera using the included CD, it will register your camera with iSecurity+. Simply point your web browser to http://zyxel.isecurityplus.com and login with the username and password you created during setup.
4.2 CloudEnabled™ Viewing 4.2.1 Accessing via iSecurity+ Smartphone App iSecurity+ is an iOS/Android App designed to allow you to quickly and easily access, control, and view your camera’s video feeds from anywhere. The iSecurity+ can be located on the App Store and Android Market from your device by searching “iSecurity+,” or directly from your computer at the Android Market (http://market.android.com) for Android devices, or the App Store through iTunes (http://www.apple.com/itunes). 4.2.
This page allows you to easily adjust your camera’s time zone, display and audio settings, and infrared lighting. Sharing options can be accessed from the Sharing tab at the top of the screen.
4.3 Direct Viewing of your Camera (For Advanced Users) 4.3.1 Accessing via PC web browser Users can access their video feeds and camera management tools easily through any web browser. Simply follow these steps. 1) Open any web browser (Internet Explorer, Safari, Firefox, Chrome, etc.) 2) Type in your camera’s IP address (eg. 192.168.1.11. This number can be easily found by using the eaZy set up Wizard utility) 3) A dialogue box will appear requesting a user name and password.
7) You’re now ready to view and manage your camera from your web browser. Note: If your IP camera falls behind a firewall, you will need to enable ports 80 and 554 in your firewall and link them to the internal IP address of the camera. Should you have more than one, increase the values above by 1 (For example, the second camera would have ports 81 and 555.) 4.3.1.1 Page Layout On the first page, you can see the basic control panel on the top and left, and live video on the right hand side.
The following table describes the labels found on this screen. Number Label Left control panel Video stream Video mode selection Top control panel Live Video pane Channel selection Description provides control over video recording, voice communication, I/O, and snapshot Allows you to change between stream-1 and stream-2. (Stream 2 can be enabled and configured in [Settings] > [Video] Allows you to change the video display between single, multi, and auto-scan.
4.3.1.2 Icons The following table describes the icons found on this screen. Icon Label Fit to browser Description Resizes the live video pane to fit your browser window Actual size Resizes the live video pane to the original size Brightness Adjusts the camera’s brightness. Microphone Volume Setup Adjust microphone volume. Click the icon to mute the built-in microphone Click the [Setup] button to access the settings for you camera. Speaker Volume Adjust speaker volume.
With the device configured, clicking the will allow you to speak through your microphone and be heard from the camera for 90 seconds. Note: When using the voice communication feature, you may experience various degrees of delay between transmission from the computer and playback on the camera, depending on the condition of your network environment. 4.3.
2) For stream-2, set the codec to “Motion JPEG.” 3) Launch the web browser on your iPhone, Android phone, or other mobile internet device, and enter [IP address]/mjpeg.html into the address field of your phone’s web browser to watch live video on your mobile device. (Note: The IP required IP address is located at the bottom of the page, just above the [Save] and [Reset] buttons.
4.3.3 Accessing via 3GPP Mobile Phone You can access your IP camera via 3GPP-compatible mobile phones provided your camera has a stable internet connection, and your mobile devices has a stable connection to the 3G network. There are also several steps which must be taken to ensure 3GPP functionality. 1) The second video stream (located at [Setup] > [Video Settings]) must be enabled, with resolution set to QQVGA, FPS set to 5, codec set to MPEG-4, and quality set to medium.
5 Configuration 5.1 Video Settings The Video Settings screen consists of all the basic settings options. To access the main setup page, click on the setup button at the top right in the live view screen. You can configure detailed settings of your IP camera here. The following table describes the labels found on this screen. Label Turbo Picture Motion Adaptive Enable 2nd Stream Stream-1/Stream-2 Resolution Codec Description This mode provides best video quality, but frame rate is limited to 15.
Framerate Quality Active Bandwidth Management Video Preference Viewing on PC Viewing on Phone Browser Save Reset Framerate. 5~30 FPS. Higher framerate is more bandwidth-intensive. Video quality settings. 64kpbs~3Mbps. Allows the IPC-3605N to intelligently change video bitrate depending on network congestion. This avoids video deterioration and frame dropping. Allows you to choose between a preference toward higher quality image or a higher framerate. Click on the bar to set.
The following table describes the labels found on this screen.
5.3 Audio Settings The Audio Settings screen allows you to enable or disable audio, as well as adjust volume. Stream-2 audio is only available for adjustment when it is selected and 3GPP mode has been checked in video settings. To access the Audio Settings screen, go to settings, then select Audio from the sidebar. The following screen will appear. The following table describes the labels found within this screen.
To access the user settings pane, navigate to Settings, then select Users from the sidebar. The following screen will appear. The following table describes the labels found within this screen. Label Modify/Remove Add Allow anonymous viewer login Description Click here to Modify or Remove an existing viewer Click here to add a new viewer or administrator Click here to allow anonymous viewers without requiring name and password. These viewers are restricted to viewing live video only.
5.5 Network Settings The Network Settings page allows you to check your network settings and make detailed adjustments. To access the Network Settings pane, navigate to settings and select Network from the sidebar. The following screen will appear. 5.5.1 Ethernet Settings The Ethernet Settings page will allow you to choose your IP address configuration. To access the Ethernet Settings page, navigate to Settings, then select Network, and Ethernet from the sidebar. The following page will appear.
On this page, you can set the camera to obtain an IP address via DHCP (recommended), use a manual IP address, or obtain an IP address via PPPoE, for which a valid user name and password are required. 5.5.2 Wireless Settings If you have installed the ZyXEL wireless adapter, you’ll be able to set up a wireless connection from this page. To connect wirelessly, check the [Use Wireless First] box to give priority to wireless connections when the LAN network is also connected.
5.5.3 Network Diagnostic Here you can run the diagnostic tool for your current network settings, and it will show error messages if any anomaly is detected. For further information on error messages, please refer to the troubleshooting section. 5.5.4 Network Bandwidth This automatic network connection test helps users better define the appropriate video bitrate for their network. To perform the network bandwidth test: 1.
This message indicates that the currently connected network has the capacity to support up to 10 network cameras of identical bit rate settings (either on Stream 1 or Stream 2). If the message shows a less favorable result, go to [Setup] > [Video] to select a lower bitrate. 5.5.5 Advanced This page allows you to adjust advanced network settings. To access this pane, navigate to [Setup] > [Network] > [Advanced]. The following screen will appear.
The following table describes the labels on this screen. Label DNS Server NTP Configuration HTTP Server RTSP Server 5.5.6 Description Set the DNS server to be found via DHCP, or enter a manual DNS address NTP stands for Network Time Protocol. To synchronize your camera’s clock with an NTP server, choose to either obtain an NTP server address via DHCP, or use an external NTP server (default address is pool.ntp.org) Set the HTTP port for your IP camera to be viewed and controlled from the internet.
To access the UPnP screen, navigate to [Settings] > [Network] > [UPnP]. The following screen will appear. Note: To enable UPnP on Windows, go to Add or Remove Programs in Control Panel, then click Add/Remove Windows Components, double-click “Network Services,” and check “UPnP User Interface.” 5.5.8 RTP If you want to broadcast video using RTP (Real-time Transport Protocol), use this page to set up the port range, video/audio address, and port number.
represents highest priority is 46. The default DSCP value is 0, which indicates normal priority (no QoS). The following is a table of recommended DSCP values. The drop precedence indicates the order in which IP packets will be dropped when the network is congested. Packets with a higher drop precedence will be dropped first. Each class in the table is assigned a certain amount of bandwidth.
The following table describes the labels found in this screen. Label SMTP Server SMTP Port From Address To Address Authentication Method User Name Password Subject Save Clear Cancel 5.6.1.2 Description Enter SMTP server information in this field (ie. smtp.gmail.com) Enter your SMTP server’s port information Enter your full e-mail address (ie. xxxx@xx.com) Enter the full e-mail address you wish to receive notifications. Login or Plain. For most e-mail servers, select Login. Enter your full username (ie.
The following table describes the labels found within this screen. Label FTP Address FTP Port User Name Password Upload Path Description Enter the address of your FTP server Enter the port of your FTP server Enter your user name here Enter your Password here Enter the file path of the folder where you want snapshots to be stored. Save settings Clear settings Cancel Save Clear Cancel 5.6.1.3 Image Server This page allows you to set the file name that will be used when snapshots are taken.
The HTTP Server page allows you to set your camera to input the URL of an HTTP server used by an NVR in order to signal your NVR that there’s an event being triggered. To access this page, navigate to [Setup] > [Event Setup] > [Event Server Setup] > [HTTP]. The following screen will appear. 5.6.1.6 SMS Server Your IP camera is capable of sending SMS notifications to one or more pre-defined recipients in case an event is triggered.
Clear Cancel Clear settings Cancel After you input your settings, click [Next]. The following page will appear. This page allows you to input the message that will be sent when an event is triggered. Enter your message, then click [Next]. The following screen will appear. This page will allow you to test your camera’s SMS functionality. To send yourself a test SMS, click the [Send me a SMS message via the SMS Gateway] button. Click [Finish] to complete setup. 5.6.
To create an event trigger, click the [Create] button. The following screen will appear. The following table describes the fields in this screen. Field Event Trigger Schedule Motion Detection Audio Detection I/O Ports Next Cancel Description Set the trigger for this event. Triggers can be based on schedule, I/O port activity, or audio detection. If you wish to schedule an event, input the time and day on which you want events to be triggered.
Select the actions to be taken, then click [Finish] to complete trigger setup. 5.6.3 Motion Detection Motion Detection allows you to define up to three regions that will trigger an event if motion is detected. Select a region, sensitivity level (S1: Lowest ~ S5: Highest) from the dropdown list, and then click and drag on the video display to define the region. Click [Save] for settings to take effect. 5.6.4 I/O Status The I/O Status page displays the status of devices plugged into I/O ports. 5.6.
5.7 Recording Setup The IPC-3605N supports storage of both snapshots and video clips to local storage. To configure this function, navigate to [Setup] > [Recording Setup]. The following screen will appear. This page allows you to view your SD Card’s status, capacity, and gives you the option of formatting the card, as well as enabling recording to an SD card in the event of network failure. Click [Next] to continue. The following screen will appear.
Note: This camera uses a First In, First Out storage method. When the SD card is full, the oldest files will be automatically rewritten. If you want to record video clips of detected motion to the SD card, you’ll need to set a motion detection region before setting up event-based recording. 5.8 Recording History The Recording History page allows users to manage video clips that have been recorded by the camera. You’ll see a playback menu as displayed below. .
5.10 Multi-Camera This page allows you to add, modify, or delete additional IP cameras on your camera list. To access this page, navigate to [Setup] > [Multi-Camera]. The following screen will appear. To add a camera, click [Add]. The following screen will appear. The following table describes the labels found within this screen.
Camera IP Address User Name Password RTSP Port HTTP Port Save Cancel The # by which this camera will be identified Enter the camera’s IP address here Enter the username used to access the new camera in this field Enter the password used to access the new camera in this field Enter the camera’s RTSP port (default 554) Enter the camera’s HTTP port (default 80) Save Cancel
6 Event Viewer The Event Viewer allows you to view detailed logs of events which have been triggered. To access this page, navigate to [Setup], then select [Event Viewer] from the top panel. Select any type of event from the sidebar (Motion, I/O, Scheduled Triggers, or Audio Detection) to view that type’s history, or click on image links to view event-triggered snapshots.
7 Maintenance The Maintenance screen provides information about your IP camera, access to the history log, and system maintenance functions. 7.1 Information To access the Maintenance Information screen, navigate to [Setup], then select [Maintenance] from the top panel. The following screen will appear. 7.2 Log This page provides a system log for your camera. To access this page, navigate to [Setup], select [Maintenance] from the top panel, and then select [Log] from the side panel.
7.3.1 Reboot Camera Press the [Reboot] button to reboot your camera. 7.3.2 Profile Management Profile Management allows users to easily set up multiple cameras. After one camera is properly configured, users can export that camera’s configuration to a profile on their PC, which can then be loaded onto other cameras. This feature also serves as a backup in case settings need to be restored.
7.3.3 Firmware Update Firmware updates are available at us.zyxel.com/support. After downloading the latest firmware for your camera, click the [Browse] button to locate the firmware file on your hard drive, then click the [Upgrade] button to update the camera’s firmware. Once the upgrade process begins, it must not be interrupted or you risk permanently damaging your camera. If some icons are out of place after reboot, press [Ctrl] + [F5] to force your browser to refresh its cache.
8 Troubleshooting During the course of installation, you might encounter various issues. The following section contains some troubleshooting procedures to help you solve these problems. 8.1 Reconfiguring Your Device Anytime you need to re-configure your IP camera, you can simply double-click on the eaZy Wizard icon to launch the eaZy Wizard configuration tool.
8.3 Resetting to Factory Defaults If you’ve forgotten your password, or your camera’s been acting generally strange, you can follow the steps below to reset the camera to its default settings. To reset the camera: 1) Press and hold the reset button (located on the camera’s rear panel) for approximately 10 seconds. When successful, you should see the status indicator light turn off. 2) After approximately 5 more seconds, the status indicator light should turn on again.
8.4 Trouble with Active X After launching your browser and entering your camera’s IP address, you’ll be asked for the username and password combination (Default is admin/admin, case sensitive.) No User Interface in the Browser This issue could have three possible causes. 1) ActiveX was not installed. Follow the instructions on-screen to install ActiveX, or you won’t have access to the user interface. Note: ZyXEL’s ActiveX components only support 32-bit Internet Explorer.
If you’ve gone through all above steps but still can’t obtain video/audio on your browser, close all browser windows and delete the ‘IPSurveillance Embedded” folder found in C:\Program Files. (If using 64-bit windows, look in C:\Program Files (x86)), then open your browser, log into your IP camera, and reinstall the ActiveX client. If your browser is returning a “213 file not found” error, try rebooting your computer.
8.5 Trouble with Remote Viewing on Browser You can view your camera’s video streams remotely over the Internet. If you’re having trouble viewing video remotely, refer to the section below for troubleshooting tips. The above figure depicts a typical setup in which: The IP camera has a static virtual IP address of 192.168.0.1 The WAN IP address at the IP camera site is 61.220.20.16 The client (user) is trying to receive the video/audio stream remotely.
3) Enable port forwarding on your router and allow traffic on the ports the IP camera is using. You may need to consult the manufacturer of your router for setting details. Note: Your router may require a reboot after port forwarding is set. The following figure details the settings required to remotely view the IP camera.
8.6 Symptoms, Causes, and Solutions Listed below are some common problems, and their solutions. Symptom Problems accessing from LAN network using web browser Possible Cause/Solution The entered IP address is incorrect. Make sure the IP address you entered matches the IP address of your camera. If you are certain that your camera is configured with the same subnet mask as that of your PC, you can first disconnect other cameras, then run the eaZy Wizard to scan for the camera on your network.
Symptom Scanning and connecting to wireless AP takes a long time Successful login to the camera, but no image is displayed Possible Cause/Solution Too many wireless APs nearby. The amount of time taken to scan wireless APs depends on the number of wireless APs around the camera. If there are too many wireless APs (30 or more), it may take as long as 3 minutes to complete the scanning process.
Symptom Network diagnosis shows error icon Problem using DDNS service Problem using eaZy Wizard Possible Cause/Solution Network connection error. The network connection test verifies that the camera has successfully connected to the LAN network. When the diagnosis result shows a red exclamation mark icon, it means that the camera fails to connect to the LAN network.
Symptom Part of the image becomes pixilated/Image artifacts appear Possible Cause/Solution Network bandwidth is insufficient. Without sufficient bandwidth, video quality will deteriorate and image errors like pixilation or frame-drop may occur. When you view your camera remotely from the Internet, your camera needs sufficient upload bandwidth to transmit video stream and you need sufficient download bandwidth to download video stream at the remote location.
Symptom A warning message appears stating “Your video quality is too high for your Internet bandwidth.” Cannot store recordings on a microSD card Possible cause/solution Network quality is not high enough. This means the camera’s browser interface, WebVUer, could not receive a steady stream of video data from your camera. The loss of video data might also be caused by network congestion or insufficient bandwidth. Please refer to other related troubleshooting tips.
9 Technical Specifications Category IPC-3605N Image Sensor Lens Focus Range Camera Minimum Illumination Shutter Time Video Compression Video Audio Network Firmware Resolution Frame Rate Video Streaming Image Settings Audio Communication Audio Compression Audio input/output Security Supported Protocols Firmware Focal Length: 4.0mm Max Aperture Ratio: F1.5 Fixed Iris 0.5m ~ INF IR Mode: 0 lux with built in IR LEDs on (12 LEDs in total; effective distance up to 10m) Color mode: 1.
Software Category NVR Station Web Browser Internet Explorer (ActiveX) Supported Devices Mobile Phone General MJPEG Mode 3GPP Mode Operating Conditions Power Supply System Requirements IPC-3605N Multiple channel management (32-channels) Fast and intuitive camera setup Search and playback recordings by event types Scheduled and event-based management Smart motion and audio detection Remotely view and configure camera on Internet Explorer Record video and capture snapshots on PC; download recordings fro
10 Open-Sourced Components 3rd Party Software Addgroup Adduser Ash AVN-IPv4LL Busybox Cat Chattr Chgrp Chmod Chown ComproRTSP Version V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 Cp Cttyhack Date Dd Delgroup Deluser Df Dmesg Echo Egrep Email Ethtool False Fgrep ftp Grep Gnuzip Gzip Hostname Htpasswd Ip Ipaddr Iplink Iproute Iptables Iptables-multi Iptables-restore Iptables-save iwconfig V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.
Iwlist Iwpriv Kill Ln Login Ls Lsattr Mini_httpd Mkdir Mkdosfs Mknod Mktemp More Mount Mountpoint Mv Netstat Nice Ping Ping6 Ps Pwd Rm Sed Sh Sleep Stat Stty Stunnel Su Sync Tar Touch True Umount Uname Upnpc-static Vi Watch Zcat Ld-2.11.so Ld-linux.so.3 Libc.so Libc.so.6 V29 V29 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.19 V1.13.4 V2.11 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.
Libc-2.11.so Libcrypt.so Libcrypt.so.1 Libcrypt-2.11.so Libcrypto.so Libcrypto.so.0.9.8 Libdl.so Libdl.so.2 Libdl-2.11.so Libgcc_s.so Libgcc_s.so.1 Libip4tc.a Libip4tc.la Libip6tc.a Libip6tc.la Libiptc.a Libiptc.la Libiw.so.29 Libixml.so Libixml.so.2 Libixml.so.2.0.2 Libm.so Libm.so.6 Libm-2.11.so Libnsl.so Libnsl.so.1 Libnsl-2.11.so Libnss_dns.so Libnss_dns.so.2 Libnss_dns-2.11.so Libnss_files.so Libnss_files.so.2 libnss_files-2.11.so Libpthread.so Libpthread.so.0 Libpthread-2.11.so Libresolv.so Libresolv.
Libsockipc.so.1.2 Libssl.so Libssl.so.0.9.8 Libstdc++.so Libstdc++.so.6.0.11 Libthread_db.so Libthread_db.so.1 Libthread_db-1.0.so Libthreadutil.so Libthreadutil.so.2 Libthreadutil.so.2.0.2 Libupnp.so Libupnp.so.2 Libupnp.so.2.0.2 Libutil.so Libutil.so.1 Libutil-2.11.so Libxtables.a Libxtables.la Adjtimex Arp Blkid Depmod devmem Fdisk Freeramdisk Fsck Fsck.minix Getty Halt Hwclock Ifconfig Ifdown Ifup Init Insmod Klogd Logread Losetup Lsmod makedevs Mdev Mkds.minix Mkswap Modprove V2.11 V0.98m V0.98m V4.4.
Pivot_root Poweroff Reboot Rmmod Route Runlevel Start-stop-daemon Sulogin Swapoff Swapon Switch_root Sysctl Syslogd Udhcpc Watchdog haserl V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V0.9.
gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.
Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
This product contains addgroup, adduser, ash, busybox, cat, chattr, chgrp, chmod, chown, cp, cttyhack, date, dd, delgroup, deluser, df, dmesg, echo, egrep, false, fgrep, grep, gnuzip, gzip, hostname, ip, ipaddr, iplink, iproute, kill, ln, login, ls, lsattr, mkdir, mknod, mktemp, more, mount, mountpoint, mv, netstat, nice, ping, ping6, ps, pwd, rm, sed, sh, sleep, stat, sty, su, sync, tar, touch, true, umount, uname, usleep, vi, watch, zcat, adjtimex, arp, blkid, depmod, devmem, fdisk, freeramdisk, fsck, fsc
Also, for each distributor's protection, we want to make certain that everyone understands that there is no warranty for this free library. If the library is modified by someone else and passed on, we want its recipients to know that what they have is not the original version, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents.
The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3.
Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself. 6.
8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 9.
Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. 14.
License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public License for more details.
This product contains ld-2.11.so, ld-linux.so.3, libc.so, libc.so.6, libc-2.11.so, libcrypt.so, libcrypt.so.1, libcrypt-2.11.so, libdl.so, libdl.so.2, libdl-2.11.so, libgcc_s.so, libgcc_s.so.1, libm.so, libm.so.6, libm2.11.so, libnsl.so, libnsl.so.1, libnsl-2.11.so, libnss_dns.so, libnss_dns.so.2, libnss_dns-2.11.so, libnss_files.so, libnss_files.so.2, libnss_files-2.11.so, libpthread.so, libpthread.so.0, libpthread-2.11.so, libresolv.so, libresolv.so.2, libresolv-2.11.so, librt.so, librt.so.1, librt-2.11.
domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users. Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary.
The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form.
4. Conveying Verbatim Copies. You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program.
c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b. d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge.
7. Additional Terms. “Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law.
license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.
Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement).
part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such. 14. Revised Versions of this License. The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program.