IPC-4605N The First Consumer-Friendly Network Camera Edition 1.1, 2/2012 www.zyxel.
1 2 3 4 5 6 7 8 9 10 11 Contents Getting to know your IPC-4605N ............................................................................... 6 2.1 Package Contents.............................................................................................. 6 2.2 Features............................................................................................................. 7 2.3 Camera Layout .................................................................................................
Important Notices Regulatory Notice This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation. FCC Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
About This Manual This manual is indented only for users of the ZyXEL IPC-4605N network camera. Conventions in this Manual While using this manual, pay attention to symbols and notations used to draw attention to special situations, such as: Caution! Information provided with this symbol is critical to prevent damage to the product or injury to the user. Important! This symbol indicates instructions that a user must follow in order to complete a task.
2 Getting to know your IPC-4605N 2.1 Package Contents Before setup, ensure your package contains all contents. If anything is missing, contact your distributor.
2.2 Features ZyXEL’s IPC-4605N sports an advanced 340-degree pan and 100-degree tilt mechanical design, ideal for deployment in warehouses, offices, restaurant, lobby area, or anywhere it’s important to have a wide field of view. Pan/Tilt with 10x digital zoom Day/Night functionality Dual H.
2.
2.4 LED Status Indicator The LED status indicator consists of a blue status indicator and red IR LEDs. The LEDs appear as follows: Red IR LEDs (Left), Blue Status LED (Right) When the IP camera is turned on, the LEDs will light in the following patterns: Red LEDs On Off On Off Blinking (Every 0.5 seconds) Off Off Blinking Blue LED On On Off Off Off Blinking (Every 0.5 seconds) Blinking (Every 0.
3 Installation 3.1 Connecting Your IPC-4605N The picture below illustrates the basic connection of your IPC-4605N camera: The following table describes the numbered items: Number Contents Ethernet cable from PC to hub/router. Ethernet cable from router to camera. Use the bundled Ethernet cable to connect the LAN port of the IP camera to the LAN port of your hub/router. Wireless adapter (optional). If you’re using the USB Wi-Fi adapter, plug it into the USB port on your camera for wireless reception.
3.2 Wireless While using the ZyXEL Wireless adapter, you’ll be able to connect your camera to your network via WiFi. Keep in mind that you can only have one active connection at any given time – either through LAN or a wireless network. Note: If the wireless connection drops or seems slow, try moving your IP camera closer to the wireless access point for an improved signal.
3.3 Wall and Ceiling Mounting Screw the mounting plate into the mounting surface Loosen the top screw on the trapezoid-shaped fastening bracket. Return fastening bracket to its original position. Secure the IP camera to the mounting plate Insert the tips of the fastening bracket into the IP camera as shown. Use a screwdriver to tighten the fastening bracket firmly back in place.
4 Initial Setup Before running the setup utility, make sure you have the IP Camera properly connected. To begin setup, insert the installation CD supplied with the camera into the CD-ROM drive of the viewing PC, and the eaZy Wizard utility will start and guide you during the installation process of the hardware and software for your IP camera.
5 Accessing your camera Your camera’s video feeds can be accessed in a number of ways, as follows. 1) Your camera is CloudEnabled™ and can be viewed from any PC running a modern web browser with the Flash plug-in installed. When you first setup your camera using the included CD, it will register your camera with iSecurity+. Simply point your web browser to http://zyxel.isecurityplus.com and login with the username and password you created during setup.
5.1 CloudEnabled™ Viewing 5.1.1 Accessing via iSecurity+ Smartphone App iSecurity+ is an iOS/Android App designed to allow you to quickly and easily access, control, and view your camera’s video feeds from anywhere. The iSecurity+ can be located on the App Store and Android Market from your device by searching “iSecurity+,” or directly from your computer at the Android Market (http://market.android.com) for Android devices, or the App Store through iTunes (http://www.apple.com/itunes). 5.1.
This page allows you to easily adjust your camera’s time zone, display and audio settings, and infrared lighting. Sharing options can be accessed from the Sharing tab at the top of the screen.
5.2 Direct Viewing of your Camera (For Advanced Users) 5.2.1 Accessing via PC web browser Users can access their video feeds and camera management tools easily through any web browser. Simply follow these steps. 1) Open any web browser (Internet Explorer, Safari, Firefox, Chrome, etc.) 2) Type in your camera’s IP address (eg. 192.168.1.11. This number can be easily found by using the eaZy set up Wizard utility) 3) A dialogue box will appear requesting a user name and password.
7) You’re now ready to view and manage your camera from your web browser. Note: If your IP camera falls behind a firewall, you will need to enable ports 80 and 554 in your firewall and link them to the internal IP address of the camera. Should you have more than one, increase the values above by 1 (For example, the second camera would have ports 81 and 555.) 5.2.1.1 Page Layout On the first page, you can see the basic control panel on the top and left, and live video on the right hand side.
The following table describes the labels found on this screen. Number Label Left control panel Video stream PTZ speed Video mode selection Top control panel Preset Point Magnifier Live video pane Description provides control over video recording, voice communication, I/O, Pan/Tilt, and snapshot Allows you to change between stream-1 and stream-2.
X-Axis clicking on the video pane and selecting “Fullscreen” Select a channel from the drop-down list, or click on the arrow icon to switch to the next/previous channel. Adjust the camera’s position on the X-Axis Y-Axis Adjust the camera’s position on the Y-Axis Channel 5.2.1.2 Icons The following table describes the icons found on this screen.
Open Digital Zoom Open a file browser to search and playback video files captured by the camera Digital zoom button. Available zoom: 1~10x Switch Channel Click the Left/Right arrow to switch channel Crosshair/Arrow The crosshair allows you to move your cursor over a point on the live view and make that point the new center of view. The arrow moves the camera in the direction of the mouse click. 5.2.1.
With the device configured, clicking the will allow you to speak through your microphone and be heard from the camera for 90 seconds. Note: When using the voice communication feature, you may experience various degrees of delay between transmission from the computer and playback on the camera, depending on the condition of your network environment. 5.2.
2) For stream-2, set the codec to “Motion JPEG.” 3) Launch the web browser on your iPhone, Android phone, or other mobile internet device, and enter [IP address]/mjpeg.html into the address field of your phone’s web browser to watch live video on your mobile device. (Note: The IP required IP address is located at the bottom of the page, just above the [Save] and [Reset] buttons.
5.2.3 Accessing via 3GPP Mobile Phone You can access your IP camera via 3GPP-compatible mobile phones provided your camera has a stable internet connection, and your mobile devices has a stable connection to the 3G network. There are also several steps which must be taken to ensure 3GPP functionality. 1) The second video stream (located at [Setup] > [Video Settings]) must be enabled, with resolution set to QQVGA, FPS set to 5, codec set to MPEG-4, and quality set to medium.
6 Configuration 6.1 Video Settings The Video Settings screen consists of all the basic settings options. To access the main setup page, click on the setup button at the top right in the live view screen. You can configure detailed settings of your IP camera here. The following table describes the labels found on this screen. Label Turbo Picture Motion Adaptive Enable 2nd Stream Stream-1/Stream-2 Resolution Codec Description This mode provides best video quality, but frame rate is limited to 15.
Framerate Quality Active Bandwidth Management Video Preference Viewing on PC Viewing on Phone Browser Save Reset Framerate. 5~30 FPS. Higher framerate is more bandwidth-intensive. Video quality settings. 64kpbs~3Mbps. Allows the IPC-4605N to intelligently change video bitrate depending on network congestion. This avoids video deterioration and frame dropping. Allows you to choose between a preference toward higher quality image or a higher framerate. Click on the bar to set.
The following table describes the labels found on this screen.
6.3 Audio Settings The Audio Settings screen allows you to enable or disable audio, as well as adjust volume. Stream-2 audio is only available for adjustment when it is selected and 3GPP mode has been checked in video settings. To access the Audio Settings screen, go to settings, then select Audio from the sidebar. The following screen will appear. The following table describes the labels found within this screen.
To access the user settings pane, navigate to Settings, then select Users from the sidebar. The following screen will appear. The following table describes the labels found within this screen. Label Modify/Remove Add Allow anonymous viewer login Description Click here to Modify or Remove an existing viewer Click here to add a new viewer or administrator Click here to allow anonymous viewers without requiring name and password. These viewers are restricted to viewing live video only.
6.5 Network Settings The Network Settings page allows you to check your network settings and make detailed adjustments. To access the Network Settings pane, navigate to settings and select Network from the sidebar. The following screen will appear. 6.5.1 Ethernet Settings The Ethernet Settings page will allow you to choose your IP address configuration. To access the Ethernet Settings page, navigate to Settings, then select Network, and Ethernet from the sidebar. The following page will appear.
On this page, you can set the camera to obtain an IP address via DHCP (recommended), use a manual IP address, or obtain an IP address via PPPoE, for which a valid user name and password are required. 6.5.2 Wireless Settings If you have installed the ZyXEL wireless adapter, you’ll be able to set up a wireless connection from this page. To connect wirelessly, check the [Use Wireless First] box to give priority to wireless connections when the LAN network is also connected.
6.5.3 Network Diagnostic Here you can run the diagnostic tool for your current network settings, and it will show error messages if any anomaly is detected. For further information on error messages, please refer to the troubleshooting section. 6.5.4 Network Bandwidth This automatic network connection test helps users better define the appropriate video bitrate for their network. To perform the network bandwidth test: 1.
This message indicates that the currently connected network has the capacity to support up to 10 network cameras of identical bit rate settings (either on Stream 1 or Stream 2). If the message shows a less favorable result, go to [Setup] > [Video] to select a lower bitrate. 6.5.5 Advanced This page allows you to adjust advanced network settings. To access this pane, navigate to [Setup] > [Network] > [Advanced]. The following screen will appear.
The following table describes the labels on this screen. Label DNS Server NTP Configuration HTTP Server RTSP Server 6.5.6 Description Set the DNS server to be found via DHCP, or enter a manual DNS address NTP stands for Network Time Protocol. To synchronize your camera’s clock with an NTP server, choose to either obtain an NTP server address via DHCP, or use an external NTP server (default address is pool.ntp.org) Set the HTTP port for your IP camera to be viewed and controlled from the internet.
To access the UPnP screen, navigate to [Settings] > [Network] > [UPnP]. The following screen will appear. Note: To enable UPnP on Windows, go to Add or Remove Programs in Control Panel, then click Add/Remove Windows Components, double-click “Network Services,” and check “UPnP User Interface.” 6.5.8 RTP If you want to broadcast video using RTP (Real-time Transport Protocol), use this page to set up the port range, video/audio address, and port number.
represents highest priority is 46. The default DSCP value is 0, which indicates normal priority (no QoS). The following is a table of recommended DSCP values. The drop precedence indicates the order in which IP packets will be dropped when the network is congested. Packets with a higher drop precedence will be dropped first. Each class in the table is assigned a certain amount of bandwidth.
To add preset points, follow these steps: 1) Use the directional buttons to navigate your IP camera to the desired position 2) Enter a position name into the “Position Name” field. 3) Press the “Add” button. a. If you would like to designate this as your camera’s ‘Home’ position, check the ‘Use the current position as “home”’ box. b.
6.6.1.3 PTZ Position Reset The PTZ Position reset menu allows you to reset the PTZ functionality back to factory defaults. There are two reset buttons: Button Calibrate PTZ Back to Factory Default Reset PTZ Home Position Back to Factory Default 6.6.2 Function Calibrates Pan/Tilt position back to factory defaults Resets the camera’s Home position back to factory default. Patrol Mode The Patrol Mode menu allows you to define your camera’s behavior while in patrol mode.
6.7 Event Setup From this page, your camera can be programmed to respond to events – such as detected motion, or a triggered I/O device – and send a snapshot directly to your e-mail account, ftp server, image server, notification server, HTTP server, or SMS server in order to warn you about what’s happened. 6.7.1 Event Servers This page provides 6 different server-types capable of receiving notification of events: Email, FTP, Image, Image, Notify, HTTP, and SMS.
To Address Authentication Method User Name Password Subject Save Clear Cancel 6.7.1.2 Enter the full e-mail address you wish to receive notifications. Login or Plain. For most e-mail servers, select Login. Enter your full username (ie. xxxx@xxx.com) Enter your e-mail account’s password Enter the subject line you want alert emails to have. Save settings Clear settings Cancel FTP Server This page allows you to set up your camera to automatically upload triggered snapshots to an FTP server.
6.7.1.3 Image Server This page allows you to set the file name that will be used when snapshots are taken. To access this page, navigate to [Setup] > [Event Setup] > [Event Server Setup] > [Image]. The following screen will appear. 6.7.1.4 Notify Server This page allows you to input a message that notifies a server that an event was triggered. This feature is meant to be integrated with video management software. 6.7.1.
The following table describes the labels found within this screen. Field Service Provider Description Your SMS gateway service provider. (Default: Clickatell) User Name Your user name API ID API ID provided by your service provider Target country The country code for the recipient’s phone number Target Cell Phone recipient’s mobile phone Cell phone number of the recipient.
This page allows you to input the message that will be sent when an event is triggered. Enter your message, then click [Next]. The following screen will appear. This page will allow you to test your camera’s SMS functionality. To send yourself a test SMS, click the [Send me a SMS message via the SMS Gateway] button. Click [Finish] to complete setup. 6.7.2 Trigger Setup This page allows you to create, modify, or delete event triggers.
To create an event trigger, click the [Create] button. The following screen will appear. The following table describes the fields in this screen. Field Event Trigger Schedule Motion Detection Audio Detection I/O Ports Next Cancel Description Set the trigger for this event. Triggers can be based on schedule, I/O port activity, or audio detection. If you wish to schedule an event, input the time and day on which you want events to be triggered.
6.7.3 Motion Detection Motion Detection allows you to define up to three regions that will trigger an event if motion is detected. Select a region, sensitivity level (S1: Lowest ~ S5: Highest) from the dropdown list, and then click and drag on the video display to define the region. Click [Save] for settings to take effect. 6.7.4 I/O Status The I/O Status page displays the status of devices plugged into I/O ports. 6.7.
This page allows you to view your SD Card’s status, capacity, and gives you the option of formatting the card, as well as enabling recording to an SD card in the event of network failure. Click [Next] to continue. The following screen will appear. This page allows you to configure the circumstances in which recording to the SD card will occur. Users may choose to record when motion is detected, when audio is detected, when digital input(s) are detected, and the duration of the recording in seconds.
6.9 Recording History The Recording History page allows users to manage video clips that have been recorded by the camera. You’ll see a playback menu as displayed below. .The following table describes the labels found within this screen. Label Playback Download Protect/UnProtect Select All/Deselect/Delete Description Click to download then play the selected clip Click to download the selected clip to your PC Protected files will not be erased.
6.11 Multi-Camera This page allows you to add, modify, or delete additional IP cameras on your camera list. To access this page, navigate to [Setup] > [Multi-Camera]. The following screen will appear. To add a camera, click [Add]. The following screen will appear. The following table describes the labels found within this screen.
7 Event Viewer The Event Viewer allows you to view detailed logs of events which have been triggered. To access this page, navigate to [Setup], then select [Event Viewer] from the top panel. Select any type of event from the sidebar (Motion, I/O, Scheduled Triggers, or Audio Detection) to view that type’s history, or click on image links to view event-triggered snapshots.
8 Maintenance The Maintenance screen provides information about your IP camera, access to the history log, and system maintenance functions. 8.1 Information To access the Maintenance Information screen, navigate to [Setup], then select [Maintenance] from the top panel. The following screen will appear. 8.2 Log This page provides a system log for your camera. To access this page, navigate to [Setup], select [Maintenance] from the top panel, and then select [Log] from the side panel.
8.3.1 Reboot Camera Press the [Reboot] button to reboot your camera. 8.3.2 Profile Management Profile Management allows users to easily set up multiple cameras. After one camera is properly configured, users can export that camera’s configuration to a profile on their PC, which can then be loaded onto other cameras. This feature also serves as a backup in case settings need to be restored.
8.3.3 Reset All Settings to Default This will reset your camera to its factory default settings. All changes you’ve made will be lost. 8.3.4 Firmware Update Firmware updates are available at us.zyxel.com/support. After downloading the latest firmware for your camera, click the [Browse] button to locate the firmware file on your hard drive, then click the [Upgrade] button to update the camera’s firmware.
9 Troubleshooting During the course of installation, you might encounter various issues. The following section contains some troubleshooting procedures to help you solve these problems. 9.1 Reconfiguring Your Device Anytime you need to re-configure your IP camera, you can simply double-click on the eaZy Wizard icon to launch the eaZy Wizard configuration tool.
9.3 Resetting to Factory Defaults If you’ve forgotten your password, or your camera’s been acting generally strange, you can follow the steps below to reset the camera to its default settings. To reset the camera: 1) Press and hold the reset button (located on the camera’s rear panel) for approximately 10 seconds. When successful, you should see the status indicator light turn off. 2) After approximately 5 more seconds, the status indicator light should turn on again.
9.4 Trouble with Active X After launching your browser and entering your camera’s IP address, you’ll be asked for the username and password combination (Default is admin/admin, case sensitive.) No User Interface in the Browser This issue could have three possible causes. 1) ActiveX was not installed. Follow the instructions on-screen to install ActiveX, or you won’t have access to the user interface. Note: ZyXEL’s ActiveX components only support 32-bit Internet Explorer.
If you’ve gone through all above steps but still can’t obtain video/audio on your browser, close all browser windows and delete the ‘IPSurveillance Embedded” folder found in C:\Program Files. (If using 64-bit windows, look in C:\Program Files (x86)), then open your browser, log into your IP camera, and reinstall the ActiveX client. If your browser is returning a “213 file not found” error, try rebooting your computer.
9.5 Trouble with Remote Viewing on Browser You can view your camera’s video streams remotely over the Internet. If you’re having trouble viewing video remotely, refer to the section below for troubleshooting tips. The above figure depicts a typical setup in which: The IP camera has a static virtual IP address of 192.168.0.1 The WAN IP address at the IP camera site is 61.220.20.16 The client (user) is trying to receive the video/audio stream remotely.
3) Enable port forwarding on your router and allow traffic on the ports the IP camera is using. You may need to consult the manufacturer of your router for setting details. Note: Your router may require a reboot after port forwarding is set. The following figure details the settings required to remotely view the IP camera.
9.6 Symptoms, Causes, and Solutions Listed below are some common problems, and their solutions. Symptom Problems accessing from LAN network using web browser Possible Cause/Solution The entered IP address is incorrect. Make sure the IP address you entered matches the IP address of your camera. If you are certain that your camera is configured with the same subnet mask as that of your PC, you can first disconnect other cameras, then run the eaZy Wizard to scan for the camera on your network.
Symptom Scanning and connecting to wireless AP takes a long time Successful login to the camera, but no image is displayed Possible Cause/Solution Too many wireless APs nearby. The amount of time taken to scan wireless APs depends on the number of wireless APs around the camera. If there are too many wireless APs (30 or more), it may take as long as 3 minutes to complete the scanning process.
Symptom Network diagnosis shows error icon Problem using DDNS service Problem using eaZy Wizard Possible Cause/Solution Network connection error. The network connection test verifies that the camera has successfully connected to the LAN network. When the diagnosis result shows a red exclamation mark icon, it means that the camera fails to connect to the LAN network.
Symptom Part of the image becomes pixilated/Image artifacts appear Possible Cause/Solution Network bandwidth is insufficient. Without sufficient bandwidth, video quality will deteriorate and image errors like pixilation or frame-drop may occur. When you view your camera remotely from the Internet, your camera needs sufficient upload bandwidth to transmit video stream and you need sufficient download bandwidth to download video stream at the remote location.
Symptom A warning message appears stating “Your video quality is too high for your Internet bandwidth.” Cannot store recordings on a microSD card Possible cause/solution Network quality is not high enough. This means the camera’s browser interface, WebVUer, could not receive a steady stream of video data from your camera. The loss of video data might also be caused by network congestion or insufficient bandwidth. Please refer to other related troubleshooting tips.
10 Technical Specifications Category IPC-4605N Image Sensor Pan Range Focal Length: 4.0mm Max Aperture Ratio: F1.5 Fixed Iris -170° ~ +170°; total of 340 degrees Tilt Range -10° ~ +90°; total of 100 degrees Max Speed Pan 90°/sec., Tilt 70°/sec. Zoom 10x Digital zoom Angle of View 60° horizontal Focus Range 0.5m ~ INF Minimum Illumination IR Mode: 0 lux with built in IR LEDs on (12 LEDs in total; effective distance up to 10m) Color mode: 1.0 lux 1/5 ~ 1/16000 Sec H.
Software Category NVR Station Web Browser Internet Explorer (ActiveX) Supported Devices Mobile Phone General MJPEG Mode 3GPP Mode Operating Conditions Power Supply System Requirements IPC-4605N Multiple channel management (32-channels) Fast and intuitive camera setup Search and playback recordings by event types Scheduled and event-based management Smart motion and audio detection Remotely view and configure camera on Internet Explorer Record video and capture snapshots on PC; download recordings fro
11 Open-Sourced Components 3rd Party Software Addgroup Adduser Ash AVN-IPv4LL Busybox Cat Chattr Chgrp Chmod Chown ComproRTSP Version V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 Cp Cttyhack Date Dd Delgroup Deluser Df Dmesg Echo Egrep Email Ethtool False Fgrep ftp Grep Gnuzip Gzip Hostname Htpasswd Ip Ipaddr Iplink Iproute Iptables Iptables-multi Iptables-restore Iptables-save iwconfig V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.
Iwlist Iwpriv Kill Ln Login Ls Lsattr Mini_httpd Mkdir Mkdosfs Mknod Mktemp More Mount Mountpoint Mv Netstat Nice Ping Ping6 Ps Pwd Rm Sed Sh Sleep Stat Stty Stunnel Su Sync Tar Touch True Umount Uname Upnpc-static Vi Watch Zcat Ld-2.11.so Ld-linux.so.3 Libc.so Libc.so.6 V29 V29 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.19 V1.13.4 V2.11 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.
Libc-2.11.so Libcrypt.so Libcrypt.so.1 Libcrypt-2.11.so Libcrypto.so Libcrypto.so.0.9.8 Libdl.so Libdl.so.2 Libdl-2.11.so Libgcc_s.so Libgcc_s.so.1 Libip4tc.a Libip4tc.la Libip6tc.a Libip6tc.la Libiptc.a Libiptc.la Libiw.so.29 Libixml.so Libixml.so.2 Libixml.so.2.0.2 Libm.so Libm.so.6 Libm-2.11.so Libnsl.so Libnsl.so.1 Libnsl-2.11.so Libnss_dns.so Libnss_dns.so.2 Libnss_dns-2.11.so Libnss_files.so Libnss_files.so.2 libnss_files-2.11.so Libpthread.so Libpthread.so.0 Libpthread-2.11.so Libresolv.so Libresolv.
Libsockipc.so.1.2 Libssl.so Libssl.so.0.9.8 Libstdc++.so Libstdc++.so.6.0.11 Libthread_db.so Libthread_db.so.1 Libthread_db-1.0.so Libthreadutil.so Libthreadutil.so.2 Libthreadutil.so.2.0.2 Libupnp.so Libupnp.so.2 Libupnp.so.2.0.2 Libutil.so Libutil.so.1 Libutil-2.11.so Libxtables.a Libxtables.la Adjtimex Arp Blkid Depmod devmem Fdisk Freeramdisk Fsck Fsck.minix Getty Halt Hwclock Ifconfig Ifdown Ifup Init Insmod Klogd Logread Losetup Lsmod makedevs Mdev Mkds.minix Mkswap Modprove V2.11 V0.98m V0.98m V4.4.
Pivot_root Poweroff Reboot Rmmod Route Runlevel Start-stop-daemon Sulogin Swapoff Swapon Switch_root Sysctl Syslogd Udhcpc Watchdog haserl V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V1.13.4 V0.9.
gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.
Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
This product contains addgroup, adduser, ash, busybox, cat, chattr, chgrp, chmod, chown, cp, cttyhack, date, dd, delgroup, deluser, df, dmesg, echo, egrep, false, fgrep, grep, gnuzip, gzip, hostname, ip, ipaddr, iplink, iproute, kill, ln, login, ls, lsattr, mkdir, mknod, mktemp, more, mount, mountpoint, mv, netstat, nice, ping, ping6, ps, pwd, rm, sed, sh, sleep, stat, sty, su, sync, tar, touch, true, umount, uname, usleep, vi, watch, zcat, adjtimex, arp, blkid, depmod, devmem, fdisk, freeramdisk, fsck, fsc
Also, for each distributor's protection, we want to make certain that everyone understands that there is no warranty for this free library. If the library is modified by someone else and passed on, we want its recipients to know that what they have is not the original version, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents.
The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3.
Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself. 6.
8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 9.
Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. 14.
License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public License for more details.
This product contains ld-2.11.so, ld-linux.so.3, libc.so, libc.so.6, libc-2.11.so, libcrypt.so, libcrypt.so.1, libcrypt-2.11.so, libdl.so, libdl.so.2, libdl-2.11.so, libgcc_s.so, libgcc_s.so.1, libm.so, libm.so.6, libm2.11.so, libnsl.so, libnsl.so.1, libnsl-2.11.so, libnss_dns.so, libnss_dns.so.2, libnss_dns-2.11.so, libnss_files.so, libnss_files.so.2, libnss_files-2.11.so, libpthread.so, libpthread.so.0, libpthread-2.11.so, libresolv.so, libresolv.so.2, libresolv-2.11.so, librt.so, librt.so.1, librt-2.11.
domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users. Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary.
The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form.
4. Conveying Verbatim Copies. You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program.
c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b. d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge.
7. Additional Terms. “Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law.
license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.
Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement).
part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such. 14. Revised Versions of this License. The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program.