USER GUIDE BUSINESS SERIES 2.
Table of Contents Table of Contents Chapter 1: Getting Started . . . . . . . . . . . . . . . . . . . . . . . 1 How to Use this Guide Document Style Conventions Finding Information in Your PDF Documents Finding Text in a PDF Finding Text in Multiple PDFs 1 1 2 2 2 Chapter 2: Planning Your Wireless Network . . . . . . . . . . . . . .
Table of Contents MJPEG Settings Mobile Settings Adjustments Video Options Audio Options Maintenance Restore Factory Defaults Restart Firmware Upgrade Configuration Users Authentication — Check the box to enable authentication check.
Table of Contents FCC Caution 55 FCC Radiation Exposure Statement 55 Safety Notices 55 Industry Canada (Canada) 56 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) 56 Appendix E: Contact Information . . . . . . . . . . . . . . . . . . . 64 US/Canada Contacts EU Contacts 64 64 Appendix F: Warranty Information . . . . . . . . . . . . . . . . . .
Getting Started 1 How to Use this Guide Getting Started The focus of this guide is on the WVC210 PTZ Internet Camera, with references to the WVC200 camera where appropriate. Advanced features and procedures are covered in the Linksys Video Surveillance Application User Guide. How to Use this Guide This User Guide has been designed to make understanding networking with the camera easier than ever.
Getting Started Finding Information in Your PDF Documents In this example, you would type the characters 800@, followed by the IP address of your device, followed by a colon and the number 5090. Finding Information in Your PDF Documents The PDF Find/Search tool lets you find information quickly and easily online.
Getting Started Finding Information in Your PDF Documents 6. Click Search. For more information about the Find and Search functions, see the Adobe Acrobat online help.
2 Planning Your Wireless Network Ad-Hoc and Infrastructure Modes Planning Your Wireless Network A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except that each computer in the WLAN uses a wireless device to connect to the network. Computers and other devices, such as peripherals, in a WLAN share the same frequency channel and SSID, which is an identification name for wireless devices.
Planning Your Wireless Network Wireless Security Wireless Security Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.
Planning Your Wireless Network Security Threats Facing Wireless Networks Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network.
Getting to Know the PTZ Internet Camera 3 Camera LCD Screen and Built-in Microphone Getting to Know the PTZ Internet Camera Congratulations on purchasing your camera from Linksys! Linksys has the only two cameras that are Wi-Fi certified in the United States, one of which is the WVC210. Camera LCD Screen and Built-in Microphone The camera has a LCD screen that indicates the camera’s current IP address and whether it is a fixed or dynamic address.
Getting to Know the PTZ Internet Camera Camera Ports and Button WVC210 Bottom WVC200 Back NOTE: Resetting the camera will erase all of your settings, such as encryption information, and replace them with the factory defaults. Do not reset the camera if you want to retain these settings. Camera Ports and Button The camera features three ports and a Reset button on the bottom panel. Port/Button Description POWER This port is where you will connect the 5V power adapter.
Getting to Know the PTZ Internet Camera Camera Ports and Button Port/Button Description SPKR OUT This port is where you will connect the 3.5 mm input jack of your external speaker (optional). The speaker needs to be PC, or a powered speaker.
Connecting the PTZ Internet Camera 4 Overview Connecting the PTZ Internet Camera Overview Before you set up the camera, connect it to a wired or wireless network. Refer to the following sources for additional information: • WVC200/210 Quick Install Guide • Linksys Video Surveillance Application User Guide If you need to move the camera from a wired network to a wireless network, or vice versa, go to this section, “Moving the Camera to a Different Network.
Connecting the PTZ Internet Camera Connection to a Wired Network for Setup 3. Connect the other end of the cable to the Ethernet port on the camera. 4. Connect the power adapter to the Power port on the camera. 5. Plug the power adapter into an electrical outlet. 6. The camera’s Ready LED flashes while the camera is initializing. The camera is ready for use when the Ready and Ethernet LEDs are solidly lit.
Connecting the PTZ Internet Camera Connection to a Wireless Ad-Hoc Network for Setup Connection to a Wireless Ad-Hoc Network for Setup 1. Make sure your computer has the following wireless settings: • SSID - linksys • Network Mode - Ad-Hoc • Channel - 6 • WEP - Disabled 2. Attach the antenna. 3. Connect the power adapter to the Power port on the camera. 4. Plug the power adapter into an electrical outlet. The camera’s Ready LED flashes while the camera is initializing.
Connecting the PTZ Internet Camera Placement Options Placement Options There are two ways to place the camera. The first way is to place the camera horizontally on a surface using the included stand. The second way is to mount the camera on a wall using an optional wall mount stand. The wall mount is not supplied in the camera kit. Stand Option 1. The camera includes a camera Desktop Stand. Insert the bottom end of the camera into the Stand. 2. Place the camera, and adjust its aim accordingly.
Connecting the PTZ Internet Camera Audio Option 1. Determine where you want to mount the camera. Attach the wall mount stand to the wall. 2. Attach the camera to the wall mount. 3. Adjust the camera’s aim accordingly. Audio Option If you want to use your own microphone instead of the camera’s built-in microphone, then follow these instructions: 1. Connect the 3.5 mm input jack of your microphone to the camera’s MIC IN port on its bottom panel. The built-in microphone will automatically be disabled. 2.
Upgrading Firmware 5 Upgrading Firmware The camera ships with the firmware release of 1.0.0. The camera's firmware is upgraded through the Web-based Utility's Maintenance tab. Follow these instructions: 1. Download the firmware from Linksys’s website at www.linksys.com. 2. Extract the file. 3. Access the camera’s Web-based Utility, and click the Maintenance tab. 4. On the Maintenance screen, click the Firmware Upgrade button. 5.
6 Installing Software Installing Software Your Linksys Internet Camera comes with configuration software that you install on your computer. Follow these steps to install the software. 1. Insert the Setup CD into your CD-ROM drive. If the CD doesn’t run automatically, go to My Computer and click on your CD-ROM drive. 2. The Welcome screen will appear. Click the Click Here to Start button. 3. The license agreement screen will appear, click Next if you agree and wish to proceed.
Installing Software 4. The Wizard will now search for your camera. 5. Once found, highlight the camera and click Next. If the camera you want is not displayed in the Selection box, click Search Again. 6. The default user name and password is admin. Type admin in lowercase letters, in the Administrator Name and Administrator Password fields, then click OK. For security purposes, it is recommended that you change the default name and password using the camera’s web-based utility at a later time.
Installing Software 7. On the Basic Settings screen, change the following settings: • Camera Name Enter a unique name for the camera, up to 15 characters in length. Unique names are helpful when you are using multiple cameras on the same network. • Description Enter a description, up to 32 characters in length, with additional information, such as the location of the camera. • Time Zone Select the time zone that corresponds with the camera’s location.
Installing Software 1. If you want to assign the IP address, then select Static IP address, otherwise leave the default setting, Automatic Configuration DHCP. Click Next to continue. 2. The New Internet Camera Settings screen will appear and display the camera’s settings. Click Next to continue or click Back to make changes. 3. A confirmation window will appear, click OK to confirm the settings.
Installing Software 4. A Configuration successfully saved window will appear, click OK to continue. 5. The Wizard will now finish with a Congratulations screen. Click Exit to automatically launch your default web browser and proceed to the Home page login screen. 6. The login prompt will appear, enter admin in both the User name and Password fields.
Installing Software 7. The Linksys Wireless-G PTZ Internet Camera home page launches. 8. The basic installation procedure is now complete. For further information on software for the Linksys Cameras, consult the Linksys Video Surveillance Application User Guide. You may now proceed with Chapter 7, "Configuring Software.
Configuring Software 7 Home Configuring Software This section describes the basic functions of the camera software. For more advanced information, please see the Linksys Video Surveillance Application User Guide. NOTE: By default the camera is set to receive an IP address from a DHCP server. If you do not have a DHCP server on your network, you can set a static IP address by pressing the Reset button on the camera for less than 10 seconds. A default IP address of 192.168.1.
Configuring Software View Video View Video The View Video tab is the main screen for controlling the real-time view of your camera. From this screen you can control the basic functions of the camera. Setup The Setup Tab on the top of the screen has a number of categories along the left side of the window, and is where most of the cameras functionality in configured. The Setup Window is a scrolling window, the following graphic shows the top half of the window.
Configuring Software Setup The following graphic shows the bottom half of the window. The following section describes all of the vertical tabs that are available under the Setup tab.
Configuring Software Basic Basic Clicking on the Basic Tab shows the Basic Settings, Device Settings, Network Settings, RTSP/RTP, Wireless Settings, and Other settings for the camera. Device Settings • Device ID — This displays the ID for the camera. This is used by the setup wizard, viewer and the recorder utility to identify the camera. • Camera Name — Enter the preferred name for the camera. The camera name must not exceed 15 alphanumeric characters.
Configuring Software Basic • New Time — Allows you to manually enter a new clock setting for the camera. • Set New Time — Use this button to implement the new date and/or time setting. • Time Zone — Choose the time zone for your location from the drop-down list. • Adjust for Daylight Saving Time — Select this option if your location is currently using Daylight Saving Time. NOTE: You must uncheck the Adjust for Daylight Saving Time check box manually when Daylight Saving Time ends in your time zone.
Configuring Software Basic RTP/RTSP RTSP (Real Time Streaming Protocol) is a standard for connected client(s) to control streaming data (MPEG-4) over the World Wide Web. RTP (Real-Time Transport Protocol) is an Internet protocol used for transmitting single real-time multimedia data such as audio and video to a select group of connected clients. RTSP uses RTP to format packets of multimedia content. • RTSP Port — Enter the RTSP Port number (between 1024 to 65535) in the field provided.
Configuring Software Basic • TX Key — Select the number of the key used on the wireless network. • WEP Encryption — Select the appropriate option for key length based on your network settings. • Passphrase — Type in the passphrase used to generate WEP keys on your network and click the Generate button. • Key 1-4 — Key values can be entered in manually or generated from a passphrase. • Authentication — Select the appropriate authentication type used on the wireless network.
Configuring Software Basic • Encryption — Select between TKIP and AES. • Shared Key — Enter the shared key used for accessing the wireless network. WPA2 Personal Encryption is limited to AES, and there is a field to enter a shared key. Other • Enable UPnP (Discover Only)— If enabled, the camera will broadcast its availability through Universal Plug and Play protocol. UPnP compatible systems such as Windows XP will then be able to detect the presence of the camera.
Configuring Software Audio/Video 4. Click on Save Settings. At this point, to connect to the camera you can type in the IP address of the router, with the port number, for example: http://192.168.203.12:1024 Audio/Video Clicking on the Audio/Video Tab shows the MPEG-4 Settings, MJPEG Settings, Mobile Settings, Adjustments, Video Options, and Audio Options for the camera. NOTE: Higher video quality settings and higher frame rate settings require more bandwidth.
Configuring Software Audio/Video MPEG-4 Settings MPEG is the designation for a group of audio and video coding standards and related technology agreed upon by the ISO/IEC. The primary uses for the MPEG-4 standard are web (streaming media) and CD distribution, and broadcast television. • Resolution — Select the desired video resolution setting. The default resolution is set to 320x240. • Video Quality Control — Choose one of the following: • – Fixed Bit Rate — Select the desired fix bit rate.
Configuring Software Audio/Video Adjustments • Power Line Frequency — Select the power line frequency (50Hz or 60Hz) used in your region, to improve the picture quality under fluorescent lighting. • Color Balance — Select the suitable white balance option as you desired. • Exposure — If necessary, you can adjust the exposure to obtain a better image. You can select a sharpness value between -3 and 3. • Sharpness — Select the desired option for the sharpness.
Configuring Software Maintenance Audio Type — When the microphone is enabled, this drop down menu allows you to select the audio compression type.Description Compression Settings Description G.726 (WVC200 only) Default audio compression algorithm, uses 32 Kbps of bandwidth with quality similar to G.711 but using only half of the bandwidth G.711 A-Law (WVC210 only) A standard compression algorithm that uses 64 Kbps of bandwidth and is primarily used in Europe G.
Configuring Software Users Firmware Upgrade Upgrade Firmware — This option is used to update the camera’s firmware. This is detailed in Chapter 5. Configuration • Save — Use this option to save a configuration file containing all of the current camera management settings. • Browse — Use this option to locate a previously saved configuration file. • Upload — Use this button to upload a previously saved configuration file into the camera.
Configuring Software DDNS • User Name — Enter the desired user name. • Password — Enter the desired password in this field. • Confirm Password — Retype the password in this field. • Pan/Tilt — Click to allow user control PAN and TILT function. • Setup — Click to authorize user control as an administrator. Click the Add button to add or modify a new User ID. Delete a User ID by selecting the User ID fields and backspacing through the information. DDNS The DDNS tab contains only DDNS Settings.
Configuring Software Mail & FTP • Check WAN IP Address — This option allows you to set how often the device should check to see if the Internet IP address has changed. If the IP address has changed, the DDNS Server will be notified. NOTE: To complete the DDNS Service setup, port forwarding needs to be configured on your router. Mail & FTP Clicking on the Mail & FTP Tab shows options for E-mail Alert and FTP Alert.
Configuring Software Mail & FTP Secondary SMTP • Secondary SMTP — Check the box to upload to the Secondary SMTP if the camera can not connect to the primary SMTP. • SMTP Mail Server — Enter the address of the SMTP (Simple Mail Transport Protocol) Server to be used to send e-mail. • Port — Enter the port number for the mail server, the default is 25.
Configuring Software Motion Detection • FTP Server — Enter the address of the secondary FTP Server. • Login Name — Enter the login name associated with the secondary FTP server. • Password — Enter the password associated with the login name for the secondary FTP server. • Enable Passive Mode — Check the box to enable the Passive mode feature. • File Path Name — Enter the desired file path name on the secondary FTP server.
Configuring Software Pan/Tilt • Frame Rate— Defaults to 1 fps • Pre-Capture Length — Defaults to 1 second • Post Capture Length — Defaults to 1 second Pan/Tilt • This option is only available if your camera is fitted with a Pan/Tilt control. If available, select the desired option to resolve conflict between the Pan/Tilt and Motion Detection features. • Check the box to set the idle time for motion detection position, this defaults to 1 minute.
Configuring Software Pan/Tilt • Set Home Button— Set the desired position and then click this button to set Home position. • Current Position — Name the current desired position and then click the Add button to add into the preset list. • Preset Position— Select the preset position you don't need and then click the Delete button to remove. Pan/Tilt Control Pan/Tilt Control and Rotation Sequence are found at the lower part of the scrolling window.
Configuring Software Status Status Clicking on the Status Tab shows options for System, Image, Network, Wireless, Syslog, and Log. This is a scrolling window, the top half appears as follows: System • Firmware Version — The version of the firmware currently installed is displayed. • MAC Address — This displays the MAC address of the camera. • Camera Name — This displays the name of the camera, as defined on the Basic > Device Settings screen.
Configuring Software Status – Resolution — This displays the image size of the video stream. – Image Quality — This displays the image quality of the video stream. – Frame Rate — This displays the frame rate of the video stream. Network The lower part of the scrolling window continues: • Network Type — This displays the type of network the camera is connected to. • IP Address — This displays the IP address assigned to the camera.
Configuring Software Linksys Web • Channel — This displays the wireless channel used by the camera. • Security — This indicates if wireless security is being used by the camera. • Signal Strength — This shows the wireless signal strength. Syslog • Syslog Server — Check this to enable the Syslog server, and then enter the IP address of your Syslog server. Log • System Log — This displays system activities. Click the Clear Log button to erase all the entries in the System Log.
Questions and Answers Troubleshooting Questions and Answers This appendix provides solutions to problems that may occur during the installation and operation of the Wireless-G Internet Camera. Read the description below to solve your problems. If you can't find an answer here, check the Linksys website at www.linksys.com. I can't connect to the Wireless Network Camera with my Web Browser to configure it.
Windows Help • SSID must match. • Wireless security settings must match. • In Ad-hoc mode, the Channel should match, although this is often not required. Video quality may suddenly deteriorate. This can happen when an additional viewer connects to the Wireless Network Camera, overloading the camera or the available bandwidth. The image size and quality can be adjusted to cater for the required number of viewers and the available bandwidth. The motion detection feature doesn't send me any e-mails.
Windows Help Shared Resources If you wish to share printers, folders, or files over your network, Windows Help provides complete instructions on using shared resources. Network Neighborhood/My Network Places Other PCs on your network will appear under Network Neighborhood or My Network Places (depending upon the version of Windows you’re running). Windows Help provides complete instructions on adding PCs to your network.
Glossary This glossary contains some basic networking terms you may come across when using this product. For more advanced terms, see the complete Linksys glossary at http:// www.linksys.com/glossary. Access Point - A device that allows wireless-equipped computers and other devices to communicate with a wired network. Also used to expand the range of a wireless network. Ad-hoc - A group of wireless devices communicating directly with each other (peer-to-peer) without the use of an access point.
DSL (Digital Subscriber Line) - An always-on broadband connection over traditional phone lines. Dynamic IP Address - A temporary IP address assigned by a DHCP server. EAP (Extensible Authentication Protocol) - A general authentication protocol used to control network access. Many specific authentication methods work within this framework. Encryption - Encoding data transmitted in a network.
NAT (Network Address Translation) - NAT technology translates IP addresses of a local area network to a different IP address for the Internet. Network - A series of computers or devices connected for the purpose of data sharing, storage, and/or transmission between users. Packet - A unit of data sent over a network. Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products.
Static Routing - Forwarding data in a network via a fixed path. Subnet Mask - An address code that determines the size of the network. Switch - 1. A data switch that connects computing devices to host computers, allowing a large number of devices to share a limited number of ports. 2. A device for making, breaking, or changing the connections in an electrical circuit. TCP (Transmission Control Protocol) - A network protocol for transmitting data that requires acknowledgement from the recipient of data sent.
WVC200 Specifications WVC200 Standards IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u, IEEE 802.11e (Wireless QoS) Ports Ethernet, Antenna, Microphone, Power Protocols TCP/IP, HTTP, DHCP, SMTP, FTP, NTP, DNS, UPnP and DDNS Button One Reset Button Cabling UTP CAT 5 LEDs Power, Activity, Ethernet, Wireless Sensor 1/5" CMOS Focal Length 500mm~Infinity Frame Rate Up to 30 fps Resolution 640x480, 320x240, 160x120 Illumination 2LUX@F2.
WVC200 Compression G.726 Sampling Rate 8 KHz Dual Bit Rate 16Kbps Brightness Auto/Manual Adjustment Monitor and Recording Software Included software for multiple camera monitoring and recording to your hard drive with advanced search by time and date.
WVC210 WVC210 Standards IEEE802.11g, IEEE802.11b, IEEE802.3, IEEE802.3u, IEEE802.1p (QoS Priority), IEEE802.1q (VLAN), 802.11e (Wireless QoS) Ports Ethernet, Antenna, Microphone in, Speaker Out, Power Protocols TCP/IP, HTTP, DHCP, SMTP, FTP, NTP, DNS, UPnP, RTP, RTSP, and DDNS Button One Reset Button Cabling UTP CAT 5 LEDs Power, Activity, Ethernet, Wireless Sensor 1/4" CMOS Focal Length 500mm~Infinity Frame Rate Up to 30 fps Resolution 640x480, 320x240, 160x120 Illumination 1LUX@F2.
WVC210 Sampling Rate 8 KHz Dual Bit Rate 16Kbps Image Settings Brightness and Contrast Monitor and Recording Software Monitoring and recording for up to 16 cameras WEP/WPA WEP 64bit/128bit, WPA-TKIP, WPA-PSK, WPA2-PSK User List Three-level user rights list to view video and to control camera Username/ Password Logon authentication 20 characters username and 8 characters password Physical security option Kensington lock NTP Network Time Protocol synchronizes camera date and time with your n
FCC Statement Regulatory Information FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Safety Notices Industry Canada (Canada) Operation is subject to the following two conditions: 1. This device may not cause interference and 2. This device must accept any interference, including interference that may cause undesired operation of the device. This device has been designed to operate with an antenna having a maximum gain of 3.3 dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms.
Safety Notices WVC200-210 User Guide 57
Safety Notices WVC200-210 User Guide 58
Safety Notices WVC200-210 User Guide 59
Safety Notices WVC200-210 User Guide 60
Safety Notices WVC200-210 User Guide 61
Safety Notices WVC200-210 User Guide 62
Safety Notices For more information, visit www.linksys.com.
US/Canada Contacts Contact Information Need to contact Linksys? For additional information or troubleshooting help, refer to the User Guide on the CD-ROM. Additional support is also available by phone or online. US/Canada Contacts • 24-Hour Technical Support: 866-606-1866 • RMA (Return Merchandise Authorization): http://www.linksys.com/warranty • Website: http://www.linksys.com • FTP Site: ftp://ftp.linksys.com • Support: http://www.linksys.
LIMITED WARRANTY Warranty Information LIMITED WARRANTY Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified for this product at www.linksys.com/ warranty. The internet URL address and the web pages referred to herein may be updated by Linksys from time to time; the version in effect at the date of purchase shall apply.
Obtaining Warranty Service TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Software in Linksys Products: Software License Agreement Software in Linksys Products: This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pt. Ltd. or Cisco-Linksys K.K. ("Linksys") contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community.
Software Licenses: License. Subject to the terms and conditions of this Agreement, Linksys grants the original end user purchaser of the Linksys product containing the Software ("You") a nonexclusive license to use the Software solely as embedded in or (where authorized in the applicable documentation) for communication with such product.
Software Licenses: Software on a CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request. Term and Termination. You may terminate this License at any time by destroying all copies of the Software and documentation. Your rights under this License will terminate immediately without notice from Linksys if You fail to comply with any provision of this Agreement. Limited Warranty.
Software Licenses: 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
Software Licenses: Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1.
Software Licenses: 3.
Software Licenses: 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Software Licenses: STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12.
Software Licenses: 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)" 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org. 5.
Software Licenses: If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.